Monday, September 30, 2019

Change is a consistent issue for the modern organisation. Discuss the various ways in which the employee may offer effective resistance to this change.

Abstract Modern organisations are consistently prone to organisational change. Change reflects business growth and represents the needs of society. Hence, businesses often make changes in accordance with societal needs by focusing on the customer and marketing as opposed to focusing purely on production (The Times, 2012: 1). Whilst change is often viewed positively, this is not always the case and change is sometimes resisted by employees. This happens for a number of different reasons with one of the main ones being surprise. Employees generally don’t appreciate changes being made unexpectedly as it provides them with a â€Å"threatening sense of imbalance in the workplace† (Kreitner, 2008: 434). A lack of understanding and a lack of skills are further reasons why employees may want to resist change and unless effective training on change is provided, employees will most likely view positive changes negatively (Kreitner, 2008: 434). The various ways in which the employee may of fer resistance to change will be discussed in this essay by analysing a range of models and frameworks that help to establish the effectiveness of change. Introduction Employee resistance to change can be undesirable as it places an obstacle in the way of business development and organisational change. However, there are certain circumstances where employee resistance to change is viewed in a positive light. By resisting change and demonstrating their reasons for doing so, employees may actually be encouraging change by offering alternative solutions and options. As pointed out by de Jager; â€Å"the idea that anyone who questions the need for change has an attitude problem is simply wrong, not only because it discounts past achievements, but also because it makes us vulnerable to indiscriminate and ill-advised change† (de Jager, 2001: 25). Therefore, whilst some may consider employee resistance to change disrespectful and unfounded (Piderit, 2000: 26), others may be consider it to be â€Å"very effective, very powerful† and a â€Å"very useful survival mechanism† (de Jager, 2001: 25). An employer may want to instigate organisa tional change that is inappropriate or wrong and â€Å"just as conflict can sometimes be used constructively for change, legitimate resistance might bring about additional organizational change† (Folger and Skarlicki, 1999: 37). This essay will demonstrate how employees can offer legitimate resistance to change by suggesting alternative organisational change structures that will help to promote sustainability and assist in business development. This will be done by looking at various organisational change models and frameworks that will provide employees with the ability to resist change by offering additional options, which they believe will be in the best interests of the organisation. Employee resistance may lead to proposed change initiatives being revaluated by management who may then consider the most appropriate change for the business, as recommended by the employee. The process of change within an organisation isn’t just about creating a change that individuals will be able to resist, but rather the transition that will accommodate the change (Bridges, 1991: 3). Unless transition occurs, it is unlikely that the change will be effective. It is thus important that employees are capable of resis ting change so that they can offer alternative solutions that may be better suited to organisational needs. Consequently, employee resistance to change is an important contributor to implementing effective change within an organisation. Main Body Burke-Litwin Model (1992) The Organisational Transformation Process, developed by Burke and Litwin (1992: 1), is one of the main models that can be used to implement change within an organisation. Employees can use this model to offer resistance to change by offering alternative solutions that would be better suited to the organisation. Employees can use this model to show the various drivers of change by ranking them in terms of importance (Jex, 2002: 442). The most important factors are featured at the top, with the lower layers becoming progressively less important. By using this model, an employee will be able to demonstrate that all of the factors for change are interrelated and that a change in one factor will affect a change in all of the other factors. Organisations therefore have to consider whether the impact a change will have upon the other factors will help the business to remain sustainable (Hertwich, 2006: 10). As the external environment is at the top of the model, this is the main factor that is likely to influence change. An employee can resist change by offering an alternative solution that takes into account the needs of the external environment (World Commission on Environment and Development, 2011: 1).Porras and Robertson’s Model (1992)Porras and Robertson’s Model of Organisational Change was developed in 1992 to help individuals understand how to approach organisational change. This model is similar to the Burke-Litwin model in that it suggests that the external environment is the main influencer of organisational change. However, this model also suggests that the objectives of the organisation are the main drivers of change and that organisational arrangement, physical setting, social factors and technology all contribute to the changing environment of any organisation. In effect, an employee will be able to rely on this model to effectively resist change by signifying how the change is not in accordance with the overall objectives of the business. Instead they can offer an alternative change solution that is more akin to the organisational arrangement and physical setting of the business as well as social factors and technology. A change can be offered that improves the performance of the organisation, whilst also seeking to advance individual development. Hence, as has been established; â€Å"behaviour change is the key mediating variable in organisational change† (Jex, 2002: 444). If an employee can demonstrate that individual behaviour will be modified in accordance with the needs of the external environment, organisational change will most likely occur. As this model focuses on individual behaviour, desired work behaviours will be better achieved, which will affect the disposition of the organisation overall. This theory does not, however, focus on modern ways of thinking and subsequently fails to adapt to take into account the changing environment.Lewin’s Force Field Ana lysisThe Force Field Analysis model, developed by Lewin in 1951 will help an employee to resist change by providing a framework which looks at the restraining factors (forces) to change. In this analysis, there are two different types of forces, which are forces for change (driving forces) and forces against change (resisting forces). An employee can use the resisting forces to prevent a particular change from happening and use the driving forces to offer an alternative change. These forces can help the employee to alleviate any problems that are likely to arise with change management by helping the organisation to understand the effects a change will have upon the organisation. In demonstrating why a particular change should not take place, the employee will be required to show that the restraining forces exceed the driving forces. If this can be ascertained then the organisation change should not take effect. If the employees want to propose an alternative change, they will be req uired to show that driving forces of the new proposed change exceed the restraining forces. If they can establish this, then the new change should take place as it would be considered beneficial to the organisation. This model is useful to frame a process of change as it is easy to understand, though it seems as though each stage could in fact be expanded so that individuals can understand the process of change a lot more easily.Porter’s Generic Value Chain Analysis The Value Chain Theory, developed by Michael Porter, helps organisations to decide whether changes to the structure of the organisation are required (Porter et al; 2007: 706). An employee can use this model to demonstrate how the organisation does not need the change it wants to resist. The employee can do this by analysing the activities of the organisation, and the costs associated with them, to decide whether the proposed activity is profitable or not. The value chain activities consist of primary and support a ctivities. Whilst the primary activities consist of inbound logistics, operations, outbound logistics, marketing and sales and service, the support activities consist of procurement, infrastructure, human resource management and technological development (Porter et al; 2007: 706). The aim of reviewing these activities is to consider whether the customer can be offered a level of value that exceeds the costs of the activities, resulting in a profit. This will also depend upon whether the organisations activities can be performed efficiently. By using this concept, the employee will be able to demonstrate that the customer cannot be offered a level of value that exceeds the cost of the activities and that no profit can be obtained from the change as a result. This is an effective way an employee will be able to resist change as it provides the employee with the chance to demonstrate how the proposed change does not have any profitable value. Nonetheless, it is likely to prove extremel y difficult for an employee to implement this model due to the fact that employees will not have access to certain information about the organisation and the change.Change Analysis Process Because of how important it is for organisational changes to be properly analysed before they are implemented in order to minimise any associated risks, an employee could employ the change analysis process to deny the changes they wish to resist. Because an organisation needs to be able to adapt to change (Brier et al, 2011: 1) the identification and codification of change scenarios is necessary for the change process to take effect. The process of change requires organisations to adapt to current situations, as opposed to the creation of solutions (Brier et al, 2011: 1). The change analysis process can therefore be used analyse the change by considering the impact the change is likely to have and then subsequently considering whether it should be approved or denied. In resisting change, employees can use this analysis process to put forward their reasons why the change ought to be denied. Whether an employer will take into account the views of the employee is another matter and it seems as though the employee will still be required to overcome many obstacles when putting forward its views and opinions.Realistic Evaluation Model The Realistic Evaluation Model could also be used to demonstrate the ineffectiveness of the proposed change. This will provide the employee with the ability to demonstrate the impact the change will have upon the organisation through proper evaluation. This model is suitable for employees to offer effective resistance to change as the evidence will be based upon realistic ideas and concepts about the change. A proper assessment can then be made about the ineffectiveness of the change so that it can be resisted (Rycroft-Malone et al, 2010: 38). This model is quite similar to Lewin’s Force Field Analysis in that it will enable the employee to re view what is expected from the change, whilst also identifying any problems. The employee will also be able to put forward any associated risks with the change, which will most likely ensure that their resistance is effective. This approach provides a useful framework for helping employees to develop explanations about why the change should be resisted, which it will then be able to present in a coherent way† (Rycroft-Malone et al, 2010: 38). Summary/Conclusions Given the impact organisational change has upon employees, it is unsurprising that resistance to change will often occur. Whilst such resistance to change can have a negative impact upon the organisation, it can also be considered positive on the basis that employees may be encouraging further change by offering alternative solutions and options. In resisting change employees may consequently be able to demonstrate alternative options for change, which may generate better ideas that are more suited to organisational needs. Not only do organisations need to be able to satisfy the needs of its consumers, but they will also be required to satisfy the needs of their employees. This will not only promote the success of the business but it will also lead to economic growth. Employees need to be able to identify and develop change strategies which help to meet organisational objectives and prevent undesirable changes from being made. Any risks that are associated with change will be capable of being overcome by the adoption of alternative change structures. In order to effectively resist change, employees will thus be required to adopt various change management models and frameworks so that they can offer appropriate solutions to the proposed changes. Not only will this prevent undesirable changes from being implemented, but additional strategies will also be developed. In resisting change, employees will be able to demonstrate that the possible risks associated with the particular change outweigh any benefits. Once this can be established, it is unlikely that the organisation will implement the change and any alternative suggestions will most likely be welcomed. It is important that organisations listen to the views of employees as they may be able to offer solutions that are more applicable and better suited to the needs of the organisation. References Bridges, W. (1991). Managing transitions: making the most of change. Reading, MA: Wesley Publishing Company. Brier, J. Rapanotti, L. and Hall, J. G. (2011) Problem Based Analysis of Organisational Change: A Real World Example, [Online] Available: mcs.open.ac.uk/jb9242/jbwebpapers/submittediwaapf06paper.pdf [18 August 2014]. Burke, W. W. and Litwin, G. H. (1992) Transformational Change and Transactional Change. Explanation of the Casual Model of Organisational Performance and Change, [Online] Available: http://www.12manage.com/methods_burke_litwin_model.html [18 August 2014]. de Jager, P. (2001). Resistance to change: a new view of an old problem. The Futurist, 24-27. Folger, R. & Skarlicki, D. (1999). Unfairness and resistance to change: hardship as mistreatment, Journal of Organizational Change Management, 35-50. Jex, S. M. (2002) Organisational Psychology: A Scientist-Practitioner Approach London: John Wiley & Sons. Kreitner, R. (2008) Principles of Management, London: Cengage Learning, 11th Edition, London: Business & Economics. Lewin, K. (1951) Field Theory in Social Science, New York: Harper and Row. Piderit, S.K. (2000). Rethinking resistance and recognizing ambivalence: a multidimensional view of attitudes toward an organizational change. Academy of Management -794. A, 783. Porter, M. E., Marciano, S., and Warhurst, S. (2007) De Beers: Addressing the New Competitiveness Challenges, Harvard Business School Case 0-706-501. The Times. (2012) The Organisation and Change, Operations Theory, [Online] Available: http://businesscasestudies.co.uk/business-theory/operations/the-organisation-and-change.html#axzz2H6FILJP6 [18 August 2014]. Walonick, D. S. (1993) General Systems Theory, [Online] Available: http://www.statpac.org/walonick/systems-theory.htm [18 August 2014]. Wendell, F. and Bell, C. (1999) Organisation Development, New Jersey; Prentice Hall.

Sunday, September 29, 2019

Integrated library system Essay

Computer technology the major culprit in the beginning to provide help in solving problems it has generated. Research and development is taking place on many front beyond libraries, including the information industries, and this trend is certain to continue. In today’s complex societies, access to information has become central to making division about the daily conduct of public and private life. As a result, contemporary libraries service entails not only the traditional functions of preserving and providing access to vast amount of printed material but also the creation of a more sophisticated information environment, one that make use of the full range of information technologies to serve the informational, educational, cultural, and recreational needs of students. Libraries are most effective when their policies, procedures, collection, personnel, services, and facilities follow the best practice in the field. To achieve quality library service, libraries required professional and support staff coupled with a system that allows automated processing of library services or transactions. For libraries, information retrieve has always been a human problem. As a result of the impact of computers, telecommunications, and new information technologies in the field, library and information studies education program have undergone significant changes. While the library remains the central organizational focus, it needs to improve its system in order to effect change. One of which is the conclusion of information technology. It is for this purpose that the researchers undertake a study automated library system. It is hope that this study will contribute in enhancing the library services of Vito National High School. Making them more efficient and effective in servicing students in particular and in society. HISTORICAL BACKGROUND Vito National High School is within the area of Barangay Vito, Sagay City, Negros Occidental. It is located 15 kilometers east of Sagay City along its coastal boundary. It started as Barangay High School in 1967 by virtue of the Republic Act no. 6054, â€Å"an act to Institute Charter for Barrio High Schools† which was approved on August 4,1969. It was supervised by an Elementary School Principal, Mr. Angel Ventor in 1967 with only two teachers in a one Section first year class squatting in the elementary classroom and also they are sharing the library with the Elementary School. Only a few books was there inside the library. As Mr. Ventor retires, he was succeeded by Mr. Antonio Cawit in 1973 to 1976 who built the first Vito National High School Library with only 535 books inside it. From 1976-1985, the school was headed by the very dynamic and ever loyal to his job as principal, Mr. Serafin Ignalaga. After his leadership, he was succeeded by Mr. Rodrigo D. Sanchez in 1986, then Mrs. Felicidad Magbanua in 1987 . With the issuance of Republic Act 6655, otherwise known as the â€Å"Free Secondary Education Act†, the school was converted into a Nationalized High School on June 10,1988, with Mrs. Aida P. Perfido, the pioneer teacher as teacher- in- charge (1988-1995), but she was promoted as principal of Col. Griffin Memorial National High School, Minapasok, Calatrava. With that, Mrs. Gina P. Ferraris took the responsibility as OIC , after a year, Mr. Nicanor A. Alparito became the Head Teacher I of the School (1996-1997). He was then promoted as Education Supervisor I, T. L. E. of the newly established Division of Sagay City. It was June of 1998 when Mrs. Gina P. Ferraris was assigned as Head of the School, and was promoted to Principal I, under the supervision of Mrs. Mildred L. Garay, Schools Division Superintendent, Sagay City Division. During the term of Mrs. Ferraris, she requested more books to the Local and City Government, for the students to have more resources of learning. She got 1,150 total of books from both Local and City Government. It is Mrs. Naneth O. Moraca, took the responsibility as School Librarian. Library hours was from 7:30 AM to 4:30 PM. If the student want to enter in the library, they have to log in two ways. If they will just go there and read their notes they will just log as library users. And if they want borrow books they will also log to the library users and to the borrower’s log book. Borrowing of books policy: the due date of the books of the borrowed books was three days after the borrowing date, if t student can’t return it after the due date they will have a penalty or fine of ten pesos or a pack of floor wax. Maximum of three books, as student can borrow using his or her library card. After ten years of service Mrs. Gina P. Ferraris, it was June 2009 when she was promote as Education Supervisor I for Science. With that, Mrs. Villa Tupaz from Eusebio Lopez Integrated School took placed as Division Principal II. December 10, 2010, Mrs. Villa Tupaz was transferred to Sagay National High School as a replace to Mrs. Bingkas that was promoted also as Educational Supervisor for MAPEH. Mr. Unilo C. Timtim from Eusebio Lopez Integrated School took the responsibility as principal for Vito National High School up to the present. He took much to the library. He gave 5000 pesos budget every school year. He donated his own books during his high school and college years. The library now contains 3,150 total of books. Still Mrs. Naneth O. Moraca was the librarian up to the present. Core Values Excellence, Eco-Awareness, Responsibility Vision A high performing school with competent and dynamic administrator and teachers with strong stakeholders elaborate to produce responsive individuals through a sound learning environment, preserving the gift of nature. Mission  Vito National High School aims to produce graduates who are academically competitive, pro-environment and well-equipped with technical abilities to contribute in the total development of the community. Vito National High School Organizational Structure SCHOOL PRINCIPAL Students High School Faculty Canteen Staff Janitorial Staff Cashier Canteen In charge Treasurer Guidance Councilor STUDENT SERVICES Property Custodian Librarian General Objective The purpose of this study is to have a review of the manual library system of VITO NATIONAL HIGH SCHOOL. Specific Objective 1. To know the current library system used by Vito National High School. 2. To prove that using manual library system maximizes the work of the librarians. To proposed a system that reduces spare time in organizing and storing library files and data. NONESCOST LOCALE VNHS VITO CEMETERY OLDSAGAY HIGH-WAY . VITO BRGY. HALL CROSSING BULANON TO BRGY. VITO BRGY. BONIFACIO CROSSSING VITO SAGAY HIGH-WAY ESCALANTE HIGH-WAY BRGY. RAFAEL BARERA Vito National High School is within the area of Barangay Vito, Sagay City, Negros Occidental. It is located 15 kilometers east of Sagay City along its coastal boundary. Scope and Limitation The scope of the study is on the automated library system for Vito National High School specially in borrowing of books. It does not seek to include other systems or subsystems that the school uses. The aspects that the researchers considered are limited to the specific problem. The study covers by interviewing the librarian, the faculty and staff, and the students of Vito National High School. Review of Related Literature Library Management System is a system program that is used in a library for an easy use of addition of books, burrowers, issue dates, return dates, fine payments. It is done through a database programmed so, it gives a good interface to the operating user and a safe database for the storage of data like books and burrowers. It is very useful software for librarians and it requires a computer for the operation According to Ken Chad of Ken Chad Consulting we are at a major point of change in the wider information economy within which library systems form part of a larger whole. He was writing in a briefing paper about the study in library management systems . This study examined the systems used in higher-education libraries across  the UK and came up with some significant observations and recommendations. It noted that the LMS market in UK higher education is already mature and that four main vendors (ExLibris, Innovative, SirsiDynix and Talis) have almost 90 per cent of the market. This market maturity means, according to the study authors, that the benefits to libraries of changing LMS provider are limited. Library users expect to find everything together says Stephen Abram, vice president for innovation at SirsiDynix, the leading provider of software solutions and associated services for libraries. According to her traditionally, the library management system or integrated library system (ILS) was responsible for running libraries efficiently and effectively. Over the last few years, the role of the ILS has been expanding from meeting library needs to delivering user experience. According to Elisabeth Robson usability is a key requirement for users, says Elisabeth Robson, Product manager for Online Computer Library Center. The catalogue has become a way to pull together disparate resources, including commercial resources and web links. Library management systems also allow circulation, including check in/check out and enable libraries to purchase materials and track where they are. Accessibility remains the key all information use. As people have become familiar with computer a trend to more direct access has placed increased pressured on libraries and other information agencies to proved users friendly retrieval system for their client. Research and development is taking place in many fronts beyond libraries, including the information industries and this trend is certain to continue, effort is concentrated in such as automated system. Including natural language processing, digitized imaging techniques and telecommunication. Artificial intelligence is being used with saurian for more cognitive approaches to data, including automatic query reformulations when there is insufficient response to the initial combination of research terms. Frequently involving cognitive psychologist and linguist in addition and information scientist for librarian’s information retrieval has always been a human problem. Researcher’s now realize that no application of technology of artificial intelligence. Parallel processing or networking can be truly effective without knowledge on how people think, learn and cumulate. (Mary E. Dykstra, school of library information studies, Dalhausie University). Methodology This section present method of research used in the study. It also includes the fact-finding technique, procedures and modeling tools. This aims to describe the nature of situation as it exists at the time of the study and to explore the causes of particular phenomena. MODELING TOOLS A. INTERVIEW: An interview is a face to face conversation between two people (the interviewee and the researcher) where questions are asked by the researcher to obtain the desired information from the interviewee. Interviews are useful to gather information from individuals. Given below is the interview between the researchers and the librarian, during the information gathering stage of the development of our proposed automated library system. B. OBSERVATION: A method of data collection in which the situation of interest is watched and the relevant facts, actions and behaviors are recorded. It is also one of the earliest method of gaining or acquiring more knowledge. In this method the researchers observe closely to the behavior of their subject which undergo an investigation in various natural setting. Is either an activity of a living being, such as a human, consisting of receiving knowledge of the outside world through the senses, or the recording of data using scientific instruments. The term may also refer to any data collected during this activity. An observation can also be the way you look at things or when you look at something. FACT FINDING TECHNIQUES A. Data and Gathering Interview and Documentation. In gathering our information, we send an email to the Principal’s Office of Vito National High School, Barangay Vito, Sagay City, Negros Occidental asking permission if they will allow us to conduct an organizational review about their school specifically in their library. We included in the email our contact number. After we received a message from Vito National High School, we immediately go there. We directly go to the principal’s office to ask permission personally. He ask us to explain what is written in the letter. After we explain him what we want to know, he write a letter of accommodation to the librarian as well as to the teachers. We were amazed of the teachers there because they are so very kind and generous to us. In fact, one of the teachers there told us that she felt nervous. We were flattered because we felt that they really never put themselves higher than us. We asked the librarian some questions about their policies and other matters that can help us. We also asked the students there, at first no one wants to be asked, they were afraid that they might not answer our questions. So, we explain to them that all questions are easy. We have get the information we need to know. Observation Vito National High School had a very kind and generous teachers and students. They are so very open to us. They give the information’s we want to know. In their library, they have problem for borrowing their books because some books were not returned after borrowing. That is why in the next school year they need to buy new books in replace to the books that had not returned. The teachers there is so very kind and so very hospitable. Students in the first time are ashamed to us, the researchers and they are afraid to be asked. As a whole, the students and teachers in Vito National High School are very good. And about the principal, Mr. Unilo C. Timtim is, our first impression to him is, we thought that he is very strict and he is not approachable but our expectation is reversed to his real attitude, in fact he is very approachable and he also share some of his knowledge to us. Researcher’s interview with Librarian Researchers: Hi, we have come to talk to you regarding the functioning of your library. Librarian: Hello, do come in. I was expecting you. Researchers:oh! Really? We came here to conduct for a review in your library Librarian: I’ll give you my whole contribution. Researchers: Tell me are you excited about the idea of having an automated system for your library? Librarian: Yes, I do. Very much. After all it’s gonna reduce our loads of work. Researchers: Will you elaborate on it? Librarian: Major problem is managing the cards of members. There are so many of them. Many times cards get lost. Then we have to issue a duplicate card for it. But there is a flaw in it. It is difficult to find out if it is genuinely the case. Member can lie about it so that he/she gets an extra card. And we can’t do anything about it. Researchers: What do you think be ideal solution to this? Librarian: There should be no cards at all. All the information should be put into computer. So in this way, we plan to get huge revenues after we have an automated system. Researchers: How many books are there? Librarian: About 3,150 books Researchers: Do you keep records for them? Librarian: Yes. Researchers: Do you want facility of booking a particular title in advance? Librarian: No we don’t want any such facility. It is an overhead. So we don’t have any such facility presently. Researchers: How do you categorize your books? Librarian : By dewey decimal system. Researchers: Would you prefer online registration for users rather than the printed form? Librarian: Yes , we really would. Sometimes we lose these forms then we don’t have any information about that particular member. It will be better to have it on computer. Researchers: Do you have any other expectation or suggestion for the new system? Librarian: It should be able to produce reports faster. Researchers: Reports? I completely forgot about them. What reports you people produce presently? Librarian: Well first is for books in the library, another for members listing, one for our current supplier of books, and reports for finance. Researchers: Do you have some format for them? Librarian: Yes we do have and we want that the same format be used by the new system. Researchers: Yes we’ll take care of that. Any other suggestions? Librarian: No. You have already covered all the fields. Researchers: Thanks for your co-operation. It was nice talking to you. Librarian: My pleasure. Bye. SIGNED BY: SIGNATURE OVER PRINTED NAME We, the researchers took interviews of few students in the library in order to know about their viewpoint about the new system. One of such interview is given below. Researchers interview with a student Venue: Library Researchers: Hello. If you are free, I need to ask you few questions. Student: Sure. I pleasure. Researchers: Do you know the library people are planning to have an automated system? Student: Yes , I do, our librarian already told us about it. And I’m feeling good about it. Analyst: Are you ready to pay more if there is a automated system? Student: In the overall functioning is going to improve then I think no one will object to paying more. It should help us finding the books easily. But by what amount, it should matter. Researchers: Well as far as I know they are planning to hike library fee from 100 to 200 for full year. Student: That would be too much. Then in that case, they should increase the number of books to be issued. Also the number of days a book can be kept by student should also be increased. Researchers: What you do think, how much books to be allowed for issue and for how many days. Student: Well these people should increase number of books from 3 to at least 4. And the number of days for which a book is kept should be increased by 4 days. Presently it is for 3 days. It should be 5 days. Only then the fee hike will be justified. Researchers: Yes, they have such plans. Student: Then it should not bother members. Researchers Are you keen on online registration of students instead of normal paper one? Student: Yes. It’ll be a good practice. Researchers: Should there be a facility to reserve a book in advance? Student: Presently they have many copies of a single title. Usually a book is always available. I never have felt the need to reserve a book in advance. Researchers: On what basis a book should be categorized? Student: Well, it should be on the basis of dewey decimal system. Researchers: What do you think on what basis a search for a particular book can be done? Student: It can be searched using subject or title. Researchers: How often you visit this library? Student: Daily Researchers: Do you think magazines and cassettes should be made available in the library? Student: I think it’s a good idea. Researchers: Do you like this library? Students: Yes, very much. That’s why I come here daily. Researchers: oh! That’s nice. Well, continue doing . Thank you for your time,. Students: Thank You.. SIGNED BY: SIGNATURE OVER PRINTED NAME Questionnaires Since the time was less it was not practical to interview every student. So to get the opinion and ideas of a few students and staff, the researchers distributed questionnaires to all of them. 1. How is the borrowing of books done [ ] Manual [ ] Automated? 2. If we’re doing to proposed an automated library system of Vito National High School, this can help in your study, are you willing to use it? [ ] Yes [ ] No 3. If ever there will be a proposed automated library system. Do you think it is economically feasible to Vito National High School? [ ] Yes [ ] No 4. Is the manual library system convenient to use? [ ] Yes [ ] No 5. Is there system provided timely responses to the student complaints? [ ] Yes [ ] No 6. Are you amenable to change the manual library system to automated library system? [ ] Yes. [ ] No 7. Do you think automated library system is effective? [ ] Yes [ ] No 8. Do you think consider computer is the most and important tools in processing of data and string of information? [ ] Yes [ ] No 9. Do you think your school can afford to implement on automated library system? [ ] Yes [ ] No 10. Do you think automated library system are useful to the a. Teacher[ ] Yes [ ] No b. Students [ ] Yes [ ] No c. Faculty and staff [ ] Yes [ ] No d. Vito National High School [ ] Yes [ ] No 11. Do you think manual library system is effective in terms of: a. Procedure [ ] Yes [ ] No b. Manpower [ ] Yes [ ] No 12. Do you believe that through this system it can really help improvement of the school? [ ] Yes [ ] No SIGNED BY: SIGNATURE OVER PRINTED NAME Library Policies General Rules 1. Return books three days after the borrowing date if borrowed and if not return it after using so that readers may use them. 2. Sleeping, eating, talking, laughing or doing industrial work is prohibited. 3. Observe proper behavior in the library at all times. Talk softly so as not to disturb other students who are studying. 4. Take every possible care of each book, magazine and other library materials while they are in your possession. 5. Honesty should be practiced at all times. A student caught stealing books, tearing out a page or pages of a book or other library properties will lose his library privileges. He will have to abide by whatever sanctions the librarian and the Discipline Officer will impose upon him. 6. Keep the library clean. 7. Push the chair back against the table after using without dragging them. Identification Card 1. All students must log on to the log book and live their library card. 2. A lost library card is replaced as soon as the student has applied for replacement. A fine of P20. 00 is imposed. 3. Library cards are non-transferable. Any student who lends his/her library card or borrows somebody’s card is subject to suspension of library privileges in which case both will be answerable for this violation. * Circulation of Library Materials * High School students from first year to fourth year are allowed to check out books from the library. * General Reference books like encyclopedias, dictionaries, atlases, newspapers, magazines and other periodicals are read only in the library and are not allowed to be borrowed and brought out in the library. * Maps, Charts and other visual aid materials can be borrowed by the teachers for classroom use only. * Home reading or fiction books can be borrowed for three days from the borrowing date and can be renewed for three days also. * Students are allowed to borrow three (3) books at a time. * Books borrowed on Friday should be returned on the following Monday. * Fines and Penalties A daily fine of P10. 00 or a pack of floorwax is imposed on every book kept overdue. (Saturdays, Sundays and holidays are not included) * Lost Books 1. When the book is lost, the borrower should report it immediately to the librarian so that fines will not accumulate. Students who have overdue books cannot check out book(s) until they clear their records. Otherwise, a student should replace the same book with the same title. 2. A book damaged beyond repair must be replaced with the latest edition of the same title and author. 3. Before leaving the librarians counter, borrowers are encouraged to carefully inspect the book(s). They are to report to the librarian immediately any damage that they discover. The last borrower will be held responsible for any damage to the books. * Procedures in borrowing * The student must present his/her library card to the librarian. * The librarian will write the complete name of the borrower in the log book. * A due date will be stamped at the log book. Republic of the Philippines Northern Negros State College of Science and Technology College of Information and Technology Old Sagay, Sagay City, Negros Occidental October 12, 2011 MR. UNILO C. TIMTIM Principal, Vito National High School Brgy. Vito, Sagay City Madam: Greetings in Christ name! As part of our requirement on System Analysis and Design, we the Junior Information Technology students of NONESCOST are going to conduct research study on system and procedures of government and private agencies as well as business establishments. We are required to come up with a research paper to develop such procedures. In this connection, kindly allow us to conduct an interview for a â€Å"Proposed Automated Library System†. Please extend all other assistance we may need. We promised to keep all data confidential. Hoping for your favorable response. Respectfully yours, Members: MA. FE S. DELA REALJO-ANN M. PABALATE JUDITH PEARL T. MINANOWENALYN M. ALISAN Noted by: SAMSON M. LAUSA, MSCS Dean Republic of the Philippines Northern Negros State College of Science and Technology College of Information and Technology Old Sagay, Sagay City, Negros Occidental October 12, 2011 MRS. NANETH O. MORACA Librarian, Vito National High School Brgy. Vito, Sagay City Madam: Greetings in Christ name! As part of our requirement on System Analysis and Design, we the Junior Information Technology students of NONESCOST are going to conduct research study on system and procedures of government and private agencies as well as business establishments. We are required to come up with a research paper to develop such procedures. In this connection, kindly allow us to conduct an interview for a â€Å"Proposed Automated Library System†. Please extend all other assistance we may need. We promised to keep all data confidential. Hoping for your favorable response. Respectfully yours, Members: MA. FE S. DELA REALJO-ANN M. PABALATE JUDITH PEARL T. MINANOWENALYN M. ALISAN Noted by: SAMSON M. LAUSA, MSCS Dean FINDINGS AND CONCLUSION In general, performing a study and to conduct an organizational review is not easy but through the unity of our group and to the cooperation of the principal, faculty and staff, and students of Vito National High School we have able to finish our review. We’ve been through different level of interviewing, observing,gathering data and reviewing our work so that our study would be done very well. This review helps the librarian to lessen their works in borrowing books faster and easier, as well as to the students  to have an easy way of borrowing books from the library. Thus in conclusion, this study will help the Vito National High School for entering the names of the students and teachers who borrowed books. After we reviewed their manual library system we found out that it needs much time for the librarian to record all the borrowed books, so, we suggested them to implement an automated library system for an aim to help the librarian lessen her work. The system is easy to use and easy to developed but we recommend that every assigned librarian or librarian assistant must know how to properly use the new developed automated library system. Bibliography Atkinson Ross â€Å"the acquisition librarian as a change agent in the transition to the E-library† no. 36 (1992). Foskett, A. C. the subject approach to information 4th Ed, (C. Bingley 1982) Rowley, Jennifer E. organizing knowledge, an introduction to information retrieval (Gower 1987) â€Å"Practical guide to thesis and desertion writing† by Maximiao M. Rivera, Jr. and Roela Victoria Rivera (Katha publishing, Inc. Quezon, Boulevard Quezon City, Phil. 1996) http://www. nordis. net/? p=7410 http://www. deakin. edu. au/library/findout/research/litrev. php.

Saturday, September 28, 2019

Behaviour Management

This policy is supplemented by KIDS physical constraints and restraint policy and procedures. 2. General Positive behaviour management Policy 2. Philosophy KIDS believes that children flourish best when their personal, social and emotional needs are met and where there are clear developmentally appropriate expectation for their behaviour. KIDs aims to promote positive behaviour throughout its settings and to help the children understand and respect the needs and rights of others. 2. 2 Aims and guidelines These guidelines concern both the physical and emotional care of the child(ren) looked after. 1. All children have certain physical and emotional needs. The most obvious ones are warmth, comfort, adequate food and sleeping arrangements, cleanliness, exercise and rest as necessary. Some children with a disability may have additional physical needs, such as extra warmth, physical supports and equipment, special exercises or physiotherapy and medical requirements. 2. The emotional needs of all children include security, affection, consistent responses from those around them, a recognisable routine (e. g. at bedtime and mealtimes), exceptions which are appropriate for their stage of development, and opportunities for playing and having fun and approval. 3. We expect our staff to be aware of these physical and emotional needs and, with the help of parents and KIDS staff to meet them for every child s/he cares for. . All children need to have limits set when their behaviour is not acceptable. If children feel secure and understood, the incidents of disruptive behaviour are greatly reduced. Children rarely demonstrate inappropriate behaviour without good reason. It is the task of the worker to try and understand why a child is behaving in a particular way. 2. 3 Appro priate use of sanctions Any sanction used must be related to the child’s age and level of understanding, realistic and sensitive; enforceable, and applied consistently. It is preferable, if possible, that there is continuity in the setting of limits and how behaviour is managed between all those involved in the care of a child. 3. Positive behaviour management procedures †¢ Reasonable steps must be taken at all times to ensure a healthy and safe environment. Staff provide a role model for children, and the development of consistent attitudes to safety and good practice by staff should have a beneficial effect upon the children. †¢ Basic playground rules – drawn up in consultation with the children -help ensure the service operates smoothly. There should be a friendly, welcoming atmosphere that promotes respect between all children and Playworkers. †¢ There should be a wide range of culturally appropriate activities and images available to all the children. †¢ The team must be consistent in the methods they use, back each other up and support each other. Experiences should be shared and discussed at team meetings. †¢ S taff should challenge discriminatory comments (see KIDs anti bullying policy) and take positive action to overcome unacceptable behaviour. Strategies for dealing with this should be discussed with staff and, where appropriate, parents/carers. Staff should talk to children about their behaviour and consequences of negative behaviour. 4. Dealing with conflict 4. 1 Dealing with conflict: principles All playgrounds aim to develop a safe environment in which children are encouraged to express themselves freely, and which fosters the social and emotional development of the children who come to the site. Conflicts do arise at times, and incidents need to be handled sensitively and consistently. Conflicts can occur for various resons, including frustration, disruptive/uncooperative behaviour, lack of space, competition over equipment, bullying and teasing, and misunderstandings When conflicts do arise it is essential that: †¢ Actions are taken to calm the children down, and to allow them to express how they are feeling in a way that is safe to other children. †¢ A positive, calm approach is maintained, both physically and verbally. †¢ Negative behaviour is not rewarded. †¢ The response to a situation should take account of the child’s level of understanding/ability. Blame is not attributed to individuals in situations involving more than one child. The focus should always be on dealing with unacceptable behaviour, the children should never feel it is they who are unacceptable. 4. 2 Effective and appropriate sanctions The principles of effective sanctions are generally that they should: Be as informal as possible, and not escalate. Be as balanced by rewards Be as near in time as possible to the offence, be relevant and understood, and be seen to be just. Follow from clear rules and explanations from the worker as to what is expected of the child. The following are examples of what sanctions may be used: Reasonable defence of oneself from, or restraint of, a child who is lashing out. â€Å"Holding† firmly, but carefully, can be helpful to a younger child. If in the situation of any of these are likely to lead to injury, it is sensible not to use them, and to know what or may not be safe in relation to the child’s disability. Shouting or clapping your hands, for example, as a distraction to a toddler in a dangerous situation. Withdrawal of sweets or special food/ drink treats, or TV, for a limited period – the younger the child, the shorter the length of time this should continue. Sending a child to another room for a short period (but checking on them regularly whilst they are alone is sensible and shows you are still caring). Imposing closer supervision – keeping the child with you. Keep balancing the sanctions with rewards (especially praise) for good behaviour, so that the negative cycle does not take over. Keep a record of problems and sanctions so that you can refer to it to keep an account of the child’s progress and also for reasons of accountability is a complaint is made. It is sometimes necessary to physically retrain a child who is about to harm him/herself, others or property. For conditions and procedures applicable to physical restraint, please refer to KIDS Physical contact and restraint policy. All uses of physical restraint must be recorded. 4. 3 Examples of unacceptable sanctions The list below is intended as general guidance of sanctions that are unacceptable and is not inclusive. The omission of any particular practice does not imply that is it acceptable. Staff will have the opportunity to raise issues arising from their work, for discussion and clarification within supervision. Use corporal punishment e. g. lapping, hitting a child with an implement (for example, a belt or slipper), throwing a missile, shaking, rough handling, squeezing, pushing and punching/ Impose a punishment which ridicules a child e. g. clothes which draw attention to them inappropriately, clothes which are too small or too large, pyjamas during the day, humiliating a child deliberately in front of others. Deny a child food or drink, or the normal ranges/he expects. Coerce a child to eat what you know s/he does not like and is not normally expected to eat. Deliberately frighten, intimidate, threaten or belittle a child, or lock her/ him in e. . a cupboard, bedroom, or send them to bed unreasonably early. Restrict or withhold medication, which could be dangerous. Deprive a child of sleep. Involve the child in any physical contact, which is inappropriate in view of their history, which s/he might see as threatening or uncomfortable, or which exposes the worker or child to the arousal of sexual feelings. Review This policy will be reviewed annually and if necessary adjusted to: – incorporate any changes to legislation; – include any improvements that may have been identified. Most recent review: May 2008 Behaviour Management This policy is supplemented by KIDS physical constraints and restraint policy and procedures. 2. General Positive behaviour management Policy 2. Philosophy KIDS believes that children flourish best when their personal, social and emotional needs are met and where there are clear developmentally appropriate expectation for their behaviour. KIDs aims to promote positive behaviour throughout its settings and to help the children understand and respect the needs and rights of others. 2. 2 Aims and guidelines These guidelines concern both the physical and emotional care of the child(ren) looked after. 1. All children have certain physical and emotional needs. The most obvious ones are warmth, comfort, adequate food and sleeping arrangements, cleanliness, exercise and rest as necessary. Some children with a disability may have additional physical needs, such as extra warmth, physical supports and equipment, special exercises or physiotherapy and medical requirements. 2. The emotional needs of all children include security, affection, consistent responses from those around them, a recognisable routine (e. g. at bedtime and mealtimes), exceptions which are appropriate for their stage of development, and opportunities for playing and having fun and approval. 3. We expect our staff to be aware of these physical and emotional needs and, with the help of parents and KIDS staff to meet them for every child s/he cares for. . All children need to have limits set when their behaviour is not acceptable. If children feel secure and understood, the incidents of disruptive behaviour are greatly reduced. Children rarely demonstrate inappropriate behaviour without good reason. It is the task of the worker to try and understand why a child is behaving in a particular way. 2. 3 Appro priate use of sanctions Any sanction used must be related to the child’s age and level of understanding, realistic and sensitive; enforceable, and applied consistently. It is preferable, if possible, that there is continuity in the setting of limits and how behaviour is managed between all those involved in the care of a child. 3. Positive behaviour management procedures †¢ Reasonable steps must be taken at all times to ensure a healthy and safe environment. Staff provide a role model for children, and the development of consistent attitudes to safety and good practice by staff should have a beneficial effect upon the children. †¢ Basic playground rules – drawn up in consultation with the children -help ensure the service operates smoothly. There should be a friendly, welcoming atmosphere that promotes respect between all children and Playworkers. †¢ There should be a wide range of culturally appropriate activities and images available to all the children. †¢ The team must be consistent in the methods they use, back each other up and support each other. Experiences should be shared and discussed at team meetings. †¢ S taff should challenge discriminatory comments (see KIDs anti bullying policy) and take positive action to overcome unacceptable behaviour. Strategies for dealing with this should be discussed with staff and, where appropriate, parents/carers. Staff should talk to children about their behaviour and consequences of negative behaviour. 4. Dealing with conflict 4. 1 Dealing with conflict: principles All playgrounds aim to develop a safe environment in which children are encouraged to express themselves freely, and which fosters the social and emotional development of the children who come to the site. Conflicts do arise at times, and incidents need to be handled sensitively and consistently. Conflicts can occur for various resons, including frustration, disruptive/uncooperative behaviour, lack of space, competition over equipment, bullying and teasing, and misunderstandings When conflicts do arise it is essential that: †¢ Actions are taken to calm the children down, and to allow them to express how they are feeling in a way that is safe to other children. †¢ A positive, calm approach is maintained, both physically and verbally. †¢ Negative behaviour is not rewarded. †¢ The response to a situation should take account of the child’s level of understanding/ability. Blame is not attributed to individuals in situations involving more than one child. The focus should always be on dealing with unacceptable behaviour, the children should never feel it is they who are unacceptable. 4. 2 Effective and appropriate sanctions The principles of effective sanctions are generally that they should: Be as informal as possible, and not escalate. Be as balanced by rewards Be as near in time as possible to the offence, be relevant and understood, and be seen to be just. Follow from clear rules and explanations from the worker as to what is expected of the child. The following are examples of what sanctions may be used: Reasonable defence of oneself from, or restraint of, a child who is lashing out. â€Å"Holding† firmly, but carefully, can be helpful to a younger child. If in the situation of any of these are likely to lead to injury, it is sensible not to use them, and to know what or may not be safe in relation to the child’s disability. Shouting or clapping your hands, for example, as a distraction to a toddler in a dangerous situation. Withdrawal of sweets or special food/ drink treats, or TV, for a limited period – the younger the child, the shorter the length of time this should continue. Sending a child to another room for a short period (but checking on them regularly whilst they are alone is sensible and shows you are still caring). Imposing closer supervision – keeping the child with you. Keep balancing the sanctions with rewards (especially praise) for good behaviour, so that the negative cycle does not take over. Keep a record of problems and sanctions so that you can refer to it to keep an account of the child’s progress and also for reasons of accountability is a complaint is made. It is sometimes necessary to physically retrain a child who is about to harm him/herself, others or property. For conditions and procedures applicable to physical restraint, please refer to KIDS Physical contact and restraint policy. All uses of physical restraint must be recorded. 4. 3 Examples of unacceptable sanctions The list below is intended as general guidance of sanctions that are unacceptable and is not inclusive. The omission of any particular practice does not imply that is it acceptable. Staff will have the opportunity to raise issues arising from their work, for discussion and clarification within supervision. Use corporal punishment e. g. lapping, hitting a child with an implement (for example, a belt or slipper), throwing a missile, shaking, rough handling, squeezing, pushing and punching/ Impose a punishment which ridicules a child e. g. clothes which draw attention to them inappropriately, clothes which are too small or too large, pyjamas during the day, humiliating a child deliberately in front of others. Deny a child food or drink, or the normal ranges/he expects. Coerce a child to eat what you know s/he does not like and is not normally expected to eat. Deliberately frighten, intimidate, threaten or belittle a child, or lock her/ him in e. . a cupboard, bedroom, or send them to bed unreasonably early. Restrict or withhold medication, which could be dangerous. Deprive a child of sleep. Involve the child in any physical contact, which is inappropriate in view of their history, which s/he might see as threatening or uncomfortable, or which exposes the worker or child to the arousal of sexual feelings. Review This policy will be reviewed annually and if necessary adjusted to: – incorporate any changes to legislation; – include any improvements that may have been identified. Most recent review: May 2008

Friday, September 27, 2019

Information Security Research Paper Example | Topics and Well Written Essays - 1250 words

Information Security - Research Paper Example The progress in the field of information technology has been favorable because it has brought various benefits for the users all around the world. However, along with many significant benefits, the advancement in information technology has also created various issues related to the security of computer networks. These network-related issues need to be tackled properly in order to make the internet world safe and secure. Literature Review regarding Current State of Network Security Kaminsky (2010) asserts, â€Å"Network security comprises the measures a company takes to protect its computer system†. It is evident from the above statement that network security deals with the protection of information stored in the computer systems. There are various issues associated with the current state of the network security. Douligeris and Serpanos (2007, p.94) show their concern about network security by saying that current mechanisms of network security do not handle the threat of worm a ttacks properly. Leynes (2010) states, â€Å"Worm is a malicious code or software that spreads from one computer to another using the network highway†. ... Maiwald (2004) state that current state of network security cannot be called purely safe from all sorts of threats. Although virus and worm attacks have decreased considerably, yet the companies need to address information theft issue, which is the top network security concern these days (Batten, 2008, p.24). Network administrators also hold the responsibility to create new mechanisms for the security of networks. McFarlane (2010) asserts, â€Å"There is no doubt that network administrators are today dealing with much more sophisticated network and computer security threats than they did a few years ago†. Network administrators still need to do more in the field of network security. Laet and Schauwers (2005, p.3) state, â€Å"Currently, network administrators often spend more effort protecting their networks than they spend on the actual setup†. Reaves (2010) in an article states, â€Å"Steps need to be taken to ensure that user access to the network cannot compromise the entire network†. Lynn (2009) asserts, â€Å"In today's threat landscape, the most secure network infrastructures implement not a single network security technology, but a multilayered comprehensive security strategy†. Fundamental Issues and Concerns for Network Security There exist many fundamental issues related to network security, which are of significant importance for the successful advancement in the field of network security. Some of the core fundamental issues include authentication, access types, and authorization. Let us discuss these issues in some detail. Authentication Authentication of the user logging onto a network is one of the fundamental issues related to network security. Biometrics and passwords are generally used to

Thursday, September 26, 2019

The Lack of benefits available to soldiers returning from the Middle Term Paper

The Lack of benefits available to soldiers returning from the Middle East with mental and physically disorders - Term Paper Example It has been projected by some that close to fifty percent of current Middle East conflict veterans will seek medical treatment from the Veterans Administration. More than sixty percent of these injured veterans will seek short-term treatment, defined as medical care that lasts less than five years, but the other approximately forty percent of them will remain in the Veteran's Administration health care system for the rest of their lives (Patsner, n.p.). Unfortunately for these brave men and women, the resources available to treat injured and disabled veterans are currently severely lacking in quality. There are many reasons for the current situation. Among them are the sheer number of injured veterans returning from these conflicts and the cost of treating them, the type of injuries that are returning home, the number of veterans already in the system that also require care, the inadequacy of the existing system to handle patient transfers when a veteran moves from one part of the sy stem to another, and the lack of preparedness by primary care physicians outside the Veterans' Administration system to deal with war-related injuries. Many Americans are aware of the extremely high costs of the Middle East conflicts, as these operations have resulted in a continuous presence of American military members in that theater since the September 11, 2001 World Trade Center attack. As of the end of the 2010 fiscal year, the United States federal government had spent seven hundred and fifty-one billion dollars in Iraq and three hundred thirty-six billion dollars in Afghanistan (Belasco, p. 1). However, many people are not aware of the costs incurred after the injured veterans of these conflicts return home. One projection states that the costs of life-long medical care, disability benefits, and social security and pension benefits for veterans of the current Iraq and Afghanistan conflicts could eventually total over seven hundred billion dollars, which is more than the over all cost for the first five years of the conflict (Patsner, n.p.). Additionally, up to forty-five percent of Gulf War veterans may apply for long-term disability benefits. Over eighty-eight percent of those applying will be at least partially eligible to receive some form of disability payments. These disability claims could potentially add another three hundred fifty-five billion dollars to the total cost of health care for injured veterans of the Iraq and Afghanistan conflicts (Patsner, n.p.) The Department of Defense and the Veterans' Administration have been ill-prepared to deal with the flood of injured service members and veterans returning from these conflicts. In 2001, before the current Middle East operations had begun, the number of backlogged Veteran's Administration cases was near one hundred thousand. As of April 2008, the number of unprocessed cases had jumped to over six hundred thousand. This means that not only are the currently returning veterans not being treated efficiently, resources are being re-directed from older veterans and reducing their access to care as well (Kenneth & Burris, 2330-39). This backlog of untreated cases, as well as the complexity of the application process for use of the Veterans' Administration medical resources, can lead to more issues of aggravated injuries for those veterans that are not adequately and quickly treated for their injuries. Due to the lack of screening as veterans separate from active

Is Anthropogenic Global Warming a problem and if so, why is it not Essay

Is Anthropogenic Global Warming a problem and if so, why is it not being solved - Essay Example 47). This paper will discuss the phenomenon of AGW, understand the problems and causes and examine counterviews that do not support these views. The paper will also examine the reasons as to why the problem has not been solved. 2. Understanding 'Anthropogenic Global Warming' Temperatures of the earth’s surface can change due to a number of natural reasons and these include increased volcanic activity, increased solar storms and radiation from the sun. However, these natural phenomenons are sporadic and they appear quickly, last for some time and then disappear. Nature and the environment then get an opportunity to stabilise and heal itself (Houghton, 2005, p. 45). However, since the industrial age when man started increasing his use of fossil fuels and also started using petroleum products, natural gas and thermal power plants, the impact on the environment has been severe. The use of these fossil fuels is almost non-stop and continues unabated through the year. Massive amount s of pollutants and greenhouse effect gases - GHG are released (Ruddiman, 2005, p. 76). These GHS are made of carbon dioxide, methane, nitrous oxide, sulphur and other such gases. They spread in the atmosphere and re-radiate the suns rays from the atmosphere causing greenhouse effect that reheat the atmosphere and raise the temperatures. Natural carbon traps such as forests that absorb CO2 have been reduced in density. This means that less carbon is absorbed by the environment and temperatures continue to rise. Rapid urbanisation with an increase in the ‘concrete jungle’ means more heat is reflected into the atmosphere. The main reason for the increase in carbon emission as seen is due to human activity and this has given rise to the term ‘'Anthropogenic Global Warming’ (Emanuel, 2005, p. 89). 2.1. Proof and evidence Many respected and reputed organisations such as the United Nations have published data on global warming (UNFCC, 2012; Pachauri, 2007; IPCC, 2007). The year 1800 is taken as the base year when meaningful industrial activity started. The CO2 amount release in 1800 AD is taken as zero and by 2000; this figure had increased to 9 billion metric tons of CO2 equivalent per year. Similarly, the average temperatures of the atmosphere were considered as -0.4 degree centigrade in 1800. By 2000, the average temperature has increased by +0.6 degree centigrade and this is an overall increase of 1.2 degree centigrade. Worse is in store since UNO experts believe that if the present industrial activity and lifestyle continues without restraint, then the temperature build-up would be much quicker and exponential. By 2060, the average temperature rise over 1800 values would be 4 degree centigrade. At this stage, polar ice will have melted, many coastal cities and vast hinterlands would be underwater and there would probably be another ice age (Anderson, 2011). This is not some kind of fear mongering but simulations arrived at by powerful computers that have analysed weather patterns and temperature changes (Tirpak, 2005). 2.2. Counterviews of AGW Global warming and drastic climate change has unfortunately been dragged into political and corporate wars. Peden (2009) argues that AGW is nothing but a hoax started by businesspersons who want to cash in on the business opportunities that global warming provide. Chameides (2011) commenting on a news report from Fox News says that global warming is a natural phenomenon and it has been going on since earth was formed. Temperatures rise led

Wednesday, September 25, 2019

Funding Essay Example | Topics and Well Written Essays - 250 words

Funding - Essay Example lated to different medical conditions including funds for research on patients who require assistance of ventilation that is mechanical in nature, they even funds research that are carried out to help and improve the health and wellbeing of women who are experiencing aging as well as breast cancer, they are offering funds for research regarding deadly diseases such as AIDs, they even fund researches that are related to disease prevention methods that are community based and they even provide funds for research that are related to health and wellbeing of officials of the field of nursing and medicine (Loeb 199). In order to obtain funds and grants from NINR, the project leader for the research should be at least qualified at the doctoral level and these researchers should have at least completed one research in the field or in the disease that they are opting to conduct a larger and expanded research. In order to obtain funds for a particular research the leader has to submit a propos al and then the proposal is reviewed by the panel for acceptance or rejection. Loeb, Susan J., Janice Penrod, Ann Kolanowski, Judith E. Hupcey, Kim Kopenhaver Haidet, Donna M. Fick, Dee Mcgonigle, and Fang Yu. "Creating Cross-Disciplinary Research Alliances to Advance Nursing Science." Journal of Nursing Scholarship 40.2 (2008): 195-201.

Tuesday, September 24, 2019

Packaging Essay Example | Topics and Well Written Essays - 500 words

Packaging - Essay Example It has been recognized that this particular activity i.e. Community Engagement Activity is very much effective for performing various works related to community due to its feature of interactive procedure and it is less costly to operate various significant functions (Gottlieb, 2006). The paper broadly aims towards highlighting the activities conducted for a community engagement activity in relation to packaging for a bottled water organization i.e. New York Springs which is a United States based organization, execution of several actions along with the description of the feelings while performing the activity has been depicted. Moreover, the paper also includes strong concern towards various environmental issues and concerns and the broader necessity to perform these sorts of activities in future. The Community Engagement Activity in relation to packaging is mainly undertaken with a bottled water organization i.e. New York Springs which is a business organization based in the US. While performing this particular activity, certain aspects were considered largely that generally relate to several environmental issues along with significant effects upon social responsibility. The vital aspects about which greater awareness was intended to be created include recycling, reducing and reusing components in relation to packaging. These important facets were emphasized largely while executing the Community Engagement Activity. In this connection, the initial activity was performed to minimize the wastes that are generally produced while making the products of the bottled water organizations such as New York Springs. Apart from minimizing the wastes, the activity also comprised recycling or reusing the wastes that would eventually diminish the environmental issues along with posing adverse effects in the community by a considerable level. The main problem regarding the idea of packaging is that

Monday, September 23, 2019

Stainless steel powder metrology Thesis Example | Topics and Well Written Essays - 2000 words

Stainless steel powder metrology - Thesis Example PROCEDURE The mixtures underwent a complete procedure to obtain the results and compare them according to different standards. The procedure of the experiment is explained in detail in this part of the report. Preparation of the Mixture The powder mixture, each specimen separately, is weighed and the weight recorded. The process is initiated after the weighing. The powder is properly mixed using tubes and revolving machine. In these experiments, two different mixtures, ferrous 316L with 1 gram silicon and the same mixture with the addition of 1gm boron is used. The mixtures were then sintered and quenched under different temperature conditions. The sintering has to be discussed briefly to be understood. Sintering and Quenching The specimens prepared are pressurized at 700 MPa and made into round discs as shown in the picture below. . The specimen is heated inside a closed container, to different temperature. As recorded before, there are in total 13 specimens which are used in the ex periment. Each specimen is labeled properly before any kind of experiment us conducted on it. The two mixtures samples of â€Å"A† and â€Å"B† are heated at 1220, 1230, 1235, 1240, 1280, and 1295o C respectively. Each sample was then sectioned, mounted and polished for microscopical examination. These methods are explained in detail in the following part of the report. Sectioning It is essential for maximizing the working parameters since incorrect cutting can waste small samples, which are very difficult to make. The sample with deformation should be given maximum support to un-clamp them (German, 1990). Mounting The samples are too little in size to handle the different steps of the procedure. It is essential for maximizing the working parameters. Therefore a uniform and rounded surface is given to the specimen so that the damage is prevented during grinding and polishing procedures (German, 1990). Grinding The samples are grounded to reach finer surfaces. Grinding is done under stream of water to remove any free particles that are being cut out of the sample and to minimize the eroding effect on the sample and to save its surface from rash cuts. The specimen is then dried out as there was water on it (German, 1990). Polishing It is also a very important part of the experiment. Since for the photography the best surface is required. It is done by rotating a cloth over the surface with the help of a polishing machine. A polishing liquid is also used (German, 1990). Etching The samples need to be etched as the last part of the procedure. But before etching is done, the surface has to be cleaned and free of any impurity. The samples have to be etched with a proper liquid to prevent damage. During the process, the sample is removed from the sample when the first blooms of grains are observed. After etching, the samples are washed ruinously with washing material, either water or alcohol. Warm air is then passed over it. If the material is of soft n ature, it must be covered so the surface can be saved (German, 1990). Microscopic examination This is a very important process since the examination with naked eye would not reveal the required results. Special method of illumination is used between the two controlling diaphragms to enlighten the eye piece where the results can be seen and photographed (German, 1990). Recording before the Procedure The two

Saturday, September 21, 2019

Accounting for human behavior Essay Example for Free

Accounting for human behavior Essay In order to survive and interact with the other members of the society, it is crucial for us to understand what the other people are thinking about and what the underlying factors that contribute to their behavior are. In our daily life, people are continuously interpreting and explaining others behavior, sometimes even without aware of it themselves. How does this knowledge of interpreting the others come about? And is it a reliable method?Most people are using common sense explanation to interpret human behavior, while social scientists will explain our world by social science theories. What are they? And which one can give a more reliable and accurate account for human behavior?Common Sense Explanations are formed basing on individuals past experiences or were passed down from the last generations. It is the most basic and simple form of knowledge that helps us to survive. For instance, people understand that it will be hurt when a ball is throwing at them and in result, they will run away from it. We use the common sense to perceive the world we are living in. It is unimaginable if a person does not possess any common sense at all. See more: Old Age Problem essay Social Science Theories, like the theories in natural science, are derived from scientific methods. They are either induced or deduced from different task or experiment. But since the subject matter in social sciences is completely different from that of natural science, observation, survey and interview which sometimes involves a control group, are the methodology used to test the experimental hypotheses, instead of using laboratory experiments. Hence, social science theories are backed up by empirical studies and data, and therefore should be more widely applicable, objective and reliability to explain human behavior. Unlike social science theories, common sense is held by everyone. Therefore, people can draw on this knowledge immediately when they want to analysis behavior of the others and giving a faster response to the situation. However, the strength of common sense is also its greatest weakness. In many cases, common sense explanation cannot give us a satisfactory answer because it has oversimplified the circumstance. For instance, it is a general belief that the more violent movies a child watches, the more aggressive he will be. People may neglect other factors,  such as family backgrounds, in contributing to childrens aggressive behavior, which had proved to be an equally crucial by many social scientists. In addition, human behaviors are complex as well as unique to each individual. Different culture, race, living environment and family history will lead to the formation of different behaviors. Similarly, common sense explanation varies in different culture, society and individual, and therefore, actually is not the same to everyone in our society. How can a foreigner understand all the traditional attitudes and values of a Chinese? Likewise, it is not easy for us to comprehend all the behaviors of the foreigners. As a result, there will be bias if we rely on common sense explanation as it is too generalized and oversimplified without really investigating the underlying factors behind the scene. In contrast, social sciences theories can supplement the weakness of common sense explanation as each theory is based on a numbers of hypotheses which in turn will be tested, though the methodology used is somewhat different from that of natural science. In other words, social science theories are more reliable and valid than that of common sense explanations. Moreover, social science theories are more widely applicable as they are derived from a great numbers of data which are collected from different channels and people. Some people may argue that some social sciences theories are similar to our common sense explanations, for which is a coincident that we cannot deny since many hypotheses are formed with the basis of common sense assumptions. People can use common sense to explain or judge most things we encounter in our daily life. However, when we come to analyze more complicated matters, such as human behaviors, common sense explanation alone would be insufficient. In these circumstances, social science theories, which have been undergoing empirical researches and experiments, are more reliable. We cannot ignore the importance of common sense since it is a basic knowledge that people possessed, whereas social science theories may not be  known to most people. And in many cases common sense is the foundation of many hypotheses, and thus is the origin of a theory. But it is crucial to note that when people want to have an in-depth, comparatively reliable and valid explanation, social science theories should be employed. REFERENCE Roth (1990), Introduction to Psychology, United Kingdom: The Open University. Gross (1992), Psychology: The Science of Mind and Behaviour, p.19-23, London: Hodder Stoughton

Friday, September 20, 2019

Heritage Of Christianity In Ethiopia Theology Religion Essay

Heritage Of Christianity In Ethiopia Theology Religion Essay Christianity and Islam have coexisted in Ethiopia since the celebrated first migration in the formative period of Islam fourteen-hundred years ago. Ethiopia has overcome many attempts in the past to overthrow this coexistence, but modern Ethiopia remains a nation which prides itself on a tradition of religious tolerance between its populations of Christian, Muslim and Jewish citizens. This delicate balance however, is facing a threat by interference from outside interests attempting to establish control in the Horn of Africa. These outsiders are using religious non-governmental organizations such as evangelical Christian missionaries and Wahabist Muslim dawahs to influence the population against the traditional ruling Coptic Church. Heritage of Christianity in Ethiopia The Judeo-Christian history of Ethiopia goes back to the time of Israels King Solomon in the tenth century BCE. The Holy Bible (First Kings) records that the Queen of Sheba (modern Ethiopia), visited King Solomon. The Ethiopian epic Kebra Nagast records that she bore a son by Solomon, Menelik, who is said to have brought the Ark of the Covenant to Ethiopia. This was the beginning of the Solomonid Dynasty of Ethiopia. The Ethiopian Coptic Orthodox Tewahedo Church (hereafter referred to as the Coptic Church) claims the Ark still resides in the Chapel of the Tablet in the Church of Our Lady Mary of Zion in the town of Axum, Ethiopia (Raffaele, 2007). Axum is also the name of the first Christian kingdom of Ethiopia, which was the first of any world nation to adopt Christianity as the official state religion. The Coptics relate that Christianity was first brought to Ethiopia by an Ethiopian royal official who was converted by Phillip the Evangelist, one of the first seven deacons of Christianity. In the fourth century, the Pope of the Coptic Church in Alexandria appointed Frumentius as the first Archbishop of Axum and Axum became officially a Christian nation. It should be noted that before this time the Coptic Church based in Alexandria (also known as the Oriental Orthodox) had already split off from what would become the Catholic churches and the Eastern Orthodox churches. This split was due to difference in opinion on the nature of the Christ (Gascoigne, From 2001, ongoing). This difference of opinion continues to alienate the Coptics from the rest of Christianity to this day, as will be seen. Muslim Heritage in Ethiopia In the year 613, the Companions and Family of the Prophet Mohammad (pbuh) were being persecuted by the Qurayshi clan in Mecca. One of the leading Companions was an Ethiopian slave. The Ethiopian king at this time was known to be a just leader and the Prophet was convinced that his followers would be safest in a Christian country where the people followed the scriptures of the Book rather than among the pagan tribes of Arabia. The Prophet ordered his Companions to migrate (hijra) to Ethiopia for their safety. During the six years the Companions stayed in Ethiopia, many Ethiopians converted to the new religion of Islam. In the sixth year of the first hijirat, a nephew of the Prophet, Amir ibn Umayya visited Ethiopia with an invitation to Negus, the king of Ethiopia to accept Islam. Amir was warmly received by Negus, who against the will of the rest of the royal family and the Coptic Church, converted to Islam. The royal family revolted against Negus and when Negus died, the Prophet off ered the first ever in-absentia funeral prayer (Salatul Ghaib) in his honor (Mohammed, 2012). Islam had established itself in Ethiopia, but Ethiopia would remain officially a Christian nation. The Solomonid Dynasty would continue to reign until the Marxist revolution of 1974 and the royal position was that there were no Muslim Ethiopians. The position of the royal family was that Muslim Ethiopians were foreigners living in the country (The First Hijrah Foundation (FHF), 2012). This foreigner label on Muslim Ethiopians is in part strengthened by ethnic and racial divisions within Ethiopia. Racial and Ethnic Federalism Ethiopia is currently divided into ethnically-based autonomous federal regions. For example, the Somali ethnic region is the most populous and takes up roughly the eastern third of the country with its population 97% ethnically Somali. The Somali people are a Cushitic (black African) ethnic group and predominately Muslim (98%). The next most populous region is Oromo. The Oromo are also a Cushitic ethnic group whose population is religiously divided between predominately Muslim in the eastern portion of the region and evangelical protestant (referred to as Penty) Christian in the west. The Amhara ethnic group is Semitic (like the Hebrew and Arabs) and lives in the highland region of Amhara (Population Census Commission, Federal Democratic Republic of Ethiopia, 2008). The royal family of Ethiopia was of Amharic ethnicity and this ethnic group still maintains dominance in the Ethiopian federal government. The Amharic people are predominately Coptic and the Coptic Church in Ethiopia is p rimarily led by Amharics. This historical dominance of the Amharic people over the other ethnicities of the region has been the cause for some of the conflict in the region that to outsiders may appear to be simply religiously based. Past Religious Conflicts With the emergence and rapid growth of Islam in the sixth century, Ethiopia quickly became an isolated Island of Christendom in a Sea of Islam (Gascoigne, From 2001, ongoing). Although geographically isolated, Ethiopia maintained strong ties to the rest of Christendom. The Ethiopian Patriarch has always been appointed by the Oriental Orthodox Pope in Alexandria and monks from the Ethiopian Coptic Church maintain the unique right of being co-custodians of the Church of the Holy Sepulcher in Jerusalem. By the end of the thirteenth century, Ethiopia was the only non-Muslim state in northern Africa. During the fifteenth century, Ethiopian monks from Jerusalem attempted to attend the Council of Florence to discuss the re-unification of the Christian Churches. They were denied entry to the council by both the Catholic and the Eastern Orthodox Churches because of the theological differences which had caused them to split off originally. The presence of the Ethiopian monks at Florence did, however, serve to attract the attention of Rome resulting in a Jesuit mission being sent to Ethiopia. This Jesuit presence would last nearly two hundred years and ultimately result in the Ethiopian king, Susenyos, renouncing the Coptic faith as heresy and adopting the Roman Catholic faith. After the departure of the Jesuits, Susenyos succumbed to pressure and reverted back to the Coptic faith. During the sixteenth century when the Jesuit presence was at its strongest, Ethiopia was also facing jihads from the Muslims. The first jihad was from the Sultan Graà ± (aka Ahmad ibn Ibrahim) who had based his sultanate in Harar. His decision to declare holy war on Ethiopia was due in part to marginalization and discrimination against the Muslims influenced in part by the Jesuit missionaries. Graà ± moved an army of Somalis west and destroyed a great many of the Christian shrines and holy places (Gascoigne, From 2001, ongoing). In the nineteenth and twentieth centuries Ethiopia fought to maintain its independence from the colonial powers of Portugal and Italy. The Ethiopian emperor, Haile Selassie, led in the formation of the League of Nations and the Organization of African Unity. After the second world war, Ethiopia backed by the United States, who was looking for a possible Red Sea port annexed Eritrea. Eritrean opinion was divided on this between Christians who were pro-unification and Muslims who were for Eritrean independence. This led to nearly 40 years of conflict. As part of the larger global cold war, a Marxist element emerged in Eritrea. This Marxist element eventually performed a military coup against the royal family, deposing Emperor Haile Selassie in 1974. A period of instability prevailed until 1991 when the current constitution was affirmed and Eritrea was granted independence in 1993. From 1991 until 2012, Ethiopia was under the control of the Prime Minister Meles Zenawi. Occasional wars continued to break out along Ethiopias borders and the conflicts would spill over into the neighboring countries of Somalia and Sudan. Meles supported, and was supported by, the Coptics and the Amharic population. Although no longer in power by law, the Coptics and the Amharic peoples still hold much influence. Meles support of the Coptics and marginalization of the Muslims and Penties is part of the cause of recent violence in the country (Heinlein, 2012). Recent Events On the second of March, 2011 in Asendabo, a Penty allegedly desecrated the Koran. It was believed by the Ethiopian Government that the Kawarja Muslim sect used this alleged act to incite a riot that resulted in up to 10,000 Christians fleeing the area. Approximately fifty churches and many Christian homes were burned to the ground. This was the largest in a series of Muslim attacks against Christians, especially Penties in Muslim dominated regions. In November of 2010, Christian residents of Besheno found warnings nailed to their doors to convert, leave the city, or be killed. On the twenty-sixth of February, 2011, a Muslim mob attacked seventeed Penty college students with rods and sticks for attempting to distribute Bibles in a Muslim village (Macedo, 2011). Although freedom of religion is guaranteed in the Ethiopian constitution, each autonomous region may interpret that freedom in its own way. In November of 2011, the Ethiopian Government identified the Kawarja sect with Al-Qaeda and expressed concern over a growing force of Wahhabi Muslims promoting violence against moderate Muslims and Christians with the aim of making Ethiopia an Islamic country governed by Sharia law. Wahabist teachings would upset the balance between Christians and Muslims and challenge United States interests in the region as well. The Ethiopian Government responded by backing a competing Muslim sect, Al-Ahbash. Al-Ahbash was founded by an Ethiopian and is very anti-Wahabi/Salafi in its beliefs, going so far as to declare takfir against them (declaring the Wahabi/Salafi as heretics). The Ethiopian Government appointed an Islamic Affairs Supreme Council (IASC) that was Ahbash heavy with no representatives from the Wahabi or Salafi sects. This council seeks to create Ahabash based Islamic schools in Ethiopia so that Ethiopians will not have to go to Arabic countries to learn to become Imams (Fentaw, 20 12). With the death of Prime Minister Meles Zenawi in August of 2012, some Ethiopian Christians and Muslims are hoping for unity in the future. Ethiopian college students of both Christian and Muslim faiths joined together to found the group Concerned Ethiopian Students to work toward peace. When Egypt and Libya saw riots in September of 2012 because of the film Innocence of Muslims produced by Coptic Christians living in the United States, Coptic leaders were quick to denounce the film. On the fifth of November, 2012, the new Pope of the Oriental Orthodox Communion was elected and took his place ruling the Coptic Church in Alexandria. The next day he issued a statement stating that the Coptic Church has no political role, but that he fears Sharia law will threaten the religious freedom and safety of the Christian community (Schiava, 2012). On the seventh of November, 2012, the Ethiopian Government announced the newly elected members of the IASC. The government hopes the IASC can bring pe ace within the Muslim community (VanDerWolf, 2012). Muslims, especially Wahabis, had been protesting the elections for months. The Wahabis had requested the elections be held in mosques instead of public meeting halls. The Wahabi fear is that the elections were influenced by the government which they say is trying to ban the Wahabi sect and promote Ahbash (Heinlein, 2012). More than one hundred Muslims are being held on terrorism charges for the protests (VanDerWolf, 2012). The Way Ahead for United States Interests The United States involvement in the Horn of Africa, particularly Ethiopia sits in the same delicate situation as the Coptic Church. With the United States alliance with the Amharic ruling parties of Ethiopia, any move by the government against Islam or any sect of Islam, such as Wahabi, is seen by the radical Muslims as an act backed by or even directed by the United States and Israel (The First Hijrah Foundation (FHF), 2012). The evangelism of the Penty churches into Muslim and Coptic areas is seen by some as interference from the United States, though through such entities as the Ku Klux Klan (comment to (CBS News, 2012). While this may seem ridiculous, it conveys the fear that is bred in the minds of some Ethiopian Muslims. The Ethiopian Coptics may be facing the greatest struggle in their nearly two-thousand year history. If an Islamist faction gains control of the nation, many will flee the country much as most Christians have fled from Iraq and most recently Egypt. Any move by the United States government or American based organizations to aid the Christians in Ethiopia will only strengthen the resolve of the Islamist sects to eliminate the Christian powerbase. Perhaps they may find peace in true democracy in the post-Zenawi era.

Thursday, September 19, 2019

Macbeth :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  At the beginning Shakespeare presents Macbeth as a sort of hero. He is presented as a great warrior and loyal servant of the king, Duncan. However, as we progress through the play we see another side of Macbeth. This is the side of evil all powered by his unstoppable lust for power and greatness. We see this lust for power become stronger and stronger until he leaves the whole of Scotland in a terrible state.   Ã‚  Ã‚  Ã‚  Ã‚  The play starts with the witches talking about Macbeth and what a great warrior he is. In Shakespeare’s time witches were thought of as evil and the fact that they were talking about Macbeth made the audience make the connection between Macbeth and evil. The witches also give the audience the setting of the play and the story so far. They tell the audience about the battle in which Macbeth is fighting and that they will meet Macbeth on his return.   Ã‚  Ã‚  Ã‚  Ã‚  When the king hears of Macbeth’s heroics in battle he is very pleased and refers to him as â€Å"valiant cousin, worthy gentleman.† The king also presents Macbeth with the title of the Thane of Cawdor. This just adds to Macbeths already great status and shows him to be even more of a hero. This is backed up again by the sergeant who refers to him as â€Å"brave Macbeth† and â€Å"Valour’s minion.† Ross also admires his bravery by referring to him as â€Å"Bellona’s bridegroom.†   Ã‚  Ã‚  Ã‚  Ã‚  The first time we see Macbeth is when he arrives on the heath where the witches are settled. Even before Macbeth appeared for the first time we had quite a clear picture of him. The first words Macbeth speaks, â€Å"So fair and foul a day I ne’er have seen† mirror the first words we hear from the witches. When Macbeth meets the witches they seem to know a lot about him and start implanting the idea of becoming king in his mind. Macbeth is taken aback by the witches and their prophecies which suggests that Macbeth has thought about it before and is frightened that his secret has been uncovered.   Ã‚  Ã‚  Ã‚  Ã‚  When the messengers arrive with the news that Macbeth has earned the title of Thane of Cawdor this acts as a catalyst in his lust for power and quest to become king. The contrast between Macbeth and Banquos attitude towards the prophecies shows how Macbeth has great ambitions and is starting to think about killing the king.

Wednesday, September 18, 2019

The Role of the Nativity in Magi and Carol of the Brown King :: Magi Carol Brown King Essays

The Role of the Nativity in "Magi" and "Carol of the Brown King"  Ã‚  Ã‚   What were the Three Wise Men searching for when they followed the North Star? They were obviously seeking the Christ child, but they were also searching for the truth and righteousness that he represents. Sylvia Plath in her poem "Magi" and Langston Hughes in his poem "Carol of the Brown King" discuss the merit of their respective minority groups through allusions to the nativity. Plath uses the journey to discuss both the ignorance of philosophers' quest for the "truth" and its neglect of females, and Hughes uses the righteousness of the nativity to emphasize the importance of blacks.    Plath's poem "Magi" ridicules the intellectual's theory-based search for truth: "They mistake their star, these papery godfolk" (15). Instead of searching for the meaning to life through living, they seek it in inanimate books. Plath says of the abstracts, "They're the real thing, all right: the Good, the True," however, her other references to them are contradictory, indicating that this is mockery (6). When she remarks that they "hover like dull angels," she explains that they are not spoiled with anything "so vulgar as a nose or an eye," and yet, what is a face without features (1-2)? These abstracts are "pure as boiled water, loveless as the multiplication table," but how could something so lifeless describe life (8)? By describing the dullness of the abstracts, Plath indicates their unsuitability to guide the search for truth. While the abstracts lead the "papery godfolk" to the "crib of some lamp-headed Plato," Plath leads her readers to the crib of a baby girl (16). While the abstracts are "pure as boiled water" the infant is also pure: "the heavy notion of Evil attending her cot is less than a belly ache" (7,13). However, although the theory-filled abstracts are "loveless as the multiplication table," the child is nourished by "Love the mother of milk, no theory" (8,14). The abstracts' truth is founded in theory; the baby's truth is founded in love. Plath is content that the "papery godfolk" do not seek the crib of her baby girl. "What girl ever flourished in such company?" (18). This question attacks the male-dominated hierarchy in which no women of her time prospered. The main message of Plath's poem is that we learn truth in the school of life, but why did she use a baby girl instead of a boy?