Featured Post
By using computers in schools, do students become smarter? :: Essays Papers
By utilizing PCs in schools, do understudies become more intelligent? Schools everywhere throughout the world have PCs in their study hal...
Wednesday, March 11, 2020
Desert Storm Intelligence Operation
Desert Storm Intelligence Operation Introduction The Operation Desert Storm occurred in Saudi Arabia between January 1991 and April 1991. This operation has been cited as the reason why the United States defeated the Iraqis in the conflict that was between these warring states. The headquarter offices of the operations were based on the United Statesââ¬â¢ soil.Advertising We will write a custom essay sample on Desert Storm Intelligence Operation specifically for you for only $16.05 $11/page Learn More The operations in US used electronic data that was collected from the battlefield in the form of photographs together with intercepted communication from the Iraqi revolutionaries and their allies. The data was used to predict the enemiesââ¬â¢ moves to intercept their operations before any real damage could occur to the United Statesââ¬â¢ army and citizens back home in the form of planned terrorist attacks. The actions of this off-base headquarters force were felt by the commanders and s oldiers that were on the ground. Their appreciation as well as optimistic perception of this newly proposed and previously untried strategy ushered the use of revolutionized technology in communications, command, and control, not to mention intelligence operations. This paper discusses in comprehensive details the exact application of various technologies in the respective areas of communication, intelligence operations, command, and control. The paper merges this relationship with the overall effect of the respective operations on the Operation Desert Storm. It will then speculate on the effect of the use of otherwise unfriendly technology in terms of the results of the war as well as the strategies that were applied. Besides, it will indicate the downsides of the new technology that was applied in the Desert Storm Operations in the effort to suggest possible solutions to these side effects. Brief Overview of the Operation Desert Storm Soldiers,â⬠¦this morning at 0300, we launc hed Operation DESERT STORM, an offensive campaign that will enforce the United Nationsââ¬â¢ resolutions that Iraq must cease its rape and pillage of its weaker neighbor and withdraw its forces from Kuwaitâ⬠¦Our cause is just! Now you must be the thunder and lightning of Desert Storm (US Navy 1). These moving words form part of the speech that ushered in what has come to be known by the public as the Operation Desert Storm. They were pronounced by General H. Schwarzkopf who was the USA Commander-in-Chief of the US Central Command on 16 January 1991 (US Navy 1).Advertising Looking for essay on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More More than half a million of the United Statesââ¬â¢ nationals, both men and women, were deployed to assist the weaker nation of Kuwait from Iraqââ¬â¢s pillaging. This action was an unprecedented response in terms of magnitude and patriotism especially following the newly ended Tehran skirmishes that had seen to the death of a large number of American soldiers in a botched attempt by the USââ¬â¢ army to free its hostages held in Tehran by Iraqi students and revolutionists. It seemed like a critical point for the United States to reclaim its lost pride to prove to the world that it could indeed interfere with other ââ¬Ëundemocraticââ¬â¢ nationsââ¬â¢ affairs to restore peace and order with the least number of casualties on its side. It is indeed true that there are usually more than just socio-political motivations in every war. This claim turns out to be true for the Desert Storm situation. However, this paper does not address the matter of the causes of war. However, this information may be important in determining the reason why particular strategies were preferred to the more traditional ways of war. However, with such a large army deployed by the United States and an aggregate of an even larger army since other nations such as Britain and Fr ance were also part of the Desert Storm operations, which had been in response to compliance with the United Nationsââ¬â¢ resolution over Iraqââ¬â¢s fate in Kuwait, it was crucial that those involved apply a working and comprehensive system to manage the activities and deployment of various units in the fray. Technology Emerging technologies within the final stages of the 20th century, which is in other words the early 1990s, were a poignant driving force behind the Operations Desert Shield and Desert Storm. Of particular interest to this study and context are the command, control, communications, and intelligence (C3I) systems. All forms of this new technology were being used at all levels and hierarchies of the various army battalions. Through these new inventions, the armed soldiers were much attentive of all friendly cooperation cases of the enemy troops, particularly the Iraqi soldiers and their allies while giving their response in the actual time. They could then plan e ffectively and be ahead of their rival forces.Advertising We will write a custom essay sample on Desert Storm Intelligence Operation specifically for you for only $16.05 $11/page Learn More Based on this emerging transformation in computer expertise, strategies, and measures, the United Statesââ¬â¢ core authority integrated its operations by using the available applications to carry out C3I tasks. These functions included new and more secure telephone unit to pass voice, data, and pictures, and to pass information over a channel or network. They also included in their applications the diverse military and commercial space-based satellite resources, which made the communication infrastructure flat, with the possibility of using the voice over network. These systems together the applications involved replaced the slow and boring systems that were used by then, thus making communication within the military base and with other stations around the world simpl er and very fast. They also included them in their systems. Their operations were modernized by the use of laser and fiber optic signaling systems and a large number of real-time intelligence systems. These systems could think fast and help in making decisions. They could make calculations and/or control bases, with others even sending warnings if they detected them. They were capable of providing correlated and automated information in the image and database form to all military stratifications (House 17). Through the use of these systems, the United State Central base maintained its closed systems as it was known. Therefore, the rival Iraq could not tap in the information. Such rivals received spontaneous attacks, which were a big advantage to the US militaries who were assured of data security and integrity as they could make secret passes into the Iraq bases by the use of their marine. Moreover, they could communicate with the units using fiber optic channels and/or use the sate llite to control the space (Larsen 6).In general, use of emerging technologies by that era gave the US Control Base a greater advantage over the Iraq forces.Advertising Looking for essay on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More As it soon became apparent to the United States Government acting in conjunction with all the other participants that it would require a revolutionized system to deal with its numbers as well as their operations, including communication interception of its enemiesââ¬â¢ correspondence. This strategy led to the adoption and engagement of the C3I system (Boatman 645). On the 17th January 1991, the Operation Desert Storm kicked off with the deployment of 100 TLAMs, abbreviation for Tomahawk Land Attack Missiles that were deployed from bases that were on the ground such as the Persian Gulf, the red sea, and the city of Baghdad. This launching attack effectively cleared more than half of the defense targets by exposing them to land invasion. Moreover, when cease fire was declared from 17th January to April the same year, the various flights that launched these missiles roamed the air by effectively quelling resistance and putting down the enemiesââ¬â¢ opposition to culminate the ove rall use of 288 such missiles. These, as noted above, were deployed from various bases including two nuclear powered submarines and tankers. The United States navy employed a very discreet yet highly effective ambushing agenda where it used the navy jamming aircrafts known as the EA 6Bs to locate and immediately decapitate the enemyââ¬â¢s radars before the mission unit could launch its attack. These aircrafts became so critical both to the United States and to its collaborators whose their availability would be the basis of determining whether a mission was to proceed or not (Abrams 3). As it will become evident with the unfolding of the overall campaign that became the Desert Storm, the naval forces and the Marine Corps played an indispensable role especially in the dispersal of the Iraqisââ¬â¢ defense that was pointed towards the sea and towards the south (Marine Corps Specialty). Most of the Iraqi soldiers that were positioned in the Kuwait city were determined to protect t heir strongholds from both air and water attacks and hence the seaward and southwards oriented defense. However, by the simultaneous and overwhelming missile attacks as well as the ongoing maritime dominance throughout the war, the US and other collaborators were able to largely disperse the enemy as well as any resistance being launched at that level in a very initial yet critical to the strategy stage of the campaign. This approach is one of the reasons for the United Statesââ¬â¢ supremacy in the end. The integration of distributed automated C3 systems made it possible for them to embrace artificial intelligence and be more tactical in their operations. Replacing the manual military operations with more advanced and automated technologies happened in the microprocessor era (Freedman and Karsh 67). During this time, Desert Shield and Desert Storm were the first to sustain largeââ¬âscale joint or coalition military operation. They were also the first to apply the inspiring bu t unique application of PC devices to manage and coordinate the military functions. However, the technology was thoroughly used in automated C31. Some examples and their roles in the operations are discussed below. Command and Control (C2) There was a great change in coordination and exploitation of approximately one-half million males and females with arms, control of road and rail network, and logistic back up around the globe in a restricted amount of time in a tremendously proficient way. This situation was made possible by the implementation of the new systems C31). Innovation and the use of distributed automated systems kept all echelons in synchronization while allowing total flexibility to commanders who could command several units in different sides of the world by passing orders. Operation tactics were tailored significantly, imaginatively, and strikingly to attain presentation heights, which were not projected or automated by the system. During these circumstances, the US Central Command (CENTCOM) was empowered as no other body had ever been prior to this operation to deal with the resultant and new matters that arose from the conflict. It was also adequately supplied with resources and infrastructure to satisfy any demands from the ground (Davis 48). Thus, it was adept to fulfill the objective for which it was formed, namely the peculiar mission to oust Iraq out of Kuwait. The C31 system ran a number of correlated directives that involved the extensive collection, analysis, and subsequent dissemination of data on and from both the coalitions and enemy forces (Schwarzkopf and Petre 376). Computerization The history of computers and the revolution of processors were among the important historically convenient factors that favored the success and feasibility of the Operation Desert Storm (Freedman and Karsh 67). Computers differ in mass, form, and purpose, from the chip central processing units-entrenched martial units to private data support, desktop , cabinet size small workstations, and Van full notebook workstations. All these examples were brought to the desert by the US Marine Corp. They performed a wide range of automated tasks and support functions. These computers were connected using Local Area Network (LAN) and Wide Area Network (WAN), which made it easy to share files and information. They also brought along data integrity, security, and access to information by a special token or password. Information access was also made easier by the use of computers. Besides, real time recovery was made possible in case the information was lost. They also helped with easy navigation and reading of grids. Intelligence and Information Gathering The use of aptitude models to support a martial process was an additional extraordinary use of the contemporary expertise. The integration of assorted complicated ââ¬Å"photo-optical, infrared, and electromagnetic sensors continuously observed Iraqs forces from a variety of platforms, which transmitted their observations in pictures, data, and textual formats to military commanders in the desert and contiguous regionsâ⬠(Desert Shield Para. 12). The information gathered was distributed extensively by means of an assorted class of telecommunications platform to every martial element, together with those at subordinate power rankings, which were then used to arrange assaults or to modify the tactics. The information gathered included detailed graphical information about the enemys forces. Sustaining security road and rail network was only accessible on a restricted root to countrywide control units and chosen rudiments of local, integrated, and particular authority command center personnel. The war in the air began at the Hââ¬âhour still on the seventeenth of January when the designated aircrews and pilots from both the Navy and the Marine Corps launched their crafts into the air in what would soon become the US and affiliate partiesââ¬â¢ dominated skies of I raqi and Kuwait within 43 days (Boyd 51). The aircrafts took off from various runways, with some on the two large amphibian ships, other multiple smaller amphibious ships, and others temporarily setting up bases ashore. The pilots located targets and annihilated enemy troops with little or no casualties on the offensive side since the EA 6Bs would set out before the main flights to survey the area of intended attack to jam the enemiesââ¬â¢ radars in preparation for the imminent attacks. Sea sortie pilots covered the maritime regions as their companions in the corps covered the land areas. It is also noteworthy that the air attack was organized into four phases with the first phaseââ¬â¢s objective being the annihilation of Iraqââ¬â¢s strategic capabilities. The intended time frame for this strategy had been set at ten days. However, it was completely discharged in seven days. Phase two was to focus on Kuwaitââ¬â¢s Theatre of Operations while phase three was aimed at aidin g the efforts that had so far been concentrated in phases one and two. Moreover, it was also intended to focus on the Kuwait based field army. Finally, phase four was intended to cover the ground operations of the US army as well as the collaborative forces. In other words, the intention of phase four was to offer reinforcement (United States Congress 3). So far, within the 0300 hours according to the Persian Gulf time, the Tomahawk Land Attack missiles were already being hurled. In addition, the various aircrafts from six aircraft carriers were flying in the air, creating quite the display in terms of the launch of offensive combat. Subsequently, since Iraqââ¬â¢s critical radar areas had already been leveled by navy EA 6B prowlers, army aircraft poured in and began to bomb the Iraq strongholds for missile, nuclear, biological, and chemical warfare weapon stations. The Iraqisââ¬â¢ critical radar sites had since been annihilated by the anti radiation missiles, also known as HAR M (Bruger 75). During the war, due to the highly advanced airplanes that were being used by both the United states and the allies of the United Nations, in most instances, when the Iraqi pilots spotted an American FA 18 multipurpose aircraft, they usually reacted by turning and fleeing (Medical Mobilization Planning and Execution 23). They Iraqis either went underground to regroup or they went to Iran, which acted as a haven. The FA 18 is a new warfare machine that is capable of multitasking. Whereas it may be a mission to attack the Iraq airfield when it spots another enemyââ¬â¢s aircraft, it can change the mission to deal with the new threats before proceeding to carry out the originally intended task. Thus, the war with the Iraqis was staged on air by the United States among others of the coalition (Burke 54). The war also took place at the water level, with a large number of battleships taking the front of the severed coasts that had completely handicapped Iraqââ¬â¢s econo mic standing. Its economy was suffering greatly when the battleship USS Wisconsin arrived at the Persian Gulf to support other battleships that had already arrived there five months prior when the Operation Desert Shield had been underway. This operation of January 1991 had given way to the Operation Desert Storm. The battleships were responsible for the launch of Tomahawk land Attack Missiles since these missiles were launched off the ships. Additionally, the ships had up to 16 guns for defense from any form of enemy approach or attack during missile launch. Amphibious ships that could convert from another level into battleships and submarines while retaining the option of being used as aircraft carriers were also applied to this war. The damage that was caused by both the United States and its allies in the process of reclaiming Kuwait from Iraq is unprecedented. Perhaps it gave the entire world an idea of what its foes would be up against in the event of a third world war. The in itial stages of the attack were punctuated by bomb explosions whereas the citizens in Kuwait and Iraq reported not seeing any aircrafts. This observation was because the bombs were being dropped by the TLAM missiles as well as F I 17 stealth bombers that were neither seen nor heard as they approached. This situation was based on their build up technology that allows for great accuracy and precision in terms of aiming from long distances off and aerial bases (Crowder 38). The United States together with its allies that were engaging in this war with Iraq noted that their targets aimed at Iraqi revolutionaries as well as other combatant enemies as opposed to civilians and residents of either Kuwait or Iraq. However, regardless of the targeted forces, it is nearly impossible to launch an attack and have no casualties. Therefore, in reporting, quite a healthy portion of civilians are included in the number of casualties of war. Some limitations came with the operationââ¬â¢s quantity of the descriptions formed by both the countrywide and macrobiotic methods. However, the descriptions were more or less devastating. The broadcasting of the described data to the operation military of each unit needed extremely incorporated telecommunication gadgets relative to the ones that worked well with other modes of information transfer. Nevertheless, upon applying the use of military and commercial communication satellites, they managed to pass the needed information to the designated level much faster (Burke 86). However, as the Desert Shield informs, ââ¬Å"The capabilities initiated in this operation were only a beginning to improvements for subsequent and future national security operations, thus greatly increasing the efficiency of imagery information exchange among all components and echelonsâ⬠(Para. 13). In the midst of the chances acknowledged by the use of current information expertise were widespread set of connections/varying direction-finding gadgets to rea ct to the predicted pressure to the sustaining communication networks. Analogous coercion to Iraqs information network symbolizes a momentous stride towards information processing models and plans, which kept on advancing all over the decade. Besides, even if there were many different systems used to capture images in different units or the task was executed by an agent within the US government, more effort had to be implemented to make sure that all other stations could receive meaningful information from the image sent and that they could make a meaningful and accurate decision. In addition, some tasks were commandeered by the ââ¬Å"Sponsored Intelligence Communication Architecture (INCA) some months prior to the onset of the operations brought about by the National Imagery Transmission Format (NITF) standardsâ⬠(Boatman 645). These standards ensured that media images could be seen in different devices and that they could be transferred and be available for the different use rs across the word. The standards worked well for them during that era, although they required a more advanced and integrated telecommunication system and infrastructures, which limited their productivity by that dayââ¬â¢s standards and needs. The transmission of images and media-related files made the operation successful. The most and remarkable technology to recognize during this era was the strategic utilization of countrywide potential, otherwise referred to as the TENCAP agenda (Gordon and Trainor 4). The technology came up with highly integrated systems that were capable of sharing media file systems especially multiple images across various stations in the battlefield. Surveillance and Investigation Part of the military machine that denotes the Operation Desert Storm was the protection support plan and dual observation and follow-up radar strategies. These technologies formed a critical element of the Operation Desert Storm since they came in handy when it was necessary t o maintain supervision over the enemies. Therefore, they made up for the gap of monitoring. Through this technology, they could locate the enemies approaching their military bases and take the necessary actions (Glenn 45). Communication Systems The use of telecommunication in military bases and/or in their operations was boosted by the use of satellite and voice over network. Information could be sent via data packets. The needed training and command could be given from any source (Glenn 45). They used the public telephone services to do their communications. Therefore, the data and information passed could not be hacked or tapped by public. Large and enormous facilities were deployed to develop the martial and business management and communication devices, which were given a back up by the administration of the United States. They also incorporated the transmission of the multimedia files exchange. As a result, the US army and the alliance soldiers could give immediate and updated information during their operations. The speed of delivery was improved, with the loading of images and the system requirements for portable devices being enhanced, thus increasing the availability of information and quick decision-making procedures. Packet Switched Networking Finally, packet switching made up for a most critical technological advancement during this era of the operation. They installed defense networks in the battlefield, which made it easy for data or information to be sent as packets. The existence of the microprocessor and the flat network infrastructure enhance this progress, thus allowing data to be sent faster and with a less cost. The more advanced multimedia files such as video clips could be sent using this medium. The technology supported teleconference. The deployment of this technology resulted in the development of standards of communications across the network. It has grown to today. In fact, it is the most used across the world. Consequently, it beco mes apparent that although the technological revolution in this day and age facilitated the victory of the United States over the Iraq enemies inclusive of its allies, the technological shortcomings of the day also largely underestimated the successes of the technological genius. Perhaps it is possible upon looking back through the annals of history to suggest modern solutions that were both undiscovered and unrevealed at the time by the respective army commanders. Therefore, a postulation of probable solutions ought to be approached from the perspective of a 1990 commander dealing with intelligence in a 1990 capacitated computer machine. This finding further complicates the recommendation making process. It can perhaps form a possible field of study for future analysts. LAN-WAN Internetworking The integration of the Local Area Network and the WAN was used in this operation. It merged the databases in the US Central Unit and the battlefields. The information access and the responses to the pressing and urgent matters were made easier (Burke 44). Information about the enemies and the type of weapons they used could be captured and stored on the central database and then be accessed by the commanding officers in the different units across the world. This technology made reporting easier, convenient, and orderly kept besides improving efficiency in information delivery. Conclusion The US and other collaborators in the enforcement of the UN resolution requiring Iraq to vacate Kuwait carried out an unprecedented application of strategy and warfare systems that could not have otherwise prevailed were it not for the heavy computerization of the systems. The technology that was applied in this minor clash did not have limitations on its scope that one would expect in a situation that was not outright war, but more of a minor fray. The effects of the use of this high level of technology were the capturing of the world nationsââ¬â¢ awe in this situation, as they all experienced the advanced warfare machines deployed by the US, Britain, France, and other nations. However, it was also apparent that these war systems may have operated better if there were better communication channels between the ground and the off-base headquarters at the United States CENTCOM. Communication is a critical requirement for one to win any war. Moreover, confidentiality of the same cannot be overemphasized especially considering that interceptability of the Iraq communication channels probably led to their defeat, which was further compounded when their critical and other radar sites were bombed down before the launch of a major attack on their strongholds. Keeping them in the dark disoriented the sync that is critical to the process of devising a winning strategy by any team in any war. The same situation could be replicated for any formidable opponent. Regardless of the capacity of their armory, upon the disorientation of communication, it becomes impossible to coo rdinate efforts necessary to win the battle. Abrams, Creighton. Field Artillery Desert Facts. Field Artillery Journal 10.2(1991): 2-3. Print. Boatman, John. UK Revises Artillery Tactics. International Defense Review 25.7(1992): 645-646. Print. Boyd, Morris. Focusing Combat Power The Role of the Field Artillery Brigade (42d Field Artillery Brigade) in Desert Storm. Field Artillery Journal 2.6(1992): 46-52. Print. Bruger, Steven. Not Ready for the First Space War: What about the Second?. Naval War-College Review 1.1(1995): 75-76. Print. Burke, Joseph. Medical Support for U.S. Marine Corps Armored Battalion: Problems Encountered During Operation Desert Shield/Storm/Cease Fire, and Some of Their Solutions. Maine: Uniformed Services University of the Health Sciences, 1992. Print. Crowder, Wether. Platoon-Based Firing Battery Operations. Field Artillery Journal 4.8(1991): 35-39. Print. Davis, Thomas. Reflection on the Storm: FA Vector for the Future. Field Artillery Journal 8.9(1993): 4 4-49. Print. Desert Shield. Command, Control, Communications and Intelligence Systems In Operation Desert Shield/Storm, n.d. Web. http://ronaldelliott.com/desstrm.html Freedman, Lawrence, and Ephraim Karsh. The Gulf Conflict, 1990ââ¬â1991: Diplomacy and War in the New World Order. Princeton: Princeton University Press, 1993. Print. Gordon, Michael, and Bernard Trainor. The Generalsââ¬â¢ War: The Inside Story of the Conflict in the Gulf. Boston: Little, Brown and Company, 1995. Print. House, John. Lessons from the Battlekings (3d Battalion, 41st Field Artillery) in the Desert. Field Artillery Journal 28.10(1991): 16 -21. Print. Larsen, Henry. 38 Artillery Tactics: Before, During, and After Operation Desert Storm. Fort Leavenworth, Kansas: University of Oklahoma, Schwarzkopf, Oklahoma, 1982. Print. Medical Mobilization Planning and Execution. U.S. Department of Defense Inspector General Report 93-INS-13: Operation Desert Storm: Full Army Medical Capability Not Achieved. London: U.S. General Accounting Office Publication GAO/NS1AD-92-175, n.d. Print. Schwarzkopf, Norman, and Peter Petre. It Doesnââ¬â¢t Take a Hero. New York: Bantam, 1992. 376. United States Congress. House. Committee on Armed Services. Oversight and Investigations Subcommittee. Intelligence successes and failures in Operations Desert Shield/Storm. Pennsylvania: U.S. Government Printing Office, 2010. Print. US Navy. Naval History and Heritage Command, 2008. Web.
Sunday, February 23, 2020
International marketing Essay Example | Topics and Well Written Essays - 3500 words
International marketing - Essay Example The assignment delineates from different perspectives how information technology and systems has changed the demeanour of marketing across nations, in the global arena. The paper emphasises the fact how IT has influenced marketing from strategic planning, execution and evaluation of marketing programs to decision making; information technology has brought about drastic implications for marketing personnel, specifically for those operating internationally. The assignment also discusses the trickledown consequences of the IT assimilation with the marketing function and how it has in fact distinctly changed the way products are manufactured, marketed and distributed internationally; it has radically transformed how brands are built in a global scale and has also determined new grounds for creating long lasting and loyal end-user customer and organisational relationships in the international dome. Importance of Information for Marketing Sooner than discussing the importance of informatio n and technology systems in marketing, it is important to first consider what an information system actually is and why it is so crucial for marketing. Marketing in general, is all about gaining information over the existing and emerging needs of the consumers that comprise the market, doing research and devising strategic plans for accumulating resources for execution of plans, production of required products, promotion and publicity, distribution of the same to ensure availability of goods and services to the market which eventually satisfies those prevailing consumer needs. Briefly marketing is that only vital business function that provides organisations the platform to get to know to and interact with the end user customers and consumers. So, marketing would be an incomplete extravagant effort without prompt, precise and continuous information flow about the market. Therefore, an information system is the part and parcel of marketing function and activities. An information syst em on the other hand is an organised automated program that assures timely, precise and incessant flow of information for managerial use. So, the contemporary organisations are increasingly incorporating information systems and technologies with marketing to make the most of their IT investments and marketing proficiencies for gaining command over the market needs. As a result of which diverse marketing information systems are being successfully established and executed by both local and international organisations (Doole and Lowe, 2008). Philip Kotler, the guru of marketing, considers that an integrated marketing information system is over and above a mere system of collection of data and is beyond any set of information technology or systems; a marketing information system is an enduring and cooperating structure of people, paraphernalia and procedures to draw together, arrange, study, evaluate, and disseminate relevant, timely and precise information for use by
Friday, February 7, 2020
How is academic performance affected by mood stabilizing medication on Research Paper
How is academic performance affected by mood stabilizing medication on school children - Research Paper Example The range of disorders that mood stabilizers can be used to treat include bipolar disorder 1, bipolar disorder 2, cyclothymia, schizoaffective disorder, intermittent explosive disorder, any medical condition in which mania is a symptom (such as stroke, cancer, temporal lobe syndrome), recurrent depression as a prophylaxis, etc (Jacobson, 2001). Bipolar disorder is often seen in children suffering from ADHD, along with several other co-morbid conditions. Mood stabilizers are used to treat several disorders in which aggression, agitation and impulsivity are symptoms. Aggressive behavior is common in several other disorders such as conduct disorders, mood disorders, psychotic disorders, mental retardation, deliriums and dementia. Along with agitation, the child may also have accompanying psychosis, mood changes, anxiety, and insomnia. However, mood stabilizers have a range of positive and negative effects, and a lot of consideration is given to the effect of the drug over the academic p erformance of the child (Kane, 2004). In this paper, 10 handpicked studies from various databases including Cochrane, Pubmed, BMJ and Google Scholar were being analyzed for findings regarding the effect of mood stabilizers on the academic performance of school children. Taken into consideration were the impact of the disease itself, and the course of the disease with respect to the academic performance when treated or untreated with mood stabilizers. Though there are a number of effects of mood stabilizers on the academic performance, they are vital for effective management of the disease, and the treatment of such children has to be carefully evaluated. Body The first paper that is being reviewed is by Smarty and Findling 2007, in which they conducted a review of the psychopharmacology of a pediatric bipolar disorder. According to the researchers, the disorder itself is debilitating to the child and may have long-term and short-term implications in the school, home or in social settings, and can also affect the academic performance of the child. Besides several other disorders such as ADHD, OPP, substance abuse and conduct disorders can affect Bipolar disorder, which in turn can affect the effectiveness of the treatment of bipolar disorder. This is an important point to be taken into consideration whilst assessing the overall effectiveness of the drugs belonging to the mood stabilizers group. The authors conducted a Medline search over the articles published between 1995 and 2006 for treatment practices for bipolar disorders. The study found that lithium, anticonvulsants and antipsychotics were equally beneficial in the treatment of the mania phase bipolar disorders in youth, though data was lacking with the depressive phase of the disorder. Data even suggested that combination therapy was better than monotherapy especially in the maniac or mixed phases. Besides, many studies did not present much information on the treatment of cormobidities and relapses with the disease. The study in general sugg ested treatment of cormobidities and relapses using evidence-based guidelines, as these could affect the academ
Wednesday, January 29, 2020
Chaebols vs. Keiritsu Essay Example for Free
Chaebols vs. Keiritsu Essay The essay below talks about two major business organisations of Korean Chaebols and Japanese Keiretsus. It will be discussed the differences and commonalities of Keiretsus and Chaebol; the structure, history, and how the business is run by each organisation. Also, it talks about these two business organisations after the 1997-1998 Asian Financial Crisis. How did Chaebols and Keiretsus change its management style to overcome the bankruptcy and still keep the traditional way of management. And as a conclusion
Tuesday, January 21, 2020
Essay --
Book Review of January by: Elizabeth Nguyen 8B ââ¬Å"Henry Fordâ⬠by Regina Z. Kelly is a non-fiction biography, which follows the life of a clever man born in a town called Greenfield Township, Michigan. This book revolves around Henryââ¬â¢s personal life, his successes, and the problems he faced. Henry was born on July 30, 1863. Over the years, Henry always had a small talent creating and fixing devices. Although he was never the best at literature, he usually found an interest in mechanical things as he grew up. He detested farming, but loved how mechanics worked. In 1879, he decided that he wanted to go work in a mechanic shop in Detroit. He started in the Michigan Car Company, and as the years passed he worked at others, like the Edison Illuminating Company, ran by Thomas Edison. On New Yearââ¬â¢s Eve in 1885, Henry met an eighteen year old girl named Clara Bryant, who he soon married three years later. Clara was one of the key people in this book, by being a great supporter to his ideas, even if they seemed unbelievable. Especially the one about the ââ¬Å"horseless carriage.â⬠It was an idea that Henry had thought of. He wanted to create an automobile that wasnââ¬â¢t dependant on horses but rather something better. He soon began to undertake experiments to tr y to create his first automobile. When he personally met Thomas Edison, he gained his approval of Henryââ¬â¢s first automobile he made, and from that day, they grew a strong relationship with each other. They always supported and spent quality time with each other. After resigning from the Edison Illuminating Company in August 15, 1899, The Ford Motor Company was incorporated in 1903 with him and along with others. The Fo... ...gh man who was an executive of the business. Not many people liked him; Henry was only one of his close friends. For me, I would recommend this to other people only under a few circumstances. I find that biographies wouldnââ¬â¢t be a first choice for me, since Iââ¬â¢m not really fond with them, unless itââ¬â¢s anyone I find intriguing. Yet, some people may be up for this type of bookà ¬Ã¢â¬â personal preference right? Ideally, the ones who enjoy biographies that tell the experiences of people who made an impact on the world would like this. But also, anyone whoââ¬â¢s inspired to be a mechanic or a business person would enjoy this book, as they can get an idea of what might be happening in a business environment. Lastly, people ages ten and up will be able to read this book. Any person younger than that may not be able to understand the vocabulary and the main purpose of this biography.
Sunday, January 12, 2020
Is Generation Y Unemployed or Just Lazy
Is Generation Y Unemployed or Just Lazy? In recent years, Generation Y is particularly underemployed in the United States. Some people consider sluggish economy as an important reason for Generation Y unemployed. Other said the most important reason is Generation Y is extreme laziness ââ¬â despite the opportunities that await them. I agree with the second point. In my opinion, Generation Y just lazy, they donââ¬â¢t want to spend a lot of time to work. They are making a choice to work at companies that pay less but offer them that more free time.Although they have bachelorââ¬â¢s degree, they prefer to work in retail jobs. This may be due to their attributes, working attitude and government compensation. The first reason that leads to Generation Y lazy can be Generation Yââ¬â¢s attribute. ââ¬Å"We can learn Generation Y does assign different levels of importance and partially assigns different levels of happiness to the five motivational factors examined in this study: re sponsibilities, compensation, work environment, advancement potential, and free time.This study represents the first attempt to explore motivational factors for the Generation Y workforce within the federal governmentâ⬠(Barford). Depend on my research, I learned Generation Yââ¬â¢s responsibility is least, and free time is the most important for Generation Y. They are making a choice to work at companies that pay less but offer them that more free time. Generation Yââ¬â¢s attributes showed us that they have less responsibility for company and they would like get more free time. In other word, they donââ¬â¢t spend a lot of time to work.Second, underemployed due to Generation Yââ¬â¢s working attitude. We can learn the best-paid jobs with companies ranked high among Generation Y are all in science and technology, the survey shows. Google, Intel and Microsoft are all among the top five best companies for Gen Y, ranked based on average pay for Millennial working there, jo b satisfaction and flexible schedules, among other things. At the same time, it's most common for Gen Y to work for small companies of 100 employees or lessâ⬠(Hadley). We can learn Generation Y prefer to flexible schedules and chose small companies.They most likely to hold low-paying jobs in retail, so that degree is not important for them. They donââ¬â¢t want to study in high school or university because they can find a job without degree. On the other hand, Internet is very important for Generation Y. In fact more than half of Gen Y workers ââ¬Å"will not accept a job that bans social media. â⬠This report demonstrates that to Gen Y, they ââ¬Å"consider the internet to be as important as air, water, food, and shelter and will choose a lower paying job in order to be able use it ââ¬â especially in lieu of doing any actual work.Because Generation Y is lazy, they are not employed in large numbers inside Americaââ¬â¢s biggest companies. This is Generation Yââ¬â ¢s working attitude that is one of reason of lazy. The government compensation effects on unemployment, which stimulate unemployment people, are lazy to seeking job. The government unemployment compensation is likely to have increased the average rate of unemployment. ââ¬Å"Our current system of unemployment compensation has two distinct but related bad incentives. The first one for those who are employed, it reduces and eliminated the cost of increasing the period of unemployment.The second effect for more unsteady work, it raises net wage to the employee relative to the cost to the employer. ââ¬Å"(Feldstein ;amp; Martin, p 39). According to these two effects of unemployment compensation, it stimulates the people who are lazy to seeking job. The government unemployment entitlement gives guarantee for the people who are lose job or seeking job, however, this overprotected politics cases extreme laziness to underemployment to find job. In conclusion, I agree with this point that Generation Y is just lazy. This may be due to their attributes, working attitude and government compensation.Actually, Generation Y can improve their life quality, if they are not lazy. They have ability to get good degree and find a good job. Works Cited Barford, Ian N and Hester, Defense Acquisition Research Journal: A Publication of the Defense Acquisition University; Jan/Feb2011, Vol. 18 Issue 1, p63-80, 18p, 2 Color Photographs, 5 Graphs Hadley Malcolm, Gen Y most likely to hold low-paying jobs in retail, USA Today, 07347456, AUG 22, 2012. Feldstein ;amp; Martin. Unemployment compensation: its effect on unemployment. Monthly Labor Review; Mar76, Vol. 99 Issue 3, p39, 3p.
Saturday, January 4, 2020
Has Globalization Reinforced or Undermined the Legitimacy...
Has Globalization reinforced or undermined the legitimacy of the nation-state? Globalisation is a phenomenon that has been increasingly used in the lexicon since the latter half of the 1980ââ¬â¢s, achieving widespread and common currency amongst politicians, political analysts, academics, economists, the media, business, trade and finance. The term has become synonymous with the ââ¬Å"global villageâ⬠concept, where nations and states are drawn closer together; where economic, political and cultural spheres extend across the worldââ¬â¢s major regions and continents. A world where development in one part of the globe will impact life in another part of the globe. The polemic surrounding the process of globalization has hitherto been a highlyâ⬠¦show more contentâ⬠¦Exclusive control meant an end to sharing joint sovereignty with other states, pertaining to their respective domestic jurisdictions. In the nineteenth and twentieth centuries, as states transformed into nation-states, the Westphalian system came to be regarded as the international system. Therefore with the advent of international relations between states and globalization, it becomes immediately obvious that the Westphalian system is obsolete, although the state survives in a more advanced and robust form. The concept of sovereignty originally intended to establish order within a state at the Peace of Westphalia, has been interpreted as legally, placing the state above the authority of all external laws. However in the real world today, international, political, judicial and practical obligations of states in the international system, such as becoming signatory to an international treaty, or when states are bound to abide by customary international law, the criteria of sovereignty as it was originally conceived in the Seventeenth Century is no longer is tenable. However it is testament to the resilience of sovereignty, that it persists in the age of globalization and manifests in the stateââ¬â¢s functions and exercise of domestic law and maintainingShow MoreRelatedThe International Monetary Fund ( Imf ) Essay2250 Words à |à 9 Pagescountries that make up the global membership of the organization. These goals make up the IMFs formal rules, the informal rules allow more access for powerful countries, such as the United States and Germany, to set their foreign policy goals through the facade of the IMF. The United States and other powerful nations like Germany, operate on a constraint conditionality that allows them to influence countries based upon their Western ideals and practices of democracy. The IMF requires certain qualificationsRead More3. Counter-Terrorism Strategies Reveal the Limits of Human Rights as a Cosmopolitan Discourse in the Age of Global Terror. Discuss.3315 Words à |à 14 Pagesthrough this that human rights were able to be changed and recognised as a standard for global order, regulated through international law. The act of terrorism is not a new concept, and has been responsible for many innocent lives over many years, however not until the attacks on the United States, known as 9/11, has terrorism become such a globalized issue. It was through the symbolic destruction of capitalism, coupled with the vast media outlets to create witnesses that allowed for Western societyRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words à |à 656 PagesD421.E77 2010 909.82ââ¬âdc22 2009052961 The paper used in this publication meets the requirements of the American National Standard for Information Sciencesââ¬âPermanence of Paper for Printed Library Materials, ANSI Z39.48-1992 Printed in the United States of America 2 4 6 8 9 7 5 3 1 C ONTENTS Introduction Michael Adas 1 1 World Migration in the Long Twentieth Century â⬠¢ Jose C. Moya and Adam McKeown 9 â⬠¢ 2 Twentieth-Century Urbanization: In Search of an Urban Paradigm forRead MoreDubais Political and Economic Development: Essay38738 Words à |à 155 Pagesand Historical Background Dubais Development History I1 PI1 Explaining Dubai9sDevelopment Outcome Why Not Other Gulf States? Dubai versus the Development Literature IV Dubai in a Cornparatbe Corntext Saudi Arabia Qatar Brunei Conclusion Appendix Bibliography Introduction Dubai, a tiny, oil-exporting city-state located in the Persian Gulf, has recently undergone a remarkable transformation. As a member of a federation of small Arab, Islamic monarchies known as the UnitedRead MoreOrganisational Theory230255 Words à |à 922 PagesUniversity, UK McAuley et al. provide a highly readable account of ideas, perspectives and practices of organization. By thoroughly explaining, analyzing and exploring organization theory the book increases the understanding of a field that in recent years has become ever more fragmented. Organization theory is central to managing, organizing and reflecting on both formal and informal structures, and in this respect you will find this book timely, interesting and valuable. Peter Holdt Christensen, AssociateRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words à |à 1573 PagesOrganizational Behavior This page intentionally left blank Organizational Behavior EDITION 15 Stephen P. Robbins ââ¬âSan Diego State University Timothy A. Judge ââ¬âUniversity of Notre Dame i3iEi35Bj! Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editorial Director: Sally Yagan Director of Editorial Services:Read MoreManagement Course: MbaâËâ10 General Management215330 Words à |à 862 PagesReedâËâLajoux and others . . . This book was printed on recycled paper. Management http://www.mhhe.com/primis/online/ Copyright à ©2005 by The McGrawâËâHill Companies, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without prior written permission of the publisher. This McGrawâËâHillRead MoreContemporary Issues in Management Accounting211377 Words à |à 846 PagesFrance Greece Guatemala Hungary Italy Japan Poland Portugal Singapore South Korea Switzerland Thailand Turkey Ukraine Vietnam Oxford is a registered trade mark of Oxford University Press in the UK and in certain other countries Published in the United States by Oxford University Press Inc., New York ß Oxford University Press 2006 The moral rights of the author have been asserted Database right Oxford University Press (maker) First published 2006 All rights reserved. No part of this publication may beRead More Developing Management Skills404131 Words à |à 1617 Pagestextbook appear on appropriate page within text. Copyright à © 2011, 2007, 2005, 2002, 1998 Pearson Education, Inc., publishing as Prentice Hall, One Lake Street, Upper Saddle River, New Jersey 07458. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical,
Subscribe to:
Posts (Atom)