Friday, June 7, 2019
Privacy And Security Concerns Regarding Health Information Essay Example for Free
Privacy And Security Concerns Regarding Health Information EssayCase 4.8 E-mail Goes widePrimarily, the technician is the one responsible for the breach in confidentiality because he was the one who sent out the e-mails. Moreover, he did non seek instructions from Kaiser Permanente regarding the backlogged e-mails. Kaiser Permanente hired the technician to upgrade their corpse. Therefore, tasks other than doing upgrades should be consulted to the company. The technician should have asked whether the accumulated e-mails in the schema should be sent out, and he should have asked what to do with them. However, Kaiser Permanente is partly responsible for the breach, because first and foremost, since they hold millions of buck private study, they should have made sure that that discipline would not be compromised. They should have made their system secure and only irritateible to Kaiser Permanente personnel.Yes, situations like this discourage subscribers in using the system of Kaiser Permanente. However, the services that Kaiser Permanente offer is of great value and subscribers will not easily discontinue their subscription. But Kaiser Permanente has to ensure their subscribers that this will not retrieve in the future by informing them what caused the breach and reassuring them that upgrades are being done to improve the security of the system and the privacy of their information. The most pregnant thing to do here is to be honest and at the same time make great efforts to secure the system of the company.Case 4.17 Patients Files Used for Obscene CallsDefinitely, background checks should be conducted before hiring new employees because this would ensure the safety of the clients, especially in the health care industry. Employers should be granted access to criminal records for them to be able to identify the extent of the crime that ex-convicts have committed. Cases such as child rape and indecent assault is a near crime that should not be disreg arded when hiring employees, especially when the job requires dealing with other people, children, etc. such as in the health care institution. author employees who are given access to system information that are confidential, such as passwords, etc. should be screened out from the system. In other words, once an employee is not connected with the institution anymore, his access to the system should be deleted or reset. In this case, the system of the health care institution is at fault because it failed to keep the information confidential and secure.In this case, the hospital is accountable for the actions of the technician. Primarily because they hired an employee without doing background checks, they do not monitor the system, wherein they could have detected that calls were being made and the information of the clients were being accessed, and the system is not 100 % secure.Case 4.44 University Tightens Computer SecurityBecause of the wide range of subscribers in university me dical centers information systems, it becomes vulnerable to hackers. In this case, they hacked into the system and used it to send hundreds of advertisements in their e-mails. The hackers wanted to target the significant number of subscribers in the system. However, the information within the system is not precisely the target of the breach.It is not entirely the medical centers fault. This is because hackers do what they do. They find ways to get into the system flush if security measures were set-up to avoid breaching the security of an information system. Therefore, even if the system is secure, hackers will really find a way to get into the system. The medical centers fault was that they were not able to detect that the system was being hacked. They should have upgrades in the system, which will be used in monitoring the system and alarming when hackers breach the system.
Thursday, June 6, 2019
Meanings of Intelligence and Adaptive Behavior Essay Example for Free
Meanings of Intelligence and Adaptive Behavior EssayUntil several years ago, many schoolchilds who were classified ad as having ID or assigned into an inclusion classroom were not pass judgment to participate in ensampleized shielding, however as late, everyone in public schools is expected to participate in standardized assessments. Some educators be happy with the change while others are concerned the assessments are not an accurate assessment of what students in truth know. For many students with learning disabilities, standardized assessments often dont accurately indicate what the student truly knows and where they cast deficits. One problem with assessing students with ID is the identification and compartmentalization of ID is that they differ greatly between states and is often inconsistent. According to Kortez, students with specific learning disabilities are served under the IDEA, however we use the word classification when referring to the category of and inden tified students specific disability or disabilities (Kortez).The major problem that arises is the fact that identification is being highly inconsistent which is raising the concern students being mislabeled. It seems as though some educators are either over identifying or under indentifying students. However, this is not just a problem on the educators take it is also showing up on the state level. It seems as though when the combined crossways the nation, identification is inconsistent. More than half of all students being served are doing so under the IDEA part B umbrella, students with specific disabilities, while the number of students recognized as learning dis equald ranges from 3% to 9% across the United States (Kortez). According to Kortez, not all states implement the same policies, guidelines, or criteria, therefore some states have a significant higher or unhorse number of students identified based on what they as a state deem legitimate. Because there is such a diffe rence in policies, it is therefore hard to determine an adequate way to assess students with disabilities.Inclusion needs to be implemented in a way that will not only ascension the quality of performance generated by the assessment but also the constructive outcome of the education being provided. The knockouty therefore lies in being able to implement a sound assessment because of the significant essential factors. One factor that would have to be determined is how many special education students would bound as ineligible to partake in the regular education assessments. Another factor that would be solved would be how the regular education assessment could be enhanced to better suit the needs of the special education students. Also, the decision would have to be made to determine the criteria for students who would qualify for accommodations and which accommodations would be appropriate. In set out for all these decisions to be made, it is essential for all the characteristic s as well as the needs of the indentified students be met, and it is almost impossible if the identification and classification of the students continue to be inconsistent.Another problem with assessing indentified students is the fact of accommodations. When a examine is given to a student with disabilities, current changes or accommodations are made. Some of these accommodations are simple as testing the student in a smaller group, allowing the frequent monitored breaks, allowing the student extra time to finish the assessment, or reading the directions or questions to the student. When small changes such as these mentioned are made, they are referred to as accommodations. However if changes such giving the student a different test, illuminating parts of the test, or change the test in any way it is referred to as a modification and the assessment is no longer considered a standard test and is referred to as a non-standard test. When it comes to the element of measuring the ass essment, the main goal to implementing accommodations is to better validate the information regarding the students and their disabilities. Testing consistency is implemented in order to increase the accuracy by acquire rid of the immaterial variations for the testing between schools.For instance, if one school allows thirty minutes for a test and another allows an hour and a half, the longer test would be considered the deflect between the two. When it comes to students and their disabilities it is only fair that accommodations be made in order to make the test fair for everyone. For example, if a student has a profound vision problem therefore it would only make sense to change the presentation of the test (larger print, recording), in order to show a more than true result of what the student actually knows, instead of not doing well simply because they cant see the text well enough. If accommodations arent standard then results will not be consistent and therefore we wont have an accurate snapshot of what the students actually know. A third problem that may arise when testing students with disabilities is the design, construction, and evaluations of the test. One circumstance that needs to be considered where testing is concerned is the design of the test.Some tests can be biased in one area where another assessment may be biased in another area. Some tests are designed to assess a certain group of students with similar backgrounds and therefore are biased against those students who dont share a similar background. While there are methods for dealing with bias are implemented, not all the methods are not equipped to detect bias toward students with disabilities. Systems used for assessing bias often insist on students being opposite on some criterion measure of the structure of relevance. For example, if a reasonable criterion could be settled on for fifth graders in math proficiency, then the students without disabilities and students with disabilities could be matched together and then determine if the two sets of students were similar or different in the same areas.The second area of design that needs to be considered is the difficulty of the assessment itself. Often, most students with disabilities do not perform well on assessments. Furthermore, most assessments are too complex for students with disabilities, therefore often interpreting results that are intimidating for students with disabilities and may also cause unfavorable reactions from their teachers. Some students may be nonverbal students and may not be about to import or say their answers, making it impossible for them to par take in standardized tests. Many of the students with ID have a mixture of intelligence deficits and adaptive look that initiates their academic deficits. These deficits cant be the effect of a sensory impairment, a specific learning disability, or a behavior disorder, and would have to demoralize showing systems before the child reaches sc hool age.If a students cognitive deficit seems to be mild, then their deficit would resemble a capacious disability with no specific area. The students who have been diagnosed with a specific learning disability will have functioning highs and lows. Students with intelligence disabilities have a difficult time across the curriculum as well as adaptive behavior. As time goes on there are more and more students who have to take standardized tests. This can be difficult for teachers, especially when it is almost impossible to accurately assess them and their progress. Some of the problems that occur when assessing students with ID, is the classification and identification of students, deciding what accommodations or modifications should be used for each child, and if the test that is being administered is level appropriate for the students with disabilities.References1. Kortez, Daniel. Center for the Study of Evaluation. Project 1.1 Comparative Analyses of Current Assessment and answe rability Systems/Strand 3 Daniel Koretz, Project Director, CRESST/Harvard Graduate School of Education http//www.cse.ucla.edu/products/reports/TR587.pdf2. Centra, J. A., (1986). Handicapped student performance on the Scholastic Aptitude Test. Journal of Learning Disabilities, 19, 324-327.3. Clarizio, H. F., Phillips, S. E. (1992). A comparison of severe discrepancy formulae Implications for policy consultation. Journal of Educational and Psychological Consultation, 3, 55-68.
Wednesday, June 5, 2019
Stereotyping German Turks Cultural Studies Essay
Stereotyping German Turks Cultural Studies EssayAn American, a Chinese a German and a Turk atomic number 18 in a plane. Because of a technical fault the plane is about to crash if not immediately some ballast is thrown out. The Chinese opens the door and gets relieve of the rice in his bag explaining it doesnt matter, we have too practically rice at home. Then the American stands up and throws greenbacks out of the window we have mood too many of them back home. After a short silence the Turk turns to the German and says Bruder (buddy), dont get any silly ideas.by pointing out their representation as victims and unwelcome guest-workers. Meanwhile, wrapped in a humorous aspect this joke clearly hints at the detail that prejudices and stereotypes have an immense influence in our day-by-day life. Now the pursuance question arises To what extent do stereotypes affect intercommunal relations?With the intention of answering the question this work will focus on stereotypes, Turks in Germany are confronted with, by analyzing the representation of both immigrants with Turkish heritage and native born Germans in literature as well as in motion-picture see. In order to support the theses it will refer to authors like Arlene Akiko Teroka, Rob Burns, Gke Yurdakuli Y. Michal Bodemann, Johanna Watzginer Tharp and to their works. In addition, it will discuss the social consequences of stereotyping and show how much prejudices and labeling affect our actions towards and treatment of other groups.In order to be able to understand the labeling process the emergence of specific stereotypes one should be well assured about the historical background of the aforesaid nations and their international relationships.In the case of Germany and Turkey the era after World War II plays a important role. Aiming to rebuild the country and reconstruct its ruined economy the German government decided to import labor from nearby countries like Turkey. (Yurdakul, 2006) These so calle d guest-workers were incompetent peasants in search of income, which they were unable to gain in their homeland. This immigration policy of the German government is inextricably linked with the perception of Turkish immigrants in the eyes of German citizens. To be precise, the first stereotype Turks have to cope with is the image of unskilled guest-workers.In order to make this labeling clear a connection with literature and cinema seems adequate at this point. Migrant compositions and moving-picture shows between 1970s and 1980s were called guest-worker literature or the literature of the effected. (Burns, 2007) They mostly t deathed to foreground two thematic concerns the universe of the exploited, discriminated and socially excluded Turkish guest-worker experience and the problems of living between two cultures. (Burns, 2007)One example underlying the above mentioned image and experience of the uneducated and socially excluded Turkish guest-workerr is the novel and film Ganz U nten (Lowest of the Low),. In the film, the writer Gnter Wallraff borrows the identity of a real immigrant, the guest-worker Ali Levent Sinirlioglu and records his experiences in a variety of dangerous, unsanitary and expectantly paid jobs. destitute of both a personal hi history and a private sphere, Wallraffs Ali has no individual identity, no life beyond the workplace.(Burns, 2007) In the film the immigrant Ali is defined stringently in relation to his economic function as a worker. According to the Turkish writer Aysel -zakin, Walraff presents a patronising clichd portrait of the Turk as uneducated, unskilled and basically ignorant, as well as naive oppressed and, hence, ultimately pitiful. (Burns, 2007) Thus Ganz Unten reinforces the stereotype of the Turks as merely unskilled and suppressed guest-workers.This example to boot shows that the stereotype of guest-worker goes hand in hand with the portrayal of German Turks as victims,oppressed by the superior, the German employ er. One narrative example that underlies the image of the exploited, helpless guest-worker is the story about the laboratory assistant Kadir, who falls victim to a nefarious employer a German manager, who supplies him with hormone pills for the stomach cramps that continually afflict him.(Burns, 2007) At the end when Kadir grows breasts after the excessive supply of hormone pills he cuts his own breasts with a kitchen knife. This act of self-mutilation serves as a metaphor for German treatment of guest-workers, especially Turks as subhuman organisms and for the helpless and self-destructive response of a man, who falls victim to the bewildering complexities of urban technological society.(Burns, 2007)Beside the portrayal of being a victim the fact of being regarded as a guest-worker also leads to another stereotype the image of being an outsider. The film 40 m2 Deutschland (40 Square Meters of Germany, 1986), is a very well example to show the Turk, isolated between two cultures. T he films location is a flat in Hamburg, the sweet home of Turna, who has been brought over from rural Anatolia to live with her husband, Dursun. Turnas task is to transform this property into a little enclave of Turkish culture, offering Dursun refuge after his work at the factory and safeguardinghis wife from the moral depravity he sees pervading German society. (Burns, 2007) This film demonstrates that Turks tend to distance themselves from the German society and their rules, in order to save their own cultural values. This kind of behavior contributes to the labeling process as an outsider. The Turk is seen as someone, who wants except minimal contact with German life and deliberately deprives him/herself of social intercourse.This limited contact with the German society and culture even led to the development of a new language-the so-called Gastarbeiterdeutsch (Guest-worker German), a simplified form of German to meet only basic communicative needs (Watzinger Tharp, 2004) a form of German which leads to reduce or even incorrect input. (Watzinger Tharp, 2004) A new arising form of language among the second and third generation Turks in Germany, the so called Trkendeutsch, introduces a new stereotype the fact that German Turks are stuck between two cultures, even unable to speak one language properly. This stereotype is clearly reflected in Geierbachs select of his novels title Bruder, muss Zwiebel und Wasser essen (Brother, have to eat onion and water). This sentence is neither German nor Turkish The content reflects behaviour peculiar to lower segmentation Turks whereas the sentence is completely written in German. Thus, it appears to be rather a mix of two languages, two cultures, and therefore serves as an example to demonstrate the fact that the German Turk, has positioned him/herself between two cultures remaining culturally torn.However, these are only some of the stereotypes Turks in Germany are confronted with. Still, they can be seen as the main ones. The following abstract will now shortly focus on the social consequences of stereotyping and show their effects,which mainly cause social tension and even racial violence.The bad image of the Turks created through stereotyping connected with increasing unemployment rates in Germany led to an atmosphere of open anti Turkism among Germans. Some even say that former anti Semitism was transformed into open anti Turkism. In short stereotyping led to animosity and aggressive tendencies and increasing violence towards Turks. The Solingen arson attack of 1993 serves as an example of anti foreigner violence in modern Germany, when Neo Nazis set fire to a Turkish familys home.On the Turkish side, however, being constantly stereotyped and mocked resulted in anger and hostility among German Turks. A cartoon published in the German magazine Stern shows a heavily moustached man locomote through a cat hole in a door named European Union, trying to gain entry into Europe. Some imit ation Arabic writing appears on top of the cat hole, and a suitcase with a Turkish flag stands next to the man.(Yurdakul, 2006) Some claim that the nose of the Jew is now replaced by the mustache of the Turk and consequently accuse Germans of anti Turkish racism. As a response, associating Turkish concerns with those of the Jews and comparing the Holocaust to the bombings of Turkish houses, the Turkish society has openly begun to attack the Germans, where they are most vulnerable, creating even more hostility between both nations.In conclusion, by analyzing the representation of Turks and Germans in literature and cinema, this paper has tried to highlight the stereotypes order against Turks-mainly German Turks, dominating Turkish-German relationships, even until today. After, explaining the historical evolution of stereotypes and the emergence of specific prejudices against Turks, the essay has illustrated the social consequences of labeling. As seen in literature and cinema stere otyping is an element, which dominates relationships between different nations.In a nutshell, the main aim of this paper is to show that stereotyping and labeling are very serious and dangerous social traits, which can have drastic consequences on intercommunal relations fueling emotions like hostility, dislike, anger and even racism, all being traits which should have no place in an enlightened, modern society.
Tuesday, June 4, 2019
Social Media and Employment Issues
well-disposed Media and Employment IssuesSOCIAL MEDIA TRANSPARENCY AND EMPLOYMENTIntroductionOne corporation apply the old saying, never judge a book by its cover to many applications in life, but todays environment of inst loving media updates provides personal transparency never experienced before. affable medias arrival on the scene has completely changed the way we interact as a hostelry and technologies such as portable devices and wireless connectivity plainlyows us to communicate faster and to a more massive crowd than we ever thought possible. amicable media is the to the highest degree signifi dejectiont difference in personal or business transparency and has merged into an indistinguishable haze of likes, links, and posts, making transparency an eachday issue. Complete strangers roll in the hay now peck someones daily activities without the context of knowing them personally. These strangers sack up easily be authorization employers seeking employees to fill vacant positions. That is but what is occurring today employers are examining beyond applicants resumes to make the best hiring decision by reviewing prospective employees tender media sites to learn more about their applicants and employees.Alternatively, employers are experiencing reasoned issues with their fresh accessible media tool, and the courts are just beginning to unravel them.Correctly dropd, social media can be a powerful means of candidate identification, selection, and retention. However, employers must throw comprehensive and compliant social media policies that are not overly loose, and which address privateness, lawful ingress, accuracy, equal protection, and conduct of business practices. An analysis of the social media transparency regarding calling reveals an employers review of applicants and employees social media sites can be a valuable tool but must do such in a manner reconciled with lawful hiring and separation practices. This article is designe d to review essential aspects employers should consider when using social media to make hiring or termination decisions for their company. ArgumentThere has been an detonative growth in the use of social media over the past decade and has allowed a vast part of the worlds population instant, quick, and convenient communication to a broad network of people. According to Statista.com, known as the portal for statistics, Facebook had 100 million monthly active users in 2008, and that number has skyrocketed to 2.07 billion monthly active users as of the third quarter of 2017. LinkedIn has over 467 million members worldwide, and it is one of the most popular social networks regarding active users (Statista.com, 2017). These top growing websites allow their users to share lots of study about themselves and can give potential employers data in just a few clicks that would be impossible to know about someone decades ago.Social media has forged a path into our culture that has brought us a ll closer, but it has in addition opened many questions about the issues of modern ex shortenion and privacy. Getting at the center of this network involves untangling multiple layers of complex statutes, case law, and agency guidance in a way that balances the pillars of freedom of speech and the at-will employment tenet. For edification, the employment-at-will philosophical system states employees without a written employment contract and an indefinite term of employment, the employer can terminate the employee for good cause, bad cause, or no cause at all (Ballam, 2000). Although a perfect application of the law on societys new technologies like social media is complicated, there are many considerations employers must make based on privacy, accuracy, and lawful access during the hiring, employment, and termination periods. Moreover, employers need to attend there is a potential negative impact with the use of social media when enroling employees, and conversely, the terminat ion of employees based on decisions issued by the National Labor transaction Board (NLRB). Last, employers must relate legal guidelines to their companys use of social media policies.The First Amendmentto the Bill of Rights exempts our rights as Americans very clearlyCongress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof or abridging the freedom of speech, or of the press or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. The Bill of Rights, 2017 Strict libertarians or constitutionalists may notice, the words right to privacy are absent from the First Amendment of the Bill of Rights. Under the First Amendment, there is no right to privacy, but there are certain privacy protections afforded to every citizen. Pawel Laidler, author of Basic Cases in U.S. Constitutional Law Rights and Liberties, references Griswold v. Connecticut and suggests, Specific guarantees of the Bil l of Rights drop penumbras of privacy extending to specific areas and situations (Laidler, 2009, p. 102). The courts have started to make their decision on what is the reasonable expectation of privacy for applicants or employees, but employers and the public at large are shut away making their own conclusions.Most social media websites acknowledge privacy settings and controls to allow users to reduce exposure to those whom they wish to exclude from seeing their social media schooling. However, specific information such as their name, profile picture, and networks is typically forever and a day publicly available, and social media sites often provide notice to users that they do not guarantee the privacy of the information (Facebook, 2016). LinkedIns privacy insurance includes wording for users about their unfitness to ultimately secure any information submitted to their website, nor can they guarantee users information will not be accessed or disclosed by physical or electron ic methods (LinkedIn, 2017). Despite these numerous warnings about privacy disclosure, users should expect a certain level of privacy when they correctly use the privacy controls.When social media was still in its infancy, employers would ask applicants or employees for their social media login information to allow the employer direct access. This practice quickly died as social media websites, legislators, and privacy rights activists alike actively disheartened the practice (Dame, 2014). Today, most states have passed laws preventing employers from requesting social media login credentials. For example, Vermont State Law (H.B. 462) prohibits an employer from requiring or requesting that an employee or applicant disclose personal social media account information (NCLS.org, 2018, para. 26). Overall, the only reasonable access employers should have to an applicant or employees social media is what they allow them to access via privacy controls. A social media user who selects open public access to their accounts or invites or accepts potential employers to friend or connect allow an additional level of access and substantially reduces the expectation of privacy with an employer or organization. Naturally, employers can take criminal actions such as hacking or using anothers authorized login credentials to gain access to personal social media pages fraudulently, but the courts would not view these tactics favorably if it were a part of a more significant case.Beyond the concern of personal privacy, employers must also ensure the information put in on a private social networking site is accurate, and it is the correct person who applied for the position or the employee who works for the company. Employers must ensure the James metalworker Facebook profile they find is the same James Smith who applied for the job and not one of the other 38,312 James Smiths in the United States (Chen, 2015). Employers must also consider whether the person portrayed on the socia l media site established the account himself or herself or if someone else created the page without their knowledge or permission.Employers can outsource an applicant or employees social media information review to a third party Consumer Reporting Agency (CRA) to help overcome some of the challenges listed above. The Consumer decent Trade Commission (FTC) outlines particular information regarding the search of a persons character or reputation on a social media site. The FTCs stance is that when companies use a CRA to conduct a background check on an applicant or employees social media sites, that it complies with applicable provisions of the Division of Privacy and Identity Protection (FTC.gov, 2016). Additionally, Tony Rodriguez and Jessica Lyon from the FTC explain companies must be vigilant because a CRA may comply with all expressed provisions of the bureau and still violate other laws, such as equal employment opportunity violations (Rodriguez & Lyon, 2013).With the understan ding of privacy and accuracy, employers have two significant concerns when deciding to use social media for recruitment. The first concern is the influence social media has on candidate sourcing and statistics and the second is the limitations of viewing candidate or employee information on a social media site.It is essential to understand that for the first time in the Pew Research Centers surveys history, the results in 2017 showed 55% of Americans ages 50 or older use social media sites for everyday tasks such as getting news updates. This addition in usage is a 10% spike over 2016 allows employers to see and contact a more substantial part of the population, but there is still a disconnect surrounded by race and between gender demographics use of social media (Shearer & Gottfried, 2017). The Pew Research Center shows employment social media websites such as LinkedIn have equal shares of whites (29%) and blacks (28%), but only 18% of Hispanics use the network. Gender has improv ed over the years, but there is still a gap of close to 10%. A staggering 72% of women in the United States use some sort social media contrasted with 66% of men. The most dramatic difference between demographics is in education. Only 59% of people with a high school education or less use social media, but 78% of college graduates use at least one social media website (Pew, 2017). Recognizing the disparities with using social media to decide employment is critical because the gaps could potentially fuel cases of discrimination even when the employers had no inwrought intent to discriminate.In addition to traditional avenues of attracting and finding diverse applicant pools, employers should use a variety of sourcing strategies across multiple social media outlets to stave off the potential statistical traps and pitfalls.The limitations of viewing candidate information on social media sites is also essential to consider when deciding hiring or during employment.A social recruiting survey by Jobvite, a recruiting platform for the social web, reports from their survey of recruiters that 92% of U.S. companies are using social networking sites for hiring purposes (Jobvite 2012).Employers should be forewarned and take reasonable steps to ascertain accurate information and to be aware a picture can be worth a thousand words, but it can paint an inaccurate picture. An employer using social media as a primary tool may be left with skewed data and a false narrative.Knowing this and the above information, employers must understand that making decisions from viewing social media posts can unintentionally make those decisions appear demographic based rather than merit-based.Unfortunately, these perceptions, true or false, may be decent to flag a particular hiring practice that could end in a costly course of litigation.Knowing the two primary concerns of using social media for employment decisions is essential, but so are the possible legal implications of using these methods.Communication at work and home has transformed dramatically over the years, but the legal theories behind established employment policies have not changed.Todays challenge is to apply traditional laws to todays instant, casual, broadcast style of social media communication and activities.For many years, courts were not concerned with how many likes an employees Facebook work-related comment received.Moreover, the courts did not have to consider the average employee might have the ability to convey their opinions to an average of 634 people with one click of a button on Twitter (Leonardi, 2017).Social media transparency can easily create situations where employers terminate employees because of posts or comments employers find on their social media pages.Employers must reckon carefully to both an employees conduct as well as their company policies in determining whether circumstances legally warrant termination.The National Labor Relations Board (NLRB) is a long-standing go vernment agency that is inexplicably involved ensuring the correct implementation of the law to social media caused terminations (NLRB.gov, n.d.). Employers need to be aware of protected activity on social media before taking any adverse action against employees who post on a social media website.For example, the federal whistleblower protection law provides legal remedies for employees or job applicants who face retaliation for making protected disclosures of fraud, waste, abuse, mismanagement, or substantial and specific danger to public safety or health (OPM.gov, n.d. para. 2). international of protected reporting, using social media for collective dialog and shared concerns about essential terms and conditions of employment are also protected activities (NLRB.gov, n.d.).An employee, however, otherwise enmeshed in a protected activity, can lose that protection by abusive conduct (Stewart, 2017).Michael Greens journal article titled, Protecting Unhappy worker Outbursts from Disc riminatory Treatment, does a great job of explaining the method used for determining if the employees conduct is enough to cause them to lose protection.Green (2017) explains, the NLRBs Atlantic Steel doctrine to assess the in holdness of an employees angry outburst by first analyzing four factors before deciding the employees actions warrant discipline (para. 5).The four factors include where the discussion occurred, the undefended matter of the discussion, the nature of the employees outburst, and whether the outburst was, in any way, provoked by the employers unfair labor practice.Green does caveat the Atlantic Steel doctrine does have its limits.Employees who engage in threatening behavior or conduct acts exceeding what a reasonable employer should tolerate can lose their protections under the law (Green, 2017).Social media compounds these issues because its reach has far more impact than the typical breakroom outbursts and is immediately heard by everyone on ones feed.Recommen dationsA business decision to use social media as a tool among many when choosing employees is a good idea.The best way to properly use social media for hiring, employment, and termination is to set clear company policy and guidance.A companys social media policies will not protect employers if they are overly broad or restricts employees constitutional rights.When limiting an employees right to communicate on social media (or otherwise), the terms and conditions regulating their comments to being professional or appropriate need to be clearly defined in the policy.Employers should specify in their policies about what constitutes appropriate manners in which employees are allowed to discuss subjects to include criticism of labor policies, treatment of employees, and terms and conditions of employment.(SHRM.org, 2016).Employers should specifically articulate their definition of actions that constitute insubordinate actions, foreign conversation, or other disrespectful conduct.Additi onally, the policy should include their plan of disciplinary action when employees engage in such actions.Companies should carefully draft their social media policies to avoid broad or ambiguous terms.A court can easily deem policies unlawful if employees reasonably believe the policy prohibits constitution freedoms.Conclusion all told employers should take their time when deciding to terminate current employees employment due to their conduct or comments in general, but especially when considering social media websites.This article reviewed applicable aspects employers should consider when using social media as part of the hiring or termination process.Protected activity and overly broad social media policies can create liabilities for employers and employers who recruit and select employees through social media sites should carefully monitor their processes and outcomes for disparate impacts. Employers should take care when using information gained from social media and establish a process by which applicants, candidates, and employee have an opportunity to dispute potentially inaccurate information published online.Adhering to statutory, regulatory, and agency guidance allows employers to use social media anywhere along the employment timeline to maximise information about applicants and current employees while protecting them from the potential social media use pitfalls.ReferencesBallam, D. A. (2000). Employment-At-Will The Impending Death of a Doctrine. American Business Law Journal, 37(4), 653-687. inside10.1111/j.1744-1714.2000.tb00281.xBackground Checks. (2016, November). Retrieved January 28, 2018, from https//www.consumer.ftc.gov/articles/0157-background-checksBoyd, D. M., & Ellison, N. B. (2007, December 17). Social Network Sites Definition, History, and Scholarship. Retrieved January 21, 2018, from http//onlinelibrary.wiley.com/inside/10.1111/j.1083-6101.2007.00393.x/fullChen, S. A. (2015, February 07). Calling James Smith 10 Most Common First an d Surname Combinations. Retrieved January 16, 2018, from https//blogs.ancestry.com/cm/calling-james-smith-10-most-common-first-and-surname-combinations/Dame, J. (2014, January 10). Will employers still ask for Facebook passwords in 2014? Retrieved January 15, 2018, from https//www.usatoday.com/story/money/business/2014/01/10/facebook-passwords-employers/4327739/Facebook Data Policy. (2016, September 29). Retrieved January 15, 2018, from https//www.facebook.com/full_data_use_policyGreen, M. Z. (2017, February 13). Protecting Unhappy Worker Outbursts from Discriminatory Treatment. Retrieved January 25, 2018, from https//worklaw.jotwell.com/protecting-unhappy-worker-outbursts-from-discriminatory-treatment/Jobvite. (2014). Social Recruiting Survey.Retrieved January 20, 2018, from http//www.jobvite.com/wp-content/ uploads/ 2014/10/Jobvite_SocialRecruiting_Survey2014.pdfLaidler, P. (2009). Basic Cases in U.S. Constitutional Law Rights and Liberties. Krakw Jagiellonian University Press.Leo nardi, P. M. (2017). The Social Media Revolution Sharing and Learning in the Age of Leaky Knowledge. Information and Organization, 27(1), 47-59. doi10.1016/j.infoandorg.2017.01.004 LinkedIn Privacy Policy. (2017, June 7). Retrieved January 15, 2018, from https//www.linkedin.com/legal/privacy-policyManaging and Leveraging Workplace Use of Social Media. (2016, January 19). Retrieved January 26, 2018, from https//www.shrm.org/resourcesandtools/tools-and-samples/toolkits/pages/managingsocialmedia.aspxNational Conference of State Legislatures. (2018, January 2). Access to Social Media Usernames and Passwords. Retrieved January 16, 2018, from http//www.ncsl.org/research/telecommunications-and-information-technology/employer-access-to-social-media-passwords-2013.aspxNLRB.gov. (n.d.). Retrieved January 21, 2018, from https//www.nlrb.gov/ Our Inspector General whistle blower Protection Information. (n.d.). Retrieved January 28, 2018, from https//www.opm.gov/our-inspector-general/whistleblow er-protection-information/ Pew Research Center. Social Media Fact Sheet. (2017, January 12). Retrieved January 20, 2018, from http//www.pewinternet.org/fact-sheet/social-media/Rodriguez, T., & Lyon, J. (2013, January 10). Background Screening Reports and the FCRA Just Saying Youre Not a Consumer Reporting Agency Isnt Enough. Retrieved January 16, 2018, from https//www.ftc.gov/news-events/blogs/business-blog/2013/01/background-screening-reports-fcra-just-saying-youre-notShearer, E., & Gottfried, J. (2017, September 07). intelligence activity Use Across Social Media Platforms 2017. Retrieved January 20, 2018, from http//www.journalism.org/2017/09/07/news-use-across-social-media-platforms-2017/Statista.com. Number of Facebook Users Worldwide 2008-2017. (n.d.). Retrieved January 15, 2018, from https//www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/Stewart, D. R. (2017). Social Media and the Law A Guidebook for Communication Students and Professional s. New York, NY Routledge.The Bill of Rights A Transcription. (2017, June 26). Retrieved January 15, 2018, from https//www.archives.gov/founding-docs/bill-of-rights-transcripttoc-amendment-i
Monday, June 3, 2019
Composition of Hydrocarbons
Composition of HydrocarbonsSamerah Manshainterpersonal chemistry Hydrocarbons Organic compounds be whits comprising of both carbon and enthalpy atoms. These compounds can be found as gaseous, liquid, or solid.Organic compounds atomic number 18 vital in life processes as they atomic number 18 found in the products we use daily much(prenominal) as soap, cosmetics, perfumes, plastics, rubber, paper, insecticides. The source of energy we use bothday such as petroleum and coal contain organic compounds. Foods such as margarines and flavourings that we taste ar the organic compounds interrelating with our taste buds.Scents in perfumes and food that we detect with our nose are organic compounds interrelating with our receptors. The main type of organic compounds are hydrocarbons, which are chemical compounds whippy of carbon and atomic number 1 atoms. Alkanes and olefines are ii types of hydrocarbons.Alkanes are saturated hydrocarbons repayable to containing the full amount of hydrogen atoms possible. Alkanes also contain single bonds. The overall reflexion of an alkane isCnH2n+2, where n shows the quantity of carbon atoms throw.The chemical and structural formula of alkanes (see put down 1).Isomers are molecules with an identical chemical formula, nevertheless differ in term of having different structural formula due to varied arrangement of atoms, isomers also have different properties.The isomer of furtherane C4H10, is 2methyl-propane. (See figure 2)These two compounds are isomers of each other due to having the same chemical formula of C4H10, except vary in terms of having different structural formula. The above propane has an added methyl group, thus called methyl propane.The isomers of hexane C6H14, (see figure 3)The isomers of pentane C5H12, (see figure 4) A homologous series is simply a group of organic chemical compounds which is ordered in increasing size, such as having similar structures but only differ slightly by a CH2 group within t heir chain. A series of compounds which are related like alkanes are know as homologous series. This is because alkanes have the same general formulas of CnH2n+2, but differ from the next CH2 unit. All the alkanes in the homologous series have similar chemical properties, but have different physical properties such as boiling point and density increase as the number of carbons atoms increase.Name of AlkaneNumber deoxycytidine monophosphate atomsChemical FormulaSimple Structure (Molecular Diagram)Methane1C H4Ethane2C2H6Propane3C3H8Butane4C4H10Pentane5C5H12Hexane6C6H14Heptane7C7H16Octane8C8H18Nonane9C9H20Decane10C10H22Figure 5 Example of a homologous series of alkanes with structure of CnH2n+2, Ivy Rose, (n.d)2.4, 2.5 As alkanes are saturate hydrocarbons, they are deemed indifferent due to containing single bonds such as C-H and C-C bonds which are quiet strong and difficult to break due to the strong intermolecular force. However the only shipway alkanes are able to defend is vi a combustion, chlorination and shot.Combustion is exothermic process and is known burning of carbon compounds, in particular hydrocarbons is a vital source of wake up energy. For example by combusting alkanes with oxygen it releases energy which can be instantaneously be used as fuels. In combustion of alkanes such as propane, every single covalent bond within the reactants is broken down and forms a new set of covalent bonds within the products. The balanced formula isCH3-CH2-CH3 + 5 O23 carbon dioxide + 4 H2O + heatCombustion also producescarbon dioxideand weeweevapour which is shown above. Another example of combustion of methaneCH4(g) + 2O2(g)CO2(g) + 2H2O(g)(Methane + OxygenCarbon dioxide + Water)If at that place is not enough oxygen show within the air, then this would result then would form carbon monoxide gas which is poisons. For example, the below equation shows the partial combustion of methane due to lack of oxygen bequest2CH4(g) + 3O2(g) 2CO(g)+ 4H2O(g)(Methane + Oxygen Carbon monoxide + Water)However the burning of alkanes has the potential to cause many enviromental problems, such as the toxic waste gas carbon monoxide and unburnt hydrocarbons which are present in cat emissions. Additional excessive combustion of hydrocarbons increases carbon dioxide emissions which contribute to the greenhouse effect.Another reaction of alkanes is called chlorination which is the when alkanes react with chlorine. For example, when the alkane methane and chlorine react together, the hydrogen atoms of the methane are simply replaced one by one by chlorine atoms. Thus forming a combination of compounds of chloromethane, dichloromethane, trichloromethane and tetrachloromethane.Figure6 Reaction and products that supervene between methane and chlorine, Chem Guide, (2000)Some fuels which are made from oil mixtures contain large hydrocarbon molecules which are not reclaimable, as they do not flow easily and are quiet difficult to ignite. This is when the pr ocess of the cracking, a thermal decompositionreaction comes in.The process of cracking allows big hydrocarbon molecules to be broken down into much smaller and more useful hydrocarbon molecules. This is achieved by the large hydrocarbon molecules world vaporised and put in a hot catalyst which breakdowns the chemical bonds within molecules thus forming smaller hydrocarbon molecules. For example in the cracking process of the alkane hexane, a smaller alkane is make plus an alkene. The alkene is formed because the alkane which is this case is the hexane does not contain enough hydrogen atoms in order to produce another alkane..C6H14 C4H10 + C2H4Figure 7 The cracking reaction of the alkane hexane, BBC Bitesize, (n.d)3.1 Alkenes are also hydrocarbons compromising of carbon and hydrogen atoms, but also have one or more recur bonds present within the carbon chain. Alkenes are also a series of compounds within a homologous series but have a different general formula of CnH2n.Examples of alkenes and their chemical and structural formula (See figure 8)Geometrical isomerisms are formed when atoms or groups of molecules are arranged in a different way due to limited amount of rotation of the bond or bonds within a molecule.For example, at that place are two geometric isomers for the alkene 2-butene, as there are two different spatial arrangements of methyl groups and double bond, thus forming geometrical isomers called cis-2-butene and trans-2-butene, these are formed because the CH3 groups are found on opposite of the double bond. (See figure 9)Another example is the 1,2-dichloroethene, forms the trans-1,2 dichoethne and Cis-1,2 dichroloethee gemotical isomers, (See figure 10)One of the isomer, the two chlorine atoms are locked upon opposite sides of double bond, thus called theTransisomer whereas in the other isomer the two chlorine atoms are locked within the same side of the double bond thus known as cisisomer. (See figure 10).3.2, 3.3 A single covalent bond is simply when one pair of electrons (2 electrons) are shared amongst two atoms. It typically consists of one sigma bond. On the other hand, bonds with more than one mutual pair of electrons are called multiple bonds, in particular sharing two pairs of electrons is called a double bond where 4 electrons are covalently bonded together, the double bonds typically comprises of one sigma and one pi bond.Alkanes are saturated compounds with single covalent sigma bonds, thus are more stable than alkenes as high amount of energy would be needed to break these. Alkenes are unsaturated with the presence of carbon-carbon pi-bonds and sigma bonds which connects to carbon atoms which makes them highly more reactive than alkanes due to the populace of double bonds and because they are unstable as they want to achieve full saturation. Another reason alkenes are ore reactive is because in double bond there is a lone pair of free electrons which is easily lost thus highly reactive as its easily lo st in order to be covalently single bonded Thus when alkenes react in such reactions such as combustion or extensions, it mainly involves the rupture of the pi bond, thus forming newsingle bonds. Within the alkenes, the double bond allows more electrons to be put into the joining within the two carbon atoms, thus held less strongly making them more likely to react with less input of energy needed to overcome the activation energy of reaction3.4, 3.5 The main reaction of alkenes is the addition reaction which occurs due to the extra electron found within the C=C double bond which causes alkenes to be attacked by species called electrophiles in which like positve charged electrons. Due to the electrophile having an positive charge it is attracted towards the alkene which causes the electrons within the pi bond to break, then electrons from it are used in order to form a bond to the positive end joining the two carbon atoms to other things.Figure 11 Example of an addition reaction us ing X-Y, Chem guide, (2003)Another example of addition reactions is hydrogen and hydrogen chloride.ethene +hydrogenethane = C2H4+H2C2H6Due to alkenes containing pi-bonds (double or triple) which can be broken easily due to their overlay, it makes them the prime target for addition reaction, which stabilises the molecular orbitals by forming sigma-bonds, which are stronger.Another example ofan addition reactionis the bromine test which is simply used in order to tell the difference between an alkane and an alkene.Alkenes undergo an addition reaction when combined with bromine water which is usually orangey-brown in colour, but when it is shaken with an alkene, the solution becomes colourless as alkene decolourise bromine water as it reacts with the double bond, which indicates the presence of a pi bond. However if bromine water was shaken with an alkane, the bromine water remains brown as there is no double bond presentFor example, the bromine is decolourised because a colourless dib romethane compound forms. For exampleethene + bromine dibromoethaneC2H4+ Br2 C2H4Br2 (See figure 12)3.6 Polymerisation is an important reaction of alkenes. During polymerization all the atoms within the alkenes are used to form a polymer, a polymer is a large long-chain of molecule of repeated units which formed when smaller molecule called monomers join together. For example, several chloroethene monomers join end-to-end to make poly(chloroethene), which is also known as PVC via the polymerisation process. (See figure 13)Figure 14 Addition polymerisation reaction, BBC Bitesize, (n.d)Alkenes act as monomer due to the presence of the double bond. Different polymers have different properties, so they have different uses which make them important in cursory life. For example, the polymer polyethene is commonly used to make plastic bags and bottles, whereas polyproper is used to make crated and ropes and polycholorethene is uses in water pipes and commonly in insulation of electric ity cables.However regardless of the uses of polymers being useful their disposal creates various problems, due to being non-biodegradable, because being unreactive to majority of chemicals and bacteria. However can only be recycled, but this is a high-priced process. They can also be burnt which does produce energy but again produces toxic fumes.ReferencesAccelerated Study Notes, (n.d), Alkenes, on-line, addressable at http//www.acceleratedstudynotes.com/ib/chemistry-ib/ib-chemistry-alkenes/, Accessed on 16/05/15.Barry Gray, (2006), Organic Chemistry and the Alkanes, Alkenes and Alkynes, on-line, for sale at http//www.barrygray.pwp.blueyonder.co.uk/Tutoring/OrgC.html, Accessed on 18/05/15.BBC Bitesize, (n.d), Alkanes, on-line, Available at http//www.bbc.co.uk/schools/gcsebitesize/science/aqa/crudeoil/crudeoilrev1.shtml, Accessed on 16/05/15.BBC Bitesize, (n.d), Polymerisation, on-line, Available at http//www.bbc.co.uk/schools/gcsebitesize/science/21c_pre_2011/materials/chemicals crudeoilrev3.shtml, Accessed on 11/06/15.BBC Bitesize, (n.d), Polymers and ethanol from oil Cracking, on-line, Available at http//www.bbc.co.uk/schools/gcsebitesize/science/aqa_pre_2011/oils/polymersrev1.shtml, Accessed on 16/05/15.BBC Bitesize, (n.d), Polymers and ethanol, on-line, Available at http//www.bbc.co.uk/schools/gcsebitesize/science/aqa/substancesfromcrudeoil/polymersandethanolrev1.shtml, Accessed on 14/06/15.BBC Bitesize, (n.d), Properties of Alkanes, on-line, Available at http//www.bbc.co.uk/bitesize/standard/chemistry/materialsfromoil/hydrocarbons/revision/3/, Accessed on 15/06/15.Boundless, (n.d), Reactions of alkenes and alkynes, on-line, Available at https//www.boundless.com/chemistry/textbooks/boundless-chemistry-textbook/organic-chemistry-23/alkenes-and-alkynes-164/reactions-of-alkenes-and-alkynes-633-3626/, Accessed on 15/06/15.Chem Guide, (2000), Multiple substitutions in the methane and chlorine reaction, on-line, Available at http//www.chemguide.co.uk/mechani sms/freerad/multisubcl.html, Accessed on 18/05/15.Chem Guide, (2003), Introducing Alkenes, on-line, Available at http//www.chemguide.co.uk/organicprops/alkenes/background.html, Accessed on 15/05/15.Chem guide, (2012), Structural Isomerism, on-line, Available at http//www.chemguide.co.uk/basicorg/isomerism/structural.html, Accessed on 12/05/15.Chem Guide, (n.d), The halogenation of alkanes, on-line, Available at http//www.chemguide.co.uk/organicprops/alkanes/halogenation.html, Accessed on 16/05/15.Chem Wiki, (n.d), Cis Trans Isomers of Alkanes, on-line, Available at http//chemwiki.ucdavis.edu/Organic_Chemistry/Fundamentals/Structure_of_Organic_Molecules/Cis_and_Trans_Isomers_of_Alkanes, Accessed on 14/05/15.Chem Wiki, (n.d), Geometric Isomerism in Organic Molecules, on-line, Available athttp//chemwiki.ucdavis.edu/Organic_Chemistry/Fundamentals/Isomerism_in_Organic_Compounds/Geometric_Isomerism_in_Organic_Molecules, Accessed on 14/05/15.Chemistry Msu,(2013), Reactions of Alkenes, on- line, Available at http//www2.chemistry.msu.edu/faculty/reusch/VirtTxtJml/addene1.htm, Accessed on 15/05/15.Cliffs Notes, (n.d), Alkenes Molecular and Structural Formulas, on-line, Available at http//www.cliffsnotes.com/sciences/chemistry/organic-chemistry-i/structure-and-properties-of-alkenes/alkenes-molecular-and-structural-formulas, Accessed on 16/06/15.Ivy Rose, (n.d), Homologous Series, on-line, Available at http//www.ivyroses.com/Chemistry/Organic/Homologous-Series.php, Accessed on 17/05/15.Organic Chemistry Blog,(2012), Organic chemistry in everyday life, on-line, Available at http//organicchemistryucsi.blogspot.co.uk/, Accessed on 16/05/15.Organic Chemistry, (n.d), Polymerisation of Alkenes, on-line, Available at http//www.organicchemistry.com/polymerization-of-alkenes/, Accessed o 15/05/15.
Sunday, June 2, 2019
Fishing in the North Atlantic Essay -- Environment Fish Industry Essay
Fishing in the North Atlantic Abstract ocean fishes have been consumed by humans beyond their maximum sustainable yields for years and the Atlantic cod and squid are two examples. deceives were primarily overfished to commercial extinction. other(a) variables were also examined to see if they contribute to the declining population. Water temperature was the natural phenomenon that may be responsible for poor egg hatching. Human causes such as increased UV radiation from depleted ozone and bottom trawling disturbance were considered. Trawling disturbance had the worst effect while the other factors were questionable. As the cod vanished, the commercial fisher unit of ammunitioned to squid to continue their way of life. Government policy and economics had a great deal to do with the continuing overfishing pattern of wiping out one species and then turn to another. In the end, there is no real solution which accommodates both ecology and unchanged societal uses at the same time.I ntroduction It was believed that 500 years ago, Irish settlers went to Newfoundland not for the religious freedom there, but the fertile fish banks near the shore(Pollack, 1995). This was all but history now. The overfishing crisis took on headlines back in the early 1990s. The fish pack waters in the north Atlantic were rapidly removed for profit until the fish population was decimated. The current seafood production and human dependence upon it are enormous. In many third world countries, seafoods are the primary source of protein for human consumption. According to the offical website of the Commerce Departments National Oceanic and Atmospheric Administration, the seafood consumption in the U.S. remained steady with Americans consuming 3.90 billion pounds ... ...6-21. Safina, C. 1995. The Worlds Imperiled Fish. Scientific American 273(5)46-53. Schneider, D.C. David A. Methven, and Edgar L. Dalley. 1997. Geographic Contraction in Juvenile Fish A Test with northern Cod (Gadus mor hua) at Low Abundance. Canadian Journal of Fisheries and Aquatic intelligences 54(suppl. 1)187-199. Smith, S J and S. Gavaris. 1993. Improving the Precision of Abundance Estimates of Eastern Scotian Shelf Atlantic Cod from Bottom Trawl Surveys. North American Journal of Fisheries Management 13(1)35-47. Stephenson, Robert, and Daniel E. Lane. 1995. Fisheries Management Science A Plea for Conceptual Change. Canadian Journal of Aquatic Science 522051-2056.The American Heritage Dictionary of the English Language, Third Edition. 1992. Houghton Mifflin Company. Published on Microsoft Bookshelf 94 CD-ROM, 1994. Microsoft Corporation.
Saturday, June 1, 2019
An Analysis of Aria: A Memoir of a Bilingual Childhood by Richard Rodri
An Analysis of Aria A Memoir of a Bilingual Childhood by Richard Rodriguez Aria A Memoir of a Bilingual Childhood by Richard Rodriguez is an essay that shows his readers a part of life that many have never experienced. Rodriguez uses this essay to show how he fights through his childhood to understand English. Speaking cash in ones chips English will help him to fit in to society. He faces society while forfeiting his happy home life, to try to become a typical English-speaking student.As a young child, Rodriguez finds comfort and safety in his noisy home full of Spanish sounds. Spanish, is his familys intimate language that comforts Rodriguez by contact him in a web built by the family love and security which is conveyed using the Spanish language. I recognize you as someone close, like no one outside. You belong with us, in the family, Ricardo.? When the nuns came to the Rodriquez?s house one Saturday morning, the nuns informed the parents that it would be best if they spoke Engl ish. Torn with a new since of confusion, his home is glowering upside down. His sacred family language, now banished from the home, transforms his web into isolation from his parents. There was a new silence in the home.? Rodriguez is resentful that it is quiet at the dinner table, or that he cant communicate with his parents about his day as clearly as before. He is heartbroken when he overhears his mother and father speaking Spanish in concert but suddenly stop when they see Rodriguez. Thi...
Subscribe to:
Posts (Atom)