Wednesday, July 31, 2019

Definition of Mobility Essay

1.1 – Give a Definition of Mobility The definition of mobility is the ability to move body parts, and the ability to move from place to place as well as sitting down and getting up. 1.2 – Identify and Explain Health Conditions That Can Affect Mobility Some health conditions that can affect mobility are age, arthritis, strokes, heart attacks, infections, fracture of bones and possibly mental issues. Arthritis can affect mobility due to the joints hurting or going stiff making mobility harder for the individual. Heart attacks and strokes can affect mobility due to an individual’s balance possibly being impaired but also due to possible paralysis of one side of the body. Mental issues could affect mobility due to someone’s confidence possibly going due to a fall etc. 1.3 – Outline the Effects That Reduced Mobility May Have on Individual Well – being. Reduced mobility and movement may have different impacts on different people; some people may be able to cope better with it than others. Some people may lose their confidence and sense of self, some people may develop depression due not being able to do as much as they used to. Reduced mobility and movement may affect people’s personal relationships, moods. It can also affect a person’s social life due to possibly not being able to leave the house etc. It can also affect a person’s day to day life for example personal care, food preparation to being able to make meals and cups of tea. 1.4 – Describe the Benefits of Maintaining and Improving Mobility for the Individual The benefits of maintaining and improving mobility for individuals are great; it can help with the physical and emotional well – being of the individual. The physical benefits include keeping good circulation and muscle strength; it can help to maintain a steady weight of the individual. Simply put if you don’t encourage an individual to keep their mobility and movement then the muscles waste away, for example if you were to keep a mobile individual bed ridden their muscles in turn will waste away impairing their movement and mobility. Also in some cases physiotherapy can also help to build up the muscle strength etc. enabling reduced movement to possibly increase. The emotional well – being of maintaining and improving mobility for an individual is very important as when someone has reduced movement and ability it can affect their social life, social skills, self-esteem a nd confidence and can also lead to depression, which in a nutshell if you can  improve the mobility and movement of an individual can reduce the risk of depression, can enhance self-esteem and confidence and also can enable them to have a social life. Who Would You Report Progress and / or Problems to? If I noticed progress or problems relating to an individual’s mobility and movement I would always note this down in the Care Log and I would also inform my co-ordinator of any issues, my co-ordinator would then report it to possibly doctors, nurses and also to the occupational health team which could either sort out the use of equipment or could implement anything that could help the individual for example extra care or even reduced care and reduced equipment. How Would You Report the Following Problems and / or Progress Relating to Mobility? – Choice of Activities, equipment, appliances and support provided. I would always be vigilant in my work and the care I provide to see if I could notice any changes to an individual in regards to all aspects of their care including mobility. I would also read care notes that have been written by other carers involved in their care and also possibly family members and healthcare professionals etc. If I noticed any changes at all in regards to what activities they chose for example if they stopped wanting to go out etc. I would always ask them the reasons for this and listen to the reasons (these reasons could be something along the lines of don’t feel confident enough and feel off balance) I would write these concerns down in the Care Log and also report to my co-ordinator, senior carer or manager to possibly look at implementing additional support for their choice of activities. If there was an issue with the equipment for example needed different equipment as it wasn’t suitable or even that they didn’t need the equipment again I would write it down and log it in the Care Log as well as reporting to co-ordinator, senior carer or manager, they would then report this to the occupational health team who would then organise for an assessment of the equipment in place and if necessary change or alter the equipment to suit the individual’s needs at that time. If there was an issue with appliances for example couldn’t work the cooker anymore etc. again I would record my findings in the Care Log along with to my co-ordinator,  senior carer and manager, I would also see if I could speak to the family to see what they suggested and also to see if I could suggest anything for example a microwave instead of a cooker and maybe bigger handled cutlery instead or normal cutlery etc. If I had a problem with the support provided I would again rec ord in the Care Log along with my co-ordinator, senior carer and manager. These concerns would possibly be told to the family and also could be reported to healthcare professionals along with the individuals social worker.

Banned Books Essay

Banned books are becoming more current in this day of time. People often do not understand the challenge of books or why a book is being banned. Ken Petrilli, the author of â€Å"Banned Books Week: Celebrating You (and Celebrating Your (and Your Teens! ) Freedom to Read† in the Young Adult Library Services summer of 2009, talks about how he understand, how the parents feel about some books being banned. He also advised ways to make displays for banned books week. Petrilli is a teen service librarian, a musician, and serves on the YALSA’s Intellectual Freedom Committee. â€Å"To Read or Not to Read: Understanding Book Censorship† by Deborah Connelly, was published in the Community and Junior College Libraries in the year of 2009. In Connelly’s article, she wants people to know what book censorship means and how librarians deal with people who want to challenge books. In both articles each writer gives a description of why books are banned. Petrilli’s article has less information but his credibility comes from his services as being a librarian and serving on the YALSA’s Intellectual Freedom Committee. Connelly’s article has more information but nowhere in her article is her credibility. However, by analyzing both of the articles neither Petrilli nor Connelly’s articles are scholarly. In the article Ken Petrilli’s â€Å"Banned Books Week Celebrating You (and Your Teens! ) Freedom to Read† article is to be read by young adult and their parents, and other librarians. Young adults often wonder why their parents or other groups will not allow them to read certain types of books. He state, â€Å"As teen and young adult librarian; we are on the frontline of intellectual freedom issues more than anyone else in our profession. †(Petrilli 4) While on the other hand parents do not agree with the materials and content that is in the book that their young adult reads. Where he states â€Å"Parents concerned about what their children are reading. This, in and of itself, is not necessarily a bad thing: we want to see parents who are concerned! † (Petrilli 4) In Deborah Connelly’s article â€Å"To Read or Not to Read: Understanding Book Censorship†, talks about how people should have the right to read. Connelly states â€Å"While history shows that there are those that try to suppress the right to read, there are also those that have worked tirelessly to preserve it. †(Connelly 84) In challenging and banning books many parents often ban so that their child cannot read a book with rudely contents; it should be up to the parent to make that decision for their child or young adult to read a certain book. Not to ban the book from the whole community. Connelly states â€Å"Many of these statements deal with parents being the ultimate role model and advocate in what they feel is right for their child and how to empower their child to make decisions based on their values in regards to what they read. ( ALA2008) (Connelly 86) When a book that is being Challenged mostly parents or specific groups, the books are sometimes banned because they may have seen or heard that the challenged book may have a little sexual content, profane words, or unmorally things in its context. The parents or groups who challenged these books do not fully read the materials to get the full understanding. Connelly suggests reading the books before a parent or group challenges the book because there are a couple of words that they do not agree with. Connelly states â€Å"Many times those that consider banning a book do so without examining the work. (Jocelyn Chadwick 2000)(Connelly87) According to Petrilli in his article he sympathizes with the parents who have had some parent and groups who had some books banned. He clearly states that, â€Å"I think it is important for us to remember not to overtly demonize most potential challengers. They are, after all, people just like us, and being concerned for our children’s well-being is never wrong. † (Petrilli 4) Petrilli also wants to support the Banned Books Week, by giving suggestions on how to display the library and to have discussions about banned books. He states â€Å"What I do is important and the fighting for our collections and our teen patrons is a battle. (Petrilli 5) Petrilli feels that people who challenged books because they feel as if these books with the explicit details or will corrupt the minds of their young adults. He states â€Å"This fear is often disguised as moral outrage. They want to believe that if their children don’t read about it, their children won’t know about it. And if they don’t know about it, it won’t happen. †(Petrilli 4) Connelly believes that during the challenges of banning a book, a librarian has a big role to play. First the librarian has to face the issues of day to day of book challenges and to insure they know the policy. Connelly states, â€Å"The librarian of today is still faced with controversial issues regarding politics and religious connation within books or any other materials are challenged, these policies will be on place to refer to as a bases for the selection. † (Connelly85) Connelly also believes that if the Office for Intellectual Freedom did not create a policy for the American Library Association there will be a few books that will not be banned today due to all the books that were banned years ago. People will be limited to what they can read. The freedom of reading would vanish. In her article she stated â€Å"The Freedom to read contains seven propositions, each one as important as the other. † She also states, â€Å"To truly feel the passion and thought placed behind these propositions, one must read them. †(Connelly 84) She also suggests that the librarians should know what to do when a book comes up to be challenged. The librarian has to be professional and also opened mined as well when it comes to a parent or group challenging a book or materials. Although librarians have a great deal of responsibility, Connelly states â€Å"A librarian must keep in mind the diverse patronage of their establishment and provide materials that are accessible to everyone. † (Connelly 85) Connelly also lets her readers know that if he or she are going to challenge a book then he or she should also know the guidelines. A person just cannot go a say â€Å"I want this book banned† or â€Å"Take this book off the shelf because it is inappropriate for my child or young adult to read. † There is a process the challenger has to fill out forms, have names of those who assist. Then state the reason why the book or material is being challenged. Connelly also advised her readers that there might be some legal issues in giving young adult sexually explicit materials. So the readers might want to check in their state to find out the laws about simply giving some that is not of age, sexual explicit materials. Connelly states â€Å"An Oregon law was passed that â€Å"criminalizes the dissemination of sexually explicit material to anyone under the age 13and ect. †(Connelly 86) Petrilli casually, lets his readers know that even though there is a banned books week, that there are still going to be a deal of banned books challenges. And books will be banned. Petrilli states â€Å"Never forget that potential challengers are out there and some are motivated by fervent religious or potential beliefs. † (Petrilli 5) By Petrilli being employed as a young adult and teen service librarian he has hands on experience with having books or materials challenged. In the beginning of the article Petrilli gives a brief description of what Banned Books week is. He says that, â€Å"Banned Books Week is observed the last week of September each year and it has been observed every year since 1982. †(Petrilli 4) Petrilli also lets the book challengers know that equal opportunity and access should be the readers right. It should not be because the challenger is not pleased with it. In Petrilli’s article he states â€Å"We provide equal access for anyone to whatever it is they are looking to read: and that includes the teens we works with every day. (Ptetrilli 5) Petrilli also is persuading his readers to participate in Banned Books week as a librarian Petrilli wants his readers to support this event. To Pertilli it is imperative that parents, young adults, and groups so he or she can become more comfortable with their freedom to read or to learn and understand why some books and materials are being challenged and banned from the community. Connelly wants readers to know, that librarians are not against all books being challenged. She states, â€Å"Librarians are not the only member of need to protect the Freedom to Read. †(Connelly 86) She goes on and states â€Å"Lastly, the most underused but most influential tool that librarians have in dealing with book controversy is their own voices. †(Connelly 85) Connelly also wants the challengers to maybe rethink his or her intent to challenge a book. She clearly states, â€Å"All in all, censorship is based on fear and emotions. † (Connelly87) Connelly also states â€Å"Knowledge is the key to understanding. † (Connelly87) In the article Connelly shared that there was a little stir-up about the book that was banned and removed from several libraries which was The Adventures of Huckleberry Finn by Mark Twain. This book was said that was banned due to the content of the n used several times in the story. Connelly used this in her article for a perfect example of book banishment. She stated â€Å"†it is easy to see how this could upset people to the point of removing this book from schools. † (Connelly 86) Connelly points out to the audience, that the assistant professor at Harvard University, Jocelyn Chadwick had studied Mark Twain’s work for years. She wanted to get a full understanding of his book. Since people was upset about the book because of the n word was so offended that it never appeared to them that the book was scene was written for the time frame that Mark Twain The Adventures of Huckleberry Finn was based on. It seems like Connelly agrees with Jocelyn Chadwick she quote, â€Å"There are countless resources available to the community that provide information about censorship (pro or against), litigations, organizations, and other useful materials that can assist people to make better informed decisions about questionable literature. (Connelly 87) In the two articles that have been analyzed, through the types of claim, that Petrilli is proposing that it is to the challengers and non- challengers benefit to attend a Banned Books week at his or her nearest library. Connelly suggests that before a person challenge a book read the book form beginning to end, to understand the book better to get the feeling of emotions when reading the book. Who knows the book might not be all that damaging. The rhetorical triangle of Petrilli’s article had the Emotional appeal. Connelly’s passage was that of more of and logical appeal. The writing style for Petrilli’s article was unbiased and casual. Whereas for Connelly’s writing stlye was biased where she want people to understand what book banning really is. Neither Petrilli’s nor Connelly’s articles is scholarly. There was not enough information in Petrilli’s article and there was no credibility in Connelly’s article.

Tuesday, July 30, 2019

Personal Values and Ethical Standards

Ethical codes determine a person’s outlook on right and wrong. It influences their interactions with people (Williams, 2011). Personal ethics and professional ethics may differ each influences the other, and sway the workplace environment (Williams, 2011). Companies want their corporate traditions to have a sense of ethical responsibility (Williams, 2011). Frequently, professional ethics covers the same principles of personal ethics, for example honesty, and fairness (Williams, 2011). These principles may also extend to company loyalty (Williams, 2011). Responsibilities Personal ethical responsibilities mainly include people closest to you, for example your family, friends or neighbors, requiring family responsibilities before job responsibilities (Williams, 2011). Professional ethical responsibilities are more diverse and wide-ranging for example, not discussing a patient's history, and putting a person's well being first (Williams, 2011). Professional ethics requires reporting any suspicious or harmful activity, for example if a teacher suspects a student is experiencing abuse or neglect (Williams, 2011). Codes for Personal Values As a human service professional, my values, and morals are set high. My peers and clients look up to my decisions. This is why I relate to of the National Association of Social Workers Ethical Codes, which are 1. 01 Commitment to Clients and 1. 02 Self Determination. Code 1. 01 states, a social workers’ main responsibility is promoting the well ­being of clients (NASW, 2008). Code 1. 02 states, social workers are to respect and promote the rights of clients to have self determination by assist clients in efforts to identify and explain goals (NASW, 2008). Ethical Dilemmas Influences Personal ethics mainly depend on a person's life relationships, for example, what he or she learns from their parents, teachers, and religion (Williams, 2011). People are also influenced by the experiences from childhood dilemmas, for example lying, cheating, or violence (Williams, 2011). Professional ethics is founded on the principles of a profession (Williams, 2011). A person may be legally required to obey ethical principles, such as confidentiality, in the case of doctors or lawyers (Williams, 2011). ? ? Practice and Personal If a social worker suspects that a child is abused, it is their professional responsibility to make any determination about the matter for the protection of a child (NASW, 2011). This is an ethical dilemma that I will not have a problem reporting. I know that some people my hesitant because they feel they maybe tearing apart a family, but I know that I will be protecting a life. Child Abuse Each state has child abuse laws that vow the protection for a child who is abused, mistreated, or neglected. Although each state agrees the protection of a child, each state may handle the reports differently, or how the accused will be fined or jailed. For instance, an individual who lives in the state of Mississippi can remain anonymous when reporting a child abuse reports (MDHS, 2011), but in the state of Texas remaining anonymous is not encouraged (Texas Department of Family Services, 2011). Each state has established that an individual under the age of 18 is considered a child. Arizona’s law states that a child does not have to show any signs of injury when reporting a child abuse case, but this could be interpreted for of verbal abuse (About, 2011). In the state of Mississippi verbal abuse is a sign of abuse (MDHS, 2011). When a case is not reported in Texas it is a Class B Misdemeanor with a fine of $2000, and a possibility of 180 days in prison (ATPE, 2010). If a case is not reported in Mississippi, and the person is found guilty the fine is up to $5000, and the jail time could be up to one year (MDHS, 2011). Arizona and Georgia violation of child abuse laws is considered a misdemeanor if there is failure to report indication of child abuse (Child Abuse Law, 2011). The above states each have different aspects of what constitutes abuse, but all compare that any sign of bodily harm is a sign of child use. Practice and Conflict According to Code 1. 01, it is the responsibility of the Social Worker to promote the well being of their clients (NASW, 2011). Certain professions require people to be objective and impartial, which may conflict with a person’s ethics, such as compassion, and willingness. Individuals find separating their personal and professional ethics helps (Williams, 2011). Some opinions are very personal and may need to be set-aside to do my job (Williams, 2011). Handling spousal abuse is an area that will be personal that I may have a hard time separating out my personal and professional views and values. My problem is that you cannot help someone that does not want to be helped. Spouse Abuse Domestic violence and spousal abuse come in different forms. Whether it is physical, mental, or verbal abuse a person can be assaulted, stalked, sexually taken advantage of, or harassed. Each state has standards surrounding domestic violence and spousal abuse. Spousal abuse is a serious crime and needs to be addressed by law enforcement along with the courts, so victims are protected. Procedures help prompt an effective response to any domestic violence case. Chief Law enforcement officers are responsible for procedures used and are responsible to conform to standards (Supreme Court of New Jersey Attorney General of the State of New Jersey, 2008). Comparing New Jersey, Texas, Arizona, and Georgia each seem to have the laws toward domestic violence. One issue that the state of Arizona addresses differently from the other states was that Arizona has many laws to protect the victim’s service providers, such as testimonial privileges, evidentiary privileges, nondisclosure laws, confidentiality of communications. Statutory law, common law, Case Law, Regulation, outlines these. Ethical Standards and General Principles Professional ethics is the center of social work, and profession has an obligation to express basic values, ethical principles, and ethical standards (NASW, 2011). The NASW Code of Ethics has set values, principles, and standards to guide social workers’ manner. The Code is appropriate to all social workers and social work students (NASW, 2011). The use of psychological tests in the courtroom 1. 07 Privacy and Confidentiality j) Social workers are required to protect the confidentiality of clients during legal proceedings to the full extent of the law (NASW, 2011). When a court of law orders social workers to disclose confidential information without a client’s consent the social worker should request that the court maintain the records, so they are unavailable for public inspection (NASW, 2011). Ethical Principle Social workers pursue social change for vulnerable i ndividuals, and are focused on issues of poverty, unemployment, discrimination, and other forms of social injustice (NASW, 2011). Social workers attempt to guarantee access to needed information, services, resources, equality of opportunity, and meaningful participation in decision making for all people (NASW, 2011). The lie detector 1. 16 Termination of Services (b) Social workers need take reasonable steps to avoid abandoning their clients who still need of services (NASW, 2011). Social workers need to assist in making appropriate arrangements for continuation of services (NASW, 2011). Ethical Principle? Social workers are continually attentive their profession’s mission, values, ethical principles, and ethical standards (NASW, 2011). Social workers proceed honestly and responsibly while promoting ethical practices within the organizations they are affiliated (NASW, 2011). Boundaries of competence 1. 04 Competence (a) Social workers provide services and represent themselves as competent within the boundaries of their education, training, license, certification, consultation received, supervised experience, or other relevant professional experience (NASW, 2011). Ethical Principle Social workers elevate service to others above themselves (NASW, 2011). Social workers rely on their knowledge, values, and skills to help others in need; along with addressing social problems (NASW, 2011). Social workers are asked to volunteer their professional skills with no expectation of financial return (NASW, 2011). Integrity Ethical Principle Social workers are continually attentive their profession’s mission, values, ethical principles, and ethical standards (NASW, 2011). Social workers proceed honestly and responsibly while promoting ethical practices within the organizations they are affiliated (NASW, 2011). 1. 6 Conflicts of Interest (a) Social workers need be aware and avoid conflicts of interest that may interfere with the implement of professional judgment and impartial judgment (NASW, 2011). Social workers need to inform clients when a real or potential conflict of interest arises, so the take the logical steps to solve the issue in a manner that makes the clients’ interests first and protects clients’ interests to th e highest extent possible (NASW, 2011). In protecting a clients’ interests may require termination of services with a referral of the client (NASW, 2011). b) Social workers need not to take advantage of a professional relationship to further their personal, religious, political, or business interests (NASW, 2011). Sexual harassment Ethical Principle? Social workers need to treat every person with a caring and respectful attitude, which is mindful of individual differences, cultural, and ethnic diversity (NASW, 2011). Social workers should promote clients’ socially responsible through self determination (NASW, 2011). Social workers may seek to enhance a client’s ability and opportunity to change through addressing their needs (NASW, 2011). . 11 Sexual Harassment Social workers cannot sexually harass clients, which includes sexual advances, sexual solicitation, requests for sexual favors, and other verbal, or physical conduct of a sexual nature (NASW, 2011). Human differences 1. 15 Interruption of Services Social workers need to make a reasonable effort to ensure stability of services in the event that services are interrupted because of unavailability, relocation, illness, disability, or death (NASW, 2011). Ethical Principle Social workers need to understand that relationships among people are an important opportunity for change (NASW, 2011). Social workers who engage people as partners are helping process (NASW, 2011). Social workers who seek to strengthen relationships among people are helping by promote, restore, maintain, and enhance the well ­being of individuals, families, social groups, organizations, and communities (NASW, 2011). The legal definition of insanity Ethical Principle Social workers who continually strive to increase their professional knowledge and skills are applying them in practice by contributing to the knowledge of the profession (NASW, 2011). 1. 14 Clients Who Lack Decision Making Capacity Social workers acting on the behalf of clients, who lack the capacity to make informed decisions, are helping by taking the reasonable steps to protection the interests and rights of those clients (NASW, 2011). Conclusion The ethical decision making process helps in instances which a social worker does not have simple answers available to solve complicated ethical issues (NASW, 2011). Social workers need to take into consideration all the values, principles, and standards relevant to any situation, in which ethical judgment are necessary (NASW, 2011). A social worker’s decisions and actions need to be reliable with the character, and the letter of the Code of Ethics (NASW, 2011). References Arizona Coalition Against Violence. (2003, August). Confidentiality For Domestic Violence Service Providers In Arizona Under Federal And State Law, from http://www. delapointe. net/diannepost/docs/confidentiality_manual. df Association of Texas Professional Educators. (2010). Child Abuse Reporting In Texas, from http://www. atpe. org/protection/YourStudentsAndParents/childabuse. asp Authority of the Supreme Court of New Jersey and the Attorney General of the State of New Jersey. (2008, October). State of New Jersey Domestic Violence Procedures Manual, from http://www. judiciary. state. nj. us/family/dvprcman. pdf Child Abuse Laws. (2011), from http://law. jrank. org/page s/11836/Child-Abuse. html Georgia Department of Human Services. (2011). Child Support Services, from http://ocse. dhr. georgia. gov/portal/site/DHS-OCSE/ Find Law. (2011). Georgia Child Abuse Laws, from http://law. findlaw. com/state-laws/child- abuse/georgia Mandatory Reporting Rules. (2009), from http://www. state. nj. us/ooie/helpful/mandatoryreportingdescript. html Mississippi Department of Human Services. (2011). Division of Family & Children's Services, from http://www. mdhs. state. ms. us/fcs_prot. html National Association of Social Workers. (2008). Code of Ethics of the National Association of Social Workers, from http://www. ocialworkers. org/pubs/code/code. asp State of Texas Office of Court Administration. (2011, September). The Texas Family Violence Bench Book, from http://www. courts. state. tx. us/pubs/Manuals/judges/DomesticViolenceBenchBook. pdf Williams, E. (2011, January 19). Personal vs. Professional Ethics, from http://www. ehow. com/info_7820090_personal-vs-professional-ethics. html Women's Law. (2011, August 24). Georgia Statutes, from http://www. womenslaw. org/statutes_detail. php? statute_id=1219#statute-top

Monday, July 29, 2019

Bullying Essay Example | Topics and Well Written Essays - 1000 words

Bullying - Essay Example It is the interest of this discussion to inform the reader on the aggressive and harming instrument of work place bullying (Field, 1996). This discussion will study ways of handling bullying, consequences of the employees involved in bullying, and the effects of bullying in the organization they work. Discussion Bullying is closely associated with learning institutions, but a growing number of reported cases of work place bullying is worrying and shifted the focus. Work place bullying is defined as any negative conduct that shows little or no regard for the workers by their employers or colleagues. This humiliating misconduct may be generated by a worker against another worker or worse still, by a person of higher authority in the work place to the workers. According to Douglas (2001), the reason as to why managers bully their workers is presumably to hide their inadequacies from the board and the workers. He reiterates that only inadequate managers bully their workers. 80% of workpl ace bullying occurs between a manager and an employee. Managers or senior workers are said to engage in bullying to hide their inadequacies and weaknesses. ... Some of them also think that by bullying others, they will hide their lack of skills in doing things, by blaming it on others (Field, 1996). However, bullying among colleagues is not as common as bullying among senior workers to the employees. The fear of losing one’s job makes many of these employees never report cases of bullying (Douglas, 2001). How to Deal With Work Place Bullying It is often extremely hard to prove bullying as a form of criminal activity. Many perpetrators of bullying behavior often go unpunished because there lacks enough evidence to prove that their behavior causes harm. Nonetheless, the best way to deal with bullying in the work place is to be informed on how to protect oneself from any acts of abusive conduct perpetrated either from a co-worker or the manager. Maintaining substantial personal boundaries with your seniors and bullying co-workers is perhaps the best way to self-protection (Adams & Crawford, 1992). When one is being bullied especially by a co-worker, the best way is to stop them from their actions and explain how one feels about their harassing behavior. This action, as he reiterates, invokes in them the consciousness of their behavior prompting a change from their actions. Keeping calm is another way of dealing with a bully. This helps in preventing a confrontation if one were to react towards the bullying behavior. Keeping calm helps someone from getting upset, thereby avoiding a collusion that would otherwise project the whole situation (Field, 1996). Consequences and Effects of Bullying on the Employees There are numerous consequences of bullying to the employee affected. There have been cases of reported health problems to

Sunday, July 28, 2019

The Pioneers Term Paper Example | Topics and Well Written Essays - 2250 words

The Pioneers - Term Paper Example This paper is a critical analysis of contributions of Isaac Newton and Aristotle, some of the most distinguished scientific pioneers in the history of humanity. Isaac Newton Sir Isaac Newton, a distinguished English philosopher is considered as the most creative and prominent scientific theorist of all times. His most remarkable contribution in mathematical and scientific fields includes the discovery of infinitesimal calculus and pioneering theories in the study of light and color. Moreover, Isaac Newton revolutionalized physical science by the discovery of the three laws of motion and the law of gravitational pull (Westfall, 1971). His contribution in science and mathematics resulted to development of classical mechanics, a very influential scientific discipline. Though Isaac Newton is considered to be one of the most original thinkers, he collaborated the works and ideas of other scientists in the 17 century and before such as Kepler, Galileo, Descartes and Copernicus among others . Isaac Newton asserted this fact by acknowledging in one of his most famous quote that if he had seen further, it was by standing on the shoulders of giants (Alexandre, 1965). He distinguished himself as a brilliant physicist, astronomer, mathematician, alchemist and as a natural philosopher. According to Westfall (1971), Isaac Newton was born in January 4, 1643 to Hannah Ayscough and Isaac Newton. His actual place of birth was at Woolsthorpe, a rural town in Lincolnshire County. During his birth, the Gregorian calendar was not used in England then and hence his birth date was recorded using the Julian calendar as 25 December 1642. The Gregorian calendar, which is the modern style, was adopted in 1752 in England and it was ten days ahead of the Julian style (Westfall, 1971). Isaac Newton was born prematurely and his father had died three months prior to his birth. Later, his mother Hannah remarried when the boy was just three years old, an incident that most Newtonian biographers c onsider as traumatic to his childhood and adulthood. Soon after his mother remarried, Isaac Newton was left under the care of his maternal grandmother Margery Asycough (Westfall, 1971). Isaac Newton was separated from his mother until 1653, when she returned to her motherland after the death of her second husband. He enrolled at King’s school after refusing her mothers attempt of dropping him out of school to train him become a farmer. Isaac Newton’s early academic life was lackluster, but he later, he discovered his abilities after joining Cambridge University from Woolsthorpe in 1661 (Hall, 1980). Cambridge University is a renowned institution of higher learning but at the time of Isaac Newton admission, the centre had not yet grasped emerging scientific changes in its curriculum (Hall, 1980). In this regard, Ackrill (1981) noted that the curriculum was based on ancient works of Aristotle and other classical authors. In this respect, most biographers affirm that Isaa c Newton’s undergraduate studies involved a lot of Aristotle, resulting to his undistinguishable academic performance. However during this time, Isaac Newton concentrated and mustered the works of

Saturday, July 27, 2019

The Gunpowder Plot Essay Example | Topics and Well Written Essays - 3000 words

The Gunpowder Plot - Essay Example The failed plot to assassinate James I and the ruling Protestant elite tainted English Catholics with claims of treason for centuries thereafter. In this paper I describe the infamous Gunpowder plot before discussing its resolution and the implications for English Catholics before their emancipation. The year 1603 marked the end of an era where Catholics were in a transitional phase between rulers and had the opportunity to fundamentally alter their subjugate role within society. After nearly 45 long years as Queen of England, Elizabeth I was nearing death. It was assumed that her successor would be James VI of Scotland. Had this have been the scenario, Catholics would have been able to celebrate increased freedom as James VI was more lenient towards catholicism (Smith 1998). This was pleasing to the English Catholics as this could have marked an end to their suffering. They had suffered severe persecution since 1570, when the Pope had excommunicated Elizabeth, releasing her subjects from their allegiance to her. Additionally, The Spanish Armada of 1588 continued to make matters worse. To the Tudor State, it was held that each and every follower of Catholicism were potential traitors (Adams, 2005). They were forbidden to hear Mass, forced instead to attend Anglican services, with steep fines for those recusants who persistently refused (Smith 1998). Since James was more warmly disposed to Catholicism than the dying Queen Elizabeth. His wife, Queen Anne of Denmark, was a Catholic, and James himself was making vocal about his empathy with the plight of the Catholics. Moreover, historians contend that the early signs were encouraging to catholics as he ended their political dissatisfaction. In fact, he immediately ended recusancy fines and awarded important posts to the Earl of Northumberland and Henry Howard, another Catholic sympathizer (Questier, 2006). Catholics began to openly practice their beliefs as they became increasingly optimistic about their future in England (Smith 1998). While some individuals indicate that Catholics should have never felt any sense of security, others indicate that the Catholics were well on their way to emancipation. In his attempts to accommodate different religious demands, James was dissatisfied at their growing allegiance. This is because of his religious devotion to his own beliefs. Moreover, the uncovering of the 2 plots in 1603 created obstacles to James’ capacity to further empathize with the Catholic followers. The situation deteriorated further at the Hampton Court Conference of January 1604 where James I was explicit in his show of hostility against the Catholics in order to satisfy the Puritans, whose demands he could not wholly satisfy. Furthermore, in the following month he publicly denounced Catholicism. This was followed by every priests and Jesuits had being expelled as well as the resurgence of recusancy fines. The taste of freedom coupled with the abrupt 180 created an aura of despe ration that hit home with some of the most devout followers. Specifically, Robert Catesby was a devout Catholic whose father had been imprisoned for harboring a priest. Moreover, he had had to leave university without a degree, to avoid taking the Protestant Oath of Supremacy. Yet he possessed immense personal magnetism, crucial in recruiting and leading his small band of conspirators. James’ discontent is arguably because of the fact that the Catholic followers were so devout to the pope. He assumably didn’t want to have his constituents loyal to another leader. This perhaps caused him to be more cruel to the followers. Moreover, many sources indicate that there were fears of the pope attempting to take over. This is why kings did not want to allow this religion to proliferate within their borders. As kings

Friday, July 26, 2019

The Broadway Cafe Case Study Example | Topics and Well Written Essays - 1750 words

The Broadway Cafe - Case Study Example One of the major significances of Porter’s five forces model is its ability to predict even the future challenges and opportunities of an organization. â€Å"Porter's 5 Forces tool is a powerful tool for understanding where power lies in a business situation because it helps you understand both the strength of your current competitive position, and the strength of a position you're considering moving into† (Porter’s Five Forces, 2011) According to Michael Porter, Threat of new entrants, bargaining power of supplier, bargaining power of buyers, threats of substitute products, industry rivalry or competition etc are the five forces which shapes the present and future of an organization. (Porter’s Five Forces Model, 2009). The figure given below illustrates the Porter’s five forces theory. (Porter’s Five Forces Model, 2009) In the given case study, Broadway cafe is struggling to survive in the current business climate, even though they had good business and reputation in the past. This is entirely because of the lack of modernizations undertaken in Broadway Cafe based on the changing trends in business and management. Broadway cafe is trying to operate their business with their older management and business methods which were big successes in the past. However, such older methods may not be successful at present because of the changing needs and life styles of the current customers. This paper analyses the given Broadway Cafe case study based on Porter’s five forces model and provide some suggestions for the rebuilding process of Broadway Cafe for the twenty first century. Analysis of Broadway Cafe with respect to Porter’s Five Forces Model According to Porter, substitute products are one of the major challenges for a product manufacturer or service provider. In his opinion, substitutes are those products which can offer a real alternative to a particular product. The Broadway cafe offers many different kinds of specialized coffees, teas, a full service bakery, and homemade sandwiches, soups, salads etc. All these products offered by Broadway cafe had a unique taste and identity in the food market earlier. However, the entry of new recipes and other food items caused big problems to Broadway cafe in recent times. The traditional food habits changed a lot and instead of the conventional restaurant or cafe items, fast foods conquered the food markets at present. Instead of nutritious people started to attract towards food items which offered greater tastes and convenience in usage. For example, the traditional food items like the Broadway’s homemade sandwiches, soups, salads etc have given way for fast food items from KFC, McDonald’s etc because of the greater tastes offered by these items. Threat of new entrants is the second factor which may affect the business of an organization according to Porter. Globalization and Liberalization have brought many new business groups to America and a substantial number of such new entrants are the restaurant groups from different countries. America is a country in which different people from different parts of the world are working and staying together. This diverse population may have their own preferences for food items and hence new food services companies find immense opportunities in America at present. It is easy for a foreign company to establish businesses in America at present because of the liberalized norms for establishing a business. Under such circumstances, Broadway cafe cannot survive in the market with the help of their traditional

Thursday, July 25, 2019

Advantages and Disadvantages of Conducting Business Offshore Essay

Advantages and Disadvantages of Conducting Business Offshore - Essay Example Therefore, the tax reasons for offshore business are the principal factors in deciding to start the business offshore, though there are other advantages and disadvantage. Making a decision of conducting business offshore entails the motives of establishing a business for a given purpose in a country having different corporate and commercial laws. In fact, there are alternatives allowing solutions like organization of relationships, which are created between the stakeholders of the business contrary to the commercial laws. Consequently, this is a significant way of reducing the level of administrative duties regarding financial statements and tax return, which are not submitted or entries made in the commercial register. Nevertheless, the main objective of the paper is to explore the advantages and disadvantages of conducting business offshore (Gitman and McDaniel 44). Advantages One of the advantages of conducting business offshore relates to the investor or owner protection due to a nonymity that is considered a vital factor of investing. Therefore, there is an advantage associated with anonymity in the beginning phase of a business regarding the utilization of anonymous business with unknown owners. In fact, this is mainly for the purpose of protection against interference from the government bureaucracy and crime. Moreover, this reduces the regulations imposed on a certain business activity in situations such as transacting in business environments in less developed countries. An exemplary example is options regarding a trade of the foreign securities in a country with rules concerning the foreign exchange. Therefore, this makes the business to avoid being subjected to these regulations, given that these kinds of regulations are not common (Bertho 100). The other advantage relates to the taxes, where the international businesses seek ways of maximizing their profit through reduction of cost, which include the tax burden. Therefore, this has been a source of i nspiration for many counties in the world, whereby they reduce taxation imposed on international business in order to attract investors, since the business started through their ventures contributes significantly to the economy due to creation of employment. In this case, this is used as a way of utilizing the advantages provided by governments in this countries and the fiscal system in order to optimize profit or reduce the tax burden through the international tax planning (Committee on the Offshoring of Engineering 143). However, international tax planning has gained popularity due to inappropriateness associated with the taxation in the developed counties. In fact, there is cost incurred by the companies seeking to earn income from which tax is deducted, for example there are cost incurred due to assignment of variables or the sale securities. In situations when a company suffers losses associated with these activities, the subsidiaries that are established become helpful due to the suitability of the tax environment. Therefore, the businesses conducted offshore benefit substantially through minimization of the rate of income tax, where by the business environment can offer a chance for increasing number of tax deductions from revenue gathered from the transaction (Ramanathan 18). Disadvantages There are disadvantages associated with the offshore business, which makes its business model to be unsuitable for some investors. One of the reason is that is poses the threat of destroying the economy of a country, since there are numerous permanent jobs that are lost, while the increasing number

The History of Deregulation of Aviation in the Airline Industry Research Paper

The History of Deregulation of Aviation in the Airline Industry - Research Paper Example According to Smith & Cox (2007), one decade of airline decontrol implementation led to 35% growths in the airline industry, through increased employment and passenger travel. The two economists say that traveling increased by 55 %, as the real travel cost decreased by approximately 17% in the major routes. They found that by the second decade, ticket prices decreased by 20% in real terms, while passengers served were 324 million. Historically, airline services were partially regulated, because of oligopoly and monopoly concerns, as only a few airlines provided flights that were direct between cities. The aim of the US airline deregulation was to control entries and reduce prices in the transport system in the United States. Since then, many other nations have seen the need to deregulate their domestic airline markets, and this has effectively been applied in European Union airline markets. Today a big number of international airline markets are subject to tight airline regulations. In the United States, airline deregulation was born from the 1925 Air Mail Act and the 1926 Air Commerce Act. Serious commercial aviation economic regulation began in 1938 with Civil Aeronautics Act passage. The creation of the Civil Aeronautics Board (CAB) gave it the power to regulate and control airline routes as well as market entry and exit, and mandate service rates. Later, airline safety regulation was passed together with the 1958 Federal Aviation Act that bore Federal Aviation Administration. By 1938, US government was regulating much commercial aviation in terms of routes, schedules, and fare. The three main functions of the CAB are regulating airline route, limiting new market entrances by air carriers, and regulation  of passenger carriers.

Wednesday, July 24, 2019

Change Management and Communication Plan Essay Example | Topics and Well Written Essays - 250 words

Change Management and Communication Plan - Essay Example cks into manufacturing products that are customers’ tailored and hence satisfying customer needs which translates into increased market share and hence large revenue fetched. The firm should employ a system where current form of power based on positions that leads to inferiority is scrapped and replaced by collaborative organizational designs amongst employees and management and customers thus incorporating every stakeholder in decision making process (Corvette, 2006, p. 67). A proper chain of command should be designed where each department is tasked with distinct role with public relation assigned to listen customers’ complaints and subsequently integrating such complaints to manufacturing process to produce products that meet customers’ needs and hence inventory management as accumulation is curbed which is a cost-effective strategy. Letting decisions in the hands of employees is a good approach to organizational management but only when embedded on proper chain of command (Greenwald, 2008, p. 122). A well-established communication plan will help Riordan firm to harmoniously incorporate all stakeholders which translates to acceptance of policies hence easy implementation which leads to customers loyalty and expansion of the

Tuesday, July 23, 2019

Jeremy Bentham and Immanuel Kant on Suicide Essay

Jeremy Bentham and Immanuel Kant on Suicide - Essay Example Whether this number of suicide cases is reasonable or not, it is assumed that when the act was committed and even only at that point, an individual had considered suicide as the most reasonable means of surviving the situation, and that the number of people who accept such an idea may in fact be increasing. The 18th century philosophers Jeremy Bentham and Immanuel Kant constructed ethical principles that determined the rightness or wrongness of suicide. The act of suicide is not moral based on the ethical principles authored by Jeremy Bentham and Immanuel Kant. Bentham’s philosophy is defined by the value of the action in terms of utility, which roughly translates as human benefit, and so suicide does not give a person any material benefit in the long run for it almost always results in death. For the British philosopher, the moral basis of an action is how much utility it affords the individual. This translates as pleasure and avoidance of pain according to â€Å"its intensi ty, its duration, its certainty or uncertainty, its propinquity or remoteness† (Perry & Bratham 485). Most people would contend that suicide may bring the individual peace and freedom from any more physical pain as he dies. However, committing suicide is also through pain itself, which is never a benefit to the individual. The intensity and duration of the act of suicide must be equivalent to the intensity and duration of pain that the person will experience. ... After all, there is no guarantee that there is no more spiritual pain and torment in the afterlife even if death meant the cessation of all physical pain. Thus, suicide is not moral because it does not truly give the guarantee that one is freed from pain just because one dies. After all, there is no authentic proof that the afterlife is a life of eternal goodness and pleasure. Moreover, suicide is not moral because it is followed by undesirable circumstances. For Bentham, an act is moral also if it is followed by sensations of the same kind, which is known as fecundity, or if it is not being followed by sensations of the opposite kind, which is known as purity (485). In terms of fecundity, no one can really be sure about suicide as its usual consequence is death. However, based on Bentham’s definition of fecundity, the sensations of pain from suicide may actually be followed by more pain in the afterlife or in the physical life if the person did not actually die. On the other hand, when it comes to purity of action, even if the suicide were painless, there is no guarantee that there is no more pain for the individual in the afterlife. Moreover, there must even be a lot of pain that he would leave in the physical world. There is therefore no escape from pain when it comes to suicide, thus it is not a moral act. Suicide is also not moral because it negatively affects many people. For Bentham, one last basis of the morality of an act is its â€Å"extent† or the number of people who are affected by it (485). This means that the person who dies from suicide leaves behind family members and friends who would grieve his death or who would suffer in this world because of him. For example, if he were a doctor

Monday, July 22, 2019

Types of Channels in Marketing Essay Example for Free

Types of Channels in Marketing Essay Most businesses use third parties or intermediaries to bring their products to market. They try to forge a distribution channel which can be defined as all the organisations through which a product must pass between its point of production and consumption Why does a business give the job of selling its products to intermediaries? After all, using intermediaries means giving up some control over how products are sold and who they are sold to. The answer lies in efficiency of distribution costs. Intermediaries are specialists in selling. They have the contacts, experience and scale of operation which means that greater sales can be achieved than if the producing business tried run a sales operation itself. Channel levels consist of consumer marketing channels or the industrial marketing channels. A factor common among both channel levels is that both include the producer as well as the end customer. 1) Zero Level channel / Direct Marketing Channel – Consists of a manufacturer directly selling to the end consumer. This might mean door to door sales, direct mails or telemarketing.  Dell online sales is a perfect example of a zero level channel marketing. 2) One Level channel – As the name suggests, the one level channel has an intermediary in between the producer and the consumer. An example of this can be insurance in which there is an insurance agent between the insurance company and the customer. 3) Two level Channel – A widely used marketing channel especially in the FMCG( fast moving consumer goods are products which are sold at a relatively low cost and are sold quickly) and the consumer durables industry which consists of a wholesaler and a retailer. ) Three level channel – Again observed in both the FMCG and the consumer durables industry, the three level channel can combine the roles of a distributor on top of a dealer and a retailer. The distributor stocks the most and spreads it to dealers who in turn give it to retailers. Number of intermediaries There are three broad options intensive, selective and exclusive distribution: Intensive distribution aims to provide saturation coverage of the market by using all available outlets. For many products, total sales are directly linked to the number of outlets used (e. g. igarettes, beer). Intensive distribution is usually required where customers have a range of acceptable brands to chose from. In other words, if one brand is not available, a customer will simply choose another. Intensive distribution is appropriate for products such as chewing gum, candy bars, soft drinks, bread, film, and cigarettes where the primary factor influencing the purchase decision is convenience. Industrial products that may require intensive distribution include pencils, paperclips, transparent tape, file folders, typing paper, transparency masters, screws, and nails. Selective distribution involves a producer using a limited number of outlets in a geographical area to sell products. An advantage of this approach is that the producer can choose the most appropriate or best-performing outlets and focus effort (e. g. training) on them. Selective distribution works best when consumers are prepared to shop around in other words they have a preference for a particular brand or price and will search out the outlets that supply. Selective distribution may be used for product categories such as clothing, appliances, televisions, stereo equipment, home furnishings, and sports equipment. Exclusive distribution is an extreme form of selective distribution in which only one wholesaler, retailer or distributor is used in a specific geographical area. Products such as specially automobiles, some major appliances, certain brands of furniture, and lines of clothing that enjoy a high degree of brand loyally are likely to be distributed on an exclusive basis. This is particularly true if the consumer is willing to overcome the inconvenience of traveling some distance to obtain the product. Usually, exclusive distribution is undertaken when the manufacturer desires more aggressive selling on the part of the wholesaler or retailer, or when channel control is important, exclusive distribution may enhance the products image and enable the firm to charge higher retail prices. Terms and Responsibilities of Channel Members * Price policies: This out the price at which middlemen will get the product from the manufactures and the discount schedule. It also mentions the price at which middlemen may sell the product. Condition of sales: The manufacturing firm stipulates mode or payment terms. For example, some firms ask middlemen to put a deposit with them. Some other firms insist payment to reach them on the day the intermediary takes physical possession of the goods. Others may accept a letter of credit as a payment mode . Credit policy of the manufacturer stipulates the period in which it must get paid. * Territorial Rights: The manufacturer should spell out the territorial jurisdiction of each of the distributor to avoid any territory jumping. This will also help in the distributor’s evaluation.

Sunday, July 21, 2019

Research Methodology for Director Elections Analysis

Research Methodology for Director Elections Analysis The director and board performance from the perspectives of voting shareholders, the implementation of majority-approved shareholder proposals provide a more specific and tighter measure for the actions boards take to do their jobs. For this comprehensive exam paper, I will focus on votes withheld for director elections because implementation of majority-approved shareholder proposals requires non-trivial hand collection and might decrease the sample size significantly. This measure has several important merits in multiple directorships setting compared with commonly used measures. First, it has been well documented that reputational concerns from the director labor market, the increasing prevalence of vote-no campaigns, and increased prevalence of corporates voluntary adoption of Majority Voting standards makes votes withheld from director elections a good proxy for shareholder general evaluation of director, committee, and board performance. (Georgeson 2000-2016). Second, while uncontested shareholder voting rarely remove specific directors, the voting outcomes of director elections are associated with subsequent board conduct, governance changes and firm performance (Del Guercio, Seery, and Woidtke [2008], Cai, Garner, and Walkling [2009], Fischer, Gramlich, Miller, and White [2009], Ertimur, Ferri, and Muslu [2011], Ertimur, et al. [2015]). Third, academics and practitioners have consensus that the threshold of 20% of votes withheld represents s ubstantial shareholder dissatisfaction. (Del Guercio et al. [2008], Cai et al. [2009], Fischer et al. [2009], Ertimur, et al. [2011], Ertimur et al. [2015]). Fourth, data for this measure on individual director level is directly available, and can be easily aggregated to get measures on committee level and board level. For the aggregate level, I can use either the average percentage of votes withheld per director, or the percentage of directors with substantial shareholder dissatisfaction (at least 20 % votes withheld) of committees, or boards. In sum, to better measure the effort exerted by directors and the value added by boards, I use a comprehensive list of complementary performance metrics: voting outcome of director election, serving on committees and attendance rate at board meetings on individual director level; voting outcome, CEO turnover sensitivity to performance, excessive CEO pay, and financial reporting misstatement on committee level, and voting outcome, market-to-book ratio (M/B) and return on sales (ROS) on firm level. 3. Sample, data, empirical results, and additional analyses 3.1. Sample and data To answer these questions, I study the multiple directorships policies for SP 1500 firms for the period from 2000 to 2016. First, I construct a dataset of director-level data for SP 1500 firms from the Institutional Shareholder Services ((formerly MSI, IRRC, and RiskMetrics) Directors Database from 2000-2016. I restrict my sample to SP 1500 firms to make the data collection manageable. This dataset contains information on director attendance and a range of other director characteristics (e.g., name, age, tenure, gender, committee memberships, independence classification, primary employer and title, number of other public company boards serving on, shares owned, etc.) which are collected by ISS from company proxy statements, annual reports or company websites. My first multiple directorships measure, Multiple Directorships_traditional, are retrieved from this database directly.ÂÂ   Based on the directors total number of meetings required to attend and whether they attended fewer than 75%, I also construct a measure, Current Distraction, to better capture the time demand and the distraction effect of multiple directorships. To test H1 and H2, we need to know director attendance immediately before and immediately after firms adopt overboarding rules. However, only annual attendance data is publicly available. In addition, many overboarding policies set grace periods explicitly or implicitly. Therefore, I use the director attendance the year before adoption year to test H1, and the director attendance the year after adoption year to test H2. Next, I require these firms to have accounting data from Compustat, stock return and pricing data from CRSP, corporate-governance provisions data from ISS Governance database, director elections voting data from ISS Voting Analytics (VA) database, and financial reporting restatement data from AuditAnalytics database. (access?) For firm performance, I measure the market-to-book ratio (M/B) and return on sales (ROS), measured at the lagged fiscal year-end, to compare with previous literature (Fich and Shivdasani [2006], Field, et al. [2013]). Then I use BoardEx database, which includes profiles of executives and directors (demographics, education and career history, compensation, board and committee memberships, etc.) and the connections among them, to construct my second sets of measures of multiple directorships, Multiple Directorships_public, Multiple Directorships_private, and Multiple Directorships_total. Using BoardEx database, I also construct two measures of director qualification, Accumulated Directorships Experience and General Qualification, which reflect director qualification but are not necessarily associated with their current busyness. BoardExs coverage of U.S. public companies is extremely limited prior to 2000, causing serious survivorship bias (see, Fracassi and Tate [2012], Engelberg, Gao, and Parsons, [2013]). Similar to previous literature which also uses the BoardEx database, I focus on the period after 2000 to mitigate these concerns. It needs to be noted that while BoardEx database suffers survivo rship bias and some other issues, using BoardEx provides several important merits for my research. First, it provides information about directors seats on significant private firms and gives a better measure of directors total workload. Second, it allows me to test directors seats choices between public firms and private firms. Third, it provides information to construct a measure of directors resources/talent which is not necessarily connect with their current busyness. Finally, I hand-collect information on firms overboarding policies for this sample. Normally, firms overboarding policies are disclosed in their governance principles/governance guidelines. I retrieve firms current overboarding policies from their websites, and their historical overboarding policies from the Internet Archive library, which archives over hundreds of billion historical web pages on the Internet. ( https://archive.org/web/)

Indian National Satellite System Information Technology Essay

Indian National Satellite System Information Technology Essay Our region is unlikely to achieve a degree of stability in the near future. Practically speaking, there will always be social, political and economic turmoil, at least for some time to come. Such a situation remains conducive to all forms of unrest and violence. The natural implication is that there would always be unforeseen emergent situations. I think that aerospace power is the only instrument that possesses the required speed and flexibility, when military intervention would be required. Air Chief Marshall FH Major  [1]   1. It is the capacity of getting others to do what we want, without coercing them because they will then admire our achievements and emulate us. Indias space programme needs to be viewed as the most thus. It is an important factor that has contributed immensely towards giving India its soft power status. India chose space to address the real problems of society and took initiative to develop space technology for the benefit of the nation and the common man, contrary to the path of countries like Soviet Union, US, China and European Union who developed space capabilities having origin in strategic and military domain. Today, India has a robust and self reliant space infrastructure and technological prowess with capability to design and build satellites for providing space services and to launch them using indigenously designed and develop launch vehicles. India has been able to achieve the present capability encompassing IRS, INSAT, PSLV, GSLV and mission to moon in just about forty y ears. The progress, present capability and future plans of ISRO are discussed briefly in succeeding paragraphs. Indian Remote Sensing (IRS) System 2. India established National Natural Resources Management System (NNRMS) in late 1970s under Department of Space (DOS) with an aim to develop indigenous remote sensing satellite system. The major elements of NNMRS encompass conceptualization and implementation of space segments with the necessary ground based data reception, processing and interpretation systems integrating the satellite based remotely sensed data with conventional data for resource management applications. Starting with IRS-1A in March 1988, there are eight remote sensing satellites in operation at present. The details of these satellites are tabulated below. Table 1: Details of Operational IRS Satellite Satellite IRS-1D Ocean sat-1and 2 TES Resource sat-1 Cartosat-1 Cartosat-2 Cartosat-2A,2B IMS-1 Launched in 1997 1999, Sep 09 2001 2003 2005 2007 2008. Jul 10 2008 Vehicle PSLV-C1 PSLV-C2 PSLV-C3 PSL-C5 PSLV-C6 PSLV-C7 PSLV-C9 PSLV-C9 Payload PAN, LISS-III, WIFS Res 5.8m OCM, MSMR PAN Res 1m LISS4, LISS3, MSC Res 5.8m Two PAN Cameras Res 2.5m Two steerable Cameras Res 80cm PAN Res 70cm MSC Res 37m, HySI Res 506m 3. The data from IRS satellites is utilised for applications including land use/ cover mapping, crop acreage and production estimate, wasteland mapping, forest cover mapping, wetland mapping, coastal zone regulation mapping etc. The TES and CARTOSAT series satellites have limited military applications as well with high resolution imagery. 4. The future programmes involve land and water resources series, Resourcesat-2 and 3, Imaging radar application through RISAT-1, DM SAR-1, RISAT-3 and RISAT-4L, Ocean biology and sea state application through Oceansat-2 and 3, cadastral and infrastructure mapping and analysis through Cartosat-3 and 4, TES-HYS and HyS-OP with hyperspectral sensors for application in forestry, agriculture, coatal zone and inland waters, soil and mineral/ rock mapping etc.  [2]   Indian National Satellite System (INSAT) 5. INSAT co-ordination Committee (ISS) was created as an apex body to address the development of Space Communication, Broadcasting and Meteorology and planning their utilization to meet the social needs of India. Due to the non-availability of appropriate launch vehicle for placing a satellite in Geostationary orbit, the INSAT series of satellites had been launched by commercially available launch vehicles till 2001 when India tested GSLV. With 211 transponders onboard 11 active INSAT series satellites, it is the largest domestic satellite communication infrastructure in Asia. It is used for variety of applications such as telecommunication, broadcasting, meteorology and search rescue. The details of operational INSAT satellites are tabulated below. Table2: Details of Operational INSAT Satellites Satellite Launch Vehicle Weight in Kg Payload INSAT-1E 1999 Ariane-4 2550 17 C band transponder, VHRR with 2 km and CCD with 1 km resolution INSAT-3B 2000 Ariane-5 2070 12 C Band and 3 Ku band transponder. S Band mobile satellite service payloads. INSAT-3C 2002 Ariane-5 2750 30 C band and 2 S Band transponder. KALPANA-1 2002 PSLV-C4 1060 Exclusive weather satellite with VHRR and data relay transponder. INSAT-3A 2003 Ariane-5 2950 18 C band, 6 Ku Band transponders. VHRR with 2 km resolution and CCD camera with 1 km resolution. Dedicated transponder for satellite aided search and rescue. GSAT-2 2003 GSLV-D2 2000 4 C Band, 2 Ku Band transponder. Other experimental payloads. INSAT-3E 2003 Ariane-5 2750 36 C Band transponder. EDUSAT 2004 Ariane-5 1950 6 Ku Band, 6 C band transponder. 1 Ku Band beacon to help ground users for accurate antenna pointing and uplink power control. INSAT-4A 2005 Ariane-5 3100 12 C Band, 12 Ku Band transponder for DTH, broadcasting and other community services. INSAT-4B 2007 Ariane-5 3025 12 C Band, 12 Ku Band transponder for DTH, broadcasting and other community services. INSAT-4CR 2007 GSLV-F04 2130 12 Ku Band transponder and 1 KU Band beacon for tracking the satellite. Provides DTH, video picture transmission and digital signal gathering services. 6. With increased demand on bandwidth due to services like 3G, HD TV, Wi-FI and Wi-Max systems, more number of transponders are required which would mean more INSAT satellites. ISRO has been launching INSAT satellites in 2 Ton class which would have to be enhanced to 5-6 Tons. The launch of such satellites would be limited by the present capability of GSLV which is about 4 Ton for GSLV MK-3. ISRO intends to enhance the transponders to 500 by 2012 under 11th plan.  [3]   Satellite Launch Vehicles 7. Unlike the US, USSR and China, Indias launch vehicle development has been strictly a civilian programme like Japan and EU. Under the aegis of Dr APJ Abdul Kalam, India developed the first indigenous launch vehicle SLV (four stage rocket with solid propellant) with the object of placing a 40 Kg satellite into 400 km orbit. Three launches were carried out during early eighties carrying Rohini satellites, two of them being successful. With the expertise gained, ISRO expanded it a PSLV programme was initiated. ASLV (five stage solid propellant) programme was also undertaken simultaneously as a low cost intermediate vehicle for trying critical technologies such as strap-on booster and new guidance system required for PSLV. The payload capability was thus enhanced to 150 Kg. 8. With the success of ASLV, work further progressed on PSLV (four stage rocket alternately solid and liquid propellant stage with six strap on boosters), which was basically meant to be able to place a 1000 Kg IRS series satellite in sun synchronous polar orbit. With continuous upgrades the payload capacity has been increasing (1600 Kg now), 12 out of 14 launches have been successful including the launch of Chandrayan-1. ISRO is further developing PSLV-HP with 2000 Kg payload capacity, which would be used to launch seven navigational satellites.  [4]   9. GSLV programme was started in 1990 to end Indias dependence on the former Soviet Union for launch of heavy satellites. Essentially, to be able to launch a satellite to geostationary orbit, a cryogenic engine rocket stage is required in addition to the liquid propellant stage and solid propellant stage. Indias GSLV programme encountered a roadblock when the technology of cryogenic engine was denied to ISRO in the name of MTCR, stating that the same technology can be used for ICBM. ISRO did get access to the cryogenic engines from Russia without the technology and finally was able to successfully use it in 2001 when GSAT-1 was placed in geostationary orbit on board the first indigenously developed GSLV. Since then several successful launches of GSLV have been conducted placing GSAT-2, EDUSAT and INSAT-4CR in to orbit. 10. With this capability India has achieved the full complement of capabilities needed for the country in space infrastructure creation, including the scientific satellites in near earth orbit, the IRS in polar orbit and INSAT in geostationary orbit. Meanwhile ISRO continues to develop indigenous cryogenic engine and finally in 2007 completed the successful ground trials of the fully indigenous cryogenic engine. The research is further on to develop GSLV MK-3 capable of launching 4400 Kg initially and stepping it up to 6000 Kg.  [5]   Other Developmental Programme 11. Chandrayaan. India became the fifth nation to launch a moon orbiter after US, Russia, EU, Japan and China in 2008. The launch of Chandrayaan-1 onboard the core alone configuration of PSLV-C11 demonstrates the technological capability of ISRO. The most significant success among many is the fact that compared to Chinese and Japanese moon missions launched in 2007, Indias mission costed only half and one fifth respectively, while beaming far better pictures of moon compared to their missions. Another mission to moon Chandrayaan-2 with a land-rover with robotic instruments is planned to be launched in 2011. A manned mission to moon is likely to be planned by the end of next decade.  [6]   12. Satellite Navigation. India has felt the need for an independent navigation system after being dependent on US GPS and the Russian GLONASS for long. A two pronged strategy of developing a wide area GPS augmentation system (GAGAN) and a regional system known as the Indian Regional Navigation Satellite System (IRNSS) has been started. GAGAN is conceived by ISRO and Airport Authority of India to aid civil air traffic in India to enable precise landing. In effect, GAGAN will augment the capabilities of GPS by enhancing the accuracy and reliability presently provided by GPS. Compared to the existing accuracy of 30 m at 50 bits/ sec, accuracy of 6-8 m at 500 bits/ sec would be available. This would be possible with three geostationary satellites having dual frequency GAGAN payload. The final system acceptance has already been done in 2007. The IRNSS project as a fully indigenous effort was started in 2006. It would have seven satellites and would give 2 m accuracy, all weather 24 hour operation over India and the region extending to about 1500-2000 km around it.  [7]   13. Bhuvan. With the capability of excellent imagery, ISRO has planned an Indianised version of Google maps. It would provide a zoom up to 10 m compared to 200 m available through Google Earth. Incorporation of GPS into the online tool is also planned with yearly image up date.  [8]   14. Space capsule Recovery Experiment (SRE). The objective of SRE is to demonstrate the capability to recover an orbiting capsule back to earth. With successful recovery of SRE-1 from Bay of Bengal, which was launched on board PSLV-C7 in Jan 2007 certain critical technologies such as reusable thermal protection system, deceleration and floating system, reentry control and propulsion system, space qualified parachute system, locating aids etc. were tested. It is major milestone in Indias Space Programme. A fully operational recovery capsule will pave the way for indigenous manned flights by India.  [9]   15. Space Situational Awareness. The ISRO Telemetry, Tracking and Command Network (ISTRAC) at Bangalore provides situational awareness and tracking of LEO satellites as well as launch vehicle missions. ISTRAC has its headquarters at Bangalore with network of ground stations at Bangalore, Lucknow, Sriharikota, Port Blair and Thiruvanantpuram in India besides stations at Mauritius, Bearslake (Russia), Brunei and Biak (Indonesia). The Master Control Facility (MCF) of ISRO is at Hassan (Karnataka) and Bhopal (MP) which monitors and controls all GEO satellites. The operations involve continuous tracking, telemetry and commanding, special operations like eclipse management, station keeping manoevres and recovery etc. In addition for Chandrayaan mission, Indian Deep Space Tracking Network (DSTN) is established at Bangalore. It is likely to enhance Indias space situational awareness which would be required especially in the light of Chinas ASAT and micro-satellite capability.  [10]   16. Indias Ballistic Missile Program. The Indian Ballistic Missile Defense Program is an initiative to develop and deploy a multi-layered ballistic missile defense system to protect India from ballistic missile attacks. Introduced in light of the ballistic missile threat from Pakistan, it is a double-tiered system consisting of two interceptor missiles, namely the Prithvi Air Defence (PAD) missile for high altitude interception, and the Advanced Air Defence (AAD) Missile for lower altitude interception. The two-tiered shield should be able to intercept any incoming missile launched 5,000 kilometers away. PAD was tested in November 2006, followed by AAD in December 2007. With the test of the PAD missile, India became the fourth country to have successfully developed an Anti-ballistic missile system, after United States, Russia and Israel. On March 6, 2009, India again successfully tested its missile defense shield, during which an incoming enemy missile was intercepted at an altitude of 75 km. Development of the anti-ballistic missile system began in 1999. Around 40 public and private companies were involved in the development of the systems. They include Bharat Electronics Ltd and Bharat Dynamics Ltd, Astra Microwave, ASL, Larsen Toubro, Vem Technologies Private Limited and Kel Tech. Development of the LRTR and MFCR (Multi-function Fire Control Radar) was led by Electronics and Radar Development Establishment (LRDE). Defence Research and Development Laboratory (DRDL) developed the mission control software for the AAD missile. Research Centre, Imarat (RCI) developed navigation, electromechanical actuation systems and the active radar seeker. Advanced System Laboratory (ASL) provided the motors, jet vanes and structures for the AAD and PAD. High Energy Materials Research Laboratory (HEMRL) supplied the propellants for the missile. 18. Swordfish is the indigenous target acquisition and fire control radar for the BMD system. The LRTR currently has a range of 600 km (370 mi) to 800 km (500 mi) and can spot objects as small as a cricket ball. The DRDO plans to upgrade the capacity of Swordfish to 1,500 km by 2011. Two new anti ballistic missiles that can intercept IRBM/ICBMs are being developed. These high speed missiles (AD-1 and AD-2) are being developed to intercept ballistic missiles with a range of around 5,000 km (3,100 mi). The test trials of these two systems are expected to take place in 2011. The new missile will be similar to the THAAD missile deployed by the U.S.A. These missiles will travel at hypersonic speeds and will require radars with scan capability of over 1,500 km (930 mi) to successfully intercept the target. 19. India is also planning to develop a laser based weapon system as part of its defense to intercept and destroy missiles soon after they are launched towards the country. DRDOs Air Defence Programme Director V. K. Saraswat says that its ideal to destroy a ballistic missile carrying nuclear or conventional warheads in its boost phase. Saraswat further added that it will take another 10-15 years for the premier defence research institute to make it usable on the ground. In 2009, reports emerged of a new missile named the PDV. The PDV is said to be a two solid stage hypersonic anti-ballistic missile similar in class to the THAAD. The PDV is intended to replace the existing PAD in the PAD/AAD combination. It will have an IIR seeker for its kill vehicle as well. The PDV will replace the PAD with a far more capable missile and will complete the Phase 1 of the BMD system, allowing it to be operational by 2013. Phase 2 development will take over for protection against missiles of the 5,000 km (3,100 mi) range class. The PDV is designed to take out the target missile at altitudes above 150 km (93 mi). Buoyed by recent successes DRDO is accelerating the pace of development of the BMD. Finally, with all the previous failures acting as a stepping stone and learning valuables lessons from them, Indias technological prowess has come to the fore and this gives a new confidence and boost to other projects hanging in limbo and some of them can incorporate the technologies developed for this project.  [11]   20. Indias Dedicated Military Satellite Program. DRDO Chief Saraswats stated in Oct 2010 about Indias decision not to be coy about its military satellite program. The shift in policy probably stems from the knowledge that its military satellite program will not attract US sanctions against ISRO as would have happened in the past. We are looking at launching one or two satellites every year to fulfill the requirements of all three military formations, Saraswat said. Once these satellites are operational, we will be able to see troop movements along the borders. The key requirement is high-resolution images with precision. The army, the navy and the air force have varied requirements, and it wont be appropriate to give the exact numbers. Data and commands can be sent through these satellites to cruise missiles. he added. 21. The satellites will be developed and launched by ISRO based on requirements projected by the armed forces. Some of the latest developments are as under:- Communication-Centric Intelligence Satellite (CCI-Sat). The satellite is being developed with a budget of Rs 100 crore by theDefense Electronics Research Laboratory (DLRL) under the Defense Research and Development Organization (DRDO). The existence of the project was revealed in February 2010 by DLRL director G. Bhoopathy. We are in the process of designing and developing a spacecraft fitted with an intelligent sensor that will pick up conversations and communications across the borders, he told reporters in Bangalore before the start of the first international conference on electronic warfare (EWCI 2010).The satellite will feature a Synthetic Aperture Radar (SAR) and be used for imaging and communication. It will be capable of detecting conversations and espionage activities in the region.The satellite will be launched in the lower earth orbit about 500 km above the earth on board the polar satellite launch vehicle (PSLV).The satellite, which will be operational by 2014, will als o serve as a test bed for anti-satellite weapon development.  [12]   Navy Satellite. A dedicated satellite to facilitating Naval communication and network centric warfare will be launched into geostationary orbit by ISRO in 2010, Indian Defense Minister, AK Antony announced during Senior Naval Officers Conference in New Delhi on October 22, 2009. The satellite will facilitate networking of IN warships, submarines and aircraft among themselves as well as with operational centres ashore through high-speed data-links, allowing Maritime threats to be detected and shared in real-time to ensure swift reaction. The multi-band satellite will weigh 2,330 kg. (5,137 lb.). The satellite will provide coverage over a 600 x 1,000 nm area of the Indian Ocean Region (IOR), which India considers to be its primary area of responsibility in terms of maritime security. The project cost is Rs 950 crore. IAF Satellite. The first dedicated IAF satellite is scheduled for launch in FY 2011-12, after the Navy satellite scheduled for launch in FY 2010-11.The satellite will serve as the air forces eye in the skies. It will link up the six AWACS, that the IAF plans acquiring, with each other as well as other ground and air-based radars. CONCLUSION 17. For many in India, militarisation and weaponisation are synonymous and, hence, one can attribute the present state of Indian militarisation of space to this fact. Reacting to the need of the Indian Air Force (IAF) for an Aerospace Command likely to be set up at Akkulam, in Tiruvanathapuram, the then External Affairs Minister, Pranab Mukherjee, stated at the inauguration of the international seminar hosted by the IAF as part of its Platinum Jubilee celebrations on February 5, 2007, There is merit in asking for the creation of separate institutions to oversee the assets that take warfare into space it does not mean that India will go back on international commitments and weaponise space-based assets. Recent developments have shown that we are treading a thin line between current defence related uses of space and its actual weaponisation. While the reaction of the former defence minister underscores the fine line separating the issue of militarisation and weaponisation, the same can not be said of the Chairman of the Indian Space Research Organisation (ISRO) Madhavan Nair. Reacting to the Chinese ASAT test of January 11, 2007, and on the possibility of India doing an encore, he said the country was against militarising space. 18. These statements only underline the fact that there is still a lot of ground to be covered in India on dispelling the myth about militarization and weaponisation being synonymous. However, for the world at large, the common understanding has been that weaponisation is a sub-set of militarisation and there is but a subtle difference between the two. If one envisions a continuum running from space systems being used for civil purposes to satellites providing services to support terrestrial military operations to satellites being integral parts of terrestrial weapon systems, to weapons themselves being deployed in space, weaponisation occurs when the upper range of the spectrum is reached. At its most extreme, space weaponisation would include the deployment in quantity of a full range of space weapons, including satellite-based systems for ballistic missile defence (BMD), space based anti-satellite weapons (ASATs), and a variety of space-to-earth weapons (STEW), and these would pla y a central role in any type of military operation.  [13]   19. There are some 500 operating satellites of various types orbiting the Earth at present. While most communication and military satellites for early warning are in geostationary orbits, there are several satellites in low and medium orbit. Most prominent amongst them is the International Space Station (ISS) (340 km). The use of satellites for the enhancement of security and defence has become ubiquitous, and India is no exception. As an emerging space power with wide-ranging strategic interests, and with a military establishment undergoing large-scale modernisation in order to meet the security challenges of the 21st century, Indias reliance on space systems for its security and defence needs is gradually set to increase. 20. With budding strategic and economic ties with Europe, Russia and the United States, India is well placed to leverage international efforts in a number of aspects of space security and defence. This will not only facilitate meeting its own growing requirements, but will also establish long-term and mutually advantageous programmes with its allies. The environment is absolutely ripe for international policy and industrial collaboration with India at the hub of all activity. 21. Space-based technologies play an increasingly critical role in the maintenance and development of national and international infrastructures. With the benefits of the widespread application of peaceful outer space technology, comes the urgent need for the international community to understand, communicate and cooperatively regulate activities in the outer space. Potential dangers such as the dissemination of dual use technologies, the shift from the militarization of space to the weaponization of space, and the growing problem of space debris are threatening to undermine security in outer space as well as prospects for its peaceful use by humanity as a whole. More than 130 States have interests at stake either as space-faring nations or indirectly benefiting from the use of commercial satellites. There is an international consensus on the general principle of the importance and urgency of preventing an arms race in outer space, as shown by the regular adoption by the UN General A ssembly, without any negative vote, of a number of resolutions since 1990. However, there has been a lack of political and diplomatic action, whereas existing frameworks such as the 1967 Outer Space Treaty and the 1979 Moon Agreement are insufficient for dealing with the challenges that we now foresee. Today, the Space Issue has become an integral part of the Global Security discourse. Almost every country is concerned about certain developments that are taking place in this field as any kind of offensive technological Development can make space security for every nation or for most of them vulnerable. Space Security being a universal issue, it is necessary that there should be an international understanding and cooperation. One can say that the use of Space has become almost indispensable for the world community. It has to be noted that in the civilian arena, the space market is emerging as a big player with lots of scope for business. That is something good for the world economy , the sole threat to it being weaponisation of space. 22. The Anti-Satellite Test (ASAT) by China on 11 January 2007 for instance, in which it shot one of its own satellites to demonstrate its anti-satellite capability. It was an act reminiscent of the 1960s James Bonds films in which disgruntled Chinese Generals destroy satellites by the US and Russia towards world dominance. The facts are still far from that fiction but the ASAT demonstration nonetheless sent shivers in various world capitals. The old Chinese satellite was monitoring weather since 10 May 1999, and its destruction created hundreds of shrapnel, of varying sizes, that are now also orbiting the earth and posing tremendous dangers to satellites. That this kind of technology has existed is known. But its demonstration has brought the issueof weaponization of space to the forefront and has shown that what a country, with destructive technological superiority, can do in Space. Can a country with ASAT technology render the defence mechanisms of other countries almost helpless? Perhaps yes. Can the consequences mean some kind of space war, with its debris literally falling on earth? The answer to that also is perhaps yes. The Chinese test was unanimously criticized as a threat to peace by all the participants, a clear indication of the world communitys desire for peace in the space. Considering all these aspects the need for a focused attention on the various aspects of the Space Security is not far -fetched. 23. There is a need for space faring nations to put their efforts together to launch time-bound, financially-shared programmers to take up societal missions on a large scale, pooling their capabilities in launch vehicles, spacecraft and applications. Such major cooperation itself will act a great measure towards space security, benefiting all without exception. Additionally, it would also help empower the most underprivileged, minimizing communication gaps and reducing threats for conflicts. The use of commercial off-the-shelf technologies widely available from the industrial and indeed leisure industries has enabled the development of a new class of space assets which are low-cost, rapid response and yet highly capable small satellites. The cost, nature of technology and scale of these small satellites brings access to the high ground of space within the reach of virtually every nation. While this can be perceived as a potential threat by some super power, which may view this develo pment as erosion of their historical dominance of space, it can also be argued that increased situational awareness from space and the opportunity for wider participation by developing nations in the exploration of space and its applications should help in a decrease in international tensions. 24. The recent trends and developments in commercial space sector indicated significant growth prospects for this industry. It was insisted that the countries are increasingly looking at the commercial space sector as a critical infrastructure for national security. The wider growth of this industry is possible only with the adaptation of innovative but economical technologies, for otherwise it would remain limited to the countries that have the capability to invest in capital intensive projects. The budding countries like India, should invest in technologies like the Near Space technology which can become an alternative to the many existing high cost space platforms. The countrys indigenous industry needs to look into investments in technologies like the nano-technology and scramjet which can help reduce the cost of various space projects. The main challenge of the 21st century in the advancement of space law is to balance the competing complementary interests of the military, intel ligence, civil and commercial space communities.  [14]  

Saturday, July 20, 2019

Skinner’s Use of Metaphor in Explaining the Behaviorism of Walden Two E

Skinner’s Use of Metaphor in Explaining the Behaviorism of Walden Two B. F. Skinner revolutionized the field of psychology through his numerous writings on behaviorism. However, he began his collegiate life as an English major, and his education in literary techniques and devices clearly shows through in the manipulation of metaphor in his famous novel Walden Two. Although Skinner rarely diverges from the incessant description of behavioral engineering through his mouthpiece in the novel, Frazier, he occasionally digresses from the theory and application of scientific experimentation to the literary elements that are essential to any novel. One of these elements, the metaphor of the sheep that appears at the beginning and end of the book, clearly embodies three principles of Skinner’s behaviorist rationale: the superiority of positive reinforcement over negative reinforcement, the necessity for humans to accept their roles, and the function of the Walden Code to the members of Walden Two. The novel begins in the disillusioned atmosphere of post-World War Two America. Burris, a psychology professor and the main character of the novel, views his academic life with indifference, sharing this attitude toward teaching with his philosophy professor colleague, Castle. A former pupil of Burris, Rodge, and a fellow soldier, Steve, return from the war, and dissatisfied with what they are expected to do with their lives, approach Burris with a proposition. A former classmate of Burris’, Frazier, has started a utopian community by the name of Walden Two, and the two friends invite Burris and Castle to accompany them on a visit. When they arrive, the enthusiastic, egotistical Frazier leads th... ...erimental nature of the Code. Frazier says how it is encouraged â€Å"to view every habit and custom with an eye to possible improvement. A constant experimental attitude toward everything† (25). This applies to the Code as well, which changes whenever the members feel that it is necessary. Even though Skinner made a name for himself through his scientific endeavors, his novel Walden Two displays his literary training and knowledge. By using the metaphor of the sheep to further explain the lives of Walden Two members in an enriching and scholarly way, Skinner manages to weave science and art together. His ability to enforce the ideas of positive reinforcement, acceptance of roles, and the politics of the Walden Code through the simplicity of a flock of sheep shows his literary merit. Skinner proves that he is not only a scientist, but a writer as well. Skinner’s Use of Metaphor in Explaining the Behaviorism of Walden Two E Skinner’s Use of Metaphor in Explaining the Behaviorism of Walden Two B. F. Skinner revolutionized the field of psychology through his numerous writings on behaviorism. However, he began his collegiate life as an English major, and his education in literary techniques and devices clearly shows through in the manipulation of metaphor in his famous novel Walden Two. Although Skinner rarely diverges from the incessant description of behavioral engineering through his mouthpiece in the novel, Frazier, he occasionally digresses from the theory and application of scientific experimentation to the literary elements that are essential to any novel. One of these elements, the metaphor of the sheep that appears at the beginning and end of the book, clearly embodies three principles of Skinner’s behaviorist rationale: the superiority of positive reinforcement over negative reinforcement, the necessity for humans to accept their roles, and the function of the Walden Code to the members of Walden Two. The novel begins in the disillusioned atmosphere of post-World War Two America. Burris, a psychology professor and the main character of the novel, views his academic life with indifference, sharing this attitude toward teaching with his philosophy professor colleague, Castle. A former pupil of Burris, Rodge, and a fellow soldier, Steve, return from the war, and dissatisfied with what they are expected to do with their lives, approach Burris with a proposition. A former classmate of Burris’, Frazier, has started a utopian community by the name of Walden Two, and the two friends invite Burris and Castle to accompany them on a visit. When they arrive, the enthusiastic, egotistical Frazier leads th... ...erimental nature of the Code. Frazier says how it is encouraged â€Å"to view every habit and custom with an eye to possible improvement. A constant experimental attitude toward everything† (25). This applies to the Code as well, which changes whenever the members feel that it is necessary. Even though Skinner made a name for himself through his scientific endeavors, his novel Walden Two displays his literary training and knowledge. By using the metaphor of the sheep to further explain the lives of Walden Two members in an enriching and scholarly way, Skinner manages to weave science and art together. His ability to enforce the ideas of positive reinforcement, acceptance of roles, and the politics of the Walden Code through the simplicity of a flock of sheep shows his literary merit. Skinner proves that he is not only a scientist, but a writer as well.