Wednesday, July 31, 2019

Historical linguistics Essay

Linguistics is the scientific study of human language.[1][2][3][4][5] Linguistics can be broadly broken into three categories or subfields of study: language form, language meaning, and language in context. The earliest known activities in descriptive linguistics have been attributed toPÄ Ã¡ ¹â€¡ini around 500 BCE, with his analysis of Sanskrit in Ashtadhyayi.[6] One subfield of linguistics is the study of language structure, or grammar. This focuses on the system of rules followed by the users of a language. It includes the study of morphology (the formation and composition of words), syntax (the formation and composition of phrases and sentences from these words), and phonology (sound systems). Phonetics is a related branch of linguistics concerned with the actual properties of speech sounds and nonspeech sounds, and how they are produced and perceived. The study of language meaning is concerned with how languages employ logical structures and real-world references to convey, process, and assign meaning, as well as to manage and resolve ambiguity. This category includes the study of semantics (how meaning is inferred from words and concepts) and pragmatics (how meaning is inferred from context). Linguistics also looks at the broader context in which language is influenced by social, cultural, historical and political factors. This includes the study of evolutionary linguistics, which investigates into questions related to the origins and growth of languages; historical linguistics, which explores language change; sociolinguistics, which looks at the relation between linguistic variation and social structures;psycholinguistics, which explores the representation and function of language in the mind; neurolinguistics, which looks at language processing in the brain; language acquisition, on how children or adults acquire language; and discourse analysis, which involves the structure of texts and conversations. Although linguistics is the scientific study of language, a number of other intellectual disciplines are relevant to language and intersect with it.Semiotics, for example, is the general study of signs and symbols both within language and without. Literary theorists study the use of language in literature. Linguistics additionally draws on and informs work from such diverse fields as acoustics, anthropology, biology,computer science, human anatomy, informatics, neuroscience, philosophy, psychology, sociology, and speech-language pathology. Prev Page

Tuesday, July 30, 2019

Different sides of Clive Linley

Which in this case makes him cold hearted and selfish human being who clearly does not have his priorities straight. This came as a big surprise to me after I had read how good of a friend he was. The book is mostly about two men who have been brought together again after their close friend dies.The way how Clive treats his friend differences a lot from how he reacted in the situation mentioned before. In fact he is there for his friend in every situation no matter how difficult it might be. â€Å"When Vernon was laid up with a rare viral infection of the spine, Clive visited almost every day, bringing books, music, videos and champagne†(Mclean 1998:43). This is one of many examples what Clive had done for his friend, without asking anything in return. It shows that he still cares and knows how to treat people but maybe Just close ones. On the other hand, he was still palpable of arranging his best friend's death and the other way around.The thing is, this part of the book cam e as a shock. He arranged the death of his best friend. That alone says something about him. He could be a self-centered and egotistic man. After having disagreed on a subject with Vernon and Vernon not taking his advice maybe he Just could not have let it go. Or he thought he was being a good friend and ending one's life because that was what he thought the one had wanted. In that case it would make him in some eyes loyal and committed. Clive had asked his friend to end his life if he would start to lose It.Yes, on one condition only: that you'd do the same for me. V. â€Å"(Mclean 1998:57) Maybe In Clime's eyes he was already losing It and he did what had to be done. In the end I think the book Is purposely ended with a mystery. It leaves a lot of questions about the characters as well. As to Clive Lintel- he Is a genius who does not let anything get In the way of his Inspirations, a person who knows how to treat his loved ones and a man who Is capable of doing terrible things ei ther out of fury or to keep his word. Mclean, Ian. (1998). Amsterdam. Great Britain. Jonathan Cape

Monday, July 29, 2019

Wireless Technology Assignment Example | Topics and Well Written Essays - 1250 words

Wireless Technology - Assignment Example This paper discusses the difference between 3G and 4G technologies. The basic aim of this research is to present the comprehensive overview of the Wireless Wimax technology implementation in the field of wireless communications. It is an admitted fact that Smartphones and mobile phones currently operate via the 3G network for communication as well as date sharing. In view of the fact that 4G has been effectively developed but 3G is still used by a large number of companies, hence it is still successful in retaining its reputation. On the other hand, 4G has turned out to be the standard mechanism for wireless communication. Additionally, it also holds a large customer base from all over the world. Without a doubt, 3G technologies are a quickest way for wireless communication; on the other hand 4G is believed to be 3-4 times faster than it. Certainly, similar to any other technology, both these networks have also some pros and cons, which are discussed by a number of authors such as (V iswanathan, 2013; Smith, 2010; Balasubramanian, Mahajan, & Venkataramani, 2010). Some of the major pros and cons of these technologies are outlined below: Pros of 3G Technology One of the basic advantages of 3G technologies is that they are very useful in quickly transferring data. In fact, data can be transferred at the rate of 2 Mega bytes per second. These technologies are increasingly used by the developers and programmers to develop positioning services and maps, which are on a regular basis used by the general public. 3G technologies also provide a wide variety of dominant multimedia services, which are used to build apps for instance video conferencing, chatting, online billing systems and many more. A large number of companies use 3G networks as a default platform for mobile phone games, in particular those games which include heavy animation and graphics. 3G technologies support various advanced features which can be used by the developers and programmers to create apps for instant messaging, mobile TV and video and audio chatting and much more. Cons of 3G Technology One of the biggest drawbacks of 3G technologies is the cost associated with their use as subscribing to 3G networks is expensive. As discussed above, 3G users are provided with the services such as video conferencing sessions and games with other 3G customers; however the people using these services cannot perform any other things except these functionalities. Consequently, the sales of apps developers can be lower. Without a doubt, 3G technologies are widely available throughout the world; however there are still many areas where these networks are not available so people in these areas can choose other ways of communication. Pros of 4G network 4G technologies are advanced version of 3G technologies so they can perform all the tasks which can be performed through 3G technologies with the difference that 4G technologies offer much higher speed than WiFi or 3G networks. As compared to 3G t echnologies and WiFi, the 4G’s range is much wider so it can support comparatively stable communication. One of the most distinguished features of 4G technologies is that these networks offer more security than other networks such as WiFi or 3G networks. Hence, the majority of people particularly the business professionals are more likely to use 4G, for the reason that they increase security, privacy and safety of data. These networks allow people to select any suitable option from a wide variety of payment options. Hence, if someone wants to rent 4G equipment, they can select from a number of pay-as-you-go plans. 4G technologies effectively deal with the cost factor.

Sunday, July 28, 2019

DQ1cc, DQ2ab, DQ3CC Essay Example | Topics and Well Written Essays - 250 words

DQ1cc, DQ2ab, DQ3CC - Essay Example A probability can be defined as a numerical measure of the likelihood that a specific event will occur or not (Mann, 1995). Some of the different approaches to probability include classical probability, relative frequency concept of probability, and subjective probability. The use of probability is widely applied in the business world due to the fact that probability is a statistical method of a numerical chance of the occurrence of an event. For instance a company can use probability to determine whether to invest in a derivative instrument based on the changes of a commodity going up. For the application of probability to be valid the data inserted into the model must be up to date and accurate. For instance if a governmental agency attempts to predict the future behavior of the unemployment rate it would not be wise to use data from the 1950’s to insert into the probability model. The correct approach would be to use current unemployment data. â€Å"From principles is deri ved probability, but truth or certainty is obtained only from facts† (Stoppard, 2012). Probability can be used by individuals and managers in different scenarios. A place where probability is constantly used by players is in casinos. Casino games have different probabilities of winning. For instance the casino game that has the higher probability for the player is blackjack which offers a probability of 51% for the house and 49% for the player. Managers should use probability in their decision making process. A manager should not accept any decisions that have a probability of less than 50% of occurrence. Companies can establish decision making policies based on a minimum probability threshold. If I was choosing between two options one which had high probability and one with a low probability I would choose the option with the high probability due to the fact that chances of that option occurring are higher. The option with

Saturday, July 27, 2019

IS Project Implementation Plan Research Paper Example | Topics and Well Written Essays - 1500 words

IS Project Implementation Plan - Research Paper Example In citing an example of virtual organization, the case of an engineering company, John Brown Engineers and Construction concern comes into question. The company fulfills the globalization attribute of a virtual organization in operating through a network of 30 countries having a total employee base of around 21,000 people. Moreover, the company operates based on its own privately designed information systems linking the different offices of the concern. Through such developed and interlinked information technology network the employees of the company can effectively retrieve, share and implement information gained from large databases stored in the system. Thus, the people with information technology can effectively use the large pool of technological and other knowledge resources that would be required for the proper functioning of the organization. Moreover, the management of the company through the existence of information technology sources has also taken resort of developing a v ideo conferencing facility through which the directors and managers sitting at head office can learn the activities pursued in different units round the globe. Again, such use of technology also helps the management to get effective feedback from the employees in regards to operation and customers and thereby can design strategies differently to enhance business competitiveness (Igbaria and Tan, 1998, p.48). The business managers at John Brown Engineers and Construction concern worked to enhance and implement specific business strategies focused on globalization in the light of the information technology resources and opportunities gained. The Chief Executive Officer of the company identified the need for strategic alliances both within the internal and external policy framework to gain a competitive business position in the climate of globalization. Thus to gain the opportunity of strategic alliances the

Friday, July 26, 2019

Ip4 managing high performance Research Paper Example | Topics and Well Written Essays - 250 words

Ip4 managing high performance - Research Paper Example For instance, the human resource manager would solely focus on day-to-day welfare of employees. In spite of the fact that this strategy will compromise on the morale of employees, there are many ways of tackling this challenge. In the new arrangement, the human resource manager should solely focus on the welfare of employees by linking with department representatives (Burton & Obel, 2004). The choice of managers should follow a meritocratic process that prioritizes on current managers with longer experiences. In addition, the selection process should focus on managers who have come up with milestone ideas in the past. The organization should minimize conflicts by creating a structure whereby the lower-level managers can constantly interact with the upper-level managers. The managers should assure the employees that the levels of management separate on the basis of different responsibilities rather on the basis on prestige (Lumpe, 2008). In the end, this strategy will cover up for the costs of having a new administrative structure. This is because managers will possess distinct duties that they focus on the

The death penalty is not a deterrent Research Paper

The death penalty is not a deterrent - Research Paper Example These criminologists confirmed the previous finding that there is no deterrent effect for capital punishment. Perceptions and attitudes of peoples towards the death penalty can change with increased knowledge. If there’s enough information campaign by people in government and those concerned, favourable opinion can be gained for the abolition of capital punishment. The European Union adopted its Charter of Fundamental Rights which states that everyone has the right to life and no one shall be condemned to the death penalty, or executed. This should be binding on all peoples and all states, big and small. But for the victim’s side, there is demand for justice or retribution. When someone in the family is a victim of a crime, such as when a daughter has been raped and murdered, the family demands justice. Rae states that there is an ‘imbalance created in the social order’. There is a demand for justice created by the imbalance and thus a demand for a restorat ion of the balance in society. While society must exercise power and all individuals must submit to that power, society must give everyone a chance. Killing does not solve social ills and it is uncivilized. 1.1 Definition Death penalty is a punishment instituted by society where a convicted criminal is punished and put to death; the crime committed is a capital offense. It is different from unauthorized form of killing, or killing committed for revenge or lynching. (Garland 70) Capital punishment or death penalty can be considered the strictest punishment for a grievous offense. The term grievous or capital offense varies in definition and commission in different countries. Capital crimes include treason, murder, manslaughter, rape, and in some countries, they include arson, counterfeiting, and theft. (Banner 5) 1.2 History of the death penalty Capital punishment is an integral part of American history. The first execution occurred in Jamestown in 1608, when Captain George Kendall w as sentenced to death for spying for Spain. By the middle of the seventeenth century, around fifty people were executed. After a century, executions were done by the thousands. By the end of 1945, more than 17,000 people had been executed. (Allen and Clubb 9) Most ancient countries enforced capital punishment for serious offenses, but sometimes other offenses like blasphemy, adultery, or magic practice and witchcraft, were considered capital offense. English common law listed eight capital crimes, such as treason, petty treason, murder, larceny, robbery, burglary, rape, and arson. (Mandery 21) By the beginning of the eighteenth century, majority of the executed were African Americans or of African descent, with whites appearing to be a minority of those executed. 1.3 Ancient Laws Early laws on the death penalty can be found in the Ancient Laws of China. The Code of King Hammurabi of Babylon enforced the death penalty for 25 different crimes. But murder was excluded from these crimes . The Code followed the principle of â€Å"an eye for an eye, a tooth for a tooth,† and set measures to compensate for injuries to slaves, domesticated animals, and property. Thieves who did not have the ability to pay restitution were put to death. The first historically recorded death sentence was done in Egypt in the sixteenth century BC, and the offender, who was convicted of committing magic, was sentenced to take his own life.

Thursday, July 25, 2019

Is Total Quality Management Enough For Competitive Advantage Essay

Is Total Quality Management Enough For Competitive Advantage - Essay Example ers are becoming more and more aware, empowered, enlightened, and exposed to more products than anytime on the history of this planet (Tenner, & DeToro, pp. 123-159, 1992). They have substitutes for everything, businesses are being done at global levels and no part of the world is now isolated from the other parts (Ross, & Perry, pp. 78-96, 1999). This situation led the experts to come up with new ways to survive and magnify revenues. The concepts of total Quality Management and competitive advantage are a couple of them. This paper is devoted to the discussion that is total quality management enough for competitive advantage. Before the paper moves any further, it is important at this stage to understand and reflect on the basic concepts of Total Quality management and competitive advantage. Experts view total Quality management as a â€Å"Management or corporate philosophy that asks firms to strive for making the best use of all the available resources and integrating all organisational functions such as Research and development, Planning, Manufacturing, Customer Service, etc so that organisational goals of maximum profit and customer satisfaction could be attained in the best possible way† (Hakes, pp. 12-38, 1991) (Gummer, & McCallion, pp. 45-92, 2007). There are many other elements attached with it. Authorities in Management studies regard total quality management as process through which, companies can successfully move on to the road of continuous enhancement and expansion, enchanted customers, empowered workforce that lead to lowest possible costs and highest possible returns (Ross, & Perry, pp. 78-96, 1999). It is imperative to understand here that there is a huge amount of debate going on the scope and dimensions of Total Quality management and different scholars have different approaches towards it (Gummer, & McCallion, pp. 45-92, 2007). There are a number of ideas regarding total quality management; however, all diverge on the single point of

Wednesday, July 24, 2019

Legal Practices Essay Example | Topics and Well Written Essays - 750 words

Legal Practices - Essay Example However, it is the responsibility of the corporate leadership to ensure that all its business practices are being conducted in accordance with the law of the land in which it operates and what is understood to be ethical. If the operations extend to multiple countries and cultures, the differences in business practices can often pose some complications. Some practices that are taken for granted as standard practices in some cultures may be viewed negatively in others. Differences in laws relating to pay, working hours, safety at work, and environmental protection etc. are normally of a minor nature, and not usually problematic, so the company can easily ‘localize’ its working and other conditions accordingly. But there are also extreme examples of multinational companies operating â€Å"in countries where bribery, sexual harassment, racial discrimination, and lack of concern for the environment are neither illegal nor unethical or unusual† (Columbia Encyclopedia) but of course are in the US. The leadership must then decide â€Å"whether to adhere to constant ethical principles or to adjust to the local rules to maximize profits† (ibid). We shall consider the differences of child labor laws. To the western mind, this would bring up images of child abuse and slavery, which these laws are designed to prevent. But in countries where children are employed in work they are often compelled to do so in order to alleviate their own conditions of family poverty, and not through working as slaves. In addition, laws and regulations can also change within the same place over time. So, this requires a leader even more to â€Å"stay aware of the constantly changing legal and illegal practices† (Workplace Moxie, 2005) and ethical standards wherever in the world it operates its business. This includes child labor laws, which were recently Although child labor

Tuesday, July 23, 2019

Consider, with detailed attention to evidence, themes, thinkers and Essay

Consider, with detailed attention to evidence, themes, thinkers and theories encountered throughout this module, connections bet - Essay Example Considering key aspects of the modern to be scientific objectivity, technological development advancing from agricultural communities to complex economies, centralization, industrialization, mass-production, and so forth, democratisation is both conceptually and historically aligned with all of these aspects of modernism. This is important, for the democratisation movement can be dated to the late 18th century with the American and French Revolutions implementing the Enlightenment ideals of philosophers such as John Locke, Adam Smith, Rousseau, and others who built on the cultural heritage of the Renaissance period in Europe. Just as the Renaissance era symbolized a rebirth of the Classical aspects of Greek and Roman culture, particularly philosophy, poetry, art, and mythology after a millennium of â€Å"Dark Ages† in Europe, so too Modernism took the best of these developments and made them the foundation for modern secular democratic culture. Yet, historians note an interest ing anomaly when it comes to the discussion of democracy historically and its roots in ancient Greek philosophy as politics. As F.A. Hayek writes in "The Constitution of Liberty," - Chapter 11: "The Rule of Law," "Individual liberty in modern times can hardly be traced back farther than the England of the seventeenth century... And for over two hundred years the preservation and perfection of individual liberty became the guiding ideal in that country, and its institutions and traditions became the model for the civilized world." (Hayek, 1960) Hayek makes an important distinction between Greek democracy as idealized by the Enlightenment philosophers and how it evolved conceptually as a practice of government and means of organizing society. He states, ironically, Greek democracy disappeared from the time of its idealized roots in Athens to the time of the American and French revolutions – that it was not used, referenced, or put into practice at all as a basis of government u ntil the fundamental revolutionary change that ushered in the modern era. Thus, it is valid to view democratisation and modernism as both arising out of the ideals of the Enlightenment and the Industrial Revolution. On this basis, the capitalists will additionally claim that the free market system is essential and interrelated with this process of democratisation, and that the democracy/free-market system represents a natural stage of development for societies that are evolving out of feudal structures to become modern States. Hayek positions England rather than America or France as the source of â€Å"individual liberty in modern times,† relating it to the struggle to institute democratic government in opposition to monarchy and royalty. However, it is extremely important critically that Hayek separates the processes and ideology of â€Å"liberalism† from that of democratisation. In simplest terms, liberalism is the ideology of freedom or liberty that seeks the most m inimal restraint on self-determination and autonomy of the individual, including the mental, spiritual, and physical aspects of self-development and self-realization. This is differentiated from the â€Å"democratic,† which relates more formally to the system of government. This duality is evident in

Monday, July 22, 2019

Padini Swot Analysis Essay Example for Free

Padini Swot Analysis Essay For this particular event, I contributed myself in helping out the needy by showing them my support by donating food, clothes, toiletries. On the 23rd March 2012, at 3:30PM, I was told to gather up at Afi’s house (our team leader) to pack all goodie bags that was supposed to be given out for the needy. We organized the goodie bags and separate them according to the sizes of shirts that was packed in. The next day, on March 24th, our event day, at 3PM we gather up at Afi’s house again to double check with all the stuff that was supposed to distributes for the homeless. Right after we were done double checking those goodie bags, we load all of them inside the cars. All together there were 200 goodie bags. At 3:30PM, we started our journey to Kuala Lumpur. Due to the traffic jams in KL, we reached our destination at 4:30PM. We parked our car and gather up to Mr. Peter, Reach Out senior NGO, for briefing regarding the whole event; on what we were supposed to do and how to handle situations. After a couple of minutes, Mr. Peter divided us into separate task. At 5pm, we the event started. As for this Reach Out event, I was assigned to be the photographer of the day. Throughout the whole hour of giving out those food, clothes toiletries to the unfortunates, I went around here and there to capture all the moments that was happening. Time by time, I did help my teammates giving out those goodie bags. By 6. 15PM, all those goodie bags of food, clothes, and toiletries were completely given out. While most of unfortunates were sitting by the roadside consuming the food that was given by us, I took the chance of capturing those moments. We started packing/ clearing/cleaning up the area by 7pm and head home. I believe that our event was a successful one and I have learnt so much from it.

Barriers To Effective Communication In Nursing Nursing Essay

Barriers To Effective Communication In Nursing Nursing Essay A nurse with good communication skill is someone who really listens to the patients, understands their problems and queries and answers in a way the patients will understand. Communication in nursing profession can be a complicated process, and the possibility of sending or receiving incorrect messages frequently exists. It is important to know the key components of the communication process, how to improve the nursing skills and the potential problems that exist with errors in communication. In this case, we take a nurse as an example. A nurse who can explain in a simple manner to a sick man why a particular diet is very useful to get well soon, is said to have good communication skills. Both verbal and non-verbal communication plays a very important role in communication in nursing. For most patients, the nurse becomes the primary contact in the medical world. The nurse serves as the liaison between doctor and patient. She must understand the doctors instructions and the patients concerns. Her communications skills focus on both giving and receiving information as well as creating an environment of confidence. The relationship between nurse and patient should be a therapeutic nurse-patient relationship. According to Pullen and Matthias (2010), a therapeutic nurse-patient relationship is defined as a helping relationship that is based on mutual trust and respect, the nurturing of faith and hope, being sensitive to self and others, and assisting with the gratification of your patients physical, emotional, and spiritual needs through your knowledge and skill. In other words, a therapeutic nurse-patient relationship focuses mainly on the patient. Today, it is sad to say that there are many nurses who fail to grasp the importance of good communication between the nurses and the patients and therapeutic nurse-patient relationship. They neglect their duty to keep the needs of the patients as their first priority. Poor communication is dangerous as misunderstandings can lead to misdiagnosis and even medication errors. This area is also one of the main sources of complaints made to the health service ombudsman every year and some believe that a separate module for communication should be used in nursing training instead of being subsumed into the general curriculum. The barriers to good communication skills are many and include time pressures (nurses are so busy ad may not be able to get time to sit and talk with patients); lack of privacy; skills mix on the wards can mean there is a shortage of qualified nurses who are available to talk to patients; lack of training; and different languages. There are also several useful things to remember in having good communication including being prepared and know what you are going to say; having the right information to give when patients ask questions; maintain eye contact and observe the patients body language; listen properly; pick up on the non-verbal signs as well as the verbal ones; avoid the use of medical jargon; and in cases of breaking bad news, be emotionally prepared, try to find the right environment, and be sensitive, honest and compassionate. In this assignment, however, I will only discuss on factors that lead to poor communication in nursing. Research Problem 1. Problem Statement The problem statement for this research is To determine the factors that lead to poor communication skills in nursing. Poor communication skills in nurses are a major problem today and can be widely seen in most hospitals and clinics. There are many cases where the nurses speak rudely to the patient and ignore any questions asked by them. They are more concerned with their own welfare than that of the patient and many nurses hesitate and feel embarrassed to ask questions when there are things they do not understand. Their ignorance and poor communication skills can be due to several factors such as emotional stress, language barriers, overworking, fear and education or experience gaps. This problem of poor communication, if it is not dealt with at its earlier stage may lead to the destruction of the delicate relationship between the patients and the nurses. The patient will no longer trust the nurses and this may not only give a bad name to the nurses but also to the hospital. I believe that, when the root of this poor communication in nurses has been identified, we can take immediate action to correct and improve the current communication between the nurses and the patients. In this research, our scope is within the Miri General Hospital. The nurses in the hospital act as a mediator between the doctor and the patients. Nurses are the group of hospital staff that are the eligible to explain any queries of the patients and give comfort to patients. This is the main reason why good communication skill is a compulsory trait that all nurses must possess. It is from this research that I hope, we will get a better understanding of the cause of poor communication in nurses and from there, and we will be able to take necessary steps to overcome this problem. 2. Research Objectives (a) To understand the importance of good communication skills in nursing. The best relationship between a nurse and her patient is the therapeutic nurse-patient relationship. Therapeutic nurse-patient relationships are based on mutual trust, nurturing, and sensitivity to the patients needs. In this research, we wished to determine why good communication is very important in the nursing field. What are the advantages of good communication in nursing and what are the drawbacks of poor communication in this field. (b) To determine if overworking is the cause of poor communication in nursing. Nurses today have more responsibilities compared to nurses of previous times. Today, nurses not only are responsible for the welfare of their patients but their paperwork load has increased. Nurses also need to ensure the cleanliness of the ward especially if the housekeeping staffs are not around. They need to be able to fix the machineries if the technicians are not available. All these additional responsibilities lead to the overworking of nurses and thus leads to them not having the time to communicate and interact well with the patients. (c) To determine if shortage of nurses is the cause of poor communication in nursing. With each passing year, there are more sick patients that require a lot of time and attention from the nurses. But due to lack of nurses, there is only very limited things a nurse can do for each patient. The nurse allocates a very short while to attend her patients, not having time to talk or listen to the patients questions or doubts. This will make the patient feel neglected and unattended to. This high nurse to patient ratio may also be a reason that contributes to the poor communication between nurses and patients and also degradation of therapeutic nurse-patient relationship. (d) To determine whether language barrier is leading to poor communication in nursing. Language plays an important role in communication. The inability to understand a language can lead to misunderstanding and miscommunication, worst still, misdiagnosis. In nursing, it is very important that the nurse should understand what the patient tries to convey to them and vice versa. If both the nurses and the patients cannot understand each other due to use of different language, it will lead to many problems and misunderstandings. Language may also be a factor that leads to poor communication in nursing. (e) To determine if fear is one of the contribution to poor communication in nursing. One common reason for poor communication is that it has to do with a  nurse  having a  lack of comfort or fear in communicating with another nurse or doctor. These type of issues usually occurs  when a nurse feels threatened by a co-worker, fears the possibility of making a mistake and doesnt say anything to avoid judgement or  lacks confidence in her abilities as a competent nurse. (f) To determine if education and experience gaps leads to poor communication in nursing. An education or experience gap can occur when a less educated/experienced nurse works with another senior nurse who  is much  more educated and/or experienced and the junior nurse has trouble understanding the concepts, procedures and/or medical terminology used by the more experienced nurse. These types of gaps can lead to confusion, misinterpretation, inaction and errors due to the inability to communicate effectively  and fully understand  what is being  communicated. (g) To determine whether emotional stress leads to poor communication in nursing. Nurses who are experiencing a lot of emotional stress or a trauma may have difficulty focusing or expressing or communicating their feelings, perceptions, beliefs  and attitude towards certain situations. This can lead to mistakes being made and/or reduce the amount of attention they are able to put towards their work, patients and co workers. 3. Hypothesis/ Research Questions I have come to believe that modern day nurse-patient relationship is undergoing serious strain due to poor communication between the nurses and the patients. There are several factors that might contribute to this problem. Firstly, the modern nurses are being overworked, causing them to lack in their communication skills. When nurses work long  shifts for  extended periods of time it can cause fatigue, which lowers their focus, effectiveness and ability to communicate effectively with patients and staff. Today, nurses must spend an inordinate amount of time completing redundant documentation in several different places, hunting for supplies, wearing multiple hats and performing other tasks. For instance, if the need for a cleanup arises and the housekeeping staffs are not present, nursing staff must address it. If the remote control is not functioning properly and the maintenance staffs are nowhere to be found, the nurse is usually the person who must try to resolve the issue. The next reason is due to shortage of nurses. Every year there are more sick patients that require much of the nurses time. This leaves them with very limited time with other patients. The nurses may be doing their job but they fail to form a relationship with the patients. We take for example,  a nurse approaching the bedside to empty a patients indwelling urinary catheter. As she approached she didnt make any eye contact and duly went about emptying the catheter, recorded the details on his fluid balance chart and walked away. At no time during the procedure did she speak. This example shows how essential communication skills are when caring for patients. Had he wanted to ask a question, the opportunity was lost. At this time, it would have been a good opportunity to take a look at the patient and perhaps ask how he was feeling. Poor non verbal communication also leads to poor nurse-patient communication. Poor communication also occurs when the nurse and patient speak different first languages. Idioms and frames of reference can carry shades of meaning in one language that may not exist in another. Mispronunciation or incorrect signing may be misleading to the nurse or patient, causing the patient to lose his trust on the nurse. This problem usually occurs among the elderly patients and also the foreign patients. Due to the difference in language, both the nurses and the patients fail to convey each message to another.   Especially in Malaysia, a country full of different races and languages, it is impossible for the nurses to be able to understand and speak all these different languages. There are also some patients, especially those who live in the interiors; they are not able to speak the national language but only their one native language. This phenomenon also leads to poor communication skills. Poor communication also tends to evolve out of the level of power within hospitals. The presence of hierarchies in hospitals tends to increase the likelihood of poor communication developing at some level or another within the vertical power structure. The main cause of this communication failure is due to fear but hierarchical organization of power in hospitals is not a bad thing-it just means that it can lead to poor communication to develop discrimination within the medical hierarchy. One of these places is between physicians and nurses. Nurses frequently hesitate from asking physicians potentially obvious or unimportant questions. As both physicians and nurses are very much involved in the care and support of patients, major communication breakdown between them could lead into serious medical difficulties for their patients. For example when a physician instructs a nurse to convey important medical information to patients but the nurse does not fully understand the information an d due to fear, she does not ask for further explanation from the doctor and gives the wrong information to the patient. Poor communication between physicians and nurses also often develop when physicians fully rely on written orders to convey instructions to nurses. They will write important details into patients medical files- including crucial instructions for nurses, for example when to administer a particular treatment. If nurses happen to miss checking patients medical files, they will also miss the important instructions that were written in them. Although this raises the crucial question of why doctors continue to use this indirect mode of communication to the extent they do, and nurses dont object to it, does not suggest that written communication should be prohibited, but that written communication is a poor substitute for direct verbal communication. One reason why written communication remains is that nurses fear questioning what they might consider to be a standard pract ice among all doctors. Here again it can be seen that the reluctance to question the practices of superiors may lead to a communication breakdown-or, more seriously, to a complete communication failure. As nurses usually feel inferior to the physician in charge, so do junior nurses feel inferior to the senior or more experienced nurses. The younger nurses hesitate to ask questions to the senior nurses in fear of being labelled as not well educated. Sometimes, the senior nurses explains a certain procedure or information to the junior nurses, but due to lack of experience, she may not fully understand it and hesitate to ask any questions after that. The senior nurses also take for granted that the junior nurses understand all that has been explained. Miscommunication as such is very dangerous as it will affect the patient. Nurses are the backbone of any healthcare unit. The pressures of overtime and long working hours create a work leads to stress, which will affect the health of the nurses. All nurses have to do shift work or attend emergencies at night and this stress of shift work can also worsen the nurses health conditions leading to depression, low morale, and low motivation. Other factors such as long commuting hours and long traffic adds to their stress affect the employees efficiency and effectiveness. All these can affect the nurses relationship at home as well as on the job. Home stress contributes significantly to the stress faced by nurses. Their home life is disturbed due to night shifts, overtime, transportation problem, and difficulty in getting leave. They constantly worry about their children and their studies not being properly supervised. Nurses have to look after the home, cooking and cleaning as they cannot afford domestic help. This can have a negative influence on their physical and emotional health and lead to psychosomatic disorders. Psychosomatic illness is a disorder that affects the body and the mind. These illnesses have emotional origins causing physical symptoms. Some examples are acidity, anaemia, backache, and stiffness in the neck and shoulders. Sometimes, in the absence of doctors, nurses are on the front line and have to face verbal abuse from patients and relatives for issues that may not be directly connected to their work. Physical violence and aggressiveness is also on the rise in patients and their relations. Demanding patients and their relatives can cause conflict and lead to more stress. Another cause of stress is economic loss to the organization due to errors, wrong decisions, wrong choice, lack of attention, and injury. All these stress factors demotivate the nurses causing them to slack in their communication skills. Conclusion Communication in nursing is specifically used to identify the nurse-patient relationship amongst other things; some of the ways include translating, getting to know you and establishing trust to ensure the patient receives the best treatment (Fosbinder, 1994). In a place where an individuals health  and well-being  is largely determined by the level of cooperation amongst  nurses  and other  medical professionals who are assisting them, there are things that are more important than  education, training and open communication. Poor communication often leads to big mistakes such as prescribing the wrong medication, improper diagnosis of a patient  ailment or medical condition, administering the wrong treatment plans and in some cases even death of a patient due to misdiagnosis due to lack of communication. We also know that nurses and physicians are trained to communicate differently. Nurses learn to communicate by being descriptive, detailed, and narrative while physicians learn to summarize, diagnose, mend, and repair. This makes nurses the best mediator between the physician and the patient as nurses are taught to explain and give information in the most understandable manner to the patient. Communication is at the heart of these goals and patients are being encouraged to be more involved in their care. This can only be achieved if patients truly understand what is available and feel empowered to make those choices. Therefore, when talking to a patient next time, take time to reflect on how you think the consultation went and how it could be improved. Determine whether you use jargon or abbreviations that the patient might not understand, and more importantly did you find out if the patient understood what had been said.

Sunday, July 21, 2019

Legal Issues of ICT Use in the Construction Industry

Legal Issues of ICT Use in the Construction Industry Abstract While in the 21st century the construction industry prefers to conduct business using the information and communication technologies (ICT), the presence of legal issues pertaining to this mannerism of business cannot be ignored. The aim of this project is to provide a better understanding of these legal issues which are associated with their use. The objectives entailed to achieve this aim are to determine the existing legal issues and to estimate the awareness about them in the industry. The aim and objectives have been addressed by conducting two types of field investigations namely, questionnaires and interviews with lawyers, architects and engineers with different backgrounds. The project concludes with the identification of the legal issues present in the industry and an attempted comparison between the legal scenario in the U.K. and India. 1. INTRODUCTION 1.1 Background and Scope of the Research Almost a decade ago the information technology invaded our lives like never before. The advancement in information and communication technologies (ICT) and their utilisation has been tremendous with the recent years witnessing the development of several IT-based technologies such as e-commerce. Information technology solutions have paved a way to a new world of internet, business networking and e-banking, budding as a solution to reduce costs, change the sophisticated economic affairs to an easier, speedy, efficient, and time-saving method of transactions and exchange of information. Though the internet has emerged as a boon for the present pace of life yet at the same time it has also resulted in posing various threats to the consumers and other institutions for which it has till now proven to be the most beneficial. Various criminals have been able to pave their way to interfere with the internet accounts through various techniques like hacking the Domain Name Server (DNS), Internet Providers (IP) address, spoofing, phishing, internet phishing etc. and have been successful in gaining an unauthorised access to the users computer system thereby gaining enormous profits from the stolen data. These and other problems have forced the business community, the legal community and the law enforcers i.e. the government to look at the current legal scenario. These problems, therefore, need to be studied in detail by investigating legal issues pertaining to the construction industry. This study is an attempt at understanding the legalities which are related to the mannerism of conducting business while using ICT. As part of this study an effort will be directed towards comparing the legal stance of the United Kingdom and India. 1.2 Aim and Objectives The aim of this project is to provide a better understanding of the legal issues involved while using information and communication technologies (ICT) in the construction industry. To achieve this aim, the following objectives should be fulfilled during the course of this project:- To study the legal issues pertaining to e-commerce (for e.g. electronic contracts, digital signatures, etc.). To assess the importance of jurisdiction issues in cyberspace (for e.g. engaging in e-commerce on World Wide Web may expose the company to the risk of being sued in any state or foreign country; law applicable to contractual obligations, etc.) To study the various legal problems that can arise out of miscommunication between the client, consultants and contractors (court actions, out-of-court settlements of disputes, etc.) To study and compare the legal stance of India and the United Kingdom, in using the information and communication technologies in the construction industry. 1.3 Justification for the Research Computers and more importantly internet governs our lives to the kind of extent that we do not even realise its significance. Today companies, especially in the concerned area of construction, are conducting business by means of the latest advancements in information communication technologies. Bearing in mind the current flourishing e-commerce, it becomes quite easy to get embroiled in lawsuits. The reasons maybe several, for instance either there may be disputes between the client and the company; or there might be an issue with jurisdiction; or there may be concerns related to the security of level of exchange of information electronically. In most of the cases it can be assumed that there is a highlighted ignorance of the legal framework with respect to ICT, and this ignorance may be a deterrent in the popularity of conducting business in this manner. In lieu of these issues, I believe it becomes the need of the hour to undertake a study of this kind. 1.4 Methodology Outline Owing to the nature of the research project and its data, the research approach adopted is mostly quantitative. However, some aspects of qualitative research have also been incorporated. Source of information will be taken from journals and books. The method of collecting data for this research project has consisted of online questionnaires (surveys) and unstructured interviews. Case studies of previous lawsuits with respect to the topic have been studied. 1.5 Dissertation Contents The research project includes a detailed study into the methodology to be followed and also provides the justifications for the chosen methodology. The project also includes a literature review about the various legal issues which are related to the use of information communication technologies for conducting business in the construction industry. It sheds light on the some of the legal terms associated with the legal framework of e-business. The project report additionally contains with analysis and evaluation from the interviews conducted and the online questionnaire filled in by architects, engineers and lawyers. It supplies information on the â€Å"legal future† of using the various existing and upcoming information communication technologies in construction, providing an insight into the implications; the solutions available; the problems faced while conducting research; and manner in which ICT can be utilised for the growth of the construction industry worldwide. It concludes with summarisation of the research and recommendations and scope for further study on this research subject in the construction industry. 2. LITERATURE REVIEW 2.1 Introduction The intentional use of information technology by cyber-terrorists or cyber-criminals for producing destructive and harmful effects to tangible and intangible property of others is addressed as ‘cyber crime. Cyber crime is clearly an international problem with absolutely no national boundaries; hacking attacks can be launched from any corner of the world without even an iota of fear of being traced or prosecuted easily. A cyber-terrorist can collapse the economic structure of a country from a place where that country might not even have arrangements such as an extradition treaty to deal with that criminal. The only safeguards can be better technology; to combat such technology which is already well-known to the hackers; and to evolve stricter and tighter laws which can be accepted universally. 2.1.1 An introduction to the construction industry A maxim in India states, to live a comfortable life all one needs is three basic essentials- food, clothes and a house. This has held true across all civilisations and centuries. Building a house was just a first step. The world has advanced much further constructing palaces, forts, dams, skyscrapers, factories, energy-efficient buildings and lots more. In a world of today, the 21st century, the construction industry is an important sector of a nations economy; providing employment to millions; employed by countries across the world as an economy regulator! In U.K. alone, construction industry had an output of  £102.4 billion at current prices (2004); 8% of Gross Domestic Product (G.D.P.). In the European Union the construction sector accounts for 9.9% of G.D.P. and 50% of Gross Fixed Capital Formation (GFCF). Considering the scope and importance which the construction sector enjoys worldwide, it becomes quite easy to understand that this industry functions at an incredible level and involves working with many organisations. â€Å"The construction industry is frequently described as fragmented by its critics; however, disseminated would be a better description .For each construction project a whole new organization is created involving the client, designers, contractors, sub-contractors, material suppliers, plant hire companies, government, local authorities and agencies such as the environmental agency, Health and Safety Executive and many others. Each ‘new and ‘transient project organization is, in fact, a virtual organization or enterprise† (McCaffer, 2008). Communication, thus, becomes an important aspect of conducting a successful business in construction ensuring successful collaboration between the various components of the industry. 2.1.2 An introduction to e-business/e-commerce and e-construction With age time the concept and means of communication have also evolved. Earlier communication meant travelling to places near and far, then the concept of letters came and with the advent of telephone postage lost some of its significance. The world was however still is in store for more inventions and the 1940s took the world by storm as the computers were born. Computers and internet are a lethal combination, a form of communication which rules over our lives as much as eating food does. Every day, man makes new discoveries regarding these two, trying to find out how our day-to-day activities can be undertaken in an improved efficient manner. The term ‘electronic commerce (e-commerce) was coined by Lawrence Livermore in 1989. E-commerce is a consolidation of people, technology, materials and â€Å"the processes on an electronic network for commercial transactions† (Johnston et al, 1997, p 37). As specified by the European Commission (1997, cited in Bruin, 2002), electronic commerce is all about doing business electronically involving the electronic processing and transmission of data (which consists of data, text, sound and videos). It encompasses various activities consisting of electronic trading of goods and services, electronic share trading, on-line delivery of digital content, on-line sourcing, electronic fund transfers, direct consumer marketing, electronic bills of lading, commercial auctions, collaborative design and engineering, public procurement, and after-sales service (European Commission, 1997). To be speaking strictly its not really the electronic aspect of e-commerce but the digital part which imparts the revolutionary, efficient and versatile character to e-commerce (Johnston et al, 1997). E-commerce involves both the services; e.g. financial, information and legal services); and the products; e.g. consumer goods, specialised mechanical equipment. It also constitutes the combination of traditional activities such as education and healthcare and new activities such as virtual malls (European Commission, 1997). This is also agreed with by Johnston et al, 1997 who state that e-commerce supports the selling, buying and distribution of services and goods. Johnston et al (1997) while discussing the definition of electronic commerce noted that it involves the conduction of business electronically across the spectrum of inter-enterprise relationships. E-commerce has the advantages of being a paperless economy, engaging in outsourcing and entails the convergence of all information in a single form (Johnston et al, 1997). In this day and age e-business has emerged as a field of immense potential. The use of information and communication technologies to conduct business has gained momentum, and, like just about any other business the construction industry too has embraced the concept of e-business. â€Å"Strong information technology (IT) capabilities have been a competitive necessity in nearly every industry sector. The post-Latham (1994 and Egan (1998) era has seen many construction firms investing in technology tools to improve business performance, which subsequently led to an increase in technology investments in construction firms† (Ruikar et al., 2008, p 23). The use of information and communication technologies in construction, however, depends upon a number of factors such as the size of the construction firm, its position in the market, the markets that the company operates in etc. 2.1.3 Introduction to the legal problems in e-business Before jumpstarting onto the e-business wagon, a company should have some reasonably placed apprehensions. The question in front of the management of a company should be: whether conducting business using information and communication technologies is legally safe or not? Other questions should follow as well, such as: what is an e-contract? will the companys information be secure when shared through ICT? what are the liability issues? what are the jurisdiction issues? is a scanned document valid and legal? what is a digital signature, an e-signature? Questions such as above are justified because in actuality the companies are unaware of the legal risks involved while conducting e-business, hampering the chances of fruitful commerce. Sieber (2001) brings to light the need for new laws when he says that the increased significance of information and information technology is closely linked to increased potential dangers, and these dangers bring an increased necessity to reassess the existing information law regulations and to formulate new ones. Sieber (2001, p8) further makes this statement to back up the formulation of new information law regulations, â€Å"It must encourage- in the interest of communal justice (iustitia commutativa) and as a contribution to distributive justice (iustitia distributia)-the creation of new â€Å"information† values (e.g. by means of economic incentives in copyright law), ensure a just distribution of the newly created goods (e.g. through the regulation of rights to particular information), reduce the number of new risks stemming from information technology (in particular, by provisions in the area of liability, administrative law and criminal law)and ensure a just compensation in cases where harm is caused†. Exchange of information in construction and engineering based businesses is a universal occurrence but it is not accounted for by contractual practice. Insufficiently defined responsibilities, overlapping communication techniques and mistrust all hamper the fuller use of inter-enterprise ICT (Hassan et al). A major problem exists with the enforcement of electronic law. Particularly practical difficulties arise from the fact that data containing most of the information is available at the discretion of the recipient. As is the case electronic data is not actually visible and can be altered, deleted or hidden through manipulation of technology (Sieber, 2001). Data can also be encoded or encrypted by offenders to escape imprisonment. Several terrorist, bank robbers, paedophiles, etc have attempted to escape or have been able to escape by encrypting data. Encrypted data is data which has been converted into incomprehensible codes which can only be unlocked by using a key which only a holder of that matching key can reconvert them into plausible data. All in all there is clearly an urgent need to study and understand the legal issues involved while using information and communication technologies for conducting business. 2.2 Legal Aspects of using ICT When the concept of e-commerce as introduced it was greeted with hysteria which has now been replaced by a concern voiced by many over the impact of using ICT for business. The industry is now closely examining the after-effects of e-business business world (Ismail and Kamat, 2008). Hurtado and OConnor Jr (2009) deliberate on the contractual issues concerned with the use of construction Building Information Modeling. They explain that the legal community is struggling to help out in developing meaningful contract terms in relation to the use of BIM technology. In their paper for the Society of Construction Law, they have contemplated upon the issues to be considered when preparing contractual provisions, including the proposed use of the model; the mannerism of data transfer from one model into the other models; the deliverance schedule expected from the model; reliability of the modelled information; management of the modelling process; and usage of the model after the completion of construction. Some of the legal issues and terminology pertaining to the use of ICT for business purposes shall now be discussed. 2.2.1 Types of legal risks involved in e-business in construction Every new day is coloured with a new discovery; this holds as much truth for ICT as for any scientific discovery. The only drawback with ICT is that a new discovery brings along with it a new set of legal issues. These legal issues are a drawback because they take time for implementation and regulation; sometimes damage has already been done before any sufficient action can be taken. Ismail and Kamat (2008, p-212) correctly state, â€Å"The difference between the rates at which e-business technology develops to the rate at which legal framework and rules develop is substantial. Legal risks have not been studied in relation to construction e-business†. The legal risks discussed include risks posed by web-based agencies, risks related to jurisdiction; contract formation; authentication; electronic privacy and risks associated with intellectual property. These legal risks inflicting e-construction have been discussed as below: †¢ Insecurity regarding electronic privacy In the digital economy privacy claims have been of paramount concern. An issue forever causing concern amongst the construction and business community is the insecurity of their personal and private information which is exchanged and stored electronically. A popular, efficient and inexpensive means of information exchange and data transfer is the electronic mail systems, popularly known e-mails. While emails now incorporate information in various forms which includes photographs, typed memos, video clips, spreadsheets and bar codes; they are deemed to be as insecure as a postcard if they are not protected by encryption and elaborate password systems (Johnston et al, 1997). Construction companies involved in e-business will need to manage the risks associated with sharing private information; private information may refer to personal privacy concerns about their own firms (Ismail and Kamat, 2008, p214-215). â€Å"Online portals and marketplaces collect more information than is needed for legally authentically an e-contracting party† (Smith and Clarke, 2000). The information thus collected may be in the form of registration forms, cookies, etc. Though the question remains as to who owns this information, the risk associated is with the privacy being challenged. In case of hacking or a virus, the information may end up being passed onto a third party. †¢ Risk posed by the web-based agents Web-based agents are information brokers. A new brokerage model can substantially change the equilibrium and re-adjust the interests of existing stakeholders. Also, software agents pose the biggest and truly exclusive risk to the current legal system as pointed out by Ismail and Kamat (2008). Agents control decisions and they learn and act upon their perception of the environment to make the maximum goals of its user or programmer (Dzeng and Lin, 2004; Lee, 2004; Ren and Anumba, 2004). Agents act on behalf of their owners to promote the owners desires, unlike support software that supports the owner in making a decision but leave the decision for the owner to make (Schoop et al., 2003; Ren and Anumba, 2004). †¢ Risks related to electronic authentication When doing business via the electronic networks, it become increasingly difficult to establish the other partys trustworthiness without having physically met them, in other words doubts about authenticity are raised (Bruin, 2002). Smith Clarke (2000 cited in Ismail Kamat, 2008, p 216) debate authentication by stating, â€Å"The drive to authenticate e-business buyers and sellers and attribute contracting actions to the proper buyer and seller is in direct conflict with privacy laws†. Pacini et al (2002, quoted in Ismail and Kamat, 2008, p 216) support this statement when they say, â€Å"Attributing an electronic message for an offer or acceptance of an e-contract to the person who purports to send it is yet another risk†. The Uniform Electronic Transaction Act (UETA) addresses this risk from a legal perspective by making it necessary that certain authentication levels are acquired and thus proper authentication and attribution is ensured and a protection is provided to the e-business participants from the attack of hackers (Belgum, 1999; Moreau, 1999; Thelen Reid Priest LLP, 1999a; Pacini et al., 2002, cited in Ismail and Kamat, 2008). †¢ Risks inflicting electronic contracts Consider this scenario. Two parties engage in a negotiation for the purchase of cement for the construction of an institutional building. The seller offers it at say  £5 per kg and the buyer refuses and wants to buy it at say  £4 per kg and also wants the seller to bear the shipping cost. The seller agrees, transaction is completed, cement is shipped and the buyer transfers money into the sellers account. This sounds like a simple business contract; however, the difference here is that this contract has been formulated and fulfilled electronically (Johnston et al, 1997). In a commercial context, promises are exchanged in the form of an offer and an acceptance of the order. The offer and the acceptance supported with a valid consideration and mutual assent would, subject to certain limitations, constitute a valid contract. Electronic Data Interchange (EDI) technology is an advanced form of cyber-contracting. EDI is conducted between trading partners who already have a negotiated agreement which rules the relationship. In this form of technology, the computers contact each other as well as negotiate (based on programmed instructions). If a reply which rejects the offer is received then a counter-offer is also made. This continues till an agreement is arrived at or one of the system stops the process (Johnston et al, 1997). However, in the e-business transactions, it is not an easy job to distinguish between the offer make and the acceptor. This is considered critical because a contract is considered to be invalid until an offer has been made and the acceptor has accepted the offer and communicated the same to the offer maker (Ismail and Kamat, 2008, p 213). Although the laws governing electronic contracts have improved significantly over the year, yet there is always scope for improvement because of the ever changing evolving nature of the communication technologies. Business risk and uncertainty are always on a high level in the electronic world. Legal difficulties in an e-contract arise when the parties expectations are not met with or when a transaction does not progress as planned. Bruin (2002, p 146) shed some light on TrustUK and explained that, â€Å"in July 1999, the Department of Trade and Industry published its Consumer White Paper Modern markets: Confident consumers..The White paper among other things contained plans for the approval of on-line codes of conduct by a new body provisionally called TrustUK†. Section 4 of TrustUK Code of Practice deals with the various aspects of e-contracts and its implications (liabilities included). †¢ Risks related to varying jurisdictions Jurisdiction is a legal term describing which law is in effect at a given period of time and which courts decisions will be legally binding. Jurisdiction issues arise when parties dispute over a contract and want to settle as to which jurisdiction will decide over the issue (Ismail and Kamat, 2008). The problem becomes more intimidating where the issue of e-commerce comes into picture. The internet simplifies the carrying out of business globally. But then different countries follow different laws, especially those with respect to construction and therefore, the risk of encountering lawsuits in foreign land increases. In an electronic contract it should be very clear as to what law applies to the contractual obligations, what court of law will be presiding over to judge any dispute arising from the contract (Bruin, 2002). As pointed out by Rowe (1998, cited in Ismail and Kamat, 2008) a dispute judged under varying set of regulations, laws and rules have as different judgement. â€Å"Although the laws regulating e-business vary, the general opinion of the courts implies that companies engaged in activities or online advertising may have to defend lawsuits in different jurisdictions if those activities violate the local laws†, Thelen Priest (1997 quoted in Ismail and Kamat, 2008, 213). The problem of jurisdiction exists becomes all the more relevant in the 21st century, now that there are so many countries existing worldwide and when global expansion has occurred in the business scenario with the arrival and explicit use of the information and communication technologies. However, there are quite a lot of countries which are at the moment unable to make any kind amendments in their legal framework on construction, especially where the amendments in law are concerned with e-construction. At the same time, it is good news that some governments are making changes to the construction law executed in their countries to make e-construction and e-business a more feasible and legally secure venture. However, the point to be noted here is that despite all the positive proceedings in the respective field, the possibility of two countries sharing the same law on e-commerce and that too in the construction sector are negligible. In a scenario where the choice of law is absent, legal uncertainty may arise regarding the application of law to an electronic contract (Bruin, 2002). This information clearly implies that risk attributed to varying jurisdiction remains. Bruin (2002, p42) clearly points out that in a specific case of â€Å"cross-border electronic consumer contracts, a court procedure may involve such difficulties that a contract term defining a foreign jurisdiction may de facto exclude or hinder the consumer to take legal action†. As a result the service provider also ends up providing an unfair contractual term. From the literature on jurisdiction which has been studied and mentioned here, it has been found that although there are quite a lot of provisions in legal frameworks of countries which address the jurisdiction issues, yet it would be beneficial to make changes and improvisations to these existing laws. 2 Brief description of some of the legal terms associated with the legal framework of e-business To understand the legalities involved in using information and communication technologies for business, one needs to be aware of some terms associated with the legal framework of e-business. In this section these common yet important terms shall be discussed briefly. Identification of the potential legal gaps and problems within the cluster projects issue 2, a report on the findings of Hassan et al, forms the main basis for defining these terms. The discussed terms are as follows:- †¢ Electronic / digital signatures Electronic and digital signatures allow the recipient of a piece of information to know when the information has arrived, who has sent it, and to check whether the information has been changed or tampered with since it was sent. Digital signatures are electronic codes specific to individual users, which can be used to identify the originator of a message or file, and to indicate approval of the transmitted information. There are different types of digital signatures available (i.e. public key infrastructure, asymmetric cryptography, account numbers and passwords), and the level of security that is required dictates the choice of method to be used. Digital signatures are easily to transport and all the more difficult to imitate by anyone else, and more importantly they can be automatically time-stamped. A digital signature is basically a unique ‘key that provides, if anything, stronger authentication than any written signature (Wacks, 2001). Asymmetric cryptosystem involves two keys, one public, the other private. Its main advantage is that if you are able to decrypt the message, you know that it could only have been created by the sender (Wacks, 2001) The Electronic Transaction Act 1999 (in Australia) gives legal recognition to the use of electronic signatures and one may find them useful in executing electronic contracts on your website. The risk of e-businesses dealing with parties which might misuse digital signatures is similar to the commercial risk of fraud that arises through forgery of signature on a paper contract. †¢ Here is an example which depicts the working of a digital signature. Assume that man named A has to the draft of a contract to his lawyer who at present is in another town. A wants to assure his lawyer that the information sent across has not been tampered with and it really is what he had sent. To ensure that, heres what A has do: †¢ Copy-and-paste the contract into an e-mail. †¢ Using specialised software, A obtains a message hash (mathematical summary) of the contract. †¢ A then uses a private key that he had previously obtained from a public-private key authority to encrypt the hash. †¢ This encrypted hash becomes As digital signature of the message. It is to be noted that the digital signature will be different each time a message has been sent. Now, how will As lawyer detect that this document is the same unchanged one that A had sent across to him? Heres what he will do: †¢ As lawyer makes a hash of the received email to ensure that the document is intact and has been sent by A only. †¢ As lawyer then makes use of As public key to decrypt the message hash or summary. †¢ The received email (document in this case) is considered authentic and valid if the hashes match. Thus we understand that using a digital signature is an easy and safe method to protect privacy of information. A digital signature consists of the concerned persons public key, his/her name and e-mail address, the expiry date of the public key, name of the company, serial number of the digital ID, and digital signature of the certification authority (Magalhaes, 2003). The fact that digital signature increase the security and ensure privacy is confirmed by Wacks (2001, p 80) when he states, â€Å"Blinding or blind and digital signature will significantly enhance the protection of privacy†. †¢ Digital notaries Digital notaries provide a time stamping service, thereby proving the existence of a piece of information at a particular time. These are often used in conjunction with an electronic / digital signature. Timestamping can ensure non-repudiation. Indeed, a digital signature is only legally binding if it was made when the users certificate was still valid, and a timestamp on a signature can prove this. Timestamping involves the following parties -client, timestamping authority (TSA) a verifier. Feather in 1999 expressed his opinion on digital notaries. He articulated that the purpose of a digital notary is to certify that a document as produced by a person is a true copy of that

Saturday, July 20, 2019

Acid Mine Drainage :: science

Acid Mine Drainage For hundreds, even thousands of years, human beings have mined for metals and stones, and with the advent of greater technology as well as greater needs, the demands for these resources continue to grow. While these resources benefit our lives in many ways, the effects of mining can be detrimental, and one such effect is the topic of this essay, acid mine drainage (A.M.D.). The causes of A.M.D. will be discussed, along with some of the physical and biological problems associated with it. Some prevention and remediation treatments will also be considered. Acid mine drainage refers to water (leachate, drainage or seepage) that has come into contact with oxidised rocks or overburden that contains sulphide material (coal, zinc, copper, lead). (Keller, 2000; U.S.G.S.; U.S.E.P.A., 2002). A common sulphide is pyrite, or iron disulfide (FeS2), and throughout this essay it will be pyrite that will be the primary sulphide considered. Acid mine drainage is not a new phenomenon, early mining techniques utilized gravity to avoid water pooling, resulting in the water becoming polluted by acid, iron, sulphur and aluminium (U.S.E.P.A., 2002). It is most commonly associated with coal mining, especially with soft coal, coal that has high sulphur content. The pyrite that is present in coal seams will be accessible after surface mining when the overlying surfaces are removed or in deep mines that allow oxygen access to the previously inaccessible pyrite-containing coal (D.E.P. 1, 1997). After pyrite is exposed to air and water, sulphuric acid and iron h ydroxide are formed, creating an acidic runoff (D.E.P. 1, 1997; 2 2002). When the water comes into contact with the pyrite, the chemical reactions that take place causes the water to increase in pH which will dissolve heavy metals which stay in solution. However, when the pH levels reach a certain stage, the iron can then precipitate out, coating sediments with the characteristic yellow, red or orange colourings (D.E.P. 2, 2002; U.S.G.S.; U.S.E.P.A., 2002). The rate that A.M.D. advances is also influenced by the presence of certain bacteria (Doyle; U.S.G.S). A.M.D that has dissolved heavy metals such as copper, lead and mercury can contaminate ground and surface water. Especially at risk are mines that are located above the water table (Keller, 2000; D.E.P. 2, 2002). The sources of water that get polluted can be surface water that permeates into the mine, shallow ground water flowing through the mine or any water that comes into contact with the waste tailings produced by mines.

Friday, July 19, 2019

Anglian and Anglo-Scandinavian Settlement at Cottam :: Medieval Archaeology Essays

Anglian and Anglo-Scandinavian Settlement at Cottam Excavation of the Anglian and Anglo-Scandinavian settlement at Cottam B (NGR 49754667) continued in July 1995, directed by Dr J.D. Richards for the Department of Archaeology, University of York. Work focused on a possible 10th-century settlement focus, c.200m NE of the 8th/9th-century site investigated in 1993. Two Norse bells, a 10th-century spearhead and a Jellinge-style brooch had been recovered from this area by metal-detector users, and field-walking had yielded Torksey-type ware sherds. Aerial photographs showed very few crop-marks in this area, although a magnetometer survey was conducted in Spring 1995 and revealed several ditched enclosures either side of droveways. The purpose of the 1995 excavation was to: - evaluate the survival of evidence in this area and investigate the reasons for the lack of crop-marks; - test the theory that this site represented a localised settlement shift from the SW; - characterise the nature of settlement in this area. A trench 20 x 100m was cut across the entrance, a central trackway, and parts of at least two enclosures. This revealed a massive ditched entranceway with an internal rampart and substantial wooden gate structure. At this point the ditch was at least 1.5m deep by 2.5m wide with a rampart behind it, although elsewhere the trackways and enclosures were defined by shallow ditches, less than 0.5m in depth. It appears that the main purpose of the entrance was for display rather than defensive purposes. Traces of several post-built structures were discovered within the enclosures, although truncation by ploughing had removed all occupation deposits and continues to make it difficult to define coherent building plans. The lack of crop-marks was demonstrated to be the result of the shallow nature of most of the features, many less than 0.1m deep, making them visible to magnetometry but not affecting crop growth. Several structural features were identified however, including a possible quarry pit and several industrial features which yielded large quantities of fuel ash slag. The finds recovered included two late strap-ends, one conveniently from a post-hole, as well as a number of dress pins, and a finger ring decorated with ring and dot ornament. The pottery, including York-, Torksey- and Maxey-type wares, attests to a range of trading contacts, both N and S of the Humber. This is in stark contrast to the 8th and early 9th century focus, which was apparently aceramic.

Barry Sanders :: Sports Athletes Essays

Barry Sanders Barry Sanders arguably the best back ever to play the game of football. Barry is not one of those players who is just out there to make money, he loves the game and is always trying his hardest when he is out there. Barry Sanders was born July 16th, 1968 in Wichita, Kansas. He grew up in a family being one of eleven other children. When Barry was a kid he was considered to be too short to play football well at the college level. In fact, his 1,417 yards rushing in his senior year of high school wasn't enough to impress college recruiters. One recruiter told Barry's coach, "We don't need another midget." Only two colleges offered Barry a football scholarship. Barry accepted a scholarship from Oklahoma State University and the rest is now history. Here are some of Barrys career achievements that he has done in the short time he has played the game. Which has made him such the over achiever that he is. 1988, won the Heisman Trophy Award for best player in the nation. 1989, lead the NFC in rushing and was Rookie of the Year. 1992, became the Lions' All-Time leading rusher. 1994, rushed for the fourth best NFL season record of 1,883 yards and included a 237 yards in week 11 vs. Tampa Bay. In 1996, became the first player in NFL history to rush for over 1,000 yards in his first eight seasons, won the NFL rushing title, selected to the Pro Bowl for the eighth time and became the first player to rush for over 1,500 yards in three consecutive seasons. Sanders continues adding to his extraordinary numbers on the field. He has run for 1,300 yards and now stands seventh among the NFL’s all-time rushers with 11,472, having surpassed Ottis Anderson, O.J. Simpson and John Riggins. He’s 128 yards behind Kansas City’s Marcus Allen, Sanders’ boyhoodhero when he was growing up in Wichita, Kan., and Allen was a Los Angeles Raider. Next year, providing he keeps up this trend of 1,000-yard seasons, Sanders will pass Franco Harris (12,120), Jim Brown (12,312) and Tony Dorsett(12,739) and slide into third place behind Eric Dickerson (13,259) and Walter Payton (16,726). Sanders is the first player in league history to rush for at least 1,000 yards in eight straight seasons, and Thursday he was named to his eighth straight Pro Bowl. â€Å"Anytime he touches the ball, it’s a highlight reel,† says Allen, now in his 15th NFL season.

Thursday, July 18, 2019

The Opener of Holy Quran

Introduction of Surah Al-Fatiha:Al-Fatiha means â€Å"The Opener†. Because it opens the Holy Quran and also by its recitation we start our prayers. It is also called the â€Å"Mother of the Holy Quran†. That's because the meaning of the whole Quran is summarized into surah Al-Fatiha. It is the Mecci Surah of the Holy Quran and contains 7 verses.But it still explains the admiration of Allah Almighty in a very comprehensive way. The theme of the Surah Al-Fatiha:Allah has taught in this Surah to mankind to thank Allah (SWT) for everything and to offer prayer to Him, who is the Lord of this universe. Islam obliges a man to initiate everything with the name of Allah. By having a solid belief, we will keep ourselves away from evil and wrong deeds. Then there is the prayer of Allah Who is Master, Owner, Sustainer, Provider, Guardian, Sovereign, Ruler, Administrator, and Organizer. Then it is added that He is the Master of the Day of Judgment, thus, everyone is accountable for his deeds. Mankind is the only worshiper of the Lord and for this reason, mankind is requesting for guidance in every aspect of life. The guidance which makes mankind favorable is required. The one who will be astray will suffer the wrath of Allah (SWT).Virtues of Surah Al-Fatiha:There are many virtues associated with this Surah. Two of them are described below,1. Pillar of the Salah: This surah has a great importance in prayer. If we don't read it in our Salah, our prayer will not be valid or void. Prophet Muhammad (SAW) said, Surah al-Fatiha is â€Å"The Mother of the Quran, the Mother of the Book, the Seven Oft-Repeated Verses and the Great recitation.† (Tirmidhi)2. The cure for the disease: Hazrat Abu Saeed al-Khudri narrates: â€Å"While on a journey we halted at a place. A girl came to us and said: â€Å"The chief of this tribe has been stung by a scorpion and our men are not present, is there anybody amongst you who can recite something upon him to treat him?† Then, one of our men went along with her although we did not think that he knew any such treatment. However, our friend went to the chief and recited something upon him and the chief was cured. Thereupon, the chief gave him thirty sheep and gave us all milk to drink. When he returned, we asked our friend: â€Å"Did you know anything to recite upon him to cure him?† He said: â€Å"No, I only recited Umm al-Kitab (i.e. Surah al-Fatiha) upon him. † We said that do not do anything until we reach Madinah and ask the Prophet regarding this (practice and reward-whether the sheep were lawful or not for us). Upon reaching Madinah, we narrated this to the Prophet (PBUH), whereupon he remarked: â€Å"How did he come to know that Al-Fatiha can be used as a cure? (PBUH) Distribute your reward amongst yourselves and a lot a share for me as well†.† (Sahih Bukhari)Tafseer of verses of Surah Al-FatihaVerse # 01, In the name of Allah: It is the first verse of the Surah Al-Fatiha. It means, â€Å"In the name of Allah, the beneficial and most merciful. It is very good to recite it before doing any work. â€Å"In The Name of Allah, The Beneficent, The Merciful.†The beginning of the Holy Quran is with the name of Allah Almighty, who is the most Beneficient, the most Merciful. This phrase is known as Bismillah and is essential to recite doing anything. It seeks mercy and blessing of Allah and is better to recite before starting any work. Verse no 2 The second verse of the Surah-Al-Fatihah is:†(All) praise is (only) Allah's, the Lord of the worlds.† (Al-Fatihah: 2)After reciting the phrase Bism-il-lah-is-Rahim, our first objective is to bring our mind toward the Great Creator and Cherisher of the world, and His infinite rewards which have fenced us thoroughly. â€Å"Al-Hamd† means â€Å"thanks† same is the meaning of â€Å"secular†, but there is a difference between these two words. Hamd is done with the love of Allah Almighty, but on the other hand, shukar is the response of endless bounties which were awarded by Allah Almighty. Then we come to â€Å"Rabb-UL-Aalameen† the meaning of â€Å"Rabb† is generally taken as God, but it is a lot, then that is generally translated Allah Almighty has 99 names, and all of them a possess different meanings, but the core meaning of them is that He is the one who is the creator of everything, Who has supremacy over everything, He is the one who is the Cherisher and many more. â€Å"Aalameen† means the one who is â€Å"Qadir â€Å"(supreme) on everything, who ruled everything, who is the creator of mankind and the jinn. The virtue of the VerseSo, collectively this verse means that all of the thanks and gratitude are towards Allah Almighty, who is the creator of everything in this universe though he is a jinn or anyone from mankind.Verse no 3The third verse of the Surah-Al-Fatihah is:†The Beneficent, The Merciful.†(Al-Fatihah 3) The meaning of â€Å"ar-Rehman† is the Beneficent and â€Å"ar-Rahim† is the Merciful jointly with the deep sense of meaning and the difference between them, was explained with a massive length.As explained above the meaning of these two words, but whenever a word is repeated in the Holy Quran it emphasizes its meaning. â€Å"ar-Rehman and ar-Rahim† are the most significant attributes of Allah Almighty, are repeated 30 times a day in our prayers. It also refers us to beg to Allah Almighty for mercy on us, Allah wants that His people to ask Him for mercy.Verse no 4The fourth verse of Surah-Al-Fatihah is:†Master of the Day of judgment.†(Al-Fatihah 4)In this ayah, our attention is brought toward the second vital principle of Islam, which is the Resurrection and the Hereafter, when it says â€Å"Master of the Day of judgment†. It is a basic base of all moral and social developments in Man, reaches the peak of perfection when its attention is brought toward the end of his life and his attention is brought to where he is going after this life.The word â€Å"Maalik†Ã‚   is referred to someone who possesses something completely and â€Å"the Day of judgment† is the day of final judgment on which everyone is brought to a platform at which justice is done according to the law of Almighty. Allah Almighty is the Lord of everything from the day when the universe was created to the day when it is again being destroyed.The virtue of the verse This verse of the Holy Quran has a clear message for the mankind that only Allah Almighty is the one Who is â€Å"Maalik† of the day of judgment. So, we should get prepared for the day when we will have to come in front of the creator and answer about all of the sins and good deeds we had done in the present world. Verse no 5 The fifth verse of Surah-Al-Fatihah is:†Thee (alone) do we worship and of Thee (only) do we seek help. â€Å"(Al-Fatihah 5)†Thee (alone) do we worship† means Allah is the only Essence to be relied on and worshipped. By admitting that we worship Allah Almighty, we are humble before Allah Almighty and to confess our servitude to Allah and to His Pure Essence help to make us successful in this great challenge. â€Å"Thee (only) do we seek help† is clearly referring towards the Cherished blessings of Allah Almighty, and bringing our attention toward the point that he is the only one who can help us at all. No one else in the universe can help us in any matter. â€Å"Iyyaaka nasta'een†It is in our fitrah too that whenever we indulge in any kind of problem we ask Almighty for help unintentionally no matter whatever our resources are? The virtue of the verseThis verse possesses a very charming message for the believers of Allah Almighty that we only worship Allah Almighty by all aspects of life, no matter what the condition is, also it is the only source of becoming successful in the final exam. And it is only Allah Almighty from which we can seek help as he is the most Beneficial and Merciful.Verse no 6The sixth verse of Surah-Al-Fatihah is:†Guide us (o' Lord) on the straight path. â€Å"In this verse, we are asking Allah Almighty for help in the form of dua. By saying â€Å"guide us (o'Lord)† we ask Allah Almighty to show us the right path and guide us on it, in the result, we will get guidance which eventually brings us closer and nearer to Allah Almighty which will result in success. The meaning of†Straight Path† is â€Å"Sirat-e-Mustqeem†. Moreover, this straight path is the very Divine faith, has some phases. Whatever phase a person gains, there is still some higher stage above them that a person may ask Allah to guide him to reach. â€Å"Mustqeem† can be defined as istaqaama which means upright. In the beginning, we asked for a straight path so, why we are requesting for it again, it is only on to emphasize the objective to get the straight path. In another meaning, mustqeem refers to remain firm or to stand firm without tilting.The virtue of this verse In the whole ayah, we are asking Allah Almighty to guide us to follow the right path or the straight path and help us to remain us on the right and straight path because it is the only way that we can get to the Paradise. If we tilted a little or toasted minorly this can be a fatal matter for our success as Allah Almighty is the justest.Verse no 7The seventh verse of Surah-Al-Fatihah is:†The path of those upon whom Thou hast bestowed Thy bounties, not (the path) of those inflicted with Thy wrath, nor (of those) gone astray†This verse is, indeed, a clear illustration of the straight path which was dealt with in the previous verse. By this verse, we can clearly understand that the follower asks Allah Almighty to guide him on those with whom He has blessed with many kinds of blessings. In this verse, we ask Allah Almighty that guides us with the path of those which you had blessed and gave your endless bounties, not with those who were strayed from their path and are in great loss. The virtue of the verseWe bow before Allah Almighty to guide us on the path of those which were awarded by Almighty's fruitful awards, not to those who were strayed and are in great loss.Impact of Surah Al-Fatiha on the life of a Muslim as a servant of AllahSurah Al-Fatiha is the said to be the mother of the Holy Quran and it has a core message of the Holy Quran. As a Muslim Surah Al-Fatiha has shall have a positive and significant impact on us. As it has very clearly been mentioned in the â€Å"verse 3† that Allah Almighty is the Lord of the day of the judgment and all of us has to stand on the platform of justice and there, justice will be done on pure merit. So, as a servant of Allah, we should ask him for â€Å"mercy†.We should ask the Almighty for guidance and siraat-e-mustqeem, so we can remain on the right path. Servant of Allah will surely seek the path of one who is succeeded in his final run, and he will avoid the path of those who strayed from the divine path and bound to hell. Holy Quran is not only our holy book, but a source of great knowledge, and we cannot deny the practical significance of this fact even disbeliever of the holy prophet admit it.So, Quran is the source of knowledge to get success in the final run. And Surah Fatiha has all the aspects which are explained in the Holy book so. So, it implies significant impact on the life of a Muslim.

Wednesday, July 17, 2019

Discrimination against people with HIV at work

Monday morning was the trounce beat of the week for mike for he loved going to be given which could not be verbalize for most of his colleagues. mike had cherished to be a arrangement analyst altogether his livelihood and though he had been working at hydrargyrum Star for four and a half age. He came into the occasion with the drive, sense of excitement, fervency and expectation that an 8 year sr. boy had when his dad took him to get his outset bicycle.His daily routine involved acquiring into the office at least 30 minutes early so as to charter enough time to judge in, review the previous days work and establish what would be his work load for the day. The first thing he did was to tantalize and admire the cardinal beautiful, polished provide trophies which sat on the t subject on the left side of the room coterminous to the picture of his girlfri stop over. These trophies were the reward for his hard bring in success as he had been the signs employee of the year for the last two consecutive years.It was unusual for a 28 year old to have achieved that miscellany of success in such a short time as mike had already been promoted to a managerial post. mike was a respected man in his work place and his employees looked up to him and few even pegged him as they guy who go out be a Chief executive director Officer by the time he was 35. though he downplayed this remarks he continuously matt-up that he had the potential and be ripedr wining his second employee of the year award that became his bran-new ambition. Within just four years he had become the one of the best trunk analysts in the urban center.microphone had his whole future tense planned out, how he would propose to his grand time girlfriend by the end of the year, he was in the middle of negotiating a mortgage with the local bank and he was paying the last installment on his BMW M9. He even drew up a plan in which he planned to work extra so that he would be able t o go into retirement by the age of 40 and set up a system analysis consultancy firm within the city (Geoffrey 23). His position in the office came with a health insurance package which until this time mike had never used it.But on this Monday morning Mike felt divers(prenominal) he felt like he was coming up with flu so later on he compensateed to work he took the day off to go and see his sophisticate which was unusual as Mike rarely got sick. The make at first was not able to sort what was wrong with him so he ran most tests. When Mike came to see the doctor late in the after(prenominal)noon the news curriculum that doctor gave him made him feel like his life had just been pulled right from under his feet. The human activityors line Im sorry Mike but you are human immunodeficiency virus irrefutable keep ringing in his head.Mike did not even hear what the doctor said for next few minutes as he tried to let the news sink in. The medical cover policy had a condition th at when an employee visits the firms doctor, he had to furnish the management with a complete report of the doctors examination. Mike went back to work after three days and tried to act like nothing had happened. But nonetheless much he tried he could not shake off what the doctor had told him he couldnt and on this point day he got to work late which had never happened.A soon as got to the office he was informed that the thickening wanted to see him. When he got into his office, the boss offered him a sit and for the next fifteen minutes he went on and on how Mike was an excellent employ but what happened after that Mike would never have contemplated. The boss told him that the board had discussed on the medical report and had come to the conclusion to let him go. It was at this point that he truly felt his world come crumble and all his dreams and ambitions came tumbling down. What and end to a smart as a whip young mans career. variety against People with HIV at take onA sal esman representative is modify from his theorise when he was diagnosed as HIV irresponsible. He was about to complete the six months want in order to become a regular employee but he was terminated under the dubious excuse of clayey misconduct. But the real pillowcase of his termination is his health condition, specifically, being positive on HIV or aid. The Acquired Immunodeficiency Syndrome, to a greater extent comm simply known as AIDS, is caused by the HIV or the Human Immunodeficiency Virus. The computer virus impairs the bodys defenses or insubordinate system and leaves the body vulnerable to conglomerate serious and fatal illnesses (AIDS and the employment, 1992).People with HIV infection are lively like normal tidy sum. They are able to perform well in their fellowship and in their work environment. But still, secretion against people with HIV is still predominate in some areas, especially in the workplace. The United Nations campaigns for the ban of prejudic e against people with HIV/AIDS. Secretary General illegalize Ki-moon called for worldwide efforts in battling not only the disease but the discrimination that is in like manner widespread (Ban urges end to injury against People Living with HIV/AIDS, 2008).Companies should address issues that are related to HIV/AIDS by enhancing a non-discriminatory workplace environment and by providing education regarding the frequently asked questions on AIDS. For the workplace environment that has an change magnitude risk in blood exchange, the caller-up should apply a control program in order to monitor and mold the activities in the workplace (AIDS and the oeuvre, 1992). People infected with HIV have the capacity to live normally in the society. And as such, we must not ransack the infected people with AIDS to do their tasks and participate and socialize with the other members of the society.