The effects of OTT players on the mobile operators

The effects of OTT players on the mobile operators
The effects of OTT players on the mobile                                     operators

The effects of OTT players on the mobile operators

Order Instructions:

Dear all,

Reference to the on going project we are working on:

Please refer to the order number:
113162 for the project proposal
113311 for the literature review

Now i want you Please to start working on the introduction or the chapter one, please make sure to use the same references you used in the proposal and the literature review, as soon as this part will be ready we will start the last chapter for the methodology and the data collection.

– Please find below the instructions for this chapter:

1- we need to show couple of diagrams in the introduction.
2- Introduction should cover the literature review.
3- the research questions will as follows:
a) What are the OTT players/ providers.
b) How they are affecting the mobile operators?
c) what are the strategies applies by the Mobile operators?
4- what is my hypothesis?
5- the methodology used will be qualitative through interviews top management in couple of the mobile operators, quantitative survey for the consumer on using the OTT rather than the service from the operators.

PLEASE CONTACT ME FOR ANY CLARIFICATION AND HELP ME TO PASS THIS SO THAT WE CAN START THE THIRD PART.

SAMPLE ANSWER

Abstract

OTT players have been considered a potential threat to the telecom companies. Mehrotra & Kumar (2014, p.169) argue that the OTT players have the tendency to provide services across all IP networks. The mobile operators find that it is hard to compete with the actors because they provide services that are value added. With the development of technology such as adoption of tablet computers and smartphones, the players have become more advanced than their counterparts’ telecom mobile operators. The OTT players include Internet-based alternatives such as WhatsApp and Skype (Tsai, Lee & Yu 2009, P.210). The OTT players also include third-party content and social networking firms such as Facebook and YouTube. Their effects are alarming as there is a considerable fall in revenues on the side of the mobile operators (shown in diagram 1). Usually, their (OTT players) operations are not under the administrative control of the content of the service giver. The players have drastically affected conventional telecom services, particularly SMS and voice. OTT messaging is projected by Adejuwon (2013, p.51) to surpass SMS in 2012 (shown in diagram 2). The effects have caused the mobile operators to work ineffectively. For instance, the players have started to use data to supplement loss.

Park, Jung & Noh (2014) and Sheehan (2010) argue that the mobile operators are in a ferocious cycle of confusion. The mobile operators are viciously engaging in investing much of their considerable money and time searching how to provide similar web services models for the altered telecom customers. Noticeably, the business models used by mobile operators and OTT players are quite different. Observably, the OTT players generate their income from advertising and the sale of the content or services they provide. Martinaitis & Rogoža (2015) argue that the revues from advertising are satisfactory to the players since they tend to have a larger churning subscriber base. This is apparent because the customers can switch between products whenever they want. Therefore, the client has a direct correlation with the OTT players and is free to contact subscriptions from any place, at any given time, and using any available technology.

Research background

The literature review gives that the mobile operators have been devising the mechanism to decrease the competition from the players. The mobile operators have been focusing on leveraging their primary business of selling data, thereby projecting to increase their walled market share (Kreutzer & Land 2014). The mechanism used in leveraging is by decreasing the content and service to those subscribers who use their products (Smith 2014). In addition, the leveraging takes the shape of offering the best quality of service to its customers. This method is mostly defensive.

One of the strategies to be improved to lessen the deep scars of OTT players on the mobile operators is by developing new ecosystems. Nelder (2011, p.204) and Stage & Wells (2013, p.6) argue that the mobile operators can facilitate new ecosystems and advances. This is possible because the operators can use the network infrastructure to expose APIs (application programming interfaces) correlated to their pieces of equipment (Keefe 2009). The net effects will be that the mobile operators will create innovative services that could connect into multifaceted infrastructure. In addition, the operators will be able to provide value-added services to communications (Leah 2014). Commendably, the operators will also be able to give application-based communication services.

The next strategy is to ensure that their (mobile operators) products are of high quality and have service reliability (Star 2014, p.239). Relating that the operators enjoy the ownership and control of the network, it can be able to ensure that it services meets reliability and quality for its respective subscribers. Observably, the mobile operators own as well as control the billing correlation (Jimenez-Castillo & Sanchez-Perez 2013, p.19). Therefore, it can use this opportunity to charge subscribers for the use of OTT services. This process can be affected through the monthly subscription or based on the per-event basis (JHO 2013). Furthermore, the operators can take advantage of the market by comprising free access to these OTT players as a component of a serving price plan, which will comprehensively include SMS, data, and voice minutes. Deregulation of markets can be enhanced to make sure mobile operators operate efficiently (Harris 2009, p.208). Apparently, the performance of mobile operators is retarded by rigid regulations in most countries. Therefore, they are unable to flex their innovations to compete with the OTT players. In addition, going digital can be enhanced to make sure that they use the most sophisticated methods to compete in the digital market (Adejuwon 2013, p.56). Going digital imply the adoption of technological advancements that can have equal or more production to those of OTT players.

Diagram 1: how share traffic volume is shared in LTE networks (Gates, Milgrom & Robert 2009, p.427)

Diagram 2: The percentage usage of the application mobile data traffic by a device type in 2012 (Dowling, Boulton & Elliott 2010, p.208)

Research aim statement

The purpose of this research is to examine how the mobile operators in the telecom industry can address the effects of OTT players.

Research Objectives

The following research seeks to achieve the following:

  1. Determine the effects of OTT players on the mobile operators
  2. The strategies the mobile operators have been using to counteract effects from OTT players

III.       Find out the best solution to handling the effects of OTT players

Significance of the research

The study aims at finding the extent at which the OTT players have affected mobile operators. Research also aims at giving the appropriate solutions on how to handle the effects of the OTT players (Carlson, Vincent, Hardesty & Bearden 2009, p.864). This is because the pieces of the literature failed to provide the best solution to deal with effects of the OTT players. There is a call in the literature review for further research to investigate how the mobile operators can strategize itself to weather the storms of OTT players non-defensively (Car, Pilepić & Šimunić 2014, p.207). This is because the pieces of literature appeared to concentrate much on the defensive strategies to deal with the situation. The defensive strategies include limiting access to the network and other mechanisms (Azzara 2010). The research will aim to find how non-defensive strategies such as collaboration can make the mobile operators rejuvenate their sales.

Delimitation

The research aims at studying two hundred and thirty top management persons in the couple of the mobile operators (Almossawi 2012, p.139).

Research methodology

The methodology used will be qualitative through interviews top management in couple of the mobile operators, quantitative survey for the consumer on using the OTT rather than the service from the operators (Mitchell & Jolley, 2010). The quantitative research will be an impact to give the exact figure the OTT players has affected with the mobile operators Zachariadis, Susan & Michael 2013).

References

Adejuwon, O 2013, ‘Sources of Organizational Legitimacy in the Nigerian telecommunications Industry,’ African Journal of Business & Economic Research, Vol. 8 Issue 2/3, p51-83 retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

ALMOSSAWI, M.M., (2012). Customer Satisfaction In The Mobile Telecom Industry In Bahrain: Antecedents And Consequences. International Journal Of Marketing  Studies, 4(6), Pp. 139-156, retrieved from EBSCOhost Database: Business                         Source Complete on 07.09-2015.

Azzara, C. V. (2010). Questionnaire design for business research: Beyond linear thinking–an interactive approach. Mustang, OK: Tate Pub & Enterprises Llc.

Car, T, Pilepić, L, Šimunić, M 2014, ‘MOBILE TECHNOLOGIES AND SUPPLY CHAIN MANAGEMENT – LESSONS FOR THE HOSPITALITY INDUSTRY,’ Tourism &       Hospitality Management, Vol. 20 Issue 2, p207-219, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

CARLSON, J, VINCENT, L, HARDESTY, M, BEARDEN, O 2009, ‘Objective and Subjective Knowledge Relationships: A Quantitative Analysis of Consumer Research   Findings’,  Journal of Consumer Research, Vol. 35 Issue 5, p864-876.

Dowling, M, Boulton, W, & Elliott, S 2010, ‘Strategies for Change in the Service Sector: The Global Telecommunications Industry,’ California Management Review, Vol. 36 Issue 3, p57-88.

Gates, S, Milgrom, P, Robert, J 2009, ‘Deterring Predation in Telecommunications: Are    Line-of-business Restraints Needed?’,  Managerial & Decision Economics, Vol. 16   Issue 4, p427-438, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Harris, R 2009, ‘Telecommunications Policy in Japan: Lessons for the U.S.,   California Management Review, Vol. 31 Issue 3, p113-131, retrieved from EBSCOhost      Database: Business Source Complete on 07.09-2015.

JHO, W. (2013). Building Telecom Markets: Evolution Of Governance In The Korean Mobile Telecommunication Market, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Jimenez-Castillo, D, & Sanchez-Perez, M 2013, ‘Integrated market-related internal communication: development of the construct’, International Journal of Market Research, Vol. 55 Issue 4, p2-19. 18

Http://Dx.Doi.Org/10.1007/978-1-4614-7888-1.

LEAH, M. (2014). The EU Approach To Net Neutrality: Network Operators And Over-The-Top Players, Friends Or Foes. Computer Law & Security Review, 30(5), 508-520, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

KEEFE, H. (2009). Is Digital Technology Reshaping Employment Systems In The U.S. Telecommunications Network Services? Industrial & Labor Relations Review, 63(1), P42-59, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

KREUTZER, R., & LAND, K.-H. (2014). Digital Darwinism: Branding And Business Models In Jeopardy, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Martinaitis, V, Rogoža, R 2015, ‘Quantitative estimation of improvements in the efficiency of district heating substation control system’, Building Services Engineering Research & Technology, Vol. 36 Issue 4, p455-468, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

MEHROTRA, R. and KUMAR, S., (2014). A Comparative Study Of Customer Relationship      Management In Telecom Industry In Rajasthan. Asia Pacific Journal Of Management & Entrepreneurship Research, 3(1), Pp. 169-178, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Mitchell, M. L., & Jolley, J. M. (2010). Research design explained. Australia: Wadsworth.

Nelder, J 2011, ‘Quantitative In Context’,  Journal of Advertising Research, Vol. 51, p204-206, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Park, K, Jung, K, & Noh, K 2014, ‘Strategic action and customer mobility: Antecedents and  consequences of strategic actions in the Korean mobile telecommunication service  industry, Asia Pacific Journal of Management. Mar2014, Vol. 31 Issue 1, p171-193,retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

SHEEHAN, M. (2010). Why Is Ramsey Pricing: The Case Of Telecommunications Regulation. Journal Of Economic Issues (Association For Evolutionary Economics). Vol. 25(1), P21-32, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Stage, F, Wells, S 2013, ‘Critical Quantitative Inquiry in Context’, New Directions for Institutional Research, Vol. 2013 Issue 158, p1-7, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Star, M. (2014). Qualitative and mixed methods research in economics: surprising growth, promising future. Journal of economic survey, 28(2), 238-264, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

Smith, T 2014, ‘Testing Theory And Related Factors For Influencing Proficiency In Quantitative Research’, Academy of Educational Leadership Journal, Vol. 18 Issue 4, p117-128, retrieved from EBSCOhost Database: Business Source Complete on 07.09-2015.

TSAI, H., LEE, H., & YU, H. (2009). Developing The Digital Content Industry In Taiwan. Review Of Policy Research, 25(2), P169-188, retrieved from EBSCOhost Database:Business Source Complete on 07.09-2015.

Zachariadis, M., Susan, S., & Michael, B. (2013). Methodological implications of critical realism for mixed-methods research, MIS Quarterly, 37(3), 855-879., retrieved from   EBSCOhost Database: Business Source Complete on 07.09-2015.

We can write this or a similar paper for you! Simply fill the order form!

How Learning Needs Are Identified In an Organization

How Learning Needs Are Identified In an Organization
How Learning Needs Are Identified In an Organization

How Learning Needs Are Identified In an Organization

Order Instructions:

The notion of the learning need can be straightforward; however, you will discover that the topic is open to question and challenge and that an alternative way exists. This essay asks you to consider how learning needs are established in your organisation.

The question focuses specifically on job or occupation-level needs, but you are invited to extend the discussion in the Collaboration. You explore how learning needs are identified.

Address the following issues/questions:

  • Identify and retrieve one peer-reviewed academic journal article and one professional or trade journal article.
  • Reflect on how learning needs are identified in your organisation or an organisation with which you are familiar.
  • Critically evaluate methods for identifying learning needs in your organisation. In your analysis, address your own research within the topic.
  • What is the common understanding of learning needs?
  • How could ideas from the literature be used to improve practice in your organisation?
  • Which approach is reflected by your organisation: the comprehensive approach, key task approach, problem-centred approach or competency approach, or none of these?
  • What are the reasons for the approach adopted by your organisation?

SAMPLE ANSWER

Introduction

Learning remains an essential element in achieving the objectives of an organization and improving its –performance as well.  It has the potential to link the gap between an organization’s current capacity and the need to deliver an organization’s business results (Heorhiadi, Venture, & Conbere, pp. 5-9. 2014). This paper, therefore, seeks to determine an organization’s learning need. This can, however, be achieved once the learning requirements of the organization are identified through a learning needs analysis.

How Learning Needs Are Identified In an Organization

It is critical to determine the fact that effective learning remains an essential business strategy. Our organization has developed approaches to targeting, prioritizing, planning, monitoring and managing with the aim of ensuring that the return on its investments is made. However, our organization realized that its output was not consistent as required (Heorhiadi, et.al). Through the help of a business advisor, we were able to discover that the identification and development of the personnel’s skills, abilities and knowledge was the only robust approach to achieving our goals and objectives.

Through a learning needs analysis, our organization was in a position to continuously identify its needs. This process involved assessing the capabilities and performance, listening to colleagues, looking out for changes in the market and competitor activities, and maintaining awareness of the business activities (Lennie, Tacchi, Wilmore, & Koirala, pp. 325-343.2015). According to my findings, it is also essential to mention that the learning needs analysis also considers the monitoring and review of the impact of the current development and training activities within the organization.

The Common Understanding of Learning Needs

Learning needs is mainly used to refer to what happens with the knowledge an employee receives from training. Learning occurs only when the individual is in a position to apply the knowledge gained to their work situations (Lennie, et.al). A learning need, therefore, alludes to an identified gap between an organization’s current level of performance and the required level. The necessary level, in this case, could mean either the performance of the organization is dismal, or it has not reached the satisfactory level.

The needs analysis as determined in this paper can be applied within the context of our organization with the aim of growing the business functions (Quinn, pp. 34-48.2015). Once the needs are identified, the organization would, therefore, embrace the process and develop an environment through which continuous improvements are made with the aim of ensuring individuals can focus on their own competencies.

The Approach Reflected By Our Organization

Our organization chose the competency approach in determining its needs. Through this, our organization has a developed set of personal competencies that are aimed at suiting its needs (Quinn, pp. 34-48.2015). This approach has benefited our organization in describing both the knowledge and skills required to satisfactorily achieve the organization’s goals and tasks.

The competencies of every worker within the organization are therefore identified and designed in a manner that combines the job specifications and typical behaviors (Robbins, pp. 21-25.2009). The competency approach in spurring the learning needs is based on the fact that they are observable, practical and directly linked to the job to be completed. In some instances, the competency approach remains impersonal since it is able to determine the workers who are competent and those who are not yet competent.

Conclusion

Learning remains an essential element in achieving the objectives of an organization and improving its –performance as well.  In order to achieve the results of learning need, organizations need to carry out an analysis that identifies its needs before taking any approach.

References

Heorhiadi, A, La Venture, K, & Conbere, J 2014, ‘What do Organizations Need to Learn to Become a Learning Organization?’,OD Practitioner, 46, 2, pp. 5-9, Business Source Complete, EBSCOhost, viewed 4 September 2015.

Lennie, J, Tacchi, J, Wilmore, M, & Koirala, B 2015, ‘A holistic, learning-centred approach to building evaluation capacity in development organizations’, Evaluation, 21, 3, pp. 325-343, Academic Search Premier, EBSCOhost, viewed 4 September 2015.

Quinn, C 2015, ‘Learning Needs A Revolution’, Chief Learning Officer, 14, 7, pp. 34-48, Business Source Complete, EBSCOhost, viewed 4 September 2015.

Robbins, P 2009, ‘Performance proficiency as a measure of learning needs’, Performance Improvement, 48, 3, pp. 21-25, Business Source Complete, EBSCOhost, viewed 4 September 2015.

We can write this or a similar paper for you! Simply fill the order form!

Removing personal information of prospective employees

Removing personal information of prospective employees
Removing personal information of prospective employees

Pros and cons of removing personal information of prospective employees

Order Instructions:

Identify the pros and cons of removing personal information, such as age, gender, ethnic origin, and family or marital circumstances, prior to the screening and shortlisting of applicants for employment. Take a position for either removing or retaining such information.

SAMPLE ANSWER

Introduction

It is critical to mention that one of an essential human resource management practices is staffing. According to sources, the functions of management involve the prospect of retaining an organization’s structure through an accurate selection, appraisal and development of the human labour meant to fill the roles required within a work environment (Baert, Cockx, Gheyle, & Vandamme, pp. 467-500. 2015). In this case, the process of staffing involves an appropriately structured recruitment, selection, development and compensation of the workers within an organization.

Additionally, human capital remains an essential element in the growth of an employing organization since it offers the workers the opportunity to exercise their collective skills, abilities and competencies that would spur the organization to gain successfully a competitive advantage (Baert, et.al). The recruitment process at times become a challenging experience to the recruiters since it becomes difficult to determine the best choice of staff to recruit and how to go about the process. This paper, therefore, seeks to synthesize the pros and cons of neglecting personal information of an applicant during the process of screening for employment.

Pros and cons of removing personal information

The selection process remains a critical aspect of the staffing function of an organization. An ineffective selection has the capacity to affect the decisions of the hiring and placement of workers within an organization (Corell, Benard & Paik, pp.1297-1338.2007). Staffing, therefore, involves an approach geared towards placing the right men and women at the good job. This process can, therefore, be effectuated through a thorough recruitment approach that determines the best suitable candidate for a position.

Pros

During the selection process, there are some biases that need to be avoided. The removal of personal information remains an essential element in reducing or eliminating discrimination prior to the short listing and recruitment process. Sources reveal that several incidences of discrimination have been noted in recruitment processes where people are judged based on their nationality/ethnicity, gender, disability and equality in authority (Corell, et.al).

These factors clearly depict the fact that removing personal information prior to the short listing and recruitment process will maintain the processes equality, a factor that clearly spells out that fact that all the applicants will be treated fairly, with the best taking the job irrespective of their ethnicity, gender, social status (Corell, et.al). These factors are known to stereotype several recruitment processes thus removing personal information prior to the process of recruitment ensures equality in recruitment.

Cons

Some schools of thought allege that the recruitment process should not only rely on how the applicants are recruited but who fits a job position for selection. The primary idea in this remains the fact that applicants should be in their right mental, physical and psychological state for the positions declared vacant within an organization (Corell, et.al). An instance of this can be determined by the fact that certain jobs require men as compared to women. Women are known to fit in particular job positions since they have not the strength needed to handle some jobs. Men, on the other hand, are better placed in carrying out hard labour such as building houses, drilling, and driving trucks.

In support to this, some particular cultures impact the nature of jobs that both these sexes should partake. An instance of this is a case of Saudi Arabia where men are not allowed to engage in the sales of female lingerie. It is through this that the removal of an applicant’s personal information prior to the process of short listing and recruitment may result in the hiring of wrong personnel (Corell, et.al). It is also essential to determine where an applicant comes from, their gender, physical conditions among other factors that can assist in the process of recruitment. This information’s remain pertinent in ensuring that the personnel’s hired are suitable for the job thus removing them would give the Human Resource functions difficult in determining the appropriate employees.

My Stand in either Removing or Retaining such Information

According to the findings stated in this analysis, it is essential that the applicants detail their personal information in their applications to aid the recruiters with the right information during the process of recruitment (Fratričová, & Rudy, pp. 149-155.2015). Employers should, therefore, request for this information since the hiring of wrong applicants may lead the organization into incompetency, a factor that would affect its production immensely.

From an experience I have personally had, there are several factors that are required to get a job with a government institution. The recruiting agencies need to ensure if an applicant is of the right age and has the capacity to perform the duties delegated appropriately (Fratričová, & Rudy, pp. 149-155.2015). The government has also set a retirement age bracket, a factor that typically requires an individual’s personal information. In an incidence where the personal information is removed, the recruiters are more likely to recruit the wrong personnel to fill the job positions.

Conclusion

According to the findings detailed in this research it is critical to note that the removal of an applicant’s personal information during the recruitment and selection process has several adverse impacts that may affect the operations of a company. It is therefore essential to determine that an applicant’s personal information should be included during the process of recruitment.

References List

Baert, S, Cockx, B, Gheyle, N, & Vandamme, C 2015, ‘Is There Less Discrimination in Occupations Where Recruitment Is Difficult?’, Industrial & Labor Relations Review, 68, 3, pp. 467-500, Business Source Complete, EBSCOhost, viewed 3 September 2015.

Corell, S.J., S. Benard and I. Paik, 2007. “Getting a Job: Is There a Motherhood Penalty?”, American Journal of Sociology, Vol. 112, No. 5, pp.1297-1338.

Fratričová, J, & Rudy, J 2015, ‘Get Strategic Human Resource Management Really Strategic: Strategic HRM in Practice’, International Journal Of Management Cases, 17, 4, pp. 149-155, Business Source Complete, EBSCOhost, viewed 3 September 2015.

We can write this or a similar paper for you! Simply fill the order form!

Cancer and breaking the bad news Ethics

Cancer and breaking the bad news
Cancer and breaking the bad news

Cancer and breaking the bad news

Order Instructions:

Please follow the instructions carefully…. they are in bold and underlined…… please use APA referencing and required turntin report thanks….. also required 1500 words

SAMPLE ANSWER

Table of Contents

Introduction……………………………………………………………………………… Page- 3

Critical Thinking and Analysis………………………………………………………….Page 4-7

Conclusion……………………………………………………………………….………..Page- 8

References………………………………………………………………..…………….  Page 9-10

 

(i) Introduction

Communication between healthcare professionals and patients is often critical in that the latter could react unexpectedly to the information they get (Konstantis, & Exiara, 2015, Pg. 35). As such, healthcare practitioners should evaluate the beneficence and maleficence of their approaches before making decisions (Punjani, 2013). Clinicians need honoring the trust accorded to them by their clients and ensure that they do not harm rather than encourage them (Reinke, Shannon, Engelberg, Young, & Curtis, 2010, Pg. 982). However, some situations present dilemmas, especially when information is not friendly to the patient. Clinicians have to consider ethical principles of practice and still ensure that they act within the relevant laws.

(ii)Critical Thinking and Analysis:

The Australian code of ethics for nurses specifies ethical standards that practitioners should meet in their duties. Among the highlighted requirements are the recognition and appreciation of the diversity of people (Waubra Foundation, 2015). In the case scenario, Mrs. Y’s daughters explained their beliefs to the surgeon and warned against the hospital informing their mother about her poor prognosis. The physician’s consideration of the proposal was an expression of understanding of the diversity of people. Again, the code requires nurses to manage information in an ethical manner and to take caution regarding possible undesirable outcomes (Waubra Foundation, 2015). Therefore, it was necessary to communicate to Mrs. Y cautiously. Though Mrs. Y was entitled to know her health status, the manner in which she got the information would have determined her reactions both emotionally and physiologically. The code of ethics requires that nurses promote patient wellness and avoid actions that would hinder recovery (Waubra Foundation, 2015). It was important for the doctor to consult Mrs. Y’s family members to understand how negative information would impact the health status of the patient. As revealed in the case scenario, cancer was intimidating, and the patient was more likely to find it inconceivable and horrifying rather than understand the condition. On such basis, the doctor’s and daughters’ act of concealing the health status of Mrs. Y was justifiable.

On the other hand, the code requires nurses to grant patients an opportunity to make informed decisions concerning their lives and well-being. Concealing the information compromises the appropriateness of decisions that Mrs. Y would make concerning her life. It was necessary that she participate actively in making decisions that concerned the management and treatment of her disease (Gracia C., Gracia J., & Chen, 2010, Pg. 195). Also, she had the right to know the outcomes she was to expect about her wellness.

From a moral perspective, Mrs. Y’s daughters and the doctor should have told the truth but take an optimistic approach (Reinke et al., 2010, Pg. 982). On such considerations, the parties would not disclose everything to the patient nor would they lie. However minimal Mrs. Y’s survival chances could be, nurses should not imply that they are pessimistic about her recovery. Though nurses would be negative about the outcomes of the patient, it would be morally questionable for them to tell the patient that she was likely to succumb to the ailment. Practitioners should express empathy and compassion in their interactions with their patients (Russell & Ward, 2011, Pg. 193). Telling patients that they are dying is questionable from a moral perspective. So as to avoid discouraging the patient, the doctor was morally justified to withhold information concerning the health of Mrs. Y. It was a wise act for the daughters to fear the reactions of their parents and inform the surgeon concerning the issue. The daughters were morally right in that they sought to protect their parents by ensuring that they would receive the breaking news only when they were prepared for it (Narayanan, Bista, & Koshy, 2010, Pg. 61). Their communication with the doctor was for the betterment of the situation, and it did not bear an immoral motivation. Their concerns were an expression of their love and care for their parents.

On the other hand, it was morally questionable for Mrs. Y’s daughters and the physician to exploit Mrs. Y’s failure to understand English as an opportunity to discuss her health status without her knowledge. The parties were obliged to help Mrs. Y overcome the challenge of the language barrier and let her understand her situation. The patient trusted her daughters as facilitators of communication. By discussing her and suggesting that she should not be told that she had cancer, Mrs. Y’s daughters were betraying their mother’s trust. The daughters also betrayed the trust of their family when they requested that the information be concealed to their father as well. Also, the daughters assumed that their parents would not make appropriate decisions upon their learning of Mrs. Y having bladder cancer, an occurrence she had feared for long. The assumption prompted them to overlook the contributions of the patient and her husband hence limiting her autonomy. The doctor also failed to meet his moral role of interacting openly with the patient (King, & Hoppe, 2013, Pg. 385). The surgeon gave in to pressure exerted by Mrs. Y’s daughters and failed to meet the moral obligation of being available to the patient. The patient had a right to connect directly to her physician and express her wishes as well as seek the doctor’s assurance. It was also incorrect for the surgeon to assume that Mrs. Y’s daughters would deliver accurate information to their family regarding the critical issue. It was possible that the daughters would conceal necessary information to the patient. Again, it was not a guarantee that the two daughters would inform the rest of the family in the safest manner. The surgeon had the moral duty to protect the patient from potential harm by letting her know her condition in the most appropriate way. Trusting the patient’s daughters was a risky move by the physician.

Clinicians employ fundamental ethical principles in ensuring that they practice what is right while refraining from what is wrong (Scholl, Zill, Härter, & Dirmaier, 2014). It is such principles that guide practitioners in making decisions that are ethically and morally defensible. In the case scenario, the physician applied such principles when determining whether or not to inform Mrs. Y about her health status. The surgeon felt it ethically acceptable to withhold critical information considering the understanding that the patient’s daughters offered. The clinician considered various values and balanced them in the ultimate decision made. Both the physician and Mrs. Y’s daughters utilized fundamental ethical principles when they avoided lying and purposed to give information that would not cause severity in the health of the patient. One of the most conspicuously applied fundamental principles was beneficence. The parties evaluated the benefits of informing the patient against the associated disadvantages (Punjani, 2013). They also applied non-maleficence by ensuring that their move would not harm the patient regardless of whether it was beneficial or not.

However, the physician and the patient’s daughters failed to respect Mrs. Y’s autonomy when they decided to handle the patient’s condition without engaging her (Entwistle, Carter, Cribb, & McCaffery, 2010, Pg. 741). They ought to have offered full information and given the patient an opportunity to make informed choices.

With the advancement in healthcare, there is increased application of the law and clinicians would be sued in situations where their conduct hurts their clients. The law required that the physician protect the patient by offering her necessary information that would benefit her when making decisions (Scholl et al., 2014).  Also, the law required that the clinician consider the concerns of the members of the patient’s family. The surgeon acted within the law by consulting the family and making reasonable considerations of their culture. Also, the physician expressed cultural competence by paying attention to the customs and beliefs explained by the patient’s daughters (Kodjo, 2009, Pg. 57). Considering the cultural background, acknowledging it, and orienting patient care in such a way that it incorporated the expected concepts was an expression of cultural competence by the physician (Kodjo, 2009, Pg. 57). Mrs. Y would learn her disease in a manner that was acceptable in her culture.

(iii)Conclusion

Mrs. Y’s daughters’ and physician’s decision to withhold diagnostic information to the patient and her husband was justifiable. The move was to facilitate the well-being of the patient, and it was not under ill motivations. Their decision paid attention to culture, and it was ethically and morally appropriate. Though the decision was questionable considering the rights and autonomy of the patient, its benefits outweighed its limitations. Also, the decision was defensible from a legal perspective as it had the ultimate intention of protecting the patient rather than harming her. In conclusion, the nurse assigned to Mrs. Y should concur with the surgeon and conceal the poor prognosis concerning the patient. The nurse’s response should be optimistic, and it should not cause an adverse impact on the patient.

References

Entwistle, V. A., Carter, S. M., Cribb, A., & McCaffery, K. (2010). Supporting Patient Autonomy: The Importance of Clinician-patient Relationships. Journal of General Internal Medicine, 25(7), 741–745. http://doi.org/10.1007/s11606-010-1292-2

Gracia, C. R., Gracia, J. J. E., & Chen, S. (2010). Ethical Dilemmas in Oncofertility: An Exploration of Three Clinical Scenarios. Cancer Treatment and Research, 156, 195–208. http://doi.org/10.1007/978-1-4419-6518-9_15

King, A., & Hoppe, R. B. (2013). “Best Practice” for Patient-Centered Communication: A Narrative Review. Journal of Graduate Medical Education, 5(3), 385–393. http://doi.org/10.4300/JGME-D-13-00072.1

Kodjo, C. (2009). Cultural competence in clinician communication. Pediatrics in Review / American Academy of Pediatrics, 30(2), 57–64. http://doi.org/10.1542/pir.30-2-57

Konstantis, A., & Exiara, T. (2015). Breaking Bad News in Cancer Patients. Indian Journal of Palliative Care, 21(1), 35–38. http://doi.org/10.4103/0973-1075.150172

Narayanan, V., Bista, B., & Koshy, C. (2010). Breaks: protocol for breaking bad news. Indian J Palliat Care, 16(2), 61-65.

Punjani, N. S. (2013) Truth Telling to Terminally Ill Patients: To Tell or not to Tell. J Clin Res Bioeth, 4(159). doi: 10.4172/2155-9627.1000159

Reinke, L. F., Shannon, S. E., Engelberg, R. A., Young, J. P., & Curtis, J. R. (2010). Supporting hope and prognostic information: nurses’ perspectives on their role when patients have life-limiting prognoses. Journal of Pain and Symptom Management, 39(6), 982–992. http://doi.org/10.1016/j.jpainsymman.2009.11.315

Russell, B. J., & Ward, A. M. (2011). Deciding what information is necessary: do patients with advanced cancer want to know all the details? Cancer Management and Research, 3, 191–199. http://doi.org/10.2147/CMR.S12998

Scholl, I., Zill, J. M., Härter, M., & Dirmaier, J. (2014). An Integrative Model of Patient-Centeredness – A Systematic Review and Concept Analysis. PLoS ONE, 9(9), e107828. http://doi.org/10.1371/journal.pone.0107828

Waubra Foundation. (2015). Code of ethics for nurses in Australia. Retrieved from http://waubrafoundation.org.au/resources/code-ethics-for-nurses-australia/

We can write this or a similar paper for you! Simply fill the order form!

State sovereignty Essay Paper Assignment

State sovereignty
State sovereignty

State sovereignty

Order Instructions:

1.claim of the article may be:(a).state sovereignty need not be understood in absolute terms to obstruct direct application of international law.apprehension of superiority of international law over domestic law,serious undermine state sovereignty and power of the legislative organ of the state.
(b).impugned conflict is more imaginary than real.viz,states are presumed not to assume international obligations under treaties which are contrary to their domestic laws.on the other hand customary norm are universally assumed to be part of the law of the land.
2.suggesting measures to avoid major conflict between treaties and statutes.
3.to critique.
4.creativity and original in perspective and approach
4.to use footnotes.

SAMPLE ANSWER

State sovereignty

To fully understand the term state sovereignty, we must first comprehend the meaning of state and sovereignty. The word state has a lot of meanings which is attached to the particular context the word is being used. However, in the context of international law, the word state has the following meaning. A state is a territory or a nation that can be considered to have only one government and defined as an organized political community (Arend et al., 2014). Examples of states can be countries that are dependent on their own and are ruled by the government that exists in the country. Furthermore, the meaning of sovereignty in the contextual use of the word state has the following meaning. Sovereignty is referred to as the absolute right and power of a government or a governing body to govern itself without ant outside interferences from other regulatory bodies (Armstrong et al., 2012).

Therefore, a sovereign state it a territory or nation that comprises of an organized political community that is governed by one government without outside interferences from other governing bodies. In the context of international law, state sovereignty, therefore, refers to the ability of a country, state or nation to have the complete power or absolute control over what goes on within its territories (Gould et al., 2015).

The issue of sovereignty in countries has been a major one in the discussions about the international law. The ability of a nation to make its decisions can be excellent and wrong at the same time in the context of international law or law itself. For a sovereign state, the decision made by the state government cannot be influenced by any other outside party. This gives the country the power to be the judge and the jury of whatever happens within its territories.

However, this leaves the country at a disadvantage because its citizens stand to lose at any minute the government decides to make decisions that harm or endanger their lives.

The state sovereignty also gives a nation the power to decide to enter into deals with other sovereign states or not. It gives the government control over what the country does and how it acts in the international community. A sovereign state is considered as an individual whose actions are accountable only to itself alone and to no other individual. Therefore, a sovereign state may wage war on its citizens or conduct acts against the human rights of their citizens.

In international law, a state is considered as sovereign according to the following guiding factors. One of the factors is there be a permanent population (Law, 2014). The permanency of the population refers to the nation having its citizens not migrants from another nation, country or state. The second factor that defined a sovereign state has a defined territory. Without no defined territory, a state cannot be considered to be sovereign. Thirdly, for a state to become sovereign, it must have a government. The government should be a governing body that has no influence on any outside parties. Furthermore, the government should have the complete power and control over what happens within its territories. Lastly, for a state to be considered as a sovereign one, the government should have the capacity of entering into relations with other states (Law, 2014).

This paper will focus on state sovereignty and the obstruction it has on the direct application of international law in sovereign states. State sovereignty must not be defined or practiced in complete terms for it to make difficult any efforts regarding the application of international law. It is quite a hard task for international law to have full effect on sovereign states. However, much state sovereignty stands in the way of implementation of international law. At some point, the international law finds its way into sovereign states and takes charge of the government from the sovereign governing body of that particular nation.

In the context of international law, state sovereignty needs to be limited to some point. International law is what makes possible the existence of some international organizations. Examples of international organizations include The United Nations, The European Union, and the African Union. For this international organization, international law is significant. Organizations like the United Nations are very influential in most countries when it comes to matters concerning economy, human rights, education and war. It is just impossible to run international organizations without cooperation among states. However, state sovereignty is making it difficult for the association to exist among some states.

At some point, a sovereign state will decide to do something that well affects the international community. Most of the times, the significance of the actions of a sovereign state may impact negatively on the international community. It may even impact adversely on the effort of human rights in the said sovereign state. Consequently, the international community, through some international organizations will want to exercise international law in the given state. Therefore, if the sovereign state refuses to enter into a deal with the international community, the sovereignty will be seen as an act that diminishes the efforts of international law. The international community is left with no choice but to intervene.

In most instances, the international community will invade the sovereign state and conduct acts aimed at taking the governing power from the sovereign governing body and give it to a more reasonable administrative body. The interference is then used to distrust the actions of the sovereign governing body of its citizens. For example, the United Nations will make every effort to enter into a deal with the sovereign state to stop act against human rights in the sovereign state (Cosentino, 2015). However, if the state refuses to cooperate. The international organization, United Nations will have to intervene to save the citizens from the dehumanizing acts of their sovereign government. Hence, state sovereignty need not be defined in a complete term to create a barrier to the application of international law in a country. Where the significance of the application of the international law will be for the greater good of the international society.
The international community had witnessed a worrying trend of state sovereignty during the Second World War. Some to the aspects of the international law were being violated regarding the capacity of national sovereignty. Due to the significance of these violations in the states ant the presence of national sovereignty, there was an obstacle in the application of international law. However, the recent trend in the international community is to restrain sovereignty in a country to a point where it is appropriate and acceptable. Some of the aspects of the international law have witnessed quite a development due to the restraint on the power of sovereignty in the international community.

The aspects of international law include foreign; human rights law and international environmental law. For some time in the international community, there has been a noted awareness of on the adverse effects that sovereignty cause to the efforts of the application of these aspects of international law. It has been noted that sovereignty has been quite an obstacle to the application of these international laws. Therefore, the international community has made an effort to restrain sovereignty in matters that touch on international law.

For example, when an authoritarian administration goes ahead and places fundamental importance on the economic development of its state through prioritization of expanding the scale of the economy through means that endanger the environment, violate human rights laws and environmental laws. Such violations include industrial pollution caused by massive burning of fossil fuels. What leads is the pollution of air, coastal waters and the rivers (Juda, 2014). Restraining of sovereignty was made necessary due to such acts that violated international human rights laws and environmental laws. To avoid such abuse I the future or currently, a restraint has to be put on state sovereignty. Therefore, the obstruction created by sovereignty will be dissolved to give way to the application of international law in a various way. The different ways involve super state controls that will be advocated by environmental and some human rights law experts.

In the issue of the apprehension of the superiority of international law over domestic law, regarding the power vested in governing bodies of sovereign states. The international law sometimes has to be made clear that it is superior to the domestic law that exists in such countries. For most sovereign states, some laws may be introduced that are not of positivity to human rights or environmental conditions. The laws or policies may even lead to the undermining of international law. The international community thereby pulls in to re-affirm the superiority of international law over the domestic law. The acts of the international community will thus undermine the power of the legislative organ of the state as well as state sovereignty.

To reinforce the superiority of international law over domestic law, the following acts are conducted by the international community through the jurisdiction of the formed international organizations like the United Nations. The significance of the actions come in when protecting the environmental conditions and human rights conditions in various states against the destruct caused by some authoritarian administration of some sovereign states. Some actions include decisions that are taken by the international organization concerning international laws the sovereign country in which the government of these States has no decisive influence over. The other thing allowed by the international community is the jurisdiction mandated to regional or international judicial institutions that an individual can turn to on issues that concern the violation of human rights. Lastly, in situations of war like foreign invention, internal conflicts or civil war, the international community is allowed to intervene, thereby infringing sovereignty in these states to protect individuals for the grave violations of human rights that comes with the acts of war.

Through the intervention by the international community on matters concerning a sovereign state, sovereignty is said to be restrained. In agreement with the international law, the infringement on sovereignty is a necessity to show the superiority of international law over domestic law. The advantage is shown when the sovereignty is undermined through various ways as indicated in the paragraphs above. Therefore, a sovereign state can cooperate with the international law. However, the sovereignty of these state cause an obstacle to the display of the superiority of international law over domestic law.

Speaking, international law, from its definition has jurisdiction over international law. However, domestic law has its authority within the confines of its territory. Therefore, the magnificence of international law is thereby said be glorified by the undermining of sovereignty through the acts of international organizations that apply international law in different instances that prove to be endangering to the environmental conditions and the grave violations of human rights laws.

The state of the sovereignty of a nation is a very conflicting one. In the sense that it conflicts majorly with international laws, the domestic laws that are created as a result of sovereignty have no regard for international obligations that go with them. Therefore, a sovereign state which is presumed to acknowledge international obligations bounded in treaties and statutes will not do so in an effort to protect their own sovereignty and pride of the country in an ever global world in terms of economy and other significant aspects of power. A developing or a small country will want to be seen as powerful or in the same way as a large and powerful country. In the road to achieving this power or state of pride, a state adopts sovereignty that highly disregards the significance of international law to demonstrate its power to the international community. It is therefore very common nowadays to see developing countries be in more conflicts that are more internal than external. The conflicts arise from the efforts of the governing body to exercise its power on its citizens. Therefore, the government of these sovereign states overdoes it, and this leads to internal conflicts that capture the attention of the international community. The international community, therefore, intervenes to apply international law in these nations and protect human rights laws and environmental laws (Sassen, 2013). What follows are treaties and statutes that need to be enforced in the conflicting society. The sovereign nations, therefore, disregard the obligations of the international law through disagreeing to sign the treaties to regain peace and order in the sovereign states.

In the same context of domestic laws and disregarding of the obligations that come with treaties and statutes, sovereign states need not fight with the powers that be. The reason being the international law will ever be superior to domestic law. In the instances that the sovereign state refuses to perform its obligation to the international community by refusing to sign the treaties and recognize the statutes. The governing bodies of the sovereign states will be shown the upper hand of the international law. However, international laws may sometimes or many times conflict with the customary law. Customary law is regarded as the law of the land. In instances, that international law conflicts with the customary law. Then the law of the land may have an upper hand at some point. Being that most sovereign states are not amongst the most powerful nations in the world. They can be pressured into disregarding their customary laws in favor of the international law.

For example, if a sovereign state that is currently experiencing internal disputes or civil war. The international community will take note of the situation and try to intervene to neutralize the situation. You may find that the war in these sovereign states will mostly affect the human rights laws and environmental laws in an adverse manner, especially when there is the breaking of any international recognized statute. Therefore, the situation will catch the attention of the international community, and they will try to correct the situation. This leaves the international community with no choice but to intervene. They will intervene in various ways. The possible way being the signing of treaties between the two conflicting parties.

To save face and regain their pride, the governing body will choose not to sign the treaty. This in turn will be perceived negatively by the international community. The international community will view that action as one of deciding not to cooperate with any efforts of applying international law. Therefore, action will be taken against such states. The international organizations will gang up to come in and try to neutralize the situations. All the efforts of the international community will be aiming towards restoring peace and order in the war-stricken nation. Furthermore, also there will be efforts in enforcing international judicial jurisdiction in such countries, protection of human rights laws as well as environmental laws.

Sovereignty cannot be absolute. The complete nature of sovereignty can never be agreed upon to exist in the international community. Moreover, the absolute nature of sovereignty will deny the very nature of international law to exist in the first place. However, as sovereignty has its limits, also international law does. Therefore, there are some boundaries that cannot be crossed whatsoever the urgency the international community has. For example, the international community can not apply international law to touch on issues such as an election process in a sovereign nation. Such issues are regarded to be internal affairs that need no helping hand from the international community.

There is one significant measure that can be put in place in the process of resolving conflicts between statutes and treaties. The measure involves putting into effect the one that was enacted later that the other. In a state where a treaty and a statute seem to conflict, the measure above will be of significance to the goal of resolving the conflict between the two aspects of the law. Treaties are regarded as the law of the land. However, a statute may be an international law that has an effect on cooperating nations in the international community. Therefore, as a treaty is regarded a customary law and the statute as an international law. It is easier for a sovereign state to choose the customary law over the international one. The reason being the customary law is considered domestic as opposed to the contrary, international law.

References

Arend, A. C., & Beck, R. J. (2014). International law and the use of force: beyond the UN Charter paradigm. Routledge.

Armstrong, D., Farrell, T., & Lambert, H. (2012). International law and international relations. Cambridge University Press.

Bartolini, G. (2014). Universal Approach to International Law in Contemporary Cosntitutions: Does It Exist, A. Cambridge J. Int’l & Comp. L., 3, 1287.

Bremer, E. S. (2012). The Dynamic Last-In-Time Rule. Indiana International & Comparative Law Review, 22(1).

Bull, H. (2012). The anarchical society: a study of order in world politics. Palgrave Macmillan.

Chen, L. C. (2014). An introduction to contemporary international law: a policy-oriented perspective. Oxford University Press.

Crawford, J. (2012). Brownlie’s principles of public international law. Oxford University Press.

Crawford, J., & Koskenniemi, M. (Eds.). (2012). The Cambridge companion to international law. Cambridge University Press.

Cook, R. J. (Ed.). (2012). Human rights of women: National and international perspectives. University of Pennsylvania Press.

Cosentino, C. (2015). Safe and Legal Abortion: An Emerging Human Right? The Long-lasting Dispute with State Sovereignty in ECHR Jurisprudence. Human Rights Law Review, ngv013.

Davis, M. C. (2012). State sovereignty and indigenous rights in China: the global dimension of China’s Tibet Policy. In ISA Annual Convention 2012 (pp. 23-23). International Studies Association.

Dixon, M. (2013). Textbook on international law. Oxford University Press.

Dixon, M., McCorquodale, R., & Williams, S. (2011). Cases and materials on international law. Oxford University Press.

Donnelly, J. (2013). Universal human rights in theory and practice. Cornell University Press.

Falk, R. A. (2015). The Vietnam War and International Law, Volume 3: The Widening Context (Vol. 3). Princeton University Press.

Greenberg, J. (2011). On the road to normal: Negotiating agency and state sovereignty in postsocialist Serbia. American Anthropologist, 113(1), 88-100.

Greve, H. S. (2015). State Sovereignty and International Criminal Law. Nordic Journal of Human Rights, 33(1), 104-107.

Gould, W. L., & Barkun, M. (2015). International law and the social sciences. Princeton University Press.

Habermas, J. (2012). The crisis of the European Union in the light of a constitutionalization of international law. European Journal of International Law, 23(2), 335-348.

Hafner-Burton, E. M., Victor, D. G., & Lupu, Y. (2012). Political science research on international law: the state of the field. American Journal of International Law, 106(1), 47-97.

Holden, B. (Ed.). (2013). Global democracy: Key debates. Routledge.

Jeffrey, A. (2012). The improvised state: Sovereignty, performance and agency in Dayton Bosnia. John Wiley & Sons.

Juda, L. (2013). International Law and Ocean Management. Routledge.

Keck, M. E., & Sikkink, K. (2014). Activists beyond borders: Advocacy networks in international politics. Cornell University Press.

Michaels, R., & Paulwelyn, J. (2011). Conflict of Norms or Conflict of Laws: Different Techniques in the Fragmentation of Public International Law. Duke J. Comp. & Int’l L., 22, 349.

Miranda, L. A. (2012). The role of international law in intrastate natural resource allocation: sovereignty, human rights, and peoples-based development. Human Rights, and Peoples-Based Development (May 1, 2012). Vanderbilt Journal of Transnational Law, 45(3), 12-17.

Murdoch, I. (2013). The sovereignty of good. Routledge.

Mullerson, R. (2013). International law, rights and politics: developments in Eastern Europe and the CIS. Routledge.

Lauterpacht, H., & Crawford, J. (2012). Recognition in international law (Vol. 3). Cambridge University Press.

Law, C. (2014). Morten Bergsmo and Ling Yan (eds). State Sovereignty and International Law.

Posner, E. A., & Sykes, A. O. (2013). Economic foundations of international law. Harvard University Press.

Ranganathan, S. (2013). Between Philosophy and Anxiety? The Early International Law Commission, Treaty Conflict and the Project of International Law. British Yearbook of International Law, 83(1), 82-114.

Sassen, S. (2013). Losing control?: sovereignty in the age of globalization. Columbia University Press.

Schermers, H. G., & Blokker, N. M. (2011). International institutional law: unity within diversity. Martinus Nijhoff Publishers.

Saul, B. (2013). China, Natural Resources, Sovereignty and International Law. Asian Studies Review, 37(2), 196-214.

Viljoen, F. (2012). International human rights law in Africa. Oxford University Press.

Von Glahn, G., & Taulbee, J. L. (2015). Law among nations: An introduction to public international law. Routledge.

Wallerstein, I. (2011). The modern world-system I: capitalist agriculture and the origins of the European world-economy in the sixteenth century, with a new prologue (Vol. 1). Univ of California Press.

Weiner, A. S. (2014). The Protection Human Rights in the United States. Austrian Review of International and European Law Online, 16(1), 33-40.

Werksman, J., Cameron, J., & Roderick, P. (2014). Improving compliance with international environmental law. Routledge.

Whytock, C. A., Childress III, D. E., & Ramsey, M. D. (2013). Foreword: After Kiobel: International Human Rights Litigation in State Courts and Under State Law. UC Irvine Law Review, 3(1).

We can write this or a similar paper for you! Simply fill the order form!

The Most Dangerous Game by Richard Connell

The Most Dangerous Game by Richard Connell
The Most Dangerous Game by Richard Connell

The Most Dangerous Game by Richard Connell vs. The Child by Tiger by Thomas Wolfe

Order Instructions:

FICTION ESSAY INSTRUCTIONS

Write a 750-word (3–4-pages) essay that compares and contrasts 2 stories from the Fiction Unit. Before you begin writing the essay, carefully read the guidelines for developing your paper topic that are given below. Review the Fiction Essay Grading Rubric to see how your submission will be graded. Gather all of your information, plan the direction of your essay, and organize your ideas by developing a 1-page thesis statement and outline for your essay. Format the thesis statement and the outline in a single Word document using current MLA, APA, or Turabian style (whichever corresponds to your degree program).

The essay is due on Monday of Module/Week 3 and must include:

  • a title page,
  • a thesis/outline page,

the essay itself followed by a works cited/references page of any primary or secondary texts cited in the essay.

Guidelines for Developing Your Paper Topic

Read the following short stories to compare and contrast in your essay:

• “The Child by Tiger” by Thomas Wolfe
• “The Most Dangerous Game” by Richard Connell.

Also, make at least 1 of these elements of fiction the focus of your essay:
• Conflict/Plot/Structure,
• Characterization,
• Setting,
• Theme/Authors’ Purposes,
• Point of View, and/or
• Tone/Style/Irony/Symbol/Imagery.

If you need help focusing your essay, ask yourself questions that correspond to your chosen element(s).

Conflict/Plot/Structure (This is not a summary of the stories)
• What are the basic conflicts? How do these conflicts build tension, leading to major, complicated incidents and climactic moment(s)?
• What are the ways in which each major character experiences conflict (either with self, with other characters, or with the social and/or physical environment)?
• How are the conflicts resolved? Do the protagonists succeed in achieving their goals?
• Who receives your deepest sympathy and why?

Characterization
• Who are the main characters in the stories?
• What are their outstanding qualities? Does the author give any indication as to how or why the character developed these qualities?
• What are the characters’ emotions, attitudes, and behaviors? What do these indicate to the reader about the character?
• Can the characters’ motivations be determined from the text?

Setting
• Where and when do the stories take place (remember to include such details as geographic location, time of year, time period, if the setting is rural or urban, etc.)?
• Do the settings make the stories believable or credible? How does setting impact the plot of the story, and how would the plot be affected if the story took place in another setting?
• Are the characters influenced by their setting? How might they behave if they were in a different setting?
• What atmosphere or mood does the setting create (for example, darkness may create a mood of fear or unhappiness while light or bright colors may create one of happiness)?
• Is the setting or any aspect of it a symbol, or does the setting express particular ideas?
• Does setting create expectations that are the opposite of what occurs?

Theme/Authors’ Purposes
• What is the major theme (or themes) of each story?
• Are the themes of the stories similar or different?
• How does the author convey the theme (or themes) to the reader?
• How do the stories’ themes relate to the authors’ purposes (some examples of author purposes are to entertain, to satirize, to realistically portray life’s problems, to analyze emotions and responses, and/or to communicate a moral message)?
• What unique style, techniques, or devices do the writers use to communicate their themes?

Tone/Style/Irony/Symbol
• How would you describe the tone of the piece?
• Does the tone correspond with the action occurring in the plot?
• What style does the author use (for example, one way an author might satirize is by including a lot of ironies, hyperbole, and unrealistic scenarios)?
• How might the story be different if the tone or style is changed?
• Does the writer use irony or symbols to communicate the message?

http://www.classicshorts.com/stories/danger.html

http://www.unz.org/Pub/WolfeThomas-1939n02-00132

SAMPLE ANSWER

 The Most Dangerous Game by Richard Connell

Thesis statement

The essay compares and contrasts two short stories. These are The Most Dangerous Game by Richard Connell and The Child by Tiger by Thomas Wolfe. The essay focuses on the following elements of fiction: conflict, theme, and imagery. Each of the two short stories has different themes, and imagery. However, they have the same conflicts.

Outline for the essay

Theme

In The Child by Tiger, the themes are: (i) both evil and violence exist within the human soul alongside goodness and gentleness, and (ii) like every other aspect of nature, human nature comprises 2 sides – one side is chaotic and repulsive whereas the other side is orderly and beautiful. In The Most Dangerous Game, the main theme is Violence and Cruelty. For instance, Zaroff shows off the heads of animals he has slayed and after he has described his latest prey, he refers to his latest collection of heads that are apparently human (Connell 157).

Conflict

In The Child by Tiger by Thomas Wolfe, the following conflicts are evident: person versus person, person versus nature, and person versus self. There are also conflicts of whites versus whites, whites versus blacks, and blacks versus blacks. In The Most Dangerous Game by Richard Connell, the conflicts include Human versus Human, Human versus Nature and Human versus Self.

Imagery

In The Child by Tiger, after Dick Prosser is first introduced, he appears a very religious, multi-talented and gentle person. Almost immediately however, Thomas Wolfe starts a consistent reference to Dick Prosser as a person who is very cat-like in nature, and who draws on his sly agility, speed and prowess (Wolfe 134). Thus, it could be gathered by the readers that the tiger symbolizes Dick Prosser. In The Most Dangerous Game, ungovernable, wild and teeming, the jungle powerfully symbolizes general Zaroff’s twisted psyche as well as the chaos in the island. In addition, the jungle symbolizes restriction and Rainsford’s loss of control given that it obstructs his efforts of returning to civilization.

Works cited

Connell, Richard. The Most Dangerous Game. Print. 1949.

Wolfe, Thomas. “The Child By Tiger.” Saturday Evening Post 210.11 (1937): 10-102. Academic Search Premier. Web. 1 Sept. 2015.

We can write this or a similar paper for you! Simply fill the order form!

Career Path Development Term Paper

Career Path Development
     Career Path Development

Career Path Development

Order Instructions:

PLEASE TYPE ALL ANSWERS UNDER THE QUESTIONS BEFORE SUBMITTING. PLEASE READ THE INSTRUCTIONS CAREFUL!

ASSIGNMENT INSTRUCTIONS:

Analyzes course concepts, theories, or materials correctly, using examples or supporting evidence.

Applies relevant professional, personal, or other real-world experiences to extend the dialogue.

Use your Blanchard and Thacker text, Effective Training, to complete the following:

Read Chapter 11, “Employee and Management Development,” pages 399–434.

This chapter discusses the value of employee development and some techniques used to develop employees. It also presents management development techniques including job rotation, coaching, and mentoring; and discusses the role of managers.

References:

Blanchard, N. P., & Thacker, J. (2013). Effective training (5th ed.). Upper Saddle River, NJ: Prentice Hall

ASSIGNMENT – Address the following:

1. Have you worked in a job where you had a formal career path?

If so, briefly describe that career path.

2. How effective was it in helping you develop as an employee?

3. If you have never had a formal career path (which is pretty common), address this question based upon your current career plans.

Describe the formal career path you would like to have. (PLEASE, NOTHING TO DO WITH SPORTS)!

How could it help you develop as an employee?

Use any outside sources you need to help you in this essay.

SAMPLE ANSWER

Career Path Development

At my former place of work, there exists a formal career path. Most of the time, my job has been concentrated on the functions of an assistant department manager. The department manager usually acted as a mentor as well as coach. In addition, the organization I had worked for provided mechanisms of self-learning to boost our adaptive strategies (Gowan, 2014, p.259). Job rotation was encouraged in my organization whereby I could switch places with other assistant department managers in the organization to eliminate monotony. On-job training was encouraged to ensure that employees circulated information among themselves at the place of work. Off-job training was experienced, for instance, before I first took the position of the assistant department manager, and I was introduced to training by the head of the departments outside the place of work. The managers had critical roles in ensuring that the employees were motivated. They were on the first line to address conflicts through excellent conflict resolution skills such as compromising and absorption (Gowan, 2014, p.302). Furthermore, the managers encouraged volunteering whereby we were able to build new expertise and practice existing skills in a different background from our daily jobs.

The career path was pertinent in developing me as an employee by instilling me with the needed skills and expertise to handle work challenges. Furthermore, the career path enabled me to realize the importance of sharing ideas among employees for effective career planning. The career path also allowed me to form better correlations with my colleagues and leaders in the organization that enabled me to seek assistance whenever I was faced with a difficult situation. The career path that I wish to have is a management career path that not to work longer as an assistant department manager, but as a department manager himself until I become the CEO in a Bakery industry (Blanchard & Thacker, 2013). This will help me as an employee to add more knowledge about dispensing orders rather than receiving orders as an assistant department manager. In addition, the path will assist me in getting self-esteem in making the industry achieve its objectives under my management as well as fulfilling my personal job satisfaction.

References

Blanchard, N. P., & Thacker, J. (2013). Effective training (5th ed.). Upper Saddle River, NJ: Prentice Hall. 399–434.

Gowan, M. (2014). Moving from jobs loss to career management: the past, present, and the future of involuntary job loss research. Human Resource Management Review, 24(3), 258-314.http://isiarticles.com/bundles/Article/pre/pdf/41049.pdf

We can write this or a similar paper for you! Simply fill the order form!

McDonald’s marketing management Essay

McDonald's marketing management
McDonald’s marketing management

McDonald’s marketing management

Order Instructions:

1. Assignment 1
Based on your readings and your personal experiences, prepare a 2 page summary (750 words maximum) of your understanding of the role of project management in today’s business environment.

Guidelines for assignment 1: Consider your workplace; are you involved in projects. If so, what is your assessment of how well they are selected, managed, resourced, appraised, and closed? If you are not involved in projects, can you talk to someone who is? Even if project management does not exist in your workplace, is there scope to introduce it? If not, why not? What elements of project management could you introduce into your own daily tasks at work?

Marks given for;
• Identifying real or potential project activities in your workplace and describing them from your viewpoint
• Your opinions on how well project management is handled in your workplace
• Applying some of the text book theory to what is observed in the workplace as a way of identifying gaps or opportunities in current work practices

SAMPLE ANSWER

Introduction

McDonald’s is one of the world’s largest multinational companies that trades in hamburgers fast food chains mostly based in the US. McDonald has over 35,000 branches in over 119 countries. The company was founded in 1940 and it has its head office in Oak Brook, Illinois in the US. McDonald’s realised a total revenue turnover of US $28.1057 billion in the year 2013.

The major opportunities that are available to McDonald include the large US market and the international market. The company’s customers are very loyal, its management strategic plans and marketing abilities are exceptionally well organized and also efficiently managed. This paper examines the weaknesses and the strengths of McDonalds plus its threats together with the opportunities and risks that the company may face.

External Factors Analysis

McDonald has experienced a rapid growth in its business processes probably due to its efficient marketing abilities and huge financial resources. The company employs over 1.9 million employees and its total assets in the year 2013 amounted to $36.6263 billion. The company has also diversified its products to also include soft drinks, French fries, chicken, milkshakes, fruits and salads. McDonald’s ability to expand to other international markets due to removal of trade barriers has increased the company’s chances of expansion.

Internal Factors Analysis

The major threats facing McDonald are the rival companies from the Asian market whose prices are lower than McDonald’s. The political instability that exists in foreign markets poses increased risks to the company’s profitability.

Opportunities Threats
Making use of accessible technology Political instability
Huge market change in govt policies
Rapid growth in segmented market Economic threats
Potential to diversify Competition
R & D  development of standard products Change in tastes & needs
Strengths Weaknesses
Cost efficiency High costs of maintenance
The effective VAS system Competitive pricing
Skilled human capital High effort for the VAS system
Accessible infrastructure High costs for technology dev
Loyal brands High expansion costs

 

The fear of new entrants of competitors in the market increases the risks that McDonald is exposed to. Economic crisis and change of government policies may also affect the profitability of the company.

The major weaknesses of McDonald are the large costs that are associated with the maintenance of the huge network of franchised companies, the maintenance of technological and support costs. The integration of the VAS system and the high costs required to compete effectively with Asian rivals.

Strategy Formulation

To compete effectively with the Asian rivals in the market, McDonald’s should target and implement growth strategies that would improve its performance including sales and business expansion strategies. The products of the company have to be fully differentiated and branded to strengthen its position in the market by utilizing the most effective marketing strategies that would make the company have a strong presence in the market (Kotler, Keller, Brady, Goodman & Hansen, 2012). Positioning involves persuasion and influence of customer decision through the use of objective and clear promotional strategies that would develop and expand the company’s primary demand in existing and emerging markets (Blythe, 2008). The market should be segmented by defining the needs of the customers in the market and profiling the different needs of the segmented market. Media communication strategies should entail the use of optimized integrated communication systems (Smith & Taylor, 2004). This may include the use of bill boards and other aggressive promotional strategies that would help penetrate the segmented markets.

Sales execution strategies may also exploit the optimized personal promotion strategies to expand and develop sales initiatives in other markets that are still emerging and also to strengthen its hold on existing markets to prevent the entry of competitors in the market.

Implementation

After the new marketing strategies have been implemented in the market, their effects have to be analyzed. The strategies have to be evaluated and their success weighed against an effective feedback system that analyses the performance of the marketing strategies against the targeted goals.

References

Blythe, J. (2008) Essentials of Marketing, 4th Edition, Essex; Pearson Education Limited

Kotler, P., Keller, K. L., Brady, M., Goodman, M. & Hansen, T. (2012) Marketing Management, 2 Ed. Essex: Pearson Education Limited.

Smith, P.R. & Taylor, J. (2004) Marketing communications, an integrated approach, 4th edition. London: Kogan Page Limited.

We can write this or a similar paper for you! Simply fill the order form!

Qualitative Approaches to DBA Research

Qualitative Approaches to DBA Research
Qualitative Approaches to DBA Research

Qualitative Approaches to DBA Research

Order Instructions:

For this paper the writer will follow strictly the instructions indicated below and will also use the articles send via email to complete this paper. The writer will have to pay attention to details and grammatical errors and will also have use APA style to format this paper.

Qualitative Approaches to DBA Research

During the first course of this program, you considered what it means to be a scholar-practitioner and also contrasted DBA programs with traditional PhD programs. As you plan for your doctoral study, keep in mind that one of your objectives should be to think and function in an action-oriented manner so that your research will be applied in practice. Consider what it means to conduct research that will affect change in everyday business practice.

Based on the reading and a detailed review of the “Research Design Considerations Flowchart” and the diagram “Preparing a Good Qualitative Study Within the Walden DBA Context” (on this week’s Resources bellow):

Identify the three types of qualitative research most appropriate for DBA research and discuss why these three are most appropriate.

What are the disadvantages of the other two approaches to DBA research? Use citations and references.

Resources;

• Resources
Qualitative Research Designs for DBA Research: Towards Improving Practice
Readings
Course Text
Creswell, J. W. (2013). Qualitative inquiry & research design: Choosing among five approaches (3rd ed.). Thousand Oaks, CA: Sage.

• Chapter 1, “Introduction”
In this chapter, the author discusses the impetus for this edition and the corresponding updates that differentiate this edition from the last. In addition, the author explains the research and rationale used to select the five approaches detailed in the text.

• Chapter 3, “Designing a Qualitative Study”
This chapter provides an overview of qualitative research and explains its common characteristics.

• Chapter 4, “Five Qualitative Approaches to Inquiry” (pp. 103-106)
In these pages, each of the five qualitative approaches to inquiry are explored, including the definition of each, its history, types of studies, procedures involved in conducting a study as well as the potential challenges associated with the approach.
American Psychological Association, (2010).

Publication manual of the American Psychological Association (6th ed.). Washington, DC: Author.
(Note: You should have received this reference text for a previous course. The APA Publication Manual will be used as a resource throughout this program.)

• Chapters 1–3
Read and understand the first three chapters and be able to apply as a scholar
Article

• Quisenberry, W. L. (2011). Common characteristics and attributes of self-managed virtual teams (Doctoral study). Available from ProQuest Dissertations and Theses database.

(Note: You are not expected to read the entire dissertation but rather lend a particular focus to the qualitative aspects of the study.)

SAMPLE ANSWER

Qualitative Approaches to DBA Research

Introduction

Business research is different from other types of research. For business researchers, the central purpose is to create research projects that will lead to practical solutions for existing business problems (Tranfield & Ken Starkey, 1998). Furthermore, business solutions are always related to people’s behavior and therefore the ability to understand hums behavior and culture is critical to doing business research. This means that the research approach that a business research chooses should be able to address these issues.

Ethnographic research approach, formal case study qualitative research, and phenomenological qualitative method approaches are the best approaches for Doctor of Business Administration (Creswell, 2013). The advantage of these three methods is that they provide a platform where the research is able to come up with a practical way of dealing with business problems and doing a research that leads to practical solutions instead of just theories. Business is about people and these three methods are very important in studying people, their behaviors, and cultures (Detert, Schroeder, & Mauriel, 2000).

Phenomenological qualitative method research approach for instance is useful in understanding business problems. With the use of interviews, the researcher is able to understand phenomenal from different viewpoints and this is important in creating practical business solutions. Ethnographical approach is also important in that it helps the researcher to interact with the people and understand the culture. People’s behavior is affected by their culture and this in turn affects the economic decisions that they make. Understanding these factors makes it possible for the business to be able to come up with practical solutions that will help the business to gain competitive advantage. The case study qualitative research is also very critical to business research as it deals with lived experiences for business, organizations and even individuals. By looking at the case study, the researcher is able to come up with ways to understand the business better and to develop practical solutions.

Strong descriptive qualitative research and the mixed design research are the other two research approaches that DBAs can use in their research. These methods, while appropriate for doing research in doctor of business administration disciplines, have their shortcomings (Boudreau, Gefen, & Straub, 2001). For instance, the strong descriptive qualitative research approach seeks to investigate why and how with regard to who, when, why and what parameters. The problem with this is that it is too descriptive, which means that at the end of the research proves the researchers will not help the come with a practical solution for business. While this is important in understanding certain types of business phenomena in the business environment, it fails to provide a solution that can be applied to business. In this regard, this method does not seek to solve a problem but seeks to understand a problem. Sometimes it may not even be geared towards understanding a problem but is geared towards understanding some phenomena. Regarding the mixed design research, the same problems also come up. This focuses on how many, how often, how statistically similar and or different phenomena is. It also seeks to identify correlation and cause and effect. This also leads to the same problems that strong descriptive qualitative research comes bring sin that the researcher does not develop a practical problem for the business environment. These two types of research approaches therefore may be useful in cases where a preliminary understanding of a business problem is required, but not where an ultimate solution is needed.

References

Boudreau, M., Gefen, D., & Straub, W. (2001). Validation in Information Systems Research: A State-of-the-Art Assessment . MIS Quarterly, 25, 1 , pp. 1-16

Creswell, J. W. (2013). Qualitative inquiry & research design: Choosing among five approaches (3rd ed.). Thousand Oaks, CA: Sage

Detert, J., Schroeder, R., & Mauriel, J. (2000). A Framework for Linking Culture and Improvement Initiatives in Organizations. ACADemy of MANAGEment REView 25, 4 , pp. 850-863 .

Tranfield, D., & Ken Starkey, K. (1998). The Nature, Social Organization and Promotion of Management Research: Towards Policy. British Journal of Management, 9, 4, , pp. 341–353.

We can write this or a similar paper for you! Simply fill the order form!

Diabetes Research Term Paper Available

Diabetes
                      Diabetes

Diabetes

Order Instructions:

see the attached files

SAMPLE ANSWER

Diabetes

Table of content

  • Abstract
  • Introduction
  • Methods
  • Results
  • Synopsis of literature
  • Discussion
  • References

Abstract

The incidence of diabetes is rising rapidly over time. Patients with diabetes are at higher risk of developing post-operative complications such as hyperglycemia or hypoglycemia which in turn contribute to increased morbidity and mortality and length of hospital stay in patient with diabetes undergoing surgery. Therefore, it is extremely important for nurses to take vigilant care of patients with diabetes undergoing surgery. This paper will describe the guidelines of peri-operative management of patient with diabetes and why it is important for nurses to follow these guidelines. Moreover, observations at clinical placements as compared to the findings in peer reviewed research articles will also be discussed in this paper.

Introduction

Diabetes is a metabolic disorder in which blood glucose levels remain high above normal. Patients with diabetes undergoing surgery may have specific needs, particularly in relation to blood glucose control and healthcare professionals such as nurses need to be able to assess and manage these individuals to ensure optimum surgical outcomes. Moreover, the metabolic impact of surgery, pre-op fasting and disruption in insulin therapy contribute to poor glycemic control which in turn leads to increased mortality and morbidity. To deal with this issue, it is always necessary for nurses to follow guidelines for perioperative management of diabetes for the diabetic patients. However, the problem is that most nurses and other professionals are likely to overlook these guidelines, thus placing the patient at a health risk.

Methods

This study involved the use of national database CINAHL Complete, which is available publically and through Australian Catholic University library. This study was conducted by gathering the results from medical research particularly from peer-reviewed journal articles.

Results

The results indicate that the level of awareness among nurses and other professionals such as anesthetists with regard to perioperative guidelines has increased over the last three decades.

Synopsis of literature

According to Marchant et al (2009), patients with uncontrolled diabetes are at greater risk of developing post-operative complications when compared with patients with controlled diabetes. Merchant et al (2009) suggested that healthcare professionals should monitor blood glucose levels pre-operatively as it is independent predictor of morbidity and mortality in patient with diabetes undergoing surgery. However, they also recommend healthcare professionals to monitor HbA1c levels to assess the risk of post-operative complications. Moreover, HbA1c level less than 7% is associated with lower risk of post-operative complications (Kerry, Scott & Rayman, 2013).

On the other hand, Holt (2012) reviewed the available data on pre and post-operative needs of patient with diabetes. He stated that it is very crucial for nurses to conduct appropriate pre-operative assessment of patient with diabetes at the earliest opportunity. However, not only blood glucose levels or Hb1Ac levels should be assessed, but also a complete patient history and examination should be carried out as further backed up by Dhinsa, Khan & Puri (2010). This allows time to assess adequacy of patient’s control of their diabetes and instigate action if needed. This minimizes the risk of post-operative complications such as hyperglycemia. In addition, Holt (2012) also explored that patients with poorly controlled diabetes experience more post-operative pain as compared to patients with well controlled diabetes.

Dhinsa, Khan & Puri (2010) explored the clinical guidelines for peri-operative management of patient with diabetes in their article. They mainly discuss the post-operative complications of patient with diabetes and nursing interventions. According to Dhinsa, Khan & Puri (2010), it should be nurse’s first priority to keep patient pain-free as to minimize the effect of body’s stress response to pain on blood glucose levels. This is further supported by Holt (2012) who argued that body’s stress response inhibit insulin secretion as well as increase insulin resistance. Nevertheless, stress due to surgical interventions not only raise the blood glucose levels in patient diagnosed with diabetes but also in patients without pre-operative diagnosis of diabetes as stated by Dhinsa, Khan & Puri (2010).

Dhatariya (2012) explains some clinical guidelines for patients with diabetes. He suggests it is preferable to place patients with diabetes early on theatre list to reduce the patient’s fasting time. This is because pre-operative fasting and discontinuation of oral hypoglycemic agents can cause hypoglycemia. It is also recommended that elective surgery should be postponed if pre-operative glycemic control is poor (Dhatariya, 2012). Dhatariya (2012) also argues that it is necessary for the nurses to work with the patient and the patient’s family to help them with adhering to the part of the preoperative guidelines that are beyond the nurse’s domain. These include the pre-surgery fasting (Learning Zone, 2012).

Discussion

During my clinical placements, I noticed that not all patients are tested for diabetes before surgery. This is a major issue as not all patients are aware of whether they have diabetes or not. In addition to this, I have observed that despite the fact that patients whose diabetic status is already known, the nurses are likely to overlook the symptoms of hyperglycemia such as itching skin, fruity breath, and confusion. It is difficult to identify usual warning signs of poor glycemic control while patient is unconscious which is potentially life-threatening and the nurses therefore need to do this before the patient is in sedated. Furthermore, when measuring blood glucose levels, the patient’s type of diabetes and type of antidiabetic medication they are on were overlooked, thus placing the patient at a much higher risk. I have seen that blood glucose checks are not performed while patient is in operation theatre, however, which goes against he guidelines as discussed by Campbell (2011). Discharge education for patient with diabetes plays an important role in their well-being post-operatively such as teaching patient about signs and symptoms of hyperglycemia, wound infection and wound non-healing. However, I have seen very few nurses in post anesthesia care unit giving discharge education to patients with diabetes which is also argued by Rutan and Sommers (2012). The other issue that is observable at the clinical placements is the fact that the different healthcare personnel are fully aware of the recommended guidelines. Other staff such as the anesthetists who also play an important role in the surgery process are also likely to be ignorant of the most up-to-date guidelines for preoperative care for patients with diabetes. All these factors work together to bring in a problem that can affect the post surgery results.

In this regard, even if the surgical team is able to fully adhere to the peri-operative care from the time that the patient is at the hospital, they are not able to do the same for the patient when he or she is not at the hospital. This includes the pre admission time where pre surgery fating is part of the peri-operative care. To implement the peri-operative care in a comprehensive manner, some aspects of the hospital’s operations will need some changes. First, there is a need for a better support system to help the patient and the patient’s family with regard to the part of the preoperative care that they are responsible for, such as pre surgery fasting. Secondly, the nurses need to update their knowledge of the full process of preoperative care. Thirdly, the hospitals should develop policies which will make it easier for healthcare personnel to identify surgery patients with diabetes and who do not already know they have diabetes.

References

Campbell, A. (2011). Pre-Operative Fasting Guideunes For Children Having Day Surgery. Nursing Ohildren And Young People, 23, 4 , pp. 14-21.

Dhinsa, B., Khan, W., & Puri, A. (2010). Management of the patient with diabetes in the perioperative period. Journal Of Perioperative Practice, 20(10), 364-367.

Rutan, L., & Sommers, K. (2012). Hyperglycemia as a risk factor in the perioperative patient. AORN Journal, 95(3), 352-363. doi:10.1016/j.aorn.2011.06.010

Dhatariya, K. (2012). Perioperative management of adults with diabetes: why do we need guidance?. British Journal Of Hospital Medicine (17508460), 73(7), 366-367.

Holt, P. (2012). Pre and post-operative needs of patients with diabetes. Nursing Standard, 26(50), 50-56.

Kerry, C. S., Scott, A., & Rayman, G. (2013). Daily temporal patterns of hypoglycaemia in hospitalized people may reveal potentially correctable factors. Diabetic Medicine, 30, 12 , 27-38.

Learning Zone. (2012). Pre and post-operative needs of patients with diabetes. Nursing Standard. 26, 50 , pp. 50-56.

Marchant, H. et al. (2009). The Impact of Glycémie Control and Diabetes Mellitus on Perioperative Outcomes After Total Joint Arthroplasty. The Journal Of Bone And Joint Surgery, Incorporated, 97, 1 , pp. 1621-1629.

We can write this or a similar paper for you! Simply fill the order form!