Legal and Ethical Conduct Essay Paper

Legal and Ethical Conduct
             Legal and Ethical Conduct

Legal and Ethical Conduct

Order Instructions:

This is a discussion post. There is a video that pertains to this paper. I will record it and send it through an e -mail. We also have to include a nurse practice act from the state we live. I live in Texas. Thank you. If you have any questions, please don’t hesitate to call at 973-842-5512.

SAMPLE ANSWER

Legal and Ethical Conduct

The American Nurses Association (ANA) through its code of ethics recognizes the need for patient confidentiality by the nurses. It insists in the nurse’s responsibility for maintaining the confidentiality of all the information about the patient regardless of it being personal or clinical. The information should be kept a secret in the work setting or any other form of digital communications like the social media (Olson, 2016). Confidentiality and privacy form the basic components of human rights in our society. Safeguarding this right with concerns on the individual’s personal information on health records is not only an ethical but also a legal obligation required out of the health care providers. Doing so in today’s generation, however, is very tricky.  Considering the scenario of Lena, she is faced with two critical decisions that are hard to make. After finding out that her sister’s boyfriend is HIV positive, her considerations would be two: 1. Go against the Health Insurance Portability and Insurance Act (HIPPA) that insists on patient confidentiality and save her sister from the situation through disclosing the information to her or uphold the patient confidentiality and avoid disclosing the information to her sister. Personally, the latter will take precedence (McGraw, 2013).

Upholding patient confidentiality is a sacred trust accorded to every nurse and thus taking a hard decision like the one above is mandatory. As clearly presented in the ANA’s Code of Ethics, the nurse should strive to advocate an environment that gives enough physical privacy to the patient needs as well as the auditory privacy. The maintenance of the patient confidentiality goes a long way in impacting the patients’ recovery as well as his/ her perspective towards the medical complication. The connection and the relationship that will exist between a nurse and a client will surely be dictated by whether the nurse upholds the privacy of the patient or not.  According to the ANA code of ethics, the nurse is given a role in advocating, promoting and strive to protect the rights of the patient regardless of the situation at hand (Lachman, 2015).

According to the College of Registered Nurses in Colombia, the nurses are provided with an ethical obligation to safeguard the information that they receive in the context of the client-nurse relationship. This is because the clients disclose such information with confidence that it will not fall into the hands of wrong people. The possibility of a patient coming back for further consultations with regard to a new or previous complication is dictated by the nurses’ ability to keep the previous conversation a secret. The nurses are required to store the patient’s records in secure places taking great care when the information is being moved to various places; it also requires that the during electronic transfer of information, secure measures should be employed such as not using the client names or fax number (Bamford, 2013). Ensuring that the computer monitor displaying sensitive patient information is not left unattended to is also another security measure. In situations where a nurse is tempted to disclose information, then she must first find the consent of the patient with the best alternative being that the nurse encourages the patient to disclose the information alone. If I were Lena therefore, I would dedicate quality time to convincing my sister’s boyfriend to disclose the information about his HIV status in order to ensure that the life of my sister is safeguarded.

References

Bamford, M., Wong, C. A., & Laschinger, H. (2013). The influence of authentic leadership and areas of worklife on work engagement of registered nurses. Journal of nursing management21(3), 529-540.

Lachman, V. D., Swanson, E. O., & Winland-Brown, J. (2015). The new ‘Code of Ethics for Nurses With Interpretive Statements’(2015): practical clinical application, part II. MedSurg Nursing24(5), 363-368.

McGraw, D. (2013). Building public trust in uses of Health Insurance Portability and Accountability Act de-identified data. Journal of the American Medical Informatics Association20(1), 29-34.

Olson, L. L., & Stokes, F. (2016). The ANA Code of Ethics for Nurses With Interpretive Statements: Resource for Nursing Regulation. Journal of Nursing Regulation7(2), 9-20.

We can write this or a similar paper for you! Simply fill the order form!

Knowledge Transfer Mechanism in the Multinational Enterprise Network

Knowledge Transfer Mechanism in the Multinational Enterprise Network
Knowledge Transfer Mechanism in the Multinational Enterprise Network

Knowledge Transfer Mechanism in the Multinational Enterprise Network

Order Instructions:

It should be critical Literature Review, NOT an essay

In introduction: we should focus on background of knowledge and ways of transferring it.
In main body: how multinational knowledge subsid (including types of subsiding). Include different ways of mechanism in multinational enterprise and subsidiary. How they transfer to subsidiaries?
Main focus only on how they transfer to subsidiaries.
and then conclusion, evaluation etc.

Please, see attached documents(it includes some articles), especially have a look on PPT, as it include some important information and some references which should be used.
Please, DONT use more then 60 references (90-95% of them should be up to date).

Marking criteria:
Clearly recognize and define a problem
Discover the evidence and build findings
Draw conclusion
Evaluate and communicate the conclusions

SAMPLE ANSWER

Knowledge Transfer Mechanism in the Multinational

Enterprise Network

  1. Introduction

Knowledge sharing may be a two-way method. It is a vehicle for trust, regard, and change. This critique has incontestible information sharing even within competitive specialty units will produce associate whip hand associate association is associate aggregation of data. information drove cooperative approach offers several advantages: it’ll propel the organization, attract workers in the slightest degree levels, and absolutely have an effect on “all that basically matters”. information administration separated the close web {site} from different company auxiliaries with the neighborhood site illustrating “best in class” comes concerning on its key execution markers.  Reassuringly, there’s adequate likelihood to boost execution assist once data administration is totally put in as a business procedure over the association.

Recent 10 years shows varied productions managing transfer problems associated with information are distributed in reports extending from Post-Communist, Conservative Biology, Economies, Youth and quarter of the ecu History targeted to additional business-related reports, as an example, analysis Strategy, Harvard Business Review, KM World, and information Journal Management.

For productive information management (KM), it is wear down the scan for “right” selective techniques and step by step procedures square measure important. Although, the choices created by this need an awfully abundant characterized scientific classification with clear ideas and terms. The substance and importance should be obvious and there need to be no unclearness concerning the purpose once key ideas square measure used. Despite the very fact that this can be while not a doubt associate enticing objective, it’s not really this situation with regard to usually utilized phrasing in Knowledge Management. Related to few of those cases, the creators utilize focal words conversely and with no alterations in refinement among them, what’s more, now and again without adequate clarification of from which point of view, the technical terminologies are used.

The primary part in managing the knowledge is to extent and create learning open which must be usable in organizations as well as between picked organizations. While assessing KM writing, there are a few terms that appear to be more focal and basic as compared to others. Let say, for knowledge based firm creation, the perspective, coordination, transfer, and also mix of learning makes aggressive preferences for different organizations (Ghosal and Moran 1996 (in Sambamurthy and Subramani (2005))). conjointly once King (in Schwartz (ed.) 2006) nonetheless proclaimed on top of, suggests the data exchange (KT) may be a crucial procedure for human advancement and conjointly it’s integral to understanding that that one is from basic to advancement,  for investigation the term “information exchange”, there’s clear support. information Transfer is currently so used reciprocally with data sharing (Jonsson 2008), therefore keeping in mind the tip goal to research learning exchange, learning sharing (KS) need to be forgotten. Riege (2005; 2007) conjointly deals with the obstructions influencing the “Knowledge Sharing” and “Knowledge Transferring” that have gotten little thought whereas they negatively have an effect on kilometre and its potential outcomes to convey a positive rate of profitableness.

Polani (1966, 1967) and Nonaka (1966, 1967) portrayed that info are often recognized in 2 distinctive steps – understood and unequivocal learning. Basically, info is most often organized as either categorical (coded) or implicit (what is in individuals’ heads). Implicit learning is that the individual and context specific learning of a person that lives within the human temperament, conduct, and discernment. It develops from individuals’ co-operations and needs experience and follow. understood info is extremely individual (held within the holder), subjective, exhausting to formalize, make a case for and impart fully, encounter primarily based, contextualized, work explicit, changed through discussion or account, not caught by formal instruction or getting ready and should even be intuitive but suited aiming to be plainly unequivocal info. It’s the type of knowledge that’s utilised for the foremost half by gradable people within the execution of obligations. Implicit learning is troublesome to verbalize in light-weight of the very fact that it’s communicated through activity primarily based aptitudes and cannot be shrivelled to tips and formulas. It’s deeply established in real world, systems, responsibility, goals, qualities and it should be in an exceedingly road have to be compelled to (Baloh, 2011). Understood information is embrained learning and is at the metaphysics measure during which its elucidation needs the employment of representations and a broad procedure of socialization. Sharing of understood info is created conceivable through systems administration among the people United Nations agency have it, and this can be alluded to as Communities of follow (COP). It’s of significance to notice that implicit info is troublesome to repeat by contenders thus this makes it a major wellspring of rectifiable aggressive advantage. Consequently, the numerous worry of association is that the ought to embrace techniques for the modification of the implicit  info into unequivocal learning so as to infer greatest advantage from the association’s profound capital.

In any case, Koenig (2012) additionally portrayed that this portrayal of knowledge into categorical and inferred as or even to a fault basic. He proposes that learning is best represented as unequivocal, understood, and inferred.

Data or information that’s taken off in clear form is alleged to be unequivocal. Understood is knowledge or, on the other hand learning that’s not taken off in substantial form however rather can be created unequivocal, whereas understood is knowledge or info that one would have outrageous hassle operationally coming out in clear form. Then again, prepare authoritative info into understood, categorical and social. In any case, in spite of whether or not inferred, certain, categorical or social, the foremost evident purpose is that the creating of the association’s info and knowledge accessible to the people from the association. In no matter measure learning exists, the move is in vast section associate exchange of knowledge.

Learning is that the results of the communication of categorical and implicit info and also the procedure of constructing learning brings a couple of helical of knowledge getting. It begins with people sharing their interior implicit learning by associating with others or by catching it in processed or straightforward frame. Different people then disguise the mutual learning, which procedure makes new info. These people, with the recently created learning, then share this info with others, and also the procedure starts yet again. Additionally to verbalize this procedure as development. Implicit what is a lot of, categorical learning square measure more and more being underlined in each follow and writing, as associate administration instrument to be victimized for the management of gradable info that is shared trough human ware, groupware, intranets, list serves, databases, and storehouses.

Since info is mostly understood and completely possessed, it’s exhausting to possess charge of, and management over it. To endeavor learning all a lot of effectively associations ought to classify and store the individual’s learning. This includes creating implicit info unequivocal and transposing singular learning into gradable info. These modification forms are created conceivable through ICTs. associate association’s assignment with metric linear unit have to be compelled to think about transposing understood info into understood and unequivocal learning and see thereto that individual learning moves toward turning into authoritative learning. this will be processed not simply by a demand for associations to higher administrate info by putting in place center capabilities for individuals, decision making accomplishment and execution markers by suggests that of acknowledgment of impalpable resources, to boot for associations to endeavor to became a clever association associated a learning association with an info sharing society (Martensson, 2000).

1.1 Development of term knowledge transfer and knowledge sharing

The definition, source, and strategy for the term “Knowledge” in the fact from which it is increased has been examined by considering the philosophical verbal confrontations by Aristotle and Plato. It  would, along these lines, recommend that the underlying rise of the terms originates from these exchanges and that the proposals on the best way to manage proficient and compelling information exchange and sharing has been continuous to a shifting degree of power from that point forward. The recurrence of the relations can be followed to binary distinct floods of research.

Out of which, the first one is in item development and novelty move writing in which the relationship, what’s more, correspondence among units have been taking into considerations (e.g. Allen, 1977; Clark and Fujimoto, 1991).

Although the second one relies on upon the works of Michael Polanyi and the terms implied and express learning. In a convincing Harvard Business Review article, Ikujiro Nonaka addresses the issues of KT and KS, notwithstanding the way that he doesn’t state them explicitly. He communicates “Unequivocal data is formal besides, efficient. Along these lines, it can be easily passed on and shared” (Nonaka, 1991: 98).

Later in a comparable article, he says “This makes a “run of the mill scholarly ground” among laborers what’s more, in this way supports the trading of inferred data.” (Nonaka, 1991: 102).

Both the streams have, to some degree, united after Nonaka‟s one of a kind article. Since that article and later articles and books by him, (for instance, Nonaka and Takeuchi, 1995), in which they say that KS is an essential stage in KT) have unequivocally influenced the investigation gathering, we consider this to be the starting stage for the reemergence of KT and KS as we presumably am mindful them today. Starting now and into the foreseeable future, the terms have developed a tiny bit at a time and extensively. At to begin with, the terms were used proportionally (e.g. Badaracco, 1991; Hansen, 1999) however as of late there has been an advancing separation between them, which we will show in the going with portions.

1.2 KT development

Since Since the rule years after its reemergence, KT was all things considered regarded according to the likelihood of the information based hypothesis of the firm (Kogut and Zander, 1992; Grant, 1996). A champion among the most reliably suggested researchers here is Szulanski, who in various books and articles has built up the likelihood of KT, particularly with respect to intra-firm learning. His basic work unmistakably conveys that information is viewed as a firm‟s stock (Szulanski, 1996).

The late ’90s and mid ’00s, inside this, the concentrate this area stays on the basic level with producers who address the purpose of the bit of frailties in learning and sharing over connection subunits (Hansen, 1999), different people who concentrate on between corporate information streams inside multinational attempts and different people that consider distinguishing strength unit progress and execution (Tsai, 2001). A solitary noticeable remarkable case is the time when the mental piece of issue concerned join with the examination stream because of the impacts from outward and trademark inspiration in people on Knowledge Transfer inside the organization are thought about (Osterloh and Frey, 2000).Till this day and age, there is a change from sensible and speculatively orchestrated research towards more precisely engaged research. Paulin (2002 and 2006) considers KT frames in the auto business with a particular focus on the era strategy affirmation handle. Schlegelmilch and Chini (2003) show a composition review in which the written work insinuated (generally from 1997 to 2002) wins essentially toward observational surveys.

Late explores on information trade still change in accordance with the bigger measure of examination. Both the examination diaries Easterby-Smith, et al. (2008) and van Wijk, et al. (2008) have a sensible focus on intra or potentially between definitive information trades.

Regardless, Easterby-Smith, et al. (2008) perceived diverse demand of both theoretical and customary mass to the repeating design explore the matter inside the zone of between dynamic learning move and in their question “How does the strategy for learning exchange spread out at various levels of examination?” they in like way open up for examination on the individual level. This redirection from the control track is proceeded by Liyanage, et al. (2009) when they express that “information exchange is the vehicle of getting the hang of starting with one place, individual or possession then onto the accompanying.” (Liyanage, et al., 2009: 122).

  • KS development

The early work that was presented by Nonaka‟s HBR article, KT and KS is used alternately with power towards KT. One maker that grasps the term KS is Appleyard (1996). Here, she fuses both connections on the business level of participation (by taking a gander at KS in the semiconductor business with KS in the steel business) and on a national level (Japan is appeared differently in relation to the US) using solitary respondents. Diverse researchers in a comparative stream are Dyer and Nobeoka (2000). Their revelations consolidate the declaration that Toyota’s relative effectiveness great conditions are cleared up to some degree by their ability to make and oversee sort out level KS shapes.

Diverse perspectives that are strong in the KS stream of research are the mental and the sociological. Cabrera and Cabrera (2002), for example, fuse the mental thought of social issues while examining the inclination of individuals to bestow data to various individuals in spite of the way that the association that they work for has placed assets into specific advancement to enable such getting the hang of sharing.

Fernie, et al. (2003) has a strong comprehension on individual information. They battle that data is exceedingly individualistic and that it is introduced specifically social settings. This article is a fair instance of within learning sharing that is focused on the individual level – setting, especially on the subjective data. Another instance of this stream is when KS between individuals in affiliations is investigated (Ipe, 2003). Here, four principle contemplations that effect KS are perceived: 1) The nature of learning, 2) The motivation to share, 3) The odds to share and 4) The lifestyle and the work condition.

In a current distributed articles, an entire and exhaustive review of articles on individual-level data sharing is presented (Wang and Noe, 2010). They express that their article is the first to productively inspected singular learning sharing and that past explores have focused on inventive issues of data sharing or data trade transversely over units or affiliations, or inside between various leveled frameworks.

Barriers to knowledge sharing

Through expert experience, it is desirable that the people should have a tendency to promptly recognize obstructions to doing their employment and on account of this exploration would express reasons why hindrances exist in learning. A target of the critical research exercise was to progress proficient practice inside the association. Information boundaries ought to be caught on furthermore, where suitable evacuated if change in a specific region is to be accomplished. Thought was given to the accompanying to decide the effect of learning sharing (Reige, 2005)

  • Integration of a learning administration system into the Corporation or Sites’ objectives or vital approach might miss or misty
  • Lack of initiative and course as far as plainly conveying the fundamental estimations of learning sharing practices
  • Existing practices, arrangements, methodology, culture may not be helpful for learning sharing
  • Internal intensity inside specialty units, useful zones and backups can be high
  • Hierarchical association structure restrains or backs off most sharing practices
  • General absence of time to share learning
  • Apprehension of dread that sharing may lessen or risk individuals’ professional stability or, then again progression While these are all contemplations and all do exist at some level, they were most certainly not considered to be superseding or restrictive of the learning sharing procedure.
  • The Knowledge Organization

Foss and Pedersen (2004) guarantee that there is an absence of comprehension of how hierarchical configuration issues identify with learning forms in multinational enterprises. Simonin (1997) analyzed regardless of whether organizations can create specific information by means of experience and after that utilization this information to get further advantages. Simonin’s (1997) comes about demonstrated that organizations do gain, as a matter of fact, predominantly identifying with cooperation.

Becerra-Fernandez and Sabherwal (2003) express the effect of information administration heights from people to people and after that to the whole association. Sandrone (1995) expressed all workers have suggest information of occupation conditions and are along these lines ready to make helpful commitments. This has been developed much further to propose certain parts of business that have been moved toward becoming ‘individuals driven’ because of both the knowledge develop and the mechanical intends to exchange data and information. Keller (2003) contended the fact which was at that point when President of the University of California, Clark Kerr amid his Godkin Lecture of 1963, battled new information that had step by step turned into the key charge in the development, change for a “country’s wellbeing, military, financial aggressiveness, imaginative magnificence, social concordance, and political solidness”. Knowledge administration frameworks are thought to be best in class advancement (Adams and Lamont, 2003). Dish what’s more, Leidner (2003) examine how an information administration framework must be deliberately outlined and executed. Alavi and Leidner (2001) state how authoritative and administration rehearse has turned out to be more learning centered.

As an association assembles and extends its learning base, it fabricates its scholarly capital furthermore, subsequently upgrades its upper hand. Information turns into an aggressive resource, particularly learning, which is firm particular, private information, specifically licenses, copyrights and “mystery” systems (Bailey and Bogdanowicz, 2002). In any case, as best practices progress toward becoming dispersed inside an industry, they wind up noticeably open information (Matusik and Hill, 1998). As people in firm follow particular prescribed procedures, such learning ends up plainly versatile. It is a piece of a person’s and in addition a company’s human capital.

  1. Literature Review

This is a critical literature review based on the published research journals about the knowledge mechanism in multination enterprise.

  • Multinational knowledge and Subsid

One research stream concentrates on the part of separation in information exchange or all the more extensively on its part in inter-organizational connections. Thinks that have been investigated the impact of separation on correspondence and trust in multination enterprises (Luo 2002), cross-fringe securing execution (Reisn 2012), obtaining, what’s more, joint wander mix forms (Hseih et al. 2010, Ulenbruck 2004) and regionalization (Williams 2009).

Let’s get to the fruition on the effect of division on learning trade and between hierarchical associations have, not just this, it likewise dominated the impacts (negative) effects in partition (e.g. Reus 2009). Actually, only two checks found that social detachment had a useful result either on information trade (Sarala and Vaara 2010) or on the between hierarchical relationship (Reus and Lamont 2009). Sartor besides, Beamish (2014) consider both right and wrong associations among different institutional partition estimations, also the various leveled control. Finally, a couple looks into found no effect of social partition (e.g. Park et al. 2012; Cui et al. 2006). Subsequently, that creates the impression that, practically identical to look at tending to market decision, an unmistakable plan ascends for the negative effect of partition – in particular social detachment – on data trade, likewise, between hierarchical associations. Additionally it must be stressed that most of studies focused on social separate to the inconvenience of other division estimations.

Accordingly, there is extraordinary requirement for more research investigating the impacts of different separation measurements on information exchange and inter-organizational connections.

  • Different ways of knowledge transfer mechanism in Multinational Enterprise and Subsidiary

I already clarified that the consideration towards the auxiliaries may influence the entrepreneurial procedures of the said auxiliary and its execution thusly.

Currently, it ought to know how these practices could give the great conditions to the MNCs with everything taken into account.  It can be seen that, one should find the suitable reaction through those instruments, assumed by the written work as data trade.

The information exchange instrument strategy has been a subject for a couple surveys. It is insipidly observed as the improvement of learning inside the net. Specifically, it is the information and knowledge that is shared with each unit of an organization. (Appleyard, 1996; Gupta, 2000; Tsai, 2001). For this, I suggest the explanation referred to Szulanki (1996). In it, he explains that information exchange is a definite transfer of knowledge between a recipient and a source unit.

According to Ciabuschi (2004), it states that the headways nowadays are deficient to redesign the force of an association if that are not transferred all around. Those methods of transfer are genuinely troublesome and also costly: Von Hipple (1994) used the method to modify the description of each one of the systems that occur with regards to the data trade or basic considering. The maker communicates that those frameworks are fundamentally held in one single zone, and just from time to time ventures are rolled out to look for after improvements or more adequacy in those said practices.

Data transfer is a sensible opportunity to improve the general execution of the MNC (Kogut and Zander 1992; Barlett and Goshal 1989); up till now that can’t exist without considering the closeness of structures what’s more, frameworks that engage and support the procedure.

2.3.1 HQ attention given to the Subsidiary

According to (Michel Mazzoni, 2011), the consideration is characterized as the commitment to the general advancement of the backup given by the HQ, we centered our inquiries concerning the sum, sort and recurrence that assets, for example, money related, good or scholarly, are given by the Italian Multinational to the auxiliary.

Moreover we likewise needed to make sense of on the off chance that they know about any sort of reward as result for getting great outcomes, for example, rewards, open honors or affirmations.

2.3.2 Innovation and Subsidiary’s Performance

When they began discussing development, we generally needed to clarify that by that term they don’t just proposed new items or R&D. They really implied every one of the practices, forms and adjustments that are constructed by the auxiliary which are extensive novel to the organization. The adjustment to the Swedish market of an officially current item, that alternate way to transfer the items, managing providers and clients, how to confront strategic issues or finding any best hones that have all the earmarks of being more effective for the backup. (Michel Mazzoni, 2011).

Those developments that they asked which brought results, for example, as a general development of the backup as far as learning and productivity and how they made relevant to it.

2.3.3 Flow of knowledge between HQs and subsidiaries and between subsidiaries

According to (Michel Mazzoni, 2011), they began managing the information exchange segment of the meeting. We got some information about the way and the repeat they grant information to the headquarter starting from a general viewpoint (workshops, email, telephone and social events). Also a perpetually expanding number of unpretentious components concerning the way they team up with the HQ about organizing and decision techniques. We moreover understood that various MNCs have started using mechanically pushed IT System remembering the true objective to deal with the gathered learning stream (Ciabuschi, 2003). It can be considered that it was authentic to request those applicants if they have any and why.

To comprehend the learning streams amongst HQ and auxiliaries we chose to center, as a first approach, on how the correspondence is directed – how and how frequently they convey and about what.

2.3.4 Overall performance of the multinational enterprises

Upsides of the sharing of the knowledge was calculated by making inquiries with respect to the likelihood that those prescribed procedures, development or thoughts were contemplated from the HQ and after that mutual inside the MNC‟s net. In addition, we were likewise keen on comprehension the singular view of the chiefs about the information exchange components, inquiring as to whether any issue happened and which was surely their own fulfillment.

It would have likewise been fascinating to meet the HQ general administration about this subject at the same time, because of absence of time and assets, we were not ready to reach them. In any case I discovered a few truly fascinating data from the backups administration. (Michel Mazzoni, 2011)

In particular, I solicited whether any sort from neighborhood advancements, finest observes or queries about actually exchanged to the HQ. Along these lines, it didn’t concentrate on the kind of development itself, however in the way the HQ acknowledges it. Furthermore, I was keen on seeing the way that HQ understands the data and in what way it reinforces it or discards it.

2.3.5 Level of the HQ attention to the subsidiaries

In (Michel Mazzoni, 2011), they at first focus our energy on the level of thought given by the HQ to the helper. They on a very basic level need to fathom to gives any kind of resources by the Italian-based HQ in order to propel the change of improvement and best practices. By resources it actually don’t imply simply budgetary ones, yet we also consider intangible ones, for instance, “insightful assets”, time, and affirmation.

They met with Company A battled that the HQ does not normally give financial resources of any kind except for from rebates for some promoting operations or business practices.

What’s more he also communicated this reimburses are given reasonably direct. Startlingly, the helper acknowledges an anomalous condition of steady sharing of data, advancement and organization in demand to develop unique activities and unique plans as well.

The organization B situation is fairly uncommon, the HQ provides more than enough respect for the helper yet only because of the motives regarding the compass of targets. For various performs, the level of though is not higher and also the inclination for higher time don’t therefore considered. (Michel Mazzoni, 2011).

The thought for Organization B sways in the midst of the annum and the contenders also ensures that the dependence of thoughts relies upon the goals come to. The higher targets the reinforcement accomplishes, the lower thought the HQ accommodates the helper besides, the different way. In any case, for what regards the progression and change of improvements and also thought is lower or non-existent for considering the best practices.

Organization C situation is somewhat particular. The HQ thought is to an awesome degree low concerning each day operations. Out of the blue, the HQ tends to give higher thought regard to more vital endeavors. In any case, for this circumstance the Italian organization tends to wander out routinely to the Swedish reinforcement to amass information and perceive how practices are directed. This immediate contact may not be adequate for a perfect thought yet rather it proposes, as communicated by the Manager met, an awesome level of support between the HQ and the reinforcement. (Michel Mazzoni, 2011),

2.3.6 Degree of Liberty held by Subsidiaries

As per (Michel Mazzoni, 2011), relying upon the importance or radical level of the choice or the amendment completed by the helper, every one of them would like, as a necessary, the underwriting by the military installation. as an example, Company A has free decisional management as for the selection of suppliers, source of co-appointments, framework of business practices at neighborhood level, esteem exchange with customers, generation of post arrangements channels, clear confirmation of latest client sections. On the opposite hand, it wants the last support regarding the catching of latest delegates, remunerations and prizes, all the advancing structures (not to undermine the whole picture), re-esteeming and re-alteration of things to adjacent wants and acquisitions.

Notwithstanding the underwriting would like for a few business sharpens, the answerer feels that the military installation genuinely takes every one of his suppositions and suggestions into thought. The HQ, frankly, respects the importance of the auxiliary’s half and makes its boss being proactive and determinant for the physical phenomenon of the practices. (Michel Mazzoni, 2011).

The case with Company B is fairly extraordinary because the interest for underwriting is for the foremost half a lot of formal and functionary. aside from important suggestions that need purpose by purpose procedures for action, the various sales have to be compelled to take once strict pointers and temporal order given by the military installation. to boot, because of the high force of the market, the insecurity of the prices of unrefined materials and therefore the an excessive amount of contradictory and wide structure of the MNC, the military installation portrays a technique fully in light-weight of the action of commercial enterprise destinations and giving volumes. (Michel Mazzoni, 2011).

Notwithstanding the managers of the assistant acknowledge for the foremost half high decisional management regarding the physical phenomenon of the association. for instance, because of the on-going cash related subsidence, they anticipated that would make cuts in the backup’s structure. They decided to solidification two divisions of the reinforcement: customer organization and get ready. It wound up being a successful choice as the customer advantage division could set up the agents due to the cognizance of customer needs and issues of declare. (Michel Mazzoni, 2011).

Organization C, when stood out from interchange assistants, has the most essential level of decentralization. They acknowledge high decisional control with respect to advancing endeavors, web promoting, thing modifications, esteeming, enrolling and get ready, regardless of the way that they are obliged to imply a substantial segment of their key courses of action to the executive of Northern Europe and, discontinuously, to the top managers of the association. (Michel Mazzoni, 2011).

2.3.7 Knowledge transfer and communication inside the multinational enterprise

2.3.7.1 The Formal Communication Channels

As indicated by (Michel Mazzoni, 2011), the formal correspondence channels square measure created by the HQs to present a comparative add and nature of learning sharing to every reinforcement.

The formal correspondence coordinates square measure an equivalent in every MNC conversed with; they basically embody in vast social occasions for every region, for example, yearly get-togethers, quarter get-togethers, month to month get-togethers and semester get-togethers. the target is to boost and share best practices, new creation limits, new markets entrance practices, et cetera.

Also, they’re in like manner projected to create a web of associations between chiefs in numerous countries. this is able to permit a prompt contact for future obtaining the droop of sharing within the MNC.

According to the interviewees, one amongst the rule focuses of the customs, social events, fairs, and alternative formal channels is to create associations and, through that, trust between different administrators. Those correspondence channels allow limit social affairs of people to work together with each other in a compelled extent of time. (Michel Mazzoni, 2011)

Various kind of social affairs exists. Yearly social affairs concern normally general executives in the HQ a couple times each year, all around for business reports. Quarter social events generally concern a reduced number of countries and normally they are neighborhood get-togethers. Amid those social events, countries from the same land district meets to demonstrate their activities and practices grasped amid the year.

Finally, we found that every association has its own specific standardize practice to pass on specific necessities to the HQ. This is, for example, gotten for enrolling shapes, techniques for action shows what is all the additional, any reasonably sales or conditions asked for by the reinforcement. This standardized follow permits the HQ to relatively survey the request of every reinforcement.

The cutoff functions of formal correspondence channels ensured by the interviewees – the high price of affiliation, the time spent to travel Associate in Nursingd at on the far side what several would contemplate doable the likelihood to land up perceptibly additional conversant in the complete potential framework instigate the generation of an easygoing correspondence channel, worked all at once to evade the HQ insinuating significantly to varied backup’s chiefs within the MNC‟s organize. (Michel Mazzoni, 2011).

2.3.7.2 The Informal Communication Channels

As indicated by (Michel Mazzoni, 2011), Informal correspondence channels are created by the reinforcements as different correspondence ways to increase their ability to manage step by step problems and to manufacture their flexibility structure to the headquarters.

In all reinforcements, the quality easygoing station used, to avoid the headquarters, is that the helper to-reinforcement contact. The Company B director gave us one case concerning this issue. The HQ had presented another IT-structure specifically helpers yet one of these reinforcements arranged in Eastern Europe had a couple challenges using the new programming. After a couple of correspondences with the HQ, they reached another helper in Western Europe to deal with their issues. As opposed to sitting tight for the HQ to make a move, surmising time delays, they required to evade the military headquarters and contact significantly another assistant.

Another easygoing correspondence channel is usually in lightweight of composed contact among directors. Association A‟s responder gave United States of America many data regarding this stress. The chairman contacts its assistant in another Country to induce to specific data that might take overtime through the military headquarters. The responder ensured that the likelihood to induce to specific information totally different in several numerous reinforcements with different goals is sort of the only real approach to share data, seeable of the requirement of learning trade elements within the MNC. For instance, specific conclusions, for example, instrumentality or era techniques is difficult accessible through the military headquarters but by achieving the creation plant they will modify problems snappier. Giving higher client advantage.

One of the practices includes in building singular associations among reinforcements chiefs. Through that, correspondence is fast and therefore the danger to by-pass the military headquarters is high. Organization A’s boss communicated that the individual contact with numerous reinforcements managers is basic for his or her work.

There are various ways that to modify build frameworks, but the essential ways that permit the social affairs known as by military headquarters. The elemental obstacle is that not a soul will move to them as a result of physical, time and price objectives.

  • Knowledge Transfer Enhancement

To propose some control techniques, experts have endeavored that an HQ might grasp to overhaul the components in information exchange method.

  • Communal Contact

Information outpourings could also be practiced through varied leveled socialization, for example, a headway of a social half that improves the generation of heightened and pleasing HQ-reinforcement relationship (Ghoshal and Tsai, 1998).

  • Faith

“Faith, by keeping our minds hospitable all affirmation, secures correspondence and trades” (Misztal, 1996:10).

Fatih is in like manner an essential half that enhances the information trade. Examiners conceptualized it as an important half to end intra-and between varied leveled joint effort (Smith et al, 1995) and encourages the sharing of educational capital (Nahapiet and Ghoshal, 1998).

Implying Knez (1994) and to Kramer, Brewer and Hanna (1996), Nahapiet Associate in Nuilsring (1998) total trust is also seen as an “expectational asset” to believe upon and to update investment and coordination.

  1. Conclusion

Amid the review, it may be aforesaid that number of info sources and segments impact the trail for a compelling knowledge trade within the MNC. Composing credits problems regarding the training trade insinuating psychological feature and ardent factors (Szulanski, 2006). additionally merely not solely learning is “tacky” (Tire 1994), what is more boss might systematically be selfish and ardent and that they ought to re-evaluate the wheel instead of use what some other person beginning at currently created. Varied factors happen. Each Subsidiary and headquarters have their own specific desires and longings. On one aspect, HQs tend to not acknowledge musings that do not begin from the highest and, as a result, reinforcement’s area unit jittery and do not manifest their entrepreneurial result the maximum amount as they might (Birkinshaw, 2000).

In our cases, managers grasp the spatial relation of the training trade within the affiliation, in any case they each currently and once more observe their errands because the accomplishment of given targets. In any case, it’s the HQs‟ enterprise to boost those segments basic cognitive process actuality objective to stimulate the learning overflowing. Professionals have planned management ways that support this method. for example, Ghoshal and Bartlett (1988) make sure that social joint effort and regularizing coordination improve the HQ-assistant support, and additionally paid reward and persuading power structures (Szulanski, 2006).

As confirmed in our review, trust may be a basic phase while not that the correspondence and learning sharing area unit avoided and also the general advantage of the MNC is minor (Nahapiet and Ghoshal, 1998).

List of References

Adams, G.L., Lamont, B.T., (2003). Knowledge Management Systems and Developing Sustainable Competitive Advantage. Journal of Knowledge Management. Vol. 7. No.2. pp 142-154.

Alavi, M., Leidner, D.E., (2001). Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues. MIS Quarterly. Vol. 25. No.1 pp 107-136.

Allen, T. J. (1977) Managing the Flow of Technology, MIT Press, Cambridge, MA

Appleyard, M. M. (1996) „How does knowledge flow? Interfirm patterns in the semiconductor industry‟, Strategic Management Journal, Vol 17, No. pp 137-154.

Badaracco, J. L., Jr. (1991) „Alliances Speed Knowledge Transfer‟, Planning Review, Vol 19, No. 2, pp 10-16

Baloh, P., Desouza, K. C. and Paquette, S. (2011). The concept of knowledge. In: K. C. Desouza and S. Paquette (Eds.), Knowledge Management: An Introduction (pp. 35-71). New York: NY: Neal-Schuman Publishers, Inc.

Becerra-Fernandez, I., Sabherwal, R., (2003). An Empirical Study of the Effect of Knowledge Management Processes at Individual, Group and Organisational Levels. Decision Sciences. Vol. 34. No. 2. Spring 2003. pp 225-260.

Bailey, E.K., Bogdanowicz, M.S., (2002). The Value of Knowledge and the Values of the New Knowledge Worker: Generation X in the New Economy. Journal of European Industrial Training. pp 125-129.

Birkinshaw, J. 1997. Entrepreneurship in multinational corporations: the characteristics of subsidiary initiatives. Strategic Management Journal, Vol. 18:3, 207 – 229 (1997).

Brock, D.M. (2005). Multinational acquisition integration: the role of national culture in creating synergies. International Business Review, 14, pp. 269–288

Bartlett C.A. and Ghoshal S. (1989): Managing Across Borders: The Transnational Solution. Boston: Harvard Business School Press.

Clark, K. B. and Fujimoto, T. (1991) Product development performance: strategy, organization, and management in the world auto industry, Harvard Business School Press, Boston, Mass.

Cabrera, A. and Cabrera, E. F. (2002) „Knowledge-sharing dilemmas‟, Organization Studies, Vol 23, No. 5, pp 687-710.

Ciabuschi, F. (2004). On the Innovative MNC. Leveraging Innovations and the Role of IT Systems, PhD Thesis, Uppsala: Uppsala University Press.

Cui, A.S., Griffith, D.A., Cavusgil, S.T. and Dabic, M. (2006). The influence of market and cultural environmental factors on technology transfer between foreign MNCs and local subsidiaries: a Croatian illustration. Journal of World Business, 41, pp. 100–111.

Dyer, J. H. and Nobeoka, K. (2000) „Creating and managing a high-performance knowledge-sharing network: The Toyota case‟, Strategic Management Journal, Vol 21, No. 3, pp 345-367.

Dinur, A., Hamilton, R.D. and Inkpen, A.C. (2009). Critical context and international intrafirm best-practice transfers. Journal of International Management, 15, pp. 432–446.

Easterby-Smith, M., Lyles, M. A. and Tsang, E. W. K. (2008) „Inter-organizational knowledge transfer: Current themes and future prospects‟, Journal of Management Studies, Vol 45, No. 4, pp 677-690.

Fernie, S., Green, S. D., Weller, S. J. and Newcombe, R. (2003) „Knowledge sharing: context, confusion and controversy”‟, International Journal of Project Management, Vol 21, No. 3, pp 177-187.

Foss, N.J., Pedersen, T., (2004). Organising knowledge Processes in the Multinational Corporation: An Introduction. Journal of International Business Studies. Vol. 35. No. 5. pp. 340-349.

Grant, R. M. (1996) „Toward a knowledge-based theory of the firm‟, Strategic Management Journal, Vol 17, No. pp 109-122.

Gupta, A. K. and Govindarajan, V. (2000) „Knowledge flows within multinational corporations‟, Strategic Management Journal, Vol 21, No. 4, pp 473-496.

Hansen, M. T. (1999) „The search-transfer problem: The role of weak ties in sharing knowledge across organization subunits‟, Administrative Science Quarterly, Vol 44, No. 1, pp 82-111.

Ipe, M. (2003) „Knowledge Sharing in Organizations: A Conceptual Framework‟, Human Resource Development Review, Vol 2, No. 4, pp 337-359.

Jonsson, A. (2008) „A transnational perspective on knowledge sharing: lessons learned from IKEA‟s entry into Russia, China and Japan‟, The International Review of Retail, Distribution and Consumer Research, Vol 18, No. 1, pp 17-44

Kogut, B. and Zander, U. (1992) „Knowledge of the Firm, Combinative Capabilities, and the Replication of Technology‟, Organization Science, Vol 3, No. 3, pp 383-397.

Koenig, M. E. D. (2012). What is KM? Knowledge management explained. KM World, May, 2012. Retrieved Feb. 8, 2013 from http://www.kmworld.com/Articles/Editorial/What-Is- …/What-is-KM-Knowledge-Management-Explained-82405.aspx

Knez M. and Camerer C. 1994. Creating expectational assets in the laboratory. Coordination in “weakest link” games. Strategic Management Journal, 15: 101-119.

Keller, G., (2003). Reviewed Work(s): The Uses of the University by Clark Kerr. The Journal of Higher Education, Vol. 74, No.2. (Mar.-Apr., 2003), pp. 231-236.

Kramer, R. M., Brewer, M.B, and Hanna B.A. 1996. Collective trust and collective action. The decision to trust as a social decision. In R.M. Kramer & T. R. Tyler (Eds). Trust in organizations. Frontiers of theory and research: 357-389. Thousand Oaks. CA: Sage.

Kogut, B., and U. Zander. 1992. Knowledge of the Firm: Combinative Capabilities and the Replication of technology, Organization Science, Vol. 3, No. 2, pp383-397.

Liyanage, C., Elhag, T., Ballal, T. and Li, Q. P. (2009) „Knowledge communication and translation – a knowledge transfer model‟, Journal of Knowledge Management, Vol 13, No. 3, pp 118-131.

Matusik, S.F., Hill, W.L., (1998). The Utilisation of Contingent Work, Knowledge Creation and Competitive Advantage. Academy of Management Review. Vol. 23. No. 4. pp 680-697.

Martensson, M. (2000). A critical review of knowledge management as a management tool. Journal of Knowledge Management, 4(3), 204-216.

Misztal B (1996). Trust in modern societies. Cambridge, England. Polity press

Nonaka, I. (1991) „The Knowledge-Creating Company‟, Harvard Business Review, Vol 69, No. 6, pp 96-104

Nonaka, I. and Konno, N. (1998) „The concept of “ba”: Building a foundation for knowledge creation‟, California Management Review, Vol 40, No. 3, pp 40-54.

Nahapiet, J. and Ghoshal, S. (1998): Social Capital, Intellectual Capital, and the Organizational Advantage, Academy of Management Review, Vol. 23, No. 2, pp242-266.

Michel Mazzoni Jacopo Zucchelli Supervisor: Desirée Holm, “Knowledge Transfer In Multinational Corporations and Its Performance Implications: The Case Of Italian Subsidiaries Based In Sweden.” From http://www.diva-portal.org/smash/get/diva2:427494/FULLTEXT02

Park, C., Vertinsky, I. and Lee, C. (2012). Korean international joint ventures: how the exchange climate affects tacit knowledge transfer from foreign parents. International Marketing Review, 29, pp. 151–174.

Paulin, D. (2002) Virtual verification: Impact of a new work method on the final verification process, Licentiate thesis, Chalmers University of Technology, Göteborg.

Paulin, D. (2006) „The Effects on Knowledge Creation and Transfer in Production Process Verification due to Virtual Prototypes‟, [online], Academic Conferences Ltd, www.ejkm.com

Riege, A. (2005) „Three-dozen knowledge-sharing barriers managers must consider‟, Journal of Knowledge Management, Vol 9, No. 3, pp 18-35. Riege, A.

Reus, T.H. and Rottig, D. (2009). Meta-analyses of international joint venture performance determinants: evidence for theory, methodological artifacts and the unique context of China. Management International Review, 49, pp. 607–640

Riege, A. (2007) „Actions to overcome knowledge transfer barriers in MNCs‟, Journal of Knowledge Management, Vol 11, No. 1, pp 48-67.

Reus, T.H. and Lamont, B.T. (2009). The double-edged sword of cultural distance in international acquisitions. Journal of International Business Studies, 40, pp. 1298– 1316.

Szulanski G. (1996): Exploring Internal Stickiness: Impediments to the Transfer of Best Practice within the Firm, Strategic Management Journal, Vol. 17, pp27-43.

Sambamurthy, V. and Subramani, M. (2005) Introduction to: „SPECIAL ISSUE ON INFORMATION TECHNOLOGIES AND KNOWLEDGE MANAGEMENT‟, MIS Quarterly, Vol 29, No. 1, pp 1-7.

Szulanski, G. (1996) „Exploring Internal Stickiness: Impediments to the Transfer of Best Practice Within the Firm‟, Strategic Management Journal, Vol 17, No. Winter Special Issue, pp 27-43.

Schwartz, D. G. (2006) Encyclopedia of Knowledge Management, IGI Global. [electronic], http://library.books24x7.com/toc.asp?bookid=14700.

Schlegelmilch, B. B. and Chini, T. C. (2003) „Knowledge transfer between marketing functions in multinational companies: a conceptual model‟, International Business Review, Vol 12, No. 2, pp 215-232.

Simonin, B.L., (1997). The Importance of Collaborative Know-How: An Empirical Test of the Learning Organisation. Academy of Management Journal. Vol. 40. No. 5. pp 1150- 1174.

Smith, K.G.; Carroll, S.J.; and Ashford, S.J. (1995): Intra- and Inter-organizational Cooperation: Toward A Research Agenda, Academy of Management Journal, Vol. 38, No. 1, pp7-23.

Sandrone, V., (1995). F.W. Taylor and Scientific Management. Quality Resource Website. http://www.quality.org/TQM-MSI/taylor.html.

Tsai, W. P. (2001) „Knowledge transfer in intraorganizational networks: Effects of network position and absorptive capacity on business unit innovation and performance‟, Academy of Management Journal, Vol 44, No. 5, pp 996-1004

Uhlenbruck, K. (2004). Developing acquired foreign subsidiaries: the experience of MNEs in transition economies. Journal of International Business Studies, 35, pp. 109– 123.

Von Hippel E. 1994. “Sticky Information” and the Locus of Problem Solving: Implications for Innovation” Management Science 40, no.4, April 1994: pp 429-439.

Weick, K. (1995) Sensemaking in organizations, Sage Publications, Thousand Oaks, California, USA

Williams, C. and van Triest, S. (2009). The impact of corporate and national cultures on decentralization in multinational corporations. International Business Review, 18, pp. 156–167.

Wang, S. and Noe, R. A. (2010) „Knowledge sharing: A review and directions for future research‟, Human Resource Management Review, Vol 20, No. 2, pp 115-131.

Kashlak, R.J., Chandran, R. and Di Benedetto, C.A. (1998). Reciprocity in international business: a study of telecommunications alliances and contracts. Journal of International Business Studies, 29, pp. 281–304

Luo, Y. (1999). Time-based experience and international expansion: the case of an emerging economy. Journal of Management Studies, 36, pp. 505–534

Reus, T.H. (2012). Culture’s consequences for emotional attending during cross-border acquisition implementation. Journal of World Business, 47, pp. 342–351.

We can write this or a similar paper for you! Simply fill the order form!

Informed Consent Essay Paper Available

Informed Consent
                            Informed Consent

Informed Consent

Order Instructions:

Case Assignment

Make sure you have read all of the assigned readings. Discuss the questions presented below and follow directions
1.Review the case Informed Consent in Louisiana – Lugenbuhl v. Dowling.
2.First, identify the elements of the legal citation- plaintiff, defendant, court, location of case etc.
3.Explain the meaning and importance of the doctrine of informed consent.
4.Discuss why we have this doctrine and what would happen if we did not.
5.Discuss the two elements that must be present for informed consent to exist under the law.
6.In a legal case of negligence and liability explain why the basis for negligence may be battery, unconsented touching, or breach of a duty imposed on the doctor to disclose material information.
7.Explain the elements that must be present for a patient to give informed consent.

Module Overview

Informed consent requires more than just a good written form—it also requires preparation for a full discussion with the patient and a check to ensure that the messages have been received.

Informed consent is the process of communication between a patient and physician that results in the patient’s authorization or agreement to undergo a specific medical intervention [AMA 1998].

Disclosure of facts related to an individual’s healthcare, including level and location of care, are central to the fulfillment of informed consent. When an individual is unable to provide informed consent because they lack the decision-making capacity to process the information and/or they have been deemed legally incompetent, the healthcare team should obtain assent from the individual whenever possible.

Questions remain as to how to proceed when assent cannot be gained and the decision involved causes a level of distress for the individual that is difficult to resolve. A focus on maintaining hope and support with a clear transition and follow-up plan are important variables to consider for an ethical, caring response.

Traditionally, the ethical principle of patient confidentiality, including the right to personal privacy has been an important consideration in healthcare. Recent incidents involving identify theft, confidentiality, and patient privacy have led to increasingly restrictive policies on patient health information and access to records and data. Some believe that these restrictions can harm efforts to protect the public’s health. This has prompted discussions on a more appropriate balance between privacy concerns and the protection of public health.

Required Reading

A Practical Guide to Informed Consent. Temple Health (2007). http://www.templehealth.org/ICTOOLKIT/html/ictoolkitpage1.html

Informed consent Russell G. Thornton Proc (Bayl Univ Med Cent) 2000 April; 13(2): 187–190.PMCID: PMC1312305 http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1312305/

Informed Consent in Louisiana – Lugenbuhl v. Dowling, 701 So.2d 447 (La. 1997), rehearing denied (Nov 21, 1997) Guide http://biotech.law.lsu.edu/cases/consent/Lugenbuhl.htm

Am J Public Health. 2008 May; 98(5): 793–801. doi: 10.2105/AJPH.2006.107706

PMCID: PMC2374810 Ethics in Public Health Research: Privacy and Public Health at Risk: Public Health Confidentiality in the Digital Age. Meyers, Frieden, Bherwani and Henning. http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2374810/

Optional Reading

Improving the Informed Consent Process Krames StayWell Blog (2009). http://info.kramesstaywell.com/Portals/36339/docs/Krames%20Informed%20Consent.pdf

SAMPLE ANSWER

Informed Consent

Question 1

Informed consent goes beyond just signing a piece of paper to the level that there must be a clear discussion between the patient and the medical professional in order to reach an understanding. Disclosure of the medical health history by a patient forms a greater part of informed consent. In the Lugenbuhl v Dowling case, the surgeon got the patient’s consent and gave and assurance that he would use the surgical mesh. The surgeon, however, went against this promise and never used it. While undertaking the operation, the surgeon thought that all would be well besides the change in plans, but unfortunately, things didn’t work out as he had planned. His patient who had intracostal incisional hernia sued him for going against the informed consent. During whole hearings of the case, the charges were separated into medical malpractice and the lack of informed consent. During the case, however, there was no sufficient evidence that the surgeon had gone against informed consent by not using the mesh as the plaintiff did not have the vital causation element. The medical evidence showed no case of violation on the healthcare by Dr. Dowling (Eonas, McCoy, & Eaton, 2010).

Question 2

In the case, the Plaintiff was the concerned patient, DR. John Downing who was a professional surgeon was the Defendant. The case was heard on 10th October 1997. It was filled in the Supreme Court of Louisiana.

Question 3

Informed consent is a legal process that ensures that the client, patient or the researcher are well informed about the potential dangers or risk and cost that comes with a medical process. The elements of informed consent include available alternative medical care, potential benefits, awareness about the nature of treatment and the treatment risks. For instances where a patient might not be able to make the consent, then a legal representative can be involved. It forms a bigger part towards satisfaction of medical attention as patients are part of the process (Faden, Beauchamp, & Kass, 2014). Informed consent serve as a guide to the physician when making great decisions concerning the health of the patient.

Question 4

The lack of informed consent can lead to many malpractices by the medical professionals during the provision of healthcare services. The healthcare professionals will have the freedom of administering any kind of medication on their clients without seeking their opinion. Informed consent, however, restricts them to always heed the patient’s need as going against it can lead to various legal implications. Through informed consent, a patient can fully participate in decisions that concern his or her life and in turn leads to them adopting a healthy way of living (Faden, Beauchamp, & Kass, 2014).

Question 5

The existence of informed consent under the law relies on two concepts. First, there should be a statement concerning the consequences that will occur in the event that the client decides not to proceed with the procedure. In the event that withdrawal from the procedure might cause some effects on the health of the patient, then there should be a clear explanation of the required withdrawal procedures in order to uphold patient safety (Tsai, Orav, & Jha, 2015). This will give an opportunity to the patient to make a decision on whether to withdraw or not, knowing the consequences that will accompany the option they will opt for. Secondly, there should be an explanation that the medical procedure involves some risks which might not be evident at the moment. Such risks must be explained by the medical professional as the patient might not be able to recognize such effects. Ensuring that the patient clearly understands the risk before undertaking a treatment is more paramount than just informing them.

Question 6

The basis of negligence might be considered as a battery if the doctor’s unconsented procedure amounts to the batter. The law does not protect any medical procedure which is performed outside the informed consent as it is considered as the legally permissible procedure. Breach of duty would occur when evidence prove that the defendant had a responsibility towards the plaintiff which was not upheld. Such cases would mean that the defendant exposed the plaintiff to loss.

Question 7

In order for the patient to provide informed consent, quite a number of factors must be present. To start with, the patient should be in the correct state of mind in order to voluntarily make decisions at that moment. The patient needs to be well informed that besides the paper they are signing they need to make a personal decision from their heart. The medical professional should act as a guide to the patient in the quest of reaching an informed consent through the provision of advice on the best alternative decisions in order for the patient to understand what is at stake. The professional should use simple terms and language in order to make sure that the patient clearly comprehends what is being said. The consent should also cover the following parts: it should provide reasonable alternatives, risks, and benefits, assessment of the patient’s understanding and the patient’s acceptance to undergo the medical procedure. In the case where a better alternative exists, then the medical professional needs to take the patient through the option convincing him or her to opt for that alternative.

References

Eonas, A., McCoy, J. D., & Eaton, S. H. (2006). Medical informed consent: clarity or confusion?. Journal of hospital marketing & public relations16(1-2), 69-88.

Faden, R. R., Beauchamp, T. L., & Kass, N. E. (2014). Informed consent, comparative effectiveness, and learning health care. N Engl J Med370(8), 766-768.

Tsai, T. C., Orav, E. J., & Jha, A. K. (2015). Patient satisfaction and quality of surgical care in US hospitals. Annals of surgery261(1), 2.

We can write this or a similar paper for you! Simply fill the order form!

Privacy and security in electronic health services

Privacy and security in electronic health services
Privacy and security in electronic health services

Privacy and security in electronic health services

Order Instructions:

Case Assignment

For your Module 4 Case Assignment, in 2-3 pages, answer each of the “questions for discussion” listed below each case. Develop your answers in 150 to 250 words for each question within the context of the background material. In addition, incorporate relevant applicable laws.

Section 1:

Explain the characteristics of technical, physical, and organizational privacy and security concerns.

Section 2: Case 4.8: E-Mail Goes Astray

Kaiser Permanente, one of the nation’s largest health insurers with 8.5 million subscribers, accidentally compromised the confidentiality of the medical information of 858 of its members. The problem occurred when a technician began sending out a large number of e-mail messages that had been backlogged while Kaiser’s system was being upgraded. Some e-mail messages were sent to the wrong recipients. Members access the website and use the e-mail system to fill prescriptions, make appointments, and seek medical advice. Some of the messages contained names, home telephone numbers, medical account numbers, and medical advice. When the technician noticed the problem, he stopped sending out e-mails but did not notify Kaiser managers of the problem. The next morning, two Kaiser subscribers notified the company that they had received other subscribers’ e-mails. The following message appears on the website:

“Your information is confidential. We are dedicated to keeping your personal health information confidential. We take many precautions to make sure others can’t pretend to be you and get your confidential information from the Web site. As long as you don’t give out your PIN, any confidential information you send or receive on this Web site can be seen only by you and Kaiser Permanente staff who have a ‘genuine business need.’ ” The director of Kaiser’s Web site indicated that once the error was discovered, Kaiser officials attempted to telephone each of the subscribers whose e-mails had been sent to the wrong person and, “We have fixed the problem.”

Source: Brubaker B. ‘Sensitive’ Kaiser e-mails go astray. The Washington Post. August 10, 2000: E01.

Questions for Discussion:
1.Who is responsible for the breach in confidentiality? The technician? Kaiser Permanente? And why?
2.Will this breach of confidentiality discourage subscribers from accessing the Kaiser Web site to fill prescriptions and seek medical advice? How can subscribers be reassured that their information will be kept confidential in the future?

Case 4.7: Patients’ Files Used for Obscene Calls

An orthopedic technician who had been convicted of child rape and indecent assault used the password of a former hospital administrator to gain access to confidential medical records of 954 patients at a major hospital. He then made obscene telephone calls to female patients as young as 8 or 9 years old.

The technician’s access to the confidential patient records began in December and continued until he was fired four months later. The hospital was not aware of the problem until a trace on the telephone line of a girl who was receiving obscene calls indicated that the calls originated from the hospital. The computer system failed to detect the outdated password and did not alert employees who were responsible for maintaining the information system that one individual was accessing a large number of patient files. Moreover, the hospital did not conduct background checks when hiring new employees.

Source: Brelis M. Patients’ files allegedly used for obscene calls. The Boston Globe. April 11, 1995: 1.

Questions for Discussion:
1.Should healthcare institutions conduct background checks on new employees who will be allowed access to confidential patient information? What information should be accessible to such employees?
2.How could the hospital have prevented the misuse of patient information from occurring? Was the hospital’s security system at fault for this breach of security?
3.Should the hospital be held accountable for the actions of the technician?

Case 4.44: University Tightens Computer Security

A university is tightening its computer security after hackers broke into a computer at the medical school and secretly used it to generate a flood of e-mail advertisements. Efforts by the university to cope with the break-in have caused balky and intermittent e-mail service for seven months for hundreds of staff members. At least once, e-mail service throughout the system shut down for two days. University officials did not detect the break-in until at least a couple of weeks later, when someone forwarded an advertisement sent by the computer.

A university spokesperson said that no file information was improperly accessed. Instead the hackers merely used the system to generate e-mail promoting other websites. The university announced that $150,000 would be spent to install new equipment to restore the e-mail system. A number of security measures were being upgraded to prevent the computer system from being broken into in the future.

Source: Birch D. Hopkins tightens computer security. The Baltimore Sun. May 29, 1999: 1B-2B.

Questions for Discussion:
1.Are university medical center information systems especially vulnerable to hackers? Why, or why not?
2.Is the medical center accountable for any harm that is caused by unauthorized entry into patient records?

Module Overview

Concerns over the privacy and security of electronic health information fall into two general categories: (1) concerns about inappropriate releases of information from individual organizations and (2) concerns about the systemic flows of information throughout the healthcare industry and related industries. Inappropriate releases from organizations can result either from authorized users who intentionally or unintentionally access or disseminate information in violation of organizational policy or from outsiders who break into an organization’s computer system. The second category, systemic concerns, refers to the open disclosure of patient-identifiable health information to parties that may act against the interests of the specific patient or may otherwise be perceived as invading a patient’s privacy. These concerns arise from the many flows of data across the healthcare system, between and among providers, payers, and secondary users, with or without the patient’s knowledge. These two categories of concerns are conceptually quite different and require different interventions or countermeasures.

Presentations and Required Readings
•The following is primary reading required for this module: Privacy and Security Concerns1
•This article discusses the primary goals of information security in healthcare and examines policy and appropriate uses of medical data: Confidentiality of Electronic Medical Records2
•Zachary Wilson offers a good explanation of the difference between internal and external sources of attacks. Additionally, he illustrates a wide range of vulnerabilities and how they can be exploited. (Do not get hung up in the technical concepts and jargon at this point. We will cover the more technical aspects later in this course.) Vulnerabilities and attacks3
•The following provides a brief overview of basic concepts surrounding information security along with an introduction to vulnerabilities, controls and policies: Security Concepts4
•Read Chapter 4 “Privacy and Confidentiality” from the following book that is available through the eBrary resource, which can be accessed from the TUI CyberLibrary:
?Anderson, J. G. (2002). Ethics and Information Technology : A Case-Based Approach to a Health Care System in Transition. Springer-Verlag New York, Incorporated, Secaucus: NJ. 63-112. Retrieved on September 8, 2007, from the eBrary database.5
•The following is the United States Department of Human Services summary version of the HIPAA Privacy Rule. HIPAA Privacy Rule6
•Wi-Fi Security concerns7

Sources for Presentation Material Referenced Above

For the Record: Protecting Electronic Health Information (1997). Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure Protecting Electronic Health Information. Washington, DC, USA: National Academies Press. 54-81. Retrieved from the eBrary database.

Barrows, R. C., and Clayton, P. D. (1996). Privacy, Confidentiality, and Electronic Medical Records. Journal of the American Medical Health Informatics Association, 3 (2), 139-148. Retrieved from the PubMed Central database.

Wilson, Z. (2001). Hacking: The Basics. SANS Institute. Retrieved from http://www.sans.org/reading_room/whitepapers/hackers/

Quinsey, C. and Brandt, M. (2003). AHIMA Practice Brief: Information Security: An Overview. American Health Information Management Association. Retrieved from http://www.advancedmedrec.com/images/InformationSecurityAnOverview.pdf

Anderson, J. G. (2002). Ethics and Information Technology : A Case-Based Approach to a Health Care System in Transition. Springer-Verlag New York, Incorporated, Secaucus: NJ. 63-112. Retrieved from the eBrary database.

Summary of the Privacy Rules. (2003). U.S. Department of Health and Human Services. Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/

Alam AS, Al Sabah SAA, Chowdhury AR (2007). Wi-Fi Security The Great Challenge. National Conference on Communication and Information Systems. National Conference on Communication and Information Security.

SAMPLE ANSWER

Section 1

The physical, technical, and organizational privacy and security concerns are categorized into two main forms; concerns about the flow of information systematically within the whole healthcare industry and concerns over the inappropriate release of information within an organization. This may arise when some individuals are given access to some confidential information hence violating a company’s privacy policy (Kshetri, 2013). The systemic concern, on the other hand, is the release of particular patient identifiable information about their health that may be against their wishes hence presenting a major invasion of patient privacy.

The concerns hold different characteristics. For example, there is organizational threats which involve vulnerability of individual organization electronic health records to external or internal agents. Internal agents are those with authorization and have access to information yet they abuse their privileges.

Conversely, external agencies do not have access to the information, yet they try to manipulate the data or rendering the system unusable. Another characteristic includes the concerns that may arise due to sensitive information that could easily be used against the patients as a means of acquiring a leverage over them (Boric-Lubecke et al., 2014). The information mostly targeted are those of celebrities, employers, politicians, and journalists.

The basic approach to countering threats to privacy in healthcare is erecting policies against the act of violation and setting heavy fines against anyone who violates privacy rules. Organizations should also have continuous checkup of their system’s accessibility and employ trustworthy workers to man the system.

Section 2

Case 4.8: Emails Goes Astray

Question 1

The technician was in charge of the breach. The act of not checking the backlogged information before confirming who the email was sent to, suggests so. The other reason was the number of emails sent before realizing the mistake; the medical information of 858 of its members had compromised which is a high volume. Also, instead of reporting the problem to the superiors, the technician left the insurance company to deal with the mistake he had committed. Kaiser Permanente was not responsible for the breach as they even tried to correct and put the subscribers at ease as they handled their information. Under HIPAA privacy rule, the responsibility of health insurers and organizations is to be accountable to the disclosure of their patients and confidential communication. Therefore, Kaiser Permanente did the right thing of informing its subscribers about the technical challenges on the website. They also emphasized on the pretenders warning them in the case of such an issue.

Question 2

The breach will discourage subscribers from the Kaiser web due to reduced trust in confidentiality of the organization. People tend to learn or fear from others mistakes. The subscribers can be reassured by integrating a better system that requires constant change of passwords thus narrowing the margin of email being hacked and informing them. This also ensures that the company adjusts well to the need of the subscribers. Notifying them that they are securing the site for them will make them feel assured and valued. This goes hand in hand with reassuring them that their information is safe. Employing better technicians, to prevent incompetence at work and informing subscribers of the root of the problem after an investigation is essential as it informs the subscribers that the case was not completely forgotten and they are involved in the processes taking place in the organization.

Case 4.7: Patients Files Used for Obscene Calls

Question 1

Clinical centers should carry out background checks on all new employees before allowing access and employ them. It should be carried out by searching through their public records, private investigations, checking their websites and face to face interviews that requires a detailed history of all previous endeavors and checking if it all fits public record (Yüksel, Küpçü & Özkasap, 2017). The main benefits include increased in value of hire, prevents shame of employing criminals, ensures regulatory acquiescence; satisfies industrial standards, reduces chances of drug abuse and less absenteeism and improves workplace safety and security. Information that should be accessible to such employees should be petite. The technician should only be given access to names of patients and medical records under supervision. Allowing such minimal ensures that they do not get the personal information that can be used to irritate patients. The medical files would be required to conduct his work.

Question 2

There are multiple ways of preventing such a breach. The hospital could have performed a full background check on the technician which could have reduced the risk employing an incompetent individual. In the case study, the hospital had employed the technician yet he was previously convicted of indecent assault and child rape. The hospital should have regularly updated the accessibility passwords. The incident in the case study was due to a failure of updating password allowing for the access of the orthopedic technician even after he was fired. The hospital should have to conduct more frequent vulnerability assessments tests; monthly or every two months. Updating the software systems would also have prevented failure on alerting the people in charge of maintaining information systems. The hospital security system was responsible for the breach as it failed to inform the employees in charge of maintaining information systems.

Question 3

For the technician’s actions, the hospital should be held liable. The hospital was responsible for the employment of a rape offender and indecent assault, to begin with; they did not conduct background checks while hiring new employees. The security system of the hospital allowed the technician access even after he was fired. During his time as a technician, supervision was not provided giving him freedom of action. The hospital also granted access to personal confidential information to a technician, yet receptions and secretaries are the people supposed to possess such information. The hospital was not aware till the girl’s obscene calls were traced inside the hospital. The hospital information system, including employees, were incompetent as this could have been noted at early stages but it got to four months.

Case 4.44 University Tightens Computer Security

Question 1

The University Medical Center Information Systems are not vulnerable to hackers. As from the context the hacker who secretly used them to obtain a flood of e-mail for just advertisement purpose suggests that he or she was not interested in the medical information or records within the system. No information is recorded to be missing as reported by the spokesman. The main aim was to create flood email, and any of the superior computer systems would also have been an easy target. Hackers use an external server to avoid detection while sending emails or viruses like Trojan to render a given site useless. They look for the easy access mainframes to operate; in this case, the medical school computers were previously not as well protected the efforts done after the hack. To restore email system they spent $150,000 installation of new equipment and numbers of security measures were upgraded in the process.

Question 2

The health center is responsible for any harm that happens on patient health records. The spokesperson touched on the issue of improper access of information saying that none was obtained. This shows that the medical center should beef up the security of the information and prevent similar hacking cases from occurring in future. Medical centers are bound by Health Insurance Portability and Accountability Act, (HIPAA) rules to prevent disclosure privacy and security of the patients’ information, confidential communication. HIPAA privacy rule safeguards all identifiable health information of patients that is relayed by a covered entity or business associate. The university had the right of protecting its clients’ information against any hackers with the intention of violating the rules of privacy, as per HIPAA, within the medical center. Therefore, expenses on the installations were put across as well as an upgrade and prevent future hacking incidents.

References

Boric-Lubecke, O., Gao, X., Yavari, E., Baboli, M., Singh, A., & Lubecke, V. M. (2014, June). E-healthcare: Remote monitoring, privacy, and security. In Microwave Symposium (IMS), 2014 IEEE MTT-S International (pp. 1-3). IEEE.

Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4), 372-386.

Yüksel, B., Küpçü, A., & Özkasap, Ö. (2017). Research issues for privacy and security of electronic health services. Future Generation Computer Systems, 68, 1-13.

We can write this or a similar paper for you! Simply fill the order form!

Union Side Argument Paper Assignment

Union Side Argument
               Union Side Argument

Union Side Argument

Order Instructions:

Select Union or Management side and answer the following questions.

1. Summarize your opening statement.
2. Identify the strength and weakness of your case.
3. What questions could you ask in cross examination to assist in the presentation of your case.
4. How does the Oak and Dore test impact your position with respect to the no contact order.
5. What legal arguments would you make with respect to the discipline imposed.

SAMPLE ANSWER

UNION SIDE CASE ARGUMENT

Opening Statement

The Canadian Charter of Rights and Freedom confers on individuals the right to exercise freedom and association. The no-contact order violates Detective Sarah Conor’s privacy and infringes on her rights to freedom and association. Ms Conor should not have been punished for exercising her rights. Canada’s Department of Criminal Justice provides that no-contact orders may be issued at any stage in the criminal justice system until the offender has served his or her sentence. Mr Walter White has already served his term for the offenses committed and the police have no obligation to issue a no-contact order once the criminal justice process is complete.

Strengths of the case

  1. The Canadian Charter of Rights and Freedom protects individuals by allowing them the right to freedom and association. Ms Connor has the right to associate with Mr White without interference from the department. Individuals also have a right to privacy.
  2. No-contact orders apply during the criminal justice process as provided by Canada’s Department of Criminal Justice. By placing a no-contact order, the Police department violates Mr White’s right because he has already completed his term.

Weaknesses of the case

  1. Ms Conor failed to honor orders from her employer. Disobedience counts as work misconduct and her employer could use this as a defense for suspending and demoting her.
  2. In 2014, used PRIME police database to check Mr White’s criminal record. This was later discovered and Ms Conor reprimanded in writing for using PRIME for personal reasons. Ms Conor already has a record of misconduct.
  3. The police use their intelligence to identify factors that may influence security and case proceedings. In this case, Mr White’s intentions are unknown and there is a possibility that he wants to take advantage of Ms Conor’s position to influence case proceedings.

Cross examination questions examples

  1. In March 2014, Sergent Benson was assigned to the Professional Standards Unit of the department. Is that correct?
  2. On March 12, 2014, Ms Conor approached Sergent Benson to ask for advice about dating an individual who has a criminal record, correct?
  3. We can therefore state that Ms Conor was very open with her relationship with Mr White, right?
  4. The Agrestic Police Department Policy and Procedure I.C.75 which explains safety concerns for Agrestic Police department does exist, right?
  5. It is also true that the policy, despite being available has never been circulated to employees, correct?
  6. On April 22, 2014, the Chief received Mr Wood’s investigative report, correct?
  7. The report by Wood indicated that Mr White no longer had contact with any known criminals and was therefore not a security concern. Is that true?
  8. On April 21, despite having a report on Mr White’s clean criminal record, you went ahead and maintained the order against Ms Conor. Right?

Oak and Dore test

The Oak and Dore test does not impact my position with regard to the no contact order. This is because there is a pressing objective in regard to the violation of Canadian Charter of Rights and Freedoms. Secondly, the means is proportional, given that there is a rational connection between the means to the objective, a minimal rights impairment exists and proportionality exists between the objective and right infringement.

Legal arguments

In regard to the discipline imposed, I would make an argument based on the labor law, which calls for progressive disciplinary action and disciplinary actions that are proportional to the misconduct. The Canada Labour Code is a basis for argument and Section 36.1(1) provides that disciplinary action should only be imposed with a just cause. The Canadian Charter of Rights and Freedom also gives individuals rights to freedom of expression and association.

References

Canadian Charter of Rights and Freedoms. Retrieved from http://laws-lois.justice.gc.ca/eng/Const/page-15.html

Canada Labour Code. Retrieved from https://www.canlii.org/en/ca/laws/stat/rsc-1985-c-l-2/latest/rsc-1985-c-l-2.html?resultIndex=1#PART_I_INDUSTRIAL_RELATIONS_3876

We can write this or a similar paper for you! Simply fill the order form!

Board Paper Assignment Paper Available

Board Paper
Board Paper

Board Paper

Order Instructions:

I will attach documents which includes all the instructions, format of paper and some examples. Please, have a look on instructions and format with extra attention. Examples are a bit bigger then original paper should be, unless they show how paper should look like.

SAMPLE ANSWER

BOARD PAPER

Agenda Item: Exxon Mobil Oil Spillage.

Sponsor:

 

Draft Resolution:       A proposed resolution to renovate the transport system is needed to avoid further oil spillage. The continuous oil spillage into the Indian Ocean, is as a result of the poor conditions of the oil tankers. This spillage results in water pollution.

 

  • Executive Summary

This board paper is about the rampant oil spillage that occurs in the Indian Ocean[1] as Exxon Mobil company oil tankers transport oil to our African clients. This has resulted in catastrophic negative impacts to the environment and huge losses incurred by the company.  The paper is endeavoring to achieve a lasting solution to this situation and is therefore seeking the board’s approval to revamp the oil transport infrastructure.

  • Background

The current corporate social responsibility issue that we are facing as the Exxon Mobil Oil Company is the pollution of the ocean due to the recurring problem of oil spillage. The situation has escalated into unprecedented levels following the reported mass death of aquatic life and growth of water hyacinth and other troublesome water weeds as a result[2]. Coral reefs are also being reported to have been destroyed as spilt oil floats on the water thus blocking sunlight and oxygen from reaching aquatic life below[3]. The problem is being caused by the poor conditions of our oil tankers and lack of properly trained personnel to handle the situation. Our stakeholders who are mostly affected are our customers who live along the shores of the affected regions and depend on fish for their livelihood. The appendix provided below will illustrate this problem using some images that were taken recently to emphasis the predicament.

  • Recommendation:

The recommendations that were arrived at by the management involved the training of the current staff[4] on how to address such a scenario. The staff would also be trained on ways to ensure the oil tankers are in the best condition possible to avoid punctures and stalling of the ships. Another recommendation that was on offer was hiring qualified personnel but it was overlooked since the management concluded that it was more costly than training the existing staff. The other recommendation agreed upon was the acquisition of new and advanced oil tankers.

By implementing these recommendations, the management hopes to reduce the oil spillage and in the event of such a scenario, the staff will be in a position to deal with it appropriately.

  • Implications of non-action and of the recommendation:

The key stakeholders who will be affected are:

  1. Customers
  2. Shareholders
  3. Marine society

The customers will be affected in that they will see that our company complies with environment preservation regulations and thus they can have complete trust in our business practices. The shareholders will be positively affected too as the reduced oil spillage will consequently reduce loses and subsequently increase profitability. The marine society will be impacted the most as the marine life they depend on will be conserved[5]. The company’s strategy, mission and policies will be maintained and we shall also be in compliance with corporate governance. The CEO and the board will also avoid any liability on environmental degradation.

However, inaction on these recommendations will lead to huge losses for the company, more aquatic life deaths[6], uncontrollable water pollution and negative impacts on the society and the company’s reputation. Refer to appendix 2 for risk assessment and financial implications.

 

  • Appendices

Appendix 1- Risk Assessment Table

RISK DESCRIPTION LIKELIHOOD CONSEQUENCE IMPACT POTENTIAL
A Expensive oil tankers Risk of acquiring expensive oil tankers thus increasing implementation costs low low minor
B Legal constraints Risk of going against government regulations hence inviting lawsuits high high moderate

 

Appendix 2- Images of Oil Pollution

b) spilt oil burning
a) Capsized oil tanker
c) Negative effects on aquatic life
Marine society affected negatively.

 

Appendix 3- financial implications

Recommendation Estimated cost
Training the staff $ 1500
Acquiring new oil tankers $ 150,000

Bibliography

  1. Kadafa, A.A., 2012. Oil exploration and spillage in the Niger Delta of Nigeria. Civil and Environmental Research, 2(3), pp.38-51.
  2. Green, J. and Trett, M.W. eds., 2012. The fate and effects of oil in freshwater. Springer Science & Business Media.
  3. Owa, F.W., 2014. Water pollution: sources, effects, control and management. International Letters of Natural Sciences, 3.
  4. Al-Majed, A.A., Adebayo, A.R. and Hossain, M.E., 2012. A sustainable approach to controlling oil spills. Journal of environmental management, 113, pp.213-227.
  5. Doerffer, J.W., 2013. Oil spill response in the marine environment. Elsevier.
  6. Geraci, J. ed., 2012. Sea mammals and oil: confronting the risks. Elsevier

[1] Oil spillage is the number 1 cause for ocean pollution.

[2] Oil spillage leads to many effects on water.

[3] Oil kills aquatic life by blocking sunlight and oxygen from penetrating into the deep. Sunlight and oxygen are important for life to thrive underwater.

[4] Highly trained personnel are one of the ingredients for a sustainable approach to controlling oil spills.

[5] The marine environment and the people who depend on it will be the highest beneficiaries of reduced oil pollution.

[6] Sea mammals will die in large numbers leading to a negative effect on the ecology.

We can write this or a similar paper for you! Simply fill the order form!

Developing an Advocacy Campaign

Developing an Advocacy Campaign
       Developing an Advocacy Campaign

Developing an Advocacy Campaign

Order Instructions:

See e mail for course assignment and my research so far

SAMPLE ANSWER

Developing an Advocacy Campaign

Introduction

Obesity is one of the major public health challenges not only in the United States but also in most developed countries. The prevalence of obesity has increased due to the increased consumption of calorie-rich foods as well as a decrease of daily physical activity. Consequently, public health practitioners and policymakers have been compelled to come up with best practices and have the competencies to use legal agencies and laws to control the epidemic of obesity. For instance, regulations and statutes at the state and the federal level have been instituted to promote nutritional choices, encourage physical activity, access to healthy foods, and enlighten consumers about adopting healthy lifestyles (Imes & Burke, 2014). Therefore, it is important to note that the law plays a crucial role of controlling most chronic disorders such as obesity as well as the behaviors associated with these conditions. This paper will shed light on how the advocacy campaign for obesity control can be enacted by creation of new legislation and elaborate how existing laws can affect the advocacy.

Question 1: How proposed policy could be enacted 

Food Labelling Act

One of the ways of implementing the policy is through the use food labelling guides. This can be done by the aid of the Food and Drug Administrative (FDA) which is charged with the responsibility of ascertaining that foods sold in the United States are wholesome, safe, and properly labelled.  The FDA will pass a regulation of ensuring all foods produced locally as well as those imported have food labels that indicate content claims as well as certain health messages for consumers to comply with specific requirements. FDA should also liaise with research institutes so that they can determine the recommended calories that are required in most snacks that the public takes. They will then report their findings to the manufacturers informing them about what they should include in the snacks and legal consequences that will befall any manufacturing company that does not heed to the regulation.

Calorie labeling on restaurant menus

Legislations should also be enacted requiring restaurant menus and vending machines to be labelled properly to help consumers make informed healthy decisions regarding their meals or snacks. Studies by Swartz, Braxton & Viera, (2011) indicate that most individuals take approximately a third of their calories away from home.

Efforts to increase financing and access for fresh fruits and vegetables

Fruits and vegetables have been classified as important sources of essential nutrients such as vitamin, potassium, fiber, folate, and other vital phytochemicals. Policy makers should therefore design strategies aimed at increasing the access to quality fruits and vegetables. The strategies will ensure that the fruits are either fresh, canned or dried but must maintain a particular level of healthfulness. 

Education

Policymakers should also come up with a legislation that ensures that all schools have lessons that teach the students about diet and its consequences when not adhered to. Moreover, they should compel the ministry of education to use advertisements in popular TV stations or set up billboards about obesity and how to avoid it.

Question 2: How existing laws or regulations could affect the advocacy efforts

Most of the existing laws will facilitate successful implementation of the advocacy campaign. One such regulation is the National Hispanic Caucus of State Legislators of 2010 (Fana, Martinez & Burgos, 2010). This law points out that obesity has a detrimental impact on the economy of the country. This is because it causes discrimination, less productivity, and high mortality. The income generated annually thereby decreases. Therefore, both the enactment and advocacy work towards minimizing obesity.

The Let’s Move Campaign of 2010 started by the White House is another legislation that will really promote management of childhood obesity (Wojcicki & Heyman, 2010). The initiative enlightens the public about healthy choices, importance of physical activity, and access to affordable quality foods. All these objectives are in line with those that I intend to achieve through my advocacy plan.

Question 3

Legislators and policy makers are integral to implementation of the advocacy campaign against obesity. In order to successfully achieve this advocacy campaign against obesity, I should reach out to legislators as well as their allies and constituents who are able to influence their opinion on this important policy change. Legislators who are sympathetic to the advocacy campaign policy against obesity and are willing to collaborate with advocates can assist expand the network of support through recommendations, visits and calls. Identification of opinion makers and interaction with them is also vital as any dissenting voices can be persuaded to support the policy legislation process. The methods used to persuade legislators and policy makers include organizing for public hearings and discussions. These public hearings are formal ways of working closely and persuading members of the legislature to support the policy because of the participation of various stake holders and constituents. Open and substantive discussions are persuasive and usually have the jurisdiction and power to address the substance of the policy at hand. I can benefit from public discussions as an advocate because it encompasses the supportive opinions of all those involved as well as taking into account the dissenting opinions of critics with an aim of improving the policy. Public forums organized for presentations on the policy also can influence legislators to support the policy because of their ability to provide intimate details on the pros of the policy to the legislators (Zetter, 2014). Additionally, I can hold individual briefings and meetings with the legislators and policy makers. These briefings are designed to present an analysis of the facts of the proposed obesity policy. Meetings and briefings can also help persuade legislators by providing details of the policy in person and one on one discussion that are friendly. Telephone phone calls and letters can also be used as effective tools to influence legislators. They are designed to clearly articulate the objectives of the policy and acknowledge the legislator’s influence on the policy. The three legged lobbying which includes relationship, money, and public opinion can be used in persuading lawmakers. The public has an opinion about all aspects of policy change hence with the rise of Political Action Committees there is an aided effort that provides money for lobbying advocates to shape public opinion and hence influence the decision making of the legislators. The three legged can assist in the lobbying process because clamor for public attention by legislatures make the public bombard them with policy information hence persuading them for support.

Question 4: Obstacles

During the legislative process political factors as well as the structure of the parliamentary house can be an obstacle to the successful passage of the policy bill (Dodsonet al., 2013). Sometimes, political pressure due to hard-line party positions may prevent liberal minded legislators from supporting the bill. Any policy change is destines to fail without the necessary support. The legislature is a political house where resistance to certain policies will always arise. The policy change may also involve the tedious effort of changing the constitution as well as conflicting state laws hence making the process slow and tedious. To overcome this obstacle, good will and transparency with enhanced persuasion is necessary. Many at times, the government and advocates of the policy apply to address the members directly to persuade them otherwise. Additionally, incentives can be provided by advocates such as offering legislators positions in influential committees where they can shape opinion.

Big issue policy reform such as advocacy campaign on obesity is bound to attract a number of opinions and many voices that may confuse the need for policy reform. Schnakenberg, (2017) point out that all organizations, leading figures, and government officials will want to influence the process for personal and financial gains. Transparency and ethical issues where legislators demand for bribes and kickbacks can derail the process making the process non-objective. To overcome this there should be a transparent process where offenders and bribe-demanding legislators are investigated, charged and apprehended to serve as an example.

Conclusion

Indeed, obesity is a challenging public health problem. Therefore, developing a policy campaign through creation of new legislations in parliament can help reduce obesity in the society. The introduction and implementation of this policy against obesity has broadened the public health strategies concerning obesity. The legislation has greatly impacted the public health policy by various entities hence reduction in the number of people affected by this medical condition. These new legislative reforms involve a collective effort of persuading legislators to support the policy change.

References

Dodson, E. A., Stamatakis, K. A., Chalifour, S., Haire-Joshu, D., McBride, T., & Brownson, R. C. (2013). State legislators’ work on public health-related issues: what influences priorities?. Journal of public health management and practice: JPHMP, 19(1), 25.

Fana, C., Martinez, I., & Burgos, E. (2010). Hispanic Obesity: An American Crisis. National Hispanic Caucus of State Legislators: 2010 Policy Brief.

Imes, C. C., & Burke, L. E. (2014). The obesity epidemic: the USA as a cautionary tale for the rest of the world. Current epidemiology reports, 1(2), 82-88.

Schnakenberg, K. E. (2017). Informational lobbying and legislative voting. American Journal of Political Science, 61(1), 129-145.

Swartz, J. J., Braxton, D., & Viera, A. J. (2011). Calorie menu labeling on quick-service restaurant menus: an updated systematic review of the literature. International Journal of Behavioral Nutrition and Physical Activity, 8(1), 135.

Wojcicki, J. M., & Heyman, M. B. (2010). Let’s move—childhood obesity prevention from pregnancy and infancy onward. New England Journal of Medicine, 362(16), 1457-1459.

Zetter, L. (2014). Lobbying 3e: The art of political persuasion. Harriman House Limited.

We can write this or a similar paper for you! Simply fill the order form!

Short Answer Questions Assignments

Short Answer Questions
Short Answer Questions

Short Answer Questions

Order Instructions:

instruction in the first page of the assignment

Short Answer Questions:

  1. Compute various indicators of the state of the labour market using the following information. Please show all of your working. If you do not, you will receive zero marks for the question(s).
Demographic Group Number of Residents
Full-time workers 7,000
Part-time workers 2,000
Unemployed and looking for work 600
Unemployed and not looking for work due to

discouragement over job prospects

500
Not working due to disability 300
Not working due to retirement 900
Under the age of 15 3,000
Total Population 14,300

 

  1. (1 mark) What is the size of the labour force in this economy?

 

  1. (1 mark) Calculate the Labour Force Participation Rate for this economy. Report as a percentage to two decimal places.

 

  1. (1 mark) Calculate the Unemployment Rate for this economy. Report as a percentage to two decimal places.

 

  1. (1 mark) Suppose that the natural rate of unemployment is considered to be 5%. What is the rate of cyclical unemployment? Report as a percentage to two decimal places.

 

  1. Analyse the effects of the following events using the loanable fund market diagram where we have (real) interest rate on the vertical axis and the quantity of loanable fund on the horizontal axis. Please ensure to explain what happens to saving, investment and (real) interest rate.

 

  1. Consumers decide to save more to prepare themselves for the future (at any given interest rate). Assume the government budget balance is zero. (3 marks).

 

Answer here (Tips: to create new lines, simply copy the existing curves and move to the new location)

Real Interest Rate (r)

 

  1. A reduction of income tax rate by noting that the source of the supply of loanable funds coming from both private as well as public saving (3 marks)

Answer here (Tips: to create new lines, simply copy the existing curves and move to the new location)

 

Real Interest Rate (r)

 

  1. Watch the 10 minute video at gapminder.org/videos/what-stops-population-growth

Summarize the video in minimum of 5 sentences (Not in the bullet points, please!). What were the most interesting or surprising facts you learned? (3 marks)

(Answer

  1. Over the next 100 years real GDP per capita in Neverland is expected to grow at an average annual rate of 2.0%. Gotham (yes, where Batman lives!) is expected to growth at an average annual rate of 1.5%. If both have a real GDP per capita today of $20,000, compare their real GDP per-capita in 100 years. Please show all of your working. If you do not, you will receive zero marks for the question(s). (2 marks)

(Answer)

  1. The level of government debt is a growing concern for the current Australian Treasurer who has the responsibility of managing the government budget. Summarise the key arguments on the debate around Australian government debt and deficit for the Turnbull government.

Your summary must address the following; what is the major concern of running government deficits, what is the economic reasoning to have a balanced budget and when might a budget deficit/surplus be ok? Conclude by briefly discussing what policies you would suggest to Scott Morrison implements in order to balance the budget and why. The summary should be at least half a page in length (again, please do not write in the form of the bullet points). No need to list the reference, but please do not copy and paste from whatever you found on the web. We can easily detect this in our system! (5 marks)

(Answer)

SAMPLE ANSWER

Introduction

The labour market is one of the pillars of global economy. This means that all aspects surrounding the labour market should be managed properly. Labour force, participation rate, unemployment rate and rate of cyclical employment are some of the aspects surrounding labour markets (Thompson 2013, p.34). From demographic information, these aspects can be calculated easily.

 

The table below contains labour market information. The information has been used in various calculations.

 

Demographic Group Number of Residents
Full-time workers 7,000
Part-time workers 2,000
Unemployed and looking for work 600
Unemployed and not looking for work due to

discouragement over job prospects

500
Not working due to disability 300
Not working due to retirement 900
Under the age of 15 3,000
Total Population 14,300

 

  1. The labour force in this economy

Labour force refers to the part of a population that is able to work; employed or seriously looking for work. From the information provided in the table above, the economic labour force is as follows.

Economic labour force = full-time workers + par-time workers + unemployed and looking for work

=7000+2000+600= 9600

  1. Labour force participation rate for this economy

Adult Population = Total population – Under the age of 15

This is equal to 14,300 – 3,000 = 11,300

Labour force participation rate =  x 100 =   x 100 = 84.96%

  1. The Unemployment rate for this economy

Unemployment rate is given by

x 100 =     6.25%

  1. The rate of cyclical unemployment
  • Natural rate of unemployment of 5%.

Rate of cyclical unemployment is given by:

Actual Unemployment rate – Natural rate of unemployment

This is equal to    6.25% – 5% = 1.25%

  1. Analysis of events using the loanable fund market diagram
  2. Consumers decide to save more to prepare themselves for the future (at any given interest rate). Assume the government budget balance is zero.

 

 

Real Interest Rate (r)
Supply1

                                   Demand2

Supply2

Demand1

E2

Quantity of Loanable Funds (Q)
Q1                         Q2

Size of loanable funds shifts right and the real interest(r) rates goes down. A reduction in interest rates catalyses the economy as many investors are attracted to invest which in the long run pushes the rates up

A reduction in the rate of income tax by noting that the source of the supply of loanable funds coming from both private as well as public saving

 

Real Interest Rate (r)

 

E1

                              Demand2

 

Demand1

E2

r2

Quantity of Loanable Funds (Q)
Q1

 

Q2 

Reduction in income tax expands the income of the public and private sector. This leads to reduced demand for loanable funds hence the curve shifts left while the interest rate goes down

  1. A summary of a 10 minute video available at

 www.gapminder.org/videos/what-stops-population-growth

The summary is highlighting the most interesting facts therein.

Hans Rosling explains that poverty has been a catalyst of population growth in developing countries in his explanation using the bubbles in the box theory. In this theory, he projects that the industrialized population in 2050 will be 2 billion. He states that control of mortality rate and introduction of family planning methods are critical aspects in controlling population increase. He further states that governments and private sectors should invest dearly in industrialization to make families stay engaged in their operations and remain in the course of owning a car rather than a bicycle. He finally warns that the population poverty levels are likely to go up if growth oriented measures are not put up. This theory is important as it acts as a benchmark for governments in planning and focusing on economic tools to look at in satisfying their citizens.

  1. Assuming that a nation is reporting GDP of dollars a, and experiences a change of b per annum, the GDP achieved after c years is as follows.

$a× (1+ 0.0 b) c

It is assumed 0 ≤ b < 10

If real GDP per capita in Gotham grows at an average annual rate of 2.0%, real GDP per capita in 100 years will be:

[$20,000 × (1 + 0.02) 100] =$144,893

At an average annual rate of growth of 1.5%, real GDP per capita in Neverland in 100 years will be:

[$20,000 × (1 + 15/1,000)100]= $88,641

Although the two nations have equal GDP currently, Neverland’s growth rate is 61.2% of Gotham’s growth in living stands. This is calculated as below.

× 100% =61.2%

  1. Summary of the key arguments on the debate around Australian government debt and deficit for the Turnbull government.

 

A government’s deficit is a key phenomenon in many developing countries and few developed countries. Deficits are usually brought about by current or past governments spending more than their total revenue collections. A country’s inability to fund its development activities after settling its recurrent expenditure is the ideal explanation of budget deficit. This situation is a common definition of crisis in economy that leads to economic slump. Additionally, this ends up causing increased unemployment rates thus promoting criminal actions. This condition has created hot air which has made economists elucidate on the reasons why there should be unwavering concern about budget deficits. The key grounds touch on economic stress which causes death of industries. This leads to poor growth in a country as citizens cannot afford much in their life. It is worth noting that the poverty line is the lowest threshold in which one cannot afford daily meals. Unavailability of sustainable budget pushes the government to issue cheap bonds which is a major cause of making the private sector get deprived of capital. If the government in authority is unable to control this effect, it results into inter-generational transfer of debt thus crippling a country’s ambitions of development in the future. Balanced government budget is phenomenal as it creates a favourable atmosphere for sourcing funds in the international market. It also frees the government thus giving it an opportunity finance development projects thus catalysing economic growth. A balanced budget after continued period of investment results into budget surplus which is an important economic condition. This allows a country to engage in economic research and explorations on how to improve the economy and how to invest abroad in other developing countries which further expands its budget and promotes recreational activities. This being the case, Scott Morrison should put in place budgetary policies. The policies should focus on monetary measures to control the amount of money in circulation and fiscal policies by controlling the borrowing rates as well as encouraging the public to participate in maintaining the economic.

References

Thompson, S (2013), Global Labour markets, (Online) Retrieved from http://search.proquest.com/business/docview/194164649/A352F7CD585E4050PQ/15?accountid=45049    , Last Accessed 18th  April, 2017

We can write this or a similar paper for you! Simply fill the order form!

An ethical dilemma Case Study Assignment

An ethical dilemma
                    An ethical dilemma

An ethical dilemma Case Study

Order Instructions:

Kindly view the attached

SAMPLE ANSWER

An ethical dilemma

Introduction

Ethical conflicts have been a subject of concern and in discussions in many science disciplines.  Due to the advancement in medical practice and technologies, the healthcare providers often face challenges to make appropriate decisions especially in situations where complex situations may arise in practice (Fisher, 2011). This essay discusses ethical conflicts where the healthcare providers are torn between respecting patient’s rights and doing no harm ethical principle. The discussion helps one to understand healthcare ethics and law and their relevance in decision-making processes that ultimately uphold patient’s rights and protects them from danger (Beauchamp & Childress, 2013).

This paper explores Case Study 1 to identify the ethical conflict present in the case study. The essay will also explore the ethical and legal aspects of the identified ethical conflict in relation to ethical theories, principles of health care, professional code of ethics, professional standards of conduct as well as the national and international charters. The context analysis will be done so as to provide an appropriate solution to the identified ethical conflict.

Case study 1: 

This case study is about an adult patient who has ended –stage cancer. Mr. Harry Nelson has exhausted all the treatment options and is currently receiving palliative care at his home, where he lives with his daughter.  He has no advanced care directives. When his health deteriorates, he refuses to go to the clinic which forces his daughter and the paramedic’s team to transport Mr. Harry to the clinic forcefully (Paramedics Australia, 2011).

Through this case study, the impact of ethical principles autonomy, beneficence, nonmaleficence, and justice during decision-making processes is evaluated. In addition, the concepts of utilitarian and consequentialism ethical theory will be used to explore the  impacts of Paramedics Australia professional code of conduct, Australian Nursing and Midwifery Council professional standards, national and international charters (Statute law and Common law, Australian Charter of Health Care, Universal Declaration of Human Rights (UDHR) in ethical decision making processes.

Ethical conflict

The ethical conflict central to this case study is autonomy vs. beneficence and nonmaleficence (save a life vs. respecting patient’s rights).  In this case, the healthcare professionals intentionally used the paternalistic approach during the decision-making the process as they believed that this was the most beneficial approach to Harry and his family. Although the intervention seemed to be useful for the patient, it breached the ethical principle of autonomy by disrespecting the patient’s wish.  Such situations require that the health care to critically analyze the benefits and risks associated with their decisions, along with the consequences associated with the decision making process. The decision made should be the one that promotes maximum beneficence and with the most minimal harm (Jones & Creedy, 2012).

Legally and ethically defensible approach that address the ethical conflict

Nursing profession in Australia is influenced by the four bioethical principles developed by Beauchamp and Childress including; a) autonomy-  need to respect patients rights, b) beneficence –  do good  to prevent harm, c) non-maleficence –  avoid causing harms and d) justice-  fair distribution of resources to ensure equal and fair treatment to all clients (Banks & Gallagher, 2009).  In this case, the principle of autonomy applies in terms of patient’s rights and obligations. Based on this principle, Harry has the right to make decisions about their medical treatment. According to Beauchamp and Childress, autonomy refers to as being “free from controlling influences or personal limitations such as inadequate understanding” (Beuchamp & Childress, 2013, p.56). Therefore, the healthcare provider is obliged to remain truthful (veracity) to their clients and to respect their choices. Relating to the case scenario, the healthcare team that transports Harry to the hospital against his will violates this ethical principle by not respecting the patient last wishes and therefore Harry has no choice to decide for himself which inhibits his autonomy (Kerridge, Lowe  & Stewart, 2013).

Further analysis of the scenario, Harry’s daughter, and the medical team decision to forcefully transport his father to the hospital raises the questions about the family’s intention. Evidently, her intentions are good and this brings up the ethical principle of beneficence and no-maleficence. The ethical principle of beneficence mandates the healthcare professionals to treat their patients in a manner that is of maximum benefit to the patient (Australian Medical Association, 2004). On the other hand, the ethical principle of nonmaleficence assures that the actions of the healthcare providers do not cause harm. This basically implies that the main responsibility of the healthcare providers is to avoid doing any harm to their patients.  This ethical principle correlates with the ethical theory of utilitarianism which argues that the healthcare professional’s actions should provide “highest good for a maximum number of people” (Berglund, 2012).

Utilitarianism theory supports the idea of taking actions that offer maximum benefits at minimized risks and costs (Tonti-Filipini, 2011).  In this situation, the health care provider’s decision to transport Harry to the hospital for more treatment favors the intention of the family members but it does not favor Harry’s decision but it may positively impact the psychological well-being of the patient. This act outweighs the ethical principle of autonomy in regards to the nurse obligations to non-maleficence. However, this act may negatively affect the patient-physician relationship and may lose the trustworthy relationship with the patient. In addition, forcing the patient into treatment may make him depressed and could lead to serious mental complications such as suicidal attempts. In this case, the principle of beneficence may prove to be of benefits but the probability of causing harm is high (Doran et al., 2015).

The ethical principle of justice focuses mainly on equality and fairness in the distribution of the healthcare resources. There are different forms of justice including rights based justice and distributive justice. In rights-based practice, the principle states that every person has the right to access care plan (Catholic Health Australia, 2001).  In this situation, the healthcare team violates Harry rights because he was forced to participate in care plan without his consensus. This is an ethical conflict because the patient had no limitations that he would not be able to make an informed decision. Based on the consequentialism theory, the healthcare provider’s action was appropriated as the consequences of taking Harry to the hospital was the choice that was likely to yield more net benefit as compared to loss (Tonti-Filipini, 2011). Therefore, this theory justifies the acts of overriding patient’s decision to refuse further treatment as Harry’s decision could have resulted into serious harm (Townsend & Luck, 2013).

Every nurse primary commitment is to the patient, and their main role is to advocate for the patient’s rights, with the aim of protecting patient’s health and safety. A nurse is expected to maintain professional’s integrity during care delivery.  This is supported by Universal Declaration of Human Rights (UDHR) which mandates that healthcare providers should deliver care based on the patient’s needs and with unrestricted considerations of class, personal attributes, economic status, or the nature of the disease (AHPRA, 2012).  Based on these nurse values, the healthcare provider decision to forcefully transport Harry to the hospital for further treatment was appropriate. However, on this value, the nurse owes the same duties to the patient including maintaining cultural competence and to preserve integrity when determining the appropriate action and consistent with their obligations to provide optimum care. This value was violated by the nurse actions as they are expected to practice with compassion and to respect patient’s dignity (Freegard, 2012).

Australian Charter of Healthcare states that healthcare providers are also expected to conduct themselves in accordance with the relevant laws relevant to the nursing practice. The professional standards nursing and Midwifery Board of Australia outlines the professional codes of conducts. Nurses are expected to deliver safe and with competence. In addition, the nurses are also expected to respect culture, dignity, values and beliefs of the person receiving care (Australian Nursing and Midwifery Council, 2008). They are expected to promote and to preserve the trust as well as the privilege the inherent in the relationship between the people receiving care and the nurses. In addition, healthcare providers are required to deliver care to any person who is need of the care and anyone who refuses to deliver it commits a crime and is liable to imprisonment.  They are mandated to work in good faith and without any recklessness. This rule is established by the Medical Practitioners Act 1938 (NSW) and the current Health Practitioner Regulation National Law Act which states that it is illegal for any health care provider who fails to deliver satisfactory care without any reasonable cause, unless the healthcare provider proves that they have taken all reasonable steps to save the patient and within a reasonable time (Australian Health Practitioner Regulation Agency (AHPRA, 2012).

All treatment procedures normally require consent, but there are key legal factors that determine of a person can receive treatment without consent including; a) the patient’s mental health capacity, b) if there is advance care directives, c) the degree of urgency based on the patient’s health and situation and d) if there a substitute decision –maker (usually a relative) is present and is able or willing to make the decision (Forrester & Griffiths, 2015).  Where the patient is unable to give consent or substitute decision is absent, this legal requirement is usually waived under the Statute law and Common law. In this situation, the principle of patient autonomy is outweighed by the Common Law (Atkins, de Lacey & Britton, 2014). This is because, Under the Common Law, a health care provider is expected to deliver urgent treatment to the patient, if the healthcare provider acts honestly and reasonably believes that the treatment provided is needed to prevent serious complications to the patient’s health.  In addition, the healthcare provider’s decision is supported by the principle of necessity in Common Law. This principle justifies a healthcare provider actions of giving treatment even in the situation where the patient’s condition is not life threatening and also without the patient’s consent (Australian Commission on Safety and Quality in Health Care, 2012).

Analyzing context and proposing a solution

In my opinion, there is no perfect answer for the identified ethical conflict. It is not easy to reach a perfect situation, but the situation can be analyzed using ethical decision-making process and by applying the best possible principle. However, it is evident that two ethical principles conflict; beneficence or non-maleficence vs. autonomy (Fisher, 2011). Nurse’s action to respect patient’s autonomy implies that she or he is accepting the patient’s decision and in other words, increasing serious harm to occur. However, the healthcare in-charge carried out actions against   Harry’s expressed wishes which would be expected to result in the ‘net benefit’ of improving his health condition and quality of life (Forrester & Griffiths, 2015).

Reinforcing this action is nurse professional standards that emphasize that the primary nurse duty is to help and save lives (Fisher, 2011). Although the professional conduct of ethics asserts that the appropriate course of action should be chosen on behalf of the patient (with or lacking capacity) should be in line with the patient’s beliefs and values so as to promote their autonomy and to act in their best interests, but in this situation, the resulting consequences would have been harmful to the patient (Ozolins, & Grainger, 2015). Therefore, it would have been morally right to override Harry’s decision. However, one fundamental aspect of a nurse role is advocating for patient’s  rights, making sure that they are adequately informed, supporting and respecting their decision (accept or decline treatment) and to involve them when making decisions about their care. In cases where there are disputes, then it would be advisable to obtain legal guidance from the courts. In a case where a decline of care would lead to serious harm to the patient, the professional guidance is crystal clear that the patient’s wish must be respected (Morrison, & Furlong, 2014).

Conclusions

The complexities of healthcare practice are increasing as the health care sector continues to evolve. This case study provides useful insights into the nature of ethical dilemmas faced by the healthcare providers in their daily practice. Therefore, it is important to understand the ethical and legal frameworks governing decline of treatment and capacity. This case study has helped me understand the role of nurses when making ethical decisions and the importance of upholding patient’s rights while preventing doing harm.

References

Atkins, K., de Lacey, S. & Britton, B. (2014). Ethics and Law for Australian Nurses (2nd ed.). Port Melbourne: CUP.

Australian Commission on Safety and Quality in Health Care (2012). Safety and quality improvement guide standard 6: Clinical handover ACSQHC, Sydney. Retrieved from <www.health.gov.au>

Australian Health Practitioner Regulation Agency (AHPRA). (2012). AHPRA definitions. Retrieved from <http://www.ahpra.gov.au/Support/Glossary.aspx#P>.

Australian Nursing and Midwifery Council (2008). Code of ethics for nurses in Australia. ACT: Australian Nursing and Midwifery Council. Retrieved from http://www.nursingmidwiferyboard.gov.au/Codes-Guidelines-Statements/Codes-Guidelines.aspx

Australian Medical Association (2004). AMA Code of Ethics. Retrieved from: https://ama.com.au/position-statement/ama-code-ethics-2004-editorially-revised-2006

Banks, S., & Gallagher, A. (2009). Ethics in professional life: Virtues for health and social care. Basingstoke: Palgrave Macmillan.

Beauchamp, T. L., & Childress, J. F. (2013). Principles of biomedical ethics (7th ed.) New York: Oxford University Press.

Berglund, C. A. (2012). Enter the patient. In C. A. Berglund (Ed.), Ethics for health care (4th ed.) (pp.71-97). South Melbourne, Vic: Oxford University Press

Catholic Health Australia. (2001). Code of ethical standards for Catholic health and aged care. Retrieved from  http://www.cha.org.au.

Doran, E., Fleming, J., Jordens, C., Stewart, C. L., Letts, J., & Kerridge, I. H. (2015). Managing ethical issues in patient care and the need for clinical ethics support. Australian Health Review, 39(1), 44-50. doi: 10.1071/AH14034

Fisher, A. (2011). Catholic bioethics for a new millennium. Cambridge: CUP.

Forrester, K.,  & Griffiths, D.  (2015). Essentials of Law for Health Professionals (4th ed.). Sydney: Elsevier

Freegard, H. (2012). Ethical practice for health professionals. (2nd ed.). Melbourne: Cengage.

Johnstone, M. (2016). Bioethics: A Nursing Perspective. (6th Ed.). Chatswood, NSW: Elsevier.

Jones, K., & Creedy, D. (2012). Health and human behavior (3rd ed.). South Melbourne, Vic: Oxford University Press.

Kerridge, I., Lowe, M., & Stewart, C. (2013). Ethics and Law for the Health Professions (4th ed.). Sydney: The Federation Press.

Morrison, E., & Furlong, E. (2014). Health Care Ethics: Critical Issues for the 21st Century. (3rd Ed.). Sudbury. MA: Jones and Bartlett

Ozolins, J. T. & Grainger, J. (Eds.). (2015). Foundation of healthcare ethics: theory to practice. Port Melbourne: Cambridge University Press

Paramedics Australasia (2011). Australasian Competency Standards for Paramedics. Ballarat, Vic. Retrieved from http://www.paramedics.org/content/2011/10/PA_Australasian-Competency-Standards-for- paramedics_July-20111.pdf

Tonti-Filipini, N. (2011). About bioethics: Philosophical and theological approaches. Ballan: Connor Court Publishing.

Townsend, R., & Luck, M. (2013). Applied Paramedic Law and Ethics: Australia and New Zealand. Chatswood: Churchill Livingstone.

We can write this or a similar paper for you! Simply fill the order form!

Multi Choice Questions Assignments

Multi Choice Questions
Multi Choice Questions

Multi Choice Questions

Order Instructions

I have 50 multiple choice  questions – that have a answer of 9 answers you must correctly answer them

EMC&W – ethics multicultural competence and wellness
A = attending behaviour
O = observation
OQ = open questions
CQ = closed question
E = encourage
P = paraphrasing
S = summarising
R OR F = reflection or feeling

SAMPLE ANSWER

Multi Choice Questions

  1. S (Summarizing)
  2. R or F (Reflection or feeling)
  3. P (Paraphrasing)
  4. R or F (Reflection or feeling)
  5. P (Paraphrasing)
  6. A (Attending behavior)
  7. EMC & W (Ethics multicultural competence and wellness)
  8. E (Encourage)
  9. P (Paraphrasing)
  10. P (Paraphrasing)
  11. P (Paraphrasing)
  12. EMC & W (Ethics multicultural competence and wellness)
  13. P (Paraphrasing)
  14. S (Summarizing)
  15. E (Encourage)
  16. S (Summarizing)

SESSION 2

  1. A (Attending behavior)
  2. P (Paraphrasing)
  3. S (Summarizing)
  4. E (Encourage)
  5. S (Summarizing)

SESSION 3

  1. O (Observation)
  2. P (Paraphrasing)
  3. S (Summarizing)
  4. P (Paraphrasing)
  5. O (Observation)
  6. O (Observation)

SESSION 5

  1. P (Paraphrasing)
  2. P (Paraphrasing)
  3. S (Summarizing)
  4. S (Summarizing)
  5. S (Summarizing)

SESSION 8

  1. R or F (Reflection or feeling)
  2. EMC & W (Ethics multicultural competence and wellness)
  3. P (Paraphrasing)
  4. P (Paraphrasing)
  5. O (Observation)
  6. P (Paraphrasing)

SESSION 9

  1. O (Observation)
  2. CQ (Closed Question)
  3. CQ (Closed Question)
  4. OQ (Open Question)
  5. E (Encourage)

SESSION 12

  1. R or F (Reflection or feeling)
  2. EMC & W (Ethics multicultural competence and wellness)

We can write this or a similar paper for you! Simply fill the order form!