Saturday, August 31, 2019

Positive Social Change Essay

Participatory Action Research (PAR) is a type of research that involves all parties who are considered relevant in the issue in examining together current action- considered as the source of the problem, for the promotion of change and improvement of such current situation. It is not the type of research that precedes future actions. It is an action which is researched, changed and re-researched, a continuing process by and for its participants. It may not be used by one group of people for their own benefit versus other groups that are also involved in the issue. It is genuinely democratic by nature and is non-coercive. The people who the research aims to help are also active participants to the research process (Wadsworth, 1998). Action research or participatory action research for the past few years has come out to be a significant methodology for intervention and developmental change programs within different communities and groups. It has been implemented and promoted by many agencies and programs, also by countless local community organizations around the globe which attests to its effectiveness (Checkland & Howell, 1998). The many theories and research in social psychology, such as action research, among others, that put all theories into practice has certainly effected positive change. They have helped in ascertaining reasons behind the surfacing of various problems- whether it be on the individual or societal level. Knowing the source or sources of the problems and the factors that come into play has helped in coming up with feasible solutions to such through intervention methods or coming up with community programs. There have been changes in the type of methods employed in social psychology research as the years go by. From seeing participants in research as the â€Å"other†, a â€Å"subject† which is reminiscent of scientific research methods, as gleaned above in the definition of Active Participatory Research, there comes a shift in the treatment of participants in the study as not merely passive subjects/objects but as co-researchers themselves. This has been seen to yield a richer understanding of the issues at hand and provides for easier enactment of proposed intervention programs. As such, it is my belief that future research in social psychology would veer towards this direction due to its effectiveness in pinpointing specific problem areas and formulating innovative solutions to such. This social psychology course has made an impact in my life in many ways. Studying theories and methods on human behavior has helped me become more aware of my own behavior and how it affects others. Knowing the detriment that my behavior may cause gives me the ability to slowly change my approach in interacting with others so as I will be able to have a more harmonious relationship with everyone around me. That said, this course in Social Psychology has not only helped me understand the world around me, but myself as well, that may yield positive changes not only in my life, but that of others’ around me as well. REFERENCE LIST Wadsworth, Y. (1998). What is Participatory Action Research? Australia: Institute of Workplace Research, Learning and Development, Southern Cross University Press. Checkland, P. , & Holwell, S. (1998). Action Research: Its Nature and Validity. Systemic Practice and Action Research, Volume 11, (Issue 1, Feb), p 9-21. Jenner, E. A. , Watson, P. W. B. , Miller, L. , Jones, F. , & Scott, G. M. (2002). Explaining hand hygiene practice: an extended application of the Theory of Planned Behavior. Psychology, Health & Medicine, 7(3), 311-326.

Tammy Larson and Mike Brennan

The case study involves a turn to turn talk between Tammy Larson and Mike Brennan on a female who had applied for a job as a housekeeper. The two were discussing the employee's profile. Details on her criminal conviction and drug possession raised a point of contention as the two were debating on whether to employ her. Currently, criminal conviction and drug possession is a subject that is put into considerations while selecting and promoting employees (Hayes ; Ninemeier, 2016, p.130). Ideally, employees ought to consider the nature or circumstances that led to these criminal offenses. Most of the people are pushed towards these offenses because of societal and psychological factors which they have little control over. Characters (functions or behaviors)As for this case, Tammy Larson and Mike Brennan should first identify the nature and circumstances which prompted these behaviors. From the analysis, they should be able to decide on the way forward. Besides, they should be able to identify the connection between a criminal conviction and the work they are supposed to do (Mattke, Van, ; Martsolf, 2014). For instance, substance use after work may have little effect on housekeeping roles. If the convictions involved issues like dishonesty and mistreatment, it would be hellish to employ the candidate. In order for the human resource to be fair and just, there exists the need to consult legal advice. This will help determine the best course of action (Hemming, 2015). Besides, Larson and Brennan ought to identify third parties and their statements on the employee's conduct. If I was the director, I would employ Stephanie. Management and leadership stylesThe federal law does not prohibit employers from seeking to know the criminal history of an employee. However, the same law prohibits employers from discriminating candidates on the basis of their criminal records (Mattke, Van, & Martsolf, 2014). Therefore, employers ought to consider laws and legal decision during the selection process. Some of the most important laws revolve around civil rights acts which determine employment decisions. For instance, we have Title VII of the Civil Rights Act of 1964 which dictates how employees should be treated following criminal allegations (Hemming, 2015). Criminal history and record are important because they help employers accurately decide on a responsible, reliable and safe employee. Therefore, I recommend employers to request their employees to list recent criminal activity.Recommendation Employers should identify a fair response to criminal records and allegations of those they want to the employee. Ideally, we are all humans, and thus we are subjected errs. Criminal records and substance use are social issues which are propelled by other factors; some of the factors are beyond our control (Hemming, 2015). However, employers ought to consider the legal advice and third-party consultancy before employing or dismissing an employee. For those individuals who have transformed, their criminal record should not pose the challenge of selecting them.Conclusively, Tammy Larson and Mike Brennan should consider many factors while deciding on the response. Most importantly, the selection should consider matching the organizational goals with the skills and qualifications of the employee. In this case study, the applicant has the traits required for the job opportunity; hence, her record should not be an obstacle towards being selected. However, the female applicant should be advised on the best approaches that will keep her away from criminal activities and substance use. Naturally, it is unfair to judge a person based on their records or past engagements. ReferencesHayes,  D.  K., & Ninemeier,  J.  D. (2016).  Human resources management in the hospitality industry.Hemming,  A. (2015).  Criminal Law Guidebook: Queensland and Western Australia. Melbourne: OUPANZ.Mattke,  S., Van,  B.  K., & Martsolf,  G. (2014).  Final report: Evaluation of tools and metrics to support employer selection of health plans.

Friday, August 30, 2019

Goya and Research/Analysis on His Works

I used to draw as a child, but then again, who didn't? But as I dove into my art class, I found out that art was a lot more interesting than I thought. I visited the Getty Center as a young child, and as memory portrays it, the museum was boring and strict. So when I found out I would be venturing there once again, I was uninterested and sullen. To my surprise, I loved the trip. The architecture was the first thing to appeal to me, and my grandma, who was from Korea, had never seen anything like it! I loved the different paintings, some telling tales of old.I learned that to all art is stale and boring, but can tell you a story if you Just stop and listen. The two paintings that I have decided to compare and contrast are Saturn Devouring His Son by Francisco De Soya and The Sleep of Reason Produces Monsters also by Francisco De Soya. I chose Saturn Devouring His Son by Francisco De Soya because it stood out to me. My childhood drawings were no different from any other adolescent boy, monsters destroying cities, giants eating cars, violence and fiction.When I saw Saturn Devouring His Son, my childhood memories clicked and it seemed like an adult erosion of any child's drawings. The painting shows Saturn with wild hair, bulging eyes, fists dripping in blood, and a frenzied look on his face. He is crouching in the darkness, violently eating a child. From a simple glimpse, this painting might seem pure carnage and evil, but as with all paintings, there is a message it conveys. In Greece-Roman mythology, the Sky and Earth bore Saturn and his siblings (the Titans). When the Sky pleaded for Saturn to kill his father, he agreed and afterwards married his sister Rhea.Some time later it was prophesied that one of Saturn children could be his demise, so Saturn devoured every child that was born except one, because he was tricked. Some assume that Soya got his inspiration for this painting from Peter Paul Rube's 1639 piece that depicted Saturn with a scythe and constellati on, tearing into a child, but with no blood or gore. Francisco De Soya actually painted this work along with the 14 other Black paintings in a house called Quanta Del Sword. This series is known as is Soya took away any indicator and instead painted the vicious scene of cannibalism that would have taken place.There are no indicators that this painting is mythological in any way. The reason Soya chose a female instead of a male corpse is most likely because Soya was struggling with his own old age and that he had bad luck with love and happiness. Saturn in Greece- Roman mythology represents lost time and Soya was not only painting a myth, but painting a message that time was attacking his chance at love and youth. The other artwork that I chose is The Sleep of Reason Produces Monsters also by Francisco De Soya. I chose this piece because I liked the artwork and [epic]

Thursday, August 29, 2019

Goal Setting Personal Statement Example | Topics and Well Written Essays - 500 words

Goal Setting - Personal Statement Example I have some very lofty goals that I know are challenging but I am on the right path. Currently I am working towards becoming a Clinical Physcologist. I am attending the University of Wisconsin-Madison as a freshman. I am highly ambitious as I will be completing 26 credits for my 1st semester (normally coursloads run from 15-20 credits). I have sustained a high level of achievement throughout all of my academic career, my many awards and honors include Honor roll (200-2006), Who's Who Among American High School Students, High School student achievement award (2004 and 2006), Student of the month (2004), National Honor Society(2004-2006), and Kiwanis Club certificate of Scholastic achievement (2003). I have not only excelled in academics but in sports as well as participating in community service. I was awarded the Bradford athletic award for volleyball in 2003 and have volunteered at the lions club and Shalom Centre, where I have helped serving meals as well as helping those in need. I am an excellent candidate for the scholarship awarded by the Slovak American Charitable Association. I am the third generation of my family to be a member of the "First Catholic Slovak Ladies Association". I am proud of who I am and where my family has come from.

Wednesday, August 28, 2019

Describe the best tactics and techniques for message presentation, Essay

Describe the best tactics and techniques for message presentation, regardless of medium - Essay Example People spend their time reading blogs, and they end up trusting bloggers. It is important to know how to pitch a campaign to bloggers. Bloggers always require the right approach from any prospective client (Eberhart, 2012). Firstly, they require the client to formulate an exciting offer. The client should assure the blogger of some benefit from pitching the campaign on his or her blog. Secondly, the theme of the message should be simple and straight to the point. The subject should not sound as if the blog is trying to promote sales. Third, when pitching a campaign to bloggers, always bear in mind that the blog is about them. Bloggers strive to be successful, and the message ought to deliver value. Lastly, the most important point is that the pitches should always be as personal and customized as possible for a specific blogger (Townsend, 2009). Individuals should exhibit readership qualities if they are willing to identify the best blogger. An individual who has been active in reading the blogger’s work would know their recent blogs and what they prefer to write about. Such an individual would have some opinion towards the blogger’s work. A blogger should maintain a high ‘post frequency’ to be relevant and to maintain an engagement with the audience. The blogger’s relevance would be evident if his or her blogs maintain a strong social presence and receive comments, and he responds to the comments. Identifying specific blogs would entail evaluating their potential reach. A blog’s potential reach should be directly proportional to its amount of subscribers. There are numerous avenues on the internet where people can find specific blogs or bloggers to pitch their campaigns. Social media sites are the readily available and easily accessible online platforms where to search for specific blogs or bloggers. They include; Facebook, Twitter, Google+, Tumblr, Wordpress, and Linkedln Influencers. There exists a link between the presentation of the

Tuesday, August 27, 2019

Accounting information system Essay Example | Topics and Well Written Essays - 1250 words - 5

Accounting information system - Essay Example n cases where they have accepted to donate, the organization simply collects the cheque or cash from the donors and issues an acknowledgement for receipt of the funds. Some of the donors are government agencies, corporate sector, trust and foundations. Additionally, the organization gets its finances from program fees and consultation fees. Therefore, the revenue cycle has limited actors and the processes are simple and few as well. For instance the process of obtaining revenue is through donations and fees charged for consultations and program fees. There are no products or services to be sold in exchange for money. Therefore processes such as order processing, billing, invoicing and deliveries are not there. The revenue cycle is initiated by developing a set of programs and projects that can be funded by the donors. The organization writes a proposal to the donors who will in turn give a feedback on whether they will support the proposal or not. The following are some of the processes inherent in the revenue cycle: i) Request Proposal: This is done by the projects and program development department. The proposal for the various projects and programs is developed and submitted to the various donors. The donors will go through the proposals and determine whether they will support the project or not. Proposal development is an intensive process that requires a team of experts. The final proposal is submitted by a projects coordinator who is in charge of all project activities in the organization. ii) Approval of program Proposal: Once the donors receive the proposal, they will scrutinize the contents of the program proposed and decide whether to fund it or not. They will then approve the program and pledge their support for the organization. The program proposal always has the estimated budget, the duration of the program and the expected start and end date. It also has additional details that include the financial and technical proposal. It must have the

Monday, August 26, 2019

What We Know About the Achievement Gap Essay Example | Topics and Well Written Essays - 250 words

What We Know About the Achievement Gap - Essay Example Among the reasons why there is persistence of the gap include the following issues; Large class size as one of the factors that contribute to the persistence of the achievement gap (Taylor). I have realized that because the ratio of students to teachers is not equal and, therefore, all pupils will not get full attention from their teacher. In the analysis of literature, it is evident that there are factors that relate to the students ability in school (Paige and Witty) according to reading I have used. For instance, the student might be lacking interest in school, or they are totally not putting in much effort to boost their achievement. In addition, Poor teacher preparation as well as low expectations of students is also some of the factors that contribute to the persistence of the success gap in an institution according to Chubb and Loveless. If the teacher is not going to plan the lessons in a way that the students can easily comprehend. With respect to realization of the concepts of the gap, I realize that there will be a significant achievement gap that will give both students and the teachers a hard time to settle. In order for the achievement gap to reduce, the management should ensure that they provide a conducive environment for learning. Moreover, the teachers should also work together with students towards their set objectives in order to reduce the performance

Sunday, August 25, 2019

English Essay Example | Topics and Well Written Essays - 250 words - 22

English - Essay Example One of the main differences between soccer and football is the use of the hands and feet. In soccer, the only person who can touch the ball with his hands is the goalie. In football, the ball is carried by hand or thrown by hand only (Tara OÂ ´Gorman) For American football the playing field will be of size 90-120 m long and 45-90 m wide while in world football it is around 110 m long and 48.8 m wide. In world football each player will have specific positions while in American football such positions are not defined. In football there will be mostly the match is controlled by a referee and 2 lines man while in American football apart from a referee another 6 more judges will be there. In football the ball will be a round leather ball measuring 68 and 71 cm in circumference, weighing between 396 to 453 g. But in American football the ball is an extended spheroid with a circumference of 72.4 cm around the long axis and 54 cm around the short axis, weighing about 397 to 425 g. Though both in American football and in world football colored uniform is used by player, the pants of the world football players will be little longer than that used in American football. American football players enjoy direct contacts with the fans while in world football players will be under protective armor. World football playing time is 90 minutes consisting of two equal halves of 45 minutes with a 15 minute break in between while in American football is divided into 4 quarters of 15 minutes each. World football is more popular than the American football with famous football playing countries like, Brazil, Italy, England, Argentina, Germany, Netherlands, etc. which brings joy to trillions of fans

Saturday, August 24, 2019

The American Dream Essay Example | Topics and Well Written Essays - 750 words - 3

The American Dream - Essay Example Activists like Martin Luther King also called for freedom that was more directed at the black Americans but not the whole America population. The variations listed shows that the dream is somehow different to the people (Kelly 20). Although the American dream is unique and it means different to various individuals, achieving it is completely a hard and demanding task. One of the challenges that make achieving the dream hard is the fact that the opportunities that exist in the country are hidden and they require a combination of knowledge and wisdom to access. Like in an example, there are limited job opportunities that call for high qualifications while majority of the individuals do not meet the requirements (Horswell 43) Again, most of the Americans still have a strong believe that their problems solution lies in the hands of the government and that big businesses will boost their economic growth without personal efforts, thus making it hard to achieve the American dream (Kochan 63). Finally, the American dream tries to inspire hopes and optimism to the American people that are not accompanied by the appropriate resource to achieve. The result of this is that most of the people come up with big dreams forget ting the fact that, to meet these dreams, there are infrastructure needed, resource mobilization and improvement that needs to be put into place. To achieve the improvements, people need to be engaged in well-paying jobs, have quality education and work hard which is not the case in the country (Kelly 21). The small business ventures are the spine of the economy of the U.S because it provides employment for tens of millions of the Americans. The businesses create most of the jobs that people in the U.S are engaged in. It, therefore, gets important for the government to come up with an adequate way of financing and giving credit to the small business to spur manufacturing and the expansion of the businesses (Ringer 80). The nature

Friday, August 23, 2019

Introduction to Mechanical Engineering Essay Example | Topics and Well Written Essays - 2250 words

Introduction to Mechanical Engineering - Essay Example Mechanical engineering is among the oldest engineering branches. The branch has also been named as the ‘mother’ branch of engineering. One appealing characteristic of mechanical engineering is the extreme broadness and diversity of its application base. Nearly all inventions made in the ancient times and most in this modern era are attributed to one or more applications of mechanical engineering (ASME International). Mechanical engineers are usually involved in concepts like thermodynamics, kinematics, robotics, fluid mechanics, structural analysis among others. The above concepts are used in the designing process of state-of-the-art units of manufacturing, aerospace and aircraft parts, a range of industrial machinery and various motor vehicle types. Mechanical engineers have a large contribution to the development of different power-plant equipment, engines, complex and simple machinery and cooling and heating systems. Apart from designing mechanical systems, mechanical engineers are also involved in maintaining, testing and manufacturing them (Wickert 2). The abovementioned are the conventional responsibilities and roles of mechanical engineers. ... list of 36 technical divisions, ranging from aerospace engineering and sophisticated energy systems to textile engineering and solid-waste engineering. Due to the diverse nature of mechanical engineering, professionals are involved in designing and building of devices and machines which allow people to survive and work under water, on the ground, in the air and in space. They manufacture machines which can extend people’s abilities, health and living standards, and impact their living environment. Naturally, the availability of materials for tackling their tasks determine most of the things these professionals can or cannot achieve. This is the reason why engineers work closely with material scientists with the aim of tailoring the mechanical as well as electrical and chemical characteristics of materials to explore the possibility of making new applications (Wickert 7). The job profile of mechanical engineering is ever increasing and this calls for professionals to venture in to marketing and financial features of product development as well as into management of both people and resources. In general, mechanical engineering provides a wide range of job choices to students seeking a stable and interesting career. Beginning Your Journey into Mechanical Engineering The first step to take in order to become a mechanical engineer is passing in chemistry, mathematics and physics. To qualify for enrollment into a mechanical engineering programme in a college, one should score at least 50 to 60 percent in the three subjects. After this, one is expected to sit for entrance examinations like The Joint Entrance Examination for IITs (IITJEE) to be admitted to different IITs among others. There are numerous engineering colleges in the world where one can get enrolled into a

The Similarities and Differences of Two Early Civilizations Essay

The Similarities and Differences of Two Early Civilizations - Essay Example There are various characteristics of civilizations, including the type of subsistence, form of government, economic system, education, social stratification, and human settlement patterns. Moreover, civilizations are characterized by religious beliefs, art, and architecture among other aspects (Trigger, 2007, pp. 57-65). This paper is a critical examination of the Nile valley and Mesopotamia ancient civilizations. Discusion The Nile valley civilization existed back in the 3000 BC and it consisted of three major civilizations, namely Nubia, Egypt, and Kush (Ikram, 2009). Geographically, the Nile valley civilization was located in the Lower Egypt in the river Nile’s delta and in the Upper Egypt along the river in Africa’s interior. The rich alluvial and silt deposits of River Nile provided the Nile valley civilization with rich agricultural land for farming along the banks and the delta. The inhabitants dug complex channels to irrigate their crops from the waters of the r iver. The government of the Nile valley civilization became theocratic after the unification of the Upper and Lower Kingdoms in 3100 BCE (Ikram, 2009). Pharaoh became the ruler of the unified Egyptian kingdom after establishment of the first dynasty in the civilization. Theocratic government implies that pharaohs were regarded as gods, and they served as political and religious leaders (Scarre & Fagan, 2007). Egyptians believed that pharaohs were omnipresent and continued ruling after death. Consequently, their bodies were mummified, preserved, and buried in special tombs enclosed in huge pyramids. The Nile valley civilization was polytheistic and believed in life after death. The society of ancient Nile civilization was stratified and consisted of four classes, namely the royal family (Pharaoh), upper, middle, and lower classes. The upper class consisted of priests, government officials, landowners, and military leaders while the middle class consisted of traders and other skilled people. The peasant farmers and other unskilled people belonged to the lowest class (Trigger, 2007). Nile valley civilization provided social mobility – people from the lower class could rise to middle and upper classes through hard work or marriage. Men and women had almost equal rights, sharing privileges such as education, seeking divorce, and property ownership (Ikram, 2009). According to Scarre and Fagan (2007), Mesopotamia was located between Tigris and Euphrates rivers in the Persian Gulf and it is the oldest recorded civilization. The rivers provided water for irrigation and fertile silt, which formed rich agricultural land for the Mesopotamians. These favorable conditions amidst the harsh desert climate in the region attracted the settlement of Sumerians. Sumerians are credited for the creation of the earliest civilization in Mesopotamia and for introducing city-states, education, and better technology in addition to foundation of organized institutions. Though city- states shared the same culture, they were autonomous. Each city-state had its own government that was led by its own leaders (Trigger, 2007). Temple priests led early Sumerian governments. In an economy that relied heavily on agriculture, farmers believed in appeasing the gods to enhance agricultural production. Therefore, the priests were regarded as the appropriate leaders to mediate between the farmers and the gods. However, military rulers later took over the leadership of Mesopotamia civilization

Thursday, August 22, 2019

The Effects of Water Shortages in the Last Decade Essay Example for Free

The Effects of Water Shortages in the Last Decade Essay The effects of water shortages in the last decade. New water purification technologies This oral presentation will be divided into few parts. The first one will deal with how the water supplies available to the people, have gradually decreased in the last decade; statistical data will be presented, together with some pictures and graphs. Also, it will make a projection of what could be the impact of the water shortages in the near future and will examine how devastating the need for drinking water could become if certain measures for retaining it are taken very soon. The next part will be about some of the innovations in the water purifications technologies. The last part will be a discussion, where your questions you will be welcomed and I will also ask a couple of questions. It is quite popular to refer to our planet Earth as the Blue Planet and probably all of us are aware why this nickname is given. That’s because of earth’s surface is 70% covered by water. Unfortunately, only around 2% of this is drinking water and the question are we using this small quantity responsively is getting more and more discussed recently. The shortest answer to this question is â€Å"No†; humanity needs too much fresh water and shortages have become highly noticeable. It’s needless to say that water is crucial for all life on earth. It plays an essential role for our health, economy, food production, and environment. Also, drinking fresh water is a compulsory element of the development of the public health, since 21 of the 37 primary diseases are related to water and sanitation. With the growing world population (over 7 billion so far), water consumption rate doubles every 20 years, a pace that is double the rate of population growth. If population and consumption trends persist, it is estimated that the demand for water will surpass its availability by 56%, and 1. 8 billion people will be living in regions of water scarcity by 2025. This situation is exacerbated by the fact that developing countries, already experiencing water-stress, often have the highest population growth rates—bringing more people into a region that already cannot support them. Here it’s important to explain the terms â€Å"water-stressed countries† and â€Å"water-scarce regions†, given the fact that in the near future they will become part of the geographical description of further more parts of the world. Water-stressed countries are regions with fewer than 1,700 m3 of water per capita per year. People living in water-stressed regions must make painful decisions about using water for personal consumption, agriculture, or industry. Regions with fewer than 1,000 m3 per person per year are defined as water-scarce. Water-scarcity hinders economic development, strains the environment, and drastically limits food availability. The 2009 World Water Development report revealed that nearly half of the global population will be living in regions of high water stress by 2030.

Wednesday, August 21, 2019

Operation Buckshot Yankee

Operation Buckshot Yankee Operation Buckshot Yankee: The Primary Point of Weakness By Jeffrey Higa Abstract Operation Buckshot Yankee is a catastrophic event that was a turning point in cyber security for the U.S. government. This incident established the current dominating war fighting domain known as cyberspace and established the need for increased cyber security. I would like to highlight the event known as Operation Buckshot Yankee, how and why it happened, a possible solution that could have prevented this, and similar events synonymous to this situation. I would like to highlight the main point of weakness from my perspective on the situation and propose how this weakness can be strengthened with proper people management and training. I will provide explanations and examples to provide a clear view on how this situation could have possibly be prevented, and statistical data to back up my findings as well as a personal example of a real situation recently occurring in my career. By being able to estimate the possible costs of damages in both monetary and reputational damage caused in these situations, these numbers can prove how valuable data can be and what the costs of a simple mistake such as using a mysterious flash drive can cause. In conclusion, I would like to mention a possible solution to the problem and my personal view on the situation and how it applies to us not only in this event, but also has an impact on our everyday lives in the field of IT and IT security. Essay Operation Buckshot Yankee is based on a cyber security incident which took place in the Middle East in 2008. This cyber attack event was a turning point in the history of U.S. cyber defense, and caused drastic losses of data from secret government databases. Operation Buckshot Yankee was the name of the operation to stop a malicious code that was contained on a flash drive an American soldier found in the Middle East. This flash drive was then inserted by a government employee to a laptop connected to Central Command networks and caused the code to spread throughout classified and unclassified military networks allowing the enemy to steal valuable information on these systems. According to an article by Lynn (2010), U.S. government systems are constantly probed and scanned by adversaries millions of times daily, but this attack was an example of a successful cyber attack. The military lost thousands of data files including weapon and operational plans as well as surveillance data stored on classifieds U.S. networks. Having this incident happen, the government has realized the need for increased cyber security and work to create a secure international network. In response to this attack, the government declared cyberspace as an official war fighting domain, and initiated plans to regulate cyberspace crimes and safety. Up to this attack in 2008, Operation Buckshot Yankee is said to have been the most significant breach of U.S. military computers to date according to an article by Nakashima (2010). According to Lynn (2010) this type of attack is the introduction of a new type of war fighting that opens up the new domain known as cyberspace where traditional war laws do not apply. Cyberspace has now become the primary point of attack, as these types of attacks are relatively inexpensive as they only required trained individuals and computers, rather than large expensive equipment such as tanks and jets. According to another article by Nakashima, the NSA was alerted by a signal in the U.S. system trying to send messages back to the code creator. The NA then found a program that infected their classified network and was sending data out. They sourced the code to the aforementioned thumb drive and found that the code would look for important documents and spread itself to other thumb drives connected to the network. The malicious program was called Agent.btz and infected the host computer and spread over the network to other computers. Any other flash drives connected to already infected computers were then also infected and caused further spread throughout the network. The article also mentions that the code had already been out for months prior to the attack, and was floating around the internet but did not have access to government systems due to them being isolated from the public networks. Due to the government not being able to scan public networks thoroughly, the code was bypass ed until the incident. This situation highlights the danger of insider threats, whether intentional or accidental. In the case of Buckshot Yankee, the carelessness of an individual was the cause of the insider threat which compromised an otherwise secure system isolated from outsider threats. Operation Buckshot Yankee is the planned government operation of shutting down Agent.btz and putting a stop to the stealing of government data. The government analyzed the code and saw that it was looking instructions on what actions to take. The NSA Tailored Access Operations team created a plan to force the code to deactivate itself by sending their instructions for it to shut down. The operation was a success and the instructions were sent out across the network once testing as done, and the malicious code was shut down. Though this code was put to a stop, many important government documents had already been stolen, but the incident was put to a halt. This incident led to the banning of thumb drives on Department of Defense systems as a security measure from preventing a similar incident from happening again. The flash drive was sourced in the Middle East and according to an article by Goodin (2010) the source code was said to have been from Russia but there is no solid evidence directly proving this. The article by Goodin also describes that Government systems are constantly under the threat of cyber attack, and that a dozen computer hackers could drastically cripple U.S. government networks if a network vulnerability is found. This is a perfect example of how drastically times have changed, and that cyberspace is the new arena to commence attacks. According to the article as an example, a dozen people at computers could possibly bring a country down in an extremely cost and labor efficient manner. Losses of life would be minimal for adversaries compared to a kinetic attack, and damages caused could be in the form of disruption o f services or staling of valuable data as described in Buckshot Yankee. A great example of disruption of services would be the event in Estonia as described by Richards (2009). A Distributed Denial of Service attack was launched against Estonia in protest of moving a politically valued statue. These attacks lasted three weeks and were strategically launched targeting banks and other essential services to cripple the technological systems of Estonia. Having essential services shut down can cause chaos and leave a country vulnerable to attacks if an adversary were to take advantage of the situation. Taking that into account, resulting damages of cyber warfare and cyber attacks could essentially have worse effects than kinetic war or possibly result in additional kinetic war. Operation Buckshot Yankee is a perfect example of how battles will most likely be fought in this current era and going into the future. Cyber attacks are en extremely inexpensive and efficient method of causing a significant amount of damage with minimal effort. Due to the nature of cyberspace, attacks are also very difficult to pinpoint and regulate. Traditional laws do not apply here as there are no clear boundaries in the world of cyberspace. As described in an article by Mjr. Gen. Charles J. Dunlap USAF (2009), the definition of cyberspace itself is yet very unclear and undefined. Without proper definition, it is difficult to make accurate laws to apply to this new war fighting domain. The only real protection as mentioned in this article is for nations to take responsibility for their own actions and their citizens. In the case of Operation Buckshot Yankee, this was the unintentional irresponsibility of a U.S. citizen. Due to difficulty in specifically sourcing threats and the l imitless boundaries of cyberspace, it is almost impossible to place blame on a certain country or individual, especially if they are located in another country. As in the case of Buckshot Yankee, though the incident was caused in the Middle East, the code is theoretically sourced from Russia, but there is no way to truly prove it. This brings me to the point that the primary point of any cyber security system is human error. I believe that people cause the most problems in any technology environment regardless of the situation. Computers are controlled by people that cause the problems. Another great and synonymous example is the recent event of credit card information being stolen from Target. An article by Riley, Elgin and Matlack (2014) malware had been installed on Target’s computer system to steal credit card information as it was swiped. Target had installed a detection system by FireEye to detect malware prior to the event happening, but the system was ignored even when alerts were given to the companies’ IT and management. According to the article, about 40 million credit card numbers and 70 million other pieces of information were stolen before the situation was acted upon. This is another prime example of a system working properly but being held back by people. Had this situation been a cted upon as soon as the alert was announced, many peoples’ valuable information would have been saved, and the company would have saved possibly avoidable expenses. As described in a book by Harris,S., Kumar,P.V. (2013), the most important part of cyber security is people. Operation Buckshot Yankee is a perfect example of how human error can cause catastrophic damage. Whether it be due to improper training or carelessness, this event started with the actions of a single person and turned into a widespread situation with catastrophic damages. If proper training was initiated and due diligence was practiced, this situation could have been avoided. Most would consider a random flash drive found in an adversary country to be suspicious and would not try to plug it into any computer, let alone a secure government system, but user errors such as this are the primary cause of incidents regarding technology. Wilshusen (2013) shows statistics from government agencies explaining that 20% of cyber incidents are due to improper usage; only secondary to incidents still unexplained or under investigation. This statistical data is a definite indicator that people are the primary cause for problems in even federal government agencies. By having solid statistics based on real reports from 2012, it is irrefutable evidence that people are the primary cause of concern and outlines the need for continuous training and testing of knowledge. By keeping people properly trained and reducing the number of unknowing individuals having access to network resources above their knowledge these numbers could possibly be greatly reduced. A great personal example is at my place of employment. I work for a government sponsored healthcare company which handles patient data on a daily basis that is regulated by HIPAA. There are a few employees who are older aged (50-60) and are relatively unfamiliar with computers regardless of training given. A prime example is one employee in particular who is in upper management. I cannot think of a more perfect example of a prime target for any type of cyber attack, from social engineering to spam emails, she has fallen victim to them all and constantly does to this day. Upon sitting at her computer, all her usernames and passwords can be found on sticky notes on her desk or under her keyboard. She also opens every email and attachment regardless of what it says or who it is from. We recently had a couple simultaneous incidents happen with her in the past few weeks. The first sign was her email account being locked by our service provider. We called and they said her email was being used to send thousands of spam emails while logged in from China. Upon fixing this and changing her passwords etc., we scanned her computer only to find more than 17,000 malware installed on her computer. We constantly inform her about how to properly inspect email and about not giving out personal information or opening every attachment. Even with antispam programs on our server, some emails will always slip through, and she will always open them. I find this to be a prime example of human error and carelessness to perfectly describe how an incident such as Buckshot Yankee can occur. The statistical cost provided in an article by Ponemon Institute (2012) has shown in a survey that the average cost to a company of a successful cyber attack is about $214,000. This shows that the damages can be significant, and that data is extremely valuable. In the case of buckshot Yankee, the data which was stolen containing weapon plans, and confidential operations and surveillance data is of significant value and could result in catastrophic damages to the U.S. in both costs and possibly loss of life. If this data is placed in the wrong hands it could be used maliciously and the damage could be limitless. In the situation of my workplace, losing patient data could also be a significant loss, leading to possible lawsuits and compromising of patients’ personal information. In the case of target, had the situation been handled properly and the security system been utilized, it could have prevented the significant leaking of data. In a journal by Espenchied (2012) of Microso ft, Operation Buckshot Yankee took almost 14 months to clean up from Department of Defense and Pentagon networks. In all of these situations damages would not only cause significant monetary damage, but also damage the reputation of the data holder. For companies like Target, fixing the damages caused has resulted in an estimated $61 million in expenses and 9 lawsuits according to Riley, Elgin, and Matlack (2014). Had they acted quickly, these damages as well as damage to their reputation could have been minimized. Conclusion In conclusion to these findings, I would like to stress the importance of proper continued training of employees in any type of computer related job, as proper use of computer systems is the best method of preventing such events from occurring. Though proper training can be expensive, it can end up saving more money as well as reputation of the company as exampled given in each situation mentioned. Though the U.S. government has a highly sophisticated and expensive cyber security system, it was compromised by a simple mistake. The importance of due diligence and due care is extremely relevant to Operation Buckshot Yankee, as had the zero source individual been informed, they would have considered the mysterious flash drive a threat, and would not have compromised the system by carelessly using it. Because of how difficult it is to find and hold any party responsible in the domain of cyberspace, the best preventative measure is to make sure that your systems are not exposed to internal threats. Most threats from outside can be filtered with hardware and software, but inside threats are the largest problem. As described by Wilshusen (2013), user error is the leading known cause of cyber incidents in federal agencies at 20%, followed by malicious code at 18% also due to user carelessness; with direct threats such as unauthorized access and probing last at 17% and 7% respectively. The personal example I had given in my place of employment is another example of an insider threat compromising the network due to user misuse and carelessness. The only solution to keeping U.S. cyberspace safe is by ensuring that all hardware and software systems are up to date with current threats, and properly maintained in addition to informed system users. By regulating who has access to data resources, and making sure they are trained to the necessary level of knowledge, we can prevent these future mistakes from happening, and minimize possible damages due to data loss. These concepts apply not only in a government setting, but apply to use at work and even on our personal computers at home. Keeping cyberspace safe is the responsibility of all computer users, and is of utmost importance in this era where we are so dependent on computers. References Beidleman, Lt. Cl. Scott W. DEFINING AND DETERRING CYBER WAR†, (2009): 1-40 Espenchied,J.A. (2012). A Discussion of Threat Behavior: Attackers Patterns. Goodin, D. (2010, August 25). Pentagon confirms attack breached classified network †¢ The Register. Retrieved from http://www.theregister.co.uk/2010/08/25/military_networks_breached/ Harris,S., Kumar,P.V. (2013). CISSP all-in-one exam guide, sixth edition.  New York: McGraw-Hill. Lynn, W. J. (2010, October). Defending a New Domain | Foreign Affairs. Retrieved from http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new- domain Nakashima, E. (2011, December 8). Cyber-intruder sparks response, debate The Washington Post. Retrieved from http://www.washingtonpost.com/national/national- security/cyber-intruder-sparks-response-debate/2011/12/06/gIQAxLuFgO_story.html Nakashima, E. (2010, August 24). Defense official discloses cyberattack. Retrieved from http://www.washingtonpost.com/wp- dyn/content/article/2010/08/24/AR2010082406495.html Ponemon Institute (2012, May 24). Infosecurity Cybercrime costs companies an average of $214,000 per attack. Retrieved from http://www.infosecurity- magazine.com/view/25966/cybercrime-costs-companies-an-average-of-214000-per- attack/ Richards, J. (2009). Denial-of-Service: The Estonian Cyberwar and Its Implications for U.S. National Security. Retrieved from http://www.iar-gwu.org/node/65 Riley,M., Elgin,B., Matlack,C. (2014, March 13). Target Missed Warnings in Epic Hack of Credit Card Data Businessweek. Retrieved from http://www.businessweek.com/articles/2014-03- 13/target-missed-alarms-in-epic-hack-of-credit-card-data Wilshusen, G. C. (2013). CYBERSECURITY. A Better Defined and Implemented National Strategy Is Needed to Address Persistent Challenges, 36. Wilson, G. C. (2013). CYBERSECURITY. A Better Defined and Implemented National Strategy Is Needed to Address Persistent Challenges, 36

Tuesday, August 20, 2019

Energy Efficient Building Design Strategies For Hot Climates Construction Essay

Energy Efficient Building Design Strategies For Hot Climates Construction Essay This research discusses energy efficient design strategies of traditional houses in Iraq (hot-arid climate), climatic design techniques and potentials for renewable energy systems that can be implemented in the contemporary residential design techniques in order to offset the absence of produced energy (due to current economic and political issues) and help decreasing demand for electricity, which is used extensively to overcome the indoor thermal discomfort during the harsh summer seasons. A comparison between traditional Baghdadi house (Hosh), which existed before the discovery of oil, and a contemporary house design option is to be made to evaluate the thermal performance of both options in this climatic zone in order to adapt more energy efficient design strategies; and also to integrate features for sustainable building design and potentials to implement renewable energy systems. A simulation modeling is to be used to conduct analysis of energy efficient design strategies, namely relating to building envelope, size and direction, ventilation, shading elements, and using renewable energy systems in order to present recommendations that helps in consequential energy offset while preserving comfort. Keywords: Introduction Examining the energy demand in such region, buildings, with particular reference to residential houses, are one of the most significant energy-sensitive entities (Al-ajmi Hanby, 2008). It is stated that buildings consume over half of all electricity and one-third of natural gas (Yilmaz, 2007). Reduction of energy consumption in residential buildings is a major aim worldwide and is a particular challenge in this region for the reasons mentioned previously (Al-ajmi Hanby, 2008). Therefore, sustainable design strategies are of great importance nowadays in order to reduce energy consumption in residential buildings. One may say that sustainability was already a driving force in the past, showing its validity in those days in different forms and techniques. Therefore, problems and precautions in design and construction did not change fundamentally, although a lot of development was seen in materials and technology. Of course, these developments may have had some negative effects (Yilmaz, 2007). Energy efficient design strategies for traditional houses in such climate are significantly different from each other as it can be easily seen in the traditional design (Yilmaz, 2007). Description of Problem Area Energy consumption is becoming more and more important in todays world because of a possible energy shortage in the future. Efficient use of energy has become a key issue for the most energy policies (Yilmaz, 2007). In regions where hot-arid climatic zone is prevailed, practically in Iraq, present economic and political circumstances have become the main reasons that led to a significant energy shortage although Iraq has a spare operational capacity of oil supply in comparison with other countries around the world. A significant need for new energy efficient design strategies and developed buildings construction standards in this area has become essential in order to offset the absence of produced energy and help decreasing demand for electricity, much of which is consumed in air conditioning systems, which is used extensively to overcome the indoor thermal discomfort during the harsh summer seasons (Al-ajmi Hanby, 2008). Conceptual Framework Figure (1) provides a diagram of the conceptual framework that has devised for this research. The proposed research study into traditional and contemporary building design systems will rely on an experimental research strategy in the positivist system of inquiry (developed design strategies). The research will attempt to establish a comparison (Groat and Wang, 2002, P. 254) between a treatment (independent variable) and an outcome (dependent variable) through the evaluation of measured results. Figure (1) Conceptual diagram of the research variables (Groat Wang, 2002) Research Questions Do traditional houses perform better than contemporary ones? Why? Is it feasible to use traditional design strategies in contemporary houses? How could we achieve a sustainable building design in such climatic zone? Do we need new or developed strategies in order to achieve sustainable building design in such climatic region? What if we integrate renewable energy systems into traditional house design? Project Goals and Specific Objectives The purpose of this research is to: Make a comparison and evaluation of thermal performance of residential houses (traditional vs. contemporary) in Iraq (hot-arid climate) in order to adapt more developed and energy efficient design strategies. Integrate new trends for sustainable design in residential houses in this area. Potentials to implement renewable energy systems. This research is achieved through the following: Extensive overview of the antecedent literature in the area of energy efficiency and thermal building performance in such climatic zone. Identify the most effective strategy from the literature that can be applied in order to develop more energy efficient design strategies. Un-wrap issues of energy efficiency, building performance and sustainable design systems. Use a simulation modeling as a tactical tool to make comparison between contemporary and traditional building design systems and energy performance in order to investigate the thermal characteristics and energy savings for both building designs using different strategies and also potentials to integrate sustainable features using renewable energy system. Test outcome results and write a research report accordingly which combines my understanding of the relevant theory and previous research with the results of my empirical research. Literature Review The literature review is structured around the key concepts of significance of energy efficient design strategies, thermodynamics of hot-arid climates, Inventory of traditional design elements in hot-arid climate and energy simulation methods. These key concepts have led to the research questions and the proposed methodology for this research proposal. See figure1 for the map of literature reviewed. Figure () Map of sources reviewed Figure () Research Literature Review Diagrammatic (Groat Wang, 2002) Building Design Strategies Climatic Building Strategies Research by Ochoa Capeluto (2008) states a quick review of design strategies for different climatic zones. This is necessary to examine when and how design strategies should be considered, particularly during design process. Climatic building strategies in hot climates differ from those of cold ones, For example, in cold climates heat collection and storage is essential, and ventilation must be limited for the same reasons. Short daytime and low radiation levels in winter make maximum penetration of natural light to be desired. On the other hand, in hot climates heat must be excluded, the amount of relative humidity controlled, and the thermal mass cooled usually through natural ventilation during the night. Daylight penetration must be carefully managed using control devices (see figure 1) (as cited in Ochoa Capeluto, 2008, Building and Environment, P.1830). Figure (1) Building strategies for cold and hot climates (Ochoa Capeluto, 2008). Optimized Building Envelope A building envelope is a skin that separates between the interior and the exterior of a building. It serves as the outer shell to protect the indoor environment as well as to facilitate its climate control (controlling heat transfer between building layers). The study by Danny Harvey (2009) reviews the literature concerning energy efficiency that can be achieved through optimized building envelope. According to Danny Harvey (2009), The effectiveness of the thermal envelope depends on: (1) The insulation levels in the walls, ceiling, and other building parts; (2) The thermal properties of windows and doors; and (3) The rate of uncontrolled exchange of inside and outside air which, in turn, depends in part on the air tightness of the envelope (infiltration/excitation) (Energy Efficiency, P. 141). Reducing the Cooling Load Energy conservation and climatic design techniques that can be implemented in residential houses in this area (hot-arid climate) are useful for reducing cooling energy consumption (Al-Temeemi, 1995). Danny Harveys (2009) research found the following: Reducing the cooling load requires: (1) Orienting a building to minimize the wall area facing directions that are most difficult to shade from the sun; (2) Clustering buildings to provide some degree of self shading (as in many traditional communities in hot climates); (3) Providing fixed or adjustable shading; (4) Using highly reflective building materials; (5) Increasing insulation; (6) Using windows that transmit a relatively small fraction (as little at 25%) of the total (visible + invisible) incident solar energy while permitting a larger fraction of the visible radiation to enter for daylighting purposes; (7) Utilizing thermal mass to minimize daytime interior temperature peaks; (8) Utilizing night time ventilation to remove daytime heat; and (9) Minimizing internal heat gains by using efficient lighting and appliances. The combination of external insulation, thermal mass, and night ventilation is particularly effective in hot-arid climates, as placing the insulation on the outside exposes the thermal mass to cool night air while minimizing the inward penetration of daytime heat into the thermal mass (Energy Efficiency, P. 141). Passive cooling techniques By using the above measures to reduce the thermal load of the building, other techniques requires small inputs of mechanical energy to optimize passive cooling processes (Danny Harvey, 2009). Danny Harveys (2009) research discussed the following major passive cooling techniques: Passive ventilation Passive ventilation reduces the need for mechanical cooling by directly removing warm air when the incoming air is cooler than the outgoing air, reducing the perceived temperature due to the cooling effect of air motion and increasing the acceptable temperature through psychological adaptation when the occupants have control of operable windows. Passive ventilation requires a driving force, and an adequate number of openings, to produce airflow. It can be induced through pressure differences arising from inside-outside temperature differences or from wind. Design features, especially traditional, that create thermal driving forces and/or utilize wind effects include courtyards, atria, wind towers, solar chimneys, and operable windows. Passive ventilation not only reduces energy use, but can improve air quality and gives people what they generally want. In buildings with good thermal mass exposed to the interior air, passive ventilation can continue right through the night, sometimes more vigorously than during the day due to the greater temperature difference between the internal and external air. Night time ventilation, in turn, serves to reduce the cooling load by making use of cool ambient air to remove heat (as cited in Danny Harvey, 2009, Energy Efficiency, P.142). Evaporative cooling Danny Harveys (2009) study further discussed the following in terms of producing evaporative cooling techniques: Evaporation of water cools the remaining liquid water and air that comes into contact with it. The coldest temperature that can be achieved through evaporation is called the wet-bulb temperature and depends on the initial temperature and humidity (the higher the initial humidity, the less evaporation and cooling that can occur). There are two methods of evaporative cooling the air supplied to buildings. In a direct evaporative cooler, water evaporates directly into the air stream to be cooled. In an indirect evaporative cooler, water evaporates into and cools a secondary air stream, which cools the supply air through a heat exchanger without adding moisture. By appropriately combining direct and indirect systems, evaporative cooling can provide comfortable temperature-humidity combinations most of the time in most parts of the world. Evaporative cooling is most effective in dry regions, but water may be a limiting factor in such regions. However, arid regions tend to have a large diu rnal temperature range, so thermal mass with external insulation and night ventilation can be used instead (Energy Efficiency, P.142). Influence of Energy Efficient Design Strategies on Design Stages The architectural design process is iterative and moves from the abstract (definition of massing, orientation, and image) to the specific (lighting control, mechanical ventilation type) (as cited in Ochoa Capeluto, 2008, Building and Environment, P.1830). At the design stage, key decisions taken by architects can significantly influence potentials to optimize building efficiency. These include decisions affecting the selection of building components. According to Ochoa Capeluto (2008), As it advances and more specialists are called in to solve details, earlier decisions, which could have an enormous influence on the building performance, are expensive and harder if not impossible to change (Building and Environment, P.1830). Other influential factors unrelated to climatic strategies must be taken into account. For example, a certain orientation that is bad for energy consumption might define how well the building performs (Ochoa Capeluto, 2008). However, it would require an Integrated Design Process (IDP), in which the design process optimizes the building performance by involving all members of design-making team from the beginning. The importance of an Integrated Design Process (IDP) on building systems approach Danny Harveys (2009) study found the following: The systems approach requires an Integrated Design Process (IDP), in which the building performance is optimized through an iterative process that involves all members of the design team from the beginning. However, the conventional process of designing a building is a largely linear process, in which the architect makes a number of design decisions with little or no consideration of their energy implications and then passes on the design to the engineers, who are supposed to make the building habitable through mechanical systems (Energy Efficiency, P. 140). The steps in the most basic IDP are: to consider building orientation, form, and thermal mass to specify a high-performance building envelope to maximize passive heating, cooling, ventilation, and daylighting to install efficient systems to meet remaining loads to ensure that individual energy-using devices are as efficient as possible and properly sized to ensure the systems and devices are properly commissioned By focusing on building form and a high-performance envelope, heating, and cooling loads are minimized, daylighting opportunities are maximized, and mechanical systems can be greatly downsized (Danny Harvey, 2009). Thermodynamics of Hot-Arid Climates Any consideration to energy efficiency applications or design strategies in any climatic zone requires examining of thermodynamics and human comfort. In his Text Natural Energy and Vernacular Architecture: Principles and Examples, With Reference to Hot Arid Climates, the author demonstrates properties of energy that must be considered in order to fully understand climatic phenomena. Heat, radiation, pressure, humidity, and wind, among other factors, interact mutually to establish microclimatic conditions appropriate to hot-arid climatic (Fathy, 1986). According to Fathy (1986), the following are some of these basic concepts applied to hot-arid climates: Thermal gain Solar radiation is the principal source of heat in hot-arid zones, and this heat can be transmitted during the day to the building interior in a number of ways. The most important is by conduction of the absorbed solar radiation through the walls or roof at a rate determined by the thermal conductance (or thermal resistivity) of wall components. (The relationship involving the incoming and reflected solar radiation absorbed and re-emitted heat and heat gain is shown in figure 2 below for the case of a typical white painted surface). Figure (2) (Fathy, 1986) Heat gain can also be caused by ventilation. The rate of gain is dependent on the ventilation rate. Ventilation heat gain can be avoided by restricting the size of openings, especially during the heat of the day. The other sources of heat gain are the inhabitants of the building themselves and household equipment such as electric lights and appliances. These sources, unlike the solar radiation, can contribute heat even at night (see figure 3) (Fathy, 1986). Figure (3) Modes of heat transfer (Fathy, 1986) Thermal loss Heat is lost by conduction through the walls, by exactly the same process that it is gained from the direct solar radiation once it has been absorbed by the surface or through the roof by a combination of convection and conduction. Ventilation is also another mode of heat loss. Evaporation from the surface of the building or from objects within the interior can produce a cooling effect on the building which acts as a source of heat loss. In hot arid climates, this can be a particularly effective cooling mechanism since the rate of evaporation in dry air is very high. Figure 3 also shows the modes of heat loss (Fathy, 1986). Cooling by evaporation Evaporative cooling is used for cooling in hot dry areas (such as in Iraq, where the people place against the windows panels of dried desert plants, which are kept moist by water dripping from perforated pipes positioned above them) (Fathy, 1986). Dynamic thermal equilibrium The heat gained by the building can be expected to be balanced by the heat lost and an internal temperature distribution thus established. These temperatures are dependent on the outside temperature and the ratio of the heat gained to the heat lost and can be adjusted by regulating the sources of heat gain and loss. Before examining the systems and devices that have been developed to do this in the hot arid zones, it is first necessary to have an idea of the heat-regulating mechanism of the human body and the microclimatic conditions for human comfort. Table (1) Heat gain and loss processes for the human body (Fathy, 1986). Mechanism Gain Process Loss Process Metabolism Basal heat production Digestion Activity Muscle tensing and shivering in response to cold Radiation From solar radiation-direct and reflected To surrounding air From radiation by radiators Conduction From air above skin temperature (increased by air movement) To air below skin temperature From warmer bodies in contact To cooler bodies in contact Evaporation From respiratory tract From skin covered with perspiration or applied water Conditions of human comfort A convenient standard for thermal comfort is required. Analysis shows that a variety of factors can be involved in situations of discomfort. For example, temperature alone does not determine discomfort. In Athens, 32  °C is quite bearable, but it is generally intolerable in Bahrain. The difference is due entirely to the relative humidity of the atmosphere. In Bahrain the air is very humid and perspiration evaporates slowly, decreasing the bodys ability to lose heat. In Athens, with its dry air, the evaporation rate is high and perspiration evaporates quickly lowering body temperature. The factors that have been identified as standard for thermal comfort within buildings are: air temperature, air humidity, rate of air movement, level of radiation, and rate of heat production by the bodies of people in the building [4]. Inventory of design elements for traditional housing design in hot-arid climates Building materials The materials surrounding the occupants of a building are of prime importance for protection against heat and cold. Considering an external wall exposed to a high outside air temperature and a lower inside air temperature (see figure 4), the rate of heat flow transmitted through the wall from the outside air to the inside air is proportional to the air temperature difference, area of the wall, and rate of global heat transmittance that can be determined from an analysis of the components of the total resistance to heat flow. The total resistance is composed of the resistance to heat flow through the material, the interfacial resistance at the external surface, and the interfacial resistance at the internal surfaces. Since the interfacial resistances are determined primarily by temperature conditions over which the builder has little control, his principal effect on the heat transmittance is on changing the resistance to heat flow through the wall material (Fathy, 1986). Figure (4) (Fathy, 1986) Table 2 lists the thicknesses of walls composed of various construction materials needed to achieve coefficients of approximately 1.1 kcal/hm ²C °. The mud brick is most appropriate for achieving thermal comfort in addition to being widely available to all segments of the population (Fathy, 1986). Table (2) Thicknesses of walls of different material (Fathy, 1986) Wall Material Wall Thickness Thermal Transmittance (in m) (in in) (in kcal/ hm ²C °) Hollow brick block 0.30 12 1.10 Double-wall brick with holes and 8-cm cavity 2 x 0.12 2 x 4.7 1.12 Brick wall with holes 0.38 15 1.03 Sand-lime brick 0.51 20 1.25 Hollow block sand-lime brick 0.51 20 1.16 Lime 0.51 20 1.10-1.35 Concrete 1.00 39 1.20 Orientation In hot climates, the sun is the major source of heat. The position of the sun must be determined for all hours of the day at all seasons as well as the direction of the prevailing winds, especially during the hot season. In addition, for an ensemble of buildings forming a sector, there will be reflection from adjacent buildings and wind screening by clusters of buildings, which contribute to a specific microclimate for each location in the sector. Wind movement and humidity also are important and should be considered simultaneously with the direct and indirect effects of the sun. The main objective is to establish the optimum orientation with regard to the sun and the prevailing wind (Fathy, 1986). Shading Generally, a building with a facade opening to the west is the worst case encountered in hot-arid climate, owing to the heat gain of the surrounding environment during the day and the angle of altitude, which allows the suns rays to penetrate into the interior. Openings Window openings normally serve three functions: to let in direct and indirect sunlight, to let in air, and to provide a view (Fathy, 1986). The venetian blind One device which can be added directly to the window is the venetian blind. This blind is made of small slats, about 4-5 cm wide, closely set in a wooden frame at an angle that will intercept the suns rays. The slats are often movable so the angle can be changed. This feature of adjustability renders venetian blinds very useful in regulating solar radiation and wind flow into rooms. Using the venetian blind, the suns rays can be blocked out without obstructing the breeze, which generally blows from the northwest in most hot arid areas like Iraq. As shown in figure 5a, changing the position of the blind alternatively by to block the direct sunlight, the wind is redirected uselessly over the heads of the occupants, as figure 5b illustrates. Also, if the slats are made of metal, they then absorb some incoming radiation and reradiate it into the room as heat (Fathy, 1986). Figure (5) (Fathy, 1986) The Shanshool or Mashrabiya This was a cantilevered space with a lattice opening, where small water jars were placed to be cooled by the evaporation effect as air moved through the opening. The name is used for an opening with a wooden lattice screen composed of small wooden balusters that are circular in section and arranged at specific regular intervals. The shanshool has five functions. These functions involve: (1) controlling the passage of light, (2) controlling the air flow, (3) reducing the temperature of the air current, (4) increasing the humidity of the air current, and (5) ensuring privacy. Its cooling and humidifying functions are closely related. All organic fibers, such as the wood of a shanshool readily absorb, retain, and release considerable quantities of water. Wind passing through the interstices of the porous-wooden shanshool will give up some of its humidity to the wooden balusters if they are cool, as at night. When the shanshool is directly heated by sunlight, this humidity is released to any air that may be flowing through the interstices. This technique can be used to increase the humidity of dry air in the heat of the day, cooling and humidifying the air at a time when most needed. The balusters and interstices of the shanshool have optimal absolute and relative sizes that are based on the area of the surfaces exposed to the air and the rate at which the air passes through. In addition to these physical effects, the shanshool serves an important social function: it ensures privacy from the outside for the inhabitants while at the same time allowing them to view the outside through the screen (Fathy, 1986). Table (3) Summary of architectural elements of traditional building in Iraq (hot-arid climate), as they have been common from the 13th to the end of the 19th century. Retrieved from http://www.brainworker.ch/Irak/architecture.htm Oda: the simple room Tarma: open balcony with pillars Ursi: most probably from russi, russian. The most important room of the house, as at the same time you may see, but not been seen as much as in a tarma, ivan or talar. Its separated from the tarma by a window-wall from colored glasses, without door. Those were the masterpieces of Baghdadi carpentry. Talar, a usable open room behind the tarma. The difference to the iwan is, that it cant be entered directly from the rooms beside it. Is separated from the tarma by additional pillars. Iwan(or Liwan), a room behind the tarma or adjacent tot the inner courtyard, that is on one side open. Hosh, the central courtyard, often with a fountain in the middle. sirdab, the cellar, that did not only serve as store, but   as cooling hall and for the provision of cool air through the badgir-sirdab-system. neem, a cellar that is only half buried. Mostly with one window. During the hot summer nights the roof was and is used in Baghdad for sleeping. The high value of privacy demanded, that no house was higher than the others, so that nobody was able to look down on his neighbors roof. kabishkan: The Penthouse, from where one is able to control all the house. Often those rooms have been placed like eyries in all four corners of the inner courtyard.   The roof If the outdoor air temperature is higher than the indoor temperature, the outer surface of the roof exposed to the sun is heated as it absorbs radiation, and, being in contact with the outside hot air, also is heated by conduction. The roof then transmits this heat to the inner surface, where it raises the temperature of the air in contact with it by conduction. At the same time, it radiates heat that is absorbed by people and objects indoors, thereby affecting thermal comfort. In hot arid countries, since the air temperature drops considerably during the night, the inhabitants have arranged the roof architecturally into loggias or open galleries and lightweight roof covers. These loggias and roof covers have the double function of shading the roof during the day and providing physiologically comfortable living and sleeping spaces at night (Fathy, 1986). Figure (6) Different types of roofing in hot-arid climates (Fathy, 1986) The wind-escape The technique of using the suction caused by low air-pressure zones to generate steady air movement indoors is used in the design of the wind-escape. The funnel and side tube used to illustrate the Bernoulli effect or Venturi action (see figure 7) are transposed into the structural elements of an architectural design in order to accelerate air movement and to create drafts in places with no exposure to the outside, such as basements in Iraq. This concept can be applied more advantageously in designs for use above ground. The wind-escape can accelerate effective ventilation and air circulation when used with other devices for air movement such as windows, doors, and the malqaf or wind-catch (Fathy, 1986). Figure (7) Bernoulli Effect (Fathy, 1986) The malgaf In hot arid zones, a difficulty is found in combining the three functions of the ordinary window: light, ventilation, and view. Therefore, it is necessary to satisfy the three functions ascribed to the window separately. To satisfy the need for ventilation alone, the malqaf or wind-catch was invented. This device is a shaft rising high above the building with an opening facing the prevailing wind. It traps the wind from high above the building where it is cooler and stronger, and channels it down into the interior of the building. The malqaf thus dispenses with the need for ordinary windows to ensure ventilation and air movement. The malqaf is also useful in reducing the sand and dust so prevalent in the winds of hot arid regions. The wind it captures above the building contains less solid material than the wind at lower heights, and much of the sand which does enter is dumped at the bottom of the shaft. In the areas of An-Najf and Al-Kufa in Iraq, where air temperature is very high in summer, people live in basements ventilated by small holes in the ceiling and a malqaf with a very small inlet. Figure 8 shows plans and the section of a residence with a basement from this region. However, as the airflow is small and the air circulation is insufficient, this design is unhealthy and a possible cause of lung diseases. In some designs, the drafts from the malqaf outlet are cooled by passing over water in the basement. Figure (8) The Malgaf (Fathy, 1986) The Bà £dgir-sirdab In Iraq (hot-arid climate)and the countries of the Gulf, a specific type of malqaf called the bà £dgir was developed. The system badgir-sirdab was a cheap, environmentally friendly and energy saving solution to create an acceptable cl

Monday, August 19, 2019

Hitler’s Alliance With The Soviet Union :: European History Essays

Hitler’s Alliance With The Soviet Union When the world awoke August 24, 1939 it appeared that the absolute impossible had just occurred in Europe, National Socialist Germany and Soviet Russia had just agreed on a Non Aggression pact. By that morning the entire political world had changed, it had been thrown roughly on its head and people quickly asked how it could have happened? Over a period of three years the German chancellor, Adolph Hitler had repeatedly pushed the major powers to the limit with his territorial demands in the Rhineland, Austria, Czechoslovakia, and now in the Polish corridor. Hitler had succeeded in each gamble and grown bolder each time as he noticed the vacillating nature of the supposed major powers that stood in the way of his completing his long held foreign policy program. This program, first coherently laid down in his 1924 book Mein Kampf, called for the re-armament of Germany and the acquisition of allies like Italy and Britain, the neutralization or destruction of his hated enemy France, and finally with Germany’s rear protected the way would be clear for the great fight against Judeo-Bolshevism in the Soviet Union, and the gaining of Lebensraum for the superior Aryan German race. Since coming to power in 1933, Hitler had completed the first phase of his program save for the making of a British alliance or at least their promise of neutrality in any upcoming European war of revision. Realizing that the British would need some coercing to accept his program, and that if war was to come with the west his eastern border must be secured, Hitler relied on his great ability to play the game of power politics and shocked the world by allying with his sworn enemy. Hitler sought the Non-Aggression pact and covert military alliance with the Soviet Union because it was a temporary means to an all encompassing end. Hitler would use the hated Soviets to secure his eastern flank while he destroyed France with or without the help of Britain, only to return the favor by attacking them when Germany was ready. It was a move consistent with the power politics and foreign policy program he had been pursuing since 1933, his attempts to force Britain into a military alliance or at least a proclamation of neutrality in any continental war, and the subjugation of France as a prerequisite to obtaining Lebensraum in the East. The Non-Aggression pact of August 1939, was the pre war culmination of policies designed by Hitler to further his foreign policy program of making

Sunday, August 18, 2019

An Analytical Essay on the Significance of the Players in Hamlet :: The Tragedy of Hamlet Essays

An Analytical Essay on the Significance of the Players in Hamlet       The significance of the players exceeds the sole purpose of entertainment, as each possesses the power to unveil the "occulted guilt" (3.2.75) and conscience of the King.   Hamlet assumes the responsibility to advise these players with precise and adequate direction so that a "whirlwind of passion" (6) may not effectively separate Claudius from personally identifying with the play.   Hamlet's enthusiastic approach toward direction may be so that he encourages the players to "suit the action to the word, the word to the/ action, with this special observance, that you o'erstep not/ the modesty of nature" (16-18).   However, this exercise of caution may justify Hamlet's too often delayed attempt toward the action of avenging his father's murder.   His direction confines him to the overflow of words as he experiences imprisonment within the truth of his own identity.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Hamlet grants himself the opportunity to momentarily direct himself, yet it remains unknown as to whether he directs a representation of truth or a falsity.   He exemplifies madness so well, as the sight of "a damned ghost" (77) insanely induces his imagination and comfortably transforms his identity to one of lunacy.   This role he acquires is one he portrays so explicitly well as an actor that he easily utilizes it as the foundation for his players.   He instructs the players:    Nor do not saw the air too much with your hand, Thus, but use all gently, for in the very torrent, tempest, And, as I may say, whirlwind of passion, you must acquire And beget a temperance that may give it smoothness.   (4-7)    Abstinence from overly dramatizing the actions of the play may be reflective of Hamlet's character prior to his escape from true self: a once-lived life of normalcy focused more wholly on "smoothness" (7) rather than an uncontrolled "torrent, tempest, / ...whirlwind of passion" (5-6).      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Hamlet's direction of the players claims victory as Claudius abruptly arises and exclaims, "Give me some light.   Away" (254)!   Horatio's observation of the King's reaction confirms his guilt-inflamed conscience as he was forced to witness the reenactment of his brother's murder.   Hamlet, relieved, reveals, "I'll take the ghost's word for a thousand/ pound" (271-272).   The ghost is officially trustworthy as the King's reaction encourages Hamlet to journey further toward his mission of avenging the death of his father. An Analytical Essay on the Significance of the Players in Hamlet :: The Tragedy of Hamlet Essays An Analytical Essay on the Significance of the Players in Hamlet       The significance of the players exceeds the sole purpose of entertainment, as each possesses the power to unveil the "occulted guilt" (3.2.75) and conscience of the King.   Hamlet assumes the responsibility to advise these players with precise and adequate direction so that a "whirlwind of passion" (6) may not effectively separate Claudius from personally identifying with the play.   Hamlet's enthusiastic approach toward direction may be so that he encourages the players to "suit the action to the word, the word to the/ action, with this special observance, that you o'erstep not/ the modesty of nature" (16-18).   However, this exercise of caution may justify Hamlet's too often delayed attempt toward the action of avenging his father's murder.   His direction confines him to the overflow of words as he experiences imprisonment within the truth of his own identity.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Hamlet grants himself the opportunity to momentarily direct himself, yet it remains unknown as to whether he directs a representation of truth or a falsity.   He exemplifies madness so well, as the sight of "a damned ghost" (77) insanely induces his imagination and comfortably transforms his identity to one of lunacy.   This role he acquires is one he portrays so explicitly well as an actor that he easily utilizes it as the foundation for his players.   He instructs the players:    Nor do not saw the air too much with your hand, Thus, but use all gently, for in the very torrent, tempest, And, as I may say, whirlwind of passion, you must acquire And beget a temperance that may give it smoothness.   (4-7)    Abstinence from overly dramatizing the actions of the play may be reflective of Hamlet's character prior to his escape from true self: a once-lived life of normalcy focused more wholly on "smoothness" (7) rather than an uncontrolled "torrent, tempest, / ...whirlwind of passion" (5-6).      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Hamlet's direction of the players claims victory as Claudius abruptly arises and exclaims, "Give me some light.   Away" (254)!   Horatio's observation of the King's reaction confirms his guilt-inflamed conscience as he was forced to witness the reenactment of his brother's murder.   Hamlet, relieved, reveals, "I'll take the ghost's word for a thousand/ pound" (271-272).   The ghost is officially trustworthy as the King's reaction encourages Hamlet to journey further toward his mission of avenging the death of his father.

Saturday, August 17, 2019

Tatlong Taong Walang Diyos

tatlong taong walang diyos (three year's without god) The film, set during the Japanese Occupation of the Philippines between 1942 and 1944, tells the story of Rosario (Nora Aunor), a young schoolteacher engaged to be married to Crispin (Bembol Roco). Crispin leaves Rosario to fight the Japanese as a guerilla, and in his absence a Japanese-Filipino officer named Masugi (Christopher de Leon) rapes her.Masugi later returns to Rosario apologizing for his act, bearing gifts of canned food and rice which Rosario at first refuses. Matters are complicated when Rosario's father Mang Andoy (Mario Escudero) is arrested by the Japanese and Rosario reveals to Masugi that she is pregnant. Rosario must make a choice: accept Masugi's proposal to make her his wife (saving her father and ensuring a safe and stable life for her child), or reject him and with him the baby they have conceived together. n the form of a blind man lighting a candle for himself and his palsied brother. The blind man careful ly picks up the child, and makes his way out the church just when a procession, complete with hundreds of candles and heavily costumed wooden saints, marches in. The symbolism is somewhat obvious–true faith walks quietly out the door, while pomp and pageantry make a grand, meaningless entrance.But the entire wordless scene is so quietly understated, so beautifully shot and staged–a perfect example of the purest cinema–that it literally takes your breath away. Yes, Crispin, there is a God–only he could have inspired O'Hara to shoot a scene like that. ipinapakita ng gumawa ng pelikulang ito kung gaano kahina ang mga pilipino sa panahon ng kahirapan at pag papahirap ng mga dayuhan sa ating bansa. sinasabi ng pelikulang ito na dapat maniwala lalo tayo sa diyos upang tayo'y matulungan niya sa panahong tayo ay nahihirapan.

Second Language Required Police Departments

Second Language Required Melanie Martinez Current Issues in Criminal Justice Everest University Online Second Language Required The United States of America is full of many cultures, languages, and heritage. With many citizens’ ancestors originating from other countries, it is no wonder that almost every language has made it into America. Law enforcement can be delayed by these languages, though. Officers can benefit from being bilingual, but that is not the reality for most departments.With Spanish being the second, or even first, language of most citizens, it is essential for law enforcement to learn this language, or another popular one. It can help avoid confusion from a suspect not responding or prevent an unnecessary death. When an officer can speak more than one language it may help save lives. If a patrol car pulled up to a house where an unanswered 911 call was made, they may be entering a dangerous area. If it was a meth lab that was about to blow up, and the person outside only spoke Spanish, they could unknowingly enter the home and it explode with them in it.That is a situation that could be prevented with taking the time to learn another language. Even though getting every officer to learn another language would benefit the effect of law enforcement, the reality of the situation is saddening. With officers working long hours and in a stressful job, it does not allow much time for officers to learn a new language (Hickey, 2012). Along with tight budgets of police departments, it does not allow the officers to learn it at work either.The reality of the situation is that officers just do not have the time to learn another language. It would also make officers work even longer; resulting in more overtime and it would complicate staffing when learning it on the job. Learning another language is beneficial to the officer and the police department in every city. It would avoid complications and confusion in any given situation (Khashu, Rahman, &am p; Shah, 2007). It also is not really a reality with the hours officers and the stress deal with on a daily basis.Time management is the only way to get it done with the help of the department, officers, and the budget. It is all a matter of time. Reference List Khashu, A. , Rahman, I. , & Shah, S. (2007). Overcoming language barriers: solutions for law enforcement. Vera Institute of Justice. U. S. Department of Justice. Page 4. Retrieved from: http://www. cops. usdoj. gov/Publications/vera_translating_justice_final. pdf Hickey. (2012). Taking sides: clashing views in crime and criminology, 10th ed. McGraw-Hill Companies, Inc.

Friday, August 16, 2019

Developing the Employee, Developing the Company ¾

The world of business is changing everyday. New trends, new markets, and new ideas open to a more competitive business setting, requiring companies to keep themselves at par with the others. One way for companies to do this is to support professional continuing education for their employees.However, given hectic schedules, corporate deadlines, and the steep price tag attached to professional continuing education, many employees think twice before taking up professional courses—but not when companies are willing to help. To compete, companies must open themselves to professional development strategies for their employees which can be made possible through educational funding and time management support.It is understandable for some firms to feel uncomfortable about spending for their employees’ college tuition fees. For one, manpower piracy is a reality in business and when this happens to an employee whose education was funded by the company, it is an automatic loss for the firm.Also, employees may not be able to balance work and education at the same time; and when the employee loses grip on either of the two it is the company who loses in the end. Still, strategic planning and compromise can help the company help the employees with their desire to continue their education while overcoming these fears and risks.In a survey done in Boston, more companies are again willing to pay for their employees’ continuing college education after the trend declined years back. (DeMarco, 2005) This is not surprising. Now, more than ever, companies know that professional education gives a holistic effect to their companies.While uplifting the lives of employees through education, companies receive a lot of perks and privileges just by sending their employees to school again.Multiple BenefitsStrategic funding of professional education among employees allows them to take courses for free or at a discounted rate, making them feel good about working in their firms and attracting them to stay. They also receive new ideas, new experiences, and get to mingle with new people who can help them excel in their fields.Education also protects them within the competitive employment world where younger, more skilled workers are entering everyday. But employees are not only the ones who benefit from these educational programs. Companies are likewise positively affected.DeMarco (2005) states that companies who offer professional development programs such as tuition fee reimbursement, tuition fee funding, or tuition fee discounting are more attractive to applicants than those companies who do not have similar programs.In effect, employees are also more likely to stay in these companies and not think of jumping to another firm who does not offer professional development packages. Most importantly, companies improve their stand in the business world when they help their employees develop themselves.Theories change, practices change, and industries chan ge. Employees who continue their education as professionals bring to the company new ideas and skills that are useful for the company to move forward and face growing competition.The article Six Ways to Encourage Employee Development (2007) agrees to this, saying that the best benefit that a company can get on funding their employees’ education is the expertise, which can be cost-effective for the company sooner or later.By helping employees attain professional courses, the company creates a pool of in-house knowledge that is easily accessible for the company at less cost because the company will no longer need to subscribe to outsourcing services. In the end, the company benefits from the lead it can take in terms of market trends.ApprehensionsBut then again companies may not fully subscribe to the idea of retention through continuing education. Anything can happen, so to speak. Employees can suddenly quit their jobs, switch employers, fail the course, or lose the balance be tween work and school. Again, strategic planning is the answer.Companies can offer educational funding while protecting their interests on the side. To begin with, firms should know exactly what type of courses should be funded and it follows that these should be courses that will be useful for the operation of the company.The company should also assess their ability to fund the program, and identify if full reimbursement, discounting, or upfront funding will be workable for both the employee and the employer. It is also important to set conditions such as a holding period for the employee after his education has been funded, or a grade requirement to determine the percentages of the funding that may be given.(Establishing a tuition reimbursement program, 2007) This can solve much of the dilemma that a company may have in supporting professional continuing education for their employees.Time ManagementWhen a company finally decides to offer funding for the professional continuing edu cation of their employees, the responsibility does not stop in the finances. School can take considerable time and effort from students, especially for adults who have work and familial responsibilities. All three roles can be physically and emotionally demanding, if not draining.On the other hand, it is understandable for companies to expect good results from these studying workers. Besides, they are hired to work for the company so they must perform impressively at work; and they are assisted in their professional education so they should also bring in good grades. But companies should also understand the difficulty of maintaining an everyday balance between work and school life among other things.Thus, it is helpful for companies to offer these studying employees options in handling work, school, and their personal lives. Flexible working hours, telecommuting options, and minor exceptions to work attendance regulations when needed such as during examination periods can do so much for an employee to manage his time.In doing so, the employees are in top shape at work and school, and still have time for his personal responsibilities. It will also then be right for the company to demand good performance from the employee on both aspects. (Establishing a tuition reimbursement program, 2007)An InvestmentOffering tuition fee funding schemes and time leniency to employees can take a lot of effort from companies, and there are also a lot of risks. However, employers can rest assured that with a strategically planned education plan for their employees, every dollar is well spent.While it is not a requirement for companies to offer such privilege to employees, it helps them build a good reputation and allows them to invest in something that will never fail.Education is a good investment that benefits the employee-students and the company as well. While education can require a large sum of money and patience in the part of employers especially when the studying employe e is caught between a school and a work deadline, the company will surely benefit. And as with good investments, the rewards are in the end.ReferencesDeMarco,P. 2005. Companies pick up college tab. Retrieved May 9, 2007, from http://www.boston.com/news/education/higher/articles/2005/09/25/companies_pick_up_college_tab/Establishing a tuition reimbursement program. 2007. Retrieved May 9, 2007, from http://www.allbusiness.com/human-resources/employee-development/1163-1.htmlSix ways to encourage employee development. 2007. Retrieved May 9, 2007, from http://www.allbusiness.com/human-resources/employee-development/1240-1.html