Saturday, August 31, 2019

Max’s Burger Case Study Essay

Case Summery Max’s Burger is an emerging American fast-food chain with franchised outlet across the world. Nassar group bought the franchise rights of Max’s Burger outlet in Dubai. There were many fast-food outlet of franchised restaurants in Dubai, among them Max’s Burger’s meat quality was lower standard. As Nassar group didn’t want to jeopardize their reputation. The ordered the warehouse manager to decline any frozen food shipment that doesn’t meet the franchise standard. When the shipment came, the frozen meat temperature was little bit off which would not risk customer’s health but would affect the food taste. Though the manager didn’t considered the little mismatch of the temperature before, now he is having second thoughts. Question-1: Does the decision to accept or refuse the frozen meat shipment call for ethical or legal considerations? Why? Answer: Yes , the decision to accept or refuse the frozen meat shipment call for ethical or legal consideration. As we have seen in this case there is an ethical consideration regarding temperature problem. The temperature of the frozen meat delivered to the Max’s burgers didn’t match the government’s standard. If they accept it they will break the law. Though the deviation is little, but it puts a question on this ethical issues. Question-2: Identify the stakeholders who will be influenced by the decision to accept or refuse to the frozen meat shipment? Answer: Both Nassar group and the company supplying the meat are the stakeholders who will be influenced by the decision to accept or refuse the frozen meat shipment. If Nasaar group accept the frozen meat shipment, their sale may be decreased as a result of inconsistency.

Friday, August 30, 2019

How important is it for the organization Essay

Of many of the problems that the organizations face these days, one of the vital one is of employee dissatisfaction and lower motivation for work. Employees feel dejected and demotivated when their basic needs and requirements are not met; those needs might include hygiene and motivating factors that involve the presence or absence of working conditions, salary, empowerment or authority, job status, social relationships, etc. Organizations need to develop such a Human Resource department that effectively performs its activities by understanding the changing trends of the environment and so the employee needs and requirements. The decisive thing here in this case is that the HR department must scrutinize the productivity level, motivation, direction, attitude, and overall performance of the employees towards their assigned tasks and prosperity of the firm as a whole. HR managers emphasize on keeping the employees motivated, directed, and contented by adapting to several measures; some of which are explained as follows. First of all, the main responsibility of the Human Resource department is to hire or recruit the employees at their very best, who have best available skills and abilities that would result in the provision of value to the organization. The process of hiring and recruiting plays a vital role in determining an employee’s productivity and efficiency. Many organizations use references to hire the applicants, but the clear-cut method based on merit must be adopted. Taking written test, arranging group discussions, and conducting interviews with different managers help the Human Resource department to effectively analyze an applicant’s potential and skills whether he should be hired or not. Second, the managers must consider an employee as a person and treat him with due respect; offensive comments and remarks must not be passed out in order to avoid unwanted consequences. Mutual respect among the managers and employees must be maintained so that employees may feel that they are part of the organization. Third, many employees join the company with their basic motivation of salary; hence the salary package must be handsome enough to make the employee contented or even satisfied. Every human being has some needs as mentioned by Maslow in his pyramid of needs that starts with physiological needs, and then follows safety and security needs, then social and affection needs, esteem needs, and finally self-actualization. It should be understood at first hand by the managers or supervisors that employees are given enough time, resources, and opportunities to satisfy such basic needs such as, safety and security and physiological needs. Competitive benefits should be offered to the employees by analyzing the industry trends as in how much salary, benefits, or allowances are being paid by the competitors, and then the blend of competitive benefits should be offered. This may include providing compensation packages to the workers according to their job design; such as, low-level or assembly-line workers must be ensured enough security and medicinal allowances. Motivation can be categorized as the key to improved performance, and hence must be developed among the employees. This can be overcome by the managers by properly understanding their needs and wants and acting accordingly to fulfill them. Fourth, showing the chance of being promoted to the upper level definitely creates a sense of motivation among the workers. Often in many organizations, there comes the problem of glass ceiling where women and minorities are not give the chance to be promoted, hence this should not happen in order to keep the employees motivated. Fifth, Human Resource departments have a very significant responsibility of designing tasks, matching them with the employees, and assigning them. Employees, based on their skills and abilities, are assigned the tasks to work on and that suits them the most. Avoiding monotonous jobs and assigning them with interesting and innovating tasks develops interest in doing work and keeps the workers directed. Sixth, managers must create a sense of Task Identity and Task Significance among the employees that is to what extent their jobs are important for the company. Seventh, training is an essential process carried on by the organizations to keep their employees’ skills and capabilities inline with the changing environment. Several of training methods include hiring skilled expertise from various organizations or universities who train the employees for a limited period of time; moreover, organizations also send their employees abroad for training purposes as in to attend conferences or training sessions. Managers can arrange the workshops or lecture sessions within the organization for addressing the latest developments and challenges being occurred in the market or industry. Eighth, timely, accurate, and effective feedback must be provided by the managers to point out the strengths and weakness of the employees in their performance. And, involving the employees in the decision-making processes and empowering them by giving more authority to practice is also another wise strategy to motivate the employees. Often employees are not provided with accurate and corrective feedback such as; they are not pointed out their negatives just because of avoiding unwanted atmosphere or relationships. Therefore, many managers and supervisors prefer providing feedback that is usually positive even if the employee has some negative points about his work or attitude. Another issue is of providing of feedback from supervisors with whom the employee has good relationships or who favors the employee in each and every aspect of work life. This results in overvaluation of an employee, hence giving him points more than actually he deserves. Therefore, in order to have an effective feedback program, human resource departments must ensure that they adapt the 360 degree feedback method, which involves the provision of feedback from various sources such as, managers, directors, supervisors, colleagues, and peers. This method is very effective since it confirms different sorts of feedback provided by different sources. Consequently, to sum up the essay, we can say that the role of Human resource departments in almost every organization is like that of a brain in a human body. Since this is the era of globalization and immense competition, hence organizations are seeking to cut costs, save time, and be effective and efficient in carrying on their business activities. All the roles and responsibilities of the Human Resource department mentioned above do have significant importance because if they are performed effectively and wisely, they can result in saving huge amount of costs for the organization. Moreover, effective implementation of such measures and tactics can result in providing a company with great talent, expertise, working environment, high sales, high profits, high growth, good reputation, and most of all, efficiency.

Thursday, August 29, 2019

Personal Statement for UCAS Essay Example | Topics and Well Written Essays - 750 words

Personal Statement for UCAS - Essay Example This essay discusses the reasons why the researcher chose to study International Relations, that was mostly due to his interest in world affairs and politics. This entails the cultural differences that are displayed by different nationalities. The development of a country is always fascinating to study because a lot can be learnt from it. Some of the particular topics that are of importance to me are corruption, human rights, and discrimination. The researcher states that it was his father, who encouraged him to pursue a course in International Relations in college because the researcher would be able to live out his dream. In the learning of other cultures, the researcher is able to understand what needs to change within his own culture as well. The author would like to impact his country in a positive way, and taking a course in International Relations will help him to achieve that. Because International Relations is very broad, the researcher would like to focus more on the differ ent economic and political systems that are in place across the world, such as the UK and former USSR, that both are great examples of countries that are very different both politically and economically. The researcher would like to understand how the teachings of Karl Marx affected society in the USSR and what effect this had on the Soviet people, that lived through such events. He would also like to understand the reasons behind this and how the researcher can impact his country in the same way today.

Wednesday, August 28, 2019

How does amount and type of petroleum used by the people influences Lab Report

How does amount and type of petroleum used by the people influences air pollution in different regions - Lab Report Example Alternative Hypothesis: Different areas produce and use different amount of petroleum, so amount of pollution will be different in different areas depending of its oil resources and amount of population. 2) I posted my survey online. My survey needed responses from different parts of the world, so I tried to post it in different social networks in order to collect enough information to draw definite conclusions. 5) Calculate average petroleum usage in all regions by adding all amount of petroleum and dividing it by number of people answered survey in that region. Also calculate average range driven by adding up all miles and dividing it by the number of people (who answered survey in that region) From the survey questions posted online, the following results were received. Forty respondents replied to the survey questions. Majority of them were from developing countries. This is represented by 68% of the total number of respondents, while the remaining 32% considered themselves staying in developed countries. North Asia had the leading respondent percentage of 30%, East Asia had 18%, Central Asia and Western Europe had the same number of 15%, North America had 8%, Eastern Europe had 5% and the least percentage of respondents was taken by Southern Asia, Southern America, Middle East, Australia and New Zealand. Most people have their own cars. Very few family members share one car. According to the results from the survey, 68% of the family members have their own cars, 22% own two cars and 10% have three cars. Majority of people start to drive from the age of between 17 and 20 years. This is represented by the 65% of the result while 30% start to drive from the age of 13 and 1 6 years. The least number which is represented by 5% say they started to drive from between 21 to 25 years. Petroleum usage per week by each family was between 30 and 40 litters.

Tuesday, August 27, 2019

THE INVASION OF LIBYA BY USA IS RIGHT Research Paper

THE INVASION OF LIBYA BY USA IS RIGHT - Research Paper Example 1). According to Blum (2003), â€Å"For over a decade the American public had been told that Libyan leader Muammar el-Qaddafi was behind one terrorist act after another†¦Ã¢â‚¬  (pp. 281). This came to a head in February of 2011 when Muammar Gaddafi decided that he and his sons and the rest of his family would fight until blood ran red in the streets. The unjust slaughter of a significant number of civilians and protesters caused the United States to put pressure on the United Nations in order to pass Resolution 1973, which basically stated that all necessary action could be taken by the Coalition forces—at which the U.S. was the head until a few weeks later—in order to protect civilians who were being unjustly killed at the hands of Qaddafi and his supporters, the Army. Bodies of soldiers who refused to kill innocent protesters and other passersby were found burnt in the streets. People were not allowed to bury their dead because the people attending the funeral wer e being shot at by the Army. Rebel forces still hadn’t taken Tripoli, and there was intense fighting in Benghazi, but especially Misrata. Additionally, the fight for Al-Brega was intense because that held the power supply to the western part of the nation, and indeed much of the energy supply for the entire nation of Libya. The Rebels held Al-Brega for a short while, but then they lost control over the resources of the oil, which was a key linchpin in bringing down Qaddafi. Colonel Gaddafi, however, has many elements that are working in his favor. First, even though his assets were all frozen, there were billions of dollars stashed away in hidden places that were not known to the United Nations. â€Å"Colonel Gaddafi is funding his fightback against rebel forces from a stockpile of ‘tens of billions’ squirreled away in Tripoli banks, U.S. intelligence agents have

Monday, August 26, 2019

Ethics, Privacy, and Security Sides of Computer Spammer Issue Essay

Ethics, Privacy, and Security Sides of Computer Spammer Issue - Essay Example They flood the networks through continuous bombardments. The interests of ordinary users are of no threat to anyone else especially their privacy and flow of information across the network. In case of spammers, the activities are motivated by damage and illegal practices. There is the margin of improvement to the manner in which Spamhaus operates. It has raised the eyebrows in cases where organizations have become a victim of this barring process Spamhaus methodology is based on the idea of segregation. Separating the good from the bad and this is done through blocking of the list of ids which are habitual offenders. Once the list is compiled that of blacklist ids, their list is sent across the networks of institutions and organizations. However, their work and the methods adopted has resulted in various legal constraints from time to time. Though the methods adopted by them have made the task relatively easy and according to some, the inboxes would get flooded with junk and spams incase Spam Haus was not in place and not conducting the operations. While the Spamhaus process does irk some of the business community members, due to the indiscriminate and at times random blocking, the solution can be reached by installing effective software and firewalls at the back end that stream out the spam and other junk mails prior to reaching the customers. In this method the direct approach and reach to customers can be eliminated and as a result, only those ips and addresses can reach to the customers that are authenticated and of no damage. This can by large resolve the issues faced in the case of Spamhaus. There are multiple legal issues faced in the usage and application of Spamhaus.

Sunday, August 25, 2019

Week 10 and Week 12 Discussions Coursework Example | Topics and Well Written Essays - 1000 words

Week 10 and Week 12 Discussions - Coursework Example The effect is increasing in investments diverted to other uses other than agriculture. Japan being a manufacturing country due to its enormous amount of industries, this has resulted to huge investments in industrial projects hence the main income generating that drives the economy of Japan. The Japanese word is used to mean ‘group’ in Japanese. In the business world, the word is used to refer to a partnership or other forms of alliances. The partners work closely to ensure that they all succeed in the invested business. Partners work towards a common goal and are all involved in making decisions concerning their organizations. The Japanese essentially operate in quite a different manner when compared to other countries. They often consider others first before considering themselves. The other countries like the U.S believe that it is better off to consider themselves first before giving others room. The main consequences felt while the Korean War was sexual harassment as the women were badly exploited during wartime. Those who protested against the government were killed hence their cases of the unjust murder were reported in Cheju Island. The Koreans were made to be dependent on nuclear bombs and have the largest amount of a nuclear bomb in South Korea. The Korean people and the land in general have been overexploited that there are many reported cases of pollution in the two states. Dams help in flood control as noted by the Chinese government. The harmful gas released to the atmosphere as sulphur dioxide is reduced by dams as they are absorbed. Helps in water storage and there is a forecasting by the Chinese people that waste water can be in future treated and stored in dams for future use. Where any dam is constructed there is pressure exerted on the natives to relocate from their land. Dams constructed alter the surrounding environment and worse off threatens the river’s wildlife. The weight exerted by huge dams

Saturday, August 24, 2019

INDUSTRY AND EXTERNAL ENVIRONMENT ANALYSIS Assignment

INDUSTRY AND EXTERNAL ENVIRONMENT ANALYSIS - Assignment Example Competitive pricing strategy is an example of the effect of intensive industry rivalry. UK retail industry has been selected for this assignment. UK retail industry is quite complex and saturated. The major players within this industry are trying to back or support the purchasing power of people in order to achieve potential competitive advantages and significant market share. Hike in fuel price, troubled housing and mortgage market influenced the retail industry in UK to change the overall business strategy. The organizations within the industry are trying to provide discounted budget and value-added commodities to the people. Several interesting aspects behind the topic motivated to conduct a research work (Ellis-Chadwick, Doherty and Hart, 2002, pp.9-11). This assignment will reveal some interesting facts that will enhance the knowledge about global business environment and impact of external environment factors on it. ... The leading organizations within the similar industry are trying to capitalize on the potential competitive advantages that have been developed due to several favorable external environment factors. It is known to all that globalization, implementation of advanced technology, favorable economic and political business environment are the major growth drivers of several global industries. The assignment will try to reveal the impact of several external environment factors on the business performance of a specific industry. It will discuss about the current profitability situation of the industry and the major factors behind this profitability. Moreover, the assignment will try to discuss about the impact of these factors in future business perspective of that particular industry. UK retail industry has been selected for this assignment. Several leading organizations, such as Tesco, ASDA, Morrison’s and Sainsbury’s are competing with each other within this potential growin g industry. These organizations are implementing several competitive strategies in order to secure their existing market share within the UK retail industry (Lewis and Thomas, 1990, p.22). It is true that several industrial and external environmental factors are controlling the business growth of this industry. Political situation, economic growth, technological revolution and social trend are deciding the growth of current UK retail industry. Several theories have been applied in order to meet the objective of the study. The study will analyze the impact of these factors on the business performance of Tesco. In addition, the study will design the future effect of these factors on the organization. Methodology A proper and effective research is

Friday, August 23, 2019

‘A Critical Exploration of Organisational Structures and Essay

‘A Critical Exploration of Organisational Structures and Cultures’ - Essay Example The culture of any college evolves with the advancement of time and it depends on several factors like the infrastructure, composition of the college lecturers and management style. A good college culture will certainly aid in positive behavioral changes among the students which in turn would be instrumental in their career building and society development. Hence, any organization would wish to impart meaningful college culture among the students. In United Kingdom, several college organizations have been working hard to inculcate good culture among their college students. For achieving this goal, al the positive factors influencing the college culture have to be promoted and negative factors have to be controlled. Organization structure is most important factor that influences the college culture in United Kingdom. Let us analyze how the organization structure influences the college culture: The organization structure will have tremendous influence on the college culture (Anderson, 2007). It will decide the style of the presentation of the students and other functionaries in the college. In United Kingdom, the college culture is significantly influenced by the organizations’ structures and college management bodies. The technological advances and information technology also brought significant changes in the college culture in United Kingdom (Kouzes and Posner, 2003). One of the most important effects of organization structure on college culture is contributed by the rapid advances in the technologies available to librarians to access, manage and deliver information to students and researchers. Better library services would help in having better access to diversified information of the different parts of the world which in turn would enhance the broader knowledge of the students or clients and hence their culture would witness tremendous change. At the same time, the emergence of new technology may also

Individual reflective report Essay Example | Topics and Well Written Essays - 2250 words

Individual reflective report - Essay Example During the discussion I will also use the theories that I had learnt while completing my degree at the university. The BSG online game or better known as the business strategy game online is a simulation game played by students as well as experts to enhance their business operating knowledge. It involved the accurate prediction of the stocks, taking up realistic decision and at the same time incurring profits for the virtual firm (Johnson Jr. and Stappenbeck et al., 2010). The Business Strategy Game is a no holds barred rivalry: organization against organization. Each one organizations group focused exertion opposite adversaries is essential to market victory. Your group is in as practical an organization and intense market setting as would be prudent and are dealing with all parts of the organizations operations. This MBA level on the web, PC-based certifiable reproduction has been utilized by in excess of 500 business schools in 25 nations and has had 500,000 players. It is a demonstrated testing ground for vital hypothesis in an experiential taking nature (Johnson Jr. and Stappenbeck et al., 2010). The positive issues while playing this game was it helped me gain knowledge practically and I could also apply my learning skills without the fear of losing in real time. It gave me the idea of what are the possible threats and how to overcome those while running your own business. Earlier I had the notion that once I have enough money to setup a company of my own, I will be hiring different people for different sections who will be running them and reporting to me. My job would be to listen to them and give them targets that need to be achieved by their team. Once I started playing this game, I had a face a whole different reality all together. It was not just sitting and going through progress reports but I had to run the show. Without me taking up important steps it was becoming

Thursday, August 22, 2019

Education Essay Example for Free

Education Essay â€Å"Education is the most powerful weapon, which you can use to change the world†. (1) When thinking about going back to school to finish my degree, I came upon this quote by Nelson Mandela. It touched me for two different reasons. The first, because I have not finished my own education; and second, because I am getting my degree in elementary education to be a grade school teacher. When trying to figure out which school would be best for my lifestyle and what I wanted to accomplish, there were several factors to consider. The main factors were degree, cost, time, and what fit my personality best. In today’s society, a college degree is a necessity. It is no longer an option or privilege. Most people feel the need to look good in the eyes of society. With that, comes a degree and with going to school for so long, comes a debt to be paid. WGU is by far the cheapest and quickest way to get a college degree. In today’s society, those are the top two factors when looking into going to school. With the economy being what it is, everyone is trying to better himself or herself to get a better job and make more money. If you’re looking to get your degree, WGU is the answer. The first thing I did when looking into colleges, was look for the schools that had a degree in elementary education. Not only that, but an accredited college with my degree. Several came up; options of online programs or schools with a physical campus. After seeing all the different choices, I had to think about what would work better for me. I am not a fan of a classroom, or a specific time to be in one. I hate driving to school. I am never motivated to do work, unless it is on my time, in the comfort of my choosing. Also, with the job I had at the time, I would not have been able to have a set schedule. So, I decided that online would be the best option. Although WGU does not have a specific degree in elementary education, it did have a degree in Interdisciplinary Studies (K-8), which satisfies the requirements. WGU also has one of the more flexible schedules in the online world. In today’s day and age, most everyone going to school has a job. Some even have a couple. WGU is not only aware of that, but they encourage it. They work with your prior obligations so that you don’t feel like school is taking over your life. Once figuring out that online was my best option, I then needed to weigh in on the cost. This was a bit tricky, since every online program sets their price differently. Some did it by the amount of credits taken each semester, some did it by the amount of classes, and WGU priced by term. That was initially what had caught my eye. I had never heard of that before. One set price for the six-month term; no matter how many credits you took? I was shocked. After doing all the calculations of what classes I still needed to complete my degree, WGU was the cheapest – by far. I also needed to see which schools applied financial aid, which most do. But with most of the school’s costs for just the classes, financial aid wouldn’t even make a dent. With WGU, it would pay for tuition, books, fees, etc. , plus extra for cost of living. Sounds like a no brainer, but I wanted to make sure I got the best education for the time I was going to put into it. Which brings me to my next point. I took my top three choices, by degree and cost, and looked into how much time I could put into it and how much time was required of me, for both semester/term and total, to finish my degree. All of them required at least 12 credits per semester/term to be considered full time. Which was what I wanted and needed for financial aid. Two of the three did not allow more than 18 credits a semester, with there being three semesters in a year. But WGU allowed as many credits as you are able to complete per each six-month term. So, although there are only two terms in a year, you could potentially finish school quicker, if you set your mind to it. This is an imperative point to be made when thinking of the future. WGU is the only school online that allows and encourages students to take as many courses as they can handle in a 6-month period. The last factor I had to look at was whether the school was going to fit my personality or if it would be a waste of my time and money. Once all signs pointed to WGU, I called. I spoke with a very nice and informative woman, who told me exactly what to expect and what would be expected of me. She told me that I would be talking with a mentor, in my degree, once a week for the entire time I was in school. I would also have a community for each course, along with course mentors, to reach out to for help understanding the information. She told me about the website and how easy it was to navigate through, and how organized I would be with the degree plan and other tab options they have. She ended the call with emailing me a couple informational packets, along with letting me know I could call or email anytime with any questions. After we hung up, I felt so warm and welcomed. Again, I was shocked. How could a simple phone call make me feel like I was already part of a community? That woman had to have been a great salesperson in a past life, or the school was really just that great, that it made her love her job more than one would think. Either way, she sold me. It sounded like I would fit this school more than any I have looked into in the past and I had made my decision. If you are looking for a school that makes you feel like more than just money in their pocket, some place where you feel important, then WGU is the school for you. After looking at all the research and all the facts, I decided on WGU. When combining my degree with cost, time, and my personality, WGU had it all. The cost alone can sell the school to any Joe Shmoe, but that really was just the icing on the cake for me. With the economy today, and most everyone having to work at least part time, no one has time for school. WGU has the most flexible schedule that works with your free hours, so that you don’t have to stress about getting things done by a certain time. WGU does not only have people who are there for you when you have a question, but they are there for you to root you on and they genuinely want to see you succeed. Who wouldn’t want a bunch of cheerleaders to stand on the sidelines of your own dreams? I have looked into several options for continuing education, and I would, hands down, recommend WGU over any other school out there.

Wednesday, August 21, 2019

Analysis and Detection of Metamorphic Viruses

Analysis and Detection of Metamorphic Viruses Chapter 1 Introduction 1.1 Motivation Metamorphic Viruses are very special type of viruses which have ability to reconstruct into entirely new offspring which is completely different than the parent; Main object to use these techniques to rebuild itself is to avoid detection by Antivirus Software. Although for the time being some well known metamorphic viruses are detectable, but it is predicted that in future we might face problem of similar viruses those would be capable of changing their identification and perform malicious tasks. Our objective in this thesis is to perform an in-depth analysis of metamorphic code, and evaluate some best practices for detection of metamorphic viruses. 1.2 Outline This document has been divided into five chapters; first two chapters are for introductory purpose it provides basic information about viruses in Chapter 2 we have tried to give some details about virus evolution how metamorphic viruses came into existence. Chapter 3 includes detailed information about metamorphic Virus, Formal definition, Core components of Architecture and some explanations from a virus writer about metamorphic viruses. Chapter 3 deals with some of techniques which are being used by metamorphic viruses and what advantages these viruses have using those techniques. Chapter 4 contains different type of detection methodologies used to detect metamorphic viruses. It also contains sample code from different metamorphic viruses for their feature comparison. Chapter 2 Computer Virus Introduction 2.1 Introduction The term Virus was first described by Dr. Fred Cohan in his PHD thesis during 1986[1] although different type of computer malware where already exited that time but the term was specifically introduced by Dr. Fred. Thats why in may research papers he is considered the father of Virus Research [2]. According to his formal definition as virus A program that can infect other programs by modifying them to include a possibly evolved copy of itself[1] Based on this definition we have taken some pseudo code of Virus V from his research [25]. program virus:= {1234567; subroutine infect-executable:= {loop:file = get-random-executable-file; if first-line-of-file = 1234567 then goto loop; prepend virus to file; } subroutine do-damage:= {whatever damage is to be done} subroutine trigger-pulled:= {return true if some condition holds} main-program:= {infect-executable; if trigger-pulled then do-damage; goto next;} next:} This is a typical example of a computer virus, we can divide this virus into three major parts first subroutine which is infect-executable it tries to look for and executable file or any other target file which it wants to infect it contains a loop which tried to append the virus body to with the target file. Second subroutine do-damage is the virus code its self for which virus has been written this is called virus payload upon execution it performs some damage to the system. The third subroutine trigger-pulled is some sort of trigger to execute the virus code it could be some condition based on date or system or file. Main code of virus is that once the condition is met we it should append itself to the target file and perform something. If we evaluate this definition modern viruses cannot be considered as virus because there are several different type of viruses which are not performing any harm such as â€Å"Co-Virus†, their main target is to help the original virus by performing such tasks so the execution of original virus could be performed without being detected. Peter Szor has redefined this definition [2] as â€Å"A computer virus is a program that recursively and explicitly copies a possibly evolved version of itself.† This definition is also self explanatory, as the author suggest it recursively and explicitly search for the target files and then infect them with virus code to make possible copies. As we are all aware virus is special kind of malware which always requires a user attention to propagate such as either he access the infracted file or tries to execute infected files. Grimes[26] append this definition with boot sector information and other methodologies as Viruses are not limited to file infections only. 2.1.1 Different Type of Malware In this section we will try to discuss some type of malware which like virus but they are not virus. This section is for information purpose only. Viruses its self could be of different kind based on their activity we can define their category, such as boot sector virus, File Infection Virus or some of advanced Macro Viruses which are used inside Microsoft Office documents to automate the process. Basically all virus follow the same process of infection which is described by Dr. Fred Cohen in V Sample Virus. We will define some of advanced code armoring techniques in Section 2.2. 2.1.1.1 Trojans Trojans are very famous backdoor malware some time they are not considered as virus as their main objective is to let attacker gain access to the target machine without getting noticed by the user. Their main objective is not only to gain access but it could be executing some sort of malicious code. Origin of their name is from Greek History where a giant horse was built to gain access inside the castle and transport soldiers through that horse. Same technique is used with Trojans they tricked users by displaying something on screen and behind it is doing something else. Trojan does not infect files or attach their code to other files usually they contain some sort to joiner utility which help users to embed their code or application inside the Trojan. Trojans can used to gain access to infected systems, mounting share drives or disturbing network traffic through Denial of Services attacks. Some famous examples of Trojans are Netbus, Subseven, Deep Throat ,Beast etc. Some remote administration Trojans can have their client side which can be used to communicate to the infected computer. Above image is Client side of Beast Trojan which can perform so many operations on the target machine once it is connected. 2.1.1.2 Spyware and Adware Spyware are very common problem of todays internet user. They are used to get information about users and monitor their activity with or without his knowledge. Till now antivirus companies are unable to define detection and removal of spyware software because there are some famous companies who are selling spyware software to monitor user activities and they are getting legal support to protect spyware from getting removed by antivirus. With spyware it is quite possible that without user knowledge they transport all user information and activities to some monitoring email address. There is some sort of spyware which are only used to get all key press events by users whatever he is typing or writing in email or entering password. It will be recorded and based on the software settings it can be sent to email or saved on disk. Adware are slightly different than malware they collect information about users internet activity and based on that they tries to display target advertisement to the users or install some software on users system which displays unwanted advertisement to the user. 2.1.1.3 Rootkits Root kits are specially crafted virus; their main objective is to gain administrative level access on the target system. Usually they contain some virus or script to execute the malicious code on target machine, enable root level access for the attacker and hide the process, allowing attacker full access to machine without getting noticed. Detailed information about root kits is beyond the topic. Based on their functionality we can say that they hijack the target system and monitor all system calls. They are now capable of patching kernel also so attacker can get higher level of permissions. Security researchers have demonstrated a new technology called â€Å"Blue-Pill†[27] which has helped them creating a super root kit without getting any performance degradation or system restart. They have used virtualization support inside processor to run in a virtual machine mode. 2.1.1.4 Worms Worms are considered as the most advanced version of malware unlike virus they do not require any user interaction to propagate, but like virus they can replicate their code by infecting other target files. They can be combined with Trojan horses to execute on target machine. But unlike virus they are always dependent on some software for their execution without that specific software they cannot perform their actions. These try to exploit vulnerabilities of software or operating system to perform malicious actions. Love Bug is one of famous worm example it used Microsoft Emailing software to distribute its copies. CodeRed and Nimda are some other examples which used Microsoft protocols to distribute and infect other systems. 2.2 Virus Evolution Viruses are evolved throughout the time thats why today we are dealing with the most advanced type of viruses of all time. Most of time researchers are challenged by the virus writers to detect their created virus and create vaccine for it. In the following section we will describe some of the techniques which are used by virus to satisfy the main objective of Virus writer that is â€Å"Make Virus Completely Undetectable†. From time to time they have used different techniques in this section we will discuss those techniques and how those techniques lead toward metamorphic viruses. 2.2.1 Encryption Encryption is the main sources of information hiding. It has been used some centuries the same way virus writers are using encryption to avoid detection by antivirus. A decryptor is attached with the main virus code to decryp the virus body and performs the action. lea si, Start ; position to decrypt (dynamically set) mov sp, 0682 ; length of encrypted body (1666 bytes) Decrypt: xor [si],si ; decryption key/counter 1 xor [si],sp ; decryption key/counter 2 inc si ; increment one counter dec sp ; decrement the other jnz Decrypt ; loop until all bytes are decrypted Start: ; Encrypted/Decrypted Virus Body The above code is from [5] for Cascade Virus. In the same article the author has suggested four major reasons why some virus writer will use encryption: Prevention against code analysis: With encryption it becomes quite difficult to disassemble the virus code and examining the code for instructions which can be quite interesting for the virus researchers. For example if someone is performing specific operations such as calling INT 26H or calling specific Crypto API. By using encryption users will bet get an idea about what are the intentions of users because most of file contents will be encrypted and it is quite possible it may contain some Junk Code also. Making disassembling more difficult: Virus writers can used encryption not only to make it difficult they can also us to make this process more time consuming and difficult they can include more junk code inside or wrong instruction so the researchers will not be able to perform static analysis of code and get some confusing idea about the code itself. Making virus temper proof: Same like real life business products some virus writers do not want their virus code to be used by others with their name or generate new variant from their code because it is quite possible someone will decrypt virus and again generate another virus by modifying the code. This is also some sort of prevention from reverse engineering the virus. Avoid detection: This is the core objective of virus write to evade detection by Anti Virus software, based on time to time new techniques have been developed in following section we will discuss some of these techniques how they use encryption. Mostly the virus contains the decryptor within their code this had helped the Virus researchers to detect viruses based on their decryption signature. But this method is not very successful as it may raise an exception in case some other software tries to use similar methodologies to decrypt data. As time evolved they have developed some new interesting techniques. Most of time in assembly they use simply XOR ing operations help then in decrypting virus code. For example in above code of Cascade Virus it is using XOR to decrypt each byte of virus code unless all body is decrypted. With XOR they have some advantage first of all it is very simple operating and second XOR ing the same values twice yields the first value this operating can help them in decryption and making it more confusing during static code analysis. Peter Szor has described some of these strategies which can be used to make process of encryption and decryption more difficult [2-Chapter7], according to him: Virus Writers are not require to store decryption key inside the virus body some advanced virus such as RDA.Fighter generate their decryption key upon execution. This technique is called Random Key Decryption. They use brute force method to generate key during run-time. These Viruses are very hard to detect. It is under control by the attacker how he wants to modify the flow of decryption algorithm, it can be forward or backward or it is also possible to have multiple loops inside a single body. Or multiple layers of encryption. Second most important factor is the key size which can make decryption process more difficult based on the key length. Obfuscation is another factor involved in it. In Metamorphic Viruses Similie.D was one of the virus which used non-linear encryption and decrypts the virus body in semi-random order and most important thing is that it access the encrypted portion of virus body only once.[3] There is another factor involved in virus encryption such as virus is encrypted with very strong algorithm such as IDEA virus [9] which contains several decryptors. Main source of interest is that it is quite easy to detect virus and remove it but it is extremely difficult to repair the infected file as on second layer of IDEA it uses RDA for key generation. Microsoft Crypto API is part of Windows operating system. This can also be used for malicious purpose, Virus writers can use Crypto API to encrypt data with some secret key or call their API through virus code to perform encryption. It is also difficult to detect this because other program such as Internet Explorer also uses this API to encrypt transmission over secure channel. There is another variation in decryption which was demonstrated by W95/Silcer Virus that the first portion of virus which is already decrypted force Windows Loader to relocate infected software images once they are executed loaded in to memory. For the purpose of decryption the virus itself transfers relocation information. There are other possibilities such as some virus use file name as their decryption key in such case if file name is modified virus cannot execute and there is possibility we will not be able to recover that file after infection. Other methods such as it can use decryptor code itself as decryption key it help them in such condition if someone is analyzing code or virus execution is under a debugger it will raise an exception. 2.2.2 Oligomorphism With encrypted virus it is quite possible to find the decryption mechanism to challenge this situation virus writers implemented a new technique to create multiple decryptors and use them randomly while they are infecting other files. Major difference between Encryption and Oligomorphism is that in encryption is uses same decryptor for encryption purpose while in oligomorphic virus have multiple decryptors and they can use any of them during the process. Whale Virus was first of this kind to use multiple decryptors. W95/Memorial[7] is one of very famous examples of oligomprphic viruses it uses 96 different type of decryptors. mov ebp,00405000h ; select base mov ecx,0550h ; this many bytes lea esi,[ebp+0000002E] ; offset of Start add ecx,[ebp+00000029] ; plus this many bytes mov al,[ebp+0000002D] ; pick the first key Decrypt: nop ; junk nop ; junk xor [esi],al ; decrypt a byte inc esi ; next byte nop ; junk inc al ; slide the key dec ecx ; are there any more bytes to decrypt? jnz Decrypt ; until all bytes are decrypted jmp Start ; decryption done, execute body ; Data area Start: ; encrypted/decrypted virus body Sliding key feature can also be noted as with this feature it is quite possible to change instructions for decryptor. If we get other instance of same virus it has little variations there is a little change in loop instruction Another Variant of W95 Memorial mov ecx,0550h ; this many bytes mov ebp,013BC000h ; select base lea esi,[ebp+0000002E] ; offset of Start add ecx,[ebp+00000029] ; plus this many bytes mov al,[ebp+0000002D] ; pick the first key Decrypt: nop ; junk nop ; junk xor [esi],al ; decrypt a byte inc esi ; next byte nop ; junk inc al ; slide the key loop Decrypt ; until all bytes are decrypted jmp Start ; Decryption done, execute body ; Data area Start: ; Encrypted/decrypted virus body . It has been mentioned [2] that a virus is only called Oligomorphic if it can mutate its decryptor slightly. Detecting Oligomorphic virus is extremely difficult because as they have random decryptors it is quite possible that our virus detecting mechanism will not able to detect if there are quite large number of decryptors. 2.2.3 Polymorphism The term Polymorphism came from Greek origin Poly means multiple and morphi means forms. We can say that these types of viruses can take multiple forms. They are much advanced than their ancestors like Oligomorphic virus they rely on mutating their decryptor in such a way so it generates number of variation of same virus. Core of their operation is their engine which helps them in mutating. For each infection their mutation engine generates a completely new instruction set for decrypter. This process help them in generating a completely new virus having exact functionality as their parents but the sequence of instruction is entirely different from others[28]. Antivirus software are challenged by their method as every time a new file is infected it generated a new encryption code and decryptor so those software who are relying on virus decryptor signature will not be able to detect those viruses as new offspring are completely different in decryptors signature. Research has already shown that it is possible for a mutation engine to generate several million different type of decryptor code for new viruses [28]. Dark Mutation Engine is one of very famous example of polymorphic virus following code has been taken from [2]. mov bp,A16C ; This Block initializes BP ; to Start-delta mov cl,03 ; (delta is 0x0D2B in this example) ror bp,cl mov cx,bp mov bp,856E or bp,740F mov si,bp mov bp,3B92 add bp,si xor bp,cx sub bp,B10C ; Huh finally BP is set, but remains an ; obfuscated pointer to encrypted body Decrypt: mov bx,[bp+0D2B] ; pick next word ; (first time at Start) add bx,9D64 ; decrypt it xchg [bp+0D2B],bx ; put decrypted value to place mov bx,8F31 ; this block increments BP by 2 sub bx,bp mov bp,8F33 sub bp,bx ; and controls the length of decryption jnz Decrypt ; are all bytes decrypted? Start: ; encrypted/decrypted virus body Idea behind making a code engine was that in beginning virus writing was very difficult and time consuming so the experienced virus writers helped novice in virus generating by giving them code mutation engine with little modification they can use this engine within their own virus code and it can perform same operations. Based on the virus type and engine capabilities it can enhance the virus functionality there are several viruses which can use Microsoft CryptoAPI in their polymorphic operations. Marburg is also one of very famous polymorphic virus which has entirely different mechanism in file infection. till now we could think that infection method if polymorphic virus could be same just decryptor is changing but that virus introduced some of new methodologies like key length in encryption could be different and each file which it is infecting is using different encryption mechanism.[8] Start: ; Encrypted/Decrypted Virus body is placed here Routine-6: dec esi ; decrement loop counter ret Routine-3: mov esi,439FE661h ; set loop counter in ESI ret Routine-4: xor byte ptr [edi],6F ; decrypt with a constant byte ret Routine-5: add edi,0001h ; point to next byte to decrypt ret Decryptor_Start: call Routine-1 ; set EDI to Start call Routine-3 ; set loop counter Decrypt: call Routine-4 ; decrypt call Routine-5 ; get next call Routine-6 ; decrement loop register cmp esi,439FD271h ; is everything decrypted? jnz Decrypt ; not yet, continue to decrypt jmp Start ; jump to decrypted start Routine-1: call Routine-2 ; Call to POP trick! Routine-2: pop edi sub edi,143Ah ; EDI points to Start ret There are examples of other viruses which shows that 2.2.4 Metamorphism After all these evolution in virus, now we are dealing with one of the most advanced version of these viruses. Polymorphic viruses were really challenging to detect and remove from system, but it was just a matter of time Researchers tried to build solutions against polymorphic viruses. Viruses writer tired to work on something really amazing a virus which would be able to rebuild itself with same functionality but entirely different from the parent. This proposed solution was first implemented in W32/Apparition, If it finds a compiler in some machine it tries to rebuild itself into completely new shape. Following code has been taken from [2] two different variants of W95/Regswap . This virus was first of its kind to implement metamorphism in shifting registers. a.) 5A pop edx BF04000000 mov edi,0004h 8BF5 mov esi,ebp B80C000000 mov eax,000Ch 81C288000000 add edx,0088h 8B1A mov ebx,[edx] 899C8618110000 mov [esi+eax*4+00001118],ebx b.) 58 pop eax BB04000000 mov ebx,0004h 8BD5 mov edx,ebp BF0C000000 mov edi,000Ch 81C088000000 add eax,0088h 8B30 mov esi,[eax] 89B4BA18110000 mov [edx+edi*4+00001118],esi Although till now there is no big incident reported due to metamorphism as normal computers do not contain such utilities like compilers or scripting support to rebuild virus but this situation could be very dangerous for Linux machine where scripting languages and compilers are enabled by default. Upcoming versions of Microsoft Windows are also having support of .Net and MSIL which is capable of generating such virus very easily MSIL/Gastropod is one of famous example of metamorphic virus. In upcoming section we will describe main architecture of metamorphic viruses. Chapter 3 Metamorphic Virus Architecture The idea behind metamorphic legacies came from the same biological aspect that the parents are mutating and generating new offsprings which are entirely different than their parents but they are performing the same actions as their parents were doing. Virus Writers have adopted the same idea and implemented in the form of metamorphic virus. Power of any virus relies in its power to bypass the Antivirus Scanner and perform actions. Usually constants in their virus body, specific register allocation, patterns or heuristics scanning are some of the common ways to detect a virus. Metamorphic Viruses are one of those kinds which are capable of transforming their code into new generation, these viruses are capable of changing their syntax but their semantics remain same throughout generations. Polymorphic viruses were difficult to detect but their main weakness was their decryption mechanism once researchers found their decryption methodology and add this as a signature to antivirus products through this they were able to detect full generation of polymorphic virus but in case of metamorphic virus this approach fails because the syntax of code and mechanism of operation is entirely different throughout generations. They are considered as shape shifters [2] because each generation is entirely different than each other. Metamorphic engines are mostly buggy, this could be our luck that till now there is no perfect metamorphic engine available. It has been reported that metamorphism has been used as a mean of software security the same way it has been used in viruses to for their protection. They can be used stand alone by which they are self generating viruses and capable of performing actions on target system or they could take help from the surrounding environment in downloading some plug-in form internet or generating their new copies. Metamorphic viruses are capable of changing arrangement of their instruction. This ability gives them ability to generate new undetectable virus for examples if a virus contains n number of subroutines it will generate n! different type of generations. In case of BADBoy Virus it has 8 subroutines and it is capable of rearranging its subroutines it can generate 8! = 40320 type of different virus. This grows if number of subroutine increases inside the Virus Body. Above image is a code module of Badboy Virus in file it just need to take care of Entery Point whereregardless of where it is located remaining subroutines are access through jump instructions throughout the code. Zperm is another exam of metamorphic virus the above code sample is from Zperm virus which shows its rearrangement of code. 3.1 Formal Definition This formal definition is presented in [13] according to this definition let à ¡Ã‚ µÃ‚  P(d,p) represented as a function which is going to be computed by a program P in the current environment (d,p) in this case p represents programs stored on computer and d represents data processed. D(d,p) and S(p) are two recursive functions , T(d,p) is a trigger and is an injury condition and I(d,p) is considered as injury condition. In Case of this we can say that pair (v,v) are recursive functions and( v and v) are metamorphic virus if all conditions X(v,v) satisfies. Where T(d,p) ,I(d,p),S(d,p) is entirely different than T'(d,p) ,I'(d,p),S'(d,p). Based on that we can say that v and v are metamorphic virus and they are performing same actions. Polymorphic Virus share their kernel but in metamorphic virus each virus has its own kernel. 3.2 Core Architecture In this section we will discuss major components of metamorphic virus, although there are several other components already explained but architecture represented in [10] is considered as best. According to original author they have divided metamorphic virus in to two categories close-world or open-world. Open World are those who integrate with executing environment and perform some actions such are download some spyware etc. Here we will describe functional architecture of closed world viruses. Most of them perform binary transformation. 3.2.1 Locate Own Code The virus must be able to locate its code from inside the infected file or its own body each time it is transforming into new form or infecting a new file, metamorphic virus which are infecting other files and use them as their carrier must be capable of locating their code from inside the infected file. Mostly in file they use some predefined location of their startup code this location is mostly constant and remains contestant throughout the other generations. There are only few incidents when Engine tries to put dynamic locations. 3.2.2 Decode Once the code of virus is located by metamorphic engine it tries to obtain some sort of blue print information about how to transform. Although this is one of the drawback of metamorphic virus that within them self it they contain their architecture about how they are getting transformed. This information is very critical because this information is further encoded inside body of new virus. This unit can also retrieve information about flags, bit-vectors, markers, hints which will help in building new viruses. There is a drawback of this approach as it is required by the virus engine itself so virus write cannot obfuscate this area. 3.2.3 Analyze Once the core information is gathered there is other information which is very critical for proper execution of metamorphic virus. Without this information transformation cannot be performed. Metamorphic engine must have information about the register liveliness. If it is not available from Decode phase the engine must be capable of constructing it via def-use analysis. Control Flow Graph is also required by transformation phase because this will help in the rewriting logic and flow of the program. Control Flow graph is required in case if the malware itself is capable of generating the code which can shrink or grow in new generations and also it is required to process the control flow logic which is further transformed into code. In the following code it has gather its main idea about code what it is required to perform and it is further transforming it to simplified instructions. 1) mov [esi+4], 9 mov [esi+4], 6 add [esi+4], 3 2) mov [ebp+8], ecx push eax mov eax, ecx mov [ebp+8], eax pop eax 3) push 4 mov eax, 4 push eax 4) push eax push eax mov eax, 2Bh 3.2.4 Transform This unit is most important area of virus as it is capable of generating new virus. Most of virus logic resides here. This unit generate new instruction blocks semantically which are exactly same like its code but syntax is a bit different. Here some sort of obfuscation is also performed, metamorphic engine tries to rename registers , inserts NOP and garbage instructions and reorder the execution of block. Following code block has been taken from their examples in [10]. 1) mov eax, 10 mov eax, 5 add eax,5 2) mov eax, 5 sub eax, 10 mov eax, 1 add eax, 2 sub eax, 8 3) mov eax, 5 add eax, 5 mov eax, 10 4) cmp eax, 5 ja L1 cmp eax, 2 je L2 cmp eax, 5 jb L3 L1 : mov ebx, 3 jmp L4 L2 : mov ebx, 10 jmp L4 L3 : mov ebx, 10 jmp L4 L4 cmp eax, 5 ja L1 cmp eax, 5 jb L2 L1 : mov ebx, 3 jmp L3 L2 : mov ebx, 10 jmp L3 L3 3.2.5 Attach Attach unit it only available in those viruses which infect files and use them as source of replication. Transform unit not only transforms own code but also the code of target file, where it sets some entry point to virus main routine. During the attachment process it also shuffle the code

Tuesday, August 20, 2019

Mental Health Legislation In Uk Social Work Essay

Mental Health Legislation In Uk Social Work Essay One adult in six in the UK suffers from one or more forms of mental illness at any time. Incidence of mental ailments can as such be considered as prevalent as asthma (Ray et al, 2008, p 2 to 13). Mental ailments range from very common conditions like depression to ailments like schizophrenia, which affect less than 1% of the population. Mental ailments cost the nation approximately 77 billion GBP every year in terms of expenses on health and social care (Ray et al, 2008, p 2 to 13). Such ailments are not really well understood even today and often frighten people and stigmatise people with such ailments (Sheppard, 2002, p 779 to 797). Individuals with long term mental health issues are likely to face discrimination and social exclusion, phenomena that can lead to unemployment or underemployment, poverty, inadequate housing, social isolation and stigmatisation (Sheppard, 2002, p 779 to 797). Whilst UK society is progressively coming to terms with and accept modern day phenomena like homosexuality and same sex marriages, people continue to be very apprehensive about mental disorders and often associate such conditions with lunacy and the need for isolation and detention of people with severe and long term mental health conditions (Angermeyer Matschinger, 2003, p 304 to 309). Legislation and social policy towards mentally ill people has however evolved substantially over the course of the 20th century and more so in the last 25 years. I am placed in a residential unit that houses people that both sexes who are over 16 and have mental health issues. This assignment focuses on mental health law and policy in the UK and the various ways in which Ii am using my knowledge and understanding of these issues to inform my practice. Mental Health Legislation in UK Poor mental health continues to have substantial economic and personal impact in the UK. Stigma and discrimination increase such impacts (Angermeyer Matschinger, 2003, p 304 to 309). Social research has consistently found the presence of extremely negative attitudes towards individuals with mental health issues (Angermeyer Matschinger, 2003, p 304 to 309). There persists the view that such people represent dangers to their communities, perceptions which are also on occasion reinforced by the media. Such negative attitudes do not occur only in the media and the general public but also among mental health workers and professionals (Angermeyer Matschinger, 2003, p 304 to 309). Such elements increase social distancing, cause social exclusion and reduce the probability of such individuals to gain employment or access social and health care services (Angermeyer Matschinger, 2003, p 304 to 309). Whilst discriminatory attitudes towards the mentally ill still exists in substantial measure and adversely affect the life chances and social exclusion of such people, it also needs to be recognised that substantial progress has been made over the course of the 20th century and especially in the last 25 years to improve the physical, mental, economic and social conditions of such people (Mind.Org, 2010, p 1). Such changes have basically been brought about through changes in legislation and in social policy (Mind.Org, 2010, p 1). People with mental illnesses have traditionally been perceived negatively by society, with attitudes towards them varying from being harmless nuisances to violence prone and dangerous individuals (Mind.Org, 2010, p 1). Families with members with mental illnesses have often tried to hide such conditions for fear of social stigmatisation and the state, right until the end of the 19th century, was comfortable with locking such people up in lunatic asylums (Mind.Org, 2010, p 1). The Madhouse Act 1774 led to the creation of a commission with authority to give licences to premises for accommodating lunatics (Mind.Org, 2010, p 1). Succeeding legislation gave mental hospitals the authority to detain people with mental ailments (Mind.Org, 2010, p 1). The Lunacy Act 1890 was repealed with the passing of the Mental Health Act 1959. The Mental Health Act 1959 strengthened the Mental Treatment Act 1930 and allowed most psychiatric admissions to happen on a voluntary basis (Mind.Org, 2010, p 1). The Act aimed at providing informal treatment for most individuals with mental ailments, even as it created a legal framework for detention of certain people (Mind.Org, 2010, p 1). The recommendations made in the Percy Report led to decisions on compulsory detention of mentally ill persons changing from judicial to administrative prerogatives (Mind.Org, 2010, p 1). The 1959 Act however did not clarify whether legal detention orders for people with mental disorders authorised hospitals to treat such people without their consent (Mind.Org, 2010, p 1). The passing of the Mental Health Act 1983 provided a range of safeguards for people in hospitals. The act also imposed a duty on the district health authorities and social service departments to pr ovide after care services to the people discharged from hospital (Mind.Org, 2010, p 1). The Mental Health Act 1983 covered the assessment, treatment and the rights of people with mental health conditions and specified that people could be detained only if the strict criteria specified in the act were met (Mind.Org, 2010, p 1). The Mental Health Act 2007 aimed to modernise the Mental Health Act 1983 and incorporated changes that widened the definition of mental disorder and gave greater say to patients about who their nearest relatives were (Ray et al, 2008, p 2 to 13). The act also decreased the situations where electroconvulsive therapy could be given without permission, gave detained patients rights to independent mental health advocates, gave 16 and 17 year olds rights to agree or refuse admission to hospital without such decisions being superseded by parents and introduced supervised community treatment (Ray et al, 2008, p 2 to 13). The amendment of the Mental Health Act was followed by the publication of a code of practice that provides guidance to health care professionals on the interpretation of the law on a regular basis (Ray et al, 2008, p 2 to 13). The code of practice has five important additions to guiding principles, which deal with purpose, least restriction, participation, and effectiveness , efficiency and equity (Ray et al, 2008, p 2 to 13). The code importantly states that the specific needs of patients need to be recognised and patients should be involved to the greatest possible extent in the planning of their treatment (Ray et al, 2008, p 2 to 13). Whilst The Mental Health Act 1983, as amended in 2007, constitutes the most important mental health legislation in the country, the rights of people with mental health ailments is also governed by other acts like The Mental Capacity Act 2005, The Disability Discrimination Act 1995, The Health and Social Care Act 2008, The Care Standards Act 2007, The Mental Health (Patients in the Community) Act 1995, The Carers (Recognition and Services) Act 1996 and The Community Care (Direct Payment) Act 1996. All of these acts by way of certain provisions provide for the rights and entitlements of young and old individuals with mental ailments (Mind.Org, 2010, p 1). Progressive legislation in areas of mental health has been accompanied by changes in social care policy for people with such ailments (Brand et al, 2008, p 3 to 7). The beginning of social work in the area of mental health commenced with the engagement of a social worker by the Tavistock Clinic in 1920 (Brand et al, 2008, p 3 to 7). Whilst social work in the area of mental health was subdued until the 1950s, it subsequently assumed larger dimensions and led to the realisation of the utility of non medical social interventions for treatment of medical health issues (Brand et al, 2008, p 3 to 7). The publication of the Beverage Report in 1942 was instrumental in altering government policy and shifting the treatment of people with mental disorders from hospitals to the community (Brand et al, 2008, p 3 to 7). The 1950s saw the establishment of day hospitals, greater flexibility in provisioning of psychiatric services and reduction in hospital beds (Brand et al, 2008, p 3 to 7). The introduction of advanced drugs, the establishment of therapeutic bodies and development of greater outpatient services led to the decrease of numbers of psychiatric inpatients from 1955 (Brand et al, 2008, p 3 to 7). Much of such decrease was prompted by the introduction of social rehabilitation and resettlement methods, introduction of anti psychotic medication and availability of welfare benefits (Brand et al, 2008, p 3 to 7).Intensive debate and discussion in the media and among the community on the need to improve the conditions of people with mental health issues led to the introduction of specific programmes like the Care Programme Approach (CPA) in 1991 and other government initiatives (Ray et al, 2008, p 2 to 13). The guidance on Modernising Mental Health Services stressed upon the need for providing ca re at all times of the day and night and access to a comprehensive array of services (Ray et al, 2008, p 2 to 13).The introduction of the National Service Framework for Mental Health in 1999 elaborated the national standards for mental health, their objectives, how they were to be developed and delivered and the methods for measuring performance in different parts of the country (Sheppard, 2002, p 779 to 797).Social workers are now playing important roles in the treatment of people with mental health disorders and their greater inclusion in the community (Brand et al, 2008, p 3 to 7. Social work theory and practice has always espoused the use of the social model for dealing with people with mental health problems and have contributed to the development of a range of approaches that are holistic, empowering and community based in approach (Brand et al, 2008, p 3 to 7.Apart from being responsible for the introduction of numerous new person centred and community oriented approaches dea ling with mental health issues, mental health legislation, by way of The Mental Health Acts of 1983 and 2007 empowered appropriately trained social workers with a range of powers for assessment and intervention of people with mental health disorders (Ray et al, 2008, p 2 to 13). Application of Disability Knowledge in Practice Setting I am currently placed for my social work practice in a residential unit for people with mental health problems, who are furthermore homeless, more than 16 years of age, and fall under the purview of the Care Programme Approach (CPA). The CPA, which was introduced in 1991 for people with mental illnesses, requires health authorities, along with social service departments, to make specific arrangements for the care and medical treatment of people in the community with mental ailments (Care Programmeà ¢Ã¢â€š ¬Ã‚ ¦, 2010, p 1). The CPA requires that all individuals who receive treatment, care and support from mental health services should receive high quality care, which should furthermore be based upon individual assessment of their choices and needs. The needs of service users and their carers should essentially be central to delivery of services (Care Programmeà ¢Ã¢â€š ¬Ã‚ ¦, 2010, p 1). Mentally ill and homeless people are liable to pose special challenges to health and social care workers. The majority of those who suffer major mental illness live in impoverished circumstances somewhere along the continuum of poverty. Homelessness, however defined, is the extreme and most marginalised end of this continuum, and it is here that we find disproportionate numbers of the mentally ill. (Timms, 1996, P 159) It is very possible that the levels of cooperation and motivation of the mentally ill, who are also homeless, could be lesser than that of other patients (Net Industries, 2010, p 1). Whilst their limited resources often result in difficulties in their obtaining transportation to treatment centres, such people often forget to keep appointments or take their medications. Frequently unkempt in dress and appearance, their engagement in drug abuse can render them unresponsive and unruly (Net Industries, 2010, p 1). My practice setting provides specialised and supported residences for people with severe and long lasting mental health problems. Each resident has his or her own bedroom and is required to share the use of kitchens and bathrooms. Some of the residents have histories of multiple admissions in hospitals, combined with lack of compliance with medication and disengagement with services. Some of them also have histories of alcohol and substance abuse. Our organisation provides residents with a helpful and supportive environment for the carrying out of comprehensive assessment of needs (Timms, 1996, p 158 to 165). Assessments and care plans of our residents need to consider a range of requirements. These include assessing the requirements of parents with regard to physical health, housing, vocation and employment, dual diagnosis, history of abuse and violence, carers and medication (Timms, 1996, p 158 to 165). Assessment and care plans for such users need to essentially address risk management and plan for crises and contingencies (Timms, 1996, p 158 to 165). I, along with the other staff of the residential unit, work with mental health services for carrying out of detailed need assessments and for helping residents in development of independent living skills. My academic training and my knowledge of legislation and policy, whilst substantial, has not really provided me with the wherewithal to meet the practical challenges of my current position. It is still not widely recognised that social and economic disadvantages can lead to mental health problems (Timms, 1996, p 158 to 165). It is clear from my interaction with the residents that many of them come from disturbed and abused backgrounds and feel insecure about the social exclusion and stigma attached with mental ailments. They often have a multiplicity of needs that includes dual diagnosis as well as physical and mental health issues. I have to constantly refresh my knowledge of anti-oppressive and anti-discriminatory theory and ensure that personalised, cultural and socialised biases do not affect my responses towards the inmates of the residential unit and that I am able to help them with their social service needs. My work includes involvement and help in assessments, assisting residents in finding educational agencies that can help them in improving their skills and earning ability, arranging for medical appointments and counselling sessions in line with their intervention requirements, making them aware of their various social services benefits and entitlements, and helping them to access such benefits. I am aware of the need to adopt a person-centred approach, and take care to ascertain the needs of service users as also their opinions on what they feel is best for them before I make suggestions. I try to adopt a uniformly cheerful and cooperative approach that is based upon respect and helpfulness in my routine interaction with them and strive to ensure that my responses are free of condescension and patronage. I find that some members of the health and social care professions, despite such significant progress in legislation and policy, approach the mental health and other problems of our residents in traditional and bureaucratic ways, (much in the manner of Dominellis portrayal of the current state of social services), and appear to be constrained by resources as well as entrenched attitudes (Dominelli, 2004, p 18 to 95). I am doing my best to ensure that the opinions of the residents are taken into account in the satisfaction of their needs, that they are helped to overcome their mental health issues, and are made more self sufficient to look after their needs. Conclusion Significant changes have occurred in the last 40 years in the ways in which disabled people are perceived in society. Whilst many of these changes are outcomes of legislative and policy action by UK governments, the growing awareness of (a) the relevance of the social model, and (b) the fundamental flaws of the medical model, in dealing with disabled people has driven both legislative and policy changes. Social workers, with their commitment towards bringing about of social inclusion of excluded and disadvantaged segments of society, their specialised education and training, and the resources and authority at their disposal, are particularly well placed to bring about attitudinal changes among the members of health and social services, as well as among members of the community. My practice experience has convinced me that much more will have to be done in the application of legislative provisions and social policy at the ground level, especially so by the people responsible for delivery of social and health care, before the disabled can truly be integrated into mainstream society.

Monday, August 19, 2019

Julius Caesar Essay: Brutuss and Antonys Speeches -- Julius Caesar E

Brutus's and Antony's Speeches in Julius Caesar William Shakespeare's Julius Caesar is a tragic story of the dog and the manger. After Caesar is killed Mark Antony, a good friend of Caesar, plots to revenge his bloody death. He knows there is strength in numbers, and through a speech at Caesar's funeral, Antony plans to win the crowd of Rome and turn them against Brutus and the other conspirators. Cassius is one of the leading conspirators and is weary of Antony; Brutus is confident that there is nothing to fear, but he speaks before Antony at the funeral just to be safe. These two speeches, vastly different in message but similar in delivery, move the emotions of the people. Brutus's and Antony's speeches differ in length, have similar ways of keeping the crowd's attention, and differ in tone. The first and most obvious difference in the two funeral orations is their lengths. Brutus's speech is composed of 403 authoritative words; whereas Antony's speech makes an immense impact with 1097 words. Brutus is over-confident and only says what he needs to in order to get his point across. He does not expect anything more than a tear-filled eulogy from Antony, therefore shortening his explanation of Caesar's murder. Brutus is also having some regrets about his murderous deed, and he does not want to sound as if he is defending himself or his motives, simply interpreting them. Antony, on the other hand, has much more to say than Brutus anticipates. His speech is split into six lengthy sections. First, Antony counters what Brutus says by proving that Caesar was not ambitiou... ...ve in his cause rather than Brutus's. Finally, while the crowd is in awe of Brutus's raw power and booming authority, Antony uses sarcasm to rip down any respect the Roman people may have built for Brutus and the conspirators. In his funeral oration, Antony insults Brutus ten times by stating that he is "an honorable man" (Act III, scene ii, line 84) in a tone of biting mockery, therefore questioning Brutus's credibility. It is true that the Roman people have emotions that sway with the winds, but this is partly due to the great speaking skills of both Brutus and Mark Antony. Using different tactics, the speakers are able to play a game of tug-of-war. Antony unexpectedly pulls Brutus facedown into the mud where Caesar's blood, still fresh, forms puddles. Julius Caesar Essay: Brutus's and Antony's Speeches -- Julius Caesar E Brutus's and Antony's Speeches in Julius Caesar William Shakespeare's Julius Caesar is a tragic story of the dog and the manger. After Caesar is killed Mark Antony, a good friend of Caesar, plots to revenge his bloody death. He knows there is strength in numbers, and through a speech at Caesar's funeral, Antony plans to win the crowd of Rome and turn them against Brutus and the other conspirators. Cassius is one of the leading conspirators and is weary of Antony; Brutus is confident that there is nothing to fear, but he speaks before Antony at the funeral just to be safe. These two speeches, vastly different in message but similar in delivery, move the emotions of the people. Brutus's and Antony's speeches differ in length, have similar ways of keeping the crowd's attention, and differ in tone. The first and most obvious difference in the two funeral orations is their lengths. Brutus's speech is composed of 403 authoritative words; whereas Antony's speech makes an immense impact with 1097 words. Brutus is over-confident and only says what he needs to in order to get his point across. He does not expect anything more than a tear-filled eulogy from Antony, therefore shortening his explanation of Caesar's murder. Brutus is also having some regrets about his murderous deed, and he does not want to sound as if he is defending himself or his motives, simply interpreting them. Antony, on the other hand, has much more to say than Brutus anticipates. His speech is split into six lengthy sections. First, Antony counters what Brutus says by proving that Caesar was not ambitiou... ...ve in his cause rather than Brutus's. Finally, while the crowd is in awe of Brutus's raw power and booming authority, Antony uses sarcasm to rip down any respect the Roman people may have built for Brutus and the conspirators. In his funeral oration, Antony insults Brutus ten times by stating that he is "an honorable man" (Act III, scene ii, line 84) in a tone of biting mockery, therefore questioning Brutus's credibility. It is true that the Roman people have emotions that sway with the winds, but this is partly due to the great speaking skills of both Brutus and Mark Antony. Using different tactics, the speakers are able to play a game of tug-of-war. Antony unexpectedly pulls Brutus facedown into the mud where Caesar's blood, still fresh, forms puddles.

Sunday, August 18, 2019

Adolf Hitler Essay -- Adolf Hitler Nazi Germany Biography Essays

Adolf Hitler Adolf Hitler was born on April 20th, 1889 in Braunau, Austria. He was the fourth child of Alois Schickelgruber and Klara Hitler. The couple’s first three offsprings died as children, but more two more were born later, in addition to Adolf’s half siblings from his father’s previous marriage. A housemaid described Adolf’s father as a strict but comfortable man, and his mother was known to give Adolf much love and affection. As a child, Adolf was very skilled at artwork, and even went to a special school for awhile, but he didn’t do well there. His father died in 1903 of a pleural hemorrhage, and his mother died in 1907 of breast cancer. Hitler spent six years in Vienna, Austria, the center of anti-Semitism. He was virtually penniless. These years helped him develop prejudices about Jews, and an interest in politics. At the time, two of his closest friends were Jewish and he admired many Jewish art dealers and operatic performers and producers. Hi tler later was arrested for avoiding military service for World War I. When he was eventually caught, he was found â€Å"unfit†¦too weak†¦and unable to bear arms.†1 Later, he served four years. Near the end of the war, Hitler was partially blinded when he was exposed to poison gas. In 1919, Adolf joined the German Workers’ Party (later renamed National Socialist German Workers’ – or Nazi – Party). In 1921, he was elected as the party’s chairman, or Fà ¼hrer. Later in 1923, Hitler led an uprising against the Weimar Republic, the German government. Unfortunately for him, the uprising failed, and he was sentenced to five years in prison. He only served nine moths of this sentence though, during which he dictated his auto-biography, Mein Kampf (My Struggle). "[The Jews'] ultimate go... .... p. 17 2. Ibid., as cited in Fleming, pp. 28-29 Found at: http://www.nizkor.org/hweb/people/h/hitler-adolf/hitler-1922.html Adolf Hitler Quotes Great liars are also great magicians. Adolf Hitler The only people I have been able to use are those who fought. Adolf Hitler My will decides. Adof Hitler "The German people is not warlike nation. It is a soldierly one, which means it does not want a war but does not fear it. It loves peace but it also loves its humor and freedom." "Nature is cruel; therefore we are also entitled to be cruel. When I send the flower of German youth into the steel hail of the next war without feeling the slightest regret over the precious German blood that is being spilled, should I not also have the right to eliminate millions of an inferior race that multiplies like vermin?" (Adolf Hitler, cited in Joachim Fest's 1975 "Hitler")

El Nino Essay -- Meteorology Weather Climate Essays

El Nino We live on an incredibly large planet. Even broader than the size of the planet are the amount of changes and relationships between humans, animals, environment, weather, and the effects of each. Many times with busy schedules and modern lifestyles we forget the interaction that goes on between any number of concepts or ideas. We fail to realize that a specific weather occurrence in the Pacific Ocean can have an effect on every day life in the United States. El Nino is one of the largest scientific phenomenons that scientists have ever explored. The main concepts of El Nino are very simple and there are many variations, causes, affects, and relationships to study. The main idea behind El Nino is that the wind changes direction across the Pacific Ocean. In a non El Nino year (normal), the trade winds blow from east to west across the ocean, from North and South America towards the tropical regions of the Pacific Ocean. In an El Nino year, the trade winds change direction and blow from Asia and the tropical Pacific towards North and South America (NOAA B, 2004). The changes in these winds, commonly called Southern Oscillation winds because the majority of activity happens in the southern parts of the Pacific, produce many other changes. In the final analysis, the winds are the root of this scheme. John Daly (2004) discussed how the winds produce major changes in the temperature of the ocean water. This is the second main concept of El Nino. In normal years, when the wind blows from east to west, the temperature at â€Å"Sea Surface† is about 8 degrees cooler in the west than in the east. During El Nino, the winds blow a certain amount of water towards the west, thus piling it up and making its depth approximately one half meter deeper. Because of the loss of water at either coast, the deeper ocean water rises to replace what is gone. The deeper/cooler water is the source of many incomes in North and South America; however, in an El Nino year, the warmer water sits on top of the ocean, which creates many tribulations relating to both income and weather. The last main point of El Nino is the weather that follows due to the changes in water temperature. Precipitation follows the warmer water, whichever direction it flows. During the normal wind patterns the rainfall in the southern Pacific islands is consistent and creates their tropical identity. Whe... ...lnino/history.asp. National Oceanic and Atmospheric Administration (NOAA). Washington D.C. Last updated April 22, 2004. http://www.pmel.noaa.gov/tao/elnino/el-nino-story.html. (A) National Oceanic and Atmospheric Administration(NOAA). Washington D.C. Last updated April 22, 2004. http://www.pmel.noaa.gov/tao/elnino/faq.html#what. (B) National Oceanic and Atmospheric Administration (NOAA). Washington D.C. Last updated April 22, 2004. http://www.pmel.noaa.gov/tao/elnino/impacts.html. (C) Redmond, Kelly. â€Å"El Nino, La Nina, and the Western U.S., Alaska and Hawaii.† June 16, 1998. http://www.wrcc.dri.edu/enso/ensofaq.html. United States Geological Survey (USGS). â€Å"1998 California Flood.† From News Release. Feb. 3, 1998, http://ca.water.usgs.gov/archive/floods/flood98/. University of Illinois, Champaign Illinois. Last updated April, 2000. http://ww2010.atmos.uiuc.edu/(Gh)/guides/mtr/eln/rcnt.rxml. USA Today, by the Associated Press. â€Å"El Nino found to affect Antarctic Sea Ice.† 2004. http://www.usatoday.com/news/science/cold-science/2002-03-06-nino-ice.htm. Williams, Jack. USA Today. â€Å"Scientists Gather Information on El Nino Impact in Antarctica.† January 8, 2003.

Saturday, August 17, 2019

Mary Schapiro’s job was to fix the SEC Essay

1.Kotter’s eight steps As already noted, the SEC was starkly exposed as ill-equipped to deal with the chaos erupting across the globe. It was under strong criticism for the serious fraud of Bernard Madoff and the collapse of Wall Street stalwart Lehman Brothers. Accordingly, Mary Schapiro, a career regulator, was appointed the 29th chairman of SEC to save a languishing SEC. She changed the way they were doing things at the SEC including creating new structures, procedures, and programs to better address the modern financial markets as an urgent need to restore the credibility and public confidence in the SEC. This analysis is based on Kotter’s (1995) eight-step process for leading successful change. a.Establishing a sense of urgency The chairwoman argues that urgency is critical. Schapiro developed a change program with three priorities comprising internal assessment, investor protection focus and mistakes acknowledgement. The mission was to turn the SEC to be a high functioning, agile and intelligent, and committed to investor protection and market integrity. b.Creating a guiding coalition In order to able to manage the change process, she brought in new leadership and new senior team. The new leadership team set about retraining, skilling up and motivating the SEC’s talent staff. In addition, the investor –focused agenda was putting in place. The board and senior management and then all levels of decision making were required to pay attention to risk at all level of an enterprise. The whistle blower program was set up to detect securities violations. A final goal was to admit the mistakes that the SEC made under its watch. This is the first step in communicating the change vision. c.Developing a vision and strategy A vision was created to help direct the change effort, that was, to build a high functioning, agile and intelligent, and committed to investor protection and market integrity agency. d.Communicating the change vision In order to communicate the change vision, the chairwoman developed an open  way communication in which all staff and bankers could directly discuss with her. e.Empowering broad-based actions The SEC critically trained their staff to become certified fraud examiners. The organisation was restructured by removing the whole layer of management sending those to the frontline putting thousand staff to different focus groups such as corrupt foreign practices, insider trading, market manipulation and structured products. In addition, the SEC also set rules for over the counter and asset backed securities, hedge funds and examination program. f.Generate short- term wins Monetary reward and safe avenue were offered to whistle blower as a way to encourage people to detect securities violation as part of the change program. Fine was charged to financial institution (Goldman Sachs) due to misleading investor mortgage securities. g.Consolidating gains and producing more change h.Anchor new approaches in the future The change within the SEC was continually anchored for several years after the change commenced.

Friday, August 16, 2019

Four Principles Essay

Community corrections are â€Å"non-prison sanctions that are imposed on convicted adults or adjudicated juveniles either by a court instead of a prison sentence or by a parole board following release from prison.† (Joan Petersilia Para. 1) There are four general principles of effective intervention that have become organizing concepts of community corrections in what has become known as the â€Å"what works† movement. In this paragraph I will describe all four of the general principles of effective intervention, risk principle, criminogenic need principle, treatment principle, and fidelity principle, and the way they work. The first of the four principles of effective intervention is risk principle. Risk principle tells us that intervention programs should use a mix of cognitive and behavioral strategies (Wright, 2012.) This is saying that the intervention should target high risk offenders, to prevent them from reoffending. Research has proved that targeting high risk offenders works more often then targeting low risk offenders. Certain offenses are considered low risk and others high. That is what qualifies you as a low and high risk offender by what offense you committed the first time. Moreover, research also shows that targeting low-risk offenders with intensive treatment can actually increase their reoffending (Latessa, 2010). That is why within the four principles it does not target low right offenders. I agree with this system completely, we should pay more attention to the more serious offenders, because if they did a serious offense in the first place, they will do it again, and we  must tar get these people to try and stop them. According to Gendra and Paparozzi with Corrections Today, â€Å"When Robert Martinson predicted some 20 years ago that the new epoch in corrections would focus on punishment, many of us who were working in the system at that time did not realize how prescient he was. Today, the U.S. corrections system relies on the threat of punishment to bring about law-abiding behavior. Evidence of this can be seen in the proliferation of intensive supervision programs (ISPs), boot camps, shock incarceration and people’s prisons.† (Gendreau, P., & Paparozzi, M. A., 1995) I know that this intervention works because I have been to boot camp myself, and as they call it the â€Å"scare tactic† it really does work. When you do something incorrect or not to standards in the military they will scare soldiers with punishment, the reason it scares the soldiers is because they know that they will go through with the punishment because they have been punished before. The second of the four principles of effective intervention is ciminogenic need principle. Criminogenic need principle posits that intervention programs must focus on change factors related to the offender’s antisocial conduct. Some of the important factors to target include antisocial values and attitudes, substance abuse, antisocial peers, dysfunctional families, and poor decision-making and problem-solving skills. â€Å"Unfortunately many intervention programs target factors that have little or nothing to do with an individual’s current criminal behavior.† (Wright, F  2012) When going up in a dysfunctional family, you learn that it is acceptable to be that way. When gang member have children , their children grow up thinking that what their parent is doing is acceptable, so when they get to the age that they can make their own decisions, they do what they grew up knowing, gang banging. On the contrary an example I am going to bring up the incident that happened in Connecticut a couple days ago. The killer did not have a dysfunctional family, but the old babysitter had reported that when she would watch him his mother would say to never take her eye off of him, even when going to the bathroom which can form a theory that he had always acted up in odd ways. The third of the four principles of  effective intervention is the treatment principle. The treatment principle tells us that intervention programs should use a mix of cognitive and behavioral strategies. As John Wright states, â€Å"Cognitive approaches confront the way offenders think, their criminal values and attitudes, and their decision making. Behavioral approaches, by contrast, seek to model, reward, and reinforce prosocial behavior. Numerous studies show that cognitive-behavioral strategies work better than other intervention strategies for offenders, including nondirective talk therapy and psychoanalytic approaches. Nondirective approaches do not tend to work with most offenders because they are usually concrete in their thinking and not always able to think rationally.† (J. Wright, 2012) When you are in prison, if you do not get into trouble they will send you to a work camp, which gives you more privileges than the average prisoner. When you get in trouble in prison, they will take away any little privileges that you do have, that would be an example of behavioral approaches. An example of a cognitive approach would be to have a criminal in therapy, with a physiological expert who would know how to pick the offenders brain to figure out the way they think then question them on the reason they think like that. The fourth and last principle of effective intervention is the fidelity principle. The fidelity principle is in affect to make it so that the other three principles are being held to the standard. â€Å"Some individuals should never work with offenders. When they do they often reinforce criminal thinking patterns and antisocial behavior† (J. Wright 2012). The people that work with these offenders must be one hundred percent qualified, and well as have proven positive results of their work or else their job in this intervention is useless. The working will just cause the offenders to get worst. All the jobs within the intervention are important because if everyone is not doing their part within the program then the results from the program will not look effective. These four principles have been proven to be effective and I believe that if we continue to use it, that we will avoid many offenders from have a second  offense and keep the crime rate down within our country. In this essay you have learned all four of the principles effective in the community corrections, risk principle, crimongenic  need principle, treatment principle, and fidelity principle, and the roles that they play within the intervention. References Beeler, A. (2007). What works in corrections: Reducing the criminal activities of offenders and delinquents. Corrections Compendium, 32(2), 36-36. Retrieved from http://search.proquest.com/docview/211806856?accountid=32521 Gendreau, P., & Paparozzi, M. A. (1995). Examining what works in community corrections. Corrections Today, 57(1), 28-28. Retrieved from http://search.proquest.com/docview/215705816?accountid=32521 Petersilia, J (November 2007) What Works In Community Corrections, The PEW Center of the States. Retrieved by http://www.pewtrusts.org Wright, J (2012) What Works In Changing Offenders? Retrieved from https://content.ashford.edu/books/AUCRJ201.12.1