Wednesday, October 9, 2019

Work based learning Essay Example | Topics and Well Written Essays - 3500 words

Work based learning - Essay Example As if that not serious, imagine a police officer chasing after armed robbers who care less for their lives. Sometimes things are so tough in that one is in a dilemma. Imagine an officer chasing after a pickpocket within a crowd of people, and yet the suspect is running away making it hard to identify him in a huge crowd. To worsen the matter, the officer always engages himself in diffusion of a bomb that if it explodes, it may kill many people. Therefore, in general, the police career requires a dedicated person who takes risks for the love of his people (SAGE, 2012 p. 67). However, sometimes the duty delegation becomes so hard that some dies, resigns or performs poorly leading to their suspension. Therefore, to strengthen the force, regular recruitments and selections are made on yearly or emergency purposes (PSR. 2012, p. 1). However, for the few days have worked in Met police division, I Have discovered a few issues that are not ethical at all in terms of selection and recruitment. According to the United Kingdoms PUWER regulation of the health and safety executive (2006, p. 1), only competent persons should be selected in any vacant position. Competence will depend on the job, competence of the existing workers, circumstance of the job and the work equipments (HSE, 2006, P.1). Therefore, the act allows random selection of all persons that qualify for the post without any biasness on color, race or religion (HSE, 2006, P.1). However, the situation is not so in the Met Police. Several critics have been forwarded by many an indication that the suffering of innocent applicants is evident. According to Camber (2014, p. 1) in his article of the daily mail; the MET police has been criticized for racialism during its recruitment and selection activities. It is claimed that the agency has great racism against the blacks and other ethnic groups in favor of the white (Camber, 2014, p. 1). 40% of the London

Tuesday, October 8, 2019

Production Efficiency under the impact of Employee Training Research Proposal

Production Efficiency under the impact of Employee Training - Research Proposal Example Researches reveal that production efficiency (referred to as efficiency further on in this assignment), is significantly influenced by the variation in employee training, attitudes, and wages that employees receive. Conveniently concluding the discussion, as analyzed from the various literatures, it will not be wrong to suggest that: Over the years, researches reveal that these variables though are effective in enhancing the production efficiency, but each has a particular threshold level, beyond which, the concepts of diminishing returns start taking over. As this literature review moves on, it can be seen how valid this argument is prior to proceeding with the primary research about the same. It is worth mentioning here that the three impacts under consideration have been title of various human resource management books, which goes to show the depth of matter available on these; however, this research, due to constraints of time and other resources, has tried to gather a crux of these literatures.   2.2 Impact of Employee Training on Production Efficiency abc   2.3 Impact of Employee Attitude on Production Efficiencyabc 2.4 Impact of Employee Wages on Production Efficiencyabc   

Sunday, October 6, 2019

Undecided Assignment Example | Topics and Well Written Essays - 1000 words - 1

Undecided - Assignment Example The project personnel was present to answer the questions and concerns raised by the members of the public. The scope of the proposed project would widen the existing six-lane road facility to an eight-lane road highway and in addition, extend the shoulders of the road by reconstructing the existing two-lane frontage roads and upgrade to meet the current standards. It was proposed that by improving the infrastructure, the economic growth of the city will increase because of reduced traffic delays, improvement of safety in the city and it shall facilitate evacuations during an emergency. Due to the expansion project, an additional 11-acre stretch of land was required to complete the project successfully. It meant that several businesses shall be displaced by the improvement; however, the personnel manager present provided procedures, programs, benefits and other information on land acquisition. The environmental document and another drawing showing the proposed project was displayed t o the public hearing as well as other tentative schedules of how the program shall be executed. At 1400HRS, the expected speakers and the public had arrived and taken the various seats and position. A short prayer was offered and the was started by the city clerk who took us through the norms of the meeting. The first part of the discussion involved free intermingle among the public and the project developers, this was very interesting since it gave the public to have a close interaction with the project managers. It further enhanced rapport and close understanding of the project since several people were able to ask questions, which they may not have a chance to ask during the actual presentation. After a one hour of interactive mingle and discussion, everybody took back their seats for the full technical presentation of the project. The personnel project manager was given a chance to take us through the whole project, stating its merits and it is going to affect the citizen.

Saturday, October 5, 2019

History of India and China Course Profile Essay Example | Topics and Well Written Essays - 500 words

History of India and China Course Profile - Essay Example This course has deepened my interest in history. I found the archaeology of China very interesting.   We followed China’s evolutionary trajectories from the last Paleolithic groups that gathered hunting to the dynasty of Bronze Age Shang in second millennium BC’s second half. We learned that the sociopolitical evolution of China was multicentric. Competition and factionalism played a huge role in shaping the sociopolitical evolution of China. We studied the history of the ancient temple, Angkor Wat. It was a very special time in many ways. Not only did it preserve the history in terms of being the largest religious monument of ancient times, but its architecture also suggests how it shifted from being a religious place primarily from Hindus through to the Buddhists. An interesting finding was that it was the largest city in the world till the start of the Industrial Revolution. We were also surprised to know that Mahendraparvata, a lost city, has also been identified in it. The archaeology of India was also very interesting. The Mughal palaces and architecture were very elegant and inspiring. India’s archaeology made me realize how long have people been practicing Hinduism and Buddhism. Other things I learned about included but were not limited to the 7 billion think piece and Surviving In Bangladesh Having taken this course, I have become more conscious with respect to environmental health and safety. I have decided to change my life in ways that are better for the environmental protection. One day, someone from my 9th or 10th generation will be studying our archaeology.

Friday, October 4, 2019

Sun and earth Assignment Example | Topics and Well Written Essays - 250 words

Sun and earth - Assignment Example The theory was supported across the world from Greeks and further through mathematical astronomy by Aryabhata (Indian); by Muslim astronomers, Persian scientist and astronomer Biruni and through various publications across the world. It has given a new paradigm to the world of astronomy and hence paved the way to our present thoughts about the solar systems and other galaxies which were discovered due the formulation of heliocentric theory (Encyclopedia Britannica). On the other hand, geocentric model provided the earlier view that the Earth is in the center while, the Sun, the stars and other planets revolve around it. The stars are spinning about the pole and those which are close to the equator are rising and setting each day. The theory laid the fundamental view that Earth is rock-solid and stationary. The pioneer of this theory was Aristotle but with the advent of early modern era and after the 16th century, geocentric views were replaced by heliocentric theory (Lawson,

Thursday, October 3, 2019

People today freely use The Internet Essay Example for Free

People today freely use The Internet Essay People today freely use The Internet, E-mail, and Online Messaging to communicate with other people. It’s a great way to talk to loved ones who live far away, conduct business, and just have fun with friends, but there is a downside. People who we don’t know can obtain information about us by tracking e-mails and messages and unless these things are encrypted, everything we write can be pulled up and used against us. That is why people who use the Internet need to be much more aware of their online privacy and security. The Internet started in 1969 by the U. S. overnment. They wanted a communication system that couldn’t be destroyed in the event of an emergency. It consisted of four computers linked together called DARPANET. In the 1970’s people found that they could use this system to send messages between the computers to get to other people. More and more people started using this system and by the end of the 70’s, it was international. The earliest found company to use instant messaging was Mirabilis in November of 1996. Instant messaging is like a telephone conversation done between two people on the computer in real time. Popular companies that have instant messaging are AOL, Yahoo, and NET Messenger Service. E-mail or Electronic Mail is a way of composing, sending, and receiving messages over the computer. E-mail started in 1965, which means it actually began before the Internet and in fact helped start the Internet. First e-mail was used for multiple users to communicate through a mainframe computer. Now even though the government does not have control over the Internet in present day, they can still monitor what individuals are writing especially after September 11th. â€Å"The Sept. 1 terrorists relied heavily on the Internet, and the hijackers appear to have plotted their carnage using Yahoo e-mail. † The FBI believes they can now catch suspected terrorists by looking at suspicious email, but what constitutes suspicious? They have developed a program called Carnivore that looks through e-mail to find suspicious information. But, critics of this are not so sure of it’s benefits becau se it can be used to look for keywords such as â€Å"hijack† in mass amounts of e-mails, and whenever it finds an e-mail or message that has that word the FBI is entitled to read that message. If someone is just asking another person through e-mail about the current terrorist situation will that set off an alarm with the FBI and now that person’s e-mails will be tracked? Very possibly. The PATRIOT (Provide Appropriate Tools Required to Intercept and Obstruct Terrorism) Act provides investigators with more flexibility to pursue interception of e-mail messages, and monitoring of Web surfing and other PC-based communications. But does the general public believe that that government should have the right to look into private e-mails if they could catch a terrorist by doing it? According to a survey of PCWorld. m, â€Å"a total of 60 percent said they had serious concerns about giving the government more access to personal e-mail while 38 percent said they had little or no concern. † While the government and FBI feel that this is a completely legitimate way to weed out the terrorists in America, many others find it a complete invasion of privacy. This isn’t only a government vs. he people issue. As of 2004, â€Å"1 in 5 companies has had employees electronic messages subpoenaed in the course of a lawsuit or regulatory investigation† and â€Å"another 13 percent of 840 companies surveyed this year have battled workplace lawsuits triggered by employee e-mail. This means that private emails being sent while at work can be retrieved and used against a person in a court of law. The right to privacy is completely being revoked in these situations. That is why Americans need to be more aware of how to protect their privacy and there are ways to do this. First is by looking at the actual disclaimers that most people just sign without actually reading. American Online or AOL and Yahoo are two major providers of both e-mail and instant messaging. Looking into what their privacy policies are, you find this. Your AIM information consists of personally identifiable information collected or received about you when you register. Your AIM information may be shared within AOL and its business divisions. Your AIM information, including the contents of your online communications, may be accessed and disclosed in response to legal process (for example, a court order, search warrant or subpoena), or in other circumstances in which AOL has a good faith belief that AIM or AOL are being used for unlawful purposes. AOL may also access or disclose your AIM information when necessary to protect the rights or property of AIM or AOL, or in special cases such as a threat to your safety or that of others. (http://www. aol. com/info/p_privacy. adp. ) Yahoo’s disclaimer is similar saying that â€Å"Yahoo! collects personally identifiable information when you register for a Yahoo! account,† and â€Å"we reasonably believe it is necessary to share information in order to investigate, prevent, or take action regarding illegal activities. Basically both are stating that, for the most part, our privacies are protected unless there is a need to look at the e-mails or messages being sent. That is a big but though. People should read that and decipher that the government or business we work at could basically make up a story as to why they need to read an email and both of these e-mail companies would have to comply. That really isn’t protecting us. At least we should know ahead of time though that these are the company policies so it shouldn’t come as a surprise if our privacy was breached. This brings us to the concept of encryption. â€Å"Chances are that nobody is watching the data you send out, but unless the information is over a secure (encrypted) connection, you cant be reasonably sure that its safe. † The definition of encryption is â€Å"the process of encoding information in such a way that only the person (or computer) with the key can decode it. † There are different encryption systems, but essentially two computers have secret codes that hold the key to decoding the messages sent between them. So if a message is encrypted, only your friend’s computer will be able to read what you sent to them. Does this type of security interest the common person? It definitely should and is quite easy to obtain. There are messenger services that provide e-mail and instant messaging. One is called Hushmail, which includes encryption enhancements. All you have to do is sign up for it just like you would Yahoo! or AOL and the only downside is that storage space is limited. But the option is out there for people to choose safety over unnecessary storage. Yahoo! nd AOL are the trusted and most used e-mail and instant message companies so most people just subscribe to these two, but really need to research what else is out there in regards to encrypted messaging companies like Hushmail. Customers of AOL though can upgrade to AIM 5. 2, which uses encrypted messages. Yahoo! on the other hand only has a form of encryption. The â€Å"system sends the message unprotected to Yahoos server. The recipient is given a URL to view the document on an SSL-protected web page. † Consumers feel this is a weak link because the message is still being sent without it being secure, but it is a step forward. There are other simple general steps that a consumer should do or at least think about before signing onto an e-mailing system. One is to always know the software that you are downloading onto your computer. Many programs appear to be legitimate, but they really just want to get your information and use it for bad reasons that veer into your personal privacy. Also, if a person shares a computer with many people, like a college library system, that person needs to make sure they clear their passwords and personal information before leaving their seat. And basically people just need to be more suspicious. Even though that’s a bad outlook, if you’re messages are not encrypted, then you need to be more aware of what you’re writing. If you think it could be construed in a negative way, then you shouldn’t send it over an unprotected system that could one-day work against you. In conclusion, â€Å"although companies and other entities operating in the online or electronic commerce environment have a responsibility to ensure the privacy of personally identifiable information online, the Online Privacy Alliance believes that consumers also have a role to play. Consumers should look for privacy policies on the web sites they visit as well as be aware of the various self-enforcement mechanisms currently available. †After the tragedy of September 11th, the government does need to do certain things in order to further protect our country against another attack, but this shouldn’t mean attacking American’s privacy and security. Americans shouldn’t have to live in constant fear of Big Brother looking into our personal letters and messages to loved ones and friends, and also shouldn’t be afraid that some things being said are going to be taken the wrong way. That is the opposite of making us feel more secure and safe because that basically means we’re being attacked from within our own government. Saying that, there are many things that we, as consumers, are responsible for knowing what is out there to give us more security. There is encryption and the big companies out there that provide e-mail and instant messaging are getting on board and providing encrypted programs for us to use. We should also be responsible enough to actually read all disclaimers that we usually don’t bother to read so that we are not shocked when we learn that the government just looked at our private message to someone. It’s hard as one person to fight something like Carnivore, but we can do simple things like read disclaimers, be smart about what e-mail programs we subscribe to and be safe and responsible when we are on the Internet.

Incorporating Maori Values into Health and Social Care

Incorporating Maori Values into Health and Social Care Assessment Task 1 The Treaty of Waitangi or Tiriti o Waitangi is a written agreement signed on 6th of February 1840 between the British Crown and more than 500 Maori chiefs in Waitangi, New Zealand to negotiate sovereignty of New Zealand and to establish a British colony. The Treaty of Waitangi was intended to be a partnership between Maori and the British Crown. Even though it was aimed at creating unity, it caused conflict due to different understandings and breaches of the treaty. There are two versions of the treaty, the Maori version and the English version though the English text is not a direct translation of the Maori text so difficulties arise in interpretation. Both versions of the treaty represent consensus between Maori and the British Crown the right to govern and to establish a British settlement, while the British Crown assured to Maori full rights as a citizen and protection of all their assets and interests. In 1840, Maori chiefs decided for or against signing the treaty on the basis of its Maori text and after thinking about numerous considerations. The chiefs wanted regulated settlement and support in managing settlers and land sales. Commerce and cash income from employment would bring benefits to Maori communities. The new relationship between Maori and the British Crown would also enable them to avoid warfare between tribes that had intensified in previous decades. There are four principles of the treaty namely Partnership, Protection, Participation, and Permission. Partnership is the union and alliance with good and honest intent between Maori and the British crown to achieve a common goal. To ensure that Maori have rangatiratanga rights over their toanga (land, resources, language, knowledge, and other aspects of way of life of Maori), Maori leaders have to be consulted when organisational policies are discussed. In social services, organisations should make sure that the needs of Maori are of priority when taking part in creating policies that could affect Maori. Protection is allowing Maori to exercise Tino Rangatiratanga over their taonga (land, resources, language, knowledge, and other aspects of way of life of Maori) and they should benefit and enjoy from these. In social services, Maori way of life to enjoy their taonga must be respected. Maori have the right to make choices with regard to their culture which aligns with tika and kawa, traditions, customs, and practices. Participation is the involvement of Maori and the British Crown in the service accessibility, not only for Pakeha but for Maori as well. Not segregating the Maori from Pakeha but allowing the Maori to take part in social services that they enjoy together with Pakeha or other ethnicities. In social services, Maori have the right to participate in making decisions regarding their health and well being or Hauora and to have meaningful ways in decision making on how health services should be delivered for their well-being. Permission is the freedom of Maori to exercise his rights to speak Te Reo Maori and to be involved in any Maori spiritual or cultural rites, practices, or beliefs. In social services, it is important that Maori are allowed to speak their own language to express their insights better and to not feel unimportant. The four principles of the Treaty of Waitangi is the basis for social workers when delivering social services to Maori. Examples include consulting and discussing with whanau the support for clients from residential placement to maintain positive changes as a result of residential care placement, working together with whanau to understand cultural needs, allowing the whanau to make decisions that are in their best interest to maintain self determination and promote empowerment, and incorporating kawa and tikanga on how social services are delivered. Task 2 Summary of reason for family meeting or whanau hui A family meeting was held to discuss the possibility of a child to be admitted to an alternative care placement The child’s parents have alcohol and illicit drug use issues The parents are domestically violent toward each other and at times to the child Placement Diary Meetings and Communication Date Notes/Key points 26/02/2015 Referral forms were reviewed and explained to whanau An initial assessment was performed The child was identified as being at risk 27/02/2015 Appropriate services were identified and discussed with the whanau Notes/key points of how you perceived and recorded the referral. What service provider guidelines did you follow? Consent from parents and whanau were obtained before acting on the referral. Consent can be withdrawn at any time. All referrals were recorded in the database. An immediate safety check using the information provided by the referrer within 24 hours of receiving the referral was completed. Notes/key points of how you assessed the referral for relevance to the service provider. The referrals coming to the social service provider was assessed to find out if they were relevant to the services offered by the organisation. When deemed relevant, it was accepted. When referrals are assessed as not relevant to the service provider, it will be handed over to other service providers with appropriate services that cater to the needs of the client. This must be with the whanau’s approval and consultation. The referral was relevant to Child, Youth, and Family as a provider as it is the organisation responsible in dealing with child protection. Notes/key points of how you processed the referral through the service provider systems. What service provider guidelines did you follow? All information required were recorded using forms and in the system. The referral was forwarded to a social worker. Other notes/reflections on the referral process Accurate record was kept during theprocess, recording any actions taken, reasons and any other details. The information went to the appropriate social worker. Task 3 Placement Diary Coordination of planning for the family meeting Date Notes/Key points 05/03/2015 The child’s parents were phoned to establish details of whanau hui that need to be involved in the whanau hui The kaumatua and other leaders were contacted and identified 06/03/2015 All other participants who were not able to attend the meeting initially were followed up How did you identify the key members of the whanau? Briefly list the key members The key members of the whanau were identified through introduction. It was determined that Uncle S. is a kaumatua and he then introduced Auntie C. who is going to be a part of the hui. The parents of the child were also introduced to me and other members of the team. Uncle S. Auntie C. Auntie N. T.C. A.W. Who is the facilitator for the meeting/hui and how was this person identified? The facilitator of the whanau hui was Uncle S. together with the lead social worker. He was chosen as the facilitator of the whanau hui having the experience in making wise decisions during meetings in the past. He is also a kaumatua that members of the whanau will respect and listen to. If there were people unable to attend, summarise the information you provided to the facilitator on their behalf â€Å"A whanau hui is required to talk about the possibility of a child to be admitted to an alternative care facility. The child’s parents are incapable of looking after the child. The parents are alcoholic and illicit drug users. The parents also do not hold permanent employment sustainable for the child’s welfare. It is then deemed necessary to ensure the child’s safety and wellbeing.† If there were participants who had essential information for the meeting/hui, how did you identify these people to the facilitator? The participants with essential information for the whanau hui were given the chance to give details for the smooth flow of the hui. How did you notify the plan for the meeting/hui to members of the whanau and any other attendees? Details were sent via email. All attendees were phoned to confirm receipt and to confirm their attendance at the hui. Other notes/reflection on the planning process All whanau members were supportive of the family meeting. They wanted to attend to find the best outcome for the child Task 4 Placement Diary Coordination of welcome and hospitality Date Notes/Key points 12/03/2015 Powhiri was performed. Dietary requirements of all participants were gathered, including allergies, vegan diet alternatives, and others. The agenda was prepared in advance and distributed to all attendees. A karakia was said before the meeting and kai 13/03/2015 Everybody was updated The service provider’s database was updated. What cultural forms of welcome were required and who was responsible for these? Powhiri the host of the marae, usually the kaumatua, was responsible in carrying out the process of powhiri together with other leaders in the marae. This is to welcome me, as a student, and for me to be able to be a part of the whanau hui. Mihi all participants of the whanau hui were responsible for the mihi, and also to share their pepeha. Karanga the host of the marae, kaumatua and leaders, will lead the karanga. Karakia The kaumatua led the karakia before the hui, and also before the kai. Kai I took all the participants’ dietary requirements for the kai and gave it to the kitchen for the preparation of food. What resources did you arrange? The resources I arranged include the venue for the hui. The participants’ dietary requirements were also taken into consideration when planning for the menu for kai. How did you carry out the coordination of the whanau hui in line with criteria? Adhering to the principle of the Treaty of Waitangi namely participation, protection, partnership, and permission. The confidentiality of the meeting participants were protected and respected. The policies and procedures of the service provider was followed and adhered to at all times. Focusing primarily on the safety and wellbeing of the child. Other notes/reflections Working with other members of the extended family helped me to understand more on their culture and their way of living. Working with the kaumatua and other leaders in the marae provided me an opportunity to work in partnership with other key people in coordinating whanau meetings and this will help me to facilitate meetings easily in the future. Task 5 The four principles of Treaty of Waitangi were applied in the social services during coordinating whanau hui. Social work practice respects the Maori way of life. I provided culturally suitable and safe practice when working with the client and other key people during the whanau hui planning. They were allowed to practice their values, beliefs, customs, and to speak Te Reo during the delivery of service. The Maori models of health and well-being, such as Te Whare Tapa Wha, were used while engaging the client and the whanau with the service. The social services were non-biased, non-judgmental, and non-prejudiced. I had to understand the client and the whanau rather than judging them. I was also sensitive when providing services to prevent whakama which in turn helped me to gain the person’s trust and respect. A clear boundary of professionalism was determined while the client and the whanau accessed the social services offered by the organisation. The social services were made accessible to all cultures including the client’s and whanau’s that suits their Maori culture having their unique needs. I demonstrated high regard in respecting the dignity of all participants in whanau hui who accessed the services of the organisation. The participants were informed of their rights and to practice their rights whenever they have to. All participants’ confidentiality and safety were the organisation’s priority during the whanau hui process.