Monday, December 30, 2019

The Affordable Care Act ( Aca ) - 1674 Words

Background: the Affordable Care Act (ACA), which is a federal health reform bill, requires most public and private health plans to provide a minimum coverage of women’s preventive healthcare services with no cost sharing.1 Therefore, the Institute of Medicine (IOM) was commissioned to review what preventive services are essential for women’s health and welfare and consequently should be considered in the development of guidelines for women’s preventive services.2 According to the IOM recommendations, all FDA-approved contraceptive methods, sterilization procedures, and patient counseling and education must be covered for all women with reproductive capability without having to pay a co-insurance, co-payment or a deductible. The covered†¦show more content†¦The HHS, however, has not exempted for-profit businesses whose owners claim religious objection to some forms of contraceptives that were required to be covered under the mandate rule.6 Essentially, th e most controversial methods of contraception are intrauterine devices, vaginal implants, and both forms of emergency contraceptive pills known as Plan B and Ella.7 Issue: As of October 24, 2014, 45 legal cases have been filed by for-profit companies against the contraception coverage mandate.8 Yet, the Centers for Disease Control and Prevention recognizes family planning, which includes contraceptives, as one of the main public health accomplishments of the 20th century.9 This can be referred to its impact in

Sunday, December 22, 2019

Essay on Tradition in Shirley Jacksons The Lottery

Tradition in Shirley Jacksons The Lottery Shirley Jackson?s insights and observations about society are reflected in her shocking and disturbing short story The Lottery. Jackson reveals two general attitudes in this story: first is the shocking tendency for societies to select a scapegoat and second is the idea that communities are victims of social tradition and rituals. Anyone with knowledge of current events must be aware of times when society has seized upon a scapegoat as means of resolution. Countless politicians, military leaders, corporate executives and school administrators frequently use this proven technique. The people of the small village were very similar to the leaders of our society. The village people†¦show more content†¦The villagers are aware of her rebellious attitude and they are weary that she may be a possible cause for their crops not to be plentiful. It isn?t fair, it isn?t right, Mrs. Hutchinson screamed, and then they were upon her. One can understand how traditions are easily lost through the handing down of information, beliefs, and customs by word of mouth or by example from one generation to another. Traditions that lose their meaning due to human forgetfulness can cause dreadful consequences to occur. Although the villagers had forgotten the ritual and lost the original box, they still remembered to use stones to kill the forgetful woman. Does a society just pick and choose which part of a tradition they want to keep? One tends to remember the actions and the objects necessary to proceed with a ritual, but one may forget the purpose or the reason behind it. Is one correct in continuing a tradition even though there is a victim involved? The individual, as part of a society, is afraid of ridicule. If one ends a tradition, and society still behaves in the manner they were taught, then ridicule will be the result. The people had done it so many times that they only half listened to the directions, shows that the meaning and purpose behind the ritual had been lost and the society just acting it out through repetition. The villagers, who remember some bits of history about those forgotten aspects of the ritual, ARE NOT even definite about the accuracy ofShow MoreRelatedThe Theme Of Tradition In Shirley Jacksons The Lottery1638 Words   |  7 PagesDEATH BY TRADITION Henry James once said, â€Å"It takes an endless amount of history to make a little tradition.† In the short story, â€Å"The Lottery,† by Shirley Jackson deals with the insignificant nature of humanity when it comes to traditions. Today when one thinks about winning, one does not think about the community or close relatives; one thinks about how one is going to spend the money received. However, in Jackson’s short story, â€Å"The Lottery† represents a human sacrifice by means of stoning withRead MoreEssay Tradition or Cruelty in Shirley Jacksons The Lottery1147 Words   |  5 Pageshave many traditions. These traditions all have certain meanings behind them; however, many of those meanings tend to be lost or forgotten. The holiday of Thanksgiving was originally a celebration to commemorate the arrival of the pilgrims in the new world and their first interactions with the Native Americans. So then why is it still celebrated today? There is no actual purpose in today’s society to observe this custom.   It has just continued to be observed because of past traditions.   There isRead MoreTradition or Cruelty in Shirley Jacksons The Lottery Essay2237 Words   |  9 PagesTradition or Cruelty in Shirley Jacksons The Lottery Shirley Jacksons The Lottery satirizes barbaric traditions in a supposedly civilized village. As the story begins, the villagers appear to be fairly civilized and carry on fairly modern lifestyles. This is assumed by the mens discussion of planting, rain, tractors, and taxes. The lottery was outdated to such a degree that some may think that the tradition is primal competition of anthropoid beasts. On the other hand, some think that carryingRead More Religious Tradition in Shirley Jacksons The Lottery Essay1137 Words   |  5 PagesReligious Tradition in Shirley Jacksons The Lottery   Ã‚  Ã‚  Ã‚  Ã‚  While The Lottery is a fictitious story it can be argued that it mirrors the attitude of American culture in how it addresses religious tradition in its major holidays and celebrations.   Ã‚  Ã‚  Ã‚  Ã‚  Two of the biggest holidays in the United States are Christmas and Easter. Both of which are derived from Christian beliefs. Even though The Lottery is apparently a pagan ritual, violent and horrific, it is appropriate, only by the fact thatRead MoreEssay on Ritual and Tradition in Shirley Jacksons The Lottery580 Words   |  3 Pagesmistaken, the consequence could be unpredictable. The Lottery by Shirley Jackson gives us a lecture about a tortuous ritual. The story takes place in a small village with 300 citizens, they gather for a yearly lottery which everyone should participate. The story leads to a horrific ending by people forgetting the concept of ritual. When people think of a lottery, they draw an image with a big amount of money in head. However in the story â€Å"The Lottery†, the price is death. It starts in the morning ofRead More Tradition in William Faulkners A Rose for Emily and Shirley Jacksons The Lottery656 Words   |  3 PagesTradition in William Faulkners A Rose for Emily and Shirley Jacksons The Lottery People throughout the world do things for many different reasons. Religion, peer pressure, or tradition are some of the reasons the people do things. In the U.S. we have many traditions such as Christmas. Some people have strange or out of the ordinary traditions. The two short stories ?The Lottery? and ?A Rose for Emily? both portray tradition.   Ã‚  Ã‚  Ã‚  Ã‚  In ?The Lottery?, tradition is showed in three main waysRead MoreTradition in Roberto Benigni’s Life is Beautiful and Shirley Jacksons The Lottery1027 Words   |  5 Pages We all have traditions in our lives, but most of them vary between us. Where we are the same is that we have a genetic history of traditions. So what defines a tradition? A way of thinking, behaving, or doing something that has been used by the people in a particular group, family, society, culture, etc., for a long time. An inherited, established, or customary pattern of thought, action, or behavior. Also a belief or story or a relating to the past that are commonly accepted. ThisRead MoreUse of Symbolism in The Lottery by Shirley Jackson1146 Words   |  5 Pagesbulb represents ideas that just sparked into a character’s head. In the short story, â€Å"The Lottery† by Shirley Jackson, a village has just entered the month of June, meaning that the lottery is to begin. When everyone was present, the heads of the households’ names were called one by one to pick up a slip of paper. It was then discovered that the Hutchinson family was the chosen family to participate in the lottery again. When Mr. Hutchinson, Mrs. Hutchinson, Bill Jr., Nancy, and Little Dave each gotRead MoreCatholicism Exposed in The Lottery by Shirley Jackson Essay1303 Words   |  6 PagesTraditions are something that are passed from generation to generation. Tradition becomes a part of who we are as a scociety. Shirley Jackson mocks society’s way of blindly following certain traditions. Characteristics of Jackson’s story create a parallel with Catholicism, by harping on our fear of change but our ability to manipulate what we want from our traditions and the basis of Catholicism’s belief of the innocen ce in children. Shirley Jacksons short story The Lottery has created a clearRead MoreThe Lottery By Shirley Jackson931 Words   |  4 PagesIn 1948 Shirley Jackson composed the controversial short story â€Å"The Lottery.† Generally speaking, a title such as â€Å"The Lottery† is usually affiliated with an optimistic outlook. However, Jackson’s approach is quite unorthodox and will surely leave readers contemplating the intent of her content. The story exposes a crude, senseless lottery system in which random villagers are murdered amongst their peers. Essentially, the lottery system counteracts as a form of population control, but negatives easily

Saturday, December 14, 2019

Affirmative Action Case Study Free Essays

In the Washington office of Price Waterholes. Issues The company affirmative action office has strongly advised him to hire a young black woman, June Tries. Mr. We will write a custom essay sample on Affirmative Action Case Study or any similar topic only for you Order Now . Green believes Bob Young, a young white male, Is better qualified for the Job. 47 other plants have a young white male for this position. There are very few minorities working for this company. Comparison Chart on Mr.. Green’s Evaluation June Tries bib young Masters in industrial relations from Cornell Degree in History small school. Ears of college as personnel major 3 Years experience as assistant personnel manager 5 Years experience as assistant personnel manager No union experience* Union experience* Mediocre References Good References Poor personality Good personality Ambitious – wants to progress within the company Not very aggressive – doubtful that he will progress within the company Members of management did not seem to like her** Members of management seemed to like him** Advertisement did not say union experience was necessary ** – All Philadelphia members of management are white males Why I Would Hire June Tries June meets the minimum qualifications stated In the advertisement. The company affirmative action office strongly advised him to hire her. She Is something that the company does not currently have. She can bring new things to the table. She Is ambitious and wants to go father In the company. She Is goal oriented and Is driven to succeed. She Is opinionated, and seems to stand up for herself based on the fact that she said she would sue the company for delimitation If she did not get the Job. Based on the track record of current and previous personnel managers she could quite alcove in this company. Based off of their history the company does not come off well to minorities. I could not base all of my decision based off Mr.. Greens opinionated notes. For all I know Mr.. Green Just likes Bob Young because of his race and gender. Mr.. Green sounds like he already Judged Mr.. Trier’s based on the fact that she is a black woman. The only good opinion he had about her was that she was ambitious. Why I Would Not Hire Bob Young He is not driven to move farther in the company. He is Just like all of the other managers, and seems to bring nothing new to the company. How to cite Affirmative Action Case Study, Free Case study samples

Friday, December 6, 2019

Future Generation Computer Systems †Free Samples to Students

Question: Discuss about the Future Generation Computer Systems. Answer: Introduction: The researchers evaluated the kind of security risks for computers and the factors that determine the probability that the computer security could be compromised; the authors aimed at understanding the factors that determine the probability that a computer node within the network is compromised (1). The authors, being professionals in various institutions of higher learning and research, undertake a a primary research approach using a case study to identify and validate different types of threats in a typical university IT network (2). The researchers established that the probability a computer node within a network is comprised is largely dependent on the set of reachable services that are running on the host (computer). The authors found that several attacks take advantage of specific network services vulnerabilities to bypass authentication requirements and gain access to the system. Further, it was established that some malware can scan for services autonomously to identify possi ble targets or open ports actively after infecting a network. (3). The proposed novel approach to identify and then quantify individual computers susceptibility to cyber threats with respect to the network services being run on these computers can help organizations map their threats and manage risks (4). The main drawback of the research is that by being a case study, it cannot be easily replicated and so the findings may not be universally applicable (5) The research reviews and classifies the security threats for information systems, premised on the fact that as more organizations use data and information in information systems, there are significant threats to these systems (1). The authors are eminent professionals in their various ICT fields, including software engineering, network engineering, and security and are senior members of faculty in various institutions of higher learning (2). Using analytical methods; the authors sought to develop a new model of classifying identified security threats broadly into internal and external threats. The classification is based on the threat sources and their impacts (3). The authors develop a new model that classifies most information security system threats as either internal or external, which can be human, environmental, and technological threats. The threats can either be malicious or non-malicious (4). The drawback is that it reviews existing literature, despite developing a new model and does not provide effective solutions (5) In this paper, the authors take cognizance of the increased use of cloud computing; being a relatively new technology, it has some inherent risks that the authors investigate (1). The authors are professionals that are highly regarded in their various ICT fields, and are senior lecturers of higher education institutions (2). Using a descriptive analysis based on information systems and software engineering design, the paper identifies and evaluates some of the security threats in cloud computing environments and proposes solutions (3). The paper proposes the use of a trusted third party to assure security within the cloud environment, employing a public key infrastructure, as well as LDAP (Lightweight Directory Access Protocol) and SSO (SINGLE Sign On) (4). The limitations of the study is that it is analytical and descriptive, and does not use primary or experimental methods to evaluate cloud security risks before developing solutions The use of mobile devices and networks is increasing, especially with the envisaged introduction of 5G networks, however there will be increased network security threats (1). The authors are well regarded and highly published and referenced professionals in their respective ICT fields, as well as contributors to ICT research and training (2). Using a comprehensive literature and research survey or recent works, the authors evaluate mobile SDN networks and their network security threats (3). The authors establish promising aspects that will ensure networks are better secured, using SDN in mobile networks, such as network hardening. Various SDN architectures are discussed (4). The research is exhaustive, but reviews past research rather than undertaking new progressive (primary) research The research focuses on the cloud and its security challenges and their solutions, considering the increased trend of more people using cloud platforms for computing (1). The authors are well regarded professionals with great expertise and understanding of their fields, including cloud security; they are also extensively published (2). Using an in depth literature survey, the authors evaluate some of the challenges of cloud platforms security (3). The authors establish that migrating ICT resources to third parties create and multiply security threats such as data loss and unauthorized access with proposed solutions being stronger authentication management, multiple cloud backups, and strong access APIs (4). The research limitation is in using surveys is that the authors are mainly re-writing research that has been done and not undertaking any new ground-breaking research. References: Gil, S., Kott, A., Barabsi, A.-L. (May 16, 2015). A genetic epidemiology approach to cyber-security. Scientific Reports, 4, 1.) Jouini, M., Rabai, L. B. A., Aissa, A. B. (January 01, 2014). Classification of Security Threats in Information Systems. Procedia Computer Science, 32, 489-496. Zissis, D., Lekkas, D. (March 01, 2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28, 3, 583-592. Ali, S. T., Sivaraman, V., Radford, A., Jha, S. (January 01, 2015). A Survey of Securing Networks Using Software Defined Networking. IEEE Transactions on Reliability, 64, 3, 1086-1097. Chen, M., Qian, Y., Mao, S., Tang, W., Yang, X. (October 01, 2016). Software-Defined Mobile Networks Security. Mobile Networks and Applications, 21, 5, 729-743.