Monday, 7 October 2013

RESEARCH PROPOSAL ON BULLYING IN MIDDLE SCHOOL AND JUNIOR HIGH SCHOOL

BULLYING IN MIDDLE SCHOOL AND JUNIOR HIGH SCHOOL

 

Introduction

                        This research proposal discusses briefly the nature of bullying, its nature, causes and effects.  Some studies concerning bullying in middle school will also be cited, aiming to shed light on the factors that contribute to the phenomenon of bullying, eventually aiding the researcher in forming the framework for a more in-depth study on the topic.

                        Bullying among children is a very old phenomenon.  Literary works have described how children get frequently and constantly attacked by other children, and it stands that there are adults who have had bullying experiences in their younger years.  However, it wasn’t until the ‘70s that bullying had become the subject of systematic research. Up until then, studies have been centered in Scandinavia  (Fry, 1997).

                        Bullying is defined as aggressive behavior, repeated over time that is intentionally harmful and occurs with no provocation.  It is bullying when the bully enjoys dominating the victim and the victim feels oppressed. Bullying can be direct, such as teasing, taunting, calling names, hitting, kicking, stealing, threatening, or using a weapon. It can also be indirect, such as spreading rumors about someone, ignoring or excluding others intentionally, or                        influencing others to do these things (Harris and Petrie, 2003).

                        Incidents of bullying have far-reaching effects.  They create fear among the students, not just in the ones being bullied but in the other students as well. All students are affected, though, whether they are bullies, victims or observers.  10% of dropout students in high school claim that the number one reason for not going to school is because of fear of being harassed or attacked.  Similarly, over one-third of middle school students felt unsafe at                              school because of bullying and did not report such behaviors to school personnel because they were scared, lacked the necessary skills for reporting, and felt that teachers and administrators did nothing to stop the bullying

                        There are many reasons why students bully.  One may be because they see it as a way of being popular or of looking tough and in charge.  It may also be in order to get attention or things or to make other people afraid of them.  Still, it may be because they are jealous of the person they are bullying, or they are being bullied themselves.   There are also those bullies who do not see the wrong in what they are doing and how the person they are bullying feel  (Telecom and New Zealand Police, 2003).

On the other hand, students get bullied for no particular reason, but

sometimes it is because they are different in some ways, such as in the color of their skin, the way they talk, their size or their name.  Students also get bullied when they look like they can’t defend themselves.

                        Bullying does have detrimental effects to the student.  Bullying can make the students feel lonely or unhappy and frightened.  It makes them feel unsafe and that there is something wrong with them.  They may also lose confidence and may not want to go to school anymore.  It may also make them sick.

 

Review of Related Literature

                        Researchers say (Kass, 1999) that as many as 80 percent of middle school students engage in bullying behaviors.  They also point to an increase in such incidents when children move from elementary to middle schools.  Three different studies on bullying were presented at APA's 1999 Annual Convention, held on August 20-24, 1999 in Boston.

                        One study, led by Dorothy Espelage, PhD, Christine S. Asidao, and Shontelle Vion, of the University of Illinois at Urbaba-Champaign found that: many teens tease their peers just to go along with the crowd but are uncomfortable with what they do.  It was also found that students who are physically different, that is, in race, body size or clothing are more likely to be victimized, as well as those who are not as good at things as everybody                else is.  Furthermore, the study showed that those who say that they bully others are being bullied themselves. 

            This is similar to the findings of a research conducted by Glencoe/McGraw-Hill (2003), where it was suggested that some bullies may actually be victims of bullying and that teachers were unlikely to recognize                         victim behaviors.  The said study also indicated that bullying is more prevalent than previously believed.

            The second study presented in the aforementioned convention examined the accuracy of teacher, peer and self-ratings of bullies and victims.  This was conducted by Diana L. Paulk, Susan M. Swearer, PhD, Sam Song and Paulette Tam Cary of the University of Nebraska-Lincoln.  This study showed that about 75 percent of students had been bullied, victimized or both bullied and victimized during the school year of 1998-1999.  It also showed that students, more than teachers, over identified other students as bully-victims rather than just bullies or just victims.

                        The third study, conducted by A.D. Pelligrini, PhD, of the University of Minnesota and Maria Bartini of the University of Georgia, found that there is an increase in aggression during early adolescence while youngsters look for new friendships, but that many aggressive behaviors subside as soon as peer groups are formed.

                        Studies conducted by Ma (2002) showed that gender and physical condition were the most important characteristics of victims in both Grades 6 and 8. Victims came from schools with poor disciplinary climate in both grades. Gender was the most important characteristic of offenders, with affective and physical conditions being secondary, in both Grades 6 and 8. Offenders, however, varied considerably in school characteristics. School size was the contextual characteristic that stood out in both grades, but significant school climate characteristics were entirely different between the two grades. Schools where students are bullied less can be characterized as having positive disciplinary climate, strong parental involvement in Grade 6 and having high academic press in Grade 8.

 

Statement of the Problem

            It is obvious that bullying has a lot of physical, mental and emotional implications on a child.  In our world today where violence among the youth is becoming more prevalent, it is important to address this issue and to give it a more thorough investigation. 

This particular research will focus on bullying in Portugal.  Although bullying is not as pervasive in Portugal as it is in the U.S., bullying is starting to become a concern for teachers, and indeed, it is better to put a stop to it now before the situation gets worse.

This paper’s main objective is to study the factors surrounding the phenomenon of bullying among middle school students. In particular, this paper aims to answer the following questions:  1.  Who are the students who bully and who are those being bullied?  What are their characteristics, their age, gender and race?; 2.  What are the family backgrounds of the students who bully and those being bullied? 3.  How often does bullying happen? Where does it happen?; 4.  What kind of bullying do students experience?; 5.  How do the students feel after bullying or after being bullied?; 6.  Whom do students tell about bullying? 

 

Nature and Significance

                        Adolescence is defined as the period between puberty and the end of bodily growth. From this perspective, adolescence is held to be the time when a child reaches biological maturity (Branwhite, 2000).  Rapid physiological change may produce difficulties in psychological development leading to turbulent behavior.  This period may also be a challenge for parents, requiring them to stretch their tolerance and understanding. 

For many young people, middle school is considered a time of

great risk socially as well as emotionally, a time when students often need help learning to identify, acknowledge, and manage their emotions.  This period of confusion becomes even more difficult for the youngster when bullying occurs. Bullying may create destructive behaviors in the children, behaviors that may become insurmountable barriers in trying to build positive relationships with their fellow students and with their teachers.

            Indeed, the school plays an important   role in the growth of a child.   The National Children's Bureau report, Highlight on Violence, Disruption and Vandalism in Schools, found that pupils unable to achieve academic distinction turn to bullying and disruption as a way of gaining attention and status.  In a study conducted in 1978, boys were found to be four times as likely as girls to be responsible for physical attacks and also far more likely to be victims of attacks.  By intimidating their fellow students and implanting fear in them, bullies get to drag these students to their level.  Fear causes ineffective learning; thus, the bully gets to pull the other student down to his own level of mediocrity.  Still, some students try very hard to toughen themselves against physical attacks, that they become bullies themselves (Phillips, 1994).

            Parental care also plays a big part. How a child is treated and raised determines the kind of person he or she becomes. (Newberger, 2000)  In a study on the effects of divorce, researchers discovered that in all the family groups they studied, crying in boys received less comforting than in girls.  Boys are often discouraged from showing signs of weakness, with phrases such as Boys don’t cry.  Boys are often taught to be tough and to defend themselves.  Because there are no models of gentle boys, these children may find that they receive confusing messages about the way they should behave.

            Many think that bullying is just a phase that children go through, something that they will eventually outgrow, but the truth is that it is a serious problem which gets worse through time.  It should be noted and considered that the negative effects of bullying and of being bullied reach into adulthood.   Bullies are four times as likely to be involved in criminal behavior, with 40% of bullies already having three or more convictions by the age of 24

            On the other hand, those who were victims of bullying were found being bullied several years later.  Those who had been bullied in secondary school were found to have higher levels of depression and poorer self-esteem by the age of 23, even though they were no longer harassed or socially isolated. Chronically victimized students may even be at an increased risk for other mental health problems, such as schizophrenia or suicide.

            Evil actions are defined as repeated or persistent, not commensurate with provocation and causing extreme harm, at times due to repetition. Evil develops or evolves. As individuals and groups harm others, they tend to develop characteristics that make further and more intense harm doing probable (Staub, 1999).

            A number of elements in the generation of evil are evident.  These are: 1. The system in which individuals live, whether constituted by a culture and social conditions; 2.  The nature of a family or a classroom, and relationships among people; 3. Personal characteristics and the behavior of bystanders; 4.  The evolution of increasingly harmful acts over time; and 5. The frustration of basic human needs and their destructive fulfillment.

            With all the evil that seemingly surrounds us in these times of war, terrorism and political malpractice, we definitely wouldn’t want our children to grow and contribute further to all the disturbances that are already happening.  It is then of utmost importance to be able to raise these children properly and to surround them with the proper environment.

            This study would promote awareness on the situation of bullying in schools, particularly in middle schools.  This awareness will prompt people to be more alert to its occurrence and will hopefully help them better handle these situations.

            Awareness and correct information will also help schools develop more effective disciplinary measures and create open lines of communication between teachers and students.  Better curriculum may also be developed, in order to boost the students’ self esteem and create a friendly and warm atmosphere around the school.

            In the same manner, this study would help parents evaluate their way of raising their children, so that children may be brought up with proper values and good morals.

 

Methodology

                        Data will be gathered from a school in Portugal that has a population of 582 students, 305 of which are boys and 277 are girls.  The students’ ages vary from10 to 15 years old.  There are also 74 teachers. 

            Surveys will be conducted and questionnaires distributed among the students.  Students’ behavior will also be observed, and some students may be interviewed.

            Teachers will also be interviewed regarding their observation of their students and how they see the situation concerning bullying.

            Parents will be encouraged or urged to consent to being interviewed regarding heir children’s behavior and their family background.  The importance of the study will be explained to them so as to ensure their cooperation.

            After the data-gathering period, enough data should have been gathered concerning the factors associated with bullying behavior in middle school students( Bosworth, Espelage, Simon, 2003).  These can be grouped into the following categories: 1.  Demographic variables; 2.  Misconduct; 3.  Gun access; 4.  Symptoms of depression; 5.  Impulsivity; 6.  School sense of belonging; 7.  Confidence; 8. Intentions to use nonviolent strategies; and 9.  Beliefs supportive of violence.

            Demographic variables include gender, grade, and race, as well as the social status of the student.   Misconduct, on the other hand, is measured by asking the participants whether they had been in trouble or had problems at home, in school or in the community within a given period and the frequency of such incidents, if any.  Gun access would determine how easily students can get a gun.  Symptoms of depression would look into how happy or sad the students are, and impulsivity will determine how much of what students do are done without thinking first.

            School sense of belonging is about how much respect the students get from their teachers and fellow students, and if the students have someone in the school whom they can talk to.  Confidence is about how confident the students are in preventing violence and in dealing with situations in a non-violent manner.  Intentions to use nonviolent strategies measure how much students intend to or how far they are willing to go in order to avoid violence.  This is done by trying to understand the other person or by staying calm among others.  Lastly, Beliefs supportive of violence measures how much students believe in violence as a means to an end or as a way of uplifting one’s self esteem or dignity. 

BIBLIOGRAPHY

 

Bosworth, Kris; Espelage, Dorothy L.; Simon, Thomas R. (2003) Factors Associated with Bullying Behavior in Middle School Students Northbrook, IL:  Whitted & Cleary LLC

Branwhite, Tony.  (2000).  Helping Adolescents in School.  Westport, CT:

Praeger Publishers

Fry, Douglas P.  (1997).  Cultural Variation in Conflict Resolution: Alternatives to Violence.  Mahwah, NJ:  Lawrence Erlbaum Associates 

Glencoe McGraw-Hill.  (2003).  Chapter 2: Psychological Research Methods and Statistics "Researching Bullies".  Glencoe Online. Available in [http://www.glencoe.com/sec/socialstudies/psychology/psych2001/chapter2/walp.html].  Accessed [05/04/03]

Harris, Sandra; Petrie, Garth.  (2003).  A Study of Bullying in the Middle School. 

Bulletin Vol. 86 No. 633.

Kass, S.  (10/99).  Bullying Widespread in Middle school, Say Three Studies.

APA Monitor Online Vol. 30, Number 9.  

Ma, Xin.  (2002). Bullying in Middle School: Individual and School Characteristics

of Victims and Offenders.     School Effectiveness and School

Improvement Vol. 13 No. 1

Newberger, Eli H.  (2000).  The Men They Will Become: The Nature and Nurture

of Male Character.  Reading, MA:  Perseus Publishing

Phillips, Angela.  (1994).  The Trouble with Boys: A Wise and Sympathetic Guide

to the Risky Business of Raising Sons.  New York:  Basic Books

Staub, Ervin.  (1999).  The Roots of Evil: Social Conditions, Culture, Personality,

and Basic Human Needs.  Personality and Social Psychology Review Vol.

3 No. 3                     

Telecom and New Zealand Police.  (2003).  What’s Bullying?  Telecom and New

Zealand Police.  Available in [http://www.nobully.org.nz/advicek.htm]. Accessed [05/04/03].    

 

 

 

 

 

 

 

Literature Research and Case Studies of Cyber terrorism in UK, USA and Malaysia

 

Illegal analysis in cyber terrorism:

Literature Research and Case Studies of Cyber terrorism in UK, USA, Malaysia

 

 

The purpose of research is to examine and analyze cyber terrorism cases and literature in UK, US and Malaysia perspectives as well as usage of information technology by certain terrorists, upon determining what does and does not constitute cyber-terrorism and the real threat it poses for the countries mentioned.

United Kingdom (UK)

The great advances in information and communications technology have unprecedented impact on the society as well as considerable percentage of life and activities have come to depend heavily on information infrastructure. Computers are not inherently good or bad, so they can be either used for moral and legitimate purposes, or manipulated by criminals to pursue their immoral and illegitimate ambitions. Terrorists constitute one of the criminal groups that are expected to take advantage of information technology, either as means of enhancing their traditional activity or as new attractive target against which to launch their attacks. Cyber-terrorism is recently adopted term used to describe the convergence of cyberspace, the virtual world where computer programs function and data moves, with traditional terrorism (Arquilla and Ronfeldt, 1996). Even though terrorists seem to become more and more familiar with computers and the internet, it is important to clear out that not any malicious use of information technology constitutes cyber terrorism. Cyber-terrorism should also be differentiated from the so-called "information warfare", the manipulation of computers and networks in the context of war conflict between countries (Arquilla and Ronfeldt, 1996). The latter has been offensive and defensive function of states, while the former is an intimidating tactics of non-state factors fighting for an ideology. These two may resort to the same techniques, for example the distortion of an electricity network, but still this does not make them the same phenomenon. The use of information technology works in the same context as using the internet to collect information about targets or to communicate and co-ordinate action with fellow conspirators or recruit supporters. Neither constitutes a complete terrorist action to qualify as cyber-terrorism. Preceded analysis has shown that, although terrorists seem to be taking full advantage of information technology as a useful tool, there is no clear picture as to whether information infrastructure will constitutes new target. However, clearing up the picture of what is and what is not cyber-terrorism and the actual threat it poses is important because it will be decisive factor when choosing the weapons to fight it. The bad reputation of terrorism can be easily used as an excuse for extended intervention in the newly formed cyberspace.

USA (United States of America)

Cyber terrorism refers to premeditated, politically motivated attacks by sub-national groups or clandestine agents against information, computer systems, computer programs, and data that result in violence against noncombatant targets (Denning 1999, p. 27). According to Denning: cyber terrorism is the convergence of cyberspace and terrorism refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce government or its people in furtherance of political and or social objectives. UN manual on IT-related crime recognizes even after several years of debate among experts on just what constitutes cyber crime and what cyber terrorism, “there is no internationally recognized definition of those terms” (Mates 2001).  The patriot movement in the United States is known to haveadopted inter-networked forms of organization similar to those outlined above. Whilethe anonymity of the Internet is seen as fuelling the conspiracies of the militias, forthe groups themselves access to such new technologies is seen as vital tool forrecruitment and funding. The Internet hasenabled the militias to spread their ideas worldwide. There are militias in Australiaand Canada has been suggested that the Far Right in Europe has adopted theidea of ‘leaderless resistance’ via the Internet (Mulloy 1999, p. 16; Hoffman1998, pp. 105-120; Levin 2002, p. 964). Activists within the patriot movement haverepeatedly urged their compatriots, not only to organize themselves along networkedlines but also to opt out of other more pervasive networks that are viewedas dangerously perceptible to attack, as after September 2001, the U.S. government declared a “war on terrorism,” thus prompting a considerable concentration of scholarly resources to investigate and address the threat presented by terrorists. Given the nature of terrorist acts, which rely heavily on surprise and attacking at unexpected times and places, it is obvious that the first reports on U.S. readiness are at least questionable (Department of the Army, 2003).

Malaysia

 

Terrorism in Malaysia began with the response to insurgent movement launched by the Malayan Communist Party (MCP), believed that the British wanted to manipulate and exclude them from the independence process. Malaysia’s advocacy of military civil initiatives and experience of the past, the successful application of the elements of national power and the close cooperation with its immediate neighbors. Malaysia believes that media must be rational and sincere. The people in the media can sometimes lose control in their effort to gain higher ratings among the media community. As such, careful control of the media cannot be over-emphasized on its importance and what they could do to assist the government in maintaining conducive environment for peace and development. The Malaysian government has no control over individual accessibility to Internet facility. What it has done is to encourage Internet users to surf those items beneficial to individual development. Due to the lack of freedom of press, much of the criticism against the government is done via Internet. Malaysia’s response to the latest manifestation of terrorism is not only to “act against the potential terrorists, but seek to define terrorism and terrorists so that there is no ambiguity and everyone will be able to fight against them” (Dato’ Seri and Mahathir bin Mohamad, 2002).Malaysia’s experience should not be taken in total but rather examined, improved and implemented when and where it deems fit. Malaysia’s strategy in combating terrorism, based on its experience in defeating the communist terrorists has been on “two parallel levels namely; punitive/preventive law enforcement measures and, examination of the root causes of terrorism” (A CSCAP RoundtableDiscussion). In the country’s history, “political causes were an important factor in the country’s victory over the communists” (A CSCAP Roundtable Discussion) When Malaysia battled the communist terrorists, it was necessary to “demonstrate that Malaysians had secure life under the government of the day” (Dato’ Seri and Abdullah Hj Ahmad Badawi, 2003) and the population had every confidence in the government. 

NURSING CARE PLAN/ ESSAY

Nursing Care Plan

 

            The patient is      , a 72 year old man who has been admitted for dyspnea or shortness of breath.  reported that he has been coughing for the past week and his coughing has accompanied sputum discharge. His past medical history includes emphysema and chronic bronchitis. He used to smoke but has stopped since a year ago for economical reasons as well as it is also bad for his asthma. His bowel movements have also been irregular since his admission. He also reported that he is feeling depressed and fearful about the future. Further examination revealed that he has crackles in his left lower lobe with diffuse expiratory wheezing throughout his chest. Chest percussion also revealed his left lower lobe to be dull.

 


 

Needs / Problems

Goals

Interventions

Evaluation

Dyspnea or shortness of breath

Use the visual analog scale (VAS) to make an objective assessment of dyspnea. The VAS is a 100-mm vertical line with end points of 0 and 10. zero is equated with no dyspnea and 10 is equated with the worst brethlessness the client has experienced ( & , 2004)

Dyspnea is difficult to quantify and to treat (Potter & Perry, 2004). Interventions need to be individualized for each patient, and more than one therapy is usually implemented.

The underlying process that causes or worsens dyspnea must be treated and stabilized initially. Three additional therapies have to be implemented: pharmacological measures, physical techniques, and psychosocial techniques are then implemented.

Evaluation of how nursing interventions in dyspnea is usually done by evaluating the underlying cause of dyspnea.

Coughing up green and yellow sputum

The nurse should determine if the cough is a manifestation of any underlying diseases. In addition, other diagnostic tests must be performed.

Interventions can be geared towards curing the underlying cause such as chronic bronchitis.

A cough is difficult to evaluate, and almost everyone has periods of coughing.

Irregular bowel movement

The client has only defecated once since being admitted for four days. The client has to resume his regular bowel movements which is every two days.

Fluid intake has to be encouraged, and this should include appropriate fluids, fruit juice, and water.

Activity within the limits of client’s mobility should also be encouraged. Laxative and stool softeners can be provided as ordered. Privacy is also important.

The client should be asked for any increased activity. The client has to state that his activity pattern has changed therefore there is an achievement of outcome.

The client’s subsequent stool should be observed for characteristics such as consistency and color. Bowel movement should now be every 24 to 48 hours. Abdomen should be soft and nondistended.

Crackles in the left lower lobe of the lung with diffuse expiratory wheezing

The nurse has to identify what is the underlying cause of the crackles and wheezing that is revealed in the patient’s exams.

Since the generation of crackles depends more on lung volume changes than on airflow, patients should be advised to take slow and deep breaths in order to minimize flow turbulence and thus reduce the intensity of normal breath sounds (, 2001).

Wheezing in      could just be normal response of his asthma and therefore interventions have to be geared towards his asthma.

Evaluation of nursing interventions on crackles and wheezes should be related to the evaluation of the underlying cause of such clinical manifestations.

Consolidation in left lower lung

 The healthcare team responsible for the care of Norm Gallagher should examine the underlying cause of the consolidated lung.

Nursing interventions should be geared towards treatment of the underlying cause, like pneumonia.

The participation of other healthcare professionals is usually needed, like the diagnosis of a doctor.

Conventional evaluation of the lungs is based on tests of lung volume, capacities and breathing of the patient, among others.

 

           

Dyspnea means mental anguish associated with an inability to ventilate enough to satisfy the demand for air ( 2000). It is a clinical sign of hypoxia and manifests as breathlessness or shortness of breath. It is the subjective sensation of difficult or uncomfortable breathing. A common synonym for it is air hunger. Dyspnea is shortness of breath associated with exercise or excitement, but in some clients dyspnea may be present without any relation to activity or exercise. Dyspnea is associated with many conditions, such as pulmonary diseases, cardiovascular diseases, neuromuscular conditions, and anemia (, 2004). Environmental factors such as pollution, cold air, and smoking, may also cause or worsen dyspnea. In the case of       , his dyspnea is probably related to his problem of the lung.

            The rationale behind performing VAS for the patient is that dyspnea is subjective and performing VAS could objectively confirm if the patient is indeed experiencing dyspnea or not. Studies have validated the use of VAS to evaluate a client’s dyspnea in the clinical setting ( 2004). The nurse can evaluate the effectiveness of nursing interventions by monitoring the client’s assessment of their dyspnea.

            In the interventions for dyspnea, pharmacological agents may include bronchodilators, steroids, mucolytics, and low-dose antianxiety medications. Physical techniques, such as cardiopulmonary reconditioning through exercise, breathing techniques, and cough control, can help to reduce dyspnea. Relaxation techniques, biofeedback, and meditation are psychosocial measures that can lessen the sensation of dyspnea (, 2004).

            Cough is a sudden, audible expulsion of air from the lungs. Coughing is a protective reflex to clear the trachea, bronchi, and lungs of irritants and secretions. A cough is difficult to evaluate, and almost everyone has periods of coughing. Once the nurse determines that the client has a cough, it must be identified as productive or non-productive and its frequency must be assessed. In Norm Gallagher’s case, his cough is a productive one as it results in sputum production.

            A productive cough results in sputum production, material coughed up from the lungs that may be swallowed or expectorated (, 2004). Sputum contains mucus, cellular debris, and microorganisms, and it may contain pus or blood. It is the duty of the nurse to collect data about the type and quantity of sputum.

            The rationale behind the nursing interventions in bowel elimination alterations of          are pointed out in the succeeding sentences. Adequate fluid intake is necessary to prevent hard and dry stool. Activity including minimal ones such as leg lifts can increase peristalsis. The use of laxative and other medications can soften stool and prevent straining. Lastly, clients should feel relaxed when moving their bowels ( 2004).

            Auscultation of lung sounds involves listening for movement of air throughout all lung fields: anterior, posterior, and lateral. Adventitious or abnormal breath sounds occur with collapse of a lung segment, fluid in a lung segment, or narrowing or obstruction of an airway. Auscultation also evaluates the client’s response to interventions for improving Norm Gallagher’s response to interventions for improving his respiratory status (, 2004).

            Crackles are most commonly heard in dependent lobes: right and left lung bases. The cause is random, sudden reinflation of groups of alveoli and disruptive passage of air. Crackles (rales) are useful indicators of cardiorespiratory disease. The timing, pitch, and waveform of crackles reflect different pathophysiology in diseases, such as pneumonia, bronchiectasis, asbestosis, sarcoidosis, fibrosing alveolitis, cystic fibrosis, and pulmonary congestion due to cardiac failure (, 2001). Wheezes on the other hand can be heard all over lung fields. The cause of this is high-velocity airflow through severely narrowed bronchus. They are high-pitched, continuous musical sounds like a squeak heard continuously during inspiration or expiration. It is usually louder during expiration ( 2004). Wheezing is a common clinical finding in patients with asthma and chronic obstructive pulmonary disease (COPD) during episodes of severe airway obstruction, and can also be heard in normal subjects during forced expiratory maneuvers; however, the properties of wheezing are difficult to perceive and quantify during auscultation ( 2002). Chest percussion of         revealed that his left lower lobe is dull. A dull or flat sound may suggest atelectasis, pleural effusion, pneumothorax or asthma (, 2004).

            The nurse should also take into account that         is already 72 years old. The chest is normally more resonant in the child than in the adult. Breath sounds are also much louder in children because of the thinness of the chest wall. The normal assessment finding in the pulmonary system of an aging individual is as follows: The pathophysiological changes include (1) decreased chest wall compliance and loss of elastic recoil, (2) decreased respiratory muscle mass/strength, (3) increased ventilation/perfusion mismatch, (4) decreased alveolar surface area, (5) decreased carbon dioxide diffusion capacity, (6) decreased responsiveness of central and peripheral chemoreceptors to hypoxemia and hypercapnia, (7) decreased number of cilia, (8) decreased IgA production and humoral and cellular immunity, (9) decreased respiratory drive, and (10) decreased tone of upper airway muscles (, 2004).

            Key clinical findings in an aging pulmonary system includes (1) prolonged exhalation phase, (2) decreased vital capacity, (3) decreased PaO2, (4) decreased cardiac output, (5) slightly increased PaCO2, (6) increased respiratory rate, (7) decreased tidal volume, (8) decreased airway clearance, (9) diminished cough reflex, (10) increased risk of aspiration and infection, (11) increased risk of arterial oxygen desaturation, and (12) snoring, obstructive sleep apnea ( 2004).

            Upon physical examination of         , it revealed that his arterial blood gases are at pH 7.36, the PaO2 is at 55 mmHg, and the PaCO2 is at 65 mmHg. PaCO2 is the partial pressure of carbon dioxide in the arterial blood and PaO2 is the partial pressure of oxygen in the arterial blood. Unlike liquids, gases expand to fill the volume available to them, and the volume occupied by a given number of gas molecules at a given temperature is ideally the same regardless of the composition of gas. This is what is called as the partial pressure. The normal values for PaCO2 and PaO2 are 40 mmHg and 100 mmHg respectively ( 2001).

            The past medical history of        showed that he has emphysema and chronic bronchitis. The term pulmonary emphysema literally means excess air in the lungs. However, chronic pulmonary emphysema is a complex obstructive and destructive process of the lungs that is in most instances a consequence of long-term smoking (, 2000). Chronic bronchitis is the chronic inflammation of the bronchi which leads to thickening of mucosa and decreased bronchial diameter (, 2004). Clients with chronic bronchitis generally produce sputum all day ( 2004). This is a result of the dependent accumulation of sputum in the airways and is associated with reduced mobility.

            Consolidation of the lungs – whole lobes or even the whole lung – is usually a manifestation of pneumonia. Large areas of lungs become consolidated which means that they are filled with fluid and cellular debris (, 2000). All interventions and evaluation of treatments for       has to take into account the underlying causes of his medical manifestations like crackles and wheezing.

 

 

 

REFERENCES

 

Case Study on Recruitment, selection and retention #casestudies #freeessays

Task1: Recruitment, selection and retention

Recruitment Procedure

Tesco, the leader in this field, states clearly that the reward it gives users of the Tesco Club card is a thank you for sharing information. It is also obvious to the Tesco customers that it is a better store. It may not be obvious to everyone that this is the result of their customer information, but, if asked, Tesco managers can give  a straight answer. Most applications of customized branding methods concern established brands or extensions of established brands. Tesco used customer data to launch Tesco personal finance, a unique venture as such, but from a brand marketing point of view a range extension; presumably customer data to support the launch plan came from Tesco's retail customers (Nilson 2003). The reason is that, first, customizing the brand is easiest if customer data is available, and customer data is of course not available, unless the brand is already on the market. The second aspect is that to customize a brand there must be a brand platform to customize. However, this is not necessary. It is perfectly possible to start with a customized plan from the beginning but it is highly unusual. In retailing Tesco knows a lot more than the discount chain Netto, British Airways know more than the low-price airline Ryanair. This has nothing necessarily to do with ability but with business strategy. If the brand platform is based on a low price alone, most companies with that kind of strategy just wait for the bargain hunters to come, as the business model does not allow for customer analysis (Nilson 2003).

 

Tesco, the UK retailer and master of customer information, used its customer database as a fountain of information when developing the Tesco finest range. A range of superior, quality-food products aimed at taking the high ground in food retailing. Understanding the customers meant that the right products could be developed and the end result was a highly successful launch.Tesco instead attempted to change the whole bundle of characteristics, bringing all aspects of its operations in line with its desired new position over a short period of time. It introduced a much wider range of fresh produce, and increased the proportion of private label goods. It raised the quality of merchandise generally and shifted the centre of gravity of its operations from city centers to out-of-town supermarkets (Kay 1995).  Tesco's success reflected the different basis of its competitive advantage. The company had established an internal and external architecture in its retailing systems. This is a distinctive capability which could be exploited in many different market positions. Its reputation was of modest value. Such a reputation is easy to acquire. So Tesco sacrificed little of the company's existing distinctive capability, and exploited its new one more fully. Tesco's shift of product position was successful in the sense that it achieved its aims (Kay 1995). The recruitment process would focus on print advertisements. There would be posters that would be placed on authorized walls. The posters would be in conspicuous places so that people would see the need for staffs.  There would also be newspaper advertisements. It would be a quarter of the page of a newspaper. This would be done so that the cost would be minimized but it does not prevent the advertisement from being seen by applicants.  All advertisement would contain the logo of Tesco. The header of the advertisement would contain a huge text that has the words “staff needed”. The advertisement would also contain the positions needed, the requirements for the positions and the qualifications needed for the position.  The advertisement would clearly state that previous work experience is a big plus. 

Selection procedure

Tesco Stores is currently the leading UK food retailer. Its competitive advantage is built around a focus upon high quality as well as low cost. Using an Efficient Consumer Response operations strategy, they offer a high quality service and product availability, but at the same time keeping waste and costs low. They also recognize that different operations strategies should be used for different product groups and characteristics. They increasingly seek competitive advantage from niche operations by tailoring the goods supplied to the needs of the geographic region (Lowson 2002). Hiring new people from outside is one kind of membership decision; candidates are recruited, their qualifications are assessed, and some of them are hired. Applicants often specify the position or kind of position they seek, and they are rarely considered for other roles. A first screening may be a preliminary interview, completion of an application form, or both. If an applicant is to be seriously considered after the preliminary screening, assessment of applicant characteristics follows. This may begin with subjective assessments of behavior during interviews or of information on an application blank or résumé. In earlier times it included writing to or calling people listed as references; now, when organizations are so often sued, calling a previous employer will rarely elicit more than confirmation of the dates of prior employment (Guion 1998).

 

Formal assessment procedures used in some organizations include written tests, performance tests, structured and scored interviews, assessment centers, carefully developed personal history forms, and the like. These examples all provide numerical values to represent assessments, values that can be used in research to determine the value of the procedure for the selection enterprise.  Procedures are sometimes casual, sometimes very systematic; usually, job analysis concentrates on one job at a time, one where the need and opportunity for improvement seems greatest. Job and organizational need analysis should consider whether relatively poor performance on a job is a selection problem or is approached better by other organizational interventions (Aguinis 2004). Need analysis asks whether the best approach is likely to be to redesign the job and immediate work environment, to change people already on the job through training or improved management, or to improve selection procedures. No new selection procedure can solve a problem that springs primarily from inadequate equipment or inept management. People look for employment in organizations that already exist; they are attracted to some organizations more than to others and apply to the most attractive ones. Whether the basis for attraction is factual or exists only in rumor, organizations can choose only among those who are attracted enough to apply to them. If the basis for attraction was wrong, and people once in the organization find that the fit is poor, they leave (Aguinis 2004). The selection process would focus on the use of one written exam, one practical exam and a character based interview.  The written exam would help in identifying the knowledge skills of the personnel. It would confirm what they learned in school and it would identify their strong points. The practical exam would check the applicant’s skills and knowledge of Tesco. The practical exam would determine how the applicant can contribute to Tesco. It will determine whether the applicant can perform multiple tasks. The interview would determine how the applicant relates with others and will help in determining how the applicant will respond to circumstances.

Staff retention

Employees, especially the most capable ones, have an increased confidence in their ability to work under conditions that fill their own needs. They can negotiate the terms of employment that suit them and change jobs and careers to secure better conditions. The movement of power to the employee will continue over a long time, despite fluctuations associated with the economic cycle and specific labor markets. That is why retention is so important today and why a company will continue to find it difficult to retain the employees they want to keep (Dibble 1999). Retention is a serious and ongoing issue. It is a problem that a company will continue to face for the foreseeable future. The employees they want to retain are always in short supply and always have alternatives. As a firm develop their own plans and programs to increase their ability to retain the employees they want to keep, the three factors of identifying who they want to keep, quantifying costs, and assigning responsibility, will help a firm focus on the essentials. Employees will no longer endure what they do not like in their employment situation. They have power in the knowledge of their abilities and confidence in their value in the marketplace. With greater loyalty to their career and their skills than to their employer, they move on (Dibble 1999).

 

The twenty-first century employment relationship puts enormous pressure on organizations to lay a solid foundation for the employment relationship. New employee orientation is one of the foundations of retention. The company needs to be prepared for employees at different locations; in different levels of the organization, and most importantly, with different individual needs. A company needs careful planning and preparation to identify all the individualized paperwork they need to sign and the specific information required for their circumstances. Options play a different role in retention in larger, established businesses. Here, options are part of the overall pay strategy. They are a way of distributing pay based on the success of the company in the stock market. There is less risk in the stock of an established company and therefore less reward compared to a start-up. Options can be granted selectively to the individual employees want to retain (Arthur 2006).  Benefits cannot help a company retain only the employees they want to keep. But they need to be competitive with their benefits when they recruit employees. Businesses are unlikely to attract employees because they have many more choices in healthcare coverage or offer more life insurance than the competition. Employees value their benefits, but they may not realize all that the company provides for them. A company gives employees booklets and forms when they first come to work for them and additional information as changes are made. Employees often think that benefits are complicated and give up reading about them until they have a specific need or want to file a claim. One way to remind employees what a company offers is to distribute annual, personalized benefits statements. Typically these list each benefit, accompanied by a brief description and reference to more information (Arthur 2006).  To retain employees, the management must make sure that the relationship with the personnel is strong. Lines of communication should always be open between the management and the personnel. There should be a time for bonding and strengthening relationships. The management need to be open to any comments from the employees and must know how to motivate the personnel. The store should provide the necessary financial and non financial method of motivation.

Legal and Ethical issues during recruitment and selection

Each organization must recruit and select the appropriate talent for the positions vacant within an organization. The process of recruitment is usually guided by perspectives of equitable treatment. Affirmative action and equal employment laws significantly govern what public and private organizations do to fill vacancies. To ensure equitable treatment, test creation, test validation, interviewing techniques, assessment centers, performance-based exams, and other strategies have become techniques used by organizations to ensure equity while simultaneously providing a method of evaluation and narrowing candidates to effect a selection within the organization. This is often the most visible and most contentious area for HR directors and managers (Williams 1996). Organizations have outcomes that are often different from applicants; therefore, actions that may be perfectly legitimate and legal on the side of the organization may also receive enormous scrutiny from the public and other entities because it is hard to rationally state that fairness was achieved in the hiring process. Because lawsuits and complaints are usually filed through external agencies against organizations, a rigidness forms within corporations around the hiring process that often breeds distaste and establishes unrealistic expectations of the selected applicant for positions. The strategies for the field of human resources encompass approaching each area within the field from the perspective of balance (Williams 1996).

 

 

Strategies for personnel, recruitment and selection, compensation and classification, labor relations, training, health benefits, and health promotion must begin to focus on the issue of balance rather than focus on specific requests from within the organizations. This is not a statement of indifference or insubordination; rather, it is a statement that strongly suggests that HR professionals stop discounting their own gifts and their own focus as they hear requests from organizations for strategies to respond to issues from within the organization (Nie & Young 1996). HR professionals must filter all information with their professional filter, not their political one. Currently the area of recruitment and selection focuses on getting employees on board in an organization to meet the specific needs of the organization in a specified job. Where organizations are heavily regulated, rules of fairness and equity are frameworks that structure how the organization recruits and selects individuals for the position through some selection criteria. These has the earmarks of being successful unless the organizational leadership is more focused on getting the person that matches their own style, thereby potentially thwarting a fair and equitable process in the recruitment and selection cycle. Recruitment and selection also encompass testing and validation as critical to the appearance of equity. Issues of adverse impact, fairness, and closeness of the item on the test to the actual issues of the job are always at question (Nie & Young 1996). The ethical issue that the company should be wary of is unfair methods of recruitment and selection. The company should make sure that its process of recruitment would be transparent and free from doubts. It should not hesitate to recruit or select people regardless of their race or disability. As long as the applicant is qualified, the company should still hire the personnel even if they have disability or has a different race. The legal issue that the company should be wary of is the violation of UK employment laws. The firm should make sure that it will follow the laws on Hiring, selecting and retaining employees. 

SOCIAL PROBLEM: RACISM

Racism as a social problem

It is widely believed that racism remains a major international problem at the dawn of the twenty-first century. The term is used in some countries and in some circles to describe hostility and discrimination directed against a group for virtually any reason. Racism survives even in the carefully delineated sense that has governed the study of its history. The Holocaust and decolonization may have permanently discredited what can be called as overtly racist regimes, but this good news should not be inflated into a belief that racism itself is dead or even dying (, 2002). Group inequalities associated with what are taken to be indelible marks of inferior or unworthy ancestry can exist without having the full apparatus of the modern state to sustain them. The legacy of the past racism directed at blacks in the United States is more like a bacillus that people have failed to destroy, a live germ that not only continues to make some people ill but retains the capacity to generate new strains of a disease for which people have no certain cure. If racism is not dead, it is less intense and intellectually respectable than it was a century or even a half-century ago (, 2002).

 

 But human beings continue to mistreat other human beings on the basis of their ethnic identities. Although it takes much more than rational persuasion to overcome racism, the fact that its foundations are subject to empirical falsification does make it more fragile than the incontrovertible and unquestioning faith demanded by sectarian or fundamentalist religion. Along with the dissemination of the truth about human physical differences, the struggle against racism also requires that stigmatized groups have enforceable civil rights, political empowerment in proportion to their numbers, and equal opportunity in education and employment (, 2002). Racism has been the problem for the society since time immemorial. It has created human conflicts and it caused world wars. Measures have been used by society to counter such problems but it continues to exist in society and in every culture in the world. Racism involves not only the outcast of people not having the same color as the general public, it involves setting aside people with a different culture, tradition or birth place. Racism happens in private and public agencies, entertainment institutions and even in the media.

 

Ecological Perspective

Ecological perspective places individuals and their problems in their larger human and social contexts. Individuals are engaged in constant, reciprocal transactions with other human beings and other systems. In contrast to traditional psychological theory that conceptualizes individual problems as originating within the individual psyche, ecological theory looks to the interface of the person with the larger environment for the origin of individual problems and their solutions. Human behavior cannot be understood except in the context of the multiple connections and interactions that individuals have within their own human ecology (, 2004). In an ecological perspective racism starts from the innate characteristic of human beings to be threatened by people not belonging to their same class or race. When someone from another race tries to interfere with their affairs, the natural response of humans is to retaliate by rejecting the other persons desire to interact with them. Humans have a natural instinct of concern that another person not belonging to their race may surpass their achievements and steal their group from them. When they feel that the person is better than them, they set them aside. Humans also have the tendency to outcast any person not having the same race as them because they have fears that the other person may have better look than them.

 

Labeling perspective

In some cases opponents of the labeling perspective have argued that it fails to provide an explanatory framework from which to understand deviance. Despite the fact labeling theory has never intended to explain the causes of deviance, many still call attention to this as a weakness. Others have focused attention on the limitations of the perspective to define exactly what theorists mean by the societal reaction (,  & , 1999). In a labeling perspective racism comes when a group of individuals label a person for what other members of his race have done. A black person may experience racism when other people see him/her as someone who steals like other black people. The color of the person is not used as a source of racism but the label of what the other black people has done.  An Asian person maybe set aside not because of his/her race but because some people label Asians as those people who make counterfeit products.

References

Risk Management Strategies: Apple Computer Inc.

Risk Management Strategies: Apple Computer Inc.

Introduction

            Risk can be found everywhere. Man doesn’t have to look and analyze very hard in order to find it (Culp 2001, p. 3). Many are saying that the world has becoming a riskier place. The supporters of health and safety risk management also believe in the said statement. This can be seen in the society of America that is becoming obsessed with the risk. Americans are considered as the healthiest as well as wealthiest people in the history of mankind. However, they are considered as the most seemingly risk-averse people (Culp 2001, p. 4).

            In terms of finance, there have been many people who are saying that the world has becoming more dangerous both for the individuals who are engaged to the growing swings in the global equity markets as well as for those corporations that depends to the unpredictable variables in the cross-borders (Culp 2001, p. p. 4).

            As of now, there are many important variables and factors that can affect the overall performance of the company in terms of their relationship with their customers as well as other important entities who are involved in their supply chain. As of now, there are two most important factors that affect the position of a specific company in its respective industry as well as its position in the market, and that is globalization and innovation. The said two factors can give a tremendous impact to the competitive advantage of any company.

Globalization is considered as a multidimensional process that can help to broadly restructure as well as integrate the economy of the world, different institutions, together with the civil societies. It can also be considered as a forceful, continuing and accelerating process that helps to increase the different links and connections among the different actors, as well as the overall structures where in they operate, both inside states as well as across borders. Due to the help of globalization, trade, production as well as finance are now becoming more integrated in global manner, that before, it operates like global organizations and social movements. The said huge and wide relationships and connections helps to make the global interactions stronger and more complex (Clapp & Dauvergne 2005). Although globalization can help to improve competitive advantage, there are many risks that are associated in the said tactics. There are many barriers as well as factors that might affect the overall performance of the company due to globalization such as change and differences between the customers as well as the human resource.

Another important aspect is innovation or technology. The Internet is considered as the most used and the most important aspect of innovation and technology. Technology such as computers and other important hardware and software, enables many companies to have error-free and efficient transactions by having a centralized computerized system that can be used for decision-making processes. Innovation without risk is impossible, this is due to the fact that the process where in the risk is most naturally addressed in often manner is innovation. This is due to the fact that the process of replacing the old one with the new one often helps to make the world a safer place (Culp 2001, p. 4).

Apple Computer Incorporated

            Apple Computer Inc. is Multinational Corporation in America that is engaged in the business of designing and manufacturing different electronic products and related software products to their target customers. The said company was originally from the Cupertino, California. It was established during April 1, 1979.  The said business focuses on developing as well as selling and giving supports and aid about series of personal computers, portable media player, different computer software, together with the computer hardware, together with the different accessories.

            The company had become well known because of their product, iPod.

Risk Management Strategies of Apple Computer Incorporated

            Apple is engaged in one of the biggest industry in the world, where in there are many competitors who are offering the same or related products and services. That is the reason why the company is facing its major risk that is connected to the aggressive competition in the market. Competition is always one of the most important as well as the biggest risks in the business. Competitors are all battling it out in order to control the bigger segment or part of the market (Zajas & Church 1997, p. 252).

            Another important risk that the company will be facing in the future is the changing buying behavior of their target customers due to the changing condition of the global economy as well as the respective local economies of their target customers. The financial capability of their customers is also changing due to the said matter, and it has as great impact to the image of the products in the market. The said condition can even cause the customers to switch to other brand.

            Another important thing is the growing incidents of fake and pirated products. This is one of the most important and growing risk for any company in the world, more specifically those who are involved in the electronic and computer industry. This is due to the fact that those products can be major competitors because they will offer lower price compare to the original, at the same time it can also cause bad image to the company, because it has the brand of the company.

            The said risks are the most important threats that the company will be facing that will later on lead to another serious problem. That is why, the company must pay attention in order to ensure its position in the global market, and more particularly maintain the loyalty of their customers.

Branding

            In terms of the problem regarding the increasing and ever-growing competition in the global industry, branding is its primary strategy. Branding is considered as one of the most efficient marketing tools that are used by many companies for their products and services. It can be defined as the process or method of creating a good connection or relationship between the company or the brand and the customer, in order that when the customers have a need, they will be able to think of a given product in order to satisfy their needs or demands (EBay 2008). Furthermore, it can also be defined as the process of creating a connection between the given symbols, purposes as well as passions and insights with the products and the services of the company, with its goal to drive loyalty from the customers that will later on create a huge differentiation from its competitors (Hislop 2001, p. 6).

            Apple is focusing on its activities in branding as well as to enables recognition from their customers. It is the process where in the company had been able to catch the attention of their customers and furthermore let the customers bring to their mind or bear in minds the products, whenever they are in need. Apple, particularly its iPod is considered as one of the most loved brand in the world. Branding is being used by the company in order to maintain its position in the market.

            The said marketing strategy is important because it creates an important competitive advantage or edge for the company against its other competitors. Furthermore, it also helps the company for the future threat for new competitors due to its connection to its customers.

Innovation

            Another important strategy of the company is its innovation process. It is important due to the fact that human are naturally insatiable, it means that the customers will ask for more and will need more for a given product. According to the CEO of the company, Steve Jobs, innovation is one of the most important processes that are being focused by the company. That is why they are hiring people who want to make the best thing in the world. Another thing is that their human resource are doing their best in order to make products that will come out the best that it can be (BusinessWeek 2004).

            In addition to that, innovation process of the company also enables them to gain the trust and loyalty of their customers by improving the relationship and connection of their products to their customers. According to Steve Jobs, the primary reason for the loyalty of their customers is that when they buy their products, three months later they will get stuck on something, that they will quickly figure out that the company actually did the said features or innovation. Furthermore, after three months, the company will launch another product that will have another or additional features that will again surprise the customers (BusinessWeek 2004). The said continuing process will maintain the interest of their customers.

            By means of innovation, it can help the company to manage the different risks and problems that can be faced with regards to the issue of the threats for new entry as well as the threat for substitutions. The loyalty of the customers will be a great weapon of the company in order to manage the different problems that can affect their position in the market. Due to the fact that the innovation processes of the company enables their customers to be satisfied that will make it hard for the new competitors to enter in the same industry.

Risk Management Problems of Apple

            One of the most not managed or not focused risks that are faced by the company is the pricing strategy. As of now, due to the ever-changing and ups and downs in the global economy, as well as the increasing numbers of fake Apple products that are available for low price in the market, it can affect the overall performance of the company.

            In terms of fake products, the company must able to monitor all of the entities from its supply chain in order to make sure that all of the software as well as the overall structure of their products will not be copied and be reproduced. Furthermore, the company must also set a standard or a unique trademark, symbol or part that cannot be copied or reproduce in the part of their products in order to inform the product about the original and fake products.  Furthermore, the company must be able to create and published different advertisement or notice to their customers in order to inform them regarding the issue of fake products.

            Another important issue is the pricing strategy of the company, iPod and other products of the company are also considered as luxury brand. This will affect the overall performance of the company in terms of sales due to the fact that it offers high quality products but in high price. The said situation of the company can give other competitors some competitive advantage in terms of price. This is due to the fact that there are other countries or market that are price sensitive who prefer to buy or avail products and services that are low in price but has a high quality. In those terms, the company must able to create and produce products that will target the said important segment of market. It must be able to manufacture product that will be accessible and available for the mass or for the lower class level to avail the product, at the same time offering product that is high in quality in order to maintain the image of the company in the market.

            On the other hand, the company must also maintain its image in the market as one of the luxury products and as one of the most sophisticated electronic company in the global industry. This is to maintain the loyalty of its other customers who belong to the upper class of the society. The company must be able to have different products and services that will handle the different level of income or social status. It will help the company to gain more market as well as to prevent the risk of the presence of the fake products that will serve as the nearest competitors of the company.

Learning Outcomes

            One of the most important things that I have learned in the past module is about the different risk that can be faced and can affect the overall performance of any companies in any industries in global as well as in local market. Another important thing is that risk can affect the position of the company in the market as well as its relationship with its customers. That is the reason why it is important for any company to have its own different strategies in order to manage well the risks that might affect their overall performance.

            In application to the real life, risk is just like air, it’s everywhere, anything we do, we plan and we decide, there will be a risk that might affect its result or outcome. That is why it will be important to analyze all of the possible risk or threat that might cause future problems before doing or deciding about something. Risk management gives idea regarding the decision-making processes as well as in managing and organizing daily life with connection to business as well as other personal issues. The popcorn analysis also enables to give me more ideas regarding the different advantages and disadvantages in order to gain competitive advantage in any given market.

            On the other hand, one thing that helped me in my process of learning in this module is the process of researching and analyzing the case studies that have been given to us. The said activity enables me to work on my own, and study using my own knowledge and then show my own perspectives and own ideas regarding the different issues that are associated in the course of the study. Furthermore, different books, journals, online journals and different websites also helped me to learn more regarding the issues and then create my own conclusion about it. Above all, the ideas and concepts of the Porter’s Five Forces, enables me to focus more on the different threats that might cause risks to any company in any industry. 

            For future classes, it will be important to focus more on the different cases or situations that are related to the subjects in order to compare the different situations and the different aspects that might helped the students to understand more about the actual or the real world applications of the different theories that are related to the issues that are being tackled. It will also helped the students to develop their ability to critically analyze and evaluate the different factors that are directly as well as indirectly associated or related to the core issue.

In addition to that, it will also be important to have more individual as well as group activities in order to develop the independency as well as the theme of team work. By doing the said activities, it will help the students to work on their own as well as to work as a team, improving their relationship with other people.

 

References

 

Clapp, J & Dauvergne, P 2005, Paths to a Green World: The Political Economy of the Global Environment, MIT Press

 

Culp, C 2001, The Risk Management Process: Business Strategy and Tactics, Wiley, New York

 

Frame, JD 2003, Managing risk in organizations: a guide for managers, Jossey-Bass, San Francisco

 

Gottinger, H 2003, Economies of network industries,Routledge, New York.

 

Hislop, M 2001, Branding 101: An Overview of Branding and Brand Measurement for Online Marketers, Dynamic Logic, viewed 27 May 2008, <http://www.dyna miclogic.com/Branding_101.pdf>

 

Lant, TK & Shapira, Z (eds.) 2001, Organizational cognition: computation and interpretation, Lawrence Erlbaum Associates, Mahwah, NJ.

 

Lerbinger, O 1997, The crisis manager: facing risk and responsibility, Lawrence Erlbaum Associates, Mahwah, NJ.

 

Luhmann, N 1993, Risk: A sociological theory, Aldine De Gruyter, New York.

 

Marketing 101: What is Branding? 2008, EBay, viewed27 May 2008, <http://revie ws.ebay.com/Marketing-101-What-is-Branding_W0QQugidZ1000000000 09020 81?ssPageName=BUYGD:CAT:-1:LISTINGS:6>

 

Meyer, DJ 2003, The economics of risk, W.E. Upjohn Institute for employment research, Kalamazoo, MI.

 

The Seed of Apple’s Innovation 2004, BusinessWeek, viewed 27 May 2008, <http://www.businessweek.com/bwdaily/dnflash/oct2004/nf20041012_4018_db083.htm>

 

Volberda, HW 1999, Building the flexible firm: How to remain competitive, Oxford University Press, Oxford, England.

 

Zajas, J & Church, O 1997, Applying Telecommunication and Technology from a Global Business Perspective, Haworth Press