Thursday, October 31, 2019

Workers in America Essay Example | Topics and Well Written Essays - 750 words

Workers in America - Essay Example As the labor movement picked momentum in the second half of the 19th century, many labor unions, like the International Typographical Union, the Knights of Labor, rapidly rose in the US (History.com Staff). Among all, the American Federation of Labor (AFL) emerged as one of the first and dominant federations of labor unions in the US (â€Å"American Federation of Labor†). The purpose of this paper is to discuss the origins, the political and social perspectives, and the major labor activities that the AFL involved in during its lifetime. By the early 1980s, over 42 international labor unions were present in the US (Jones et al. 2). However, labor unions in the US remained feeble over the years. By the late 1870s, mere 3% of the overall labor force and hardly 8% of total industrial workers possessed membership of labor unions (Simkin). In 1881, Samuel Gompers (a Dutch immigrant) and some other local leading skilled workers in specific sectors, like cigar making, carpentry, and printing, established the â€Å"Federation of Organized Trades and Labor Unions† (FOTLU) in the US (Welling). During that era, the Knights of Labor was the largest organization that included many small labor unions and it had played a vital role in some of major labor strikes of the period (â€Å"AFL†). However, the Knights of Labor’s leadership had occasionally supported its rival trade unions which had compromised for lower wages and supplied strikebreakers during other trade unions’ protests or strikes (â€Å"AFL †). The Knights of Labor enrolled even small employers as its members to chase social reform and challenge capitalist ideology. It had little interest in local labors’ issues, like wage scales, qualifications of workers, working conditions, strikes, or particular trades (Jones et al. 2-3). The Knights of Labor lost some crucial strikes which cost the union many members. Especially after the Great Southwest Railroad Strike and the Haymarket Riot of 1986, employers’ opposition

Tuesday, October 29, 2019

Contemporary Management issue (Tom's of Maine) Essay

Contemporary Management issue (Tom's of Maine) - Essay Example Business has its own ethics. Ferrell et al state that â€Å"business ethics comprises the principles and standards that guide behaviour in the world of business† (2009). This paper will examine the ethical matters that differentiated Toms of Maine from other businesses. It would examine the dominant theories that affected the way Toms of Maine and also identify the different dilemmas that Toms of Maine went through. The paper will examine the important activities that influenced the companys ethical affairs. The report concludes by making findings and recommendations on this subject. The story of Toms of Maine is such that the company started with a modest belief that was based on the views and strong beliefs of the founder and his wife that people must be more responsible for their actions and how they use natural resources. Toms of Maine was steeped in two things: humanitarianism and environmental consciousness. In terms of humanitarianism, they believed strongly that the members of the public needed to be given the proper products that would boost their health and ease their conscience. People who purchased their products felt that they were helping to promote a kind of business that is responsible. In terms of environmental consciousness, the company used operational systems that were very responsible. They were sensitive to animals and also conscious of the systems and production they had. Also, the company used popular methods like recycling and other things. There are several ethical frameworks that can be used to help in decision making and thinking before any action is taken. There are several approaches which are always applied and they can give a view of how to decide on a matter. Deontological Ethics are based â€Å"on duties and obligations that apply, for the most part, regardless of consequences† (Thompson, 2011: 54). Deontological ethics suggest that what is

Sunday, October 27, 2019

The Iron Lady Movie Analysis

The Iron Lady Movie Analysis In this paper, the writer is going to analyze a character named Margareth Thatcher in The Iron Lady movie. The Iron Lady movie is a biopic film which tells the journey of Margaret Thatchers life. Margaret Thatcher is a woman politician who has strong influence in the world. She was successful in trace the history as the first woman Prime Minister in England whom occupied that position for more than one decade. This movie shows many fluctuations in politic, economy, and social field in the arrangement of the government and society which happened in that time. Thus, it can be said that movie, one example of popular culture, is actually a cultural product which represents the societys beliefs, values, and norms. (Nachbar Lause, 1992). Williams (2010) says that there are some examples of popular culture which give a huge effect and become popular in over the world such as fashion, television, music, and movie. It can affect both positively or negatively. The writer choose Margareth Thatcher as the object of the writers study because the writer wants to reveal that in the past time even in recent days women are oppressed in a political field, they have not been given chances to show their ability to lead the society. However, Margareth Thatcher shows her ability to carry out the Britains government. Margareth Thatcher was born on October 13, 1925, in Grantham, England. She is the daughter of a local businessman who was introduced to conservative politics by her father, a member of the towns council. When she was in university, she served as a president of the Conservative Association. Two years after she graduated from her college, she accepted to work for public office. She ran as the conservative candidate for a Dart ford parliamentary seat in the 1950 elections. She was elected to be a leader of the Conservative Party in 1975. She served as the prime minister of England from 1979 to 1990. As a prime minister, she battled the countrys recession by initially raising interest rates to control inflation. She can run the country quite well marked with some progression that has been occurred in that time. Moreover, she shows her valor when she accepted to be the first female Prime Minister in England by a lot of contradiction come from the government and the society. Besides, she i s an inspiring leader for the writer. She exemplifies how a woman leader in reality ought to behave. The writer will discuss this character using the perspectives of women stereotype, oppression, and movement in accordance to Marxist feminism theory. The theory separates men and womens power in social and economic field. It also talks about power inequality between men and women in a society. From the film, Margareth Thatcher shows her desire to have the same right, chance, and position in the society where in that time women were usually been oppressed by the men. Therefore, the writer chooses to use this theory. Having considered the above facts, therefore the writer proposes a study entitled Feminism Analysis in Phyllida Lloyd (2011) Iron Lady Movie: A Study of Women Stereotype, Oppression, and Movement. Field of the Study This study belongs to both Literature and Film Studies. Scope of the Study This study will put limitations on what is going to be analyzed as follows: The writer will analyze the feminism side of a character in The Iron Lady movie, Margareth Thatcher, using Marxist feminism theory. The writer will analyze the cinematographic visualization in the film which confirms women stereotype, oppression, and movement towards the character. Problem Formulation / Research Questions This research aims to answer the following question: What are women stereotype, oppression, and movement which are defined in the film? What are the perspectives of women stereotype, oppression, and movement according to Marxist feminism theory? How does the cinematographic visualization in the film confirm women stereotype, oppression, and movement from the perspective of Marxist feminism? Objectives of the Study This research is conducted to achieve this objective: To reveal the women stereotype, oppression, and movement in the film. To define the perspective of women stereotype, oppression, and movement according to Marxist feminism theory. To show the cinematographic visualization in the film which confirms women stereotype, oppression, and movement from the perspective of Marxist feminism. Significance of the Study The writer conducts this research to inform the readers about what was going on in the past time toward women in England who were been oppressed by the men. Moreover, the writer also wants to give her assumptions and criticism concerning to the gender stereotype which happens in the society nowadays. Definitions of Terms To prevent misunderstandings towards this study, the writer will give some definition of terms which are related to this study. Film: Film is another word that means different things in different contexts: roll film, stock, a film, to film. We were all exposed to some kind of film before we saw our first example of classic moviemaking. It may have been something we saw on television: a cartoon, a Three Stooges short, a Lassie rerun. Or perhaps it was an educational film we saw in school or a theatrical film (a film intended to be shown in movie theaters). (Anatomy of Film, Bernard Dick, 1978, pp.1-2) Marxist feminism: Marxist feminism is organized around the basic conflicts between capitalism versus patriarchy and class versus gender oppression. Marxist feminism combines the study of class with the analysis of gender. (Feminist Theory and Literary Practice, Deborah L. Madsen, 2000, p.65) Stereotype: Stereotype is fixed ideas about individuals, groups or objects. Stereotypic thinking about sex-role related personality features is pervasive. Desirable features assign men to form a competence cluster, while womens features form a warmth-expressive cluster. (Broverman, 1972, as cited in The Dictionary of Feminist Theory, Maggie Humm, 1995, pp.277-278) Oppression: The experience of oppressed people is that the living of ones life is confined and shaped by forces and barriers which are not accidental or occasional and hence avoidable, but are sys ­tematically related to each other in such a way as to catch one between and among them and restrict or penalize motion in any direction. (Oppression and the Use of Definition, Marilyn Frye, p.3) Political movement: The activities about someone during a particular period of time or a group of people who works together to advance their shared political ideas. (Oxford Dictionaries Online) Cinematographic visualization: The essential techniques, methods, and elements people use to tell the story. (Cinematography Theory and Practice: Image Making for Cinematographers and Director, Blain Brown, 2011, p.3) Review of Literature There are some theories that can support the writers research, they are: Feminism in European Politics The difference between struggling classes and the ruling classes in Marxist teaching has clearly led each class to do social struggle. However, when we are speaking about gender roles in such a stratified society, the class struggle is simply a cause to gender stereotypes and exploitation. (Madsen, 2000) Gender stereotypes is actually a set of values of being proper and improper to be done by a woman which is functioned as a limitation These values often create an unfriendly environment or even such condition for women to take part in legal and social functions. Furthermore, it supports a condition that womens rights are susceptible to violation. There are many kinds of stereotypes and several reasons of stereotypes. According to Cook Cusack (2010, pp.25-28), there are three kinds of stereotypes, they are sex stereotypes, sexual stereotypes, and sex role stereotypes. Sex stereotypes, are supposedly based on the physical or biological differences. Sexual stereotypes are those based on the perceived characteristics that play a role in sexuality, including, for example, sexual initiation, intimacy, possession, and objectification while sex role stereotypes describes a normative or statistical view regarding appropriate roles or behavior for men and women. Josephson (2005) in her book Gender and American Politics: Women, Men, and the Political Process: Tolleson-Rinehart explains the examples of discrimination among women and men government workers in western legal system. She says that among others, women usually suffer in terms of peoples trust, media coverage, and self-inconfidence from their male counterparts. Based on Gelbs theory of feminism and politics: a comparative perspective (1989), there are two kinds of feminist movement in power-seizing political fields, they are the reformists and radicals. Both of them move based on their own ideology of how women should be participating in such conditions. According to Jonasdottir (1994), oppression based on gender stratification is similar to Marxist class division where the gender woman has been named as the second gender. Thus it makes women are vulnerable to discriminate based on what Marxism defines as materialistic and economic value. The conceptual tools of cinematography Blain Brown (2011, p.3) in his book Cinematography Theory and Practice: Image Making for Cinematographers and Director says that the tools of cinematography and filmmaking actually discuss the essential techniques, methods, and elements that we can use to tell the story. Some elements in cinematography visualization which can be used to support this study are camera angles, shot sizes, and techniques of framing. According to Bernard Dick, a shot is simply what is recorded by a single operation of the camera. He also states that it can also be defined in terms of distance. (1998, pp.36-37). In other words, shot is a matter of subjects size or amount in the frame. It embodies five types; they are close up (CU), extreme close up (ECU), long shot (LS), extreme long shot (ELS), and medium shot (MS). He also says that shots are also defined by the position of the camera in relation to the subject or what do we known as angle. It is determined by where the camera is placed. There are four types of angle; they are birds eye view, high-angle (h/a), low-angle (l/a), and oblique-angle. In framing techniques, there is a rule called rule of thirds. Rule of thirds is a guideline which applies to the process of composing visual images such as paintings, photographs, and designs. It proposes that an image should be imagined as divided into nine equal parts by two equally-spaced horizontal lines and two equally-spaced vertical lines, and that important compositional elements should be placed along these lines or their intersections. When we are photographing or filming people, it is common to line the body up with a vertical line, and having the persons eyes in line with a horizontal one. (2012, Rule of Thirds,  ¶.1). Method of Data Collection Analysis Method of Data Collection The writer uses film as the instrument of this study, documentary research as the technique to conduct this research and qualitative approach to analyze the object. The writer chooses such technique and approach because the writer wants to analyze the object in depth. Method of Data Analysis Thus far, the writer has done watching the movie and collecting the data. The writer has used library and internet resource to assist completing this research.

Friday, October 25, 2019

Essay --

Behavioural Biases of Individuals/Analyst Traditional finance perspective theorist believes that individuals who have will to venture into investment activities does not allow their emotions to be guided by how investment information is presented to them. However, the same cannot be said for the behavioural finance perspective. Through psychological studies, researchers of behavioural finance have come to the understanding of how human behaviour and behavioural finance connected. This connection can create behavioural biases which can positively or negatively impact on the growth of investment opportunities. This research is on behavioural biases is categorized into two specific groups, cognitive errors and emotional biases. Cognitive Errors Cognitive errors are seen as basic statistical information processing, or memory errors that cause the decision to deviate from rationality. This may involve incorrectly updating or overlooking the prospects of investment information, which can be pertinent to growth of an investment. Additional, Cognitive errors are separated into two classifications types; Belief Perseverance and Information Processing Biases. Belief perseverance, with is relative to cognitive dissonance, is the mental discomfort that humans experience when recent information can contradict the previously held one. Information processing biases are considered as processing errors that are used irrationally in financial or investment decision making. Belief perseverance is spread across five sections; conservatism, confirmation, representation, illusion of control and hindsight. Conservatism is when individuals fail to incorporate new information as it becomes available, and continues to maintain their existing fore cast. Inve... ...s doing nothing to make positive changes to an outcome. This occurs when person are accustom to the way situations are. The endowment bias is where individuals place a greater value on an asset that they own than one that they do not own. This is, an individual may want to purchase a valuable item for less than it is being offered for, however, if they receive the purchase they will value it higher than the original asking price. The avoidance of decision making due to the fear of unfavourable decision outcomes is called regret-aversion. This consists of two types; error of commission and error of omission. Error of commission is when there is fear of taking an action whereas; error of omission is the fear from not taking an action. Here investments tend to be over conservatively made and there in more comfort in doing what the other players in the market are doing.

Thursday, October 24, 2019

Case 1.12:Madoff Securities

Case 1. 12: Madoff Securities Questions: 1. Research recent developments involving this case. Summarize these developments in a bullet format. 2. Suppose that a large investment firm had approximately 10 percent of its total assets invested in funds managed by Madoff securities. What audit procedures should the investment firm’s independent auditors has applied to those assets? 3. Describe the nature and purpose of a â€Å"peer review. † Would peer reviews of Friehling & Horowitz have likely resulted in the discovery of the Madoff fraud? Why or why not? 4.Professional auditing standards discuss the three key â€Å"conditions† that are typically present when a financial fraud occurs and identify a lengthy list of â€Å"fraud risk factors. † Briefly explain the difference between a fraud â€Å"condition† and a â€Å"fraud risk factors,† and provide examples of each. What fraud conditions and fraud risk factors were apparently present in the Mad off case? 5. In addition to the reforms mentioned in this case, recommend other financial reporting and auditing-related reforms that would likely be effective in preventing or detecting frauds similar to that perpetrated by Madoff. Answers: 1.Recent developments involving the case Madoff Securities: †¢Bernie Madoff’s son, Mark Madoff committed suicide on December 11, 2010. His suicide may have been influenced because there was an investigation on Mark’s children on grounds that Bernie transferred funds to their accounts. †¢Peter Madoff pleaded guilty to his involvement in the Ponzi scheme run by his brother. Peter Madoff served as the chief compliance officer. †¢Irving Picard, the trustee in charge of liquidating Madoff’s assets, has asked a New York court for approval to distribute an additional $1. 5 billion to investors who lost money in Madoff’s fraudulent investments.It is estimated that Picard has already recovered $9. 1 billion but has only been able to distribute $1. 1 billion so far. †¢In May 2010, about 720,000 Madoff investors outside the United States settled with their banks, receiving about $15. 5 billion in all, according to law firms representing them. †¢In June 2012, the Supreme Court said it would not take up a dispute over how the claims of victims of Mr. Madoff’s huge Ponzi scheme should be calculated. Without comment, the high court declined to hear an appeal from lawyers for investors who got back all the cash they had invested with Mr.Madoff before his December 2008 arrest. 2. If a large investment firm had approximately 10 percent of its total assets invested in funds managed by Madoff Securities, the audit procedures that the firm’s independent auditors should look very closely are some procedures that will help the auditor to identify inherent and control risks that contribute to misstatements in balance sheets. He/she should make sure that the detection risk is as lo w as possible and the key transactions are confirmed for its accuracy.By addressing issues of materiality, the auditor will eliminate misstatements to overstate the investment on the balance sheets. PCAOB AU Section 329A states that understanding financial relationships is essential in planning and evaluating results of analytical procedures and generally requires knowledge of the client industry. The auditor, by understanding the nature of the business can identify and categorize the types of risk that can be assessed. The auditor will have to do research about the business and how transactions are handled and processed.Knowing about the client’s business the auditor will better obtain sufficient, reliable, and relevant evidence to achieve his audit objectives. Analytical procedures are used as a substantive test where the auditor considers the level of assurance he/she wants from the substantive test for audit objective. The independent auditor main goal is to be able to es tablish the accuracy of major accounts and confirm that the assets the firm has recorded actually exist. For instance, the auditor should to take key transactions of the assets and make sure that those transactions are accurate and recorded properly.Also he may conduct bank reconciliations on pertinent accounts to make sure no discrepancies or misstatements are found. The auditor should also perform vertical and horizontal analysis for the income statements and balance sheets by the use of ratios. Moreover, the auditor should preform test for effectiveness of internal controls. He may interview management by asking questions on the process of the transactions and operational activities. He may discuss with management the process of some transactions from beginning to end and then test it by using sample testing.Also he/she should make sure that there is proper control of activities; policies and procedures for adequate segregation of duties are met. 3. A peer review is a process of subjecting research methods and findings to the study of others who are experts in the same field. The purpose is designed to prevent dissemination of irrelevant findings, unwarranted claims, unacceptable interpretations, and personal views. It relies on colleagues that review one another’s work and make an informed decision about whether it is legitimate, and adds to the large dialogue or findings in the field.A peer review of Frieshling & Horowitz would result in the discovery of the Madoff fraud because questions would have been raised about the resource capability of the firm to handle such a large account given that it only had one accountant. Moreover, the Standards for Performing and Reporting on Peer Reviews Section 1000 states that purpose is to provide standards for administrating, planning, preforming a good monitoring of the CPA firm’s accounting and auditing practice to promote good quality to serve the public interest. 4.The SAS 99 describes three conditi ons of fraud: incentives/pressures to commit fraud, opportunities that circumstances provide opportunities to commit, and attitudes/rationalizations which is an attitude, a character or set of ethical values exists that allows management or employees to commit dishonest act. Some of the fraud risk factors in Madoff Securities case include: Incentives/Pressures Greenness- Madoff always wanted more. He wanted to maintain a rich lifestyle for him and his family, as well as to stay as one of the top investment firm.Opportunities Madoff firm did not have proper monitoring controls as well as the ineffective accounting system, internal audit and information technology staff. Attitudes/Rationalizations No one understood his strategy; no one could communicate with him about investments SAS 99 requires the auditor to assess whether fraud risk factors exist. Fraud risk means that the likelihood of committing the fraud is high. For instance based on case some of fraud risk factors are: †¢ high degree of competition or market saturation, accompanied by declining margins. assets, liabilities, revenues, or expenses based on significant estimates 5. Other reforms recommended are for the victims of the fraud would be that the victims need to be more aware of whom they are investing their money with. The victims should perform more research the company in which they would like to invest their money. They should ask them self-questions if the business owner has a good reputation, is he/she have a criminal record, and if he/she has experience in operating a business. Also, today the economy is hard and if a return on an investment seems too good to be true probably here is something wrong going on (fraud class, prof. Edward Mann). Moreover, the other ways that would effectively prevent or detect fraud similar to Madoff are: †¢organizing the enforcement division that will monitoring unusual investment returns, †¢improving fraud detection procedures for examiners, â € ¢recruiting staff with specialized experience, †¢expanding and targeting training to improving internal controls procedures, †¢introduce firms with whistleblower program †¢increasing educational request for specific licenses †¢oversight management and employees

Wednesday, October 23, 2019

Product outsourcing to Far East Enterprises Limited

In management accounting the premise of relevant costing is applied in order to evaluate business decisions. Such costing premise implies that only incremental costs and revenues pertinent to the decision at hand are considered. Past costs, commonly known as sunk costs and/or unaffected costs are irrelevant to the decision-making process. Therefore the calculations computed in Appendix A of this Report abide with the relevant costing principle noted in this paragraph.At face value, the agreed price with FEE of $395 per unit is lower than the total manufacturing costs per unit of $425. However, before rushing into any drastic conclusions it is imperative to consider the relevant costs and revenues. Further more, in this case, a particular time frame ought to be set up, because FEE is requesting a two-year contract with the company. Therefore the relevant costs and revenues have to be computed on a two-year basis.Upon assessment of the incremental costs and revenues on the two year per iod, it is outlined in Appendix A that an Incremental Loss of $8,929,280 will occur if the company appoints FEE as its supplier for this particular product. Thus it is more financially viable to make the product rather than purchase it from a supplier. The reason behind such a loss mainly rests because the buy decision will be unable to affect the general company overheads, in which a substantial portion is allocated to the GPSN Model.

Tuesday, October 22, 2019

Alibrandi VS Clueless essays

Alibrandi VS Clueless essays The opening scene for both movies told me straight away what each film was about. Clueless opened with a party and the main character (Cher) explaining her life and telling me what her life was about; parties, clothes, friends, relationships etc . And with the music, it told me that this movie was an American movie and wouldnt have big problems that some teenagers go through in life. Which it didnt. Now Alibrandi open with the song dinta rella di luna, which is an old Italian favourite. The scene was Josie, the main character, cutting tomatoes for the sauce, like most Italians do. And Josie also explained her life as an Italian. Which she wasnt to pleased about, especially when she saw her relatives dancing to the old song. The opening scene told me that this film wouldnt be like most teen films because it related to me more and to other teenagers more. Both of these films have Narrators; Josie for Alibrandi and Cher for Clueless. Cher speaks in an upbeat voice like shes always happy. But Josie on the other hand speaks in a downbeat voice, it almost sounds like shes bored and even when shes happy she sounds sarcastic. Image wise, the characters are completely different. When I first saw Cher she was looking for something to wear, on the computer! Which told me straight away that she was rich and that she was in the popular group of the school. I knew that because all American teen movies are the same. When I saw Josie, for the first time, she was cutting tomatoes. She wasnt well dress. And when I saw her house I could tell that she wasnt a millionaire. But she had a big family that loved her. The father figure is in all teen movies, because it can add twists and turns to a story. Because as a stereotype the fathers, in most stories, are the ones who go to work and put food on the table as to say. In Chers case it does, but in Josie case there ...

Monday, October 21, 2019

Iliad essays

Iliad essays Nine years after the Trojan War, the Greeks capture and rob a town allied with Troy called Chryse. The Greeks capture a pair of slaves named Chryseis and Briseis during this battle. The leader of the Greeks, Agamemnon, takes Chryseis as a prize, and the greatest Greek warrior Achilles takes Briseis. Apollo is prayed to by Chryses (father of the slaves) for the return of his daughters and sends a plague to the Greek camp. Agamemnon tries to find out the cause of the plague so he contacts the prophet Calchas. He finds out that Chryseis was the cause so he gives up his slave and takes Briseis from Achilles. Achilles becomes angered with this action and refuses to fight in the war. He strongly wishes that the Greeks become destroyed and ask his mother Thetis (sea-nymph) to enlist the services of Zeus (king of Gods). The Trojans and Greeks cease fire with each other but the Trojans breach the treaty so Zeus came to their assistance. Now the Greeks suffered greatly without the support of Zeus and Achilles refusal to fight. Also the great Greek warrior Diomedes proved fruitless. Some major battles occur for several days including Hector and Ajax, and Paris and Menelaus. The Greeks were forced back by the Trojans to protect their ships. Greeks get some hope when one night Diomedes and Odysseus get information about the plans of the Trojans. The next day several Greek commanders become wounded and the Trojans break through the Greek ramparts advancing all the way to the boundary of the camp and setting fire to a ship. Greeks felt that defeat was coming on because they would be stranded at Troy without the ships. Meanwhile, Achilles showed concern for his fellow Greeks and agreed to a plan by Nestor that allowed Achilles good friend Patroclus to go in his armor to battle for him. The presence of Patroclus proved helpful for the Greeks since the Trojans were pushed away from the ships and back to the city wall s. Hector soo...

Saturday, October 19, 2019

Big Data for Fraud Detection in Banking Sector - Free Samples

The detection of fraud in banking sector is an important part to eliminate risks of any cyber-attack or data breach. Banks are often vulnerable to fraud and this affects banks and customers (Flood, Jagadish and Raschid 2016). Most of the frauds in banking sector occur due to either human negligence or any malpractice or system defect. Frauds in banking sector impact customers and bank itself in a very negative way because both banks and customers can lose sensitive data and money. Nowadays, big data analytics has emerged as a game changer in every sector and it provides a more reliable and flexible usage in working of every sector (Fuschi and Tvaronavi?ien? 2014). Banking sector has now started to adopt big data analytics for its operations due to its usefulness, reliability and speed. The purpose of this report is to analyze big data use in banking sector and how big data analytics help banking sector to detect fraud. The outline of the report is data collection and storage system, consumer-centric product design, r mendation system and business continuity plan in case of power outage. The data in banking sector collected are credit card usage details, personal emails sending and receiving or account details or any other regular actions on a daily basis. The data collected are not only from internal source of banking sector but also from external sources which sometimes requires permission from third party. These sources are internet based navigation sites such as social media, Yahoo, Google or Bing. Google and Yahoo provide Gmail and Yahoo mail respectively (Srivastava and Gopalkrishnan 2015). The data are categorized into two types and they are primary data and secondary data. Primary data are information about employees, their head supervisors, managers, senior managers and customers, which are collected for proper functioning of banking sector. Secondary data are information of internal and external behavior and working of banking sector which are collected for different purposes and used for betterment of banking sector (Kim, Trimi and Chung 2014). Both types of data are in the form of structured, semi-structured or unstructured data. Therefore, they are arranged in orderly manner to access and operate easily on each form of data. The data in banking sector are unstructured data mainly and they are plicated to use in its initial form. Big data deals with this type of data and in banking sector, unstructured data are either machine or human generated. Machine generated unstructured data are scientific data or photographs and videos such as security or surveillance photos or images. Human generated unstructured data are internal texts within document files, logs, credit card or debit card details and emails, and website content (Raju, Bai and Chaitanya 2014). The data collection is through various sources are then mined that is data mining is done on the collected data. Data mining is exploring and analyzing of collected data to find data suitable for different purposes in banking sector. Data mining technique is used for five major categories of banking sector. They are customer retention, automatic credit card approval, fraud detection in banking sector, marketing and risk management. Data after data mining is used mainly for risk management and fraud detection in banking sector (Pouramirarsalani, Khalilian and Nikravanshalman 2017). This is explained as when data is stored in storage then big data has features of protecting thes e data from going into hands of fraudsters. Banks have massive amounts of data which needs to be stored in an efficient way. The new storage systems in banking sector for big data provides solutions and they are reconstructing the backup systems with improved performance that will not change the existing backup routine. The second solution is building a Disaster Recovery (DR) system that will help in an emergency case such as disaster or power outage. The third solution is managing data lifecycle for improvement of data utilization efficiency (Chitra and Subashini 2013). The explanation for first solution is to upgrade physical tapes from existing Disk-to-Tape (D2T) mode to the new Disk-to-Disk-to-Tape (D2D2T). The new tape provides more reliability and space to store data of size more 9TB and has high backup speed. The description of second solution is new Disaster Recovery system which is built after upgrading local backup system using tape. The Disaster Recovery system is used for storing data at different location in banking sector. The full back up in first solution using tapes is further stored in storage system that is Disaster Recovery system (Jones, Aggarwal and Edwards 2015). The storage is done by identifying unique blocks of huge data and store in Disaster Recovery system. The next backup is done to match the unique block with the blocks stored in the system to destroy duplicate data and then save all unique data. The leftover data is again checked so that no data is left vulnerable to any fraud. The left over data is also checked to analyze if any data can be effective for future purpose. The third solution is that the data is processed and stored on peripheral system and near-line data (twenty to thirty days old) is backed up regularly and stored on disks (Rao and Ali 2015). These data is tested for integration and effectiveness and to recover if any fault occurs. The long- term data (ninety days old or older ) is backed up regularly and stored on physical tapes. Both the data is then stored at different locations in Disaster Recovery system. This new storage system solution helps in better backup performance, recovery process is quick, and data storage is multi-level. The long-term relationships with customers will require fulfilling demands and needs of customers. This is achieved through customer relationship management (CRM) systems. Customer relationship management is used by organizations to optimize contact with customers and build long-term relationships (Elgendy and Elragal, 2014). The various ways are telephone calls or emails to attract and retain customers. Customer relationship management system is based on infrastructure of customer data and information technology. Electronic customer relationship management systems provides all ways of munication with the customers. The ways are sales, delivery, email, online marketing and purchasing, online banking or many other online services. Customer relationship management system in banking sector is achieved by maintaining relationships with existing customers and creating relationships with new customers (Dalir et al. 2017). The benefits are providing better service to existing and new custom ers and identification of specific values related to each sector of the business environment and existing or new customers. The other are dividing different market segments to improve long-term relationships with target customers and service fees which is charged increases revenue for banking sectors. The additional benefits are implementation of this system helps in increasing customer satisfaction and their loyalty and interest rates are increased to attract more customers (Baesens, Van Vlasselaer and Verbeke 2015). The seventh one is online advertising to attract customers and increased effectiveness and classification of customers. Electronic customer relationship management system in banking sector has a structure which is based on two factors and they are trust and satisfaction. They are mitment, loyalty, customer retention, and r mendation willingness. The other factors which construct the system through customer’s point of view are information, convenience and munication channel (Srivastava and Gopalkrishnan 2015). Trust is important for customers and bank relationship and the trust is referred to protection of every individual’s bank account details and credit card or debit card details. Customer satisfaction is a quality in bank and customer relationship that will help them to trust on banks. Customer satisfaction in bank is very important to retain existing customers. mitment is to partner close relationship with customers for valuable effort. Loyalty provides future benefits to banking sector even when there is a strong petition (Moro, Cortez and Rita 2015). Loyalty is a mitment to banks f rom customers to deal with them. Loyal customers will also r mend particular banks to their relatives or customers. Customer retention is important as exiting customers are more profitable than new customers. Therefore, fulfilling needs of existing customers is more important. The above factors help customers to willingly r mend services of bank to others as they are satisfied with services of bank. Information is correct, accurate or updated are not is necessary for the structure of the system. Convenience is important as customers will e after considering location of bank (Greenberg 2014). Geographic location of bank with working hours and others are included in the system. munication channel like mobile, ATM, text, e-mail are used by customers to know bank services. R mendation system is used as a tool in banking sector to help customer by giving service when bank employees are not available on a particular time. R mendation system provides precise and timely information to customers. The system is virtual consultant to customers providing better information and services (Ravi and Kamaruddin 2017). The r mendation system can be explained by the following process. The system analysis provides specifications that are authenticated with username and password for logging into system and questionnaire type survey for the user regarding product interest. The next two specifications are giving advice to user after the pletion of interview and when there is query regarding search engine, explanation term should be there in the search engine (Lin et al. 2015). The last two specifications are to provide answers by the expert to questions by the customer and also update the knowledge base in system (Davenport and Dychà © 2013). The system design contains human expert, knowledge acquisition facility, knowledge base, inference engine, working memory, user interface and the user. This is the system bank follows in r mendation system. R mendation system is tested using black-box and white-box testing to know that the system is properly functioning and also integrated (He, Tian and Shen 2015). The testing is also done to ensure satisfactory working of every feature. The testing is done on the database so that the data can be accessed with respective attributes and required data can be fetched. The application is important in r mendation system because it provides a platform for direct munication of user and banking sector (Ng and Kwok, 2017). This is a place where user can register and then they can login with username and password. This is a place where user can get details about banking process in about us section and also contact details of bank in contact us section. The system design is implemented in application and the working of system structure is defined in application. These are the features and functions of r mendation system and this helps in clearing customer’s doubts and queries. The customers can also give feedback in r mendation system (Flood, Jagadish and Raschid 2016). The r mendation system in banking sector are developed using information system and are also called expert system in other sectors. Survival of online business in case of power outage or any other disasters is a major discussion for any banking sector. The business continuity plan has four steps in banking sector and they are business impact analysis, risk assessment, risk management and monitoring and testing. The first step is business impact analysis that helps to identifies critical business functions and impact of loss of functions for example operational and financial on banking sector. This process is analyzed by senior management representatives and board of directors. The business impact analysis is required at times when there is disruption in power outage and any disaster (Harvard Business Review, 2017). The second step is risk assessment which helps to determine cause of power outage or other disasters. Senior management analyzes the risk through risk assessment processes and then develop program to tackle the risks. The third step is risk management which is important to develop and maintain business continuity plan in baking sector. Risk Management in banking sector is based on first two steps that is business impact analysis and risk assessment (West and Bhattacharya 2016). These realistic events can be formally declared and updated by senior management annually to employees in banking sector. The fourth step is monitoring and testing which is a confirmation to business continuity plan in banking sector that all the steps are revised and evaluated without overlooking any significant changes. This step is finally evaluated by senior bank management (Forbes 2017). This is when they can mit necessary workforce, budget and time to test the program for validation of business continuity plan in an event of any disruption in banking sector. The above discussions conclude that fraud detection in banking is a very important process and big data analytics is used in banking sector for fraud detection techniques. The discussions shows that the data collection system in banking sector is plicated as there are huge data sets in banking sector. The data collected need to be stored in places where there is security and proper storage place to be chosen. The actions to be taken on collected data that is services to customers and system to r mend customers are also discussed. The business continuity plans on the basis of possible disruptions were the key points of this report. The report overall concludes that implementation of big data and big data analytics is necessary for banking sector. Big data and big data analytics are used to collect data and store and finally use for various purposes in banking sector. Banking sectors regularly produce huge data that are sensitive and can be controlled through big data and big data anal ytics. Therefore, it can be concluded that big data and big data analytics can help banking sector to detect fraud and prevent the risks of fraud using various processes. Baesens, B., Van Vlasselaer, V. and Verbeke, W., 2015.  Fraud analytics using descriptive, predictive, and social network techniques: a guide to data science for fraud detection. John Wiley & Sons. Chitra, K. and Subashini, B., 2013. Data mining techniques and its applications in banking sector.  International Journal of Emerging Technology and Advanced Engineering,  3(8), pp.219-226. Dalir, M., Zarch, M.E., Aghajanzadeh, R. and Eshghi, S., 2017. The Role of e-CRM in the Quality of Customer-Bank Relationship.  Human Resource Management,  4(2), pp.12-22. Davenport, T.H. and Dychà ©, J., 2013. Big data in big panies.  International Institute for Analytics,  3. Elgendy, N. and Elragal, A., 2014, July. Big data analytics: a literature review paper. In  Industrial Conference on Data Mining  (pp. 214-227). Springer, Cham. Flood, M.D., Jagadish, H.V. and Raschid, L., 2016. Big data challenges and opportunities in financial stability monitoring.  Banque de France, Financial Stability Review,  20. Flood, M.D., Jagadish, H.V. and Raschid, L., 2016. Big data challenges and opportunities in financial stability monitoring.  Banque de France, Financial Stability Review,  20. Forbes . (2017).  Forbes We e. [online] Available at: https://www.forbes /sites/tomgroenfeldt/2013/06/11/banks-use-big-data-to-understand-customers-across-channels/#22286a453218 [Accessed 9 Dec. 2017].  Ã‚  Ã‚  Ã‚  Ã‚   (Forbes , 2017) Fuschi, D.L. and Tvaronavi?ien?, M., 2014. Sustainable development, Big Data and supervisory control: service quality in banking sector.  Journal of security and sustainability issues,  3(3), pp.5-14. Greenberg, M.R., 2014.  Protecting seniors against environmental disasters: From hazards and vulnerability to prevention and resilience. Routledge. Harvard Business Review. (2017).  How Banks Are Capitalizing on a New Wave of Big Data and Analytics - SPONSOR CONTENT FROM COGNIZANT. [online] Available at: https://hbr.org/sponsored/2016/11/how-banks-are-capitalizing-on-a-new-wave-of-big-data-and-analytics [Accessed 9 Dec. 2017].  Ã‚  Ã‚   (Harvard Business Review, 2017) He, W., Tian, X. and Shen, J., 2015. Examining Security Risks of Mobile Banking Applications through Blog Mining. In  MAICS(pp. 103-108). Jones, S., Aggarwal, A. and Edwards, H., 2015. Creating Futures Through Research–Meeting Challenges, Embracing Opportunities & Delivering Impact. Inaugural Collaborative Research Conference, INtel Institute of Higher Education, Nairobi. Kim, G.H., Trimi, S. and Chung, J.H., 2014. Big-data applications in the government sector. munications of the ACM,  57(3), pp.78-85. Lin, C.C., Chiu, A.A., Huang, S.Y. and Yen, D.C., 2015. Detecting the financial statement fraud: The analysis of the differences between data mining techniques and experts’ judgments.  Knowledge-Based Systems,  89, pp.459-470. Moro, S., Cortez, P. and Rita, P., 2015. Business intelligence in banking: A literature analysis from 2002 to 2013 using text mining and latent Dirichlet allocation.  Expert Systems with Applications,  42(3), pp.1314-1324. Ng, A.W. and Kwok, B.K., 2017. Emergence of Fintech and cybersecurity in a global financial centre: Strategic approach by a regulator.  Journal of Financial Regulation and pliance,  25(4), pp.422-434. Pouramirarsalani, A., Khalilian, M. and Nikravanshalmani, A., 2017. Fraud detection in E-banking by using the hybrid feature selection and evolutionary algorithms.  IJCSNS,  17(8), p.271. Raju, P.S., Bai, D.V.R. and Chaitanya, G.K., 2014. Data mining: Techniques for enhancing customer relationship management in banking and retail industries.  International Journal of Innovative Research in puter and munication Engineering,  2(1), pp.2650-2657. Rao, K.V. and Ali, M.A., 2015. Survey on Big Data and applications of real time Big Data analytics. Ravi, V. and Kamaruddin, S., 2017, December. Big Data Analytics Enabled Smart Financial Services: Opportunities and Challenges. In  International Conference on Big Data Analytics  (pp. 15-39). Springer, Cham. Srivastava, U. and Gopalkrishnan, S., 2015. Impact of big data analytics on banking sector: Learning for Indian banks.  Procedia puter Science,  50, pp.643-652. Srivastava, U. and Gopalkrishnan, S., 2015. Impact of big data analytics on banking sector: Learning for Indian banks.  Procedia puter Science,  50, pp.643-652. West, J. and Bhattacharya, M., 2016. Intelligent financial fraud detection: a prehensive review. puters & Security,  57, pp.47-66.

Friday, October 18, 2019

Maternal mortality Essay Example | Topics and Well Written Essays - 1750 words

Maternal mortality - Essay Example The excessive loss of blood causes the deficiency of both oxygen and nutrients to such vital organs of the body as the brain thus causing instantaneous deaths. Causes of the excessive bleeding include tearing of the uterus walls, poor contraction of the uterus and poor blood clotting. Postpartum infections on the other cause more than 10% of the reported maternal mortalities. Postpartum infections refer to any bacterial infections of the female reproductive tract after childbirth. Among the notorious risk factors of the infections are the cesarean section, prolonged labor, the presence of such bacteria as group B streptococcus in the reproductive organ and premature rupture of the membranes of the uterus among others. Complications arising from unsafe abortions cause more than 15% of the reported cases of maternal mortality. The complications are always as diverse as the techniques that people use to procure abortions. In most countries, abortion is an illegal practice a feature that compels pregnant women to seek the services of quacks especially in such developing countries as India. Most women die from excessive bleeding and infections among other complications arising from unsafe nature of the procedures. The prevalence of maternal mortalities in India represents the gap between the rich and the poor since most of the reported cases occur in the impoverished neighborhoods and are minimal among the rich. Furthermore, they portray the inequalities that exist in accessing high-quality health care services.

Compare and contrast a peer-to-peer and client server networks Essay

Compare and contrast a peer-to-peer and client server networks - Essay Example Therefore, while using the client-server network, it remains customary to purchase a computer that would be used as a server. The server software’s cost is another disadvantage of the client-server network. In fact, establishment of the client-server networks sometimes proves so expensive that choosing this option seems like an uninformed decision. Nevertheless, the structure of the client-server network offers different kinds of powerful administrative tools that are specifically useful when security becomes an issue. On the other hand, peer-to-peer networks are cost effective to develop as there is no need of a high-end machine to serve as a server. Likewise, while using peer-to-peer networks, there is no need of special client licenses or server software. All that is required to efficiently use the peer-to-peer network comes with the Windows 95. Because of this affordability, peer-to-peer networks become quite suitable for use in small businesses or for the domestic users. However, security is sacrificed in the use of peer-to-peer network since the control of network lies in the hands of the end users, which makes it unsuitable for the high-security

Data Mining Research Paper Example | Topics and Well Written Essays - 1250 words

Data Mining - Research Paper Example Data mining tools are vital because they have significantly reduced the time taken in answering business questions, which were traditionally too much time consuming to analyze. Currently, most organizations have adopted and implemented the existing data mining software and hardware platforms to improve the value of their stored data. These hardware platforms can be integrated with new products and system as technology advances. Integrating data mining hardware platforms with other parallel processing computers or high performance client/server improves the analysis of massive databases (Hoptroff & Hoptroff, 2001). Foundation of Data Mining Data mining techniques emerged as a result of product development and a long process of research. This idea was first developed when businesses began storing business information on computers. Significant improvements have been witnessed in data access and generated technologies, which allow users to search their data, in real time (Williams & Simo ff, 2006). Data mining software is currently available for use, in the business world, because of the three technologies that support it, and they include data mining algorithms, massive data collection, and powerful multiprocessor computers (Williams & Simoff, 2006). The amount of raw data stored in business databases is currently exploding. A database is measured in gigabytes and terabytes. In the current, competitive business environment, raw data alone does not provide enough information for studying and predicting the market environment. This has called for the need to convert these terabytes of raw data into other significant insights that easily provide a guide for their investment, marketing and management strategies (Prabhu, 2004). Data Warehouses Significant improvements in data transmission, data capture, storage capabilities, and processing power are enabling companies to consolidate their various databases into data warehouse (Prabhu, 2004). Data warehousing is the proc ess of centralizing data retrieval and data management. Data warehouses store large amounts of data based on certain categories that make data more easily to sort, retrieve, and interpret. They also enable managers and executives to manage a series of business transactions, and other information that help in making informed business decisions. Researchers have predicted that all companies shall have adopted and integrated data mining tools, in their business, by the year 2020 (Prabhu, 2004). Companies benefit from data mining when meaningful patterns and trends are extracted from the stored data. How Data Mining Works Data mining tools employ modeling as a technique for performing data analysis. Modeling involves the creation of a model in one situation that is known, and applying the results in another situation where the results are unknown (Kargupta, 2007). Computers are equipped with lots of information about a number of situations, whose answers are known. The data mining softw are, on the computer, runs through the data, and filters the aspects of data that match the designated model. Once the model is developed it can be applied in similar situations, whose answers are unknown. This technique has been in use over the past centuries, but it recently became applicable, in the business field, when communication and data storage capabilities required the collection and storage of huge amounts of data, and the ability to automate

Thursday, October 17, 2019

Application of ethical values to the business Essay

Application of ethical values to the business - Essay Example The second code is about professionalism that should be adopted to contribute towards public interest and to support public preferences. A person should not always work for his own benefit only; rather he should do well to others as it is rightly said "Do good have good". The third code is objectivity that is essential for business growth and to avoid controversial downfall. One must avoid self interest in business activities that would be beneficial both for him and the firm. Every person has his own point of view but one cannot impose them on others so we should avoid such situations as much as we can. The fourth code is confidentially that refers to the information obtained in business relationship is not disclosed outside the firm without proper and specified authority, so that the clients may feel secure. It is our moral duty to keep one's secret in complete guard. The fifth code is competence; all the tasks performed by the employees should be in relevance with their ability, d ue skill and care, which is the only way to get efficient work by the employees and I personally think that an employ is better adapted to the work if he has a good command on it because If you want to do justice to your work you should do it properly and it only happen if you have enough knowledge about the task. The sixth code of my business ethics is courtesy. My staff should behave with courtesy with the dealers and the customers so that we may get positive response. As far as the question of my employees is concerned that how I will enable them to establish shared ethical position, for this I must say that Once Napoleon Bonaparte had said, "There are two levers to set a man in motion, fear and self-interest."(Napoleon) My prior method to enhance the ethical position of my staff is through developing their self-interest which is the most appropriate scheme. Their interest can be build up by introducing bonus system for exceptional work and by increasing their nominal and real wages; this will certainly assure their interest towards their duty and they shall work with greater responsibility and shared ethical codes. I shall guide my staff that you should work with integrity in all professional, business and personal financial relationships. You should not provide misleading statements and should be free from frauds and errors so that the customers may feel secure and rely on us while dealing with us. You should ensure that your conflicts of intere sts are not compromised. You should do your best for objectivity in all professional and business judgments, so that our business may not suffer from any type of controversial downfalls. You should carry out your work with due skill, care, diligence and expeditions, and with proper regard to your expertise which is expected from you. You should not

Legal and ethical issues in health occupations Term Paper

Legal and ethical issues in health occupations - Term Paper Example Health and wellness form the basis of any society and that explains why health care matters are given more weight including stringent legal and ethical structure. According to the text of study, various laws are applicable to ensure quality service delivery by the healthcare professionals. Top in the list is the law of contract which provides all the terms and conditions of a contractual agreement between two or more parties. It also bears the corresponding remedies to breach of such contractual obligations by either or all the parties. Under this law, the healthcare providers are at liberty to charge the cheapest on their medical supply to the healthcare facilities like hospitals, dispensaries and others with the primary aim of improving the health of the patients and this would not amount to antitrust by similar competitors. This is in line with the code of ethics expected of healthcare professionals that requires that the lifesaving comes first at even no pay then other things fol low. For instance, when a given health officer offers healthcare at any relatively cheaper cost, no entity can seek legal redress over this since it serves the purpose of service to humanity (Judson, Karen, Carlene and Karen 43). The law of contract also assumes that any healthcare provider is answerable to the state at any given time over his/her conduct immediately the permit to join practitioners is issued. Any breach of the contractual agreement by a healthcare professional is a big problem that is severely punishable owing to its attachment with life which is invaluable. The legal concept of tort also affects the medical professionals at large and is always given a serious attention by the society to tame errant medical practitioners. This law deals with civil wrongs that their remedy does not carry with them severe government action on the defendant but is always solved by compensation to the plaintiff and other constitutionally defined remedies. In this case, negligence remai ns one of the thorniest issues with the healthcare providers. In this scenario, the patient trusts the ability and care of the professional with his/health conditions (Reviews 58). This means that the medical staff needs to take all possible actions within their knowledge and ethics of work to ensure safe administration of health care to the patient. For instance in a case where a patient has been diagnosed with a given infection, it expressly imply that the doctor is able to quote the appropriate prescription. In the event that an individual suffers from a wrong prescription by medical personnel, the aggrieved is allowed to seek legal redress and obtain compensation in the form of treatment costs or undertake another prescription from the healthcare professional. This goes hand in hand with the code of conduct within the ranks of healthcare sector which oblige any healthcare provider to act with utmost professionalism and care. Even within the healthcare sector exists criminal aspe ct of the law which is punishable by jail, dismissal from the practitioning body and other punitive measures. As a healthcare prof

Wednesday, October 16, 2019

Data Mining Research Paper Example | Topics and Well Written Essays - 1250 words

Data Mining - Research Paper Example Data mining tools are vital because they have significantly reduced the time taken in answering business questions, which were traditionally too much time consuming to analyze. Currently, most organizations have adopted and implemented the existing data mining software and hardware platforms to improve the value of their stored data. These hardware platforms can be integrated with new products and system as technology advances. Integrating data mining hardware platforms with other parallel processing computers or high performance client/server improves the analysis of massive databases (Hoptroff & Hoptroff, 2001). Foundation of Data Mining Data mining techniques emerged as a result of product development and a long process of research. This idea was first developed when businesses began storing business information on computers. Significant improvements have been witnessed in data access and generated technologies, which allow users to search their data, in real time (Williams & Simo ff, 2006). Data mining software is currently available for use, in the business world, because of the three technologies that support it, and they include data mining algorithms, massive data collection, and powerful multiprocessor computers (Williams & Simoff, 2006). The amount of raw data stored in business databases is currently exploding. A database is measured in gigabytes and terabytes. In the current, competitive business environment, raw data alone does not provide enough information for studying and predicting the market environment. This has called for the need to convert these terabytes of raw data into other significant insights that easily provide a guide for their investment, marketing and management strategies (Prabhu, 2004). Data Warehouses Significant improvements in data transmission, data capture, storage capabilities, and processing power are enabling companies to consolidate their various databases into data warehouse (Prabhu, 2004). Data warehousing is the proc ess of centralizing data retrieval and data management. Data warehouses store large amounts of data based on certain categories that make data more easily to sort, retrieve, and interpret. They also enable managers and executives to manage a series of business transactions, and other information that help in making informed business decisions. Researchers have predicted that all companies shall have adopted and integrated data mining tools, in their business, by the year 2020 (Prabhu, 2004). Companies benefit from data mining when meaningful patterns and trends are extracted from the stored data. How Data Mining Works Data mining tools employ modeling as a technique for performing data analysis. Modeling involves the creation of a model in one situation that is known, and applying the results in another situation where the results are unknown (Kargupta, 2007). Computers are equipped with lots of information about a number of situations, whose answers are known. The data mining softw are, on the computer, runs through the data, and filters the aspects of data that match the designated model. Once the model is developed it can be applied in similar situations, whose answers are unknown. This technique has been in use over the past centuries, but it recently became applicable, in the business field, when communication and data storage capabilities required the collection and storage of huge amounts of data, and the ability to automate

Legal and ethical issues in health occupations Term Paper

Legal and ethical issues in health occupations - Term Paper Example Health and wellness form the basis of any society and that explains why health care matters are given more weight including stringent legal and ethical structure. According to the text of study, various laws are applicable to ensure quality service delivery by the healthcare professionals. Top in the list is the law of contract which provides all the terms and conditions of a contractual agreement between two or more parties. It also bears the corresponding remedies to breach of such contractual obligations by either or all the parties. Under this law, the healthcare providers are at liberty to charge the cheapest on their medical supply to the healthcare facilities like hospitals, dispensaries and others with the primary aim of improving the health of the patients and this would not amount to antitrust by similar competitors. This is in line with the code of ethics expected of healthcare professionals that requires that the lifesaving comes first at even no pay then other things fol low. For instance, when a given health officer offers healthcare at any relatively cheaper cost, no entity can seek legal redress over this since it serves the purpose of service to humanity (Judson, Karen, Carlene and Karen 43). The law of contract also assumes that any healthcare provider is answerable to the state at any given time over his/her conduct immediately the permit to join practitioners is issued. Any breach of the contractual agreement by a healthcare professional is a big problem that is severely punishable owing to its attachment with life which is invaluable. The legal concept of tort also affects the medical professionals at large and is always given a serious attention by the society to tame errant medical practitioners. This law deals with civil wrongs that their remedy does not carry with them severe government action on the defendant but is always solved by compensation to the plaintiff and other constitutionally defined remedies. In this case, negligence remai ns one of the thorniest issues with the healthcare providers. In this scenario, the patient trusts the ability and care of the professional with his/health conditions (Reviews 58). This means that the medical staff needs to take all possible actions within their knowledge and ethics of work to ensure safe administration of health care to the patient. For instance in a case where a patient has been diagnosed with a given infection, it expressly imply that the doctor is able to quote the appropriate prescription. In the event that an individual suffers from a wrong prescription by medical personnel, the aggrieved is allowed to seek legal redress and obtain compensation in the form of treatment costs or undertake another prescription from the healthcare professional. This goes hand in hand with the code of conduct within the ranks of healthcare sector which oblige any healthcare provider to act with utmost professionalism and care. Even within the healthcare sector exists criminal aspe ct of the law which is punishable by jail, dismissal from the practitioning body and other punitive measures. As a healthcare prof

Tuesday, October 15, 2019

Assessments in a care environment Essay Example for Free

Assessments in a care environment Essay Although there are many hazards that could be potential risks in the food environment in a hospital, there are a few which have the highest risk of  occurring and could then cause the most harm to both the service users and service providers. Whilst preparing and cutting vegetables, there is a risk that someone could cut themselves with a sharp knife or cutting equipment. Although the likelihood of this happening could be quite high when there is a lack of training involved, the severity of the injury or damage to health would be quite low considering many injuries that occur this way would be easily seen to and treated by the first aider or the person in charge. However, to prevent this risk occurring at all, all staff should be supplied with the appropriate equipment they should use and training so they are aware of how to handle the equipment in the right manor. A low level of sanitation in a food environment could cause there to be a wider and much quicker spread of bacteria through the food and surfaces which could prove to be harmful, especially in a hospital environment. Due to health and safety regulations being followed by all caring establishments, the likelihood of this happening would be a 2. However if there weren’t regulations being followed by the hospital and this was to occur then the severity could potentially be a 4/5 as the spread of bacteria in a hospital setting would be made worse when considering the weaker people in the hospital and those whose immune systems wouldn’t be able to fight off bad bacteria as well as other and could get sick or their condition could worsen if they already are sick. To prevent this all supervisors should ensure legislations, policies and procedures are being followed at all times to ensure maximum sanitation and cleanliness. Due to the wide variety of people consuming the food in the hospital, it would be vital to take into consideration allergies some people may have and to ensure they are not given food that contains or has been made in the same area as the food they are allergic to. Although the likelihood of this happening is just a 3 due to the fact all staff should adhere to procedures and take into consideration peoples allergies anyway, the severity of this if it occurs could be a 4/5 due to the fact allergic reactions could potentially severe and some cases could even lead to death. To ensure all precautions are taken with these activities and to minimise the risks which could occur from the hazards there are many things that can be done or put into place and thus prevent patients, staff or visitors from  harm. Firstly, to prevent somebody cutting themselves while they are preparing food they should be given training before hand to ensure they are aware of how to use the equipment appropriately and make sure they know which piece of equipment is the most appropriate for the type of food they are preparing. Under the Personal Protective Equipment (PPE) policy it states that all employers have duties concerning the provisions and use of PPE at work and should provide safety training to ensure no members of staff come to any harm (hse.gov.uk, 2015). To prevent the spread of bacteria and ensure the safety of everyone who is to consume the food available, all staff should also be given training on the appropriate ways and places to store food at the right temperatures to ensure the risk of bacteria growth is minimised. Managers of businesses or areas dealing with food have a duty to ensure all food is safe to eat, all harmful or out of date food is removed and unable to be consumed and records should be kept of where the food was bought from to provide evidence if needed. This emphasises the importance of how the Food safety act 1990 should be put into place to ensure the employers and employees stick to their duties to ensure maximum safety for service users. Also hand sanitiser should be provided and available around the hospital including the kitchen to prevent cross contamination that way (legislation.gov.uk, 2015). Finally, to ensure the safety of patients and minimise the risk of something fatal happening to them, all allergies they have to foods should be recorded down and available to all kitchen staff who will be preparing food. These records should be checked regularly and all food should be prepared on separate work surfaces or chopping boards to reduce the risk of cross contamination and any allergic reactions occurring. Physical exercise class Although many form of exercise and physical movement for many patients would be greatly beneficial to their health and wellbeing, it could also prove to provide more harm to health than good if precautions are not taken. Spilt water on the floor where someone may be exercising could prove to be harmful and cause damage to their health if it isn’t seen and cleaned up by someone. Although there is just a likelihood of just 2, the severity could potentially be 3 as an injury to someone in a hospital who could be elderly  could be fatal and cause serious damage to their weak bones and skin. To minimise to risk you could put control measures into place including not allowing any food or drink to be consumed in the exercise area and to have a separate room for them to be stored. Too much exercise for some patients could over work them and cause an injury to their health if it is repeated. Exercise can cause a vast increase in both heart rate and blood pressure and could lead to ma ny serious problems if an elderly patient is doing too much. The likelihood of this causing harm to patients is 1 as both patients and staff should be aware of when too much exercise is being done and if they’re working too hard. However, if this was to occur, the severity would be 5 as weaker elderly patients could suffer from a heart attack or stroke over time if they aren’t being monitored on what exercise they’re doing and the effect it is having on their health. To control this all service providers involved in the physical activities and wellbeing of the patients should know and keep records of any conditions the patients may have which could lead to adverse effects or weaken them. All patient files should have records of what exercise patients have done to ensure they do enough to stay health but not too much that they cause themselves harm or injury. There should also be multiple members of staff observing exercise sessions to keep an eye on those more likely to over work themselves. If patients are showed how to warm up and down properly then they could injure themselves more then what they would if they warmed up. Also, if the exercise is too harsh and causes patients to have to put a lot of effort in just to complete tasks then the severity should be decreased to allow them better health. This would also help prevent a majority of excess aches and pains that would come from treating their body too harshly. Because of possible high severity of an incident is water was spilt during an exercise class, precautions should be put into place to minimise this risk and decrease the likelihood of it ever happening and injuring a patient. If drinks are restricted to one particular area or room away from where the exercise is taking place then there would be a decrease in the risk of anything being spilt in certain areas. Also if patients doing the exercise were given regular breaks to have a drink and a rest they would prevent spillages as well as prevent any pains occurring by doing too much exercise.  Secondly, the amount of exercise each individual patient is able to do would be subjective on the individual and therefore not all the patients should be forced into doing as much as others may do if they are less capable. Each patients amount of exercise should be monitored and recorded to ensure they get the right amount but are not getting too much. Also by monitoring them it would be easier to identify if any of the patients are struggling with any of the exercise methods or are in too much pain to carry on. This also applies to the third point made. The patients shouldn’t be doing exercise which is too harsh for them to carry out or if they don’t completely understand what they are doing because they could do it wrong and injure themselves severely. By allowing them to warm up and down before and after they carry out exercises and by showing them how to carry it out appropriately would lower the risk of injury and allow them to enjoy it instead of being in pain. Visiting Times Visiting hours are the busiest times in a hospital and so could potentially have many hazards involved in allowing people in and out of the hospital without appropriate precautions taken. Poor sanitation from new visitors could potentially be a big problem in a hospital as bacteria will be being bought into the wards and could enhance the spread of infections or diseases. Due to the fact a hospital has a wide variety of patients including elderly and those who have recently had surgery (meaning they may also have open wounds) the spread of bacteria could be hazardous to their health and the healing process of their injuries/wounds. The Likelihood of this happening would be 2 which is significantly low considering the change of law in 1995 which ‘provided specific recommendations to promote improved hand-hygiene practices and reduce transmission of pathogenic microorganisms to patients and personnel in health-care settings’ (Cdn.gov,2014). However the severity of a lack of sanitation would potentially be a 4/5 as the spread of bacteria and therefore infections and diseases could be harmful to people’s health and if unable to fight it off, it could possibly even shut down some peoples immune systems. To minimise the risks of this there should be hand sanitizer and hand was stations placed all around the hospital with signs so the visitors remember to clean their hands and kill off unwanted  bacteria. Security is a vital party of a hospital to ensure the safety of everyone in the building. Without a high level of security around the hospital anyone would have access into and out of the building that may not be authorised. This could mean unwanted visitors may come in and read documents they are unauthorised to, or even confused elderly patients may get out without realising it and end up injuring themselves outside without anyone there to help. This hazard would have a likelihood of 1 and a severity of a potential 4/5 because, although it is very unlikely to happen in a hospital, if a patient were to get out they could get themselves into all sorts of trouble and not realise the danger of traffic outside causing fatal injuries or maybe even death. CCTV should be in place to monitor people in the hospital and all wards should be locked so only authorised people are able to enter and exit. Damage to property could occur during visiting hours as the hospital will be crowded with a variety of people, patients and staff which could cause some things to be damaged or broken, especially when there are a large number of visitors at one time. Although this would not directly affect the health of service users or service providers, it is a hazard to the hospital and would cost a lot of money in repairs each year if there are no control measures in place. CCTV would help monitor any damage that would occur and the person behind the damage; however there should also be signs around the hospital reminding visitors to stay orderly and respectful at all times on the wards and around the building. Due to the fact that so many different people will be entering and leaving the hospital, they could be carrying many different types of bacteria into the hospital which could cause a higher risk of the spread of infection. By providing hand sanitiser and making it widely available around the hospital and wards, all visitors and people who enter the hospital will be able to reduce the amount of bacteria they are bringing in and reduce the risk of infection. There is a hand hygiene policy which should be put into place in the hospital to ensure the safety of patients and visitors. It is well known that hand hygiene is one of the most important factors in preventing the spread of infection and the unwashed hands of all healthcare professionals and visitors is the most important route of cross-infection in the  healthcare environment (Ayliffe at al, 2000). Secondly, there should be an appropriate amount of security in and around the hospital to ensure only authorised people are getting in and out of the building. CCTV cameras should be working and placed all around the building and there should be security systems put in places at all of the entrances and exits to ensure the risk of unwanted visitors or patients getting out is minimised. This would also lower the risk of any property being damaged and if it does occur it would allow the staff to look back over the footage and identify who was at fault for any damages that occur. Although the likelihood of these occurring is predictably low, it would decrease the severity of incidents which occur as it would allow people to be identified and things could be managed before they get out of hand. Dispensing of medicines Prescribing and dispensing medicine is a vital role in hospitals to ensure all patients get the medication they need to help them recover, however there could be many possible hazards involved with dispensing medicines that could cause harm to patients and their health. Prescribing patients with the wrong dosage of medication is a possible hazard as it could lead to the patient having an overdose or having serious health problems afterwards. Although the likelihood is low the severity if this does occur is high as the health effects would be very negative and put patients health into a decline. To prevent this all patients records should be checked beforehand to ensure they are being prescribed the right amount, also the medication should be double checked before being handed to the patient to ensure no mistakes have been made. If medication is left on the side it could be consumed by someone who doesn’t need it, by a visitor not knowing what it is or even by a child who mista kes them for sweets. This could cause great harm as someone who takes them could overdose and it would have negative effects on their health if taken in large quantities, especially to a child. All medication should be locked away in a cupboard or be handled/observed by a nurse or doctor at all times to ensure no one can take them when they don’t need to or accidently. Needles could be a hazard in a hospital if not used correctly or if a nurse slips while holding one. If found left lying around someone could use one and pierce their skin injecting themselves with  something they don’t know about, or even risking infection by finding a dirty needle and using that. Also if a nurse slips whilst holding on they could injure themselves or the patient by accidently stabbing the skin. This isn’t very likely to happen as all nurses should be provided the appropriate training on how to handle needles and dangerous equipment so they don’t make a mistake. Also, all needles should be di sposed of immediately after use so they cannot be used again and cause cross-contamination. The severity for all hazards which could occur for dispensing medicines are all high and so to reduce the risk of anything serious happening or anyone being injured, policies and procedures must be put into place to ensure people’s safety in the hospital. All patient records must be checked before they are prescribed with a medicine to ensure they are provided with the right type of medicine and the right dosage. If this is done wrong it could potentially eventually lead to death for an unfortunate patient and so the dispensing of medicines policy should be put into place. The policy states that all medication should be stored, administered and disposed of appropriately to ensure minimum harm and training must be given to staff to make sure they understand how vital and critical their role could be (oxfordshireccg.nhs, 2013). All medication must be locked away and not left lying around the hospital to ensure only the appropriate staff members who have had training are able to access it and no children or vulnerable people are able to pick it up off the side and take medication which could make them sick. Finally, it is evident that needles are dangerous pieces of equipment if mishandled or in the wrong hands and so the dispensing of medicines policy should be ensured and put into place because of this fact also. All used and unwanted needles should be disposed of immediately instead of being left lying around and all staff should have training before they start in their role to ensure they know how to handle a needle and to make sure they don’t injure themselves or anyone else with one (goshospital, 2015). Moving patients between wards Naturally there would be many risks involved with carrying out this activity as there are a lot of precautions that would needed to be adhered to to make  it successful. There could also be many complications to consider if you were moving an elderly, weak or disorientated patient. The likelihood of any of the hazards occurring is low due to training the staff have and regulations they follow to ensure safety. Using the appropriate equipment is vital when moving a patient between wards as it would assist to lift and transport the patient without causing any harm to the health of either the patient or the member of staff. If a nurse is moving a patient on their own without a hoist or any help, they could injure their back by not lifting properly or injure the patient if they’re lifted in the wrong way. According to the manual handling regulations 1992 all staff should be provided with PPE and training on how to carry out tasks like these to avoid injuries or harm. The likelihood of any harm occurring is low if the regulation is followed however the severity could be 3 as the damage it could cause may need special attention. Dropping patients would be a risk if they are heavy or awkward to lift between one place to another. The severity of this if it happens would be quite high depending on the state of the patient, especially if the patient being moved is elderly or fragile, they could easily break a bone or more damage would be caused if they are dropped. Busy corridors during visiting hours could cause complications when moving a patient as it would make it a lot harder. If some of the corridors or lifts are busy you would not be able to move the patient as quickly and efficiently as liked/needed. Also, if there are people milling about the corridors it would be easier for the patient to be knocked over or injured by accident. The severity of something happening while a patient is being moved between the hospital is on average 2.5 which could be severe in the wrong situations and so staff must be provided with the right equipment and training to prevent the risk of injury or the likelihood of anything happening. Under the personal protective equipment policy it states that all staff members should be provided with the correct equipment to carry out tasks to prevent injury to themselves and the other person involved (hse.gov.uk, 2015). This could include someone like a hoist to prevent injury to the staff members back and to ensure that the patient is being lifted properly. Although dropping a patient has a low likelihood and may not happen easily, if it  does it could be severely fatal to the patient and cause them a lot of injuries. The risk of this happening would also be minimised if the correct equipment was provided to ensure the staff member doesn’t assert strain on their back/ body and it ensure that there is enough power to lift the patient, especially if the member of staff isn’t very strong. Finally to make it easier to move patients it should be done when the hospital isn’t busy so there are no visitors mulling around and getting in the way. References Hse.gov.uk, (2015). Personal Protective Equipment (PPE). [online] Available at: http://www.hse.gov.uk/toolbox/ppe.htm [Accessed 15 Jan. 2015]. Gov.uk, (2015). Food safety your responsibilities GOV.UK. [online] Available at: https://www.gov.uk/food-safety-your-responsibilities/food-safety [Accessed 15 Jan. 2015]. Legislation.gov.uk, (2015). Food Safety Act 1990. [online] Available at: http://www.legislation.gov.uk/ukpga/1990/16/contents [Accessed 15 Jan. 2015]. Hospital, G. (2015). Sharps: disposal of used sharps Clinical guidelines Health professionals Great Ormond Street Hospital. [online] Gosh.nhs.uk. Available at: http://www.gosh.nhs.uk/health-professionals/clinical-guidelines/sharps-disposal-of-used-sharps/ [Accessed 15 Jan. 2015].

Monday, October 14, 2019

The History Of Cheese

The History Of Cheese In the world today, the cheese has become a key ingredient in many dishes in the world. Cheese is an ingredient that has been cruising around the place and make improvements delicious food, especially Italian Cuisine such as Spaghetti Carbonara, Cheese Pizza and many more, which has attracted many people enjoy of eating the food. In addition, the cheese has made everyone not only chefs and ordinary people also want to enjoy the cheese to create a different dish with cheese in it. Do all people on this planet know what the content in the cheese while everyone including children enjoy cheese even eat like that only. Cheese is a product of milk-based groups in it. Cheese produced in the time now not only produces one type but different types of cheese were produced from it.Differentiation each cheese produced has their different flavors, shapes, textures and more. Moreover, the cheese has its own life so that it can retain the moisture. We also need to know not only cheese produced from cows milk instead of the animals such as buffaloes, goats, sheep and more. Cheese not only be used but it is used as a secondary food such as Cheese Platter yet mixed with other cold cuts. Often guests will enjoy eating cheese after dessert. Chef who has a high talent, will always create something new by using cheese with other ingredients like black pepper, chives, garlic and more. This not only creates new foods and even enhance the flavor and aroma of the cheese. In this report, we can add more knowledge about how the cheese is produced. Apart from that we can learn more deeper about the origins of this cheese. Moreover, we also learned how cheese found in Ancient Greece, Roman Europe even in the days that have now spread throughout the world which has made cheese as an ingredient of their cuisine. Cheesemaker, the person who incharge or makes cheese according to the process of cheese production. Furthermore,we will attach the details of nutrition that has been in the cheese that makes people would obtain the cheese although in a small bite in a day. Lastly, we will see the impact that cheese has given towards the culture of the citizen in a country, which has become a trend even taking a picture. SAY CHEESE 2.0 History of Cheese The origin dates of cheese making range from 8000BC to 3000BC. However, no one really knows who made the first cheese but most authorities had considered that Middle East was the first area which is cheese being made. According to the ancient legend, it was made accidently by an Arabian merchant. The Arabian merchant has put his milk into a pouch which has been made by sheep stomach. The merchant carry the pouch along with him as he set out on a days journey across the desert. As he travelled, the heat from sun activated the enzyme rennin which found in the stomach lining. This action has caused the milk to separate into curd and whey. Thus, cheese was revealed. Based on ancient Greek mythology, the evidence of cheese making has been found in Egyptians tomb murals around at 2000BC. During the Ancient Greek period, cheese are been eaten. In Greek, cheese is called fornos which related to the basket where the cheese was deposited and separated from the whey. Cheese in other languages was derived from this greek word, for example, at French they used to call cheese as fromage or seems goes to Italian people they called cheese as formaggio. In Greek tradition, there was consumption that it was the Gods who showed the mortals how to make cheese. It is believe that cheese using has been use wider in Asia before it migrated to Europe. Then, during at Roman Empire, the process of cheese making has been expanded. Lots of different sources of milk began to be mixed and varieties of seasonings were added to produce cheese with rich in flavours. The Roman culture has developed the art of cheese making. The Roman cheese makers was a skilled artisans and they also has developed varieties of cheese. The Roman also credited with the first aging of cheese or cheese storage. The roman cheese makers were aware of the affects of various ripening technique which will be related to the taste and character of a particular cheese. The Romans and the Greeks has considered cheese as a luxury food and accessible to the wealthy. Cheese also has became their staple food which been used in both sweet and salty dishes. During Roman Empire, over 13 varieties of cheeses were produced. The Roman has spread their expertise in cheese making to Europe. In making cheese, they has developed dairy farming which to use cows milk to become the standard raw material. During this time, they are in an effort to perfect the curd-draining process. The Romans also invented the cheese press which is a technique that they exported as far as Great Britain. In France, especially in south and west, they have developed a wider range of cheeses because of rich in agricultural areas. They are more preferred in soft-cheese production and the hard-pressed cheese appeared to play a secondary role. This production was the reflection from the Rome-influenced culture of the nation. The production also mirroring the type of cheese that produced in the Mediterranean as opposed to the hard-pressed. It also more durable cheese that was developed in the northern regions of Europe which is can be stored and eaten during cold winter months. However, throughout the dark ages which is the Western European Early Middle Ages, circa 500 to 1000CE, there were little progress was made in developing new type of cheese. During the Middle-Ages, the European monks has invented of ripening and ageing techniques for cheese. The monks have produced milder-tasting cheeses. The communities of Jura and Alps mountain farmer could get together in dairy associations. In this situation, they enable to produce first-rate quality of cheeses. In the 7th Century, many cheeses been known by the region in which they were produced. However, during Renaissance on 14th to 16th century, cheese was considered as unhealthy food and the popularity of cheeses has decline. Luckily, in 19th century cheese regained favour and in start from this period they have started to move from farm to factory production. 3.0 SYMBOLISM OF CHEESE Cheese can be symbolized with a different perception by a different people. But generally cheese always related to something that can bring happiness. Here we had divided the symbolism to four which are economy, culture, religious, and social. 3.1 Economy If we look into the revolution or the movement of cheese began before Christ, different region or countries had their own originated cheese. During the glorious of Romans Emperor, they had develop the cheese into a high level with the manufactured of many types of cheese. The rich emperor at that time was a little bit dissatisfied with the quality of the cheese and later they had imported cheese from the Alpine areas, England, France, and parts of Asia. There we can see a network of import and export that they build in terms of exchange into their economy. We owe the Romans once again when they taught the techniques and the process to produce the cheese to the peoples that they conquered such as the Helvetti tribe in an Alpine area which is called Switzerland now. Nowadays, the industry of the cheese making is an important industry for the Switzerland and during 1900 they started very aggressive by operating 700 to 800 of cheese factories and now they are one of the largest producer of cheese based on world demand right now. Pasteurization actually came from its creator name which is Louis Pasteur that develop the process and introduce the concept of fermentation. He contribute and introduce the bacteria that can form a cheese in a fastest way and controlled bad bacteria. 3.2 Culture In France, cheese had their own specialty during the course of French meal. Not only at the fine dining restaurant they served course meal but at home they also practiced that. Every house at French will have stocks of cheese even they had special drawers for cheese in the refrigerator. The sequence of French meal start from appetizer and aperitif drink, which is light course and then followed by the main course, then the salad, and last but not least selection of cheese before the dessert and sometimes cheese can be a closing course which is replace the dessert. There is a maxim about cheese in France, A French meal without the cheese course is not a French course. Peoples mentality about cheese before this believe that eating cheese before sleep can cause a nightmare and gives you a restless night. However, in 2005 The British Cheese Board study made an experiment to the 200 participants which equilibrium to 100 of males and 100 of females to eat six different types of British chee se which were British Brie, Cheddar, Cheshire, Lancashire, Red Leicester, and Stilton before they sleep for a week. The results after a week show that no one had a nightmares and oppositely they had a good nights sleep with the pleasant dreams. Flash back to the traditional believes for the Arabian, Persian, and European. The Arabian believe that if they dreams about fresh cheese its symbol as a happiness and health but if Cutted cheese its mean you will get an illness and need an operation. The Persian believe that if we eat fresh cheese in a dream its mean someone will have a good fortune according to how much the person ate. Dreams about Swiss cheese is something special to the European because it means the promises of prosperity, health and amenities of life. Dream working in the cheese factory show that you will have an improvement in the situation. 3.3 Religious As we all know that Islam and Judaism strictly prohibit their follower from eat cheeses that made with rennet from animals that not slaughtered properly according to the Halal or Kosher laws. Both faiths recognize cheese as a dairy products, but the Judaism cannot eat dairy products in the same time meal with any meats except poultry and fish because it is against the Kosher rules. Actually the Hebrews scripture said you should not eat meat in its mothers milk, some study believe that when the meat and dairy products consume at the same time, the protein of both sources cannot be digested properly by the body and can affect health. 4.0 PROCESS PRODUCTION OF CHEESE In the process production of cheese we will divide it into two which are in the primitive era and the modern era. 4.1 Primitive Era The African, Asian, and Latin-American very addicted to yogurt and cheese no matter where they live even in the isolated area or in the urban areas. Usually the one that often making cheese is the woman at that time at their home. An example of cheese making in South America which is Cocoa Blanco cheese. The cheese started made with sour whey, and then coated with rancid butter, boric acid, coffee grounds, and ground chocolate cocoa -bean shells. After that, it is left under the scorching sun to dry and until it is sold. Another survey that had been made in other parts of West Africa found a small village where the farmers make cheese. The technique unusually impressive show good principles of manufacture, below are the steps of making the cheese by the farmers. First the fresh milk that they milking from the cow is heated in a pot to about the boiling point. After that, they added the extract called Quantum satis of leaves of a plant called Calatropia procera to the hot milk and the heating process is continued until it is coagulate. The coagulated substance then put in any cloth and dripped off for about 24 hours. The cheese mass that surfaces are next dried in the sun will formed a discus-like shape. To extract a strong red colour, the head of the threshed sorghum will boiled in the water. To make it look nice and as a protective layer, the dried cheese will dipped in the dye and becomes red like Edam cheese. The cheese can be keeps for more than one year, but if in the rainy season it is necessary to store it near to the fireplace. Cheese at that time majority were produced just for individual needs not in terms to gain profit or try to commercial it. However, the revolution of the cheese start in the modern era where the producing of cheeses were unlimited. 4.2 Modern Era In the modern era, they already build the technology that used to make cheese faster with good quality. There are few steps to make the quality cheese. First step To make a large of cheese, we need to use a lot of milk to produce it which is inquired the quality and purity of the milk. Second step Once the milk been tested and weighed, the milk has to pasteurized. It is to ensure that the cheese is made perfectly. In addition, it is to make sure the cheese that has been made is standardized. Third step Once everything is in order, we need to use a good bacteria and add in it to start the cheesemaking process. Now days, scientist has create a good bacteria, so that they able to produce a good and quality cheese. Besides that, the bacteria is to help enhance the falvor and texture of the cheese. Then, rennet which is called as the milk clotting enzyme are added in it, to coagulate the milk and form like a mass custard. Fourth step Next, they will cut into small pieces, where they begin to process of seperating the liquid and the solid of the milk. The solid of the milk (curds) will be cooked with a lower temperature to form a softer cheeses such as Ricotta, Mascarpone cheese and many more. Meanwhile the liquid of the milk (whey), are cooked with a higher temperature to form a harder cheese such as Romano, Gruyere cheese and many more. Fifth step To make the cheese, there will be a cheesemaker to cook it. The cheesemaker will cook and stir the liquid and solid of the milk with the proper temperature. They will achieve the firmess of the solid of the milk (curd). Meanwhile for the liquid (whey), they will drained it off properly and leaving it as a tightly curd. Sixth steps Once the liquid and solid changes into perfect curd according to the deisred temperature, the curd will be added with cheese salt in it which is to preserve the moisture and enhance the flavor of the cheese. Seventh steps The cheesemaker will pressing the determines the characteristic and shape of the cheese. Cover the cheese that has been pressed with a cloth or tissue. Most cheeses are pressed within three to twelve hours to complete the curd formation which is depending the size of the cheese. Cheese that will be pressing will be poured into a mould according to the sized that required. Eight step This is the last step process of making cheese which is curing. Curing for cheese is used for expand the ages of the cheese by developing the flavor and texture of the cheese within the time. Usually the cheese will be kept in a room that is carefully monitorized and controlled for the humidity of the cheese by using proper temperature on the cheese. 4.2.1 Equipment that has been used during modern era Pilot scale batch cooker It is used to cook the liquid and solid of the milk within the period of time with a proper temperature to cook it in a batch. Grinding machine It is used to grind the cheese into paste that is suitable with accurate moisture and fat for the next stage of cheesemaking process. Load cell conveyors It is used to control and record the weigh of the cheese through the process. Auger dump hopper Method that used to transferring the product from the blender into the batch cooker, where all the milk product has been added in the earlier stage. 4.2.2 Factor The spread of cheese through out the world Nutrition It is happens because the cheese contains the nutrition such as the vitamin, mineral and also fats that a body need most. In addition, it has become part of the daily meal of a person. Label/ Brand When a brand of product famous throughout the world, it enhances many people from other country to try the products and create a new product by using the cheese as the main ingredients. Technology In the new era, many people has invented a technology which able to cook, seal, packaging the product which contain cheese in it within period of time, which has make demand of obtain the cheese has increase from a level to another level. Production Different type of cheese, has different type of texture and flavor. That is why, many people would like to obtain the different type of cheese from the normal cheese, which has make to create a new creation of product by using the cheese that obtain. 5.0 TYPES OF CHEESE There are many types of cheese and can be classified to a few types. According to the International Dairy Federation, there are a round 500 types or varieties of cheese. The varieties of cheese can be classified into a few groups according to their characteristics. There are a few criteria that being looked to classified the types of cheese. Such as, ageing, milk content, fat content, country, moisture, method of making, moisture and more. Commonly cheese are categorizing by content, firmness, moisture and texture. The cheese are being categorizing from soft to hard. These are a few categorized of cheese; Fresh cheese, Natural rind cheese, Soft white-rind cheese, semi-soft cheeses and hard cheese. 5.1 Fresh cheese Fresh cheeses are eaten a few days after the cheese being cooked and only have a little time to develop a flavour. Those fresh cheeses are used in cooking to add texture and help in enhance flavour of food. It also helps to absorb oil and enhance other ingredient flavour to the foods. As we known, according to the history, fresh cheeses are originally discovered by nomadic tribes where accidently milk that being filled up inside the animal skin drained away. The milk leaving a firm and crumbly white lumps of fat that can be dried, store and kept for days. Fresh cheeses have a mild, lemony and acidic flavour. The fresh cheese flavour depend the type of animal milk use. Fresh cheeses have a high moisture content compared to the hard cheeses. It has wet and mousse-like texture. Example of cheese: Feta cheese The name of feta cheese from the Greek word fetta means slices. Feta cheese was originated from Greece. During 17th century, cheese was being served by cutting the cheese into slices. That why the name of cheese was given as feta cheese. Feta cheese is one of the age crumbly cheeses and commonly produces in block. The story of this cheese making is not known certainly, but there is a myth about the making of feta cheese. According to Ulysses narrates in Book 9 of the Homers Odyssey, Cylope Polyphemus was the first who create cheese (specific to feta cheese). If refer to the traditional method, the mixture of goat and cow milk are being left for around 30 hours than rennet being added inside the milk. It will help the coagulated process of milk, causing the separated of liquid and curdle. After that, the curds are being drain and resembles into a block shape. Muslin cloth, are use to raped and hanged the cheese to dry. Some people still use traditional method hanged the cheese by putt ing inside the animal stomach. Other examples of cheese are Ricotta cheese, Mozarella cheese and more. 5.2 Natural rind cheese Some fresh cheese, especially cheese that being produces using goat milk, will turn into natural rind or aged cheese. This process is due because of the cheese left to dry and drain for a long period time. The wet and rich protein surface of cheese attracts the production of moulds. These moulds are edible and it contributes to the ripening process. Nowadays, cheese makers will spray a solution that contains edible moulds (such as penicillium candidum) that helps ripening process. Mostly peoples are suspicious of moulds and sometimes the rinds flavour or texture doesnt suit with the taste of the customer. These types of cheese have different shapes and can be covered with paprika powder, herb or peppers. There are traditionally three stages in the production of natural rind cheese; Stage one: The fresh cheese are still moisture and has no rinds. The flavour is still mild and lemony. (Up to 10 days) Stage two: The cheese that being stored in a room or cellar. The cheese will start lose moisture and thin rind will start to develop. The surface will attract a variety of micro such as pinicillium candidum. The moulds will star appears around ten days. Stage three: At around 10 to 12 days, a blue mould will appear and over a few weeks it will appear on the surface of the rind. Cheese will started to shrink and causing the wrinkles. The surface of the cheese will be encrusted with mould, has brittle texture and become firmer. Sometimes, it has a nutty, pungent aroma and taste. Examples of cheese: Crottin de Chavignol This cheese is the famous cheese, among the varieties of cheese base goat milk. This cheese was originated claim from the village of Chavignol, France. Since 16 century, the productions of small size of cheese were started. The word crottin is derived from the word Crot meaning small oil lamp made from burned clay. The mould clay is being use as cheese moulds. The shaped of this cheese is solid but soft and has nutty taste. Other examples of Natural rind cheese are Banon cheese, Bouton de Culotte nad more. 5.3 Soft, white-rind cheese Is a type of cheese where it has buttery-yellow colour inside and has white rind. There are at least 80 types of soft, white-rind cheese are being made from cows milk. There are two popular soft, white-rind cheeses, known as Camembert and Brie. Mostly these cheeses are almost liquid texture and not contain high fat this is due to the high content. Traditionally the making of these cheese are simple, milk are being reheat until warm, then rennet being add to help coagulated process. After the liquid and curd separate, the curd being scoop and put inside a moulds and left in a humid rooms. After the desire of moisture reached, the cheeses are removed to other room and place on the straw mat. This will help the ripening process. Nowadays, the cheese maker will spray the mould (Penicilium candidum) to help to develop faster rinds. The faster development of rind will help or protect the inside of cheese drying out. This is why the soft, whit rind cheese has soft texture inside and has whi t rinds. Examples of cheese: Camembert de Normandie At years 1791 camembert cheese were firstly made by Normandy farmers known as Marie Harel. According to the history during French revolution, she gave a shelter to a priest know as Abbey Bonvoust since 1790. With the help from the priest, she improved the making or recipe of Camembert cheese. After a few year, the improvement of transport facilities help in the spread of this cheese and opening of camembert cheese outlet around Europe. In 1890 French engineering also contribute to the spread of this cheese. Where he creates a wooden box for easier to carried, those ideas have being used by all cheese camembert cheese producers. Camembert cheese is moulded flat round cheese that covers with white rind. This cheese has different taste according to their age. When it young it has milky and sweet taste around 20 days, when it reached 30 to 45 day it will have fruity and strong taste. Other examples of soft, white-rind cheese are Brie de Meux, Bomdard cheese, bougon cheese and more. 5.4 Semi-soft cheese Semi soft cheese can be classified into types washed-rinsed and washed-curd cheeses. The flavour of semi soft cheese ranges from mild to buttery to pungent flavour. Depend on their types these types of cheese can be slices, shredded and cube. 5.4.1 Washed-rinsed cheese According to the history washed rinsed cheese was being made During the Dark Ages Trappist. The Trappist monks need to go through 100 days fast without meat each year. They decide to produce stronger and meaty cheese. The moisture consistency of washed rinsed cheese similar to soft cheese but, the cheese used more rennet in the making process. More rennet is being added to produce firmer cheese. Besides that, the cheese are being put in more humid rooms, then being washed and rubbed with a mix of brine and bacteria. This act will encourage rapid growth of orange bacteria to brown-red bacteria on the rind. The bacteria growths on the surface of the rind and help create a texture similar to crà ¨me caramel. Examples of cheese: Epoisses de Bourgogne This cheese is a pungent unpasteurized cheese cow milk cheese. This cheese is made in a Village called Espoisees. Brillat- Savarin popular gastronome classed this cheese as King of The cheese. On the end of second war the production of this cheese stopped due to the decreasing of men population due to the war. On 1956, a farmer partner known as Robert and Simon Berthaut re-launch the production of Epoisses Cheese. This cheese has strong flavour and sweet cheese. Other examples of washed rind cheese are Baguette Laonaisse, Bishop Kennedy, Brick cheese and more. 5.4.2 Washed-curd cheese Is a cheese where during production process mix of the curd and whey being washed in water, to prevent the bacteria converts any remaining milk sugar into lactic acid. This act contributes to produce sweet cheeses that have smooth and rubbery texture. Examples of cheese: Leiden or Leidsekaas cheese On 17 the century, the Dutch East Indies one of company that lead to the beginning of spice trade between Indonesia and Europe. During that time cheese are already well known, the Dutch decide to do some experiment by adding spices to their cheese such as cumin, peppercorns and cloves. To create leiden cheese, the liquid is drained and the curd are sprinkles with a cumin and salt. Then the cheese is put inside a mould and lined with muslin cloth and pressed. After a few days the chesses are soaked in brine. 5.5 Hard Cheeses Many hard cheeses are factory made. These types of cheese content low moisture then soft cheese. These cheeses are being put inside a mould than be give forced with high pressure. The age of hard cheese are longer then soft cheeses and can be stored for a long time. Examples of cheeses: Cheddar cheese According to the history cheddar cheese were originated from English village of Cheddar at Sommerset, England. There is one myth about the making of cheddar. The story started where one girl decide to put a bucket of milk in the cave. Then she went home without brought the milk. After a long time she start to remember that she had put a bucket of milk in the cave, she went back to cave. While she came to the cave, she realized that the bacteria have turned the milk to hard curdle cheese. They also another myth, that believed King Henry have buy 10000 pounds of cheddar cheese and it shows that cheddar cheese were originated in England. As age of the cheese become longer, the taste of cheese become sharper and flavour. Young cheddar is age around 3 to 6 years, while other cheddar may be age and stored for several years. Other examples of hard cheese are Parmigiano cheese, Emmenttal cheese, Pecorino Romano cheese, Asiago cheese and more. 6.0 CONTRIBUTION Cheese has many contributions in culinary world in the past and in current. Cheese has been in the culinary world for such long time. With this kind of history, cheese is no doubt has many contributions in nutrition ways. People in the past accidentally produce cheese when they left the milk in the warmth or heated it in the earthenware pot. In the past, people often use cheese as one of ingredient. Nowadays, people have study the cheese and discover that cheese has much nutrition that is good for human body. In the past, cheese has been a kind of currency by the traders and merchant. In the culinary world, cheese has been one of the flavor enhancements. This can be seen when the Italian put cheese in their cooking. Cheese provides saltiness and buttery taste to the dish. Cheese also has been contributed in pasteurization method for milk product. Pasteurization method been created by Louis Pasture, the French chemist and microbiologist in April 1862. Current contribution is in health benefit. Scientist has study the art of cheese and discovers that there are several amount of nutrient in cheese. The major nutrients in cheese are protein, calcium, zinc, phosphorus, vitamin A, vitamin B2, and vitamin B12. Protein is important to human growth and helping in build and repairing the tissue. Calcium is important muscle development, normal nerve and maintains the health of bones and teeth. Zinc is important in helping the immune system of our body and contributes in skin structure. Phosphorus is kind the same of calcium because it help in maintaining the bones and teeth. Vitamin A is important for our vision. Vitamin B2 is important because it is use as converter of food into energy in our body. Vitamin B12 is important for helping in producing cells in our body. 7.0 CONCLUSION In conclusion, there are many varieties of cheese in the world and it is one of food or ingredient that has long history. Even though it has been producing many centuries ago, it is one of well known ingredient in the culinary world. Cheese are very famous right now even if we go to the famous luxury restaurant or even the Mamak stall that used to sell Roti Naan with cheese. The use of cheese in culinary world was started centuries ago until today. The spread of cheese from the origin place has contribute to the world of culinary. Other than that, a question, why in the cartoon the mice always been trapped and crazy with the cheese?, look at the mice teeth, they were strong and it show how nutritious the cheese was. Nowaday cheesen are being made with full of nutritious because of proper procedure and process are use to ensure the high quality of cheese produce. Other than that, the revolution about dairy products nowadays are very agressive. Because of new invention and technology t he making or manufactured of cheese are rapidly growth. New recipe and vareties of chees are be created. Maybe in our country it is not global used yet but we are hoping someday Malaysia can produce their own cheese with our own style. Lastly, we will see the impact that cheese has given towards the culture of the citizen in a country, which has become a trend even taking a picture. SAY CHEESE