Monday, September 30, 2019

An analysis of Information Security Governance in the Universities in Zimbabwe Essay

Abstract The complexity and criticality of information security and its governance demand that it be elevated to the highest organizational levels. Within a university setup, information assets include student and personnel records, health and financial information, research data, teaching and learning materials and all restricted and unrestricted electronic library materials. Security of these information assets is among the highest priorities in terms of risk and liabilities, business continuity, and protection of university reputations. As a critical resource, information must be treated like any other asset essential to the survival and success of the organization. In this paper the writer is going to discuss the need for implementing Information Security Governance within institutions of higher education. Further than that, a discussion on how to best practice Information Security governance within the universities in Zimbabwe followed by an assessment on how far the Zimbabwean universities have implemented Information Security Governance. A combination of questionnaires and interviews is going to be used as a tool to gather data and some recommendations are stated towards the end of the paper. Introduction Governance, as defined by the IT Governance Institute (2003), is the â€Å"set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise’s resources are used responsibly.† Information security governance is the system by which an organization directs and controls information security (adapted from ISO 38500). It specifies the accountability framework and provides oversight to ensure that risks are adequately mitigated as well as ensuring that security strategies are aligned with business and consistent with regulations. To exercise effective enterprise and information security governance, boards and senior executives must have a clear understanding of what to expect from their enterprise’s information security programme. They need to know how to direct  the implementation of an information security programme, how to evaluate their own status with regard to an existing security programme and how to decide the strategy and objectives of an effective security programme (IT Governance Institute, 2006). Stakeholders are becoming more and more concerned about the information security as news of hacking, data theft and other attacks happen more frequently than ever dreamt of. Executive management has been showered with the responsibility of ensuring an organization provides users with secure information systems environment. Information security is not only a technical issue, but a business and governance challenge that involves adequate risk management, reporting and accountability. Effective security requires the active involvement of executives to assess emerging threats and the organization’s response to them (Corporate Governance Task Force, 2004). Furthermore the organizations need to protect themselves against the risks inherent in the use of information systems while simultaneously recognizing the benefits that can accrue from having secure information systems. Peter Drucker (1993) stated: â€Å"The diffusion of technology and the commodification of information transforms the role of information into a resource equal in importance to the traditionally important resources of land, labor and capital.† Thus as dependence on information system increases, the criticality of information security brings with it the need for effective information security governance. Need for Information Security Governance within universities. A key goal of information security is to reduce adverse impacts on the organization to an acceptable level of risk. Information security protects information assets against the risk of loss, operational discontinuity, misuse, unauthorized disclosure, inaccessibility and damage. It also protects against the ever-increasing potential for civil or legal liability that organizations face as a result of information inaccuracy and loss, or the absence of due care in its protection. Information security covers all information processes, physical and electronic, regardless whether they involve people and technology or relationships with trading partners, customers and third parties. Information security addresses information protection, confidentiality, availability and integrity throughout the life cycle of the information and its use within the organization. John P. Pironti (2006) suggested that among many reasons for information security  governance, the most important one is the one concerned with the legal liability, protection of the organization’s reputation and regulatory compliance. With the university setup, all members of the university community are obligated to respect and, in many cases, to protect confidential data. Medical records, student records, certain employment-related records, library use records, attorney-client communications, and certain research and other intellectual property-related records are, subject to limited exceptions, confidential as a matter of law. Many other categories of records, including faculty and other personnel records, and records relating to the university’s business and finances are, as a matter of university policy, treated as confidential. Systems (hardware and software) designed primarily to store confidential records (such as the Financial Information System and Student Information System and all medical records systems) require enhanced security protections and are controlled (strategic) systems to which access is closely monitored. Networks provide connection to records, information, and other networks and also require security protections. The use of university information technology assets in other than a manner and for the purpose of which they were intended represents a misallocation of resources and, possibly, a violation of law. To achieve all this in today’s complex, interconnected world, information security must be addressed at the highest levels of the organization, not regarded as a technical specialty relegated to the IT department. Information security is a top-down process requiring a comprehensive security strategy that is explicitly linked to the organization’s business processes and strategy. Security must address entire organization’s processes, both physical and technical, from end to end. Hence, Information security governance requires senior management commitment, a security-aware culture, promotion of good security practices and compliance with policy. It is easier to buy a solution than to change a culture, but even the most secure system will not achieve a significant degree of security if used by ill-informed, untrained, careless or indifferent personnel (IT Governance Institute, 2006). In an interview the executive director and information security expert on IT Governance and cyber security with the IT Governance and Cyber Security Institute of sub-Saharan Africa, Dr Richard Gwashy Young has this to say â€Å"†¦remember in  Zimbabwe security is regarded as an expense not an investment† (Rutsito, 2012). Benefits of Information Security Governance Good information security governance generates significant benefits, including: The Board of directors taking full responsibility for Information security initiatives Increased predictability and reduced uncertainty of business operations by lowering information security-related risks to definable and acceptable levels Protection from the increasing potential for civil or legal liability as a result of information inaccuracy or the absence of due care. The structure and framework to optimize allocation of limited security resources Assurance of effective information security policy and policy compliance A firm foundation for efficient and effective risk management, process improvement, and rapid incident response related to securing information A level of assurance that critical decisions are not based on faulty information Accountability for safeguarding information during critical business activities. Compliances with local and international regulations will be easier Improved resource management, optimizing knowledge, information security and information technology infrastructure The benefits add significant value to the organization by: Improving trust in customer/client relationships Protecting the organization’s reputation Decreasing likelihood of violations of privacy Providing greater confidence when interacting with trading partners Enabling new and better ways to process electronic transactions like publishing results online and online registration. Reducing operational costs by providing predictable outcomes—mitigating risk factors that may interrupt the process The benefits of good information security are not just a reduction in risk or a reduction in the impact should something go wrong. Good security can improve reputation, confidence and trust from others with whom business is conducted, and can even improve efficiency by avoiding wasted time and effort recovering from a security incident (IT Governance Institute, 2004). Information Security Governance Outcomes Five basic outcomes can be expected to result from developing an effective governance approach to information security: Strategic alignment of information security with institutional objectives Reduction of risk and potential business impacts to an acceptable level Value delivery through the optimization of security investments with institutional objectives Efficient utilization of security investments supporting organization objectives Performance measurement and monitoring to ensure that objectives are met Best practices The National Association of Corporate Directors (2001), recognizes the importance of information security and recommends four essential practices for boards of directors. The four practices, which are based on the practicalities of how boards operate, are: Place information security on the board’s agenda. Identify information security leaders, hold them accountable and ensure support for them. Ensure the effectiveness of the corporation’s information security policy through review and approval. Assign information security to a key committee and ensure adequate support for that committee. It is critical that management ensure that adequate resources are allocated to support the overall enterprise information security strategy (IT Governance Institute, 2006). To achieve effective information security governance, management must establish and maintain a framework to guide the development and maintenance of a comprehensive information security programme. According to Horton, et al (2000), an information security governance framework generally consists of: An information security risk management methodology; A comprehensive security strategy explicitly linked with business and IT objectives; An effective security organizational structure; A security strategy that talks about the value of information both protected and delivered; Security policies that address each aspect of strategy, control and regulation; A complete set of security standards for each policy to ensure that procedures and guidelines comply with policy; Institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk; A process to ensure  continued evaluation and update of security policies, standards, procedures and risks. This kind of framework, in turn, provides the basis for the development of a cost-effective information security program me that supports an organization’s goals and provides an acceptable level of predictability for operations by limiting the impacts of adverse events. In his article Kaitano (2010), pointed some characteristics of good corporate governance coupled with good security governance. These include and not limited to: Information security being treated as and organization wide issue and leaders are accountable. Leads to viable Governance, Risk and Compliance(GRC) Milestones It is risk-based and focuses on all aspects of security Proper frameworks and programs have been implemented It is not treated as a cost but a way of doing business Roles, responsibilities and segregation of duties are defined It is addressed and enforced by policy Adequate resources are committed and Staff are aware and trained It is planned, managed, measurable and measured It is reviewed and audited The overall objective of the programme is to provide assurance that information assets are protected in accordance with their value or the risk their compromise poses to an organization. The framework generates a set of activities that supports fulfillment of this objective. Principles for information security within the University In their article titled Information Security Policy: Best Practice Document, Hostland et al (2010) pointed out some guiding principles for information security within a university setup. The following are some of the principles they mentioned: 1. Risk assessment and management The university’s approach to security should be based on risk assessments and should be continuously done and the need for protective measures evaluated. Measures must be evaluated based on the university’s role as an establishment for education and research and with regards to efficiency, cost and practical feasibility. An overall risk assessment of the  information systems should be performed annually. Risk assessments must identify, quantify and prioritize the risks according to relevant criteria for acceptable risks. Risk assessments should be carried out when implementing changes impacting information security. Some recognized methods of assessing risks like ISO/IEC 27005 should be employed. Risk management is to be carried out according to criteria approved by the management at University. Risk assessments must be approved by the management and if a risk assessment reveals unacceptable risks, measures must be implemented to reduce the risk to an acceptable level. 2. Information security policy The Vice Chancellor should ensure that the information security policy, as well as guidelines and standards, are utilized and acted upon. He must also ensure the availability of sufficient training and information material for all users, in order to enable the users to protect the university’s data and information systems. The security policy should be reviewed and updated annually or when necessary, in accordance with principles described in ISO/IEC 27001. However, all important changes to university’s activities, and other external changes related to the threat level, should result in a revision of the policy and the guidelines relevant to the information security. 3. Security organization The Vice Chancellor is responsible for all government contact. The university should appoint CSO (Chief Security Officer). Each department and section should also be responsible for implementing the unit’s information security. The managers of each unit must appoint separate security administrators. The Registrar Academics has the primary responsibility for the information security in connection with the student registry and other student related information. The IT Director has executive responsibility for information security in connection with IT systems and infrastructure. The Operations manager has executive responsibility for information security in connection with structural infrastructure. He also has overall responsibility for quality work, while the operational responsibility is delegated according to the management structure. The Registrar Human Resources also has executive responsibility for information security according to the Personal Data Act and is the controller on a daily basis of the personal information of the  employees. The Registrar Academics and Research Administration have also executive responsibility for research related personal information. University’s information security should be revised on a regular basis, through internal control and at need, with assistance from an external IT auditor. 4. Information security in connection with users of University’s services Prior to employment security responsibility and roles for employees and contractors should be described. A background check is should also be carried out of all appointees to positions at the university according to relevant laws and regulations. A confidentiality agreement should be signed by employees, contractors or others who may gain access to sensitive and/or internal information. IT regulations should be accepted for all employment contracts and for system access for third parties. During employment, the IT regulations for the university’s information security requirements should be in place and the users’ responsibility for complying with these regulations is to be emphasized. The IT regulations should be reviewed regularly with all users and with all new hires. All employees and third party users should receive adequate training and updating regarding the Information security policy and procedures. Breaches of the Information security policy and accompanying guidelines will normally result in sanctions. University’s information, information systems and other assets should only be utilized for their intended purpose. Necessary private usage is permitted. Private IT equipment in the university’s infrastructure may only be connected where explicitly permitted. All other use must be approved in advance by the IT department. On termination or change of employment, the responsibility for termination or change of employment should be clearly defined in a separate routine with relevant circulation forms. The university’s assets should be handed in at the conclusion of the need for the use of these assets. University should change or terminate access rights at termination or change of employment. A routine should be present for handling alumni relationships. Notification on employment termination or change should be carried out through the procedures defined in the personnel system. 5. Information security regarding physical conditions IT equipment and information that require protection should be placed in secure physical areas. Secure areas should have suitable access control to  ensure that only authorized personnel have access. All of the University’s buildings should be secured according to their classification by using adequate security systems, including suitable tracking/logging. Security managers for the various areas of responsibility should ensure that work performed by third parties in secure zones is suitably monitored and documented. All external doors and windows must be closed and locked at the end of the work day. On securing equipment, IT equipment which is very essential for daily activities must be protected against environmental threats (fires, flooding, temperature variations). Information classified as â€Å"sensitive† must not be stored on portable computer equipment (e.g. laptops, cell phones, memory sticks). If it is necessary to store this information on portable equipment, the information must be password protected and encrypted in compliance with guidelines from the IT department. During travel, portable computer equipment should be treated as carry-on luggage. Fire drills should also be carried out on a regular basis. 6. IT communications and operations management Purchase and installation of IT equipment and software for IT equipment must be approved by the IT department. The IT department should ensure documentation of the IT systems according to university’s standards. Changes in IT systems should only be implemented if well-founded from a business and security standpoint. The IT department should have emergency procedures in order to minimize the effect of unsuccessful changes to the IT systems. Operational procedures should be documented and the documentation must be updated following all substantial changes. Before a new IT system is put in production, plans and risk assessments should be in place to avoid errors. Additionally, routines for monitoring and managing unforeseen problems should be in place. Duties and responsibilities should be separated in a manner reducing the possibility of unauthorized or unforeseen abuse of the university’s assets. Development, testing and maintenance should be separated from operations in order to reduce the risk of unauthorized access or changes, and in order to reduce the risk of error conditions. On system planning and acceptance, the requirements for information security must be taken into consideration when designing, testing, implementing and upgrading IT systems, as well as during system changes. Routines must be developed for  change management and system development/maintenance. IT systems must be dimensioned according to capacity requirements and the load should be monitored in order to apply upgrades and adjustments in a timely manner as it is especially important for business-critical systems. Written guidelines for access control and passwords based on business and security requirements should be in place. Guidelines should be re-evaluated on a regular basis and should contain password requirements (frequency of change, minimum length, character types which may/must be utilized) and regulate password storage. All users accessing systems must be authenticated according to guidelines and should have unique combinations of usernames and passwords. Users are responsible for any usage of their usernames and passwords. Data Gathering A structured questionnaire adapted and modified from previous questionnaires used by Corporate Governance Task Force, (2004) was used as the main instrument to gather data. Of the total 13 universities in Zimbabwe, 9 managed to participate in this research. The questionnaires were completed by the Executive Dean, IT Director, Operations Manager or Chairperson for the department. Section I: Organizational Reliance on IT The first section was designed to help in determining the institution’s reliance on information technology for business continuity. Table 1: Characteristics of Organization Questions Scores/Frequency 0 1 2 3 4 Dependence on information technology systems and the Internet to conduct academic, research, and outreach programs and offer support services 9 Value of organization’s intellectual property stored or transmitted in electronic form 2 7 The sensitivity of stakeholders (including but not limited to students, faculty, staff, alumni, governing boards, legislators, donors, and funding agencies) to privacy 2 3 4 Level of regulation regarding security (international, federal, state, or local regulations) 1 4 3 1 Does your organization have academic or research programs in a sensitive area that may make you a target of violent physical or cyber attack from any groups? 5 1 2 1 Total score 1 9 6 7 22 Scoring: Very Low = 0; Low = 1; Medium = 2; High = 3; Very High = 4 Section II: Risk Management: This section assesses the risk management process as it relates to creating an information security strategy and program. Table 2: Information Security Risk Assessment Questions Scores/Frequency 0 1 2 3 4 Does your organization have a documented information security program? 2 5 2 Has your organization conducted a risk assessment to identify the key objectives that need to be supported by your information security program? 2 4 3 Has your organization identified critical assets and the functions that rely on them? 2 2 5 Have the information security threats and vulnerabilities associated with each of the critical assets and functions been identified? 2 4 2 1 Has a cost been assigned to the loss of each critical asset or function? 1 3 3 2 Do you have a written information security strategy? 2 4 2 1 Does your written information security strategy include plans that seek to cost-effectively reduce the risks to an acceptable level, with minimal disruptions to operations? 4 2 2 1 Is the strategy reviewed and updated at least annually or more frequently when significant changes require it? 2 3 3 1 Do you have a process in place to monitor federal, state, or international legislation or regulations and determine their applicability to your organization? 2 2 3 2 1 Total 10 16 26 14 16 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section III: People This section assesses the organizational aspects of the information security program. Table 3: Information Security Function/Organization Questions Scores/Frequency 0 1 2 3 4 Do you have a person that has information security as his primary duty, with responsibility for maintaining the security program and ensuring compliance? 4 3 1 1 Do the leaders and staff of your information security organization have the necessary experience and qualifications? 5 2 2 Is responsibility clearly assigned for all areas of the information security architecture, compliance, processes and audits? 3 4 1 1 Do you have an ongoing training program in place to build skills and competencies for information security for members of the information security function? 2 2 3 2 Does the information security function report regularly to institutional leaders and the governing board on the compliance of the institution to and the effectiveness of the information security program and policies? 2 3 3 1 Are the senior officers of the institution ultimately responsible and accountable for the information security program, including approval of information security policies? 3 4 2 Total 16 17 14 7 0 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section IV: Processes This section assesses the processes that should be part of an information security program. Table IV: Security Technology Strategy Questions Scores/Frequency 0 1 2 3 4 Have you instituted processes and procedures for involving the security personnel in evaluating and addressing any security impacts before the purchase or introduction of new systems? 2 3 3 1 Do you have a process to appropriately evaluate and classify the information and information assets that support the operations and assets under your control, to indicate the appropriate levels of information security? 1 2 3 2 1 Are written information security policies consistent, easy to understand, and readily available to administrators, faculty, employees, students, contractors, and partners? 2 3 3 1 Are consequences for noncompliance with corporate policies clearly communicated and enforced? 1 3 2 3 1 Do your security policies effectively address the risks identified in your risk analysis/risk assessments? 2 3 4 Are information security issues considered in all important decisions within the organization? 3 2 3 1 Do you constantly monitor in real time your networks, systems and applications for unauthorized access and anomalous behavior such as viruses, malicious code insertion, or break-in attempts? 1 3 3 1 1 Is sensitive data encrypted and associated encryption keys properly protected? 2 3 2 1 1 Do you have an authorization system that enforces time limits and defaults to minimum privileges? 2 2 2 3 Do your systems and applications enforce session/user management practices including automatic timeouts, lock out on login failure, and revocation? 2 3 2 2 Based on your information security risk management strategy, do you have official written information security policies or procedures that address each of the following areas? Individual employee responsibilities for information security practices 4 3 1 1 Acceptable use of computers, e-mail, Internet, and intranet 2 3 2 2 Protection of organizational assets, including intellectual property 2 2 3 2 Access control, authentication, and authorization practices and requirements 1 2 3 1 2 Information sharing, including storing and transmitting institutional data on outside resources (ISPs, external networks, contractors’ systems) 2 1 3 2 1 Disaster recovery contingency planning (business continuity planning) 1 1 3 4 Change management processes 2 3 2 2 Physical security and personnel clearances or background checks 1 3 3 2 Data backups and secure off-site storage 1 1 3 4 Secure disposal of data, old media, or printed materials that contains sensitive information 2 3 4 For your critical data centers, programming rooms, network operations centers, and other sensitive facilities or locations: 2 3 4 Are multiple physical security measures in place to restrict forced or unauthorized entry? 1 2 3 3 Is there a process for issuing keys, codes, and/or cards that require proper authorization and background checks for access to these sensitive facilities? 2 1 3 3 Is your critical hardware and wiring protected from power loss, tampering, failure, and environmental threats? 1 4 4 Total 17 45 58 50 47 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Discussion As shown by the total scores on Table 1, a majority of the university has a very high reliance on the IT in their services. This is depicted by the structure and characteristics of the university. Information risk assessment and management leaves a lot to be desired by the universities. Most the universities have partially implemented such programs. A large number of employees in the IT departments of most universities do no have sufficient skills to implement good information security governance. Most universities lack the leaders who have the rightful know how on the subject. In addition  to that, there is no a representative in the council who will be an IT expert, hence most leaders lack interest and initiatives on information security. Due to lack of full responsibility of information security by the leaders, to implement processes for information security might also be a challenge especially to the IT department as normally is the department given the responsibility. Conclusion There is a need for institutions to start focusing on proper information security governance. For a start organization such as the Government, the Computer Society of Zimbabwe, Zim Law Society, POTRAZ, ICAZ, IIAZ, Zimbabwe Institute of Management and other industry governing bodies should put their heads together and define the appropriate legislations that mandates information security governance either by referring to existing international frameworks (PCI-DSS, SOX, COSO, ITIL, SABSA, Cobit FIPS, NIST, ISO 27002/5, CMM, ITG Governance Framework) or by consulting local information security and business professionals to come up with an information security governance framework. As the Zimbabwean economy is slowly sprouting, the art of information security governance in the universities should also take a leap. The adoption information security governance will ensure that security will become a part of any university and thus customers confidence will be boosted. References Drucker, P. ‘Management Challenges for the 21st Century’, Harpers Business , 1993. Corporate Governance Task Force, Information Security Governance: Call to Action, USA, 2004. IT Governance Institute, Board Briefing on IT Governance, 2nd Edition, USA, 2003, www.itgi.org. IT Governance Institute, Information Security Governance: Guidance for Boards of Directors and Executive Management, 2nd Edition, USA, 2006. ISO/IEC 38500: Corporate Governance of Information Technology, 2008. IT Governance Institute, COBIT 4.0, USA, 2005, www.itgi.org IT Governance Institute, COBIT ® Security Baseline, USA, 2004, www.itgi.org National Association of Corporate Directors, ‘Information Security Oversight: Essential Board Practices’, USA, 2001 John P. Pironti,  Ã¢â‚¬Å"Information Security Governance: Motivations, Benefits and Outcomes,† Information Systems Control Journal, vol. 4 (2006): 45–8. 21. Rutsito, T. (2005) ‘IT governance, security define new era’ The Herald, 07 November. Kaitano, F. (2010) ‘Information Security Governance: Missing Link In Corporate Governance’ TechZim. http://www.techzim.co.zw/2010/05/information-security-governance-missing-link-in-corporate-governance [accessed 02 May 2013]. Horton, T.R., Le Grand, C.H., Murray, W.H., Ozier, W.J. & Parker, D.B. (2000). Information Security Management and Assurance: A Call to Action for Corporate Governance. United States of America: The Institute of Internal Auditors. Hostland, K, Enstad, A. P, Eilertsen, O, Boe, G. (2010). Information Security Policy: Best Practice Document. Corporate Governance Task Force, (2004). Information Security Governance: Call to Action, USA

Sunday, September 29, 2019

The factory farms normally hold a large number of animals

Factory farming can be perceived as an enterprising activity that is aimed at increasing the animals' productivity at the lowest cost   possible so as to increase the profit margins while meeting the huge market demands.The factory farms normally hold a large number of animals, and mostly cows, pigs, chickens and also turkeys indoors, and the purpose of holding these animals is to produce milk, meat and eggs at the cost effective production level. A wide range of artificial applications are practiced in order to improve the animals' health and production and they include   the application of growth hormones, vitamin supplements and also the use of antimicrobial agents.Due to the large number of animals within a small area, their movements and actions are restricted as these movements and actions are considered to be unnecessary, as the main objective of the farm is to increase productivity which will definitely imply high profits.The breeding of these animals while in factory far ms is controlled by limiting the animals to the production of certain breeds which are likely to be productive depending on the manipulated genetically compositions.The paper emphases on the various practices in the factory farms on animals and their impact on the animals, the environment and also the effect on humanity as the consumers of these products. The paper ends by giving the possible measure that can be put in place to correct evils of factory farms if any as identified in the following arguments.The treatment of animals in factory farms can be perceived as being unfair if the animals are to be regarded as living things which are liable to respond to irritations and other stimuli. The animals that are held in the factory farms are treated unfairly at the expense of the farm owners trying to maximize their profits, hence treating animals like just production units.The animals in factory farms   which are held for the production of meat, eggs and milk are subjected to anima l abuse, genetic compositions are alterations to produce the desired breeds with high productivity levels, they are over crowded and confined in cages which restricts their movements and certain behavioral actions, they are subjected to cruel mutilation, they are handled in a harsh manner, neglected, and they are slaughtered in an inhumane manner (Seitz 216).All the above mentioned unfair treatment of the animals in factory farms has been occurring and is certain to continue increasing as the demand for the products from these animals increase.This scenario of animal abuse has been enabled by the fact that there is no federal   legal protection for these animals like in the case of dogs and cats where these acts are likely to be illegal, which portrays the biasness in the application of law (Francione & Watson 145).The farm animals are equivalent to dogs and cats who are cherished as champions as they less sensitive, intelligent and responsive to pain than the dogs and cats thus t hey need a fair treatment.The animals that are kept in cages, are deprived their freedom to move and also the liberty to exercise, and rather their energies are preserved so as to increase their productivity (Armstrong and Botzler 180). The animals are fed with drugs with an aim of fattening them faster and getting genetically manipulated to grow faster, produce a lot of milk than they can produce naturally and also the laying of eggs made quicker and the quality of eggs ensured.This treatment of the factory farm animal is unfair because it is likely to impose stress on the animals making them to develop some behaviors which are not natural because they are over strained to meet a given production level which is high above the natural level, thus over capacity utilization.This situation also posses the risk of loosing the indigenous breeds due to the genetic manipulation, which eliminates the indigenous traits in animals.There is also a risk of a certain species of animal going into extinction as the genetically modified animals are meant for some specific purposes like the production of meat, egg or milk, while ignoring to consider the future existence of these animals because these genetically modifications are meant to meet the immediate need for profit maximization and not considering the possibilities for the animals to ensure generational progress, without forgetting side effects inherent in the manipulations which might come up later in the future generations including the infertility of the animals (Kistler 90).

Saturday, September 28, 2019

Urban planning Essay Example | Topics and Well Written Essays - 2250 words

Urban planning - Essay Example It proceeds in two ways: the multiplication of the points of concentration and the increase in size of the concentrations† (qtd. in Champion 144). This phenomenon is evident in some of the major cities in the world such as London and Paris, which have a high degree of urban concentration. On the other hand, suburbanisation is a term that has come to be viewed in regard to the decentralisation of urban places or metropolitans since it is a reflection of the â€Å"shift in patterns of development from the mainly lateral expansion of the city’s built-up core to much deeper penetration of house building into an extensive commuting hinterland or ring† (Champion 149). Simply put, suburbanisation is a description of the fringe areas of major cities resulting to areas called suburbs, which have various meanings depending on their definition in various places around the world. Nonetheless, the convention definition of suburbs implies that they are residential areas located in the fringe areas of a large city within a commuting distant to the city with some having political autonomy while the population density of these areas vary from one place to another. Suburbanization is the process where cities grow peripherally; starting by movement of people, trade and facilities from densely populated urban cores to, to less populated human settlements. Among the reasons were expansion in transport, crowded urban areas, industrial growth and immigration and Levittown played a crucial role in development of suburbs from the 1950’s and beyond (Marshall). The automobile age, which was after the Second World War, witnessed the return of many servicemen. They were all entitled to education and housing benefits. New bachelors’ degrees were issued and it created a professional class. The veterans that opted for vocational education filled the service sector. The two classes started having children that became baby

Friday, September 27, 2019

Which is best Private or Public Schools Essay Example | Topics and Well Written Essays - 500 words

Which is best Private or Public Schools - Essay Example Some of the above domains are similar both in private and public schools whereas some others are different. Facilities are similar in most of the private and public schools; but are different in their source of revenues. Private schools look for endowments and tuition fees to develop facilities. Public school facilities depend on the economy of the place of operation. In rural areas the facilities may be less for both private and public schools whereas in urban areas the facilities may be better. Private schools are better for the students as far as the class sizes are concerned. Most of the private schools have smaller class sizes compared to the public schools. Individual care is more in private schools because of the smaller class size. The teacher would be able to give more focus to the needs of the students in private schools. On the other hand, public schools have bigger class sizes and hence less individual attention is offered in such institutions. Because of the high salaries in public schools compared to private schools, the teachers are more loyal to their profession in public schools. On the other hand, private schools are hiring professionals of higher academic qualifications which help them to provide quality education to their students. Comparing the above two facts, the general quality of education both in private and public schools are almost same. Public school budgets depend on the economy of its place of operation whereas private schools have lot of other channels for raising funds. Heavy tuition fees is the main revenue source for the private schools whereas in public schools the tuition fees are much low. â€Å"The good news for parents is that public schools cannot charge tuition. The bad news is that public schools are complicated, often underfunded operations influenced by political winds and shortfalls† (Great schools

Thursday, September 26, 2019

Operation management Assignment Example | Topics and Well Written Essays - 3000 words - 3

Operation management - Assignment Example Operation management is important for two main reasons – firstly it can improve the productivity and secondly it helps to meet the competitive priorities of the customers. Productivity can be defined as the ratio of the output to input. It is rather a measure through which the efficiency of the employees or managers is utilized to convert the scarce resources of the organization into products or services. The more is the numerical value of this ratio the higher is the level of efficiency. The importance of operation management is increased in the recent years due to stiff competition, quality conscious customers, new technologies, and service life cycles which imposes pressure on the organization’s operations so as to improve productivity and provide a better quality of the goods and services. This assignment will put focus on Starbucks Corporation which is the largest coffee company across the world and is based in Washington. The brand is a part of the booming restaurant industry and operates through 20,891 stores in almost 64 countries. The company was founded in the year 1971 as a Seattle retailer of coffee beans and from then it has expanded very rapidly. The company is well known for selling coffees but also has extended its product range to pastries, sandwiches, hot and cold beverages, snacks, etc. The inputs of its operations are mainly coffee beans and milk that comes from across nineteen countries, once the beans are collected it is then send to its manufacturing, roasting, and packaging plant. The output is the finished product that is then delivered across its stores and supplies adequate amount of coffees to each of the stores. The input/output transformation model describes the process through which the inputs such as capital, labour, equipment, land building, information, and materials are converted into outputs such as products or

Financial Analysis for Managers Article Example | Topics and Well Written Essays - 500 words

Financial Analysis for Managers - Article Example However, the highly competitive nature of today’s corporate world has given rise to an essence of unethical behaviour which underlies a majority of business operations; in order to ensure their success. Many a times, unethical behaviour in the workplace has an immense negative impact on the organization and its employees. These effects can be psychological, financial, social, or even bureaucratic in nature. Financially speaking, if a company adheres to unethical means, then it endangers its image in the eyes of the public, and less people would be interested in dealing with the firm. These may include suppliers, financial institutions, customers and distributors. Such a trade-less condition obviously is a set-back to the revenue, and thus the profit of the company. Moreover, from an intra-firm point of view, employees would have lesser faith in a company which does not deal ethically with the public, as there emerges a possibility of the firm using corrupt means against employ ees; if need be someday. Not only does this encourage the existing workforce to leave the firm, it also keeps potential employees to join the firm. This proves to be disastrous for the company’s overall growth and progress.

Wednesday, September 25, 2019

Brilliance in the Basics of Leadership Essay Example | Topics and Well Written Essays - 1000 words

Brilliance in the Basics of Leadership - Essay Example For instance, leadership demands that the leaders, before practicing their decisions, discuss them with parties which are going to be affected by their decisions, so as to make them feel respected. The substantive aspect of leadership includes knowledge, tough standards and guts to pursue directions regardless of opposition. Brown, Travino and Harrison (2005) assert that â€Å"leadership predicts outcomes such as perceived effectiveness of leaders, followers’ job satisfaction and dedication, and their willingness to report problems to management†. Hence, if the leadership is thriving, capable and bright, then the outcome is more prolific than anticipated. What does it mean to me? This explanation of the concept of leadership itself explains why the brilliance in the basics of leadership is important to me or any other person who wants to see his/her organization flourishing. I believe that the accomplishment of an organization depends mainly on value-based actions and d ecisions. A good leader takes care of his employees so as to preserve a vigorous environment within the organization. Some basics in this aspect are that the leader verifies that the salaries are being paid in time, pursues a system of rewards and bonuses, listens to the employees’ troubles and tries to remove them. ... He knows that he has to abide by the rules and regulations he has agreed upon while signing a contract and will never back off. Brilliance in these basics adds to the progress of the organization. I also believe in the fact that brilliance in the basics of leadership makes the newcomers follow the way the leaders work and behave in the organization. A good leader will always show such an attitude at the workplace that inspires others to follow his directions. Also, the ultimate goal of the leadership is to create such teams that work effectively to produce greater results. The most important thing is consideration about internal and external communication. When a leader wants that employees participate in a vigorous collaborative environment where they interrelate with each other in a better way to share their ideas and information, he takes steps to improve his communication with the workers, listen to their problems, talk to them and work out their issues. Workers will automaticall y start following him and the overall organizational culture will improve. This is the transformational leadership in which the leaders produce such an effect on their subordinates that they inflict a â€Å"transforming effect† on them, thus, producing far-reaching changes in organizations. Now, let me discuss what other basics of leadership are important to me and why. Among substantive virtues of leadership, the following basics are very important. Values By understanding and polishing my basic values, I can develop a sense of moral duty of working for the betterment of myself and of the society. Voice This includes the practice of getting people acquainted with our inner beliefs, ideas and standards so that they get

Tuesday, September 24, 2019

John Steinbeck's Life Essay Example | Topics and Well Written Essays - 1250 words

John Steinbeck's Life - Essay Example Published in the Stanford Spectator, a student enterprise, "Fingers of Cloud" seems out of place within its own deceptively-titled context, and, indeed, has been out of place, beyond the pens of Steinbeck critics, for over eighty years. Only Hughes and Timmerman have ventured more than the obligatory sentence or two that Steinbeck's biographers have deigned to scribe and share. Hughes's most helpful contribution is re-stating Thomas Kiernan's biographical information concerning Steinbeck's job as straw-boss on the Spreckels sugar-beet ranch in January 1921 (Hughes 4-5), which is likely the basis for some of the content in "Fingers of Cloud"; Timmerman's is noting the "mysterious pull of the mountains upon the human spirit" in the story, which "would surface in later works of Steinbeck's," and insisting, incorrectly, that Steinbeck's initial offering is "clearly inferior" when compared with "the later Steinbeck canon" (Timmerman 11, 22). Regardless of the opinions regarding the source and worth of "Fingers and Cloud," ecocriticism of Steinbeck's first story, as well as its place within Steinbeck's overall environmental context, have never been attempted. "Fingers of Cloud" is brief, only five pages long. In the story a young orphaned woman named Gertie appears, sweeping the floors of her house, singing gaily to herself. Steinbeck describes Gertie's "flat, pink face," her "benign smile," her "hair, as white as a washed sheep's wool and nearly as curly," and her "pink eyes" (160). In the span of only a few pages, Gertie ascends a mountain; gets caught in a rainstorm; barges into a Filipino labor camp; meets, seduces, and is seduced by Pedro, the boss; is married to him the following day; sets up house within the labor camp; gets beaten for days after; realizes and makes realized her whiteness and her new husband's blackness; and then, finally, re-Â ­ascends the mountain after apparently leaving Pedro, for good, behind. In terms of characterization, setting, and d ialogue, "Fingers of Cloud" offers tantalizing tastes of Steinbeck's style--a style that would allow Steinbeck to begin realizing his deepest wish, and a style that would cement his status as American's finest twentieth century American writer. Steinbeck's first character, Gertie, disregards her worldly duties, embracing instead the brilliant mystery of tall mountains and bright skies. At the story's opener, Gertie chants to herself, "Don't have to sweep no more--don't have to wash no more--don't have to do absolutely nothin'--no more" (160), repeating the last two words for extra effect. With her parents absent, and the family home now her own, the naive Gertie is well aware of her newfound freedom but does not yet realize how an absence of human connections will negatively impact her life, which comes into play later in Steinbeck's story. It is as if, with her mother and father gone, Gertie's purpose departs; and though her life may now be carefree, an emptiness still remains. Thu s, Gertie decides to leave behind her neighborhood--which is a monotonous collection of "houses and fences and grass plots" followed immediately by "new houses and fences and grass plots" (160)--and instead succumbs to the pull of the wild from the top of a mountain. Interestingly enough, upon

Sunday, September 22, 2019

Comparing the movie with the book(The Elegance of the Hedgehog) Essay

Comparing the movie with the book(The Elegance of the Hedgehog) - Essay Example The wide appreciation of the movie affirms that the novel has been well presented in audio form and the director has used brilliant skills and techniques to present the cinematic version of the novel. The movie revolves around the tale of an intelligent girl with some distinct type of emotions and attitude. She used the camera of his father to record the personal moments of the family members in order to show the reason their different types of attitudes. She planned to end her life on her sixteenth birthday by using sleeping pills of her mother. The parents of the girl were busy enough in their own life and engagements that they rarely have quality time to spend with their children. The lack of parent attention instigate some different types of feelings in the girls and rather living a normal life as other girls of her age, she used to become a spy at her own home and recording different moments of the lives of people of her home. Her life took a turn when she began to look inside the life of her building’s concierge who was experiencing pleasant change in her life after the entry of a person. The main idea and theme of the movie has been taken from an international best seller book. The book was appraised by the literary experts due to the intelligent dealing of the intricate subject and the same kind of reception was given to the movie because the director has used complete potential and cinematic proficiency to produce same level of work as was presented in the book form. It is widely believed that the movie has done justification with the book because the main ideas of the book are not ruined in the movie; in fact, they are well presented and well explained with the support of proficient acting and direction. It is not always easy to make a movie from a book or novel because when people have already read the story

Saturday, September 21, 2019

Evolving Nursing Roles Essay Example for Free

Evolving Nursing Roles Essay The Institute of Medicine released a report in October 2010 that set out to answer the question, â€Å"what roles can nursing assume to address the increasing demand for safe, high-quality, and effective health care services?† . Three ways that the report suggests to do this are to utilize nurses to their full extent of education and training, a higher level of education for nurses and a stronger leadership role. . Nurses make up the largest segment of the health care workforce and have the capacity to positively impact healthcare in the future, especially with the changes coming from the Affordable Care Act. Nursing is one of the few professions that has several educational pathways to licensure. In order to qualify to take the NCLEX-RN exam, one can obtain an associate’s degree in nursing (ADN), a bachelor’s of science in nursing (BSN) or can complete a diploma program. â€Å"The primary goals of nursing education remain the same: nurses must be prepared to meet diverse patients’ needs; function as leaders; and advance science that benefits patients and the capacity of health professionals to deliver safe, quality patient care†. . While these goals are ideal, the educational road to get there can be streamlined to be less confusing and â€Å"to prepare nursing graduates to work collaboratively and effectively with other health professionals in a complex and evolving health care system in a variety of settings†. . New RNs are not always prepared for the job and there is a high turnover rate for â€Å"new grads†. Hospitals can help the transition by offering â€Å"new grad† or residency programs and longer orientation periods. RNs not only have to become efficient at the tasks of the job, but also be able to critically think a situation, delegate tasks to CNAs and LVNs, effectively manage time and become comfortable with communicating with doctors and other healthcare team members. The key is to better educate nurses both before and after licensure. . The Institute of Medicine’s report states that nurses are being underutilized. The changing healthcare system in the United States requires that â€Å"the system undergo a fundamental shift to provide patient-centered care; deliver more primary as opposed to specialty care; deliver more care in the community rather than  the acute care setting; provide seamless care†.. Gone are the days of just treating a patient in a hospital once he or she has become ill. Patients are being educated about disease prevention and health promotion in their communities, there is improved access to care for the poor and those in rural areas and there is hospice care available. Nurses are at the core of this shift and help to provide a high quality of care more safely and with fewer errors. With the shortage of healthcare providers, advanced practice registered nurses should be given more responsibilities and a broader scope of practice. Some hospitals and healthcare facilities are already making changes and are seeing positive results. The impact of employing nurses in a substantial way will continue to improve patient care and promote health and wellness; however there are some issues that will need to be addressed. It is true that nurses are capable of doing more with their experience, skills and education, but nurse to patient ratios is a major factor in why nurses aren’t doing more. It would be ideal if the nurse could provide care to a patient in the hospital, provide thorough education about the disease process and prevention, address any spiritual and social services needs and coordinate any home health or therapy requirements. However, with a nurse to patient ratio of 1:4 or 1:5 and several discharges and new admits every day, this is unlikely in the acute care setting. I strive to provide seamless care for my patients and give as much of myself and my time as I can, but I also have no choice but to rely on other sources, such as social services and case management. Unfortunately, many patients who need these services and who could benefit from more education do not get it because of time constraints. It is my hope that as this shift occurs, there will be fewer patients who need to be admitted to the hospital and there will be more time to provide patients with the care and information that they need. â€Å"Strong leadership is critical if the vision of a transformed health care system is to be realized†. . Nurses may not have originally thought they would be leaders when they entered the profession. Most likely they just wanted to help people. However, now more than ever, nurses have to become partners with other healthcare team members and help lead the way to reformed healthcare in the country. According to the IOM report, â€Å"being a full partner involves taking responsibility for identifying problems and areas of waste, devising and implementing a plan for improvement, tracking  improvement over time, and making necessary adjustments to realize established goals.† Nurses must use their leadership skills to work with others and advocate for their patients to make these improvements. Obtaining a higher level of education will assist students or RNs to develop leadership competencies and help them gain the confidence needed to work on these projects. References Creasia, J. L., Friberg, E. (2011). Conceptual Foundations: The Bridge to Professional Nursing Practice (5th ed). St. Louis, MO: Elsevier. The Institute of Medicine. (2010). The Future of Nursing: Leading Change, Advancing Health. Washington, DC: The National Academies Press.

Friday, September 20, 2019

Natural Antioxidant in Anti-Aging Skin Care

Natural Antioxidant in Anti-Aging Skin Care Abstract It has been shown that natural antioxidants are main ingredient of anti-aging skin care products. More and more people pay more attention on appearance of skin condition, and try to slow down the aging process as late as we can, and avoid the fines and wrinkles. In order to achieve this aim, natural oxidants become much important than any other time, it has been widely apply to anti-aging skin care products. Antioxidants are a reducing agent which can remove free radical damage and reduce the damage oxidative. This review lists several popular and practicality antioxidants which already have been used for some large cosmetic company. And then reviews the properties of each antioxidant and analyze the activity of antioxidants. The main aim of the report is to introduce how antioxidants work in anti-aging skin care products and the relationship between antioxidants and the free radicals. Free radicals can attack molecules and result in cell damage, which may consequently cause skin aging. Antioxidants have the ability to neutralize free radicals and prevent such damage. This is the reason why antioxidants are used as a component in anti-aging skin care products. The list of known common antioxidants includes, lycopene, vitamin E, catechol and lithospermum erythrorhizon, to name a few. A large amount of food and herbs such as ginseng, acai berry, Amaranthus and Chenopodium Quinoa are also known for their antioxidant properties. The antioxidants mentioned above are all effective in combating free radicals, but in furture product design, compound antioxidants are often considered in order to achieve greater effectiveness Introduction How skin ages As we age, there are fine lines and wrinkles appear to our face and any other signs of aging. There are two main reasons for this, first reason is called internal aging which cause by genes, and the other reason is called external aging which cause by the sun damage (UVA UVB) and environmental pollution. By knowing why skin age can help to understand how anti-aging skin care apply to skin and analyze the ingredient for skin antioxidants. Skin aging start in mid 20s, the metabolism of skin begins to slow slightly, the dead cells do not replace as fast as before and the production of collagen becomes slower. At this point, the Sun rays (UVA and UVB) are the main reason causing skin aging and skin damage, which they will break sown the collagen and elastin. At the mid 30s, the first fine lines and premature wrinkles appear under the eyes or across the forehead. The skin starts to lose its elasticity and firmness. And sun damage is still the main reason causing the wrinkles, age spots and rough skin. Actually the dermatologists define the word photoaging which describe the particular type of aging caused by the ultraviolet (UV) exposure. The sign of photoaging is usually express fine wrinkles, freckles, spider veins, age spots and blotchiness. At this point, the antioxidant is necessary for the skin to prevent free radicals damage. And anti-aging products start to be needed. At the age of mid 40s and beyond, skin aging and wrinkles are inevitable. Apart from sun damage, there are a number of other elements that may contribute to skin aging. First of all, gravity plays an important role in skin aging and the effect becomes evident at middle-age: eyelids start to drop, tip of the nose show small degrees of falling, earlobe become longer and jowls begin to form [1]. Secondly, facial expressions also forms the fine lines, after years of repetitive facial movements, laugh lines, worry lines, nasolabial folds and crows feet at the corners of the eyes. Also sleeping positions also brings the wrinkle in the skin, which called sleep lines. Last but not least cigarette smoking causing the biochemistry changes inside the body which it will accelerate the aging process. Theory of aging what is a free radical? As previously discussed, aging is an inescapable process for people. Despite its inevitability, however, what we can do is try to find a way to slow down the aging process. Logically, this rationale first leads us to the theory of aging. In 1954, Dr Denham Harmon brought forward the free radical theory of aging (FRTA), claiming the ubiquitous involvement of free radicals in inherent metabolic reaction [2]. The genetics and environmental is the main points for the aging. The FRTA postulates that the common aging process is the initiation of free radical reactions (FRRs). As the body and organs metabolism, a few oxygen molecules were removed and the reactive molecules called the free radicals. When a normal molecule is attacked a free radical, it will become a free radical itself, which is capable of attacking other molecules. This chain reaction, if not stopped, will lead to accumulating damage and ultimately cause cell destruction. Free radicals are also caused by ultraviolet rays (U VA and UVB) in sunlight. When the free radicals move freely, they are destructive and causing the oxidative stress. The oxidative stress leads the premature aging, such as dry skin and wrinkles. Overall, there are several external stress factors, UV radiation, smoke, pollution, urban stress, etc. Dr. Denham Harmon has a clear point that the effect of oxidative stress can be reversed with the antioxidants, and he shows how antioxidants work in laboratory animals. Antioxidants can neutralize the free radicals without become free radicals themselves. By neutralize the free radicals, the cellular damage will be prevented. And the oxidative stress damage can cause biological organisms to age, and the free radicals can also cause damage of collagen in the skin. As we known, collagen is an important structure of the skin. Natural Antioxidants Antioxidant is a molecule that can slow and prevent the oxidation of other molecules, which show that it remove free radical damage from skin and help to slow down aging skin. Therefore antioxidants are considered reducing agents and reduce the damage oxidative process in skin cells. Natural antioxidants are a wider variety selection and much safer and healthier than artificial antioxidants, therefore natural antioxidants will be discussed. There are literally hundreds of brilliant natural antioxidants in the world, but there is no single miracle cure for skin aging. New antioxidants are appearing in the world of skin care every year. Natural antioxidants can decrease inflammation, defend against UVA and UVB, repair DNA damage, restore natural skins surface barrier remedy environmental pollution, release skin stress from hectic urban life, promote collagen generation, and improve skin damage recovery [3]. As previously pointed out, antioxidants stop the process of oxidation by neutralizing free radicals. Antioxidants work against free radicals in two ways. The first one is called chain-breaking, which means when the free radical free or gain an electron, a second pair of free radical is formed. The antioxidants can stop this process by deoxidizing the electron. The other way is prevention, which means that antioxidants can prevent oxidation by neutralizing the initial free radicals [4]. Therefore by apply antioxidants skin care products can efficiently control and prevent the free radicals damage. Many hyper-cosmetic company product lots of products which contain effectively antioxidants to defend the skin, help reduce fine line and wrinkles. Antioxidants also promote the structure of collagen, it is well known that collagen is an important component for skin organ. The following review will list a number of natural antioxidants and analyzed their respective antioxidant abilities. A detailed description was given for each antioxidants presented. Analysis of several natural anti-oxidants Lycopene Lycopene is well known one of the most common and potent antioxidants of the carotenoids. The antioxidant activity of lycopene is basing on its purifying the properties of singlet oxygen and peroxyl radicals, which to define induce oxidative damage to nuclear DNA, scavenge free radicals and block visible and UV-light. The research by Ferreira, A.L.A., Salvadori, D.M.F., Nascimento, M.C.M.O., Rocha, N.S., Correa, C.R., Pereira, E.J., Matsubara, L.S., Matsubara, B.B., Ladeira, M.S.P., Tomato-oleoresin supplement prevents doxorubicin-induced cardiac myocyte oxidative DNA damage in rats [5], which indicate that lycopene reduced the risk of different cancers, heart diseases and further more protect cells from free radical damage. The journal also showed lycopene especially effective in the tissues with high fat and lipid content. Another study by Centre for Food at Virginia Tech [6] present that it significantly deduces the risk of prostate cancer. Therefore, lycopene is apparently effective in the tissues with high fat and lipid content. The skin is a lipid rich organ, so that in theory it means the high power antioxidant activity of lycopene also apply to skin. Another function of lycopene is block the UV-light, although the SPF of lycopene is around 3, which is not enough for outdoor activity expose at the direct sun, but it is good enough for the indoor life, especially for some people do not like to use sunscreen. As we discussed before, one of the main reason causing skin aging is exposure the skin under the sun without any protection. Lycopene, which delivered from tomato, duo to the difficulty of abstract processing and skin care product which contains lycopene is difficult to find. Based on my research, lycopene is a main ingredient for KIEHLS lycopene  Facial  Moisturizing  Lotion  with  Tomatoes,  Beta-Carotene  and  Vitamin  E. According to the product description, it can be moisturizing the skin, reduce the level of damage free radicals on skin, help increase the skin elasticity and protect skin from the UV-light [7]. Vitamin E Several studies demonstrated vitamin Es ability to neutralize lipid peroxidation and unsaturated membrane lipids because of its oxygen scavenging effect [8]. Vitamin E has shown to reduce the aging of skin caused by ultraviolet light radiation (UVA) [9] and prevent cell damage from free radicals. Vitamin E is broadly useful for many occasions, such as sun protection, sun burn treatment, skin diseases treatment, scar treatment, skin cancer, etc. Vitamin E is mainly represented as vegetable oils from sunflower seed, olive, palm, corn, almonds, etc. Vitamin E protects the skin structures from oxidative damage and preventing the radiation of lipid peroxidation, duo to the powerful antioxidant activity, it plays a protective role in many organs [10]. Actually, Vitamin E has been became an essential part of skin care products. It helps reduce the appearance of fine lines and wrinkles. And the free radicals of vitamin E were played a role in anti-aging and the antioxidant activity is useful for the skin problem [11]. Based on my research from The Body Shop, Vitamin E is the most important ingredient for The Body Shop Vitamin E Eye Cream. According to the product description, this eye cream protects delicate skin around eye area; reduce the appearance of fine lines; puffiness and dark circles [12]. Green Tea Recently, due to the widely use of polysaccharides and their conjugates in the food industry and in medicine. There are three fractions of water-soluble polysaccharides conjugate purify from low grade green tea, which are TPC-1, TPC-2 and TPC-3, and those are the main bioactive components of green tea. Protein, sugars and uronic acid were found in components of tea polysaccharide. The antioxidant activities were also found in tea polysaccharide. From fig. 1, selected three components of tea polysaccharide conjugates were tested. The ability of scavenge hydroxyl radicals were found in all three polysaccharide fractions. The fig.2 and fig.3 show that the Concentration and the scavenging effects are direct proportion. The results of molecular weight (MW) and molecular size (MN) from tea polysaccharide conjugates showed in fig.6. The molecular weights of TPC-1, TPC-2 and TPC-3 were 268.000, 118.000 and 42.000. The MW/MN value of TPC-1 was close to 1, it is more homogeneous. Natural polysaccharides may not been found directly from plants or animals, but it often comes with protein lipids and nucleic acids. The antioxidant activities of the polysaccharide-protein conjugates are direct proportion to the protein content percentage. The properties and bioactivities of polysaccharides might affected by protein. Studies on the antioxidant activities of different fractions of green tea polysaccharide conjugates have shown that the protein content and molecular weight of the tea polysaccharide conjugates played an important role in antioxidant activity. Antioxidant activity can be enhanced by lower molecular weight and higher protein content [15]. Based on my research, green tea extract is the major ingredient for H2O+ Green Tea Reviving Eye Cream. According to the product description, this eye cream is able to promote skin recovery, inhibit environmental free-radical damage and reduce the appearance of fine lines and wrinkles [16]. Chinese herbs- lithospermum erythrorhizon A great number of natural antioxidant medicinal plants have been tested for their antioxidant attributes, the results have shown that raw extracts or isolated pure compounds from them were more effective antioxidants [17]. Lithospermum erythrorhizon Sieb. Et Zucc. (LE) has been used a long time as medicine in China and as a dye for staining fabrics and food colorants [18]. It possesses a wide spectrum of wound healing, anti-tumor, anti-fungus, anti-HIV and contraceptive biological activities [19]. The anti-oxidant activity of the compounds from lithospermum erythrorhizon and compare their antioxidant effect through reducing power, tested with a rancimat and radical scavenging activity. There are seven isolated compounds, deoxyshikonin(compound 1), ÃŽÂ ²,ÃŽÂ ²-dimethylacrylshikonin(compound 2), isobutylshikonin(compound 3), shikonin(compound 4), 5, 8-dihydroxy-2-(1-methoxy-4-methyl-3-pentenyl)-1, 4-naphthalenedione(compound 5), ÃŽÂ ²-sitosterol(compound 6) and a mixture of two caffeic acid esters(compound 7). The antioxidant activities were compared and evaluated through Rancimat method. This method detects the increase of electrical conductivity caused by the formation of volatile dicarboxylic acids which occurs during lipid oxidation processes [20]. From fig.7, the isolate compounds from lithospermum erythrorhizon show different effects on oxidation. Reducing the capacity of a compound may serve as a significant indicator of its potential antioxidant activity [22]. Ro determine the reducing power of the compound is isolated from lithospermum erythrorhizon to estimate the anti-oxidant potentials. And also from fig. 6, the test sample was using the potassium ferricyanide reduction method which shows that the antioxidant activities of the compounds was reduced and also reduce the oxidized intermediates of lipid peroxidation processes. The study by Chen, H., Zhang, M., Qu, Z., Xie, B., suggests that the traditional Chinese medicinal herb could be considered as reliable natural antioxidants for food, and also apply for anti-aging skin care products. Ginseng Ginseng is often used in East Asian counties as a traditional drug. There are three types of ginseng in the world, which are Asian ginseng, America ginseng and Siberian ginseng. Asian ginseng known as Panax ginseng, also called red ginseng; America ginseng known as Panax quinquefolius, also called white ginseng; and Siberian ginseng is normally considered a herbal medicine rather than ginseng, because of they do not contains the active ingredient of ginsenosides. The root of ginseng is the source of ginseng extract, which is rich in antioxidants. According to the dermatology researchers from Seoul National University published a study in the Journal of Medicinal Food in 2009 which examined the effect of red ginseng on the facial skin 82 women over 40 years of age. The study presented that red ginseng significantly increased the production of collagen and reduced facial wrinkles [24]. In January 2009, another experiment was performed that in order to determine red ginseng can effectively prevent ultraviolet B on facial skin, loss of elasticity, thickening of the skin and wrinkle formation in the same variety of hairless mice. This experiment also clearly showed that when directly applied to skin, ginseng could improve the collagen production of skin and the inhibition of matrix metalloproteinase expression in dermal fibroblasts [25]. Recently, ginseng is widely used for skin problems, too. Ginseng is considered a natural skin care product for toning and helps improve the skin texture by preventing the formation of wrinkles. Duo to the efficiency on the skin, it can be used in skin care creams, lotions, toners, etc [26]. Based on my research, ginseng root extract is one of the most efficiency ingredients for Sisley Emulsion Ecological Compound [27]. This face lotion is a well- known rewarded product by using ginseng. The detail of ingredient was found in Sisley Shoppe from House of Fraser. According the product description, this compound help skin fight environmental stresses, such as pollution, cigarette smoke, UV rays; restore improved tone and reduce the appearance of fine lines [28]. Acai berry Acai berry is a rising antioxidant and the most popular one lately. More and more skin Care Company and health care company choose this antioxidant to produce product line. First of all, acai berry was found from the acai palm tree origin from Brazil. But more acai palm tree was plant in Central America and South America. Acai berry is one of the highest amounts antioxidants of any fruit, which contains at least 33 known antioxidants, it has almost 2 times the antioxidants of blueberries, and also rich in omega 3, 6 9, minerals, vitamins, amino acids, phytosterols and phytonutrients. First of all, the high amount antioxidants which help to prevent the damage to skin caused by UVA and UVB, neutralize damage free radical in order to slow the skin aging process, which is able to smooth face line and wrinkles. The ability to fight free radicals which make acai a potential skin care intergradient, especially use for repairing fine lines and visible wrinkles and skin damage caused by environmental. And then Omega 3, 6 9 can help moisturize skin which is also an important factor to prevent the appearance of fine lines and wrinkles. Furthermore, they also play an important role in various skin structures. In addition, the phytosterols in acai berries keep skin intact and prevent premature wrinkles. It has also been noted that phytosterols could prevent premature skin cell death [29]. Last but not least, silicon is also an important ingredient of acai, which can help skin improve the content of collagen in the skin. Collagen known as an important component for skin elasticity and strength, the more collagen in the skin, the less fine lines and wrinkles will appear on the skin. Thats also an important factor why acai is much better anti-aging ingredient than others. Based on my research, I found out recently Kiehls supply a new line which called the Acai Damaging-Repairing Collection, which the main integrant is Acai berries. According to the chemists at Kiehls tests found that 88% of women felt a natural tightening effect in their skin and 84% of women said their skin appeared brighter. And the product descript that the collection to repair the effects of visible damage to skins tone, texture and elasticity caused by environmental oxidation, sun exposure and other external skin stressors [30]. Amaranthus and Chenopodium Quinoa Amaranthus is widely grown in Latin America, Africa, and Asia due to the pseudocereals resistance to drought, hot climate, pests, and low demand for cultivation inputs [31]. Quinoa (Chenopodium quinoa), another pseudocereal from the Andean origin, is extensively cultivated at mountain altitudes in Peru and Bolivia [32]. To determine the total phenolices content and the antioxidant properties of those two plant materials, the correlation between total phenolic content and antioxidant activities. The research by Nsimba, R.Y., Kikuzaku, H., Konishi, Y., Antioxidant activity if various extracts and fractions of Chenopodium quinoa and Amaranthus spp. Seed give a direction for the search of antioxidant compound into the plant materials. Quinoa and three varieties of Amaranthus seeds are powerful dietary antioxidants. Generally speaking, various extracts and fractions from these plants provided a range of different antioxidants which demonstrated considerable free radical scavenging capabilities. [32]. Based on my research, Amaranthus is an important ingredient found in NUXE Crà ¨me Nirvanesque First Expression Lines Cream. According to the product description, this face crà ¨me can significantly reduce fine lines and wrinkles [33]. Coenzyme Q10 Coenzyme Q10 is known as a fat-soluble natural antioxidant for treat and speed up the process of recovery of a heart patients, obvious duo to the high amount antioxidant. Coenzyme Q10 can effectively defend free radicals and other damage molecule. Therefore, coenzyme Q10 antioxidants can prevent signs of skin aging. As previous discussed, photoaging is caused by sunlight and contribute to the appearance of fines lines and wrinkles. Research conducted by Paul Gerson Unna Research Centre, Beiersdorf AG, Hamburg, Germany, have demonstrated Coenzyme 10s beneficial effect of preventing photoaging. Through the measurement of weak photon emission, they proved that Coenzyme Q10 could penetrate the viable layers of the epidermis and reduce the level of oxidation . A reduction in wrinkle depth has also been observed following Coenzyme Q10 applications [34]. The Research Centre determined that Coenzyme Q10 had the ability to effectively defend against UVA and mediated oxidative stress in human keratinocytes in terms of thiol depletion, activation of specific phosphotyrosine kinases and prevention of oxidative DNA damage [35]. Furthermore, Coenzyme Q10 also controls the collagenase in human dermal fibroblasts and prevents the UVA irradiation. To sum up, all the results and data indicate that Coenzyme Q10 ca n effective prevent the damage of photoaging. In the following part, Coenzyme Q10 will be analyzed. Coenzyme Q10 has an unpaired electron which is formed with another unpaired electron of free radical, to eliminate the damage of free radicals. Coenzyme Q10 presented as antioxidants and interacted with superoxide dismutase will result in increased protection from free radical damage [36]. Although Coenzyme Q10 is powerful antioxidants and prevents the free radical oxidation, it is not a panacea. Recently the scientists discovery that Coenzyme Q10 can slow down the process of skin aging. After a long time Coenzyme Q10 was used as nutritional supplement, a new ingredient for anti-aging skin care product, in 1998 Paul Gerson Unna of the skin research center has showed that the potential of Coenzyme Q10 was a multiple applications ingredient and confirmed that it could slow down tissue damage by neutralize the free radical damage. The report from Briersdorf Lab for Nivea ( first cosmetic company to well anti-aging skin care products with Coenzyme Q10) , they indicated that after six weeks of daily treatment of Coenzyme Q10 on crows feet, wrinkle depth both reduced by 27%; after ten weeks, fine lines and wrinkles reduced 43%. Based on my research from Boots, Eucerin has a almost all major cosmetic company from Japan have a product line for Coenzyme Q10. Conclusion In conclusion, this review has shown that many natural antioxidants apply to some popular anti-aging skin care products in the market. It was shown that natural antioxidants are effective ingredients for anti-aging skin care products since antioxidants can nullify the damage of free radicals. The neutralization of free radicals can prevent the skin aging process, which proves that skin care product contains antioxidants can actually prevent and slow down the process of skin aging. Several antioxidants and antioxidant plants have been chosen for analysis, namely lycopene, vitamin E, green tea, lithospermum erythrorhizon, ginseng, acai berry, Amaranthus and Chenopodium Quinoa. These antioxidants are highly effectiveaccording to previously established experimental data. Nowadays, Vitamin E has been became an essential part of skin care products. Vitamin E protects the skin structures from oxidative damage and preventing the radiation of lipid peroxidation, it also helps reduce the appearance of fine lines and wrinkles. It has great potential in anti-aging and treatment for skin problem with antioxidant activity. In previous studies, it was found that the protein content and molecular weight of tea polysaccharide conjugates are important factors that affects antioxidant activity. Chinese herbs in widely used in East Asain medicine, The anti-oxidant activity of the compounds from lithospermum erythrorhizon and compare their antioxidant effect through reducing power, tested with a rancimat and radical scavenging activity. It showed that the traditional Chinese medicinal herb could be considered as reliable natural antioxidants for food, which also could apply for anti-aging skin care. Ginseng is often used in East Asian counties as a traditional drug, the root of ginseng is the source of ginseng extract, which is rich in antioxidants. A study from Seoul National University showed the red ginseng significantly reduced facial wrinkles, it also considered as a natural skin care products for toning and helps improve the skin texture Acai berry as a antioxidant, it has the highest amounts of antioxidant than any other fruits, it help to prevent the damage to skin caused by UVA and UVB, the Omega 3, 6 9 from acai berry can help moisturize skin which also an important factor to prevent the appearance of fine lines and wrinkle. Finally, the antioxidant properties of aforementioned plants showed that they could have great applications in anti-aging and skin care. With further research, it is highly possible to even better utilize these antioxidant properties in the formulation of more advanced anti-aging products. Self assessment I believe that I have done quite a good work. I have always interested in skin care region and very enjoyed doing research and learning more about the natural antioxidants. I have done a lot research in store or online, so that I have learned some basic intergradient of the skin care products. At the beginning, it is very hard to choose variety natural antioxidant duos to there are too many natural antioxidants in the world. After some research in the store and Shoppe, I picked some ingredient from popular anti-aging products. I am pleased with the structure and the whole report. I listed and analyzed the integrants I chose. Natural antioxidant was a broad subject which can apply in many areas. I finished early so that I could check with my spelling and grammars which I considered this might be my weakness. And I could also proof read and make some more effort during the final week. And my most weaknesses which is there are not a lot journals directly link to the anti-aging skin care area, so that I had to do some research online, which it might not be enough. But it has been draw out that how anti-oxidant applies to anti-aging skin care area.

Thursday, September 19, 2019

Educational Goals and Philosophy :: Philosophy of Education Teaching Teachers Essays

Educational Goals and Philosophy There are several reasons why I want to be a teacher. One reason is that I love being around children. Another reason is that I love to see the look of amazement on child's face when they learn something new. I also love the look on their face when they discover that they can do what they just learned. During my observation, I met a little boy who had just moved back to West Virginia. This little boy is in the first grade and he has a learning disability. The class that I was observing was a special education class and I had the pleasure of helping the teacher with this little boy. The teacher thought that one of the best ways to help the little boy with his disability was to begin by playing games; we played games with flash cards, numbers, and the alphabet. The teacher asked him to spell his name with the alphabet cards, which he did, then she spread the cards out on the table and asked him to find the letter that she said. Each time he found the correct letter, his face would light up at the teachers praise. He was really excited when he found the "difficult letters". After watching the little boy I was just as excited as he was that he was doing a great job. Being a teacher would mean that I would have the opportunity to teach children new things everyday, and I would be able to share in their joy of learning. In my classroom I would use essentialism, the back to basics approach, I believe that all students should be taught the basic subjects. I would incorporate games into each subject so that the children will have fun while they learn. For example, we would play math bingo, and do crossword puzzles for reading. For science, I would have them bring leaves to class and then we could learn what type of leaf it is and what tree it came from. I think that if you make learning fun, a child will want to learn, they won't just look at it as something that they have to do. I also believe that the classroom environment contributes to the learning atmosphere.

Wednesday, September 18, 2019

Lord of the Flies Essay -- Literary Analysis, William Golding

Nature or nurture? A question frequently asked but hard to answer or prove. This is where William Golding steps in. He writes a novel about a group of schoolboys stranded on an island, fighting to survive. Instead of acting how they have been taught by society, they turn into a disaster, breaking up into separate groups, having celebrations to hunt pig, and killing each other. In Lord of the Flies, William Golding, inspired by The Coral Island and Paradise Lost, shows the true nature of human beings in a society created by children. The novel, Lord of the Flies, comes from William Golding’s personal experiences. In 1953, Golding asked his wife, Ann, if she thought it would be a good idea if he wrote a book about the mess boys with no parents would make on an island. She responded that she liked the idea, so Golding sat down and started writing his first novel (Tiger 22). As he started writing this novel, Golding remembered when he had served in the Royal Army during World War II. Those five years taught Golding what humans were actually capable and willing to do. They are also responsible for first interesting him in the evil within humans and barbarism (â€Å"Golding†). Although Golding got many of his themes from what he had witnessed, he also based his plot from a few of his previous readings. Lord of the Flies is considered to be William Golding’s response to R.M. Ballantyne’s, The Coral Island. Like Lord of the Flies, Ballantyne’s novel is based on a group of boys who get shipwrecked and end up stranded on a coral reef island. Although, in The Coral Island the boys make the best of the situation they are in and lead a happy, organized life. Golding calls his novel a â€Å"kind of black mass or realistic view of the situation† (Bu... ... ignoring his other ones. In response to this, Golding wrote the essay â€Å"Fable† to answer questions he received constantly (Wood 316). The book also â€Å"inspired two films, was translated into 26 languages, sold millions of copies, and became a standard on college and high school reading lists† (Lambert 317). Moreover, Nigel Williams, an actor produced a theatrical adoption from the book. The title of the novel was even used to name the killing or mass murder of children (Tiger 23). To sum it all up, in Lord of the Flies, William Golding shows that he believes in nature over nurture. Although his novel did receive negative reviews, it turned out to be a very successful novel. Lord of the Flies continues to be famous and studied world-wide. His wording, themes, realistic views, symbolism and writing overall continue to attract and interest more readers to his writing.

Tuesday, September 17, 2019

Local and National Provision for Swimming :: Papers

Local and National Provision for Swimming The sport I have chosen to analyse the Local and National provision for is swimming. I have competed in many "in-club" races and swam against several other clubs, this was through a continuous interest in swimming and sport as a whole. Every popular sport has to be provided for at different levels, from an absolute beginner, to international excellence. At each level, there are different coaching and training procedures, as well as the consideration of the disabled to cater for. This operation is run by the Amateur Swimming Association (A.S.A.), where rules are made official and provision is provided, which coaches and swimmers have to abide by. The A.S.A has a swimmer development program called Swim21. I quote from the website, "Swim21 provides a long overdue nationally recognised club development programme which provides clear pathways which swimmers can progress along. I'm sure the programme will go along way to helping us produce the champions of the future." The quote basically tells us that the A.S.A is very keen to produce talented swimmers into the future and do everything it can to achieve this. Swim21 also applies to disabled swimmers. At grass roots level the most important contributor to the access a young performer has to sport is usually from the school, and this is no different in swimming. As well as this many young children have available to them the opportunity of learning to swim at their local swimming facility. Henceforth, in general, once young swimmers have learned the basics, with a particular enjoyment for the sport, they have the choice to move onto competitive swimming by signing up to a club registered with the A.S.A within their area. The next stage to improving is to enter into a training program, suited for age and experience. Normally within a swimming club, there are teaching groups depending on the experience and skills they have, so that they can therefore train to become better, or train to perfect the skills the need to

Nationalism and Politics Custom Research by Essay Writers Essay

Introduction   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As the world political climate has become more complex and in some cases outright hostile, many nations have turned inward, embracing nationalism as a method of self preservation at the very least and at best, or worst depending upon one’s point of view, pitting nations against one another in competition for global political status[1].   Because of these mixtures of nationalism and politics the question of why and how justifiably nationalism has been treated with suspicion by political thinkers becomes very relevant.   In this paper, the question will be discussed and explored with real world examples where appropriate. The Roots and Renaissance of Nationalism Nationalism, in one form or another, traces its European roots back at least 200 years; most sources agree that the â€Å"modern renaissance† of nationalism can be defined as the period when the Cold War reached its apex in the early 1970s[2].   It was also during this period that nationalism became truly political in nature, as the two superpowers of the world at that time, the United States and the United Soviet Socialist Republic, each developed an intense infrastructure of national pride and protectionism while at the same time trying to advocate their respective political systems in other nations in an effort to gain allies for their war of politics and ideology[3].   With the key players in the world political game embracing nationalism in its new form, the other nations of the world, large and small, soon followed suit.   Along with the nationalism boom came suspicion of nationalism on the part of many of the world’s most keen political minds and powerful p olitical players[4]. Justified Suspicion of Nationalism   Ã‚  Ã‚   The suspicion on the part of the world’s political leaders is justified; when one takes the time to look at world history over the last century or so, painful examples of nationalism run amok abound.   Many people do not realize it, but the roots of the Nazi party, the political machine of Adolf Hitler in the Germany of the 1930’s-1940’s, was based upon a very concentrated, and in hindsight toxic, form of German nationalism[5].   In this instance, Hitler, being a charismatic speaker and power monger, used the fervor of nationalism to build a regime which ultimately claimed millions of innocent lives and hurtled the world into war for years.    Behind the scenes, one can only imagine how many more lives were shattered as a result of Nazi fervor and actions. Also, referring back briefly to the introduction of this paper, the entire communist movement which came close to launching the world into war as well, had its beginnings in the elements of nationalism and the use by powerful and persuasive leaders to manipulate the masses into a system that would ultimately take away their freedom, their hope, and in some cases, their lives[6].   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A present day example of possible nationalism and its potential to topple the political order exists in Great Britain, where sources indicate that there are forces within the government that advocate a concentrated form of nationalism, which ostensibly they maintain will give the common people more freedom, but in actuality, other sources claim, British nationalism would upset the established political order and lead to the downfall of the Crown itself[7]. What all of this represents is a potential power struggle that would likely ensue with the demolition of the traditional political order in a nation that has a proud history of resilience.   In fact, overall, the political leaders worldwide have in recent years voiced a concern that the new, more virulent form of nationalism that has emerged since the height of the Cold War is actually a social movement in disguise, used by those with a hunger for political power to burn down the established order and, in its place, put their own governments that of course have their own best interests at heart[8].   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The point that is made with these real-life examples is that the suspicion with which political leaders often view nationalism is justified.   Any system that can devour an entire people against their will and best interests needs to be viewed with a certain degree of cynicism, and utilized only with the utmost caution. Nationalism and the World Economy   Ã‚  Ã‚   Because of the close relationship between global politics and economics, the effect of nationalism on world economies is important to understand, and likewise provides solid evidence that leaders in every corner of the planet should likewise monitor nationalism from the vista of economic consequences.   Taking into consideration the previously presented examples of political chaos caused by nationalism in its present most popular form, it is not a far stretch to predict what would happen economically to accompany political upheaval.   This is especially true when the use of â€Å"reform nationalism† is used.    Reform nationalism surfaces under the premise that it will actually lead to greater economic opportunities through an overhaul of a given nation’s economy, in such forms as a revision of the tax codes, monetary policy, and the like[9].   While it ultimately is true that most cases of reform nationalism do lead to new economic opportunities, they are usually reserved for those in power, or more precisely newly in power, while the masses find themselves worse off than before.   Unfortunately, this has happened time and time again in recent times due to the often volatile power systems in some nations; classic examples in recent times include Bosnia, Serbia, and much of Eastern Europe following the collapse of communism[10] . Key Considerations   Ã‚  Ã‚   In this paper, real examples of the validity of suspicion against nationalism by political leaders has been presented, but perhaps just as importantly, the common citizen must be vigilant to make sure that their interests and rights are preserved as well, as a check and balance against the powers that exist within politics; this is true in any nation.   As the old saying goes, those who fail to learn from history are condemned to repeat it.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   References    Anderson, Benedict. Imagined Communities: Reflections on the Origin and Spread of Nationalism. Revised Edition ed. London and New York: Verso, 1991. Anton Antonowicz Analyses the Lives of John Hume and David Trimble. (1998, October 17). The Mirror (London, England), p. 9. Beiner, Ronald, ed. Theorizing Nationalism. Albany: State University of New York Press, 1999. Benner, Erica. (1995). Really Existing Nationalisms: A Post-Communist View from Marx and Engels. Oxford, Clarendon Press. Billig, Michael. Banal Nationalism. London: Sage Publications, 1995. Blair Warns of English Threat to New Britain; Let’s Stick Together: PM Blasts Right-Wing Agenda. (2000, March 28). Daily Record (Glasgow, Scotland), p. 6. Borntraeger, Ekkehard W. Borders, Ethnicity and National Self-Determination. Vienna: Baumueller, 1999. Boyce, D. George. Nationalism in Ireland. Third Edition ed. London and New York: Routledge, 1995. Brehony, K. J. and N. Rassool, ed. Nationalisms Old and New. New York: St. Martin’s Press, 1999. Breuilly, John. Nationalism and the State. Chicago: University of Chicago Press, 1985. Brubaker, Rogers. Nationalism Reframed: Nationhood and the National Question in the New Europe. Cambridge: Cambridge University Press, 1996. Bruce, Steve. The Edge of Union: The Ulster Loyalist Political Vision. Oxford, New York and Toronto: Oxford University Press, 1994. Burns, Jimmy. Barà §a: A People’s Passion. London: Bloomsbury, 1999. Carter, A. (1997). Nationalism and Global Citizenship. The Australian Journal of Politics and History, 43(1), 67+. Cottam, M. L., & Cottam, R. W. (2001). Nationalism & Politics: The Political Behavior of Nation States. Boulder, CO: Lynne Rienner. Ercegovac, P. (1998).   Competing National Ideologies, Cyclical Responses: The Mobilisation of the Irish, Basque and Croat National Movements to Rebellion Against the State.   Sydney, AU: University of Sydney. Glynn, P. (1994, August). Is Nationalism the Wave of the Future?. Commentary, 98, 42+. John McKie: Will Kilroy’s New Face of UK Politics Be Orange? (2005, February 5). Daily Record (Glasgow, Scotland), p. 13. The Making of the British. (2005, June 27). The Evening Standard (London, England), p. 67. Wheatcroft, G. (1999, June). The Making of the English Middle Class. The Atlantic Monthly, 283, 128. [1] Anderson, Benedict. Imagined Communities: Reflections on the Origin and Spread of Nationalism. Revised Edition ed. London and New York: Verso, 1991. [2]Carter, A. (1997). Nationalism and Global Citizenship. The Australian Journal of Politics and History, 43(1), 67+. [3]Brubaker, Rogers. Nationalism Reframed: Nationhood and the National Question in the New Europe. Cambridge: Cambridge University Press, 1996. [4]Beiner, Ronald, ed. Theorizing Nationalism. Albany: State University of New York Press, 1999. [5]Glynn, P. (1994, August). Is Nationalism the Wave of the Future?. Commentary, 98, 42+. [6]Cottam, M. L., & Cottam, R. W. (2001). Nationalism & Politics: The Political Behavior of Nation States. Boulder, CO: Lynne Rienner. [7]Blair Warns of English Threat to New Britain; Let’s Stick Together: PM Blasts Right-Wing Agenda. (2000, March 28). Daily Record (Glasgow, Scotland), p. 6. [8]Ercegovac, P. (1998).   Competing National Ideologies, Cyclical Responses: The Mobilisation of the Irish, Basque and Croat National Movements to Rebellion Against the State.   Sydney, AU: University of Sydney. [9]Breuilly, John. Nationalism and the State. Chicago: University of Chicago Press, 1985. [10]Ercegovac, P. (1998).   Competing National Ideologies, Cyclical Responses: The Mobilisation of the Irish, Basque and Croat National Movements to Rebellion Against the State.   Sydney, AU: University of Sydney.