Get help from the best in academic writing.

Nursing Coursework Paper On Developing Evaluation Plan And Disseminating Result Write My Essay Help

Evaluation Plan and Disseminating Result

Reliability refers to the instance
of obtaining the same result using a particular method repeatedly whereas validity
refers to the situation of a method or an instrument accurately measuring what
it was intended to (Houser, 2012, p. 32). Both reliability and validity of data
collection tools are important in qualitative research project and hence must
be achieved for distinct reasons. This would ensure that data collection tools
used provide accurate figures and analysis that would be consistent with other
researches of the same context. At some point in research projects, it may
require use of earlier research project’s data to make an analysis of another
research of the similar nature, but in a case where the data collection tools do
note give accurate and consistent data, it will be inappropriate to replicate
such data to other similar projects (Houser, 2012, p. 35). The need to have
accurate and consistent data is crucial for ensuring that data collection tools
are reliable.

Similarly, in an attempt to ensure
accurate reflection or assess to specific targeted concepts of a research
project by the researcher, by using validity concept, I would aim to achieve
data generalizability, transferability and concept accuracy. Validity in its
self must be concerned with ensuring that the researcher manages to obtain
accurately what he set out to obtain from the data collection tools (Houser, 2012,
p. 37). I would ensure that the collection tools are able to give data that can
be used to general a population, particular in a case of sampling research. This
would also be important in cases where a researcher intends to use the results
of one research to another research of similar context.


Houser, J.
(2012). Nursing research: Reading, using, and creating evidence.
Sudbury, MA: Jones & Bartlett Learning.

Nursing Capstone Project Paper on Developing an Evaluation Plan and Disseminating Results ccusa autobiographical essay help

an Evaluation Plan and Disseminating Results

nursing institutions are in consistent move to ensuring effectiveness in type
of services being offered in terms of expected standards. This is achieved
through preparation and subsequent implementation of change programmes that can
be in form of training, appraisal recommendations, change management, staff
satisfaction policies among others. However, implementation of these factors is
not sufficient in an organization or institution until an evaluation is carried
out. The main objective of the evaluation exercise is to provide a measuring
guideline on how much success has been realized after the implementation
exercise of the proposed solution. That is, it helps an institution gauge
whether or not it is moving in the right direction as determined by its overall
objectives and missions.

 There are several methods for evaluating
proposed solution to problem affecting nursing practices. However,
effectiveness of an evaluation method is determined by the method used or
proposed for solutions needed.

solution to numerous death cases of patients due to nursing malpractices
(errors) and substandard services (low quality) as reported by Kohn et al
(2000) and the Institute of Medicine (2001)  respectively involves nurses’ active
involvement in research findings by reviewing released research articles. This
can be achieved by providing articles to practicing nurses within the
organization on annual bases. After every release of research work or findings,
the information would be made available through various media (print,
discussions or departmental up-date meetings). Then, respective nurses would be
expected to make a presentation of the learnt concept during the internally
organized conference forum. Main variables to be assessed during this exercise
include nurses’ attitudes to continuous learning, level of comprehension after
critical review of research findings, time taken to understand the new research
findings, challenges encountered during review exercise, level of satisfaction,
effectiveness of the programme through improvement in service delivery besides
customer responses (that is, reduced cases of complains that result from errors
and low quality service providence) 
(Kohn et al 2000; Institute of Medicine, 2001).

of these variables would be carried out by two major methods. These include
quantitative and qualitative approaches (Section 3, n.d).

quantitative methods of evaluation, data would be collected on the population
to whom the project is meant to affect. These would be grouped into two. That
is, nurses who would have taken the project positively and those who would be
affected negatively by the proposed project as determined by turnover rates and
level of standard in performance before and after the review exercises (Section
3, n.d; Kohn et al 2000; Institute of Medicine, 2001). The method would be used
during the project process, impact assessment and post-project outcomes.
Results obtained would then be used to draw conclusions and possible
recommendations to the stakeholders on the way forward. Quantitative approaches
to be used are counting systems besides survey method.

counting systems, the main items to be used are three types forms (contact or
encounter form, item distributed and item received forms). The forms would be designed
such that all important information concerning the programme is included. These
would then to record respective events of the programme. The forms would be
designed as shown in appendix A.

from forms, survey technique would also be adopted. This method is essential in
collecting numerical data on variables being measured. Survey instruments, such
as questionnaires, personal interviews, mails and telephone conversation and
medical examination record forms would be used depending on the type of
response expected (that is, confidential or non-confidential responses).
Preparation of survey tools would depend on survey population, which includes
nurses in the institution within which evaluation exercise is to be carried out
(Section 3, n.d). Another important factor that I would have to consider while designing
survey items is the method I intend to use while administering the items.

instance, self-administered instruments would be shorter and easier to be
followed by the respondents without my presence. Also, use of questionnaires
would be administered during internal conferences in order to minimize on costs
and increase response rates. A part from population and delivery method
factors, survey instruments would be developed with simplicity in language and
questions (Section 3, n.d). Questions on sensitive information, such as age,
education, ethnicity and marital status would be include at the end of the
instrument (questionnaire), as they are likely to prevent effective responses
from the nurses as these types of questions draws away respondents attention
from main subject of the evaluation to their daily activities (Section 3, n.d).
At times, some can become uneasy disclosing certain information. Therefore,
while developing questionnaires, some questions (with little impact on the
evaluation subject) would set with optional feedbacks.

I will emphasize on the importance of the evaluation exercise by developing
appropriate title for the questionnaires and relevant introductory elements in
interviews (Section 3, n.d). Reliability and validity of the instrument would
be measured after the first presentations.

main qualitative methods to be used are participant anti-observation,
interviews and focus groups. These methods would help in providing in-depth
information about the impacts of the proposed solution to the nurses involved
in the evaluation exercise and patients affected by the quality of services
provided by the nurses.


Institute of
Medicine. (2001). Crossing the quality chasm: A new health system for the
21st century. Washington, DC: National Academies Press.

Kohn, L. T.,
Corrigan, J. M., & Donaldson, M. S. (Eds.). (2000). To err is human:
Building a safer health system. Washington, DC: National Academies Press.

Section 3 (n.d). Methods of Evaluation. Retrieved from

A: Sample Contact Forms

1: Sample Contact Form


2: Sample Form for Items Received


3: Sample Form for Items Distributed


Sample Essay Paper on World Traveler college admission essay help houston tx: college admission essay help houston tx

World Traveler

being a young man in his late twenties, probably 27, was always passionate with
great expectation. He became an IT specialist at a tender age, being genius
with computer systems and applications. Apart from his career, he had a craving
for cars, ever since he was young. When he was a boy, he spent his days on the
corridors driving toy car round and all over the house, sometime hooting with
his mouth when the toy failed to realize an obstacle ahead.  His innocence of believing that the toys were
actual cars matured to a dream. In his dreams, he had pictured himself owning a
car, and not just a car but Honda S200. The car’s 6 speed transition, the front
–engine, and rear wheel drive layout were the main attractive features that
made him like the car with such a vivid admiration. His first salary after
completing college was far below the adequate amount that would have enabled
him purchase his dream car. However, it enabled him meet his monthly expenses
and preserve some savings to enable him realize his dreams in future. This
compelled him to bed a little lower and go for an Acura RSX. However, he
watered his dreams with perennial online window shopping for the car that he
had always wished to have. He was aggressive and enthusiastic about achieving
his goal; his face portrayed a lot of curiosity as he went through several
advertisements on the Internet. His decisions were focused and his desire was
one, to have Honda S200 by all means.

         His conviction was assured when he came
across a great offer for the car of his dream. His joy was evident in his eyes,
which brightened with illuminations of vivid realization of a hidden treasure.  At that time, two things on his life mattered
to him most, the car and his girlfriend, Sue. It was a black Honda S2000 and it
had a price tag of $11,000, which according to Tom was so appealing that he
never cared getting a loan and travelling for quite a distance to own the car. He
made a call to the seller, and declared his interest in having the fancy car. His
voice was smooth and genuine, it prompted the seller to trust him, even without
his presence, they struck a deal and planned to meet. It was a business talk
and everyone constrained himself within the territories of business ethic, the
buyer sounded polite and serious while the seller was genuine in his terms. The
terms were simple with a price tag of $11,000, and the seller was some miles
away. Tom did not care or hesitate, he had thought of the deal as a good one
and he needed to rush in order to maintain the position of first bidder. With
inadequate cash to purchase the car, and his heart full of desire, he walked
into the bank, weighed the options, and finally settled the best loan plan. It
was a two year payment plan which seemed to be appropriate, with little
pressure from his monthly salary. This meant that he cut down his monthly
spending in order to cover the loan in the expected time, it was a little pinch
on his cheeks but he had to bear it. The car was in perfect shape, with all modern
technology in place, perfectly and properly. With a great deal from the bank, he
succeeded in getting the car of his dream and decided not to sell his first car,
but instead surprised his girlfriend with a gift. The girlfriend was swept by
excitement that rendered her helplessly in the hands of Tom for a sensational
hug. It was slow, and no one seemed to be in hurry to end the comfort from the
hug, with such evidence of love and concern. They did it Australian way, with
attention and embrace as a true confirmation of realistic charity.

            Tom adored his car with great care and concern, making
sure it was ever clean and sometimes gazed at it from a distance to satisfy his
eyes with pleasure of admiration. He felt the pleasure of achieving a life time
dream when one is still young. In his mind, good thoughts that he always wanted
to have kept on flooding in his mind. “With a car of your dream, and a job that
you like, and a girlfriend that you love, what else would a man desire in his
life?” he wondered.

day, in a bright morning, Tom was off-work and her girlfriend had an
appointment with the doctor. Tom made it his responsibility to chauffer his
girlfriend in the comfort of his new black Honda S2000, a pure act of kindness
portrayed by Australian gentleman. After the appointment they opted to do some
shopping in the nearby center. After having bought everything that the house
demanded, they walked down the mall, with their hands firmly held together,
like a king and the queen enjoying peaceful atmosphere in their kingdom. They
happiness was cut short, when they discovered they had no where to put their
house supplies. It turned out to be a shocking experience when they discovered that
the car was nowhere, or may be, it was stolen. It was hard to believe, such a
car, with all its beauty and splendor, with all expenses that came with it, all
negotiations made by John and the seller, John and the bank, all seemed to have
born vain fruits with bitterness in their flesh. He almost hated everyone, and
kept on wondering how a man or a woman would take something that he/she had not
labored for. Tears of hopelessness were uncontrollable in the eyes of Sue, who
knew how much the car meant to her boyfriend. With desperate moves made by Tom,
from the police to the tracking company and finally to the insurance company,
his hope was fading. His walking style became swift with his hands swaying vehemently
side by side without a particular pattern. Later, there was a revival that came
with great encouragement when the police reported that his stolen car had been
delivered from the hand of the thieves. There was a smile of fortune in the
face of Tom whose hope had faded out.

The Tragic Missing of a Husband

found himself in a pathetic situation after being misled by his personal
judgment. He landed in the police custody in a mysterious way, and the shame of
it could not allow him to call and notify his own family. He thought his own wife;
Jill, was cheating on him after getting misleading evidence on the matter. How
the drama unfolded was quite hilarious, it was like one of those ancient movies
of Holly Wood; the only difference was that this particular one was real and
not imaginary. John and Jill had planned to have some time together, probably
in a hotel, to have a meal together as they evaluated some important issues
concerning their marriage. Their marriage was swimming in stormy ocean, and in
order to prevent it from sinking, it was necessary for them to have a proper
dialogue. After job, John decided put out the official regalia, and probable
look somehow casual, after all, the meeting was only a family matter. When he
went to his home to change for dinner, he could not help shut his mouth from
getting wide open. Actually, he could not believe his eyes for what he saw. The
man he had considered the best friend, Douglas, was no longer a friend, but had
decided to feast beyond his territory or worst still, cheat on his wife. The
scene was horrible and disgusting, with the view of ‘Douglas’ half naked, next to
the swimming pool, looking relaxed, and enjoying the magnificent offer of
another man’s prey. John could not hold himself up, and like a gentle he had to
gather his broken pieces, either to hell or to the police station. He chose to
get some refuge from the police station, considering better to spend the night
in the cold corridors of police than in his home with his unfaithful wife. The
pressure of his blood flow had slightly increased, and the neurons in his mind
seemed to give a slow response. He could not reason or comprehend appropriately,
and his body twisted unconditionally with confusion. He held his head with both
his hands, pulled the hair on his head roughly, bite his nails, and made some monologue
that no one could understand. He looked confused and completely mad with jealous
and unreasonable interpretations.

            On the hotel, his wife had arrived on time according to
their plan, and kept on looking at the entrance to welcome his husband from a
distance. His wife waited innocently with bated breath on a date that never
materialized. She shook her head steadily, from side to side, checking on her
watch every minute, but time seemed to drag itself in quite a slow pace. The
number of times she tried calling her husband was countless, and even the messages
she sent were not answered at all. “Am so ashamed of you John, you have treated
me with such a low dignity, I deserve a better treatment as you wife”, she
wrote a text to him. After such a wait, for respect and concern, with calls and
texts, all the labor was in vain. She swiftly grabbed her handbag and vanished,
of course, the waiters were surprised but minded their own business.

            The episode was far from ending, actually, after a failed
communication with John, the night waited for Jill with mockery. That night the
bed was rough and cold, the night was longer than usual, and the darkness was
scary and noisy. She did not switch off the lights the whole night in order to
scare the mocking darkness away. When the morning came, there was no need for breakfast,
instead she decide to report the matter to the police before doing any other
job. It was shocking to find her husband in the police custody, ahead of him,
with a gloomy face and rather confused gestures. He looked different and troubled;
his face was unable to hide the torture that he had faced overnight in the
absence of his wife. Jill had great sympathy and her face was shaded with mercy
and concern.  As a wife, she inquired to
know the problem from the man who looked at her with scornful eyes. “How on the
earth would she be pretending not to know what she had done!’ The man wondered.
The police officer on duty was wise, he had noticed the tension between the two
couples and decided to host them for a while. The police man ushered them to
the guest room, which was open with some tables and chairs. Immediately he left
them to discuss their issues, he heard a loud bang on the table, only to
realize that John had done it unconditionally. However, the policeman never
bothered because he thought such reactions were necessary to relieve tension.
Words were exchanged between the two couples with Johns tempers dominating the
whole conversation. Jill was tender in her reactions and seemed to be more
willing to solve problem, maybe she never wanted to face another tormenting
night alone. In order to make his arguments stronger, John produced the
evidence; some photos he had taken of half naked man who he thought was his
best friend, Douglas. When Jill proved to him that the man on the photo was her
brother who had paid them a call, his face froze with embarrassment.

was rather shameful and embarrassing when the man discovered that he had
misjudged his wife. He coiled his lion power that made him roar with a loud
noise, and withdrew his vigorous gestures. He became calm as is eyes dropped in
tears of guilty and rejuvenated affection towards his innocent wife, Jill. The
only thing that saved him from the embarrassment was his wife’s firm embrace;
in fact, it gave him an opportunity to utter emotional words, “I am so sorry,
you are the best wife in the whole world”. As they walked out of the police
custody, it was like the bride and the bride groom walking down the aisle.
Nevertheless, the issue taught them better lessons than a teacher could offer.

Research Paper Writing on CONFLICT RESOLUTION cbest essay help



Conflicts are common occurrences in the workplace. However, when they occur, they affect the working environment and the productivity of the organization. Since conflicts are bound to occur, organizations have put in place some mechanisms to solve them. This paper explores the conflict in a leading accounting firm in the US. The conflict was interpreted as a form of sexual harassment between Greg and Jane. This paper analyses how they explored the situation and discovered that it was not an effective way. The parties chose to utilize a right-based mechanism to address the issue, whereby the matter was ruled in favor of the offender in court, thereby complicating the relationship between the two further. However, the right-based mechanism did not address the interest of both parties and thus this paper has suggested an interest-based mechanism that follows five stets to solve the conflict.


Organizations function because people interact with one another on various issues.  When people interact, they may agree or disagree, and this is considered as normal forms of interaction. Although disagreements are common, it can lead to a conflict between the disagreeing parties thereby affecting the processes within the organization, as well as the parties involved in the conflict (Melton 2014, p. 265). Conflicts take place in organizations, but this does not mean that the organization ceases to function. There exist some mechanism for solving conflict, and one can be vindicated if the proper channel has been followed. Conflict resolution process can be formal or informal.  Formal channels are outlined by the organization and consider a rational approach to conflict resolution. Informal approach on the other hand considers a channel that has not been specified, and this means the approach is non-rational (Iqbal & Afsheen 2013, p. 125). This paper analyzes a conflict that took place inan organization in the US.


A large accounting firm in the US had
several positions for the financial partners. The role of financial partners
was to analyze the creditworthiness of clients seeking for a loan, and this
involved going to the site in case the client had offered some immobile
collateral, such as business premises. Financial partners used to work in
pairs, and this means they would travel together to the site.

Jane was a newly hired financial partner,
and she was paired with Greg, a seasoned worker at the organization. Greg was
also an assistant to the head of the department. After about three months, Jane
had fully oriented to the procedures within the organization, and she could go
to the field with Greg to analyze the creditworthiness of clients. In one of
the field visits, Greg grabbed Jane and kissed her by force. The incident
triggered a conflict between the two. Jane was very mad and considered the
incident as sexual harassment. That day, the two did not spoke to each other.

The following morning, Greg went to
apologize to Jane. He apologized on his knees to the point that Jane forgave
him. However, she requested the manager to pair her with another person of the
same sex. Once her request was granted, Greg became angry because he had grown
fond of her. He hatched a scheme of going to her every morning and apologizing
for the incident he had already been forgiven. The apologies continued for more
than a month until Jane got fed up and told other financial partners about the
car incident. Her narration destroyed the reputation of Greg because he lost
the respect of other employees, and could not lead them effectively.

The company’s policy on sexual
harassment was well outlined, and it stated that such cases would be treated as
criminal cases. The parties involved would be interdicted pending the verdict
of the court once the matter was in the court. However, the policy of the
company also gave way for the two parties to resolve such conflict informally. Greg
had an influence in the company and thus there was likelihood that he could
influence the sucking of Jane if legal procedures were not followed. Fearing
for her job, Jane took the case to the court.    During
the investigation, the court dismissed the case. The judge argued that the case
had no evidence, and that the fact that Greg had apologized for any misconduct
means that Jane had misinterpreted his motives. At work, the two were interdicted
for three months. After resuming their duties, the relationship between the two
changed. They behaved like a mouse and a cat, and this had a negative effect on
their work.

Analysis of the

From the case study narrated above, the
case of power and conflict emerges clearly, as well as the wrong choice of
conflict resolution mechanism can be noticed on the outcome. In the first
place, the conflict took place in private, which was inside the car, but the consequences
were displayed in public, which in this case was the office. The public place
or office masked the problem, and this means it would have been prudent for the
two parties to solve it in private or informally.  When the two were in private, the discourse
that dominated them was non-rational. However, because of lack of proper
channels to follow in non-formal conflict, there was no room for the two to
express their dissatisfaction to each other. According to a study by Palagiet
al. (2005, p.279), individuals with the least power at the workplace are the
most affected whenever a conflict takes place. As a result, there is a
prerequisite for the management to provide a variety of conflict resolution
mechanism that can make them feel comfortable so that they will be in a
position to maximally deliver.

Jane was powerless when she was
confronted with sexual advances. Greg, on the other hand, though that he would
use his charm and power to lure Jane into his sexual advances. The two
negotiated for power after the incident whereby each one of them wanted to
maintain the integrity in the office. Jane had selected to let the incident die
whereas Greg also chose to apologize as a way of calming Jane. This means they
all valued the relationship they had at work. In the conflict, most dominating
claimer was Greg. In the first place, he overpowered Jane in the car.
Thereafter, he pestered Jane with repeated apologies that destroyed the harmony
of the work environment for Jane.  He
persisted in his apologies, such that Jane felt it was being pushed too far.

After the incident, the mater was solved
by Greg’s apology. However, conflict came as a result of Greg’s continued
persistence, and this means there were some ethical issues surrounding the
negotiation process. It should be made clear that the ethical issues
surrounding the negotiation process are not clear. At the surface, Greg appears
to be well mannered and serious in his apologies. However, it appears that he
is socially inept because he does not realize when to stop apologizing. The
unending apologies of Greg can be visualized as intrusive because they lost
meaning and their goodwill intention. The apologies are thus offensive because
they turned into a form of harassment.

The company that had employed Jane and
Greg had put in place an option for right-based mechanism to address sexual
harassment cases.  The right-based
mechanism in this case implies legal redress. However, Costantino and Merchant
(1996 p. 74) fault this mechanism as unfit to solve the conflict at workplace,
and this explains as why the relationship between Laura and Greg became worse
after the court decision.Right-based mechanisms are grounded on fixed
principles and rules and thus they rely on the strength of evidence rather than
the truth of the matter (Rowe, 1990, p. 16). As a result, they maynot maintain
a healthy relationship after the verdict has been delivered. The sexual
advances of Greg could not be proved at all and cannot qualify to be sexual
harassment case. This means the method used to address the conflict was not

and Conclusion

The Best Approach to
the Case

According to Connell (1987, p. 28), right-based
mechanism cannot address the interest of both parties involved in a
conflict.  As a result, Greg and Jane
could have sought for interest-based mechanism. The company has an Ombudsman,
who handles workers’ issues, and this would have been the best person to
approach rather than the court. The Ombudsman would have facilitated a private
discussion between them (Greg and Jane), and this would have ensured that their
interests were preserved.

The Ombudsman would have approached the
issues using conflict resolution procedures outlined by Rowe (1995, p. 41),
which ensures that the interests of both parties are met. The first step
involves identification of the conflict source. When information about the
conflict cause is obtained, it becomes easy to resolve that particular
conflict. A series of queries should be used by the Ombudsman to obtain the
required information.

The Ombudsman would have enquired on how
the incident started, and whether there was any relationship between the
incident and other things, and the interests of each party among other issues.
The Ombudsman would have given the two parties an opportunity to share their
sides of the story. This would have helped in getting the proper understanding
of the incident, as well as elimination of impartiality cases (Aureli&Frans
2000, p. 81). In addition, the Ombudsman would have carefully listened to both
parties and follow with their explanations to encourage them open up. 

In the second step of conflict
resolution, the Ombudsman would have looked beyond the incident. In most cases,
it is not the incident that matters but its perspective that arouses anger,
which in turn leads to a noisy and disruptive evidence of a conflict (Dhiman
2012, p. 57). According to Kellett(2007, p. 57), the
conflict source may be something minor that happened months before, but the
stress levels may grow and make the two parties attack each other at a personal
level rather than dealing with the real problem. This would have required the
Ombudsman to be calm and carefully help Greg and Jane to see beyond the
triggering situation and understand the real cause. Probing questions like “what
do you think occurred here?” or “why do you think the problem first occurred
between you?” can be used.

In the third step, solutions would have
been requested. This would have occurred after the Ombudsman had obtained the
viewpoint of each party about the conflict, whereby each of them would have
identified how the situation could have been altered. The Ombudsman would also
have asked each party to come up with ideas that would have made things better
between them. To accomplish this step, the Ombudsman would have been forced to
practice active listening, as well as understanding each verbal nuance and body

In step four, solutions supported by
both disputants would have been identified (Wilmot & Jouyce 2007, p. 26).
Perhaps Greg and Jane would have agreed to be friends without betraying their
feelings towards each other. Thomas (2012, p. 265) states that in the listening
process, the mediator should come up with the possible course of action. The
merits of various ideas should be pointed out, not only of the disputants’
perspectives, but also in terms that are beneficial to the organization.

In the fifth stage, the Ombudsman would
have asked Greg and Jane to shake hands as a sign of agreement to the
identified solution. Where necessary, a contract framing time and specifying
actions could have been written. However, according to Bercovitch and Jackson,
2009, p. 8), it is important both parties would outlined the action plans  they would both put in place to avoid future
conflicts,as well as the path they would have taken incase issues arise between
them in the future.


Questions may arise on issues of conflict
management. These questions will and may always continue due to the presence of
conflicts in workplaces. However, it is advisable for managers to learn
techniques of efficiently handling and solving conflict that hinder or even
interfere with the professional growth of their employees. In this paper, the right-based
mechanism was selected by the aggrieved party to solve the conflict. However,
this paper has indicated this mechanism was not effective as it could not
address the interest of both parties involved in a conflict. As a result, the
paper has proposed the interest-based mechanism and how it would have been used
to solve the situation arising in the place of work.

List of References

F. &Frans, B. 2000.Natural Conflict Resolution. University of
California Press: Berkeley, CA.

J. & Jackson, R. 2009.Conflict resolution in the twenty-first century:
principles, methods, and approaches. University of Michigan Press: Ann

Connell, R. 1987. Gender and power. Stanford University
Press: Stanford.

Costantino, C.,
Merchant, C. 1996. Designing conflict
management systems.Jossey-Bass Publishers: San Francisco.

S. 2012. Measuring the impact of organizational conflict.Journal of the
International Ombudsman Association, 5(2), pp. 56-65.

M., &Afsheen, F. 2013. Interpersonal conflict handling styles: A
collectivist co-workers’ perspective on its causes and effects. Pakistan
Journal of Psychological Research, 28(1), pp. 125-153.

P. 2007. Conflict dialogue. Sage Publications: London.

E. 2014. The consequences of conflict: An evaluation of
racial disparity and organizational performance. Public Organization Review,
14(3), pp. 267-284.

B., & Bola Udegbe, I.  2014. Gender
differences in the effects of perception of organizational injustice on
workplace reactivity. Europe’s Journal of Psychology, 10(1), pp.

E. et al. 2005. Aggression and reconciliation in two captive groups of Lemur
catta.International Journal of Primatology 26, pp. 279–294.

Rowe, M. 1990. People
Who Feel Harassed Need a Complaint System With Both Formal and Informal
Options. Negotiation Journal, 4(1),
pp. 12-35.

Rowe, M. 1995. Options, functions and skills: What an
organizational ombudsman might want to know. Ombudsman Association: Dallas.

M. 2012. Identifying organizational conflict of interest: The information gap.Defense
Acquisition Research Journal: A Publication of the Defense Acquisition
University, 19(3), pp. 265-282.

&Jouyce, H. 2007. Interpersonal conflict. McGraw-Hill Companies: New

IT-Web Essay Paper on Managing Risk in Information Systems a level english language essay help: a level english language essay help

Managing Risk in Information Systems


following risks, threats, and vulnerabilities were found in a healthcare IT
infrastructure servicing patients with life-threatening situations. Given the
list, select which of the seven domains of a typical IT infrastructure is
primarily impacted by the risk, threat, or vulnerability.

destroys data in application and deletes all files User

penetrates your IT infrastructure and gains access to your internal network System

employee romance gone bad User

destroys primary data center LAN

circuit outages WAN

OS has a known software vulnerability LAN WAN

access to organization owned User


of production data System Database

of service attack on organization e-mail server LAN

communications from home office Remote access

server OS has a known software vulnerability LAN

downloads an unknown e –mail attachment User

browser has software vulnerability Workstation

provider has a major network outage WAN

ingress/egress traffic filtering degrades Performance LAN-WAN

inserts CDs and USB hard drives with personal photos, music, and videos on organization
owned computers User

tunneling between remote computer and ingress/egress
router Remote Access

access points are needed for LAN connectivity within a warehouse

to prevent rogue users from unauthorized WLAN  WAN

Lab Assessment

Given the
scenario of a healthcare organization, answer the following Lab #1 assessment
questions from a risk management perspective:

organizations are under strict compliance to HIPPA privacy requirements which
require that an organization have proper security controls for handling
personal healthcare information (PHI) privacy data. This includes security
controls for the IT infrastructure handling PHI privacy data. Which one of the
listed risks, threats, or vulnerabilities can violate HIPPA privacy
requirements? List one and justify your answer in one or two sentences.

Having the
information system structure hacked into is one of the risks that can violate
HIPPA privacy requirements. The hacker would get access to private client
information that should be protected. A healthcare organization’s information
is sensitive, and should be protected to maintain confidentiality of served

 How many threats and vulnerabilities did
you find that impacted risk within each of the seven domains of a typical IT

Domain: 2

Domain: 5

Domain: 7

Domain: 2

Domain: 2

Access Domain: 2

Domain: 1

domain(s) had the greatest number of risks, threats, and vulnerabilities?

LAN Domain

is the risk impact or risk factor (critical, major, minor) that you would qualitatively
assign to the risks, threats, and vulnerabilities you identified for the
LAN-to-WAN Domain for the healthcare and HIPPA compliance scenario?

There would be
consideration of all types of risk factors. Those assigned to LAN-to-WAN would
get minor consideration unless there was interference with HIPPA compliance.

the three Systems/Application Domain risks, threats, and vulnerabilities
identified, which one requires a disaster recovery plan and business continuity
plan to maintain continued operations during a catastrophic outage?

data for use of production.

domain represents the greatest risk and uncertainty to an organization?

for the users.

domain requires stringent access controls and encryption for connectivity to
corporate resources from home?

control for accessing the LAN remote access domain should be administered.

domain requires annual security awareness training and employee background
checks for sensitive positions to help mitigate risk from employee sabotage?

User domain.

Which domains need software vulnerability assessments to mitigate risk from software



domain requires AUPs to minimize unnecessary User initiated Internet traffic
and can be monitored and controlled by web content filters?


In which domain do you implement web content filters?


If you implement a wireless LAN (WLAN) to support connectivity for laptops in
the Workstation Domain, which domain does WLAN falls within?

User domain

A bank under Gramm-Leach-Bliley-Act (GLBA) for protecting customer privacy has
just implemented their online banking solution allowing customers to access
their accounts and perform transactions via their computer or PDA device.
Online banking servers and their public Internet hosting would fall within
which domains of security responsibility?

Private corporation
responsibility of ensuring HIPPA private information compliance (Dillon, 2007).

Customers that conduct online banking using their laptop or personal computer
must use HTTPS:, the secure and encrypted version of HTTP: browser
communications. HTTPS:// encrypts webpage data inputs and data through the
public Internet and decrypts that webpage and data once displayed on your
browser. True or False.


Explain how a layered security strategy throughout the 7-domains of a typical
IT infrastructure can help mitigate risk exposure for loss of privacy data or
confidential data from the Systems/Application Domain.

The layered
security strategy ensures that vulnerability is considerably reduced, and there
are control and remedial measures if security breaches occur. These measures
are in line with HIPPA guidelines (Kim & Solomon, 2010).


Dillon, G.
(2007). Principles of Information
Security: Text & Cases. Massachusetts: John &


Kim, D &
Solomon, M. (2010). Fundamentals of
Information security. Massachusetts: Jonnes &


Marketing Business Plan on Tri-Forces Solutions Marketing Proposal best college essay help: best college essay help

Solutions Marketing Proposal


            Every business organization enters
the market with a sole aim of making a profit through the sale of its products
or services. This can only be achieved through an elaborate and extensive
marketing mechanism within the organization. Marketing is a strategy by a corporation
to devise ways that would satisfy the needs or wants of the organization as
well as promoting strategic benefits to its customers (Wood, 2010). The basis
of marketing strategies should focus on satisfying the customer needs before
the production process is streamlined. Here, the phenomenon should be to
predict customer wants, then establishing the market for the identified product
or service, this is important because the strategy will enable the organization
to understand which products or services is required, specific information regarding
the product design, branding, pricing, distribution channels, and disposal
mechanisms. Coca-Cola is a fine example of an organization that has achieved
its prime objectives through an elaborate marketing mechanism (Kotler, 2009). As
such, marketing is a vital part of a business organization because it provides
business for the organization through creating product awareness to the

            The essential of marketing for a
company is to provide vital information about the products and services to the
customers (Kotler, 2012). This vital information includes; the nature of the
product or service, its significance, and where it can be obtained. Thus,
through marketing, customer’s product recognition will enable the company to
boost its revenue through increased sales. Therefore, the initial steps in
constructing a marketing plan is to identify the customers, the target market,
strategies on how the company can reach the target segment and understand what will
satisfy the customers. On the other side, competition has necessitated business
organizations to constantly develop strategies that will make them more desired
in the marketplace (Kotler, 2009). Here, the only possible way of maintaining
competitiveness in the market is through performing occasional marketing
research. This will provide vital information that is required to develop the
innovations that make the organization competitive in the market. Consequently,
a marketing proposal is a document that outlines the activities that an
organization will undertake within a particular period to ensure that it
achieves its objectives (Wood, 2010). This paper is set to develop a marketing
proposal for a security firm that wishes to provide its services to a new


            This particular
marketing proposal will be developed for the Tri-Force
Solutions. This is a service providing company that
deals with providing security services to various institutions. Security is an
integral part of any corporate success to be achieved. Therefore, this is the
major reason the company has decided to venture into the security providing
services. In addition, increased global terrorism and burglary has necessitated
all business organizations to establish security measures to ensure that their
premises are protected from any risk of attack. In this regard, the market for
security services is plenty and it would beneficial for the company to explore
this opportunity.  The essence of
establishing this company is to penetrate the market and become a leader in the
security services market. Most of existing security firms in the market have
failed to satisfy their client needs.  As
such, Tri-Forces Solutions is strategic in achieving a high degree of
professionalism through giving the best services. As a result, the mission of
the company will be to be a leader in offering trained security experts that
will deliver high quality fundamental security needs of our clients. Here, the
mission of the firm will be achieved through observing the basic values and
philosophies developed by the management. This includes accountability, integrity,
transparency, hard work, honesty, and reliability.

            The company will be based in the
UAE, but its head office will remain in the United States of America. The
location of the firm in the UAE is significant because it is a major business
development hub in the world. Most companies and multinational corporations have
entered the UAE market or have established affiliations. In this regard, there
is a huge need for security services. Similarly, the potential of development
activities in the market gives the location a major potential for a security
firm. In addition, many locals are interested to be recruited in the security
firm to be trained.  The product mix of
the organization will be to provide a varied range of security product lines.
Besides providing basic security services to institutions, the company will
also explore other services like; training security personnel, private investigations,
and security sweep that is essential for collections devices.


            Organizations require security services to operate their premises and protect
the company from any unpredictable eventualities. Here, the main role of the
security personnel is to ensure that they protect the entrance, respond to fire
problems, and screen all customers.  These
services can be provided by a contracted company, which sends its personnel to
the company premises to deliver these services.  In the case of the Tri-Force Solutions, its
products are designed to an extent that it becomes different from other
existing firms in the region. Firstly, the service will deal with training,
security professional to undertake the major responsibilities of achieving high
standards of security within their organizations. Here, interested companies
will send their security chief to a training offered by the Tri-Forces Solutions
to boost their knowledge, skills, and experience in security matters. This is a
kind of job training that is not offered by other security firms in similar
business. Secondly, the service will provide contracted security services. Specifically,
the firm will present its qualified security guards to be hired by business
organizations. Here, the hired guards will be responsible for firefighting
within the organizations, operating the entrance for both business
organizations and private homes and offering screening services. Thirdly,
another important aspect of the product is to provide contracted investigation
services. Here, the firm will undertake the responsibility of investigating a
specific inquiry by a concerned business organization. This will ensure using
its up-to-date technology to unravel the answers for any specific questions.
Lastly, the company will provide CCTV services for business organization to
reduce theft through responding to any directed incidence almost immediately.

SWOT analysis


            The main strength in this organization is the ability to offer its
services in a professional way. Professionalism is a major aspect of the
success of security services because it gives the customers a sense of welcome
to the entity. Integrity is a basic fundamental philosophy of the organization
that determines the conduct of all the security guards. More often than not,
most security guards have been involved in acts of burglary in several theft acts;
this is because their services are not enshrined in the philosophy of
integrity. This is strength for Tri-Forces Solutions, because it will develop
its reputation as a well performing company, which is likely to attract more
customers for its services. Secondly, its location in the UAE is a major strength
because there are various business opportunities in the region. Based on the
fact that the region is a leading development hub for many local and
international organizations, the future of the services is good. Also, the
political stability and economic factors in the region makes the location a
conducive atmosphere for security services to thrive.

Strength of the company is its strategic diversification of its products.
For example, offering an on the job training for security chiefs for
organization is a good strategy to ensure that the company establishes a good contact
with the customers. It is obvious that after establishing a good relationship with
the organizations the company will be hired to provide security officers. Similarly,
a range of products will give the company a competitive advantage from other
security firms in the market. Lastly, it is the policy of the firm to use guards
with prior experience in the military and law enforcement entities. This is a
typical strategy to boost professionalism because its employees have experience
and understand their job responsibilities well. Therefore, the quality of the
services will be awesome and up to the expectation of the customer needs.


            The major weakness of the security firm is that it is a foreign organization
that desires to establish a landmark in the UAE. This is a weakness because the
Emiratisation policy requires a substantial number of its managers to be
recruited from the locals. This will limit the benefits of obtaining highly
trained and experienced security personnel from other countries in the world.  Secondly, the firm has diversified its
services to various categories. Although this is a strategy to promote market
competitiveness, it poses a serious weakness for the firm. Here, the
organization lacks a major product focus and this may result in a situation
where the firm does not meet its ultimate goals. In addition, focusing on
recruiting persons with past law enforcing or military experience is a weakness
because it will limit the number of interested security guards to be recruited
into the organization.


            The first opportunity for Tri-Forces Solutions is the growing number of
probable clients and customers. Increased development activities in the region
provide a pool of various targeted clients for this product. For example, increased
construction of schools and hospitals by the UAE government provides bedrock
for future customers. Similarly, globalization and internationalization
establish a scenario where many multi-national corporations will be interested
in opening affiliations in the region thus promoting business.  Secondly, maintaining its head offices in the
US is strategic for the survival of the company. Here, most multinational
corporations entering the UAE market have their head offices also situated in
the same place. As such, it will be easier for the security firm to contract
the top management of these international companies. Consequently, based on the
fact that they both operate in the UAE, it would be easier and possibly for
Tri-Forces Solutions to be contracted to provide services for Multinational
corporations in the UAE.

            Another opportunity for
the organization is that there is security in the region due to stability in
its politics. This will attract many organizations in the area that will require
security services. On the other hand, the decision by the federal government of
the UAE to diversify its economy from depending on oil provides another
opportunity. For example, promoting the hotel and catering industry will
require security guards to protect the new premises. The company through its
diverse security services in the region will tap this opportunity.


            As the region attracts more organizations and companies in the area, other
security firms are attracted as well. 
This poses a threat because new firms will enter the market with a more
novel and competitive strategy than Tri-Forces Solutions. As such, this will
require the company to spend much of its revenue in conducting a market
research to ensure that it remains relevant to the customer needs. Secondly,
international companies will opt to contract the services of well-known security
firms rather than a new entity. This is a threat that can substantially limit
business for this particular company. Thirdly, as the UAE continues to
diversify its economy, more development opportunities are created. As a result,
there will be more employment opportunities for the locals and very few people
will be interested in serving as security guards. Similarly, the presence of
oil in the region has improved the economic growth of many locals and this will
automatically limit the number of recruits willing to serve as security guards.
Lastly, the cultural and governmental policies may hinder the realization of
the company’s objectives. For example, the recruitment policies like the
Emiratisation do not allow the company to recruit the best professionals from
across the globe.


Consumer analysis

            The increasing economic development index for the UAE is a clear
indication that there are a high number of institutions, organization and
business organizations in the region. Secondly, the diverse and cosmopolitan
nature of the regions has the potential of attracting many people from diverse
cultures in the world. Many internationals that come to the region are moved by
the ideals of investing in economic development activities. Another group of
people have been attracted to the UAE for tourism purposes and this had prompted
an increase in the hotel and accommodation services, therefore, the customers
for security services in the UAE have been spread all over the region. For
example, there are many development projects in Dubai, but other tourist
attraction sites attract development in the interior parts of the region. This
particular company has identified specific targets as its customers for the products.
These include; a hospital, universities, shopping malls,
shopping centers, and gated communities. This implies that the customers for
the services will be spread all over the region and they increase every day.  The customer demographics are divided into two
major groups as; institutions and private communities. Institutions are the
major focus, but the private communities also serve an important demography for
increasing the revenues for the firm. The behavior of the customers favors the
services of the organizations. This is because, the two demographics consists
of customers with a diverse culture. Therefore, there is no major obstruction
for the service based on cultural background issues.


            It is important
to develop, market segments for our products to ensure that specific customer needs
are satisfied properly. This firm has established its major market segments as institutions
and private communities. Institutions are the major target segment because it
provides a lot of business for the firm. However, private organizations have an
important role in developing a good relationship with the locals to improve the
positive image of the organization in the region. The criteria that will be
used to explore the segments will be through offering in the job training facilities
for security personnel. Here, companies existing in the UAE will have an
opportunity to extend the experience and competence of its security personnel
through these strategic trainings. This will serve as an opportunity to ensure
that the firm establishes a landmark presence in the region. Similarly, through
the training, the firm will be able to identify what security products or
services are required in this particular market.  The second step in the criteria is to provide
security services to the market gradually, it is important, to introduce
individual product lines at a time because it will give customers a good time
to understand the product and also develop the brand name of the company. Once
all the product lines have been introduced, the company will continue to
explore the customer needs and alter the services accordingly.

Differentiation and positioning

            The firm will have an extensive differentiation and positioning strategy
to ensure that it develops a major competitive advantage in the region. Its
differentiation strategy will promote a security firm that is perceived by the
customers as a company that is owned and managed by disabled veterans and
women. This is specific because most security firms have not recognized women
or disabled persons into their companies. As such, the customers will identify
Tri-Forces Solutions from its unique inclusion of these societal discriminated
groups of people. On the positioning, the firm will base its services for professional
and integrity to achieve a high level of security needs. This will promote the
services of the company because through providing a high level of security
needs more clients will be attracted to be contracted for these services.

Stage of the
product life cycle

            The introduction of this security service will be spread across two years
in the region. The first year will involve undertaking a marketing research
about the needs and wants of the customers. This will be achieved through
contacting security personnel from existing firms to determine what specific
needs are required in the region. Through on job training, the company will strategically
understand the nature of the UAE security market and obtain relevant
information regarding their product. In the second year, the firm will focus on
developing the services in respective on what is required by the customers. Consequently,
in the third year of existence, the company will then embark on providing the
services to the market segments based on the identified demographics.

Marketing mix

Product/ Service

main service for this particular firm is to deliver security solutions to various
institutions and private communities. These services include; training of
security professionals, general security services like gate operating and screening,
fire fighting, CCTV services, and private investigation services. Professional
training will involve improving the skills and competence of already existing
security personnel. General security services will involve providing the firm
has trained security guard to be hired for various business organizations and
private entities. Fire fighting is a component that will be included to those
security guards to ensure that they provide fire safety to the organizations
where they operate. However, in any eventualities, the security guards will act
as firefighters for the organization. The services will be offered under the trademark
Tri-Forces Solutions and they will be delivered to the clients through contract


            The services will be delivered
internationally through its head office in the United States, whereas its
affiliate offices in the UAE will be responsible for all local issues. The channel
of distribution will be throughout the firm to the security guard and finally
to the contracted organization. However, the product will be made available
throughout the whole region of the UAE. In addition, the company will be
responsible for staffing and transportation of its own guards through the
company’s vehicles.


            The pricing
strategy for the firm will be sales oriented because it is a new product in the
market.  In the sales strategy, the firm
will focus on providing its services at a 10% reduced price to the leading security
firms in the region. This will ensure that the firm is able to attract more
customers to its products whilst maintaining a high level of professionalism
and quality of its services. The cost of providing and distributing the service
will be met by the revenue from the company in its initial stages. However,
overhead costs will be shared between the company and its customers. Further,
the company will meet the sales and marketing costs for establishing the product
in the new market. The price and quality of the product will be maintained at a
constant level throughout the product cycle. Whereas the price will be low at
its initial stages to attract more customers, the quality of the services will
be maintained at high levels. This is to ensure that customers obtained the
desired value for the product at a considerably cheaper price.


            The company will
employ personal selling and advertising as promotional strategies for the
service. Personal selling will be attained through creating responsiveness to
the security personnel about the products the firm provides to create awareness.
Advertising will be achieved through the internet, mass media and telemarketing.
This is to ensure that the advertisement is able to reach many people through
different mediums of advertisement. Also, the company will provide sales
promotions through allowing discounts to their service prices. Lastly, in order
to promote the firm to the locals, it will undertake an extensive social corporate
responsibility to the society like environmental cleanup and giving
scholarships to bright students.


            The success of
this marketing proposal will depend on the availability of funds to articulate
a robust marketing research. The budget should focus on allocating funds on
three stages. The first stage involves establishing the firm as a legal entity
in the UAE. Here, the registration fee for a public corporation company will be
required to be met. Secondly, about $ 100 000 should be allocated aside for
training professional activities, a huge amount for this budget vote is
required because it will determine the progress of the company. Through the training,
the company will understand customer wants and needs before allowing their
product into the market. Lastly, the advertising is very essential and it
requires about $ 10 000, this will be distributed for various promotional activities
like advertisements through the radio or television. Lastly, the firm should
have substantial amounts of money to pay its recruited guards and for
maintaining its services in the region.


            In order to
achieve a high level of success, it is important to establish a control
mechanism for the marketing proposal.  A
feedback mechanism is required to monitor the progress of the plan throughout
the product life cycle. The marketing plan will serve as the feedback mechanism
in which the field progress will be evaluated against the formulated success. The
evaluation process will be based on how the firm has been able to achieve a
large customer base for its products. The performance objectives for this plan
include; increased customers, sales revenue, and number of recruited security


Kotler, P. (2009) Principles of Marketing. New
York: Harlow, Pearson Education Limited.

Kotler, P. (2012) Marketing Professional Services. New York: Prentice Hall

Wood, M. (2010) Essential guide to Marketing
Planning, Gosport. New York: Prentice Hall.

Law: What 4 basic elements of the Red Flags Rule must one include in their Identity Theft Prevention Program rice supplement essay help


to “What Compliance Looks Like,” What 4 basic elements of the
Red Flags Rule must one include in their Identity Theft Prevention

program must include any important patterns, activities and actions that could
help in identifying a theft. It must integrate any practices in the field of
business to help in detection of red flags. Thirdly, one must give a response
regarding any of the red flags that could be detected to mitigate as well as to
prevent theft of identities. Lastly, one must go for a program that will always
be upgraded form time to time to incorporate any change concerning risks
related to theft identity.

must comply with the Red Flags Rule?

and other institutions such as savings associations.

is a “financial institution?

It is a bank, or a
savings association without the regards if it maintains an account for transactions
to consumers or does not.

is a “creditor?

creditor is any institution or person that is involved in the process of
payments using credit cards.

is a “covered account?

is an account that is created to meet personal or family needs that require
frequent payments.

are the 5 categories of Common Red Flags?

from people who have fallen as victims, enforcement of the law, changing of
addresses, suspicious documents and receipt of warnings from agencies that deal
with credit.

 What staff members must be trained?

must be trained to maintain security for any data about the firms they work
for, in addition to their confidential information.

the “About Identity Theft” page (located inside the
“Identity Theft” link of the site), list 3 types of
Identity Theft?

Credit freezing to request for credit

Discrepancies of addresses
by a company that reports on credit worthiness of firms and people

A fraud on credit reports

can you do to help fight Identity Theft?

can contact customers directly to ask of their information, avoiding use of new
accounts, using previous account numbers when one needs to get a new one and
monitoring accounts that are covered.

dealing with credit reports, how many consumer reporting companies are
there and what are their phone numbers?

They are two namely; Federal Trade
Commission                                            1-877-FTC-HELP             

                       Ministry of Government and
Consumer Services       1-800-889-9768

Education Essay on History, Politics and Education Paper rice supplement essay help: rice supplement essay help

History, Politics and Education

affects almost every aspect of human development. Education is the means by
which a country can open its potential for economic development, thus, any
effort to improve education levels will transform all aspects of social growth
and development. However, global education has encountered several challenges,
and the main challenge to the global education is the achievement of universal
education. It has not been easy for every individual to acquire long-term
learning experiences in one’s country, as everyone should be prepared to meet
the world’s dynamics through education. It has become a concern that the push
for universal education globally has not gained speed in several countries. The
aim of universal education is to encourage and facilitate systems thinking, and
to assist students to think in that direction (Gehlert, Ressler & Baylon, 2013). This study will focus on how
lack of universal education could affect global education, and how countries
could resolve this challenge to achieve social, political and economic goals.    

Universal Education as a Challenge
to Global Education

systems always tend to generate new sets of challenges once a problem is
resolved. It has never been easy to reduce the dropout rate in some regions, in
addition to ensuring that what the students read is useful in shaping their
future. One of the still killers that are toppling the developing world is lack
of universal education for a considerable number of underprivileged children.
Universal education involves having a singular and widespread education
experience that holds the same expansive purpose for all. Many children,
especially in the developing world, do not go to school, hence, threatening the
millennium goal of universal primary education.

education began in the 16th century in Europe, as people began to
search for the concept of an individual. Although the concept is nowadays taken
for granted, searching for the concept of individual elicited great social and
enlightening waves in the 16th century and began to undercut the
corporate trait of the ancient society. The spread of religion in Europe
encouraged the ideas of educating individuals in schools to encourage a
particular sense of personal conscience, which would enable them to conserve
their souls, and to be loyal to their leaders. In addition, the idea of
creating autonomous individuals, who, because of reason, would comply with
laws, in addition to support public good, led to emergence of universal
education. The fruits of universal education continued to be enjoyed even in
the 20th century, when the universal education was perceived as the
key to address social and economic issues worldwide.

and economic ideas have emerged to promote universal education, unlike when
issues of education were dealt through psychological and social spheres. Human
rights activists perceive universal education as unavoidable for promotion of
social justice, as well as human rights. 
In economic view, universal education was perceived as a form of
developing better workers, as educated workers were punctual, obedient, and
could endure long hours doing tedious jobs. Universal education is likely to
transform the world’s economy, since educated people endeavor to live up to
their expectations.

Lack of Universal Education Could Impact Global Education

education plays a decisive role in molding global education. Global business
environment has termed universal education as a global challenge. The current
number of students studying abroad depicts the need for a global mindset and
culture diversity. The necessity to employ specialized workforce has risen
exponentially, as employers continue to search for individuals who have
undertaken specific training, rather than general training. However, when
children fail to attain at least primary education, the likelihood of having
unskilled workforce is quite high. Lack of universal primary education is a
threat to system thinking, which is essential in making decisions.

in the 21st century, more than 67 million children who have attained
the school age do not attend school throughout the world. If this trend persists,
this number could rise up to 72 million before 2015. The world has already
become a global village, thanks to the current technology, but it will be quite
difficult to embrace globalization when many children, who are expected to be
the future leaders, fail to get the basic universal education. The girl-child
is the most vulnerable due to cultural norms. When girls fail to get education,
they get married at a young age, and may not have adequate knowledge to cater
for their young children. If girls are educated, they are likely to get married
at later age, in addition to having fewer children.

several communities, schools are places where children can find companionship,
have adults to supervise them, access to clean water, as well as enjoy proper
meals. If such societies do not encourage children to attend schools, then the
world would be filled with lonely, ignorant, malnourished, disrespectful, and
unhealthy children. Universal education can assist individuals with life
skills, in addition to enlighten them on how to shun certain diseases. 

to Encourage Universal Education

 Students today require a system thatallow them to develop competencies,
which will train them to survive in a multifaceted world that is socially,
economically, and politically dependent.  In 1966, the international community committed
itself to promote universal primary education, which is in line with the global
call for economic, social, as well as cultural rights. UNICEF is assisting countries
to implement their education policies through funding, as well as getting
involved in decision-making processes that are likely to improve the level of
education in those countries. The world body is working on achieving universal
primary education through promoting gender equality and empowering women, as
equal access to education is the basis for all development goals (Millennium
Development Goals, n.d).

governments should make primary education compulsory and free to encourage poor
children to attend school. They should also invest on new technology to enhance
the level of education in their countries. They should develop systems where
students can access information that connects them to the outside world, in
addition to integrating what they have learnt in their daily activities. Investment
in universal education enables children to develop positive attitude towards
life, and the desired to expand their knowledge is a boost to global education.

Technology Can Resolve the Issue of Universal Education

is a social requirement, and individuals develop wisdom and knowledge from
joining educational institutions. As technology persists in experiencing change,
so is education. Globalization has necessitated individuals to embrace
technology in order to enhance their social and economic relationships with
outside world. Global education systems should take the advantage of the
emerging technology to address the issue of universal education. The
establishment of e-learning in local schools can enhance enrolment of children
in schools. Governments should endeavor to provide children with laptops, or
computers to facilitate their learning, and when the devices are connected to
Internet, children can have a direct access to universal knowledge. The “One
Laptop per Child” initiative has been termed as the most ambitious, as well as popular
education technology initiative that seemed to have a universal agenda of
supporting “technology-enhanced learning” (Selwyn & Facer, 2013, p. 102).
Initially, the cost of laptops could be quite high, but as more companies
engage in providing the laptops, the price would go down.

digital learning should be exploited to encourage students to undertake
self-directed learning, where they are free to create a network of learners
both in local and international level. Tablet computing would enable students
to access textbooks online, in addition to increased portability of study
tools. Digital learning can assist in sharing of ideas freely in a combined
learning environment. As technology continues to saturate educational programs,
trainers should identify the best tools that can be deployed to assist in
educating persons with moderate and severe intellectual disability (Ayres, Mechling & Sansosti, 2013). Mobile
technologies have become quite common in many regions, thus, schools should
take the advantage of this technology to instill life skills to students, since
such skills are likely to assist them in their future endeavors.


Lack of universal education has influenced global
education negatively, as uneducated people do not interact well in the global
level. The millennium development goals may not be achieved if more children
fail to achieve universal primary education, which is the foundation for
collective knowledge. Global business deals require individuals to be
knowledgeable and armed with relevant information. Governments have a
responsibility to ensure that all children who have attained the school-going
age have the opportunity to attain at least primary education by offering free
and compulsory primary education. The government should collaborate with
private companies to instill new technological applications in the education
sector to enhance globalization and, consequently, global education. Mobile
technology should also be enhanced to create a platform for gaining skills
among school-going children and persons with disabilities.


Ayres, K., Mechling, L., & Sansosti, F. J.
(2013). The Use of Mobile Technologies to Assist With Life Skills/Independence
of Students with Moderate/Severe Intellectual Disability and/or Autism Spectrum
Disorders: Considerations for the Future of School Psychology. Psychology In
The Schools, 50(3), 259-271. doi:10.1002/pits.21673

Gehlert, K. M., Ressler, T., & Baylon, D. (2013).
Global challenges demand global education of systems thinking. Human Systems
Management, 32(2), 79-94. doi:10.3233/HSM-120777

Selwyn, N., & In Facer, K. (2013). The politics of education and
technology: Conflicts, controversies, and connections. New York , NY:
Palgrave Macmillan.

Development Goals (n.d). UNICEF, Achieve universal primary education.
Retrieved on 22 September 2014 from

Management Essay Paper on Beyond Charity: Turning the Soup Kitchen Upside Down essay help 123

Beyond Charity: Turning the Soup
Kitchen Upside Down

Allison Aubrey and Dan Charles,
September 20, 2014


This article explains the outcome of charity planned by
Robert Egger in aid of individuals on the streets in Washington, D.C. Egger
embarked on training underprivileged people on the streets, the majority of
whom engaged in substance abuse and got involved in criminal activities, the
means of cooking and getting a food handler’s authorization. Egger’s intention
was to assist these people change from their life of drug abuse and criminal
activities to stable employment in eateries as well as other businesses dealing
with food. In his book, Alexander Moore discusses an account of the way this
dream became a successful social venture.

Moore discusses the way Egger was rebuffed by well-meaning though
unsuccessful attempts to provide for the underprivileged on the streets slightly
before 1990. Moore affirms that charity in the US brought liberation to the
giver but not remedy to the recipient. The DC Central Kitchen founded by Egger
began changing excess and donated foodstuff into meals that are offered to
homeless shelters, as well as other nonprofit organizations. Currently, DC
Central Kitchen is a successful enterprise that provides five-thousand meals
every day to local nonprofits in addition to other five-thousand meals to
learning institutions.

The DC Kitchen trains about eighty individuals every year
with its supplies coming from small, neighboring farms, and its operations have
been emulated by many organizations and encouraged kitchen projects in institutions
of higher education. In this regard, students assist in recovering food that
could be thrown away and make meals for underprivileged individuals.
Nevertheless, the objective has not changed; there is still pushing beyond an
attitude of charity and generating novel means of combating hunger and building
inviolable communities.           

%d bloggers like this: