Monday, December 30, 2019

Madoff s Personal And Matter Asset - 974 Words

A well-venerate financier, Madoff convict thousands of investors to skill over their savings, falsely promising harmonious advancement in remit. He was caught in December 2008 and entrust with 11 counts of fraud, currency laundering, perjury, and theft. Madoff used a so-warn Ponzi plot, which entice investors in by undertake unusually tall returns. The name begins with Charles Ponzi, who plight 50% render on investments in only 90 days. Investigators have stalwart others were complex in the scheme. Securities and Exchange Commission (SEC) has also appear under fire for not investigating Madoff more well; questions approximately his firm had been raised as seasonably as 1999. Madoff s office, in the prosecute of liquidation, was one of the top market makers on Wall Street and in 2008, the â…™-biggest. Madoff s personal and matter asset frieze cause a chain reaction throughout the globe s matter and bighearted community, compulsion many organizations to at least temporarily finish, including the Robert I. Lappin Charitable Foundation, the Picower Foundation, and the JEHT Foundation. By 2000, Madoff Securities, one of the top traders of US securities, held approximately $300 million in property. The business engaged three floors of the Lipstick Building, with the investment conduct division, assign to as the tri- accumulation, engross a stanza of approximately 24. Madoff ran a twig office in London which engage 28 relations, separate from Madoff Securities. The circleShow MoreRelatedTypes Of Financial Crimes That Can Be Committed By Many Individuals Around The World1373 Words   |  6 Pagesanyone s life financially, no matter what they have in their bank account. Bernard Lawrence Bernie Madoff , a former stockbroker, financier, and investment advisor. Now he s known as an American Fraudster. Bernie is the former non-executive chairman of the NASDAQ stock market, and he is also the admitted operator of a Ponzi scheme that is considered the largest financial fraud in U.S. history. Bernie Madoff can be considered one of those people who financially destroyed hundr eds of people s livesRead MoreBernie Madoff1967 Words   |  8 PagesBernie Madoff Andrea L. Nolt Strayer University Intro to Business Professor Karina Arzumanova August 21, 2011 Bernie Madoff Bernard Lawrence â€Å"Bernie Madoff† is an American former stock broker, investment adviser, non-executive chairman of the NASDAQ stock market, and the admitted operator of what has been described as the largest Ponzi scheme in history. (Bernard Madoff, 2011) This paper discusses the massive Ponzi scheme that Mr. Madoff created and those that were affected by it. Read MoreMadoff Ethics Case Study2153 Words   |  9 PagesExecutive Summary Overview Since the ascent of money, different techniques have been developed and carried out to fool people of their assets. These methods have evolved together with advances in technology, and some have proved to be more efficient than other. This case study is chronology of the largest Ponzi scheme in history. Bernie Madoff began his brokerage firm in 1960 and grew it into one of the largest on Wall Street, New York, USA .While doing so; he began investing money as a favorRead MoreBusiness Ethics Case: Bernard Madoff2345 Words   |  10 Pagesof Long Island, Bernard Madoff founded â€Å"Bernard L. Madoff Investment Securities,† a â€Å"trading power† house that would become one of the largest independent trading operations in the securities industry (Washington, 2012). In the year 2000 his company ranked among the top trading and securities firms in the nation. By age 70, his name had become legendary; he was considered to be one of the most â€Å"influential spokesmen† on Wall Street. But on December 11, 2008, Bernard Madoff was arrested and chargedRead MoreBernard Madoff Fraud3396 Words   |  14 PagesAbstract This report allows the facts to be known concerning the still mysterious case of Bernard L. Madoff and his longtime investment securities activities, which eventually turned into an enormous fraud of incomparable size. In this report, you will begin to understand how Bernard Madoff was able to execute such an elaborate fraud. The illegal business behavior found in this case is too numerous to count however, quite a few will be identified. In addition, the roles of the perpetratorsRead MoreBernie Madoff Essay5927 Words   |  24 Pages How Madoff Executed the Fraud Madoff’s scheme to defraud his clients at Bernard Lawrence Madoff Investment Securities began as early as 1980 and lasted until its exposure in 2008. Bernard carried out this scheme by soliciting billions of dollars under false pretenses, failing to invest investors’ funds as promised, and misappropriating and converting investors’ funds to benefit Madoff, himself, and others without the knowledge or authority of the investors. To execute the scheme, Madoff solicitedRead MoreMadoff4022 Words   |  17 Pagesparticipate and choose to take withdrawals. Though these types of schemes have happened before, the first of this caliber was documented in the 1920’s by its namesake, Charles Ponzi. In 2008, Bernard â€Å"Bernie† Madoff was exposed for running the largest Ponzi scheme to date, conning investors out of over $65 billion over thirty years. INTRODUCTION Bernard Madoff was responsible for the largest reported Ponzi scheme in history. How did this happen? Who else knew about it? Why did it take so long for himRead MoreThe Collapse of the Madoff Pyramid Essay1941 Words   |  8 Pagesturn will have positive results for the business versus negative results. It seems that no matter where we look today, companies like Enron, WorldCom, AIG and many, many others substantiate the lack of business ethics in this country. At no other time than the last few decades has the need for ethical business oversight been of such importance to the prosperity of our country. As an example, Bernard Madoff is known to be the executor of the most fraudulent and deceitful Ponzi scheme in history, creatingRead MoreBernard Madoff Fraud3413 Words   |  14 PagesAbstract This report allows the facts to be known concerning the still mysterious case of Bernard L. Madoff and his longtime investment securities activities, which eventually turned into an enormous fraud of incomparable size. In this report, you will begin to understand how Bernard Madoff was able to execute such an elaborate fraud. The illegal business behavior found in this case is too numerous to count however, quite a few will be identified. In addition, the roles of the perpetratorsRead MoreMadoff Scandal6132 Words   |  25 PagesSchemes 16 The SEC Failure 17 SEC post- Madoff 19 Hedge Fund Transparency 20 Conclusion 21 Bibliography 25 Tables Table 1: List of Madoff Clients (taken from the The New York Times, last updated June 24, 2009) 15 Table 2: 2009 Ponzi Scheme SEC Charges 17 Figures Figure 1 Fairfield Sentry vs Gateway 6 Figure 2 Madoff Investor Funds (taken from http://orgnet.com/madoff.html) 7 Introduction Operating from central Manhattan, Bernie Madoff developed the first and biggest global Ponzi

Sunday, December 22, 2019

Barbie Role Model Essay - 1683 Words

Barbie is more than just a doll for young girls, it became a role model for them. Barbie was a friend, a fashion archetype, and a stylist who transformed young girl lives. Many young girls were impacted with Barbie’s in a materialistic way. For instance, Barbie’s clothing style and accessories became an obsession for young girls to be just like them. Young girls wouldn’t even play with other toys and only focused on their beautiful Barbie, who became their best friend. It was like these young girls were infatuated with their Barbie Dolls. As time went on, Barbie started to influence young girls and the media to believe that outer beauty matters, and girls were taught that they needed to be thin. After looking at these ads in more detail I†¦show more content†¦There is a new version of Barbie that came out, â€Å"Slumber Party Barbie.† This Barbie caused a lot of controversy in our society. The reason being, the doll came with a scale that only wen t up to 110 pounds and a diet book. There was also a sign that said, â€Å"How to lose weight? Don’t eat† (HuffPost UK,2017). Mattel, the maker of Barbie, had numerous complaints from many parents. Due to that, researchers ran an experiment to test whether the doll did influence young girls on their body image. There was a survey that was conducted with women that played with Barbie’s when they were younger, 18 out of 25 stated that they would rather be hit by a truck than be fat. In another experiment that was done by scientists, young girls would be exposed to three different dolls. On one hand, the young girls that viewed the Barbie had a self-image problem, and a desire to be thin compared to the other girl that looked at the other two dolls. The conclusion of this experiment proved that young girl’s role model was Barbie, and being exposed to that doll impacted them in a negative manner. As a result, these girls developed an eating disorder. The empi rical reasoning or the bottom up thinking was specific data was collected, and after further analysis supported the hypothesis. Barbie’s do have a significant influence onShow MoreRelated Barbie is a Good Role Model Essay1480 Words   |  6 PagesBarbie is a Good Role Model As a young girl the fondest memory was playing with all my Barbie dolls and having the time of my young youth. Getting new Barbie’s for my birthday and Christmas was the highlight for my friends and I every year, and comparing which dolls the others got with each other. Never once growing up did any of us feel that Barbie was bad for us to play with, or that she was a bad role model. She could be anything that she wanted to be and her friends were all different tooRead MoreToys as Role Models1114 Words   |  5 PagesToys as Role Models Judy Attfield, who holds a PhD in history and design, has written numerous articles in relation to design history. Her articles, often written in a formal and informative style, concentrate on parenting and family issues. Citing the differences in the maneuverability designs of Barbie and Action Man, which embody the stereotypical clichà © of feminine passivity and masculine activity respectively, â€Å"Barbie and Action Man: Adult toys for girls and boys, 1959-93† (P. Kirkham (EdRead MoreThe Is Not Mean The End Of Humanity And The Rise Of The Non Human2178 Words   |  9 Pagesseveral new inventions in biology, technology and reproduction which can redefine the limits of humanity and the beginning of posthumanity. To illustrate this uncertainty in locating these limits, I would use the example of Neil Bedmington. In his essay, ‘Theorizing Posthumanism’ he chose an instance from the cover of Time, which raises the problem of human remains. In 1983 the Time magaz ine was expected to announce its â€Å"Man of the Year†. The winner was unexpected and a bit strange, compared to theRead MoreSex Hormones And Its Effect On Gender3589 Words   |  15 Pageshuman beings; we are all unique models, shaped not only by our DNA but also by the physical and emotional environment in which we find ourselves including our biological genes, sex hormones and ongoing genetic and hormonal changes can be defined as ‘nature’ and influence physical development and sexual identity while family background, class and belief systems, described as ‘nurture’ affect gender through the encouragement of social norms and familiar gender roles. (Fausto-Sterling, A 2008) AwayRead More The Creation of Barbie as an American Icon Essay examples2452 Words   |  10 PagesCreation of Barbie as an American Icon Barbie, at the age of 41, is one of the longest living toys in America. Analyzing her early history can give a person a look into the societal trends and culture of the late 1950s and early 1960s. There is evidence of fashion innovations in Barbies wardrobe. Also, one can see the perception of females by society, such as what they should look like, how they should act and dress, as well as what their future goals could be. The following essay follows BarbiesRead MoreStereotypes, Stereotyping and Ideals Essay5008 Words   |  21 Pagessources indicate that female body images presented through models, mannequins, and even Barbie dolls are strikingly deviant from the actual female form. One such example occurs in the January 1998 issue of Marie Claire magazine, which states that the average American woman is 5’4† and a size 12. She has a 37-inch bust, a 29-inch waist, and 40-inch hips. A mannequin is 6 feet tall, a size 6, with measurements of 34-23-34. A life-size Barbie doll would be 7’2,† with bust, waist, and hip measurementsRead MoreWomen s Lack Of Women1409 Words   |  6 PagesSTEM degree in 2011, compared with 66% of university graduates in non-STEM programs.† Focusing on the STEM disciplines seem to play crucial roles in the future. The recent research (Rosser 2008) revealed that many initiatives tend to direct toward women’s underrepresentation in STEM careers, according to global demands of recruitment. The aim of this essay is to examine why women are underrepresented in STEM subjects at university in the UK, using evidences to attempt gender differences in programRead MoreGen 205 Fall 2015 Final Exam Essay Questions1422 Words   |  6 PagesKalniesha Joseph Professor Gentile Gen 205 December 18, 2015 Fall 2015 GEN 205 Fall 2015 Final Exam Essay Questions Please answer each question. The extra credit is optional. Your essays are due by December 18th at 11:59PM. You must email it to me by this time. I will be calculating grades on Dec. 19th. If you have not submitted your final by this time, you will receive an F for this exam. I will NOT accept any excuses that your email is not working, that you sent it etc. If you do NOT receiveRead MoreThe Development Of Girls1172 Words   |  5 Pagesyouth have a tremendous impact on who they become. From a young age girls learn a distorted definition of what beauty should look like. Professor of literature Ann DuCille analyzes the toxic affect of Barbie dolls as role models on young girls in her article Dyes and Dolls†. DuCille cites, â€Å"[Barbie] has the ideal that Western culture has insisted upon†¦ long legs, long arms, small waist, high round bosom, and long neck† (DuCille 217). Society has perpetuated a culture where girls strive to be perfectRead MoreUnequal Gender Divisions And Their Perceptions1276 Words   |  6 PagesIn recent discussion of unequal gender divisions and their perceptions in today’s society, a controversial issue has been how th e oppressive male gaze has influenced a woman’s view of herself in relation to her image and societal roles. The construct of our modern world and how both men and women fit into it is derived strongly from our society’s sex stereotypes. For instance, the inherent separation between men and women leaves men regarded as tough and powerful, while women are objectified and

Saturday, December 14, 2019

Food Habits Changing After Food, Inc Free Essays

The documentary Food, Inc was created to show viewers what is being put on their plates and has given me an altered view towards the food industry which has drastically changed my food habits. Many emotional scenes were shown on this film to give viewers empathy towards the problem that is occurring. The documentary shows many vivid details and explains what is in the food that consumers eat. We will write a custom essay sample on Food Habits Changing After Food, Inc or any similar topic only for you Order Now The film food, Inc influenced my habits of consumption by eating organic meats, purchasing most foods in the farmers market, and checking for food labels. I have learned that there is a big difference in organic and non-organic meats. Animals raised organically are not allowed to be fed antibiotics or other drugs and cannot eat genetically modified foods. Eating organic meats is not only helping animals but also preventing the consumer from a possible disease outbreak that may occur due to the mistreatment of animals. The meat comes from a sustainable farm that uses the manure productively as organic fertilizer. The manure is â€Å"pure,† coming from animals fed an organic diet which ensures consumers that there will not be any exposure to chemicals. Consumers feel safe knowing that the certified organic meat won’t hurt them in the long-run. Going to a farmers’ market helps consumers because everything is fresh, locally grown, and certified organic which gives the buyer no doubts. When purchasing meat from an organic farm stand at a farmer’s market, consumers support that farm. On the other hand, buying non-organic meat that isn’t local, free-range, or ranch-raised from a supermarket chain will most likely support a multinational food corporation. After the experience change in some of the famers’ supermarkets, I also started realizing the foods tasted better and after eating, I felt lighter and full at the same time. I also saw that costs were higher than the farmers’ markets but it truly made a difference to purchase organic produce and meats. It decreased health risks like diabetes and obesity. Food labels are essential to consumers because they stay alert with what they eat everywhere they go. I have always wondered how many calories are in the food in restaurants as well as other types of foods that I buy at the grocery store. Most restaurants don’t list the actual nutritional value of their food which is why it’s important for consumers’ to remember to check and be aware of what is going to be in their bodies. The film transmits this message to its viewers by showing consumers foods that have glucose and Trans fat than expected. There can be many ingredients or a high number of calories that a consumer may not know about but after looking at a label, it will give the consumer peace of mind or change their mind on whether they will eat it or not. Food, Inc helped me realize and understand that it’s critical for consumers to be cautious about how different foods can affect their overall health. This led me to change some of my eating habits such as buying organic meats, which helped me choose my foods wisely. Being aware lets consumers like me stay healthy. Food, Inc taught me a lot about buying organic animal products because it’s better for health, the community, and it can also benefit consumers in the long-run. I would recommend that all consumers watch this film and understand the positive aspects of it because it gives some critical points about the food industry and backs them up with evidence. Food is important for the body and it helps an individual survive every day, but it can also be deadly. It’s all about making the right decisions when it comes to the consumers’ food habits. How to cite Food Habits Changing After Food, Inc, Essays

Friday, December 6, 2019

Marketing And Its Impacts On Supply Chain - Myassignmenthelp.Com

Question: Discuss about the Marketing And Its Impacts On Supply Chain. Answer: Introduction The report focuses on the various concepts of marketing by analyzing the business organisation named LOreal within the cosmetic industry. The report will demonstrate the operating environment as well as develop useful marketing strategies for enhancing the marketing processes efficiency and consider the external and internal factors that can contribute to the marketing efficiency. To analyse the organisation and its operating environment, various aspects will be covered including the business organisations mission statement while the 5C approach will be used to determine the customers, collaborator, competitors and the entire organizational extent. By obtaining relevant information from this, it will be easy to conduct market researches and understand the threats that may be posed by the competitors (Loreal.com.au 2018). This will also help in setting up various functions and develop marketing strategies for targeting specific market segments, enhance the value proposition and positi on the products properly in the market too. Issue 1 LOreal, Australia is one of the leading company in beauty within the cosmetic industry that provides the best quality cosmetic products and beauty services to the customers not only in Australia and but to customers all over the world. The company belongs from the cosmetic industry and the mission statement of the company is to share beauty with all through delivery of the best quality beauty products that can keep the customers satisfied and at the same time keep them beautiful with progressing age and healthy skin. The mission statement of the company is to enable cosmetic innovation for all. The beauty brand has been committed to excellence in the beauty products and services and contributed largely to the beauty and healthy skin of the individuals by allowing them to express their positive attitudes, behaviours, personalities and even gained self confidence (Bresler and Lubbe 2014). According to the company, beauty is a common language and so to ensure proper value statement, the organisation has provided the best cosmetics innovation from the perspectives of quality, safety, health and effectiveness. The slogan used for advertising purposes is Because you're worth it. The company follows the vision of fulfilling the diversity of beauty needs and even drew inspiration from many women to go beyond limitations and invested on the development of new products for becoming successful in the future. Beauty is a commitment, as stated by the organisation in its values and beliefs, which has enriched the beauty of people and created universalisation through promotion of new beauty products for each and everyone in different market segments of Australia (Kotler et al. 2014). The company to enhance the rband awareness and make people more centered on the products and services delivered by LOreal follows the marketing strategies. This would not only influence the buying behaviors of the consumers but could also result in high level of customer satisfaction. The marketing strategies followed by the company are distribution, promotions, managing corporate social responsibilities and extending the brand through internationalization. To stay ahead in the competition, the company has enhanced the distribution network by providing incentives and delivering more products and services to the retailers, distributors and keep those products in stock (Shen and Bissell 2013). To enhance brand promotions, LOreal has also provided complimentary lip guide after making purchases on a particular amount of money. Celebrity endorsements were done as well for ensuring that the products and services gain more exposure in the different market segments and influence the buying b ehaviours of the consumers. The company has supported campaign for safe cosmetics usage to enhance the confidence of customers to buy the products and maintain global business sustainability too. Marketing strategies also included advertising and promotions to promote innovation of products and even delivered products according to the needs of customers in the different market segments. Global advertisements spending has increased as well to enter the mass markets and keep the customers informed about the new products and services delivered by the organisation (Hitt, Ireland and Hoskisson 2012). To manage the corporate social responsibilities properly, LOreal, Australia has conducted researches to spend the fellowships for purchasing the various equipments and machineries. The company also handled the child care costs and travel costs to maintain consistency all throughout the research activities. Issue 2 The 5Cs of marketing is used by LOreal to conduct analysis of the various areas that are related to the marketing activities managed by the organisation. The 5Cs marketing has been effective for the organisation to create a well defined marketing plan and follow proper guidelines to make the best decisions and improve the profit and this allowed for gaining competitive advantage within the competitive cosmetic industry in Australia. The five major components of the model are customers, company, competition, collaborators and organisational context (Berthon et al. 2012). Company The offerings of the organisation, brand image and identity, culture, goals and objectives are considered as the major components of the first aspect of the 5Cs marketing analysis. The organisations strengths and major resources used by the company along with the weaknesses could be the other essential aspects required for the management of marketing activities with ease and effectiveness. The major strength of the company is its ability to conduct researches and promoting innovation by focusing on the beauty and thereby ensuring that the company offers the best quality cosmetic products to the consumers. Due to high level of dedication to the research, the company has been one of the leading cosmetic industry despite the huge competition in the market (Solomon 2014). The company also specializes in dermatological and pharmaceutical areas to focus on the development of new products and services and maintain quality in terms of the products and services offered. The weaknesses of the company are decentralized organizational structure, multiple sub divisions of the company and lower profit margin than the other cosmetics company. This problem has arisen due to the immense investments and costs incurred while managing the advertising and promotional activities. The scopes and opportunities of LOreal are immense because the company delivers its products and services to women of all ages. The company can further focus on hair styling, color, skin care products and perfume products too. Being one of the leading cosmetic company in Australia, the company also can target mass market by expanding globally. LOreal has also taken the benefits of having a good market share and with multiple patents registered by the company, it has become easy for managing the licensing activities and ensured global expansion (Morgan, Katsikeas and Vorhies 2012). One of the major threats could be the high competition level and economic downturn as well. The products and services are of good quality, tough sometimes, the customers might think that those had not been inclined with their basic needs and thus could skip buying. The company was trying to focus on hair care products though it failed miserably due to the products offered by Clairol, which is a leading hair care brand (Kim et al. 2012). Customers The company is serving the customers and managing the corporate social responsibilities properly to make sure that it not only benefits the customers but also contributing largely to the community. It is important for LOreal to understand the behaviors and lifestyles of the customers to influence their buying behaviours (Mintz and Currim 2013). The customers mainly want something unique from the company that can keep them beautiful or long time and at the same time, maintain healthy skin and hair. LOreal has offered products to every customer segments, from young to adults for ensuring that the products could enter new market segments easily and increase the customer base. The behaviours of customers are dependent upon the sales promotion done by the company, prices set, distribution and diversification of the products too (Nagasawa and Kizu 2012). Collaborators The distributors of Loreal include Giorgio Armani, Cacharel, Diesel, Lancome, Kiehls, Clarisonic, etc. The products division for the consumers are Loreal Paris, Essie, Maybeline, Magic, etc. There are no such suppliers because the company produces its own products and made conscious choices and decisions to reduce the environmental footprint. One of the major objective of the company is to archive sustainability, which has been possible by working in partnership with Good360 to provide support to the poor people. By managing partnership, the company contributed to the excellence by providing more than $1 billion worth of products to the Australians who were vulnerable to some kind of harm or suffered from poverty. Rather than using the supplies, the organisation promoted sustainable approaches through use of renewable energy, reduced the water wastage and even manage the reengineering package for using less plastic materials. There are few suppliers though who have been verified as s ustainable suppliers (Kizu and Nagasawa 2012). Competitors The major competitors of Loreal are Clairol, The Estee Lauder Companies Inc, Chanel, Estee Lauder, etc. The competition level is high and so it has posed serious threat for the company to sustain in the marketplace. Akin, Lanolips, Sodashi, The Jojoba company are new entrants in the market which can also give stiff competition to LOreal. Context The organizational context means the various factors that have impacted the business performance like the political, legal, technological, social and economic factors. The impact of EU law has restricted the production of various products consisting of chemicals like Phthalates. LOreal follows the obligations to deliver the best quality products that are safe and healthy and do not contain any harmful chemicals. The European Parliament and the Council of the European Uniontocreatebanonanimaltestingproductsapprovedseventh Amendment cosmetics directive (Osterwalder et al. 2014). The economic downturn was a major issue for LOreal, though the program of Young Women in science fellowship resulted in higher sales when compared to the last years profit. With the higher living standards, the consumers are focusing more on the brand image and demands for quality and convenience related to the cosmetic and skin care products has increased. With the advancement in technology, LOreal has conduct ed research and development activities and even registered more than 500 patents considering the cosmetics and dermatology fields (ter Heide and Gontarz 2017). The quality of products and services has alsoimprovedwiththeuseofnewmachineriesandequipments, furthermore promoted innovation too. Issue 3 The customers of Australia are more focused on quality regardless of the prices that have been set for the productsandservicesprovidedbytheorganisation.The customers want something that cannot only fulfill their demands and preferencesbutwillalsoinfluencetheirbehaviours to make purchases consistently (Loreal.com.au 2018).The competitors that posed serious threats for the company were Revlon, Garnier, Lakme,Yardleyand Chamber. The context of business has changed due to the political, economic, social and technological factors that have created an impact on the business functioning. With the immense scopes brought through globalization, the consideration of political factors like fulfilling the Government obligations, managing the import policies and managing the rate of interest and exchange have contributed positively to the organisation. The rates of exchange could affect the way LOreal had been functioning and so according to the GDP rate, the prices should be set properly to keep up pace with the changing business environment. The cust9mers in Australia are less concerned about the prices of products, rather they are more conscious about the quality of products and services (Yoo, Donthu and Lee 2014). Therefore, in order to meet up to their expectations the company offered new product line including anti ageing cream and hair care products too. By collaborating with Good360, the products that remained unsold had been delivered to various charities and this supported the people suffering from poverty. The poor people were also provided with personal care goods, blankets and clothing s that they could live a good and healthy life in the future. LOreal, Australia is the silver sponsor of White Ribbon and it is managed to make sure that any sort of violence is prevented against the women (Loreal.com.au 2018). Initially, L'Oreal was focused in selling its products to the countries like United States, and Japan as the market in these countries was very much open for foreign trade. However, the current scenario and the concept of globalization has urged LOreal to spread its business to the different countries like Australia, Russia, Asia, Eastern Europe, and Africa, which are the promising players of the market and their rising economies are likely to be even higher globally in the future. Australia is one of the flourishing and thriving target markets for Australia due to its high economics and consumer segmentation position. The main reason why L'Oreal would benefit from trading in the Australian continent is due to the culture of the people in the Australian continent. The population is not only advanced but they are willing to pay whatever it takes to lead a cheerful and healthy lifestyle. Not only the Australian women but also men are much obsessed about their living lifestyles, in term s of attractive looks and presentation. L'Oreal would be more successful in Australia due to the anti aging cream, which has been launched in recently launched. Main reason following this is that anti aging cream would spike a growth in market of the country. However, with rise in the number of competitors emerging with this category of product in the market, it has become necessary for the company to keep a strong foothold on the anti aging cream segment (West, Ford and Ibrahim 2015). L'Oreal is facing a great challenge from other major competitors in the cosmetics industry but it is still prevailing at the top of the list because of its strategies in the marketing mix (products, promotion and pricing according to the place (Hollensen 2015). The people of the Australia can afford to purchase first-class products. Therefore, it can be considered that the value proposition of L'Oreal in Australia would be much promising than some of the other countries where the people are not much interested in the premium products. L'Oreal is very cautious in the selection of the price tag for all the products. L'Oreal deals its price band for products in a range of moderate to low price, depending on the country and the assortment of the product and the quality. Thus, with reference to the value proposition of LOreal, the pricing structure has been kept in congruence to the quality of the products that L'Oreal delivers and would be delivering to its patrons (Osterwalder et al. 20 14). L'Oreal has extended its reach in more than 130 countries and is constantly looking for its expansion. L'Oreal possesses around 23 global brands, which would make it a versatile company for all consumers. The flagship of the company has reached around 25.83 billion in the year of 2016 and ever expanding in its net profit every year. Generation such profits in the existing competition is a certain positioning statement for the company. However, based on the target market, LOreal can certainly generate more revenue with respect to the response from the target market, the wide product assortments in correspondence to the brands product quality and excellence (Goetsch and Davis 2014). A detailed 4P marketing mix strategy is used for identifying the products, prices, places and promotions done by LOreal. Products There are many brands offered by Loreal and few of the major products of the company are Loreal Lux products including the Kiehl, Lancome, Ralph Lauren, Giorgio Armani, etc. The consumer product division consist of LOreal Paris, Maybeline New York, Garnier, Sampoo and the active cosmetic divisions include Vichy, Sanoflore, etc. From the marketing strategy illustrated in the above section , a new anti aging cream is also introduced to influence the buying behaviours and allow the company to generate more revenue, furthermore gain an increase in the market share too (Loreal.com.au 2018). Price LOreal, being one of the major cosmetics brands has distributed the consumer product division brands in the retail channels for making those available easily for the customers. It will attract the mass market and the prices of the products are also reasonable. The products are available online too, because of which, the customers can even pay premium prices because of the good quality. To penetrate new market segments with different price levels, the company has continuously innovated and kept prices of products reasonable (Morgan, Katsikeas and Vorhies 2012). Place The products are available on the online shopping websites and with its huge distribution networks, the shops are present in more than 130 countries. The products and service are available at retail shops, supermarkets and at kirana stores for attracting more customers by targeting the mass market (Huang and Sarigll 2014). Promotion Celebrity endorsements are common for LOreal and popular celebrities promoted the brand like Jennifer Lopez, Naomi Watts, Aishwariya Rai Bachhan, Katrina Kaif to create awareness among the customers, Promotions have been done through digital advertisements and the word of mouth marketing promotions strategy has also aid of for the company to generate enough revenue in business. Social media involvement has also improved the efficiency of promotional activities (Bresler and Lubbe 2014). References Berthon, P.R., Pitt, L.F., Plangger, K. and Shapiro, D., 2012. Marketing meets Web 2.0, social media, and creative consumers: Implications for international marketing strategy.Business horizons,55(3), pp.261-271. Bresler, M. and Lubbe, I., 2014. Marketing management. Chan, H.K., He, H. and Wang, W.Y., 2012. Green marketing and its impact on supply chain management in industrial markets.Industrial Marketing Management,41(4), pp.557-562. Goetsch, D.L. and Davis, S.B., 2014.Quality management for organizational excellence. Upper Saddle River, NJ: pearson. Hitt, M.A., Ireland, R.D. and Hoskisson, R.E., 2012.Strategic management cases: competitiveness and globalization. Cengage Learning. Hollensen, S., 2015.Marketing management: A relationship approach. Pearson Education. Huang, R. and Sarigll, E., 2014. How brand awareness relates to market outcome, brand equity, and the marketing mix. In Fashion Branding and Consumer Behaviors (pp. 113-132). Springer New York. Kim, K.H., Jeon, B.J., Jung, H.S., Lu, W. and Jones, J., 2012. Effective employment brand equity through sustainable competitive advantage, marketing strategy, and corporate image.Journal of Business Research,65(11), pp.1612-1617. Kizu, Y. and Nagasawa, S.Y., 2012. Creating the New Brand Equity through EcoDesign of Cosmetics. InDesign for Innovative Value Towards a Sustainable Society(pp. 463-467). Springer, Dordrecht. Kotler, P., Keller, K.L., Ancarani, F. and Costabile, M., 2014.Marketing management 14/e. Pearson. Loreal.com.au. (2018). L'Oral Australia, world leader in beauty - LOral Group. [online] Available at: https://www.loreal.com.au/ [Accessed 21 Jan. 2018]. Mintz, O. and Currim, I.S., 2013. What drives managerial use of marketing and financial metrics and does metric use affect performance of marketing-mix activities?. Journal of Marketing, 77(2), pp.17-40. Morgan, N.A., Katsikeas, C.S. and Vorhies, D.W., 2012. Export marketing strategy implementation, export marketing capabilities, and export venture performance.Journal of the Academy of Marketing Science,40(2), pp.271-289. Nagasawa, S.Y. and Kizu, Y., 2012. Green action as a luxury strategy in the field of cosmetics.Waseda Business and Economics Studies Departmental Bulletin Paper,48, pp.1-17. Osterwalder, A., Pigneur, Y., Bernarda, G. and Smith, A., 2014.Value proposition design: How to create products and services customers want. John Wiley Sons. Shen, B. and Bissell, K., 2013. Social media, social me: A content analysis of beauty companies use of facebook in marketing and branding.Journal of Promotion Management,19(5), pp.629-651. Solomon, M.R., 2014.Consumer behavior: Buying, having, and being(Vol. 10). Upper Saddle River, NJ: Prentice Hall. ter Heide, M. and Gontarz, K.M., 2017. A brand positioning strategy recommendation for an Asian cosmetics giant. West, D.C., Ford, J. and Ibrahim, E., 2015.Strategic marketing: creating competitive advantage. Oxford University Press, USA. Yoo, B., Donthu, N. and Lee, S., 2014. An examination of selected marketing mix elements and brand equity.Journal of the academy of marketing science,28(2), pp.195-211.

Friday, November 29, 2019

Blessing free essay sample

Blessing is a poem by Imtiaz Dharker and is set in a village in Pakistan. This is a descriptive poem, which uses imagery to illustrate sights and sounds, and creates an atmosphere of frantic joy. The poem also consists of some inconsistent usage of end-rhyme, followed by some usage of metaphors, personification, simile, assonance and alliteration. The poet uses free verse in this poem to emphasize what the poem is about and to make the reader think about the situation and to think about the words used. It has no fixed metrical pattern. The poem begins with a simile ‘The skin cracks like a pod’ this line immediately give the reader an impression of drought and a shortage of water. The usage of the word ‘skin’ could be a literal reference to a person’s skin that had become chapped by constant exposure to the sun or it could be a more figurative reference to the dry, dusty ground that cracks and splits during heat waves and droughts. We will write a custom essay sample on Blessing or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The word ‘pod’ can refer to a seed pod that opens in the hot weather to release it seeds. The poet uses words that remind the reader that what we are dealing with is a hot country where thirst is common and where after all, ‘there never is enough water. ’ By the words of the first two-lined stanza we are in no doubt to the fact that the villagers here are desperate for water and how much of an amazing and special thing it is for them. The poet involves the reader by asking us to ‘imagine the drip of it’, which is telling us how small the quantity is and to imagine the tiny splash as the water droplet hits the bottom of the cup. It seems as though the person describing the dripping water hasn’t had a drink in a very long time and is fantasizing about that special and delicious drop of water. The fact that the tiny droplet of water creates an ‘echo’ in the mug suggests that the tin mug is almost empty and is like a drop of water hitting a parched tongue. It also makes you think, what kind of person would own a tin mug? Would it be a rich person or a poor person? The reference of a tin mug may imply that the person who owns a tin mug must be poor and not very fortunate. The last line of the second stanza has a religious reference. It personifies the echoing splash of the water as the ‘voice of a kindly god. ’ God is seen as the provider of water and every drop received is a kind of gesture and therefore it is something miraculous and deeply special. The third stanza is the longest one of the poem. It tells us a story of a burst water pipe and how suddenly this ordinary small pipe is transformed into a powerful overflow of water. Water has so much importance and value to these people that throughout the poem it is referred to as if it was a precious metal like gold or silver. The municipal pipe bursts’ tells us the burst of this public (municipal) pipe is an amazing and incidental occasion. It is described by the metaphor ‘the sudden rush of fortune’, like somebody winning the jackpot and the money is rushing out of the machine. As the precious water splashes onto the ground the word ‘rush’ could mean that people are ‘rushing’ around trying to save as m uch water as they possibly can, as it is precious. This same idea is echoed in another metaphor ‘silver crashes to the ground. ’ When caught in the right light water can look like silver or a high polished mirror. The poet may have used the word ‘silver’ to emphasise how precious it is. Line ten flows to line eleven, and the water is described as a ‘flow’ that gives rise to a sudden burst of noise from the villagers, ‘a roar of tongues’. The word ‘roar’ could refer to a group of people since we only have one tongue each and therefore the plural ‘tongues’ suggest a group. The tongues could be roaring with thirst or maybe they are shouting and their combined voices becomes a ‘roar. ’ In this same stanza, the use of the word ‘congregation’ may have two important meanings to the context of the poem. Firstly it may refer to a congregation or group of people, but it also may refer to a group of people in church or being given a religious instruction. We see that the poet uses religious language, the affect being to make the process of saving the spilling water a kind of religious ritual. The poet has already described the water as a gift from a kindly god, so it is only right that collecting it should have some resemblance to a religious ritual. Pakistan is a place where many of them are very religious and have many ways of worship. The men, woman and children are all eager for their share of the spilled water and come with any container that they are first able to see. The stanza concludes with the phrase ‘frantic hands’, which once again emphasizes the desperation that leads the villagers to take even handfuls of water. The poet uses enjambment to link the third stanza to the fourth and final one. This focuses on the children of the village, where the children are described as naked and delighted of the chance to bathe in the water. ‘Screaming in the liquid sun’ is a metaphor that aligns the water to the sun to emphasise the pleasure and warmth of the experience. It shows that all is not doom and gloom since the small children are playing in the water. Alliteration is also used in the phrases ‘polished to perfection’ and ‘the blessing sings’, they combine alliteration and assonance, which creates vivid imagery to portray the excitement of the occasion. The word blessing continues the religious theme which has been running through the poem. The final line flows from the previous one ‘sings/over their small bones. ’ It is a gentle ending, focusing on the children of the village who are in great need of this water.

Monday, November 25, 2019

Carol Moseley Braun Essay †Womens Studies

Carol Moseley Braun Essay – Womens Studies Free Online Research Papers Carol Moseley Braun Essay- Womens Studies Carol Moseley Braun attended public school in Chicago and later graduated from the University of Chicago with a Law degree in 1972. Braun has become a pioneer for African American women in the arena of politics. She has managed to pass bills that affect education, housing discrimination, and practices for better government in the state of Illinois. As well as successfully winning approval of many supporters, Braun became a presidential nomination candidate in the 2004 election. Although, unsuccessful in winning the democratic nomination, Braun maintained an impressive political career. Braun became a prosecutor in the United States’ Attorney’s office from 1973 to 1977. In 1978, Braun was elected to the Illinois House of Representatives. She was known for her advocacy and ability to debate. Braun has set out to make government more held responsible for making education a top priority. Braun was able to acquire support from those of different races who were committed to this cause. Braun became the chief support of the 1985 Urban School Improvement Act which helped to empower parent organizations at all schools throughout Chicago. She was also solely responsible for every school bill that affected education from 1980 to 1987. These bills included; higher salaries for professors and for public aid recipients to attend school without losing their benefits. After serving two terms, Braun was selected to become the first African American women in Illinois history to serve as Assistant Majority Leader. Braun passed bills to reform education and to ban discrimination in housing and private clubs. Later, another bill was introduced that barred the state of Illinois from investing funds in South Africa, until the apartheid system was abolished. Braun also filed and won the â€Å"one man, one vote† principle in Illinois. Braun won the â€Å"Best Legislator† award given by independent voters for then years in a row. In 1987, Braun was nominated for the office of Recorder of Deeds as a part of a multi- ethnic, multi-racial and gender balanced â€Å"Dream Ticket.† Braun made history once elected to this position with more than one million votes cast in her favor. She became the first African American women to hold executive office in Cook County government. Braun was elected 1992 Senate primary victory over two-term incumbent Senator Alan Dixon; although her two opponents outspent her by more than 20 to 1. Braun defeated Dixon and personal injury lawyer Al Hofeld in a positive campaign emphasizing issues over dirt slinging. She took office in January 5, 1993 to serve the people of Illinois. In 2004 Braun was a democratic candidate for the 2004 presidential election. She was not poling well in important states such as Iowa and New Hampshire and had a campaign in debt of thousands of dollars. Despite, this loss Braun has maintained her affiliations in the political arena and is involved with the Juvenile Justice, Courts and Administrative Practice Subcommittees of the Judiciary Committee. She is till committed to housing and urban affairs. Braun is an African American woman that has promoted and caused change in arena such as education, government and fair housing. She has set precedence for woman in the political arena and I admire her commitment to the policies she has helped to enforce. Work Cited Wikipedia (2005) Carol for president, 1993-1999. Retrieved July 27, 2005 from Wikipedia database. Lifton, M.(2004). Biography for senator carol moseley braun (Vol 13 )Mary Institute for the Humanities, McLeiden Library Bryant, J. (2003)The significance of carol moseley braun. townhall.com/columnists/jaybryant/jb20040118.shtml Research Papers on Carol Moseley Braun Essay - Women's StudiesBringing Democracy to Africa19 Century Society: A Deeply Divided EraHip-Hop is ArtStandardized TestingLifes What IfsMoral and Ethical Issues in Hiring New EmployeesNever Been Kicked Out of a Place This NiceInfluences of Socio-Economic Status of Married MalesQuebec and CanadaCapital Punishment

Thursday, November 21, 2019

Pearson's hard soft acid base theory in bioinorganic Term Paper

Pearson's hard soft acid base theory in bioinorganic - Term Paper Example The theory implies that soft acids tend to bind to soft bases and hard acids to hard bases. An increase in the electronegativity of an element or ligand causes an increase in the polarizability; this in turn increases hardness. The theory is useful in predicting the pathways of chemical reactions. The chemical conditions in which a hard or soft base or acid in put in can cause the hardness (or softness) characteristics of the acid or base to change. Therefore, borderline elements and ligands might increase or decrease in hardness or softness depending on the chemical conditions. Because of this reason, the metals in various metalloenzymes may be subjected to chemical conditions that might alter their hardness or softness properties. Enzymes with metals that exhibit Pearson’s hard and soft acids and bases theory include: 1) Urease This is an enzyme with nickel at its active site found in many species of bacteria, algae, plants (such as Jack Bean) and invertebrates. It plays a k ey role in the catalytic hydrolysis of urea to form ammonia and carbon dioxide as pre the equation below: Urease in Jack Bean has a single catalytic unit made up of an ?-subunit that has the active site with a dimeric nickel center. One of the two Ni atoms (Ni-1) coordinates to histidine via the nitrogen atoms and a water molecule. The second Ni atom (Ni-2) is similarly coordinated to histidine via the N atoms, two water molecules and to aspartic acid via the O atom. Mechanism: There are several mechanisms that explain how urease works. These include: a) Zerner mechanism In this, a carbonyl oxygen in urea attacks one of the water ligands attached to Ni-1. A nitrogen atom in the urea molecule donates its lone pair electrons to a carbon atom forming an N=C bond (Dixon, Riddles and Blakeley). This then reacts with a carboxylate ion. A base-catalyzed deprotonation of one –OH ligand on Ni then occurs. The resultant electronegative O attacks the carbonyl carbon. The N=C bond initia lly formed donates two electrons to the nitrogen, cancelling out the charge on it. The intermediate carbon formed with a coordination of 4 is then broken down by a sulfhydryl group. Ammonia is released when the C-N bond is broken after an H atom bonds to the N. This occurs alongside the breaking of the bond between the octahedral nickel and oxygen. A carbamate ion coordinated to the Ni is then formed. Water displaces the carbamate. The resultant carbamate then degenerates to yield carbonic acid and urea. b) Mangani mechanism This mechanism stipulates that both Ni-1 and Ni-2 take part in the reaction. The first atom, Ni-1, binds to urea, causing its activation. The second, Ni-2 binds to a water molecule, causing its activation (Benini, Rypniewski and Wilson). Ni-1 is in a five-coordinate formation, bound to urea via a carbonyl O atom. The distance between the two Ni atoms is reduced by the movement of the urea molecule towards Ni-2. The relatively low Lewis base property of NH2 in ur ea makes it a poor chelating ligand. Its high basicity however, enables the binding to Ni to occur. 2) Carbon monoxide dehydrogenase This is a nickel-based enzyme found in various bacteria. The enzyme plays a role in the catalytic oxidation of carbon monoxide to form carbon dioxide as per the equation below: There are two classes of carbon monoxide hydrogenase enzymes: one has a Mo-[Fe2-S2] active site and the other a Ni-[Fe3-S4]

Wednesday, November 20, 2019

Assessment and Recovery from Mental Distress Essay

Assessment and Recovery from Mental Distress - Essay Example The common causes of mental illness and distress are chemical imbalances in the brain, stress and everyday problems, and exposure to severely distressing experiences such as loss of a relationship, job, death of a family member, sexual assault, killings, and violence, among others. However, some mental health experts claim that mental illness can also be inherited. There are different types of mental distress: anxiety disorders, post-traumatic stress disorder, depression, manic depressive distress, borderline personality disorder, schizophrenia, and many more depending on gravity and description. People who suffered from these distresses were seen with various symptoms. The person could experience upset, feeling restless, sleeplessness, tremors, nightmares, extreme sadness or despair, loss of interest in doing anything, loss of appetite, irritability, impulsiveness, depression, inability to perform daily tasks, hopelessness, sense of guilt, extreme mood swings, feeling worthless, sen se of guilt, extreme mood swings, violence, and suicidal tendencies (Borg and Kristianssen, 2004). Being mentally distressed is difficult. Some even deny they have such illness because of the prejudice and discrimination of people around them. But, having the illness is not anybody else’s fault or a sign of weakness and not something to be ashamed of (Mental Health Commission, 2007). It has been suggested that the treatment must not be delayed in order to prevent it into more severe stage. However, it has been found that conventional or traditional treatments had not been successful for many patients. If a person is seen with early stage symptoms of mental distress, it is not only a prompt treatment that must be provided to be able to recover the patient more quickly but the proper one and, there could be similar or different methods for every patient’s case. It should be noted, however, that early detection and treatment helps the patient to restore his/her respect, d ignity, and confidence, and live a full, quality life (Borg and Kristianssen, 2004). Those mentally distressed can recover, provided they seek and provided the appropriate treatment and support. The treatment can be medication, therapy, support and counseling, lifestyle adjustment, support group meetings, and, provision of an inner strength that â€Å"†¦can come from any number of places, these former patients say: love, forgiveness, faith in God, a lifelong friendship,† (Carey, 2011, P 8). Discussion A. Mental Health Nursing Mental health nursing was described as â€Å"an ‘artistic’ interpersonal-relations tradition which emphasizes the centrality of nurses’ therapeutic relationships with ‘people’ ‘in distress’ and a ‘scientific’ tradition concerned with delivery of evidence-based interventions that can be applied to good effect by nurses to ‘patients’ suffering from ‘mental illness’,à ¢â‚¬  (Norman and Ryrie, 2009, 1537). The task employs two different methods that are either integrated or complementary in order to deliver quality care to patients. It should be noted that one method is free and independent of any outlined procedure while the other is systematic and depends on evidence for its implementation. It should be also highlighted that a third factor is the â€Å"interpersonal relations†

Monday, November 18, 2019

The United States 5th Marine Regiment Korea to Afghanistan Research Paper

The United States 5th Marine Regiment Korea to Afghanistan - Research Paper Example On October 29, the 1st Battalion was moved down the Hai River to Taku-Tangu Area to protect the railhead, the Taku Port and supply lines. (Simmons, 185; Yingling, 39-40). Under increased American influence, the improving situation between the Chinese Nationalist and Communist forces led to a cease-fire in January 1946. On April 08, the Regimental Headquarters were moved to Tangshan for security of the rail lines. As the Nationalist Army began to take over the responsibilities, the Marine units were being relieved in various sectors gradually. Taking advantage of the reduction in Marine numbers, the Communist forces violated the agreement by occupying a vast area in Manchuria left after the departure of Soviet occupation troops. The 3rd Battalion, 5th Marines, was deactivated on April 15. With only a few veterans left, the Regiment (less 1st Battalion) started intensive schooling program until September, when it returned to Peiping for the security of American personnel and property. (Yingling, 40-41). On the night of October 03, the 1st Battalion helped to repulse a company size attack by communists on the Hsin-Ho ammunition dump. The Battalion succeeded in recovering most of the stolen ammunition. On April 05, 1947, over 300 communists attacked two other ammunition dumps. Expecting a quick reaction from the 1st Battalion, the enemy had planned an ambush and mined the road leading to the area. As the lead vehicle of the C Company hit the mine, the attackers opened fire. The Marine counter-fire repelled the attack soon. However, despite diligent pursuit, the raiders succeeded in escaping the area along with the loaded ammunition. The Marine casualties included 16 wounded and 05 killed. (Yingling, 41). The 5th Marines were entitled to China Service streamer. By mid-May, the remaining units of the 1st Division had been withdrawn from China. Most of them were sent back to the United States. However, along with some other supporting units, the 5th Marines was moved to Guam, where it filled in the organization of 1st Provisional Marine Brigade on June 01, under the command of Brig. Gen. Edward A. Craig. The 2nd Battalion was also removed in October to form the 9th Marines. For the rest of the period at Guam, The one-battalion regiment was engaged in training exercises to increase proficiency of its personnel. The three-battalion 5th Marines, under the command of Col. Victor H. Krulak, was reactivated at Camp Pendleton on October 01, 1949. Elements of the 1st, 6th and 7th Marines formed the 1st and 2nd Battalions, while the 3rd Battalion (at Guam) joined the Regiment in February 1950. (Yingling, 41; Rottman, 170). The Korean War On June 25, 1950, the North Korean People’s Army (NKPA) had invaded South Korea without any warning. Only four days later, in response to the United Nations’ call for rendering aid to South Korea, American Commander in the Far East, Gen. Douglas Macarthur, USA, was authorized to employ U.S. forces for repel ling the attack. Commandant of the Marine Corps, Gen. Clifton B. Cates, offered a Marine air-ground brigade immediately. However, as he was not included in the Joint Chiefs of Staff meetings, he had to pursue a different channel. In response to Gen. Macarthur’s request for Marine units, Cates’ recommendation was finally approved on July 03. The 1st Provisional M

Saturday, November 16, 2019

Cyber Crime: Strategies and Types

Cyber Crime: Strategies and Types Cyber Crime: Identity Theft A. Introduction In this era of globalization, one of many things that can distinguish a developed country to a developing country is its progress of science and technology. This is because along with the development of a countrys science and technology, will also developed the countrys ability to enrich their own potential. Great advances in science and technology in developed country are due to their well-established information system. Meanwhile, in the developing country, the information system is still minimal, which make the development of science and technology become blocked. Thus, whether a country will become a developed country or not, is highly depend on their mastery of information system. In times like these, the mastery of the information system will not enough by merely mastering. We need to conquer the speed and accuracy too, because there is almost no point in mastering outdated information. Moreover, the very rapid progress of information makes the age of the information shorted. In other words, substitution of old and new information becomes faster. Old information will be ignored because of the more recent information. But, the development of science and technology, in which also means the development of information system, does not always have good effects. It has bad effects too. One of them is the increased rate of the computer crime. B. Computer Crime Computer crime issues have become high-profile, particularly those surrounding hacking, copyright infringement through warez, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. A computer crime is any illegal action where the data on a computer is accesed without permission. This access does not have to result in loss of data or even data modifications. Computer crime is often attributed to rogue hackers and crackers, but increasingly organized crime groups have realized the relative ease of stealing data with low-level of risk. There are three major classes of criminal activity with computer: 1. Unauthorized use of a computer, which might involve stealing a username and password, or might involve accessing the victims computer via the Internet through a backdoor operated by a Trojanhorse program. Unauthorized use of computers tends generally takes the following forms: Computer voyeur. The attackers read or copy confidential or propietary information, but the data is neither deleted nor changed. Changing data. Example, changing a grade on a school transcript. Unauthorized changing of data is generally a fraudulent act. Deleting data. Deleting entire files could be an act of vandalism or sabotage. Denying service to authorized users. 2. Creating or releasing a malicious computer program (e.g., computer virus, worm, Trojanhorse). Malicious computer program are divided into these following classes: 1) A virus is a program that infects an executable file. After infection, the executable file functions in a different way than before: maybe only displaying a benign message on the monitor, maybe deleting some or all files on the users hard drive, or maybe altering data files. There are two key features of a computer virus: The ability to propagate by attaching itself to executable files (e.g., application programs, operating system, macros, scripts, bootsector of a hard disk or floppy disk, etc.) Running the executable file may make new copies of the virus. The virus causes harm only after it has infected an executable file and the executable file is run. 2) A worm is a program that copies itself. The distinction between a virus and a worm, is that a virus never copies itself, a virus is copied only when the infected executable file is run. In the pure, original form, a worm neither deleted nor changed files on the victims computer, the worm simply made multiple copies of itself and sent those copies from the victims computer, thus clogging disk drives and the Internet with multiple copies of the worm. Releasing such a worm into the Internet will slow the legitimate traffic on the Internet, as continuously increasing amounts of traffic are mere copies of the worm. 3) A Trojan Horse is a deceptively labeled program that contains at least one function that is unknown to the user and that harms the user. A Trojan Horse does not replicate, which distinguishes it from viruses and worms. Some of the more serious Trojan horses allow a hacker to remotely control the victims computer, perhaps to collect passwords and creditcard numbers and send them to the hacker, or perhaps to launch denial of service attacks on websites. Some Trojan Horses are installed on a victims computer by an intruder, without any knowledge of the victim. Other Trojan Horses are downloaded (perhaps in an attachment in e-mail) and installed by the user, who intends to acquire a benefit that is quite different from the undisclosed true purpose of the Trojan Horse. 4) A logic bomb is a program that detonates when some event occurs. The detonated program might stop working, crash the computer, release a virus, delete data files, or any of many other harmful possibilities. Atimebomb is a type of logicbomb, in which the program detonates when the computers clock reaches some target date. 5) A hoax is a warning about a nonexistent malicious program. 3. Crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device (cyber crime) Examples of crimes that merely use computer networks or devices would include : Cyber stalking Fraud and identity theft Phishings scams Information warfare The third type of Computer Crime has become the most famous right now, because it produce more benefits than the other two. C. Cyber Crime The Internet is a new frontier. Just like the Wild, Wild West, the Internet frontier is wide open to both exploitation and exploration. There are no sheriffs on the Information Superhighway. No one is there to protect you or to to lock-up virtual desperados and bandits.This lack of supervision and enforcement leaves users to watch out for themselves and for each other.A loose standard called netiquette has developed but it is still very different from the standards found in real life.Unfortunately, cyberspace remains wide open to faceless, nameless con artists that can carry out all sorts of mischief. And that is why the cyber crimes can be as they are right now. Cyber Crime is a criminal activity done using a computers and the internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cyber crime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the internet. Cases of cyber crime, 1970 2005: 1970 1990 1. John Draper discovers the give-away whistle in Capn Crunch cereal boxes reproduces a 2600Hz tone. Draper builds a ‘blue box that, when used with the whistle and sounded into a phone receiver, allows phreaks to make free calls 2. Robert T. Morris, Jr., graduate student at Cornell University and son of a chief scientist at the NSA, launches a self-replicating worm (the Morris Worm) on the governments ARPAnet (precursor to the Internet). The worm gets out of hand and spreads to over 6000 networked computers, clogging government and university systems. Morris is dismissed from Cornell, sentenced to three years probation, and fined $10K. 3. After a prolonged sting investigation, Secret Service agents swoop down on organizers and members of BBSs in 14 US cities, including the Legion of Doom. The arrests are aimed at cracking down on credit-card theft and telephone and wire fraud.(1990) 1991 2000 1. Five members of the Aum Shinri Kyo cults Ministry of Intelligence break into Mitsubishi Heavy Industrys mainframe and steal Megabytes of sensitive data. (1994) 2. Hackers adapt to emergence of the World Wide Web, moving all their how-to information and hacking programs from the old BBSs to new hacker Web sites.(1994) 3. Russian crackers steal $10 million from Citibank. Vladimir Levin, the ringleader, uses his work laptop after hours to transfer the funds to accounts in Finland and Israel. He is tried in the US and sentenced to 3 years in prison. All but $400K of the money is recovered. (1995) 4. The French Defense Ministry admits Hackers succeeded in stealing acoustic codes for aircraft carriers and submarines. (1995) 5. FBI establishes fake security start-up company in Seattle and lures two Russian citizens to U.S. soil on the pretense of offering them jobs, then arrests them. The Russians are accused of stealing credit card information, attempting to extort money from victims, and defrauding PayPal by using stolen credit cards to generate cash. (2000) 2001 2005 1. Microsoft become victim of a new type of attack against domain name servers, corrupting the DNS paths taking users to Microsofts Web sites. This is a Denial of Service (DoS) attack. The hack is detected within hours, but prevents millions of users from reaching Microsoft Web pages for two days. (2001) 2. The Klez.H worm becomes the biggest malware outbreak in terms of machines infected, but causes little monetary damage. (2002) 3. Two men hack into wireless network at Lowes store in Michigan and steal credit card information. (2003) 4. Brian Salcedo sentenced to 9 years for hacking into Lowes home improvement stores and attempting to steal customer credit card information. Prosecutors said three men tapped into the wireless network of a Lowes store and used that connection to enter the chains central computer system in NC, installing a program to capture credit card information. (2004) 5. Secret Service seizes control of the Shadowcrew Web site and arrests 28 people in 8 states and 6 countries. They are charged with conspiracy to defraud the US. Nicolas Jacobsen, is charged with hacking into a T-Mobile computer system, exposing documents the Secret Service had e-mailed to an agent. (2004) Australian Institute of Criminology, 9 types of cycber crime: 1. Theft of telecommunication service The phone phreakers of three decades ago set a precedent for what has become a major criminal industry. By gaining access to an organisations telephone switchboard (PBX) individuals or criminal organisations can obtain access to dial-in/dial-out circuits and then make their own calls or sell call time to third parties. Offenders may gain access to the switchboard by impersonating a technician, by fraudulently obtaining an employees access code, or by using software available on the internet. Some sophisticated offenders loop between PBX systems to evade detection. Additional forms of service theft include capturing calling card details and on-selling calls charged to the calling card account, and counterfeiting or illicit reprogramming of stored value telephone cards. 2. Communication in furtherance of criminal conspiracies There is evidence of telecommunications equipment being used to facilitate organised drug trafficking, gambling, prostitution, money laundering, child pornography and trade in weapons (in those jurisdictions where such activities are illegal). The use of encryption technology may place criminal communications beyond the reach of law enforcement. 3. Telecommunications privacy Digital technology permits perfect reproduction and easy dissemination of print, graphics, sound, and multimedia combinations. The temptation to reproduce copyrighted material for personal use, for sale at a lower price, or indeed, for free distribution, has proven irresistable to many. 4. Dissemination of offensive materials Content considered by some to be objectionable exists in abundance in cyberspace. This includes, among much else, sexually explicit materials, racist propaganda, and instructions for the fabrication of incendiary and explosive devices. Telecommunications systems can also be used for harassing, threatening or intrusive communications, from the traditional obscene telephone call to its contemporary manifestation in cyber-stalking, in which persistent messages are sent to an unwilling recipient. 5. Electronic money laundering and tax evasion With the emergence and proliferation of various technologies of electronic commerce, one can easily envisage how traditional countermeasures against money laundering and tax evasion may soon be of limited value. I may soon be able to sell you a quantity of heroin, in return for an untraceable transfer of stored value to my smart-card, which I then download anonymously to my account in a financial institution situated in an overseas jurisdiction which protects the privacy of banking clients. I can discreetly draw upon these funds as and when I may require, downloading them back to my stored value card (Wahlert 1996). 6. Electronic vandalism, terrorism and extortion As never before, western industrial society is dependent upon complex data processing and telecommunications systems. Damage to, or interference with, any of these systems can lead to catastrophic consequences. Whether motivated by curiosity or vindictiveness electronic intruders cause inconvenience at best, and have the potential for inflicting massive harm (Hundley and Anderson 1995, Schwartau 1994). While this potential has yet to be realised, a number of individuals and protest groups have hacked the official web pages of various governmental and commercial organisations (Rathmell 1997). http://www.2600.com/hacked_pages/ (visited 4 January 2000). This may also operate in reverse: early in 1999 an organised hacking incident was apparently directed at a server which hosted the Internet domain for East Timor, which at the time was seeking its independence from Indonesia (Creed 1999). 7. Sales and investment fraud As electronic commerce becomes more prevalent, the application of digital technology to fraudulent endeavours will be that much greater. The use of the telephone for fraudulent sales pitches, deceptive charitable solicitations, or bogus investment overtures is increasingly common. Cyberspace now abounds with a wide variety of investment opportunities, from traditional securities such as stocks and bonds, to more exotic opportunities such as coconut farming, the sale and leaseback of automatic teller machines, and worldwide telephone lotteries (Cella and Stark 1997 837-844). Indeed, the digital age has been accompanied by unprecedented opportunities for misinformation. Fraudsters now enjoy direct access to millions of prospective victims around the world, instantaneously and at minimal cost. 8. Illegal Interception of telecommunications Developments in telecommunications provide new opportunities for electronic eavesdropping. From activities as time-honoured as surveillance of an unfaithful spouse, to the newest forms of political and industrial espionage, telecommunications interception has increasing applications. Here again, technological developments create new vulnerabilities. The electromagnetic signals emitted by a computer may themselves be intercepted. Cables may act as broadcast antennas. Existing law does not prevent the remote monitoring of computer radiation. It has been reported that the notorious American hacker Kevin Poulsen was able to gain access to law enforcement and national security wiretap data prior to his arrest in 1991 (Littman 1997). In 1995, hackers employed by a criminal organisation attacked the communications system of the Amsterdam Police. The hackers succeeded in gaining police operational intelligence, and in disrupting police communications 9. Electronic funds transfer fraud Electronic funds transfer systems have begun to proliferate, and so has the risk that such transactions may be intercepted and diverted. Valid credit card numbers can be intercepted electronically, as well as physically; the digital information stored on a card can be counterfeited. Right now electronic funds transfer fraud is the most famous type of cyber crime. Every year the rate of case about electronic funds transfer fraud always increasing especially in credit card information stealing. From www.spamlaws.com they wrote about credit card stealing in 2005,†Credit card fraud statistics show that about $2.8 million was lost due to credit card fraud, from fraudulent use of MasterCard and Visa alone. In total, credit card fraud costs cardholders and credit card issuers as much as $500 million a year.† Identity Theft Identity theft is really identity fraud. This criminal uses someone elses identity for their own illegal purposes.Examples include fraudulently obtaining credit, stealing money from the victims bank accounts, using the victims credit card number, establishing accounts with utility companies, renting an apartment, or even filing bankruptcy using the victims name. The cyberimpersonator can steal unlimited funds in the victims name without the victim even knowing about it for months, or even years. Anyone who relies heavily on credit cards, Social Security Numbers or network blogging is more susceptible to credit identity theft. Many of our modern conveniences also come with a risk and less protection. The digital age is the perfect age for the Cyber criminal to commit it. Think of the internet as a dark alley in the middle of the night. And these cyber criminals are those people hiding there waiting for the victims to make a mistake. Credit identity theft is a very damaging crime because it not only damages the person financially but also damages the persons reputation as well. Imagine someone borrowing money using your name and never telling you. You will both bear with the burden of paying back the money he borrowed and suffer the humiliation of having this blunder under your name. Identity theft has been referred to by some as the crime of the new millennium. It can be accomplished anonymously, easily, with a variety of means, and the impact upon the victim can be devastating. Identity theft is simply the theft of identity information such as a name, date of birth, Social Security number (SSN), or a credit card number. The mundane activities of a typical consumer during the course of a regular day may provide tremendous opportunities for an identity thief: purchasing gasoline, meals, clothes, or tickets to an athletic event; renting a car, a video, or home-improvement tools; purchasing gifts or trading stock on-line; receiving mail; or taking out the garbage or recycling. Any activity in which identity information is shared or made available to others creates an opportunity for identity theft. It is estimated that identity theft has become the fastest-growing financial crime in America and perhaps the fastest-growing crime of any kind in our society. The illegal use of identity information has increased exponentially in recent years. In fiscal year 1999 alone, the Social Security Administration (SSA) Office of Inspector General (OIG) Fraud Hotline received approximately 62,000 allegations involving SSN misuse. The widespread use of SSNs as identifiers has reduced their security and increased the likelihood that they will be the object of identity theft. The expansion and popularity of the Internet to effect commercial transactions has increased the opportunities to commit crimes involving identity theft. The expansion and popularity of the Internet to post official information for the benefit of citizens and customers has also increased opportunities to obtain SSNs for illegal purposes. Victims of identity theft often do not realize they have become victims until they attempt to obtain financing on a home or a vehicle. Only then, when the lender tells them that their credit history makes them ineligible for a loan, do they realize something is terribly wrong. When they review their credit report, they first become aware of credit cards for which they have never applied, bills long overdue, unfamiliar billing addresses, and inquiries from unfamiliar creditors. Even if they are able to identify the culprit, it may take months or years, tremendous emotional anguish, many lost financial opportunities, and large legal fees, to clear up their credit history. Identity theft occurs in many ways, ranging from careless sharing of personal information, to intentional theft of purses, wallets, mail, or digital information. There are some reasons why the attacker can steal the credit card information: 1. Unsecured network Example: 1. Poisoning Poisoning technique is quiet complicated. First, the attackers need to connect to the same network with the target. After that, the attackers have to look for the IP address of the target. The next step, the attackers should poison the target computer with ARP poisoning or with trojan horse. Then the computer target will move following the attackers track. The attackers will bring the target into fake shop site, and make the target unrealized that he/she has entered the credit card information. 2. Sniffing This technique is unstable, why? Because its depend on the attackers luck. Just like poisoning, the attackers have to connect to the same network with the target. After that, the attackers should scan all of MAC address in the network. Next, the attackers start the sniffing program, such as Cain and Able or Wireshark. Last, the attackers should wait until someone in the network open a shop site and enter the information of the credit card. 2. Vulnerabilities on the site Example: 1. SQL Injection With this vulnerability the attacker can enter admin panel without knowing the username and password. They just need to enter a right syntax as username and password to enter the admin panel. If they are already in admin panel they can see the complete information of the buyer. 2. Blind SQL Injection Blind SQL injection is the most favorite vulnerability for the attackers. The attackers will only need the web browser to do this technique. First, the attackers have to found a right page to be injected with some syntax. After that the attackers should drop all database table, and looking for user table or admin table. If there is user table the attackers can drop the column and the attackers could get the full data of the user, included the credit card information. But, if user table doesnt exist, the attackers should use the admin table. The attackers should drop the admin column and search for the admin password. After the attackers cracks the admins username and password, the attackers could go to the admin panel and look for the information of the buyer. 3. Order log Order log is an old vulnerability, but theres still websites that have this vulnerability. With this vulnerability the attackers only need to use search engine and look for the order log. If the order log has already founded the attacker will open it, and suddenly get full information about the buyer. 4. Admin Directory This vulnerability makes visitor of the site be able to open admin directory freely. So, the attacker could use this chance to see the database. Order database is always in the database. In the order database, the data of the buyer will be saved completely, including credit card information. 3. Human error Example: Social Engineering or Human Manipulating Attacker could use security weakness which is human. Why? Because human is easy to be manipulated. First, the attackers could request the target to do something unimportant, and then set a trap for the target. Attackers will manipulate the target to follow the attackers scheme. Then, if the target has already been trapped, the attacker could make the target gives the complete information about the credit card. There are several ways that can be done to avoid the potential victims from identity theft : The potential victims should request a complete credit report every once a year and check it closely. When get unwanted pre-approved credit card offers, shred them up before tossing them. When in public, do not recite social security number outloud to a bank teller or store cashier. Use a secure mailbox that locks. When asked to give mothers maiden name as a code access, use another key word instead. Change the personal identification numbers on accounts regularly. Pick up and keep printed receipts at bank machines or gas pumps. Even if have been victimized, there are still things that can be done : Before calling the police, contact bank or credit card company and freeze the account. The reason for this is twofold: first, it will help minimize monetary loss, and two, most banks and creditors have a time period in which the notification still valid and can be used to protect the victims. Then call the police department. It does not matter if the identification is being used in the victims city or halfway across the world because the police are required by federal law to take the report. After making police reports, the victim could contact any of national credit bureaus and put a fraud alert on their account. While dealing with the credit bureau, the victim should get a current copy of their credit report. And read it carefully. Then, the victims can contact their insurance company and ask for compensation. At least one insurance company has developed an insurance policy to help deal with identity theft. REFERENCES Anonymous. Computer Crime Definition. cited from http://www.mariosalexandrou.com/definition/ computer-crime.asp [21 November 2009] Anonymous. Cybercrime. cited from http://www.techterms.com/definition/cybercrime [21 November 2009] Australian Institute of Criminology. Nine Types of Cybercrime. cited from http://www.crime.hku.hk/ cybercrime.htm [21 November 2009] Hoar SB. Identity Theft: The Crime of The New Millennium. cited from http://www.cybercrime.gov/ usamarch2001_3.htm [5 December 2009] Karnow CEA. Cybercrime. cited from http://www.davislogic.com/cybercrime.htm [5 December 2009] Herries S. Overcoming Identity Theft: What to Do After You Have Been Comprimised. cited from http://www.associatedcontent.com/article/272448/overcoming_identity_theft_what_to_do_pg2.html?cat=17 [5 December 2009]

Wednesday, November 13, 2019

Free Admissions Essay - Care for an Ethnically Diverse Population :: Medicine College Admissions Essays

Admissions Essay - Care for an Ethnically Diverse Population Crayfish tails in tarragon butter, galantine of rabbit with foie gras, oxtail in red wine, and apple tartelletes. The patient had this rich meal and complained of "liver upset" (crise de foie). Why a liver ache? I always associate indigestion with a stomach ache. In studying French culture in my Evolutionary Psychology class, I learned that when experiencing discomfort after a rich meal, the French assume their liver is the culprit. Understanding and dealing with the minor - sometimes major - cultural differences is a necessity in our shrinking world and diverse American society. Anthropology has prepared me to effectively communicate with an ethnically diverse population. My science classes, research, and clinical experience have prepared me to meet the demands of medical school. I first became aware of the valuable service that physicians provide when I observed my father, a surgeon, working in his office. I gained practical experience assisting him and his staff perform various procedures in his out-patient center. This exposure increased my admiration for the restorative, technological, and artistic aspects of surgery. I also saw that the application of medical knowledge was most effective when combined with compassion and empathy from the health care provider. While admiring my father's role as a head and neck surgeon helping people after severe accidents, I also found a way to help those suffering from debilitating ailments. Working as a certified physical trainer, I became aware of the powerful recuperative effects of exercise. I was able to apply this knowledge in the case of Sharon, a forty-three-year-old client suffering from lupus. she reported a 200% increase in her strength tests after I trained her. This meant she could once again perform simple tasks like carrying groceries into her house. Unfortunately, this glimpse of improvement was followed by a further deterioration in her condition. On one occasion, she broke down and cried about her declining health and growing fears. It was then that I learned no physical prowess or application of kinesiology would alleviate her pain. I helped reduce her anxiety with a comforting embrace. Compassion and understanding were the only remedies available, temporary though they were. To confirm that medicine is the best way for me to help others, I assisted a research team in the Emergency Room at University Medical Center (UMC).

Monday, November 11, 2019

Ethical practice in counseling Essay

Part A What is ethical practice in counseling? How is this reflected in the skills, competencies and qualities of an effective counselor? Ethical practice within counselling is practice that adheres to a strict set of guidelines created for the purpose of ensuring patient and client safety as well as maximizing the overall outcome of the therapy sessions. These guidelines are essential whether the counselling taking place is under a professional derestriction or between friends and acquaintances. This essay aims to outline the importance of these ethical guidelines and the boundaries they create. It will also take a look at the skills and practices that counsellor’s use and develop to maintain theses boundaries safely and fairly. The ethical framework s aim and purpose is to shape the practice of counselling into a safe, monitored and effective treatment. Due to the trust in place between client and practitioner, as well as the vulnerability of those seeking therapy, extra care has to be taken to protect their mental and physically well-being. The framework is also used to help with the clients understand of the treatment involved and allow the counselor to discuss session times and costs with ease. ‘Ownership and responsibility to practice ethically is an individual process’ British Association for Counselling and Psychotherapy (2013). Meaning that, although the ethical framework is essential to all counselling and therapy, the practices and skills used by the professionals within these sessions are put in place and used at their own discretion depending on the individual clients needs. The first part of this essay will focus on some of the main points within the British Association of Counselling and Psychotherapy’s ethical framework and how they are maintained using particular practices and qualities. Boundaries One of the main ways that ethical counseling can be maintained is through the correct use of client counsellor boundaries. This practice can be relevant in professional and friendly counselling sessions. It is very important that the counsellor makes clear the boundaries between themselves and their client and also exactly what they entail. This can be session times and costs as well as their aims for the healing experience. This is essential to avoid confusion and upset later on in therapy. McLeod, J (2008) These boundaries are generally discussed and outlined during the first counseling session, although they may need to be discussed and adjusted at a later date. It is important to note that these boundaries are and can be different for every client. For example some may benefit from having the additional support of knowing they can contact their therapist outside of counselling sessions, whereas in some situations this may promote the individual in becoming far too reliant on the therapist and therefore prohibit them from making positive steps. Another important boundary to made clear is that of what is being offered. This could be especially important when the counseling is happening between friends and nothing more than a listening ear is being offered. It is therefore necessary and common for a verbal agreement to take place to protect those concerned and to form a base for a trusting relationship to begin. McLeod, J (2008) Throughout time these boundaries will be pushed and stretched as the client relies and connects more with their therapist. It is therefore important that the therapist is not only kind and reassuring, but is self aware at both a personal and professional level as they will be required to recognise when boundaries are being overstepped and ensure that relationships do not occur or change because of personal interests. In line with boundaries, at the end of each session a counsellor may request a statement of clarification from the client. This as well as summarizing can help confirm the end of session boundary and also ensure the client that the counsellor is trying to understand the situation as best they can. Being Trustworthy/Confidentiality As with boundaries, being trustworthy and therefore confidentiality is essential to create and maintain the client counsellor relationship regardless of whether it is occurring professionally or as friends. Without the trust associated with confidentiality, successful therapy cannot occur, as a client will not talk freely about personal issues without that reassurance. According to the framework laid out by British Association for Counselling and Psychotherapy (2013), all information shared in a counselling situation, should be kept strictly confidential at all times, except when the counsellor has evidence to make them believe that the clients or someone else’s safety is at risk. The acting therapist must however discuss the information with the individual to try and solve the issue without breaking trust. The sharing of information is therefore a last call motive to prevent harm when all other attempts at reason have been unsuccessful. It is important to note that the client/patient must be informed beforehand that their information is being/will be disclosed to the relevant persons. Confidentiality is essential for creating integrity between the client and counsellor and in order for trust to develop at its maximum potential, it is important that the counsellor appears to be trust worthy and treats the client with the upmost respect. One way that a counsellor might encourage their patient to trust in them and feel at ease is through the common verbal communication called paraphrasing. Paraphrasing is a method used commonly amongst therapists that require the counsellor to briefly repeat the clients issue to get confirmation, reaffirm trust and also to allow the therapist to confirm tot the client that they are listening and trying to understand completely. Advice To maximize the results from therapy, counsellors are deterred from giving  their clients advice. The British Association for Counselling and Psychotherapy (2013) framework states that it is rarely appropriate or advisable as a counsellor to give advice during therapeutic sessions and that it is much more advisable to encourage patients to develop their own advise or plans. This links in with another ethical principle within counselling that states that the clients should be encouraged to develop and use their own initiative and instincts. By encouraging this behavior, over time, the counsellor will find that the client’s confidence and rationality will rise. Counsellors may use a variety of verbal and non-verbal communication skills to help their client/patient build upon their initiative and progress with their treatment. One way that a therapist might encourage their patient to create their own advice and come to their own confusion is through the asking of open questions. Although it is important to remember that questions should be kept to a minimum throughout sessions, open questions may be necessary to nudge a client into exploring worries and certain activities further. McLeod, J (2008). To be successful with asking the correct open questions, the counsellor would have to be very strong willed and honest to prevent them from asking questions to satisfy their own personal curiosity. Non-maleficence/ Emotional and Mental Safety. All of the ethical guides mentioned combined ensure the safety of the client and counsellor whilst maintaining their dignity. Client safety is paramount and it is essential that the client feel they can full express their emotional needs and feelings without fear of judgment, betrayal or ridicule. Two practices have been mentioned that can help build the relationship and trust between the client and counsellor. It is important during counselling sessions that the counsellor has some kind of input, whether verbal (Paraphrasing) or non-verbal aspects of listening such as eye contact or  head movements. However, counsellors must take great care to adapt these practices and skills to suit each clients individuality as every person’s needs are different, for example a blind client would require more verbal s acknowledgements, whereas some people avoid direct eye contact. Therefore the counsellor should act with and encourage sincerity. To see how important all of these ethical principles and practices are it is necessary to view the detrimental effect that bad unethical counselling may have on an individual. From the D171 Developing Counselling Skills DVD it is obvious to see the harm that the counsellors bad practice is having. From showing a lack of empathy, interest and sincerity, the counsellor is destroying patients’ confidence and self-esteem whilst abusing all trust. The effect on the patient is immediate and shows how even just the common courtesy of acknowledgement or reassurance can really make a difference to the mental stability of someone struggling. D171 Developing Counselling DVD (2008) In conclusion, by being aware of the negative impact that counselling can so easily have upon a patient through negligence, it is necessary for ethics to be reflected and maintained within procedure to allow the effective treatment and practice of therapy. It is also important that counsellors skills and qualities reflect these ethics and are used in according with the guides to maximize the treatment standards. References British Association for Counselling and Psychotherapy (2013). Ethical Framework for Good Practice in Counselling and Psychotherapy, http://www.bacp.co.uk/admin/structure/files/pdf/9479_ethical%20framework%20jan2013.pdf (Accessed 14/01/14). McLeod, J (2008) Introduction to Counselling [Ed. D. Langdridge], Maidenhead/Milton Keynes, Open University Press/The Open University The Open University (2008) D171 Developing Counselling Skills DVD, Milton Keynes, The Open University. Part B Briefly set out how your own ethical beliefs, behaviours and values have developed and why they are important. I think my behavior towards boundaries may have changed. It had never occurred to me how important boundaries are within counselling and psychotherapy and realistically I often find myself being ‘friends’ with people who have sought my help, when I may not have necessarily wanted to. I will definitely aim to make my boundaries more clear in the future to minimize the risk of mixed signals. I think this is definitely important, as it is unfair to allow someone to believe they have closeness with an individual when they may in fact not. It is difficult however to maintain that distance when comforting someone who is clearly distressed and upset and in need of affection and comfort. Self Evaluation 1) I definitely feel like I got to grips with the use of some of the counsellors practices, ie paraphrasing and open questions and I feel I can easily recognise when these are being used and when it would be suitable to use them. 2) I very much struggled with the main textbook. I am an avid reader and although I am used to reading very complex material, I found that the way the textbook was written did not agree with me in the slightest. I found it very difficult to absorb and extract the content and found that it made me enjoy this module much less than I thought I would.