Thursday, October 31, 2019

Outline and discuss the different kinds of barriers to learning and Essay

Outline and discuss the different kinds of barriers to learning and participation faced by disabled children and young people wi - Essay Example However, there are calls to improve the deaf education by addressing the various challenges deaf children and young people come across. Schools, governments and the society have working towards better deaf education in most countries. The deaf education has been improving over the years, but the challenges are still there for deaf children and young adults in their quest for education, and only time will tell whether the current calls for more improvement and addressing challenges will be successful in making their education even better. The deaf education can be credited to an Italian physician, Geronimo Cardano who was born in the 16th century in Milan Italy. Geronimo claimed that the deaf were as smart as the hearing people only that they could not communicate with the others. He proposed that the deaf be taught just like the hearing people. Rather than normal communication, Geronimo proposed that the deaf be taught to use symbols and signs as a way of communicating their feelings to the others. This proposal was well taken by Juan Pablo de Bonet who created the first ever sign language book in 1620. This made the deaf education to spread fast across France leading to the establishment of the first deaf education school by Charles Michel de L’Eppe. ... Deaf people continued to be taught how to communicate to the rest of the society using this sign language. This has continued to the current times. School, colleges, experts and government alike have started appreciating that deaf education is important to the people with hearing problems. Parents with deaf children are advised to take their children to these special schools (Winzer and Mazurek, 2000). Though deaf education is yet to be like main stream education, at least there are some improvements. There have been significant events in history that have really impacted the deaf education. They are; Abraham Lincoln signing in to law the enabling act which was meant to improve education of the deaf. This was followed by the opening of the National College for the deaf and dumb in 1864. The invention of the electrical hearing aid in 1892 to allow the deaf to communicate with the other people in the society, phone for the deaf invented in 1964 and the signing of the disabilities act i nto law which was meant to ensure that the disabled have right to education, employment and equality (Rotatori, Obiakor and Bakken, 2011). Lack of enough funding for deaf education is the great threat to the deaf people. A cross check in several countries shows that deaf schools are closing. According to the National Association of the deaf, most states in the United States are cutting funding for deaf education. Most of the national and state governments across the world are focusing on cutting their expenses. They are removing what they deem not necessary as the world has been a recession. Deaf education programs are some of the items that are not a priority for most governments. The

Tuesday, October 29, 2019

In class Exam 2 Essay Example | Topics and Well Written Essays - 1500 words

In class Exam 2 - Essay Example The company set a number of financial goals in order to meet its goals and objectives. In fact, the financial policies created by the organization enable it to adhere to the firm’s strategic plans as well as control the growth of the company. This financial policy determines whether the earnings of the company increases or decreases within a given financial period or fiscal year. The financial policies also incorporate a global product strategy whereby it leaned out its manufacturing operations in order to create a flexible manufacturing operation that saved on the costs of operations as well as resulted in the faster development of its products. In addition, this global product strategy also led to development of efficiencies in the delivery of the company’s new technologies especially within its core markets. This is majorly due to the worldwide integration of the automotive industry, which greatly influenced a variety of policies, practices and strategies that the Fo rd automobile Corporation undertakes in order to succeed in its operations and business ventures. The company also shapes its functional strategies in consideration of the environmental policies adopted by the United States of America. The US has growing concern over the protection of the environment by instituting development of policies that are more inclined to the conservation of the environment. ... In fact, the company even stated on its website that it relies on a sustainable technology that advances to alternative fuel plans, as well as, lay out constructive plans in order to improve fuel efficiency in its products. In addition, the company also advances towards usage of bio fuels and electricity in designing their products. Strategy implementation at the company adopted incorporates the six sigma strategy whereby it follows a set of techniques, as well as, tools, which are handy in the improvement of processes of operations. Jack Welch became famous from his development of the six-sigma model, as it was his central strategy of implementing his business motives and processes. Jack Welch succeeded through the application of this model in his business strategies while at the controlling seat at the General Electric Company in 1995. The six-sigma model is a good way of creating synergies across the organization in order to increase the probability of the buy-in mission of the co mpany, as well as, create an effective alignment of resources that would lead to increased productivity in the company. The alignment of resources as well as development of other concerned factors will make the business improve its functions and performance. The six-sigma model enabled the former chairperson as well as the chief executive Officer of the General Electric Company (GE) to turn the productivity of the company from 1981 to 2001. This transformation was very magical as it dramatically changed the productivity of the company by increasing its market value from a market value of $ 14 billion to $ 410 billion during the tenure of Jack Welch, all thanks to the use and application of the

Sunday, October 27, 2019

The Transformational Leadership Style Business Essay

The Transformational Leadership Style Business Essay This assignment describes the development and transformation process of State Trading Organization Public limited (Here Onward STO). STO strived to provide to Maldivian market, products ranging from staples (like rice sugar and flour), medicine, quality merchandise, and improved construction material, oil and state-of-the-art consumer goods as well other general trading products. Due to newly established democracy and regulations, innovation imported by FDI and service level challenges STO to fundamentally rethink their business and reformulate their strategies. The nation was growing, and so were the nations demands. The organization is established in the year 1964. For four decades STO was known as the market leader. However, it lasted till the industry was opened for foreign and domestic competition in 2005 under economic and political reforms in 2001. Hence, STO foreseeing the competitive and political challenges, the organizing aimed a broader transformation towards becoming a market oriented company. This paper will cover mainly two sections. Firstly, the paper has studied the company background as the introduction of this assignment. Secondly, it has attempted to understand why change is important for organizations to adopt in todays business environment. Therefore, through highlighting on the external factors such as political, Economical, Social and Technological factors (PEST factors) that are as drivers of change, has been given importance as the literature of the subject. Consequently, the main part of the paper: finding the facts, assessing the findings, discussing and analyzing the situation which will help in understanding the strengths and weakness of the subject being studied in this assignment was thoroughly evaluated as the primary component of the paper. In addition, it has given insights into the importance of leadership in bringing changes effectively and explains the opposition and challenges faced by STO. Thus, causing STO to reconsider and reformulate in various business strategies like Leadership, people engagement and change management methods to become customer friendly and improve its image. This assignment will highlight various future challenges awaiting STO and recommendation for actions. INTRODUCTION Company Background The beginning of State Trading Organization Plc, (formerly known as (ATA) Athireege maafannu Trading Agency) is a registered organization. The roots of State Trading Organization PLC, dates back to à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦(website) 1964 when it was opened to finance the purchasing and importation of essential food items needed for the Maldivian community in bulk. Today STO has sustained this important responsibility to oversee the food security concerns of government and diversified into many other areas of importance such as energy needs of the country which has now become part and parcel of STOs mandate. Within the framework that includes these two areas, STO has diversified and is also competitively engaged in trading in other areas including Consumer Electronics, Home appliances, Medicals, Canned foods, Health foods and a range of other high quality products. This has been achieved by direct procurement and distribution as well as forming joint ventures to effectively trade in areas where STO might have been at disadvantage had STO not been able to do so, while still maintaining a strong hold with the Government as the primary trading partner of choice. State Trading Organization plc with its subsidiaries, a joint ventures and associates is a nationwide leader in the business sector. It has significant and focused interests in petroleum, construction materials, electronic items, cooking gas, cement, roofing sheets products, home appliances, super markets and insurance. The company is geographically diverse, with operations and developments in Maldives and Singapore. Diversification is the one of the most important strategies in STO. Therefore STO is entering different business sector like, Tourism, aviation, oil business, construction, agricultural produce and real estate business. METHOD OF INVESTIGATION Most of the information about the various strategies utilized by STO to face competitive challenges was acquired through numerous interviews with managers and employees of STO. Other pieces of information were also gathered through the companys website and local media. The websites and publications of the governments numerous ministries and departments are considered the main sources of information on topics related to the governments policies, regulations and laws. Information regarding trade regulations and policies are taken from the Ministry of Economic Developments annual reports, as well as from the statistical reports that they periodically publish online. In addition to these sources several pieces of information were also acquired through STOs annual report of 2011 and the Quarterly report of 2012 LITERATURE REVIEW The liberalization of Maldives economy and trade regulation has led to market widening , attraction of new foreign investments in well known companys and competition that has led to reduced prices, latest and innovative services, quality products and better customer care. As is suggested by Bortolotti, Bernanrdo, Juliet DSouza, Marcella Fantini, and DomenicoSiniscalco(2002 cited in SilivioContessi 2004 p.3)1the infrastructure investment fosters market interaction and competition through three channels direct market selection, restructuring and entry. As is the theme of this paper, how leadership and people engagement transformed and restructured STO to a market oriented firm to confront the competition from FDI. However, the liberalization was not fully effective due to the certain exclusivities provided to STO such as Government major share. Recent changes in political platform and FDI regulation STO need to be able to adapt different leadership style like, autocratic, democratic leadership Style and other shifting circumstances and cope with those changes (Moment, 2007)2.   Every organization needs leaders who can change as fast as market conditions do (Newcomb, 2005, p. 34)3.   Business needs can change rapidly and employees look to their leaders to guide them through change.   Uncertainty in leaders can lead to a lack of faith by employees. Good leadership is critical to a successful school. Success comes from aiming high with the clear vision, ethos and communication that good leadership brings. We will act to support high quality school leadership and inspired ambitious school communities. (Ambitious, Excellent Schools Our Agenda for Action, Scottish Executive, 2004, p5)4 Research into transformational leadership in organizations has found links to improved employee commitment (Barling,webberKelloway ,1996)5,heightened trust in leadership (Bass B.M.,1990),and stronger connection with the vision (Howell and Shamir,2005)5 and thus alignment of effort with the (change) goal (Shamir,House, Arthur,November 1993 ) cited in cited in Sherry Scully 2008)5. Based on the research results it could be concluded transformational leadership may be more appropriate for STO undergoing transformation where motivation of employees and commitment to change comes from their intrinsic motivation. Future leaders and employee engagement will need to be conversant in doing business internationally and conceiving strategies on a global basis. Globalization will intensify the requirement that senior leaders deal effectively with a complex set of constituencies external to the organization. (e.g., responsibility for managing the companys interface with trade, regulatory, political, and media groups on a wide range of issues). Leadership development is rapidly moving to include substantial components involving international markets, world economic trends, and focus on particular regions such as the Asia Pacific rim (Cacioppe, 1998)6. Kotler and Heskett (1992 Cited inRezaGharoieAhangar 2009)7 identify successful leaders as those who repeatedly communicate their vision, allow people to challenge these messages and stimulate middle managers to take up the cause and provide leadership themselves, characteristics similar to transformational leadership. Likewise leaders foster an environment for building intellectual, managerial and leadership capabilities. The whole concept of transformational leadership linked with HPW is a process by which leaders and followers raise one another to a higher moral and motivational level Burns (1978 Cited in Reza 2009)7.Through this process senior managers share organizations vision to intellectually inspire, stimulate and empower the subordinates. (Bass and Avolio, 1994 cited in Reza 2009)7. 4.0 FACTS, FINDINGS Political Environment In year 1964, Maldives was a very peaceful and stable country. After 2008, the market has become volatile characterized with higher degree of uncertainty and complexity due to our political environment and reform movement. On average new regulations and laws are passed and enacted every month. Along with the democratization process came various legal changes to the economy including the introduction and changes to several laws and regulations, notably, the business profitability tax, Good and service tax, Tourism Tax, Tourism Land Rent, Bank Profit Tax, Duty Free Royalty, Foreign Investment Royalty, Fuel Re-Export Royalty and re-export tax directly influencing the STO business. The fact was highlighted in the STO Annual Report (2011 p.3) as a risk. The newly elected president in 2008 resigned half way through his term and claimed he resigned duress. Many believe its a coup. Therefore, our political environment is at very high risk. This volatile and serious political environment is affecting each and every business of this country. The political situation influenced the business strategies of STO. Hence, most of the decisions were politically driven instead of the business motive. Economical: Global recession hit badly along with the rising fuel prices. It had adversely affected the company in two ways. Firstly, recession has led to fall in income, so consumers are spending less on Home improvement items (like Electronics, kitchen appliance) resulting in decrease sales and increasing storage cost and thus in the drop in company profitability. The unexpected plunge in exchange rate of Rufiyaa against US Dollar, coupled with the continuing problem of foreign exchange shortages caused major impact on the business performance. This was highlighted in the STO annual report (2011 p.7 MDs Message).The depreciation of the Maldivian Currency (Rufiyaa) following the introduction of the exchange rate band in April 2011. Shortage of foreign currency reserve (US Dollar) is affecting STOs business. Because STO is importing most of the items from Singapore, Japan, Dubai and chain. Due to the change in government in 2008, changes to the trade policy and the implementation of new tax laws and regulation brought many challenges to STO in terms of foreign currency transactions. Social: Image of the company: Over the past few decades STO has been one of most leading and reputed company in Maldives (price and Quality).Due to recent changes in political and economic environment, STO is facing many challenges to maintain its reputation. STO is participated and contributed to a number of social activities that are designed to positively contribute to our socio-economic development and towards protecting our natural environment. These activities are in line with the company policy of being an exemplary leader in corporate social responsibility.(annual report 2011p.07) Due to the extensive government intervention on STOs business decisions, STOs reputation and image are affected According to daily newspaper (Haveeru daily) STO is engaging in corruption and fraudulent trading in Singapore. This created bad publicity and tainted the image of the company. Technology: STO understands the importance of developing its technology infrastructure and considers continuous changes in business environment and advancement in technology. In line with this, STO management team decided and implemented the Enterprise Resource Planning (ERP) to improve productivity, reducing operational cost and improving internal control and monitoring. This system provides day-to-day information to make decisions which will facilitate to transform the future of STO and employee engagement. STO has implemented the human resources module of the ERP system, which will facilitate more efficient management of payroll and other staff related matters(Annual Report 2011 p.07). EFFECTIVELY An organization cannot run without proper vision and guidance of a leader. In todays changing world the role of leadership is even more essential, to show direction towards change, convince employees and finally to set a strong foundation to successfully carrying out change. Faced with Political, Economical and Foreign competition, STO underwent recent changes where by its major strategies were rethought strengthening the whole strategic process through integration, bundling, Diversifying and focusing new industries like, Tourism and Real estate (Annual Report 2011, p.25) .STOs major shareholder the government as well as shareholders have to evolve and transform with the changes to the business environment to achieve a successful future for STO. Hence, the following part gives insight into the topic precisely. Transformational leadership style Developing vision After these major changes in business environment, STO is moving forward to achieve its vision. STO had a vision to become the most successful and the most efficient parent company (of a diversified group of subsidiaries) in the Maldives by the year 2014. Investing on tourism, real estate and aviation (Annual Report 2011, p.25) would allow STO to achieve its corporative goals. Therefore, it has to be noted that STOs vision is in accordance with one of the cores of transformational leadership. Finding the way deal with this dramatic changes STOs Board and Management team has charismatic personality which drives people to believe in leadership and that can influence people about change like how it is embedded into STOs slogan evolving with. Thus, a charismatic leader like the newly appointed Chairman and directors (appointed 2012) has used their personality leadership style to enhance the business by setting clear values and supportive culture for the employees as well as for the company. Due to major changes in political environment and the economy in Maldives, leaders must confront and take bold steps rather than being in the background even after changes in order to set an example for others and to ensure long term success of change plan as the external environment is very uncertain. HUMAN RESOURCE AS STRATEGIC ASSET STO promotes itself as employees are the most important asset in the organization with HR best practices. To promote HR strategy, implement the human resources module of the ERP system, which will facilitate more efficient management of payroll and other staff related matters. Among these STO has stated its HR strategy as follows: Selective hiring , retention and extensive development of employees STO promotes itself as an employees brand and this perception by the public has given STO distinctive benefits in terms of better attraction of necessary and new skills, employee retention and engagement making it easy for STO selective hiring and retention. STO strives to attract and retain a productive and an enthusiastic workforce. The Company ensures its remuneration packages are competitive. In order to motivate staff to attain higher levels of productivity, employees are given an incentive bonus of 3% of the net profit for the year if the company exceeds its annual profit targets(Annual Report 2011, p.27) Recognizing Employees commitment STO is able to create commitment among their employees. STO realizes that commitment is ultimately personal. To recognize employees hard work, shields of appreciation are given to those who serve more than 15 years and best employees (Annual Report 2011, p.27). Training and development of Employees Oakland, CA January 16, 2012 Bersin Associates, the premier research and consulting firm empowering Human Resource (HR) organizations to drive bottom-line impact, today announced new research that shows spending on employee development rose 9.5 percent to an average of $800 per learner in 2011, as organizations moved to combat the current skills gap in the labor market. During the year, STO conducted many short-term training programs, and provided career deployment opportunities to its employees in many different professional are as (Annual Report 2011, p.27). Employees engagement Most of the organizations are facing new challenges due to development of social media such as twitter and face book. Organizations need to have employees engagement strategy to overcome the challenges. Employee engagement plays a vital role in motivating the performance levels of the workforce. A motivated employee will seek out ways to accomplish a task. Employee engagement illustrates the commitment and energy that employees bring to work and is a key indicator of their involvement and dedication to the organization. Employees who are engaged are more productive, content and more likely to be loyal to an organization. When organizations put sound HR practices in place, they are more likely to discover that employees feel satisfied, safe and will work to their full potential .Therefore STO recognizing, values, support, feeling in different situation like, providing financial support through staff loan, discounts and awarding long service staff every year. Striving to attract and retain a productive and an enthusiastic workforce, STO recreation club (STORC) conducts many sport events to help foster camaraderie and team spirit among staffs.(Annual Report 2011, p.28). Performance management According to the University of California, Berkeley is committed to a performance management system that fosters and rewards excellent performance. Effective performance management aligns the efforts of supervisors and employees with departmental and campus goals, promotes consistency in performance assessment, motivates all employees to perform at their best, and is conducted with fairness and transparency. (Cited in http://hrweb.berkeley.edu/performance-management). STO has also been taking measures to evaluate and manage the performance of both individual employees and departments through performance auditing on HR and also through a performance evaluation at the end of every financial year. HPW and Employee Engagement STO is adopting high performance working practices through SAP ERP system. The system helps to align a complex set of organizational elements including Strategy, vision, Mission, and goal, management practice, organizational structure, work practices and process human resource and other systems such as technology. Continuous high performance work systems have been cited by STO and the company is now transitioning to a high performance working system. This will require the development of a strong communication system and organizational restructuring. CONCLUSION Transforming whole business environment in Maldives (PEST) factors are affecting STO business. Domestic and international competition STO has managed to retain its market position. As new challenges emerge the change process will be an ongoing process to maintain market position. As now STO has completely lost its remaining exclusivities it will face new challenges from Multinational chain like (ACE hardware) over retaining customers. Excellent HR practices and efforts retain existing employees as well as new. To tackle the future challenges STO is developing its human resource, redesigning organizational structure, using latest technology and innovative software to efficiency and effectiveness of its operation. To achieve organization mission and vision, STO is adopting high performance working practices, increasing employee engagement, review STO pay package and career development opportunities. Furthermore investing eco-friendly products and engaging CSR to transform the future challenges. Therefore STO come to a decision to diversify its business into different area like, aviation, real estate business and tourism industry to improve its financial performance. This will attract more investors and shareholders as well as all stakeholders. So this strategy will bring more opportunities to the business as well as public in future. RECOMMENDATION Dynamic and complex business and Political environment STO is facing many challenges as well as opportunities in future. Therefore STO needs to be more proactive to these changes, which can be perceived by the knowledgeable among the corporate: Even though STO is government owned company (Major Shareholders), too much of government influence and political motive decision may not be business and profit oriented. It should be balanced in terms of politics and profit or business. As STO faces new challenges due to implementing EPR system, lack of trained employees. Therefore STO need to Investing in training programs helps employees develop personally and professionally to adopt this incremental changes in its processes and operation especially the way HR works, good and services are delivered to the end customer for this transformational change alone will not do. STO need to implement more monitoring and control mechanism to employee recruitment, Conflict resolution at workplace. STO need to developed HR Policies and procedures and communicate the values of its organization and provide everyone fair and transparent promotion and rewarding system. 9.0BIBLIOGRAPHY 1. Sung, Johhny and Ashton, David.High Performance Work Practices: linking strategy and skills to performance outcomes. s.l.  : Department of Trade and Industry, UK, 2005. 2. Schuler, A J. [Online] 2003. [Cited: 3 November 2011.] http://www.schulersolutions.com. 3. Recklies, Dagmar. [Online] 2001. [Cited: 4 November 2011.] http://www.themanager.org. 4. Canterucci, Jim. [Online] 2001. [Cited: 3 November 2011.] http://www.corpchange.com. 5. Nickols, Fred.Four Change Management Strategies. s.l.  : Distance Consulting LLC, 2010. Mike Millmore Philip Lewis Mark saunders, adrian Thornhill Trevor Morrow(2007) Strategic Human Resource Management contemporary issues Jon M. Werner and Randy L. Desimone (5th Edition) Human Resources Development Post :GauravAkrani Date : 12/27/2009 08:52:00 PM IST Comments (2) Lables : Management, Study Notes Craig W. Fontaine, Ph.D.(August 2007) NortheasternUniversity College of Business Administration A Critical Factor for Organizational Effectiveness and Employee Satisfaction Charlotte RaynerDerekadam-Smith, Managing Leading People (2nd Edition, chapter-9) Recruitment Selection Employee-engagementmaximizing-organizational-performance PERSONAL EXPERIENCE Throughout the work for this Assignment, I have learned how organizations operate and the challenges they face. I understood from this work that, regardless of how smooth and successful an organization is, changing and adopting leadership style are always needed. It may be in the target market, management, human resource or technology used by the organisation. For these reasons, if handled carefully with the right tools, change can be smooth and successful. I m confident, that I will be able to apply the techniques that I have learned from this work in all stages of my career.

Friday, October 25, 2019

gdp analysis :: essays research papers

U.S. Economic Outlook: 2005-06 GDP Analysis   Ã‚  Ã‚  Ã‚  Ã‚  In order to ensure competent and accurate forecasts for both 2005 and 2006, I obtained GDP information from a few different sources. Accessing the information without having to register at a â€Å"nominal† fee was a bit interesting at times, but nonetheless I found a couple of sites that all forecasted GDP and all of it’s components within a tenth of a percent of each other.   Ã‚  Ã‚  Ã‚  Ã‚  The one I found easiest to follow and analyze was the TD Quarterly Economic Forecast that I accessed at their website, www.td.com/economics. According to information provided here and enclosed information from Reuter’s and Comerica, Real GDP growth is expected to tail off from about 4.4% in 2004 to 3.2% by the end of 2006. All three of these articles identified 2004 as the best year for our economy growth wise in the current business cycle by far. Consumer spending and business investment growth are predicted to decline pretty sharply over the next two years, while the housing / residential construction sector is expected to show negative growth. This, in itself may be an indication that there may be a reverse trend in the property / real estate market, bringing prices down and keeping that market honest. All of these forecasts are contributing factors to the predicted dip in both final domestic demand as well as final sales. Good news though is that export growth is expected to increase, which will reduce the amount of growth in imports, directly correlating to a drop in the nation’s unemployment rate. Increasing the number of jobs will infiltrate more money on the domestic front and eventually serve as a shot in the arm to a parched economy. All in all the U.S. economy is in pretty good shape and here to stay. Optimally, we would like to see this year and next build upon last year’s incredible figures and shoot consumer spending further through the roof.

Thursday, October 24, 2019

My Significant Other

Art is composed of many different elements. There are many different styles of art that can be taught. Art has been used for thousands of years. Art is a way of expressing life. My favorite kinds of art are expressed through drawings and paintings. In Expressionist Art the artist tries to show strong certain feelings about something important. This can be done through sculptures, paintings, drawings, etc.When I am drawing I tend to draw people and things that relate to a person or multiple people. My sketches are complete with shading. Shading is to show shadows and contrast. My paintings are always outdoors and have to do with animals, plants, and scenery. Painting the sky and ocean have a lot of patience to be dealt with because It takes a right mixture of colors to make It feel lively. Pop art Is the most common art. It has to do with very popular seen people, places, or things.My favorite pop artist is Andy Warhol. The way he deals with the colors and shapes are amazing. I really enjoy the piece he did with Marilyn Monroe and the Campbell soup piece too. Surrealism is a type of art enjoy doing. When I have a strange dream I will take the most particular thing about my dream and turn it into art. I make it very mysterious and lifelike so everyone can witness what I saw in my sleep. I like to leave wonders and thoughts in others minds. Abstract art is also a favorite of mine.I will get a whole munch of random objects and glue them together and make another random object out of all these other pieces. It is very fun and creative. I once went outside and collect things to make a birds nest. Leaves, sucks, and other outdoors objects were collected and my masterpiece was finished. I received an excellent grade. Art Is different for everyone. Some use music as an art form, others use dance as an art form. Any way art is used it is still expressed through the artist. Art has and will always be around.

Wednesday, October 23, 2019

MGT 501

Developing the Session Long Project Paper:   The SLP paper is a unique opportunity to directly use the course materials to improve your understanding of the OB-related issues within your immediate work organization (or another organization you know very well).   This should help to make the course more personally relevant. Please note that they ARE NOT simply ‘personal opinion’ papers.   Rather, they ask you to conduct a series of brief personal assessments, relating insights you have gained from reviewing the assigned academic materials, to your specific career.   Spend some time thinking about how to apply these assessments and coming up with a substantive career development plan to build on your skills and shore up your weaknesses. Your analysis should be approximately two double spaced pages, plus include both title and academic reference pages (the same as requested for each case paper).   Also, as with the case paper, please use contiguous citations (at the point in the paper where they are most relevant†¦again, see the TUI Style Sheet on this).   These will assist help your professor to better understand how you have used the applicable academic material to support your analysis. The SLP for this class involves constructing a personal inventory of your management skills, and a plan for improving those skills. In each module, you will complete an assessment of a relevant set of skills, focusing on your strengths and identifying any weaknesses that may have been revealed through the assessment an/or your personal experience. You will then be asked to create a plan by which you can `grow` your strengths and shore up your weaknesses. By the end of the project, you will have a personal management profile and action plan. In this module, you will be assessing your cultural awareness. Click on this link to Kwintessential Language and Culture Specialists. ((http://www.kwintessential.co.uk/resources/culture-tests.html)) You will find a selection of 20 or so cultural awareness quizzes. Choose one or two that looks interesting to you. (Hint: You will learn the most if you choose a general quiz, or one that concerns a country with which you are not familiar, as well as test your knowledge of a culture with which you think you are highly familiar.) After completing the quiz(s), address the following questions in a 1-page essay: Which quiz(s) did you take? As I am from Asia and I do know a bit of Spanish, I took the Cross-Cultural quiz on Islam and on Mexico. Were you surprised at your score? Yes, I was a bit surprised about the results.   In the Islam quiz, I got an 80 %, and in the Mexican quiz, I got 60 %. What strengths do you think that you have in the area of inter-cultural awareness? Some of the strengths I have in the area of cross-cultural awareness includes: – Knowing a bit of the local languages, such as Arabic, Urdu, and Spanish Knowing the customs and traditions belonging of these groups Belonging to the same religion or staying with people of the same religion as these groups. Having an idea of the attitudes, beliefs and practices followed by these groups. Having respect for one another, irrespective of the caste, creed, race, etc. Having more of cultural encounters and interactions Having an idea of interacting and developing a relationship with people from other cultures Staying in a cosmopolitan environment I have met people from these countries I have read about these groups in books and in web sites.  · What weaknesses are you able to identify? I have not traveled to these regions of the world I do not know to read and right the languages spoken in these regions Taking a bit longer time to learn local languages Taking longer time to get accomplished with local traditions – Create a plan of specific steps can you take to build on your strengths and decrease areas of weakness. During cross-cultural interactions, the individual should not be bias and have a faulty attitude towards people belonging to certain cultural background.   These attitudes develop when others provide inappropriate information of these groups.   Hence, we tend to develop negative behaviors with individuals of these groups leading to negative interactions and bad experiences.   It would be more important for us to be unbiased and have an open mind. 1. As I stay in a cosmopolitan environment, I would be open for discussion, interactions and ability to accept people belonging to foreign cultures. 2. Before interacting with any individual belonging to another cultural group, a thorough cultural assessment similar to this needs to be conducted. 3. Once the cross-cultural skills have been developed, individuals belonging to other groups would begin to trust us and have a stronger relationship with us. 4. During interactions, eye-to-eye contact is necessary. 5. It is important to respect the beliefs, attitudes and practices of these groups during interactions, as many of them follow strong traditions and customs. 6. During intercultural interactions, it is necessary to keep in mind whatever ideas exist of the attitudes, behaviors, traditions and practices.   Even a little bit of these put into practice would be identified by the other individual and would be appreciated.   In this way, slowly but surely relationships can be developed. 7. If the individual expresses a belief, which is superstitious in nature, it may be better to be nonjudgmental about it.   I would respect such superstitious as it would mean giving credit to the other individual’s culture. 8.It may be difficult for me sometimes to mix with people from other cultures, as I have not traveled to other regions of the world.   However, reading more about these individuals, their countries and their cultures through books, videos and the Internet can reduce the problem. 9.As I take longer time to learn languages, I would have to make an extra effort to do so.   It may be easy for a child to learn and accept a new language as they have good learning capacities.   However, once an individual crosses the age of 8 to 9, the ability to learn a new language may decrease.   Adults having good motivational capacity would also be able to learn a new language.   Hence, I would have to motivate myself further to learn the new language. 10.   In order to get accomplished with new traditions, an open mind and greater amount of intercultural interactions is required. Why is it important for managers to increase their levels of cultural awareness? Managers have to increase their level of cultural awareness so that they can develop a strong relationship with individuals belonging to other cultures.   Once these relationships develop, both parties would begin to trust and have confidence in one another.   The Managers could now motivate the staff and also be able to understand and solve their problems better.   This would be positive not only for the manager and the staff member, but also for the organization as a whole. References: Campinha-Bacote, J. (2001), A model of practice to address cultural competence in rehabilitation nursing, Rehabilitation Nursing, 26(1).      

Tuesday, October 22, 2019

Thing to Consider When Planting A Norway Maple

Thing to Consider When Planting A Norway Maple Norway maple (Acer platanoides) was introduced by botanist John Bartram of Philadelphia from England to the U.S. in 1756. It has been planted on farms and in towns for its shade, hardiness, and adaptability to adverse conditions, which has ensured that the maple, when planted, would spread like wildfire. Because of this, and a variety of other negative factors, the Norway maple has earned itself the title of a Bad Tree, meaning its destruction is often sought out by city governments and concerned landscapers fearing that the large canopy of leaves this particular maple yields will block all other growth underneath it. However, there is a number of redeeming qualities to this type of trees such as its tolerance to multiple types of soil nutrients and climate conditions, its optimal fall foliage, and beautiful yellow flowers in the spring. Why Norway Maples Are Bad Trees The shallow, fibrous root system and dense shade of Norway maple make it virtually impossible for grass to grow under the tree, and the aggressive roots frequently girdle even the parent tree, ultimately choking itself to death, making it a bad tree if youre planning on growing anything else around it. Further, Norway maples are also non-native invasive exotic trees that have escaped the urban environment and is a threat to native maples because of its sun-blocking foliage. Norway maple populations overwhelm sites by displacing native trees, shrubs, and herbaceous understory plants, and once established, creating a canopy of dense shade that prevents regeneration of native seedlings; it is also thought to release root toxins that inhibit or prevent the growth of other plants. Norway maples also reproduce quickly, forming dense root systems in a matter of seasons that are nearly impossible to fully remove without killing the surrounding soil entirely. However, this isnt to say there are no redeeming qualities for this type of tree. Redeeming Features Norway maples are arguably among the most beautiful variety of maple tree currently in North America with rich yellow leaves in the fall under optimal conditions and lovely yellow flowers on leafless branches in the spring. These trees are also highly resistant to climate conditions and lack of nutrition in the soil and can grow almost anywhere as a result, which makes them great for planting on land that usually cannot support much greenery. Also, due to their nature of spreading rapidly, harvesting new trees for distribution is surprisingly easy- just replant one of its many roots and a new tree will begin growing in no time. Plus, Norway maples grow rather quickly and provide lots of shade, so they can be used to generate a quick, natural privacy fence for your property.

Monday, October 21, 2019

No Pretty Pictures essays

No Pretty Pictures essays 1. What were your feelings after reading the first chapters of the book, After reading the first half, After finishing the book. When I first started reading this book, I thought it was going to be very draggy, and that there would really be no story to it. And that it would be such a hard book to get through even though it was so short. Then as I started getting further and further into the story it got more interesting. I started to enjoy reading it about half way through. Some things seem a little far fetched, thats what you get when you read fiction though. I dont really like fiction, so it all seems fake to me. There were some pretty interesting things that happened to Kino and his wife Juana. I liked the book, when it was over, I thought that it was a good book to have read. The ending I think is the best, I usually dont like endings that end quickly but for some reason I thought it fit this story. 2. Did this book make you laugh? Cry? Cringe? Smile? Cheer? Explain. Well there were a lot of different emotions that I felt during this book. So many good things and bad things happened. In the beginning I just couldnt wait to get done the book. Then when Coyotio got stung, I felt bad. And then I felt even worse when Kino didnt have money to hire a doctor. But it was cool that he happened to find a pearl that he thought was worth a lot of money. I could go on like this through the whole story, for every time that my emotions changed. But basically in the end I was sad. I didnt like the idea that the baby dies, after all of that started just because Kino wanted to save his sons life. And the baby dies in the end. So over all I would have to say that the story made me cry (even though I never actually cried or cheered or smiled). 3. What connections are there between the book and your life. The only connection I can see between the book and my life would be the n...

Sunday, October 20, 2019

The Ransom of Atahualpa

The Ransom of Atahualpa On November 16, 1532, Atahualpa, Lord of the Inca Empire, agreed to meet with a handful of bedraggled foreigners who had intruded upon his realm. These foreigners were some 160 Spanish conquistadors under the command of Francisco Pizarro and they treacherously attacked and captured the young Inca Emperor. Atahualpa offered to bring his captors a fortune in ransom and he did so: the amount of treasure was staggering. The Spanish, nervous about reports of Inca generals in the area, executed Atahualpa anyway in 1533. Atahualpa and Pizarro Francisco Pizarro and his band of Spaniards had been exploring the western coast of South America for two years: they were following reports of a powerful, wealthy empire high in the frosty Andes Mountains. They moved inland and made their way to the town of Cajamarca in November of 1532. They were fortunate: Atahualpa, Emperor of the Inca was there. He had just defeated his brother Huscar in a civil war over who would rule the kingdom. When a band of 160 foreigners showed up on his doorstep, Atahualpa was not afraid: he was surrounded by an army of thousands of men, most of them war veterans, who were fiercely loyal to him. The Battle of Cajamarca The Spanish conquistadors were aware of Atahualpas massive army - just as they were aware of the massive quantities of gold and silver carried by Atahualpa and the Inca nobles. In Mexico, Hernn Cortes had found riches by capturing Aztec Emperor Montezuma: Pizarro decided to try the same tactic. He hid his cavalrymen and artillerymen around the square in Cajamarca. Pizarro sent Father Vicente de Valverde to meet the Inca: the friar showed the Inca a breviary. The Inca glanced through it and, unimpressed, threw it down. The Spanish used this supposed sacrilege as an excuse to attack. Suddenly the square was filled with heavily armed Spaniards on foot and horseback, massacring native nobility and warriors to the thunder of cannon fire. Atahualpa Captive Atahualpa was captured and thousands of his men were murdered. Among the dead were civilians, soldiers and important members of the Inca aristocracy. The Spanish, practically invulnerable in their heavy steel armor, did not suffer a single casualty. The horsemen proved particularly effective, running down terrified natives as they fled the carnage. Atahualpa was placed under heavy guard in the Temple of the Sun, where he finally met Pizarro. The Emperor was allowed to speak with some of his subjects, but every word was translated for the Spanish by a native interpreter. Atahualpa’s Ransom It didn’t take long for Atahualpa to realize that the Spanish were there for gold and silver: the Spanish had wasted no time in looting corpses and the temples of Cajamarca. Atahualpa was made to understand that he would be freed if he paid enough. He offered to fill a room with gold and then twice over with silver. The room was 22 feet long by 17 feet wide (6.7 meters by 5.17 meters) and the Emperor offered to fill it to a height of about 8 feet (2.45m). The Spanish were stunned and quickly accepted the offer, even instructing a notary to make it official. Atahualpa sent out word to bring gold and silver to Cajamarca and before long, native porters were bringing a fortune to the town from all corners of the empire and laying it at the feet of the invaders. The Empire in Turmoil Meanwhile, the Inca Empire was thrown into turmoil by the capture of their Emperor. To the Inca, the Emperor was semi-divine and no one dared risk an attack to rescue him. Atahualpa had recently defeated his brother, Huscar, in a civil war over the throne. Huascar was alive but captive: Atahualpa feared he would escape and rise again because Atahualpa was a prisoner, so he ordered Huascars death. Atahualpa had three massive armies in the field under his top generals: Quisquis, Chalcuchima and Rumià ±ahui. These generals were aware that Atahualpa had been captured and decided against an attack. Chalcuchima was eventually tricked and captured by Hernando Pizarro, whereas the other two generals would fight against the Spanish in the months that followed. The Death of Atahualpa In early 1533, rumors began flying around the Spanish camp about Rumià ±ahui, greatest of the Inca generals. None of the Spaniards knew exactly where Rumià ±ahui was and they greatly feared the massive army he led. According to the rumors, Rumià ±ahui had decided to free the Inca and was moving into position to attack. Pizarro sent out riders in every direction. These men found no sign of a large army, but still the rumors persisted. Panicked, the Spanish decided that Atahualpa had become a liability. They hastily tried him for treason – for allegedly telling Rumià ±ahui to rebel – and found him guilty. Atahualpa, last free Emperor of the Inca, was executed by garrote on July 26, 1533. The Inca’s Treasure Atahualpa had kept his promise and filled the room with gold and silver. The treasure brought to Cajamarca was staggering. Priceless works of art in gold, silver and ceramic were brought, along with tons of precious metals in jewelry and temple decorations. Greedy Spaniards smashed priceless objects to pieces so that the room would fill up more slowly. All of this treasure was melted down, forged into 22 karat gold and counted. Atahualpa’s ransom added up to over 13,000 pounds of gold and twice that much silver. After the â€Å"royal fifth† was taken out (the King of Spain imposed a 20% tax on conquest loot), this treasure was divided up among the original 160 men according to a complicated arrangement involving footmen, horsemen and officers. The lowliest of the soldiers received 45 pounds of gold and 90 pounds of silver: at today’s rate the gold alone is worth over a half million dollars. Francisco Pizarro received roughly 14 times the amount of a common soldie r, plus substantial â€Å"gifts† such as Atahualpa’s throne, which was made of 15 karat gold and weighed 183 pounds. The Lost Gold of Atahualpa Legend has it that the Spanish conquistadors did not get their greedy hands on all of Atahualpa’s ransom. Some people believe, based on somewhat sketchy historical documents, that a group of natives was on its way to Cajamarca with a load of Inca gold and silver for Atahualpa’s ransom when they received word that the Emperor had been murdered. The Inca general in charge of transporting the treasure decided to hide it and left it in an unmarked cave in the mountains. Supposedly it was found 50 years later by a Spaniard named Valverde, but then was lost again until an adventurer named Barth Blake found it in 1886: he later died suspiciously. No one has seen it since. Is there a lost Inca treasure in the Andes, the final installment of Atahualpa’s Ransom? Source    Hemming, John. The Conquest of the Inca London: Pan Books, 2004 (original 1970).

Saturday, October 19, 2019

Prince Hall Essay Example | Topics and Well Written Essays - 250 words

Prince Hall - Essay Example (Alexander & Rucker 243). Yet, in 1791, through the help of the British order, Hall became North America’s provincial grand master. Through his acquired power, Hall started to approve African American lodges in other cities in the U.S., like Providence, Philadelphia, and New York (Alexander & Rucker 243). The Prince Hall Masonic organizations tried to enhance community, interpersonal, and personal abilities, and to uphold charity, open-mindedness, and promote the wellbeing of all. Immediately after gaining his freedom, Hall had become a militant and visionary almost soon after as he, together with others, lobbied the Massachusetts Colonial Legislature, encouraging them to abolish slavery in the state. Hall passed away in 1807 and by that time African Masonic groups were spread all over cities in the Midwest and the Northeast, and numerous strong organizations were formed in the Upper South (Alexander & Rucker 243-4). Numerous black lodges were informally called Prince Hall organizations throughout Hall’s

Friday, October 18, 2019

Ipad sales Research Paper Example | Topics and Well Written Essays - 1000 words

Ipad sales - Research Paper Example As of today, iPad is still leading the computer tablet market despite the competitor’s effort to unseat iPad. Apple and iPad in particular success can be attributed to a lot of things. Apple in general made itself distinct by making its hardware and software work in synergy that enabled its products and services unequalled by its competitors. The best example that we can show for this is the synergy that its operating system iOS5 that provide synergy among the different product lines of Apple. It powers the iPad, iPod and iPod touch which allows the three products to interact and complement each other. Its new computer operating system Lion also has an Air-drop feature that made sharing of information between Mac computers very convenient. Air-drops peer to peer wi-fi based network made file sharing so easy where it was such a pain before that it can induce consumers to upgrade to Mac to make file sharing easy with other Mac users. And iPad miniaturized all that features in a tablet which the reader can interact through its touch screen and the interest it stirred among its consumer created the computer tablet industry which proved to be profitable. The computer tablet industry in the US continues to grow. By 2015, it is estimated that tablet users will grow from the present users of 26 million to 82.1 million market. To date, it is currently dominated by Apple Inc.’s Ipad 2 cornering around 75 percent of the total market share in September of 2011 leaving leaving only a 25 percent market share for its rivals (Huff Post, 2011). This is currently challenged by Amazon’s Kindle Fire whose recent performance in the market is predicted to dethrone Ipad’s leading position in the market. Ipad however is quick to retaliate by launching its smaller version of iPad called iPad mini which is designed to compete with its close competitors Nexus and Kindle Fire (Arthur, 2012). The newest  iPad's  boast of faster A6X processor that adds extra system speed and graphics power to the tablet which is still unsurpassed by its competitors (Cnet, 2012). Being the pioneer in retina display, iPad also features clear, deep and crisp display which raised the bar in computer screens. Also, the synergy between iPad and Apple’sother product line is not only about the complementary nature of its devices but also its guarantee that Apple devices â€Å"just work†. Unlike its competitors such as Google’s Android which is open to be used by many devices, Apple implemented a strict hardware and software control that guarantees synergy between the device and the software which provided iPad a distinct advantage over its competitors. As a result, Apple’s product lines does not have the vulnerability of Android where it suffers from hardware foibles because the hardware and software does not synergize. Apple may be a little pricey with a retail price of $499 compared to its competitors Nexus which is priced at $199 and Amazon’s Kindle Fire at $299 yet this disparity in price did not became prohibitive for its customers in acquiring the gadget. And most consumers consider now the pricing of Apple products including iPad to be very competitive considering its quality and previous price. This relative competitive price of iPad was made possible by the briliant management of Apple’s supply chain by capitalizing its organizational capability of having huge cash reserves to leverage iPad. It made its supply

The current national security structure of the united states Essay

The current national security structure of the united states - Essay Example nsists of both statutory members who are President, the Vice President, the Secretary of State, and the Secretary of Defense and statutory advisers who are the Chairman of the Joint Chiefs of Staff (CJCS) and the Director of Central Intelligence. National security and defense authority rests with the President and the Secretary of Defense as his principal assistant who is responsible for the military departments and their efficient operation. The National Command Authorities (NCA) represented by the President and Secretary of Defense direct the execution of military action and movement of troops. The Departments of Defense is responsible for maintaining Armed Forces to ensure effective military action, the security of the United States as well as advance of the national policies and interest of the United States. DOD is composed of Secretary of Defense, Joint Chiefs of Staff DOD Staff, 16 Defense Agencies, DOD field activities, military departments and combatant commands. The national security in 21th century was shaken by September, 11 terrorist attacks which questioned the security of U.S borders and its citizens. World known date altered the vision of national security and since then many changes were set in motion to protect border security and still welcome guests in the U.S. The most difficult thing about these changes was keeping the balance between stronger security and facilitating travel and commerce development. (Rice & Chertoff, 2005) As the border protection must be balanced against the demand for the free flow of commerce, Congress tasked the Department of Homeland Security not only with protecting the borders, but also â€Å"ensuring the speedy, orderly, and efficient flow of lawful traffic and commerce.† (Homeland Security Act) Creation of the Department of Homeland Security along with other important bodies like the Office of the Director of National Intelligence, the Homeland Security Council, the National Counterterrorism Center, and U.S.

Conceptualizing A Unique Food Source Essay Example | Topics and Well Written Essays - 1250 words

Conceptualizing A Unique Food Source - Essay Example are traveling. Where there is no food to satisfy the hunger of the people. The food supplied may not provide the nutrition they need in that situation. The fallowing paper will focus on conceptualizing a unique food source which has been consumed by the farmers of India, who stay active in the extreme hot climate and preserve in their work for long hours. This report may lead to conceptualizing a food product for the above-specified objective which can be economical, easily cooked and can be preserved for long hours and provide wholesome food with good nutritional value. The target audiences are the governments, non governmental organizations that render services during large emergences , FMCG food divisions which manufacture and market the food products. The product can be manufactured with minimum investment and can initiate as a small scale industry in rural areas. Farmers and small investors can start production as millets are available in rural areas of India on an average an small scale industry can produce 50kgs of millet gruel with packing. The only technical equipments in need is packing machine, vessels and gas stove to cook the gruel.... INDIA and CHINA, Who works according to the day time hours of the US and the UKwho require energizing diet after their hectic work schedule .this paper is written to inform the food products industry about a segment which has been untapped till and it can open up new business opportunity where the major players can look for. To educate the people about the cost effectiveness of the millet gruel compared to expensive health drinks like bornavita and horlicks and create awareness of nutritive value of millets and its their significance. The possible deliverables will be a branded food product which will be exclusive for the travel segment and for the food requirements during emergencies Millet gruel can be a product for every section of the society. In countries like India where agriculture is the main stay and most of the population is living below the poverty line need a food that is affordable, nutritious and wholesome.Traveling is a hectic activity as it involves travelers to use their energy without moving much for their seat. This can have an adverse affect on the human spine. Most of traveling involves making the traveler sit for long hours pressurizing his body. Individuals have to adjust to different alien food cultures to satisfy his hunger. Hunger drives the traveler to consume the food available at various places during travel although it doesn't satisfy his tastes as well as nutritional needs. Moreover the energy requirements of daily metabolic activities might not be satisfied to a great extent. The various service providers in tourism sector should at least be in a position to answer certain obvious questions at this point of time

Thursday, October 17, 2019

Ethical Criteria and its relationship with business negotiation Essay

Ethical Criteria and its relationship with business negotiation - Essay Example The main ethical criteria in businesses are utilitarian, universalism, categorical imperative, justice views, individualism, and social justice relativism and their relation to business negations. One of the ethical criteria is the Utilitarian criterion in which a business executive makes decisions solely based on the outcomes and consequences. Many businesses use the criterion to make decisions in the provision of the greatest good and for the greatest number. The criterion ensures that the decisions made create efficiency for the organization as it struggles to achieve its goals (Ferrell & Gresham, 1985). The method also aims at increasing the productivity of the business resulting in high profits of the company or the business enterprise. When a business executive maximizes profits, he can support his action that the decision he made as for the good of the organization. The use of Unitarianism leads to productivity and efficiency in an organization but can make the executive ignore the rights of some stakeholders especially the minority group making them feel unaccepted. The users of the criterion feel that they need to protect the organizations interest and the shareholde rs. Businesses require the stakeholders to hold negotiations especially when making important decisions. The criterion does not allow free negotiations and discussions by the company’s stakeholders as a single individual makes the decision for the benefit of the company. The choice of the action to be taken is determined by the largest number of stakeholders supporting it. The categorical Imperative involves the universal practice such that everyone is allowed to practice the proposed action. Kant developed the criterion and individuals wishing to use the criterion or the test should know that they would need to adopt the morality of the action. The morality of the action is the key to the adoption of the test, and

Wednesday, October 16, 2019

Political science (you can find the topic from sources) Essay

Political science (you can find the topic from sources) - Essay Example Anti-Federalists were alarmed that the Constitution would demolish civil liberties and genuine democracy if the states yield significant power to the new national government. They asserted that representation should be fair in all terms of directness and intimacy, with the government representing as many interests as possible. Politicians must then be substantively like the people they represent. They may not necessarily be the political elite, but instead, ordinary people who were educated enough to participate in political affairs. Anti-Federalists based this assertion the logic that those who were more responsible were less self-interested and those who knew their accountability were less prone to corruption. The people were more responsible than the political elite because they were more in touch of the realities of their local communities. They were less prone to corruption because they would be less vulnerable to damaging their representation to the local populace where they ca me from. The Anti-Federalists, furthermore, intended to have an outcome where there were small constituencies with many representatives, where the axis of power is on the states or local bases, not the national base of collectivity or community of interest. They wanted strong powerful states, not a powerful national government. These powerful states could make decisions regarding their political, social, and economic affairs without intrusion or intervention from the national government. With these goals, outcomes, and processes, Anti-Federalists were leaning more toward descriptive and participative forms of representation. The Federalists believed, on the contrary, the representation is a nationally-determined public good. They did not reject the states’ rights to representation, though they focused on a political arena of substantive representation. The states could represent themselves in Congress and to some extent, in Senate, but they should not be concentrated on their state

Ethical Criteria and its relationship with business negotiation Essay

Ethical Criteria and its relationship with business negotiation - Essay Example The main ethical criteria in businesses are utilitarian, universalism, categorical imperative, justice views, individualism, and social justice relativism and their relation to business negations. One of the ethical criteria is the Utilitarian criterion in which a business executive makes decisions solely based on the outcomes and consequences. Many businesses use the criterion to make decisions in the provision of the greatest good and for the greatest number. The criterion ensures that the decisions made create efficiency for the organization as it struggles to achieve its goals (Ferrell & Gresham, 1985). The method also aims at increasing the productivity of the business resulting in high profits of the company or the business enterprise. When a business executive maximizes profits, he can support his action that the decision he made as for the good of the organization. The use of Unitarianism leads to productivity and efficiency in an organization but can make the executive ignore the rights of some stakeholders especially the minority group making them feel unaccepted. The users of the criterion feel that they need to protect the organizations interest and the shareholde rs. Businesses require the stakeholders to hold negotiations especially when making important decisions. The criterion does not allow free negotiations and discussions by the company’s stakeholders as a single individual makes the decision for the benefit of the company. The choice of the action to be taken is determined by the largest number of stakeholders supporting it. The categorical Imperative involves the universal practice such that everyone is allowed to practice the proposed action. Kant developed the criterion and individuals wishing to use the criterion or the test should know that they would need to adopt the morality of the action. The morality of the action is the key to the adoption of the test, and

Tuesday, October 15, 2019

The Tsars or Lenin between 1855-1956 Essay Example for Free

The Tsars or Lenin between 1855-1956 Essay Stalin was more successful in modernising Russias economy than either the Tsars or Lenin between 1855-1956. How far is this a valid assessment? Over the time period 1855-1956, Russia underwent hugely dramatic changes, in such a relatively short amount of time the country and its people was ruled by different groups and people, with different ideologies and stances and the economy, and more specifically industrialization. Although on the face of things, it is obviously apparent that Stalin was the most successful at achieving a modernised economy , the context of the situation he inherited and manipulated was unique, and this modernisation came at great cost. Stalin and Lenin both built on the structure that the Tsars created, although it was not nearly enough to stabilize Russias economy, it was a start. Before explaining what impact each of these individuals had on the economy, it is important to understand the background of Russias economy, both agricultural and industrial. One of the most startling features of Russia at this point, was its size, and ironically how this size and potential was not being properly utilized. Communications across this huge area were extremely poor; roads outside the big cities were poor at best. The vast majority of Russia population at this point, were the serfs (making up around 70-75% of Russias total population). Serfs were virtually owned by their masters, they did what they were told and had little or no free will, the vast amount of surfs working in agriculture. It would be assumed that because there was so much emphasis on agriculture and so many numbers behind it that agricultural input would have been high, but in fact, the opposite was true. The state of agriculture in Russia in 1855 was abysmal; the method of farming was backward so efficiency levels were extremely poor, the strip system and wooden ploughs were still used, and there was not enough land for each serf. Concerning industry, there was a low level of this also considering the size of Russia, because the majority of the working population lived rurally, urban factories and workers had only a limited amount of available work. In 1855, it is safe to say that Russias economy needed a kick start; it was starting to become left behind and was being outranked by the other world powers. Tsar Alexander II 1855-1881, inherited the aforementioned situation, and it seems as though he was determined to make some sort of change. In 1861 he passed the Emancipation of the serfs, meaning that the vast majority of serfs, were granted freedom, allotted land, or were allowed to find work in the cities. It is estimated by 1864 some 50 million serfs had been granted freedom. The reasons for this turnaround are varied, but most believe that Alexander II had finally realized that Russias economy and industrial progress called for a free labour force. Although the intentions may have been good, there were problems with this act, first of all, landowners had to be compensated through redemption payments by the freed serfs, but because of the small amount of allotted land the serfs received, they were not much better off than they previously were because they amassed so much debt. The idea behind this emancipation was to free up a new work force, and let the peasants farm their own crops, with the excess to be sold for export thus revitalizing the economy. Many of the freed peasants moved into urban areas and a labour force was created, but the root problem of subsistence farming still remained, and without strict guidelines from their masters, agricultural production declined. Other changes made by Alexander II were the huge increase in the railway network (increase of 2000% by 1881 of its 1855 levels) and the amount of factory workers increased by 150% respectively. Although these numbers seem positive, considering the vast population and potential Russia had, these increases could have been much higher and are only just a start. Under Alexander II the state bank and ministry of finances in 1860 was established, giving the capital a strong position. Alexander III (1881-1894) took on a slightly less sympathetic position than his father, after Alexander IIs assassination, his son believed that the only way forward for Russia was one through traditional autocratic ruling. One of his biggest shortcomings was the fact he emphasized hugely on industry and failed to utilize the potential of Russias agriculture. Although this was negative, some advancement in industry was seen, such as the huge amount of railway development, namely the near completion of the vastly important trans-Siberian railway, and the production of coal doubled between 1892 and 1902. The policies of Sergei Witte had effects from this reign into that of Nicholas II. Investment from abroad and state subsidies to heavy industry all played a part in stabilizing the economy. However, the neglect of agriculture contributed to the 1891 famine.

Monday, October 14, 2019

The Perimeter Network Security System Computer Science Essay

The Perimeter Network Security System Computer Science Essay As like in the real life, securing the borders are the first level of defense to protect the internal network of an organisation. The purpose of this report is to design a perimeter network security system that will provide security enhancement on the existing network infrastructure of Napier University. Network perimeter is an important line of defence in an enterprise network and every organisation has this perimeter network. Perimeter network is where the internal network meets the border network. The main security architecture using this potential area of the network is firewalling. Here this report discusses the egress and ingress filtering of packets by the firewall in order to let the bad traffic out of the perimeter and allow only the good traffic to trusted internal network. One of the core ideas behind the securing the network from outside threat is to develop and implement multiple overlapping layers of security solutions with different security components like Firewalls, VPN, IDS/P and Proxying. Though there are no single security solutions to protect the university network, multiple layers of perimeter security solution will provide maximum available protection from both outside and internal threats. (Watkins, 2011) The design considers hardening of network devices by striping down unnecessary protocols and services and manages the security perimeter from a management network for proper monitoring and mitigation. The main challenges to design and implement a perimeter security is to determine the proper firewall design, as Perimeter firewall and border routers are key components that decide the security to internal network. Most modern day attacks are happening in the Application layer and filtering in this top layer is extremely important for a successful security design. An enhanced packet inspection with proper monitoring and reporting is required throughout the end points of the network to block the malicious traffic from in and out of the network. There are number of ways and techniques involved in designing a perimeter security and this design proposes the specific solutions to the security threats in a campus wide network than in a highly complex enterprise network. 1 CSN11111 Perimeter Network Security System 10800584 RESEARCH AND DESIGN (25/ 1000 words) Security is not a product but a process. Network security depends on multiple components, policy and procedure to enforce the best practices on systems, people and infrastructure (Michael E. Whitman, 2009). The basic idea of information security is to protect the three fundamental components of information security that are Confidentiality, Integrity and Availability. Perimeter security design follows this principle to protect these components by using various security components. The design of the perimeter security depends on what resources need to be protected and the business need. SECURITY ARCHITECTURE The main design of the security architecture consists of segregating different zones in a network. These zones have different levels of security trust levels that allow or deny traffic. This layered architecture will provide the University to keep out of attackers (the term attacker is used in this report and not hacker, as an attacker is a hacker with a malicious intent and not all hackers are malicious intent). In the enterprise network, the network is divided generally into three zones and these are Border Network, Perimeter network and internal network. The perimeter security consists of border network and perimeter network as shown in the picture. Each of these considered as single entity against potential threats. In a network perimeter has many points where an effective security policy should be established. The network perimeter is the most important points of security against 2 CSN11111 Perimeter Network Security System 10800584 external threats. Many types of security can be implemented like packet filtering, intrusion detection systems/prevention and anomaly detection etc. Border Network Border network is the Internet facing zone via a border router (Edge router) that provides an initial layer of protection against all the starting point of attacks. It is most likely an IDP (Intrusion Detection and Prevention) System to be placed to create an extra layer of security. The border router will allow the traffic as per the Ingress and Egress filtering rules set on the router. Apart from protecting the outside threats these edge router and IDP also help to reduce the network load on the perimeter firewall by filtering spoofed traffic out of reaching to the perimeter firewall. Egress filtering helps to prevent specific types of traffic going out of the University that may be some confidential information or can an attacker plant traffic from a payload. A common rules used in the border router is to filter out the ICMP traffic to avoid the probing of network infrastructure. (Dailey, 2009) Perimeter Network Perimeter network sits in between the Border network and the trusted internal network often referred as DMZ. A Perimeter Firewall is the main component to filter the traffic to DMZ and passes the traffic to internal network. This firewall allows traffic from outside the network to servers like Web server or Email Server and also allows a limited access from the internal users. 3 CSN11111 Perimeter Network Security System 10800584 Perimeter firewall allows the filtered traffic to internal firewall where traffic is further scrutinised by the set of rules according the security policies of the organisation. These firewalls are commonly uses the stateful inspection technology where the states of legitimate traffics are stored in the firewall cache. Only traffic matching the states of the connection is allowed and others are dropped. REQUIREMENT ANALYSIS When designing a secure network there are number of factors are taken into considerations. Security is not just a technical issue but a business issue. The goal is to make sure a balanced approach towards the requirements in general. The general security requiement is to provide the services according to the CIA triad of the information security. Apart from these there are also factors like budget, existing infrastructure and scalability. Other factors also constitute the decision making of a proper design are reduce cost, employee productivity, avoid business down time, comply with industry standards etc. SECURITY THREATS This section discusses the better known attacks and the reason behind using perimeter security as first line of defense. Attacks can be devided into external attacks- coming from the internet and internal attacks- coming from the internal network. Information Gathering is the first method an attacker try to get the maximum informaiton about the network architecture. 4 CSN11111 Perimeter Network Security System 10800584 The external attacks are from the simple probing of the network to DoS( Denial of Service Attacks). An insider attack considers one of the major threats to any perimeter security design. These attacks may come from a mischievous user to a disgruntled employee who wanted to grab confidential information or to steal company secrets like financial data, personal information etc. A well configured internal firewall along along with the perimeter firewall can be the good level of defense against these attacks Other types of attacks inlcude intrusion packet sniffing, IP spoofing and DoS attacks that poses a direct threat to the organisation. Application layer security is one of the important design area to be take care of. Well known attacks like SQL injection are of these types. These exploits the known or unknown vulnerability on a web server or database server in order to gain the unauthorised access to the internal network. DESIGN The design of each of the security zones for the Napier University may be different but as whole these components acts together to provide a common goals by protecting the perimeter. It is important to understand where the perimeter of the network exists and what technologies are used against the threats. Perimeter security is handled by several different technologies including border router, firewalls, intrusion detection sytems and prevention systems, VPNs. Border Router The border router sits in the border or the edge of network where there is a direct interface to Internet. It acts like a traffic policeman, directs the traffic in or out of the network and also block the traffic which are not allowed to. The border router will do a NATing to provide this feature. This will give the outside network to probe the internal network. Although these routers are do not act like a firewall, it helps to protect the very first line of defense. Firewall 5 CSN11111 Perimeter Network Security System 10800584 A firewall is an active device that job is to permit or deny the data packets as per the rules set or the states of the connection. Perimeter firewall is the center point of defense against all the threat that coming to internal network. Firewall can be software based or hardware based hardned for the filtering of packets. The proposed perimeter security can be stand alone or multiple layers that combined with other security devices like IDS, IDP and VPN. A static filter firewall is the common and simplest firewalls. These firewal allow or block traffic based on the packet header. A perfect example is blocking of Spoofed IP traffic. The main advantage of this type is that I has a very fast throughput but the down side is this firewall block already established connection which may be malicious intent. On the other hand the stateful inspection firewall is the best way of defending the maliciuos attacks. Stateful inspection firewall keeps a copy of the state of each connection so that the traffic will be allowed or denied according the states in the state cache maintained in the firewall. The disadvantage of using this firewall is slow traffic coming out of the firewall as invidiual packets need to be verified and checked with the cache table. Another firewall which is effective against the application layer attacks are the Proxy firewalls. Since the most modern day attacks are pointed against the application protocols the stateful or stateful firewalls will not block the malicious traffic coming to/out of the network. A proxy firewall acts in the middle of the internet and private hosts and the proxy by acting on behalf of the host. The filtering rules are applied in the application layer. The ruleset or signature can be created according to the latest threats. Because of the huge number of traffic these firewalls considered the lowest throughput than any other firewall but top end in droping unwanted malicous application layer traffic. A web application filter and a spam filter are the example of a proxy firewall. DMZ A DeMilitarized Zone or DMZ is the separate zone from the perimeter firewall between the external network and trusted internal network. The public internet facing servers like Web servers, email servers are placed in this area because the DMZ is considered the the most sensitive area with high security stance. The firewall restrict the traffic in this zones in order to avoid the potential threats that may come into the internal 6 CSN11111 Perimeter Network Security System 10800584 network. The network inside this zone cannot initiate a session to the outside world unlcess it is a reply to an incoming connection. Intrusion Detection Systems (IDS)/ Prevention systems (IPS) An intrusion detection system or prevention system works in sync with the firewalls by providing a coming security goal of blocking unwanted traffic and notify any event that pop up in the network or host. IDS anlayse the packets for any suspicious activity and alerts the administrator. An IPS will prevent these activity by droping apart from the detection the same way IDS does. IDS and IPS have extensive rules set or singnatures of malicious activity which matches the incoming or outdoing traffic when in operation. One disadvantages with the IPS or IDS is that it may alert an legitimate traffic which considered false positive. A proper configuration of these devices is required in order to kept the false positive minimum as some times this will be a menace to handle too many logs with many thousands of false positives. A host based IDS also provide the security administrator with alerts against he malicious activity destined against a particular server like in Database server. VPN Virtual Private Nework (VPN) establish a secure remote connection to the private network by creating a secure virtual tunnel through the public untrusted network. VPN provides perimeter security by ecrypting the data in the tunnel and establish a secure connection over the internet. VPN considered to be the potential threat when an attacker comprise the tunnel as the traffic cannot be verified by the IDS or IPS because of the encrypted pakcets it uses for communication. An SSL VPN with an end-to-end VPN can be the best possible way to stay the attacker out of the network. A perimeter security design is incomplete without a proper firewall policy and an organisation wide security practices. For example if an administrator keep a weak password for these devices or any hosts in the network can nullify the entire effort put on designing a perimeter security. These security policy should also be applied to 7 CSN11111 Perimeter Network Security System 10800584 systems, and users as there needs to be a minimum level of secure access policy with proper Authentication, Autherisation and Authentication(AAA) methods. http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994.shtml Management Network Management and logging is the most important aspects of a perimeter security. This network has the high security stance as all the administrative access are controlled in the management network. An attacker can take direct access by accessing the management network. The traffic to management network to be encrypted to avoid any possible attack on the internal network. For example to access the IDS, ISP and or routers to be through a secure shell, or SSL, or a https access. Log monitoring is another important aspect of a perimeter security like keeping the IDS and IPS logs or firewall logs. Log files can help to identify the probable attack on the internal or malicious activity originating from the internal network. Another possible thing to do to harden all the security devices destined to do only services that (Convery, 2004). IMPLEMENTATION (20/ 800 words) Building a perimeter security system consists of bringing different security technologies explained in the previous topic; together for a common goal-to protect the internal network from external or internal threats. The router and firewall separate the public untrusted network from the internal network, the IDS/IPS monitors all traffic, and the VPN provides remote access. All of these components together form a defense in depth security in a perimeter. Figure xxx shows the outline prototype of the proposed design. 8 CSN11111 Perimeter Network Security System 10800584 authentication server-dmz One of the first best practices before the implementation is to develop a firewall policy. The policy mainly defines the security trust levels of each zone in the network and the flow of the data traffic. The flow of data traffic is one of core in implementing the organisation wide security technologies. Perimeter firewall is the centre point in this prototype. This firewall is a stateful inspection firewall and manages traffic from external and internal network. This firewall is a closed security stance by blocking all traffic except those required for the University network. 9 CSN11111 Perimeter Network Security System 10800584 The figure - above shows how the data flows through different layers of security first where the first line of defense is border router. This multiple layers of security filter the bad traffic in different layers in the network. The first level of defense is border router with a backup from the NIDS. This can be implemented by enabling basic packet filtering rules and Access Control Lists. Blocking the IP Spoofing and ICMP traffic are the examples. This outline NIDS will detect the any unknown behaviour in the traffic, which will be alerted to the administrator through management network. In some cases border router may not required as the perimeter firewall it self can handle the security threats but that depends on the business decision like cost and availability. Diagram for flow of trafficà ¢Ã¢â€š ¬Ã‚ ¦ As shown in the figure the data flow in the perimeter firewall. Perimeter firewalls allows or deny traffic as per the ingress and egress filter rules. Almost all the traffic coming to the internal network will be blocked by firewall and only allow as per the egress rules. The exception for this rule is for VPN clients and the VPN uses the encrypted tunnel and the VPN server is inbuilt in the Firewall itself. The Perimeter firewall also allows ingress traffic to DMZ zone but drop traffic originates from the webserver other than the reply to the already established connection. DMZ is the least trust level and this is why DMZ is isolated from other network zones. The internal network is allowed to access the Internet and Intranet through a proxy server in the DMZ zone. A web filtering software in the Proxy server can be implemented to filter out the unintended malicious URLs and links. The DMZ also has an inline NIPS in order to defend attacks against the application level threats like DoS attacks. The in line IPS behind the Perimeter firewall act like a sub-cop to check the malicious activity originating both from external and 10 CSN11111 Perimeter Network Security System 10800584 internal network. Internal threat may come from a disgruntled employee or a malicious traffic from a Trojan program or a zombie for a possible DDoS (Distributed Denial of Service) attack by a hacker (black hat off course!) harvested by using techniques like social engineering. The table explains the detailed egress and ingress rules on the Perimeter firewall. TRAFFIC TYPES INGRESS EGRESS ALLOW HTTP/S Request, DMZ Allow ICMP DMZ Deny Email (SMTP) Request DMZ Allow Email (Exchange RPC) DMZ Allow All Other Traffic DMZ Deny HTTP Reply DMZ Allow SMTP Reply DMZ Allow Exchange RPC Reply DMZ Allow All Other Traffic DMZ Deny ICMP (depends on policy) Internal Network Deny Remote VPN Connection Internal Network Allow All Other (Including from DMZ) Internal Network Deny Proxy Server (Port 8080)- Internet Internal Network Allow Email Server Access (DMZ) Internal Network Allow ICMP Internal Network Deny All Other Traffic Internal Network Deny Management network in the proposed diagram is one of the top security trust level where the management of all the security devices can be done. Log analysis, Secure tunnel access to routers, firewalls, IDS/P are all done in this network. The trusted servers in the internal network are protected with an internal packet filter firewall with only few of the protocols and ports are allowed. This will give the server farms with highest level of security. The staff and student networks are segregated with VLAN, as staffs should have access to student network but not vice versa. VLAN separate the traffic like a router and this will be important when considered in a University network. 11 CSN11111 Perimeter Network Security System 10800584 Both staffs and Students can have access to trusted servers through the internal firewalls. The NIDS is also monitor any suspicious event and alerted. The other Host based IDS and personal firewall in each of the workstations provides an extra layer of security. So the proposed design with a defense-in-depth can be implemented to enhance the existing infrastructure of the Napier. TESTING AND EVALUATION (25/ 1000 words) 12 CSN11111 Perimeter Network Security System 10800584 CONCLUSION (15/ 600 words) Unifiied threat management Appliance emerging cobbà ¢Ã¢â€š ¬Ã‚ ¦. One persons good enough is another persons never! Bandwidth for authentication is trivial in any case I can think of that doesnt include downloading extremely large biological mappings of the authentication target. As far as security measurements, I dont know what yard stick youre using, but strong on-host, per-host authentication works well when you have a trusted path, everything else is a usability or management compromise, I dont think Id tout them as security features. Placement of authentication server Placement of internal firewall. http://www.sans.org/reading_room/whitepapers/firewalls/achieving-defense-in-depth-internal-firewalls_797 he single, authenticated/anonymous, and individualized DMZ designs are all secure designs that provide the best protection for various network sizes. The single DMZ is respected for its simple design which separates itself from a private network. The authenticated/anonymous DMZ classifies servers and the data they protect in order to segregate servers that need strong access controls from the ones that do not. The 13 CSN11111 Perimeter Network Security System 10800584 individualized DMZ gives the greatest security for a mature network, but also has the highest setup and maintenance costs. All of these secure DMZ designs are susceptible to a poorly configured server which can allow a criminal access to a data store or worse, the entire private network. In a nutshell, theres no such thing as absolute security. How much you invest in firewalls should be a function of how much you have to lose if an attack is successful. (reword) You probably heard a number of so called security experts claim the perimeter is dead because it is not effective at blocking attacks. Nothing cluld be further from the trust. Its true that attacks have become far more complex. The concern is no longer simple port scans. What we need to do however is enhance our posture, not scrap useful technologies. To be fair however, its not just the perimeter that is having the problems with modern attacks vectors. Tools like metasploit have reduced the time of exploit development from days to minutes. Networks are being spear targested with Malware which goes undetected by their Antivirus software, in some cases for as long as two years. Attackers have figured out that they do need to completely defeat forensics, they just need to make it difficult enough that it is no longer cost effective in a CFOs eyes to fully analyse the comprosmised system. So the true problem is attack technology is advancing and we need to keep up. Sometimes this is finding new security technologies and sometimes its by retasking the ones we are already using. To draw a parallel, think of what has happened with the common automobile. 40+ years ago a tuner could tweak more power out of an engine with a simple toolkit from sears. Many of those old times tuners will tell you that engines are now too complex t work on. T o the modern tuner however who is willing to add things like OBD-II adapters and laptops to their toolki, the payoffs are huge. Power levels that used to equire huge V8 engines can be produced in tiny four cylinders with as much displacement as half gallono fmilk. 14 CSN11111 Perimeter Network Security System 10800584 https://ondemand.sans.org/b20080814/viewer.php?mode=2lo=7652moduleid=530 7pos=0hint=1#viewer Properly configured firewalls and border routers are the cornerstone for perimeter security The Internet and mobility increase security risks VPNs have exposed a destructive, pernicious entry point for viruses and worms in many organizations Traditional packet-filtering firewalls only block network ports and computer addresses Most modern attacks occur at the application layer 15 CSN11111 Perimeter Network Security System 10800584

Sunday, October 13, 2019

The Allegory in Hawthornes Young Goodman Brown Essay -- Young Goodman

The Allegory in â€Å"Young Goodman Brown†      Ã‚  Ã‚   It is the purpose of this essay to show that Nathaniel Hawthorne’s â€Å"Young Goodman Brown† is indeed an allegory. M. H. Abrams defines an allegory as a â€Å"narrative, whether in prose or verse, in which the agents and actions, and sometimes the setting as well, are contrived by the author to make coherent sense on the ‘literal,’ or primary, level of signification, and at the same time to signify a second, correlated order of signification† (5).    Yvor Winters in â€Å"Maule’s Curse, or Hawthorne and the Problem of Allegory† says that Hawthorne is essentially an allegorist (11). Stanley T. Williams in â€Å"Hawthorne’s Puritan Mind† states that the author was always â€Å"perfecting his delicate craft of the symbol, of allegory† (42). A. N. Kaul states : â€Å"In an effort to apprehend and adequately reflect the new complexity of man’s life, he [Hawthorne] molded the venerable – in his case directly inherited – allegorical method into the modern technique of symbolism† (3). It is quite obvious from the names of the characters in the short story that their names are contrived to give a secondary signification. Goodman is on the primary level a simple husband who is following his curiosity about evil; on the level of secondary signification he is Everyman or the new Adam: R. W. B. Lewis in â€Å"The Return into Rime: Hawthorne† states: Finally, it was Hawthorne who saw in American experience the re-creation of the story of Adam and who . . . exploited the active metaphor of the American as Adam – before and during and after the Fall† (72). Goodman responds in this way to the fellow-traveller when the latter implicates the governor in devilish deeds:    "Can this be so!" cried Goodman Brown, with... ...t/nh/nhhj1.html    Kaul, A.N. â€Å"Introduction.† In Hawthorne – A Collection of Critical Essays, edited by A.N. Kaul. Englewood Cliffs, NJ: Prentice-Hall, Inc., 1966.    Leavis, Q.D. â€Å"Hawthorne as Poet.† In Hawthorne – A Collection of Critical Essays, edited by A.N. Kaul. Englewood Cliffs, NJ: Prentice-Hall, Inc., 1966.    Lewis, R. W. B. â€Å"The Return into Time: Hawthorne.† In Hawthorne – A Collection of Critical Essays, edited by A.N. Kaul. Englewood Cliffs, NJ: Prentice-Hall, Inc., 1966.    Williams, Stanley T. â€Å"Hawthorne’s Puritan Mind.† In Readings on Nathaniel Hawthorne, edited by Clarice Swisher. San Diego, CA: Greenhaven Press, 1996.    Winters, Yvor. â€Å"Maule’s Curse, or Hawthorne and the Problem of Allegory.† In Hawthorne – A Collection of Critical Essays, edited by A.N. Kaul. Englewood Cliffs, NJ: Prentice-Hall, Inc., 1966. Â