Understanding HRM and Human Capital Management

Understanding HRM and Human Capital Management Order Instructions: Understanding Human Resource Management (HRM) and Human Capital Management (HCM)

Understanding HRM and Human Capital Management
Understanding HRM and Human Capital Management

Guest (2011) argues that we are still ‘searching for some answers’ to the perennial question of the linkage between HRM and business performance. Ideally, HR professionals and other organisational leaders would be able to inform their decisions about policies and practices with sound theory developed through research, and they would be able to assess the effectiveness of their decisions using valid metrics. Though we may not have all of the answers, how can HR leaders move forward with what we have? How can leaders use alternative ways of thinking about organisational performance and effectiveness, such as ‘human capital management’ (Armstrong, 2006) to enhance management approaches? To prepare for this essay:

•Read the attached files: Guest (2011) and the concept of human capital management (HCM) advanced by Armstrong (2006).

•Consider how ideas from some of your other readings this week might relate to the issues outlined in the article.

•Find and read one or two other articles cited by Guest (2011) to further inform your thinking about the issues.

•Formulate a critical response to Guest’s (2011) article, addressing how HR professionals might measure the effectiveness of their own efforts and how they might test ideas about HRM practice in their own contexts.

•What measures, metrics or tools might HR professionals use to assess the effectiveness of HRM and/or HCM, and/or its contribution to business performance?
• What types of questions might an HR leader, or another organizational leader with HR responsibilities, be able to answer in his or her own context about how to improve HRM/HCM effectiveness?

•In organisations with which you are familiar, what types of information about HRM/HCM effectiveness and business performance were available? What types of information might have been useful in improving management practice?

1) I want a typical and a quality answer which should have about 830 words.

2) The answer must raise appropriate critical questions.

3) The answer must include examples from experience or the web with references from
relevant examples from real companies.

4) Do include all your references, as per the Harvard Referencing System,

5) Please don’t use Wikipedia web site.

6) I need examples from peer-reviewed articles or researches.

Appreciate every single moment you spend in writing my paper

Best regards

Understanding HRM and Human Capital Management Sample Answer

Understanding Human Resource Management (HRM) and Human Capital Management (HCM)

There are current efforts to answer the question of the linkage between HRM and business performance. In the real sense, HR professionals and other organizational leaders would be able to inform their decisions about policies and practices with the sound theory developed through research. This makes them assess the effectiveness of their decisions using valid metrics. HR leaders move forward with the existing knowledge on performance by using both HCM and HRM in yielding sustainable results in business (European Conference on Intellectual Capital, & Surakka 2012, p. 154. Managers can use human capital management to stop thinking about customers as assets but as a cost, they must bear to affect their business. HR leaders can measure the effectiveness of their own efforts and might test ideas about HRM practice by establishing if their customers are satisfied (Surakka 2012, p. 156). The leaders must as well identify if their employees are satisfied in their effort to meet their objectives. HR leaders may establish the effectiveness of human resource planning and forecasting. Above all, HR leaders can use the HR dashboard to check the performance of a company based on certain metrics.

Tools that might be used by human resource professionals to measure the effectiveness of HRM and/or HCM include the human capital index that measures the link between human resource management practices and the market value. The other tool used to measure HCM/HRM is organizational performance model that ideally identifies the gaps that are required to reinforce the business objectives and what is being produced. The human capital monitor is another tool, which is essentially focused on the value added per person to a business (Jackson, Schuler & Werner 2012, p. 136). The Sears Roebuck model is the fourth tool, which generally stresses increasing employee satisfaction, for example by increasing their pay, in an organization for the success of a business. The fifth tool for the measurement is a balanced scorecard. This tool deemphasizes the use of control in an organization to increase performance (Lawler & Boudreau 2009, p. 168). The balanced scorecard, therefore, underlines the use of a small number of analytical measures to build value in an organization. The last model is the EFQM model of quality, which suggests that customer satisfaction, employee satisfaction, and impact to the society are influenced by effective leadership. The contribution of these tools to business performance is that it enables the business to address all parameters/measures in order to meet its objectives successfully.

A human resource leader should ask himself questions to see how he can improve HRM/HCM effectiveness. One of the questions is whether their customers are satisfied. Another question to ask is whether the employees of the company are satisfied with their job. If not, the HR leader will have to develop strategies to reward employees in order to motivate them, and on the other side, sharing of information with the customers, whether informally or formally is very important to maintain loyalty. Another important question is whether the managerial structure is effective (Surakka 2012, p. 159). This ranges from the elements of control, work mechanisms, and performance management. Whether there is an effective and efficient work process, is another judgmental question an HR leader should ask. Questions of how work is done, level of technology, and the intensity of teamwork and interdependence among firms’ units are important to ensure the work processes part of it is looked into on how to improve HRM/HCM effectiveness.

The types of information about HRM/HCM effectiveness and business performance that were available include perceptual data, performance data, basic workforce data, non-financial data, and people development as well as performance information (Stam & Andriessen (2009, p. 202). The types of data that might have been useful in improving management practice at the organization comprise information on morale, for instance, employee turnover, motivation such as employee retention, an investment such as training investment, and long-term development such as training days.

Understanding HRM and Human Capital Management References list

EUROPEAN CONFERENCE ON INTELLECTUAL CAPITAL, & SURAKKA, J.       (2012).Proceedings of the 4th European Conference on Intellectual Capital: Arcada       University of Applied Sciences, Helsinki, Finland, 23-24 April 2012. Academic                        Pub. Pp. 154-186.

JACKSON, S. E., SCHULER, R. S., & WERNER, S. (2012). Managing human resources.[Mason, Ohio], South-Western Cengage Learning. Pp. 136-147.

LAWLER, E., & BOUDREAU, J. (2009). Achieving Excellence in Human Resources       Management an Assessment of Human Resource Functions. Palo Alto, Stanford       University Press.pp. 167-187.

STAM, C., & ANDRIESSEN, D. (2009). Proceedings of the European conference on intellectual capital: INHoland University of Applied Sciences, Haarlem, The       Netherlands, 28-29 April. Reading, Academic Publishing. Pp. 202-2012.

SURAKKA, J. (2012). Proceedings of the 4th European Conference on Intellectual Capital:         Arcada University of Applied Sciences, Helsinki, Finland, 23-24 April 2012. Reading,         Academic Publishing International. Pp. 156-168.

Dell Corp Marketing Strategies Research

Dell Corp Marketing Strategies Research Order Instructions: For a variety of reasons, businesses attempt to manage their reported assets, liabilities, revenues, expenses, or income.

Dell Corp Marketing Strategies Research
Dell Corp Marketing Strategies Research

You can search the Wall Street Journal, Barron’s, Business Week or other financial/business periodicals for articles on the subject. Attached is one such article involving Dell Corp. Do not research academic journals, as the articles typically will be too long and complex for our purposes. Your paper should be a minimum of three and maximum of 5 typed (double spaced, 12 point type) pages summarizing: 1) what the company did, 2) why they did it, 3) what reported financial numbers were affected, and 4) the dollar amount by which the reported numbers were affected.

Dell Corp Marketing Strategies Research Sample Answer

Introduction

Dell is a multinational company that has its headquarters in Round Rock in Texas in the US. Its major business activities is in developing and selling computers, their accessories and other related services and products. It’s listed as DELL in NASDAQ. It was founded in 1984 by Michael Dell when he was still a student at the University of Texas in Austin. Dell is a private company that was founded by Michael Dell in 1984. It currently has a revenue base of $56.94 billion and 108800 employees. It total current assets are $47.54 billion dollars as at the end of the year 2013 while its equities for the same period amounted to $10.68 billion. Dell has several subsidiaries among them are Alien Corporation, Compellent Technologies Inc, Force 10 Networks, Inc, Perot Systems Corporations, SonicWall Inc and SecureWorks Inc. (Dell Inc Annual report, 2012)

Dell organized its marketing strategies and made a lot of successes in selling personal computers, data storage devices, network switches, software, servers, MP3 players, cameras, printers and other computer peripherals. Dell was number 51 in Fortune 500 listings but was later dropped from the listing when it went under private control in the year 2013 and also its present confidential nature. Dell still maintains its number one status as the world’s leading shipper of PC monitors and it’s currently the sixth largest multinational company in Texas as per its revenues. (Dell Inc Annual report, 2012) Dell’s greatest competitor is Hewlett Packard while others are Compaq, IBM, Gateway and AST Research. The advent of the Apples tablets and the expansion of the laptop market affected Dell’s PC market especially in the US where its original market had a lot of demand and which sustained most of its revenues. (Dell Inc Annual report, 2012)

1.) Dell computers senior executives in 2003 adjusted the company’s balance sheets to reflect that its performance had improved hence it had achieved its targeted financial goals. The United States Securities and Exchange Commission also confirmed that stock options that were granted to senior executives were also backdated intentionally and they were not included as expenses in the balance sheets. The errors and financial irregularities that were identified by the commission included deficiencies in the company’s operation, accounting and other relevant financial controls systems that also required immediate corrective and remedial measures.

The commission discovered that between the financial period 2003 and 2006 most of the account balances were actually reviewed. Some of the reviews were carried out at the behest of the senior executives and whose knowledge or approvals were sought before the malpractices. The adjustments were sought to improve the quarterly performance targets that were to be achieved. The investigation by the commission finally concluded that the transactions were improper and which included the creation of accruals and reserves that were purposely created to incorrectly enhance the internal performance growth rates to influence the financial results. The transfers of extra liability from one account to another in excess accrual balances that mostly targeted the offsetting of unrelated future expenses. Also, the investigation revealed that some head of departments failed to provide relevant and complete information to the company’s head office and in some instances, false information was also presented to the company’s internal and also external auditors purposefully to mislead them. (Fulton, 2007)

The consistency approach in accounting makes it mandatory for private and public companies to maintain a constant policy of stock valuation and depreciation methods that the company adopts. (Hermanson, Edwards & Invacevich, 2011) Companies can opt for historical valuations or the first in first out stock valuation or the last in last out methods. Whatever the method adopted it must be maintained throughout the financial period. The methods adopted by Dell computers were not well defined and at one time the company’s head offices were not being given adequate information to make the right conclusions. (Fulton, 2007)

2.) Dell computers major objective when they made the adjustments was basically motivated by their desire to attain specific financial targets that the company had set several months ago.  An internal company audit that was carried out Willkie Farr & Gallagher LLP and also LLP KPMG.UL revealed that adjustments to the company books of reserves and also the Owings liability accounts or the accounts payable were also affected by the financial irregularities.  The investigations also revealed the Dell never disclosed large amounts of exclusivity payments that were primarily received from Intel computers ltd for the sole purpose of disagreeing to purchase processors from Intel’s rivals, the AMD. Dell was fined $100 million for the fraud by US Securities and Exchange Commission together with Michael Dell, the CEO, and owner of Dell computers and other senior Dell executives were also fined also sanctioned on specific financial company issues. They neither admitted nor denied the charges that were leveled against them. (Gollner, 2007)

3.) Dells form 8-K to report the financial misappropriation consisted of movement of money or the transfer of funds from one financial account to another to assist in account padding. These activities were actually compensating each account as the amount available in the accounts were just being restated, a fact which made the actual differences to be marginally low. The differences were estimated to be about less than 1% of the company’s net income and which were actually reversible. (Hermanson, Edwards & Invacevich, 2011)

The investigation by the commission eventually concluded that the transactions were improper and which included the creation of outstanding creditors and reserves that were purposely created to incorrectly enhance the internal performance growth rates to influence the financial results. The transfers of extra liability from one account to another in excess accrual balances that mostly targeted the offsetting of unrelated future expenses. Also, the investigation revealed that some head of departments failed to provide relevant and complete information to the company’s head office and in some instances, false information was also presented by senior Dell executives to the company’s internal or external auditors purposefully to mislead them. The motive of the whole exercise was however discovered that it was for the purposes of inflating the average rate of growth and the general performance of the company.

4.) The restated amounts for the four years amounted to $50 million and which would eventually reduce the net income to $150 million. The average amounts would reduce the restated annual average for the four year period to 1% of the total reported amounts or 2 cents for every 7 cents available per share. The investigations also revealed the Dell never disclosed large amounts of exclusivity payments that were primarily received from Intel computers ltd for the sole purpose of disagreeing to purchase processors from Intel’s rivals, the AMD Microprocessors. Dell was fined $100 million for the fraud by US Securities and Exchange Commission together with Michael Dell, the CEO, and owner of Dell computers and other senior Dell executives were also fined also sanctioned on specific financial company issues. They neither admitted nor denied the charges that were leveled against them.

To conclude, in their effort to inflate the rate of sales and other revenues earned, Dell computers recognized revenues inappropriately. These efforts led to the adjustment to attain specific financial targets that the company had set by the company as revealed by the internal audit investigation that was carried out by Willkie Farr & Gallagher LLP and also LLP KPMG.UL which discovered that adjustments to the company books of reserves, the accruals, and some other current liability accounts were also affected by the financial irregularities. The total cumulative amounts that were adjusted amounted to $50 million and the resulting effected reduced the net income for the consequent years by an average of 1% of the net income for the entire four year period. The net income was reduced to $150 million after the revelations by the US Securities and Exchange Commission. Because of this financial improprieties Dell was fined $100 million for the fraud by US Securities and Exchange Commission while its current CEO who was also the CEO at the time the problem started Michael Dell and other senior Dell executives were also fined and sanctioned on several financial company issues but they neither admitted nor denied the allegations that were leveled against them.

Dell Corp Marketing Strategies Research References

Dell Inc Annual Report for the financial period 2012.

Fulton, S.M. (2007) Dell Admits Fraud in Financial Reporting Will Restate Earnings Since 2003, Betanews, viewed December 1, 2014, from http://betanews.com/2007/08/16/dell-admits-fraud-in-financial-reporting-will-restate-earnings-since-2003/

Gollner, P. (2007, August) Dell Founder in Spotlight after Accounting Audit, Reuters, August 9, 2007, viewed December 2, 2014, http://www.reuters.com/article/2007/08/20/businesspro-dell-ceo-dc-idUSN1922640320070820

Hermanson, R.H., Edwards, J.D., & Invacevich, S.D. (2011) Accounting Principles: A Business Perspective, First Global Text Edition, Volume 2 Managerial Accounting, 37-73.

Parameters of Ethical Decision Making

Parameters of Ethical Decision Making
Parameters of Ethical Decision Making

Parameters of Ethical Decision Making

Order Instructions:

Evaluate Rawls’ theory and the other approaches to ethical decision making. Analyze the approach you feel works best in resolving ethical dilemmas. Once you have chosen an approach you feel is best, apply the ethical issue you identified. Assess the resolution your ethical decision-making approach suggests for your issue.

SAMPLE ANSWER

Parameters of Ethical Decision Making

Rawls theory has some insights regarding ethical decision-making. The theory provides recommendations on how to deal with ethical dilemmas. This mainly relies on his principles inscribed in the theory. One of the principles is difference principle that requires social and economic inequalities to be arranged so that they can benefit those who are less least disadvantaged. In simpler terms, differences in social and wealth position are acceptable as long as they can be shown to benefit everyone and, in specific those who have the fewest business advantages (In Christiansen, In Basilgan & IGI Global, 2014). The second principle is known as liberty principle that recommends that each person should have an equal right to as many basic liberties as possible. The environment should also still allow a similar system of liberty for all. This principle guarantees that an individual should process as much liberty as to live and seek chances as is possible, not infringing the liberties and freedoms of others.  

According to In Christiansen, In Basilgan & IGI Global (2014), the theory is obviously applicable to ethical matters in the larger health care setting where there are ethical dilemmas between health policy and allocation of resources. These issues can be approached by using Rawls theory from the perceptive of rights and individual liberties. The theory is also applicable in giving patients, patients, and families in health care setting autonomy and obligations to maneuver about ethical dilemmas involving ethical malpractices (In Christiansen, In Basilgan & IGI Global, 2014). These ethical dilemmas include decisions of end of life matters. This is because the theory has a strong emphasis in on moral obligation and the need to mitigate the practical consequences of social and business systems.

References

In Christiansen, B., In Basilgan, M., & IGI Global,. (2014). Economic behavior, game theory,  and technology in emerging markets.   https://www.academia.edu/10012177/Economic_Behavior_Game_Theory_and_Technology_in_Emerging_Markets

We can write this or a similar paper for you! Simply fill the order form!

Unethical Nature of the Internet Essay

Unethical Nature of the Internet
Unethical Nature of the Internet

Unethical Nature of the Internet

Unethical Nature of the Internet – Private Information

Order Instructions:

– Word Length: Approximately 2400 words
– 1 ½ spacing. (Paragraphs)
– 12 pt font
– Single Sided Paper
– Verdana
– Referencing Style: Harvard or APA is satisfactory.
– Please remember that you will need to have at least Four (4) varying references. For example: Journals, WebPages, Newspaper articles and Text books
– You will need to include: Reference List and an Appendix.

SAMPLE ANSWER

Unethical Nature of the Internet – Private Information

The internet has been widely embraced in the society today, as it has become an indispensable tool of managing communications, interactivity, and connectivity.  The discovery of the internet has completely altered the way people live and work specifically in terms of entertainment, shopping and communication. The internet makes it possible for people to live inexpensively by making it possible for them to access news and information (Merkow & Breithaupt, 2002). However, with only a small amount of carelessness, individuals could misappropriate their private information and thereby compromising their security and privacy. This paper analyses the ethical aspects that have been brought about by the internet. First, there is an introduction to the concepts of privacy and ethics. Second, there is a discussion on the ethical issues that surround the internet in the form of privacy in areas of e-commerce, internet search engines, and social networking. Finally, measure to resolve the ethical issues are highlighted for use by the government, internet users and professionals.

Ethical issues on the internet

Ethical actions are those practices that may be termed as acceptable by the general public. One behavior that is regarded as ethical is that of ensuring that the privacy of others is observed (Carroll, 2006). Privacy is the right of doing own things without interference. With the rapid growth of the internet, the gathering, storage, retrieval, and dissemination of personal information has become more inexpensive and efficient. There have been issues that have been raised in regard to the accessibility, and manipulation of private information. If an individual’s private information in uncontrolled in terms of usage, circulation and release, then their privacy has been compromised. The public generally dislikes all actions that would lead to the misappropriation of information of private information. The presence of such possibilities on the internet raises the concerns of internet users with regard to the safety of their private information while they are online. During online shopping, using search engines and logging into social networking websites, private information may be leaked unknowingly.

E-Commerce Websites

In an attempt to offer more personalized services e-commerce websites have increasingly included more personalized features. This has served to create more steadfast relationships with customers. It has also increased online sales significantly on a per-customer basis. Survey data indicates a tendency of individuals to appreciate personalization. On the other hand, it has raised privacy concerns, which range from discomfort especially about search engines offering information about their most frequent purchases to concerns about who may get access to this information, with more specific fears of identity thieves, co-workers and government (Merkow & Breithaupt, 2002). Users are also required to offer their personal data at a website if they need to get personalized services. This raises concerns about the information. Sometimes users may turn down such offers on the basis of their privacy. There are various forms of personalization in e-commerce that are regarded a threat to the privacy of individuals.

Implicit and explicit data collection

Implicit data collection refers to that data, which is inferred based on the user’s habits on the internet (Merkow & Breithaupt, 2002). It is collected based on the queries placed by a user on the internet, browsing history and purchase history and may be used to offer further information to the user.

Explicit data collection, on the other hand, is based on the information that is obtained directly from the user (Merkow & Breithaupt, 2002). The user provides information about his demographics, ratings and preferences. Recommender personalization involves the user by requiring them to rate certain items in the order in which they interest them. Other sites require users to customize their pages according to their personal preferences.

Duration

Session or task focused personalization – This method places adverts on sites that relate to them. Adverts may also be provided based on previous actions. If a user buys items that relate to tennis, more items in the tennis category are presented.

Profile-based personalization – Some personalization systems create user profiles and continually add information that is provided either explicitly or inferentially every time the user visits the website (Merkow & Breithaupt, 2002). Cookies or login details may be used to access the website and to recognize returning users.

User involvement

User initiated-some websites require visitors to select customizations in the form of weather forecasts for their region, stock tickers, or news of interest. Users may also provide information about page layout that best suits them or the bandwidth constraints and require that their web pages are accordingly optimized.

System initiated-Every user has their content customized according to the information they provide either explicitly or inferentially. Users may be allowed to opt out of such customizations (Riedl, 2001).

Reliance on predictions

Prediction based – User’s inferred or explicit ratings may be used by the websites to generate interest based on the profiles of other users. Once the system discovers users with similar profiles, such information may be used to offer recommendation to both users interchangeably (Riedl, 2001). While not all recommendations end up as sales, they make the user get the feeling of being understood.

Content based – If a user expresses interest in one item or makes a request, they may get further recommendations based on such requests (Scassa, 2014). The request is used as a basis for determining other related likes so that the retailer attempts to satisfy them.

Privacy Risks

Some sites use a variety of these methods to maximize user experience. A good example of such sites is Amazon. There are various ways that e-commerce poses risk to user privacy (Carroll, 2006).

First, there is unsolicited marketing on the internet. While unsolicited market may be one of the less severe risks on the internet, it is still among one of the most mentioned risks on the internet (Fritsch, 2013). The risk therefore amounts to a sufficient concern for users who do not want unwarranted marketing. It has even led to the decision by some users not to engage in e-commerce. Users are also concerned that the information provided by them during purchases may be used to make targeted communication or may be made to other companies to make use of on targeted marketing campaigns. Furthermore, users fear that as a company gets access to more of their private information, it may get more interested in advertising to them.

Individuals are also uncomfortable about the automated nature of customization on the internet. Sometimes as websites try to figure out the needs of their users, they figure out needs that are completely uninformed (Levmore & Nussbaum, 2010). In some cases, individuals are not comfortable with the possibility of the information of such advertisements getting into the wrong hands and drawing wrong conclusions. Regardless of whether the company makes such wrong inferences, some people are simply uncomfortable with the possibility of being ‘watched’.

Secondly, price discrimination is another problem that arises from information given online. While there are possibilities that both the company and the consumer benefit from price discrimination, the response of consumers to price discrimination is more often negative (Jakubiak, 2010). Consumers are often concerned about both the aspect of being treated differently from other people and that of being charged more highly. Price discrimination also involves the diversion of more private information.

Thirdly, there is risk that user information is accessed by other users on the same computer (Riedl, 2001). Once a computer user accesses a website using login details, the computer is able to keep the private information in the form of cookies such that other users may be use the computer to access the website unheeded.

There is also the risk of the information in the phone being used against them in a court of law. Internet records are increasingly being used as evidence in a wide variety of cases. In cases where the character of the user is questionable, the information in user profiles, the content of their posts and their purchases may be used against them.

Information Privacy in Social Networking

Social networking is another great invention that is associated with the internet. Social networking sites allow individuals to create personal profiles and share such information publicly (Levmore & Nussbaum, 2010). While considering putting such information online, the user must consider the level of privacy that the user is diverging. If the individual fails to utilize the privacy settings when posting such information, their privacy is compromised. In such cases, any internet user is able to access their information without restrictions. The user is however able to use the privacy settings to limit the number of people who have access to every part of their profiles.

The real concern starts when individuals allow strangers or people who would not be trusted with their private information to access it (Levmore & Nussbaum, 2010). If there is no proper control of private information, there may be unethical attempts to use it. The risks may include blackmailing, price discrimination, embarrassment, physical stalking, and identity theft (Solove, 2007).

As noted above, one of the risks associated with social networking is stalking. A social networking profile contains information about the home location as well as the location of individual posts (Jakubiak, 2010). Users may also opt to share their location and hence expose themselves to burglary, robbery or even harassment. The possibilities that such information may be used to the advantage of criminals makes social media an ethical issue.

Information Privacy in Search Engines

Social networking sites are required to provide users with links to websites that contain information that is relevant to them. The topics vary with the interests of the user in regard to what information they need (Jakubiak, 2010). Search engines also make it possible for one to access private information that is placed on any platform online. People however are uninformed that their private information is contained on the database. Even in situations where the user is aware of such information being available on the database, their privacy is compromised when their information is obtained for unethical reasons.

The use of search engines further gets complicated as it even makes available some information whose privacy is limited. Such information includes membership of certain groups on social media even in cases where membership is limited (Levmore & Nussbaum, 2010). If the user was unwilling to share that information, then their information is compromised. Furthermore, such information may be used against them in different scenarios.

Measures to counter the ethical implications on the internet

As shown above, the internet has many ethical implications. While it may be used to do activities that are valuable to individuals and to the society at large, it also comes with a variety of challenges in information privacy (Levmore & Nussbaum, 2010). There are three major parties that must get involved in the process of controlling the problem of information privacy on the internet.

First, the government should create legislations intended for the management of various aspects of the internet. Governments should create legislations that limit the manner in which private information may be obtained and shared without their permission (Levmore & Nussbaum, 2010). Legislations will also aid to mend the damage done by carelessness at personal levels. If a global privacy policy is generated (probably with the assistance of the UN) the public will stand better protected from information privacy issues.

Self-protection by users

Users cannot rely solely on government legislations to deal with the issue of information privacy. It is also important that users participate in the process of self-protection by taking a variety of measures:

  1. Private information should only be provided consciously to websites. Users should explore the purpose for which their information is required on a website and whether such information will be shared with other entities.
  2. It is important that users use privacy settings to limit the accessibility of their private information. Furthermore, users should limit the information shared on these websites to limit their vulnerability on the internet.
  • Apply complex and varied passwords to protect personal information on websites on the internet. This will limit access of personal profile information and associated elements. It will also limit the number of profiles a hacker is able to hack.
  1. Enhance security measures by using firewalls and browsers to limit accessibility of privacy information.

Professionals

Professionals can also aid in minimizing the impact of information privacy on the internet.  They should minimize the amount of information provided as well as the ways in which they use the personal information so obtained (Jakubiak, 2010).  They should ensure that they do not get into the middle of privacy conflicts, as this is capable of limiting the deliverability and even removal from their job positions for being either unethical or controversial.

Professionals should also practice various measures to ensure that user information is secured:

  1. Enable collection of specific information that is important for them
  2. Ensure that information is updated by users every once in a while to eliminate to ensure that the information in their possession is accurate
  • Ensure proper communication about the use of the collected information and then only ensure that information is only used for the intended intentions.

In conclusion, the internet is an important tool in our everyday lives. It should, therefore, be managed and controlled to ensure that it will be in use for a long time. The information presented by internet users should also be managed to ensure that user data is always fully secured. The internet has become a threat to information privacy. This has become an ethical issue in that some private information may be misappropriated. Various platforms pose a risk to privacy on the internet. These include e-commerce, search engines and social media. To resolve the issue, various parties should be involved. The government should create regulations to govern the internet and the way the information is collected and shared online. Individuals should increase their awareness of internet risks so as to avoid them. Finally, professionals should promote ethical practice to avoid conflict with their employers, the law and the public.

References

Carroll, J. (2006). Privacy. Detroit: Greenhaven Press.

Fritsch, L. (2013). The Clean Privacy Ecosystem of the Future Internet. Future Internet, 5(1), 34-45. doi:10.3390/fi5010034

Jakubiak, D. (2010). A smart kid’s guide to Internet privacy. New York, NY: PowerKids Press.

Levmore, S., & Nussbaum, M. (2010). The offensive Internet. Cambridge, Mass.: Harvard University Press.

Merkow, M., & Breithaupt, J. (2002). The E-Privacy imperative. New York: AMACOM.

Nazario, J., & Kristoff, J. (2012). Internet Infrastructure Security. IEEE Security & Privacy Magazine, 10(4), 24-25. doi:10.1109/msp.2012.99

Riedl, J. (2001). Personalization and privacy. IEEE Internet Comput., 5(6), 29-31. doi:10.1109/4236.968828

Scassa, T. (2014). Privacy and Open Government. Future Internet, 6(2), 397-413. doi:10.3390/fi6020397

Solove, D. (2007). The future of reputation. New Haven: Yale University Press.

We can write this or a similar paper for you! Simply fill the order form!

Cross Tabulation Application Assignment

Cross Tabulation
Cross Tabulation

Cross Tabulation

Cross Tabulation Application Assignment

Order Instructions:

Application: Cross Tabulation

Variable relationships are very important in quantitative research. They tell researchers what effect different variables have upon one another. One of the easiest ways to display relationships between variables is through a cross-tabulation (cross-tab). A cross-tab is simply a chart that shows frequency or distribution of one or more variables for every category of another variable. Stated another way, a cross-tab is a joint frequency distribution of observations on two or more sets of variables. These statistical observations can be presented by numeric frequency, percentages, or both, depending on which is most useful given the specific data context.??For this Application Assignment, perform a cross-tabulation on the data provided in the handout “Week 10 Dataset” such that property crime is displayed as a rate per student population. Though Excel is not the only software that can be used to perform a cross-tabulation, it is used here because it is a widely available program. The handout entitled, “Cross-Tabulation in Excel” contains instructions on how to complete the task in Excel using two different methods.??The assignment (2–3 pages):

• Using Excel, perform a cross tabulation on the data provided in the Week 10 dataset.

• Explain what you can conclude from the output of the cross tabulation.

• Include your outputs in your Application Assignment document. (Copy and paste them from Excel into your Word doc.)

Support your Application Assignment with specific references to all resources used in its preparation. You are to provide a reference list for all resources, including those in the Learning Resources for this course.

Note: Please use the course text as one of the references for this assignment, AND the other articles on the attached files sent by email.

SAMPLE ANSWER

The Pivot table below, shows the total crimes and various categories of crimes committed in each college and totals for all the colleges. The information could help college authorities to know which crimes recur frequently.

College Sum of Crime Total Sum of Forcible Rape Sum of Aggravated Assault Sum of Arson Sum of Property Crime
Abalone University 35 5 12 1 17
Franklinville College 4 0 2 0 2
Marie Louis College 14 2 4 0 8
Robert Long College 9 0 1 0 8
Simon State 42 3 5 1 33
Grand Total 104 10 24 2 68

 Table I

(Jelen, 2010)

The pivot table below shows student enrolment and the number of crimes committed in each college

Table II

College Sum of Student enrolment Sum of Crime Total
Abalone University 10486 35
Franklinville College 989 4
Marie Louis College 2301 14
Robert Long College 3467 9
Simon State 20573 42
Grand Total 37816 104

(Jelen, 2010)

Table III

College Sum of Student Enrollment Sum of Crime Total Crime total as a percentage of student enrollment
Abalone University 10486 35 0.33%
Franklinville College 989 4 0.40%
Marie Louis College 2301 14 0.61%
Robert Long College 3467 9 0.26%
Simon State 20573 42 0.20%
Grand Total 37816 104

The pivot table below shows the grand totals of all the categories of crimes, crime totals and student enrolment arranged in a descending order

Table IV

College Sum of Student Enrolment Sum of Crime Total Sum of Forcible Rape Sum of Aggravated Assault Sum of Arson Sum of Property Crime
Simon State 20573 42 3 5 1 33
Abalone University 10486 35 5 12 1 17
Robert Long College 3467 9 0 1 0 8
Marie Louis College 2301 14 2 4 0 8
Franklinville College 989 4 0 2 0 2
Grand Total 37816 104 10 24 2 68

(Jelen, 2014)

The pivot table below indicates the various categories of crime totals, student enrolment, and various categories of crimes as a percentage of the grand total in each category.

Table V

College Sum of Student Enrollment Sum of Crime Total Sum of Forcible Rape Sum of Aggravated Assault Sum of Arson Sum of Property Crime
Abalone University 27.73% 33.65% 50.00% 50.00% 50.00% 25.00%
Franklinville College 2.62% 3.85% 0.00% 8.33% 0.00% 2.94%
Marie Louis College 6.08% 13.46% 20.00% 16.67% 0.00% 11.76%
Robert Long College 9.17% 8.65% 0.00% 4.17% 0.00% 11.76%
Simon State 54.40% 40.38% 30.00% 20.83% 50.00% 48.53%
Grand Total 100.00% 100.00% 100.00% 100.00% 100.00% 100.00%

 (Jelen, 2010)

Report of findings

Table I above shows the total crimes committed in all the colleges which was 104 in total.It also shows the total number of crimes committed in each category of crimes. Table I shows that property crimes were higher than all other crimes at 64 followed by aggravated assault at 24, then forcible rape at 10. The least number of crimes committed at the colleges was arson at only 2 incidences. College administrators can therefore put in place measures to address property crimes which are likely to recur more frequently than the other categories of crimes. Table II shows the relationship between student enrollment and the number of crimes committed. From Table II, it can be observed that the higher the student enrolment the higher the numbers of crimes are committed. For example Simon State with a student enrolment of 20,573 recorded the highest number of crimes at 42 whereas Franklinville College with an enrolment of 989 had only 4 crime incidences. However, this information could be misleading judging by the percentage number of crimes per student enrolment as shown in Table III.  Marie Louis College which had a student enrolment of 2301 has a higher percentage of crime occurrences at 0.61% as compared to Simon State which had 0.20% but with a higher student enrollment of 20,573. Franklinville College has a crime incidence ratio of 0.40% to student enrollment. If the same ratio at Franklinville College and Marie Louis College was applied to Simon State, then Simon State would have recorded higher crime incidences than the 42 incidences recorded. The problem of crime is more severe in Marie Louis College than in the colleges with higher enrollment.

Table IV shows the college arranged in an ascending order depending on the crime rates and student enrolment. At the top of the table is Simon State which had the highest number of student enrolment and the highest incidences of crimes followed by Abalone University and so on. The last college is Franklinville College which had the least student enrolment and the least number of crimes recorded. Table V presents the percentage number of crimes, student enrolment and various categories as a total for each category. From the table Simon State had the highest number of student enrolment at 54.40% whereas Franklinville College had the least at 2.62%. Simon State also recorded the highest incidences of crime at 40.38% whereas Franklinville College recorded the least number of crimes of the total crimes recorded in all the colleges at 3.85%.Abalone university recorded the highest number of forcible rape, aggravated assault and arson crimes as compared to other colleges at 50.00% of all crimes committed in these crime categories. Simon State recorded the highest number of property crimes of all other colleges at 48.53%. Abalone University administrators should check forcible rape, aggravated assault and arson because they are more likely to recur. Simon State should focus more on tackling property crime to bring down crime incidences within its precincts.

References

Jelen, B. (2014). Excel 2013 pivot tables offer distinct count. Strategic Finance, 96(4), 52-53 Retrieved from http://search.proquest.com/docview/1614145336?accountid=45049

Jelen, B. (2010). Filtering multiple pivot tables in excel 2010. Strategic Finance, 92(3), 52-53 Retrieved from http://search.proquest.com/docview/751221731?accountid=45049

We can write this or a similar paper for you! Simply fill the order form!

Operational Risk Management

This article will focus on operational risk management. After reading chapters 1, 2 and 7 in Essentials of Risk Management, you should have a basic understanding of what is involved in managing risks within a corporation. It focuses on the operational considerations. Most of these considerations involve the employees in some way. It provides an example of a company that failed to use risk management properly explains how it could have helped them to avoid their problems.

 Costs of Operational Risk Management 

Every risk in a business organization has got its own costs associated with it. Risk management is among the very basics and essentials of an organization.  Poor risk management will cost the organization highly in terms of finances or even the public image. Proper and effective risk management will help the organization tackle issues in a very effective and efficient manner, which is less costly as compared to addressing the risk after it has occurred. Risks can result out of employees, technicalities in operations, and poor management strategies (Risk Center, 2013). In order to manage risks effectively, the organization needs to identify the risks and categorize them into strategic and operational risks. The former are those risks that come up due to the decisions that are made by the management, which affect the business adversely or negatively. A single operational risk may not affect the organization so much but the occurrence of the same, for instance, more than twice will affect the organization greatly. For instance, an occurrence of a single burglary in an organization may not affect it so much but its repetition will affect the organization greatly in terms of financial loss. This risk indicates a gap in the security systems of the organization and if not addressed effectively, then the entity is likely to suffer a great financial loss (Youngn& Coleman, 2009).

In the year 2007, the United Kingdom Government taxation authority, HM Revenue & Customs (HMRC) incurred a very great operational risk. In this case, personal details of 25 million people that were stored in two CDs were lost in the internal emails. The fallout from the loss of these CDs included the resignation of the HMRC chairman Paul Gray due to the organization’s substantial operational failure. This is a very good example of an operational risk, which has got a very great financial loss for the country.

Operational Risk Management Board

The operational risk management board cannot be able to manage risks by itself; however, it is responsible for formulation and implementation of control systems that can deal with the problem appropriately. The board can establish a risk committee that is to monitor exposure, actions taken, and the risks that have materialized. The risk committee will be tasked with the responsibility of assessing the operational risks in an aggregate over the whole organization. They make a decision on which risks are the most significant and the appropriate actions to be taken in order to counter them. In order to achieve this effectively, the risk committee needs to set priorities for the control systems and liaise with the internal audit through the auditor to ensure that these risks are covered (Bauer & Erdogan, 2012).

This risk committee can be supported by a risk management function, which shall be responsible for establishing a risk management framework and the appropriate policies and regulation in regard to effecting or the use of the framework.

Operational Risk Management
risk management

The risk management function should also promote risk management by providing the appropriate information and training of the employees regarding how they can manage the risks that are available within their department or area of specialization. Apart from ensuring specific risks are dealt with appropriately, managers will be concerned with their local working environment and will deal with conditions that may cause risks to materialize (Bauer & Erdogan, 2012). For instance, they shall have to assess whether the employees are working excessively long hours and are more likely to make mistakes due to overworking. The managers shall also supply information to senior managers to enable them in assessing the risk position over the whole organization. In essence, the employees are held responsible for taking the appropriate steps to manage the risk and preventing risks from occurring. The senior management and the risk management committee are held responsible for ensuring that the employees have the appropriate knowledge and skills for dealing with the risks.

After the operational risk analysis by the operations committee, the organization can classify operational risks into two broader categories, which include low probability high impact risks and high probability low impact risks. The management of low probability but high impact risks can involve insuring the risks in question so that when they occur the organization can recover quickly to avoid much financial loss (White, 2014).

Operational Risk Management  contingency plan

For the other risks, they can choose to use a contingency plan. A contingency plan serves to replace or replicate the efforts of other systems. This is commonly used by having generators or other sources of energy standby so that when there is a blackout, the production process can continue. The contingency plan can also be applied in information systems. In the above case of the United Kingdom taxation authority, replication of information materials could have helped manage the risks. In the current world, there are several methods and means of storing digital information, this includes cloud computing. Had the management used other alternative methods of storing the data, they could have recovered easily from the loss (White, 2014).

Managing operational risks is very essential in every organization. Clear analysis of the likely risk should be done, and then the appropriate measures to manage the risk are identified. The information is availed to the relevant people on how to manage the risk; this can involve training of the employees and equipping them if necessary. Poor risk management strategies result in large financial losses for the organization.

Operational Risk Management References

References

Bauer, T., & Erdogan, B. (2012), Organizational behavior (1.1 ed.). Nyack, NY: Flat World

Knowledge.

Risk Center, (2013). Operational Risk: Operational Risk Regulation and Assessment.

Retrieved from http://riskcenter.com/operational-risk

White, J. (2014). Security Risk Assessment: Managing Physical and Operational Security

(1St ed.). USA: Butterworth-Heinemann.

Young, B. & Coleman, R. (2009). Operational Risk Assessment: The Commercial Imperative of

a more Forensic and Transparent Approach. The Wiley Finance. NY: Wiley

 

 

Impact of Corporate Social Responsibility Policy

Impact of Corporate Social Responsibility Policy
Impact of Corporate Social Responsibility Policy

Impact of Corporate Social Responsibility Policy

Order Instructions:

For this project component, you generally assess the impact of corporate social responsibility policy on the workplace and corporate America.

To complete this assignment:
• Assess how, and to what extent, corporate social responsibility can be meshed with a corporation’s obligation to maximize profits for its shareholders.
• Then, assess the ethical nature of the company you selected.
• Next, with regards to the issue you chose for the project, assess the impact on the chosen company and other stakeholders—including monetary, legal, and reputation-wise—of continuing the status quo versus addressing your issue via corporate policy.

SAMPLE ANSWER

Impact of Corporate Social Responsibility Policy

Corporate Social Responsibility (CSR) is achieved when an organization is able to incorporate social and environmental concerns into its business operations and other interactions with stakeholders.  It is a way of allowing an organization achieve triple-bottom-line – balancing environmental, economic and social goals of an organization, without compromising shareholder and stakeholder interests (Ruggie, 2014).

Increasingly, Corporate America has appreciated the importance of CSR to the operations of the organization – triple-bottom-line.  This has changed the psyche of corporate America to appreciate that maximizing economic returns alone is not sustainable in the long-run.  Corporate America is not tripping over itself in an effort to maximize the returns that accrue from engaging in CSR.  This should not be confused with philanthropy or charity.  CSR is a policy that is engrained into the organization’s psyche such that all stakeholders understand it; appreciate why it is engaged in and the value to the organization and community benefiting from it (Ruggie, 2014).  It is not an afterthought, but a deliberate well-thought out decision.

American Express is a one of the leading credit card companies in America.  It permeates all aspects of American lives given the American love for credit.  This being the case, American Express discovered that given the extent of their reach in the society, a CSR policy would give the organization more benefits that the cost it would incur to implement the policy.  Thus, at American Express, they believe that community service is not only key to the organizations operations, but is actually central to the organizations survival.  Thus, American Express has endeavored to permeate good corporate citizenship by supporting communities so that the organization’s reputation is enhanced among its various stakeholders and shareholders.

One of the areas that American Express has chosen to focus on is preservation and sustainability of unique historical places for the future.  This aspect of CSR was borne out of a realization that preservation assists communities understand whom they are while shaping relationships with other communities around the world.  American Express thus seeks to ensure these historic places can be easily accessed by communities because, this is the only way their history will survive in addition to increasing the public understanding of their significant contribution in sustaining communities presently and for posterity (Ruggie, 2014).

By choosing to tackle corporate social responsibility in this way, American Express seeks for its stakeholders and shareholders to associate it with America the country.  American are very proud of their history and view those who their history positively.  To an outsider looking at the Corporate Social Responsibility Policy of American Express could be forgiven for not immediately establishing a connection with preservation of historical sites.  However a critical look at it reveals a calculated and deliberate decision by American Express.  By associating American Express with the history of the United States of America, consumers have a positive view of the organization.

This positive view of the organization, translates to increased business and by extension growth in its profits.  When viewed in this light, American Express becomes by default the legal custodian of American historical sites.  For American Express, the embedding of Corporate Social Responsibility as a policy changes the status quo and the results are positive with regards to the triple-bottom-line.

References

Ruggie, J. G (2014).  Just Business:  Multinational Corporations and Human Rights, W. W Norton & Company, Inc, New York, NY.

We can write this or a similar paper for you! Simply fill the order form!

Nurse Practitioner Soap Notes and Genital Infection

Nurse Practitioner Soap Notes and Genital Infection Order Instructions: see the instruction I sent Nurse Practitioner SOAP Notes

Nurse Practitioner Soap Notes and Genital Infection
Nurse Practitioner Soap Notes and Genital Infection

SUBJECTIVE DATA

Chief Complaint (CC): “I have been having vaginal itching, burning and discharge for the past five days now”

History of Present Illness (HPI): Ms. T. A is a 35-year-old African American female who presents to the clinic stating that she has been having vaginal itching, burning and discharges for the past five days now. A patient described that her discharge is thick cottage cheese without any odor. She reported itching and burning with urination. She denies any blood in her urine. She reported itching and burning sensation when urination. She reported pain, burning, and discomfort during sexual intercourse. She rated her pain during urination as 4 and pain during sexual intercourse as 5 on a scale of 1 to 10. She denies using any medications to relieve her symptoms. She denies fever, chills, back pain costovertebral tenderness and suprapubic pain. She denies nausea and vomiting. She denies using a condom for sexual intercourse because is in a monogamous marriage with her husband. She also came to the clinic to have pap/ pelvic examination done.  Her last pap was March 2012. The patient said her menstrual period is regular. Her last menstrual period was April 20th, 2014. She used about 4 pads a day during her periods. She denies using tampons for her period or douching. Patient’s age of onset of menarche was 12-years-old. She is sexually active. She denies the history of any sexually transmitted disease.

Medications: She is currently taking women’s multivitamin once a day.

Allergies: No known allergies to medications, foods, insects and the environment.

Past Medical History (PMH): No history of past medical history,

Past Surgical History (PSH): No history of past surgical history.

OB/GYN History:

Obstetric History: G2, P0, T2, A0, and L2. She has her two children full term their weights range from 7lbs 8lbs. she has spontaneous vaginal delivery no complications on April, 15th,  2009 and  July  5th, 2011.

Her menstrual period is regular and lasts for about 3 days. Method of contraception is ParaGard IUD (10years) which was inserted November 14th, 2011.

Menstrual History: Age of onset of menarche was12-years-old. Her last menstrual period was

April 20th, 2014. Her menstrual period is regular and last for about for 4 days. No spotting or bleeding since her last menstrual period. Her last previous pap examination was March 2012 and no history of the previous mammogram. No history of sexual of sexually transmitted diseases. She denies using douching.

Method of Contraception: Method of contraception is ParaGard IUD (10years) which was inserted September 14th, 2010.

Sexual function: She is sexually active with her husband. Her last sexual activity with her husband was three days ago.

Personal/Social History: She is married and lives in a single-family house with her husband and children.  She graduated with a bachelor of science in biology. She is currently working in a laboratory company as a manager.  She denies exposure any to smoke at home. She does not smoke, drinks alcohol or use illicit drugs.  She sleeps for about 7 hours at night. She has a good family support system. She has one regular sex partner (her husband) and three-lifetime partners. She is sexually active and her form of contraception is ParaGard IUD. She eats healthy food. Her favorite’s foods are baked fish, beans and vegetables. She walks about 2 miles a day. Her hobbies are jogging, cooking and watching movies.

Immunizations: Flu vaccine January 2014, Varicella April 2003, Hep B July 2009, Tdap February 2010, MMR, May 2007 and pneumonia: Never received.

Family History:  Grandparents on both sides are deceased with no medical problem.

Her mother is 55 years alive with no medical problem.

Father: Her father 57 years alive with no medical problem.

Brother: Her brother is 30 years alive with no medical problems.

Sister:  Her sister is 32 years alive with no medical problem.

Nurse Practitioner Soap Notes and Genital Infection Review of Systems

General: She denies any chills or fever, change in appetite, fatigue, and weakness. No recent weight changes.

 Skin: She denies any rashes, sores, lumps, lesions, acne, itching and dryness or changes.

HEENT: She denies dizziness, headache, and syncope. She denies any problem with her hair. No history of alopecia. She denies ear pain, difficulty hearing/ changes in hearing and denies tinnitus. She denies changes or problems in vision. She denies eyes pain, blurred vision, seeing spots, burning, edema and discharge. She denies epistaxis, runny nose, and sinus pain.

Neck: She denies pain or stiffness in moving her neck.

Breast:  She denies breast tenderness, lumps, discharge, and nipples darkening.

Respiratory: She denies any wheezing, coughing or shortness of breath.

Cardiovascular: She denies any chest pain or shortness of breath. She denies any irregular heartbeat.

Gastrointestinal: She denies any abdominal tenderness and pain. Her last bowel movement was yesterday. She denies any changes in bowel or bladder habits. She denies constipation, diarrhea, and blood in the stool.

Peripheral vascular: Pulses are palpable in all extremities. No edema.

Urinary: She reported the frequency with urination, pain and burning upon urination and she rated her pain as 6 on a scale of 1-10.

Genital: She reported cottage cheese-like discharge from the vaginal and burning sensation and frequency with urination. She denies douching or odor from the vagina. She denies any history of abnormal pap or sexually transmitted diseases. She reported soreness and redness to the outer area of the vaginal.

Musculoskeletal: She denies having any muscle weakness and joint pain.

Psychiatric: She denies having any present/past psychiatric problems. No depression, mood changes or anxiety.

Neurological: She is alert and oriented to place, time and person. She denies any recent change in memory or forgetfulness. She denies any tingling, numbness or paresthesia.

Hematologic: She denies any history of blood disorder and easy bruising. She has regular menstrual bleeding.

Endocrine: She denies any history of diabetes or thyroid disorders. No excessive thirst, polyuria, polydipsia, and polyphagia.

 OBJECTIVE DATA:

Vital Signs: BP 120/66, T 98.7, P 80, R 18, and oxygen saturation 98 % on room air. Height 65 inches, weight 145 lbs. and BMI- 23.4.

General: Ms. T. A is a 35-year-old African American woman and she is appearing well. She is awake, alert and oriented times three. She is in no acute distress. She is in good health. She dresses appropriately and hair is well groomed.  She smiles appropriately and seems happy. Her posture is good, gait is steady and she walks very well. No mouth or body odor noted. She speaks very good English. She is very friendly, well behave and very polite.

SKIN: No rashes, lesions, sores, acne, lumps, itching and dryness or changes noted. Good skin turgor.

HEENT:  Pupils equal, round, reactive to light and accommodation. Extraocular muscles are intact. Head is normocephalic. Hair distributions are normal. No ear discharge noted. Nares are patent. Her oral mucosa is normal and appearing well, mucous membranes are moist and pink and good dental hygiene. No teeth missing.

Neck: No thyroid nodules or thyromegaly noted. No jugular vein distention noted.

Breasts: Breasts are bilateral, non-tender to palpation, areolas are light pink and, no palpable nodes and no discharge noted.   No masses, tenderness or lumps noted.  Present of hair around the chest and nipple.

Chest/Lungs:  Chest is symmetrical. Lungs are clear to auscultation in all lobes and percussion bilaterally. No wheezing, rales, rhonchi, or rubs noted.

Heart/Peripheral Vascular: Rhythm and rate are regular. S1 and S2 heard on auscultation and are normal. No S3 or S4 sounds. No murmurs. No edema and pulses are palpable in all extremities. Point of maximum impulse noted at fifth intercostal space. Pulse + 1 in upper and lower extremities. No jugular vein distention noted clubbing, no edema or cyanosis.

Abdomen:  Abdomen is flat no abdominal tenderness and no hepatosplenomegaly on palpation. Bowel sounds were present in all four quadrants.

Genital: Pubic hairs are well distributed on the outer vaginal area. Her cervix is intact and closed os. No lesion or cysts note.  Her uterus is smooth and within normal limits.  Both ovaries are not palpable.  Rectal sphincter muscle was normal. No mass or lesion was noted. Vaginal was reddened and swollen. There was present of the copious amount of cottage cheese like discharge noted from the vaginal canal with no odor.

Musculoskeletal:  Present of adequate muscle tone.  Full active range of motion, no edema noted, capillary refills are less than 2 seconds.  Gaits steady, symmetrical and no edema noted bilaterally. Good muscle tone and bulk are normal. Upper and lower extremities strength are equal throughout bilaterally. Full hip flexion and knee flexion. No involuntary movement noted.

Neurological:  She is alert and oriented to place time and person. She follows command and responds appropriately.

ASSESSMENT:

1) Yeast Infection

Differential Diagnosis:   Chlamydia, Trichomoniasis and bacteria vaginosis

2) Urinary Tract Infection

Differential diagnosis:  Urethritis, vaginal infection (e.g. Gardnerella organisms, candida

albicans, or Trichomonas organisms).

3) Overactive Bladder – UTI, Sphincteric incontinence and neurogenic bladder

EXPLANATION

  1. A) Yeast Infections a type of vaginitis that is inflammation of the vagina which is characterized by vaginal irritation, intense itchiness and vaginal discharge. It is caused by fungus candida. A vaginal yeast infection is also called vaginal candidiasis which is very common among women. Three out of 4 women will experience a yeast infection at some point in their lifetimes (Mayo Clinic, 2014). The symptoms of yeast infection can be mild to moderate and include : Thick, white, odor-free vaginal discharge with a cottage cheese appearance, Itching and irritation in the vagina and at the entrance to the vagina (vulva), a burning sensation usually during intercourse or while urinating , redness and swelling of the vulva  and vaginal pain and soreness (Mayo Clinic, 2014). This is my primary diagnosis for this patient based on her physical examination and present illness. T. A complained of complain of cottage cheese like discharge, burning sensation during urination, discomfort and pain during sexual intercourse. During speculum examination, there was present of the copious amount of cottage cheese like discharge noted from vaginal canal and vulva. These are all defining characteristics of yeast infection.
  2. B) Urinary Tract Infection: Urinary infection continues to be a major health problem for women worldwide. Bacteria ascend from the colonized urethra into the bladder and continue to ascend into the kidney. If left untreated can cause lasting damage to the kidneys, severe morbidity and even mortality (Shuiling & Likis, 2013). Women are afflicted with UTIs much more often than men because of women’s pelvic anatomy and shorter urethras. The female urethra is short; there is a distance between the urethra and the anus; and the perineal environment is moist, encouraging migration of bacteria from the rectum to the urethra. Women whose mothers have had frequent UTIs also seem to be more susceptible to these infections (Shuiling & Likis, 2013). UTI can be divided in two general classifications: cystitis, a relatively simple infection involving only the urinary bladder and upper tract infection or pyelonephritis, an infection involving one or both kidneys (Shuiling & Likis, 2013). Some women with simple UTI have suprapubic tenderness. Flank pain may be present but usually is not with simple UTI. Its presence would raise the index suspicious for pyelonephritis. Typically, women with pyelonephritis fells acutely ill may have fever, chills or nausea, vomiting and costevertebrate angle tenderness as well as symptoms of cystitis which are dysuria, frequency, urgency and suprapubic pain (Shuiling & Likis, 2013). This patient does not have upper tract infections (pyelonephritis) because she does not have these symptoms. Some of the symptoms of UTI include frequency, burning sensation during urination and cloudy urine. Urine culture is the reference diagnosis of a UTI. A urine dipstick that is positive for leukocyte esterase or nitrite is 75% sensitive and 82% specific for UTI (Shuiling & Likis, 2013). This is my secondary diagnosis for this patient. Based on patient complained of frequency and burning sensation during urination, also her urine dipstick was positive for nitrites, and leukocyte esterase, these are signs and symptoms of urinary tract infection.
  3. C) Overactive Bladder: The symptoms of overactive bladder in women include urinary urgency and frequency (Mayo Clinic, 2014). This patient also complained of the frequency with urinary with are symptoms of overactive bladder.

Plan

 Labs:  Urine culture (Mid- stream) was collected and sent to the laboratory. Urine dipstick showed no ketones in urine. There were present of protein, small bilirubin, large nitrites and leukocyte esterase which confirmed that she has urinary tract infection. Pap/pelvic examination- Cervix was swab for HPV, Chlamydia and gonorrhea. She was also screen for cervical cancer. Patient was advised to follow if her symptoms of yeast infections returns or worsens after completion of the prescribed medication because indicate she might need long term treatment regime.

Medications:  She was prescribed nitrofuratoin100mg orally twice daily for 7 days and for yeast infection, she was prescribed Diflucan 150mg orally one dose and dose may be repeat if necessary.

Health Promotion:  The important of completing the treatment regimen even if symptoms resolve before all medications are taken should be emphasized to avoid development of resistant organisms. Most importantly, a woman who has been diagnosed with a UTI should be advised to contact the clinician if her symptoms persist after 48 hours of antibiotic treatment (Shuiling & Likis, 2013).  Patient should be advised to increase fluids intake and avoid delayed in urination. Advised patient to wipe front to back, urinate after sexual intercourse, to wear cotton panties or liners, avoid close fitting clothes, avoid douching both in general and during treatment. Teach patient the important of completing the course of medication. Patient should avoid alcohol consumption when taking metronidazole and for 48 hours after completing the treatment (Tharpe, Farley & Jordan, 2013). Patient was informed that metronidazole can cause nausea, vomiting and cramps even if alcohol is not consumed. In addition, the patient was counselled to avoid intercourse until her symptoms cease and then to use condoms until she completes her treatment (Shuiling & Likis, 2013).  Patient should be encouraged to continue to practice safe sex practice and monogamous relationship, but refrain from sex until symptoms subside. Patient should be advised that if her partner has symptoms of yeast infection, it is important that the partner get treated to prevent reinfecting each other (Shuiling & Likis, 2013).

Disease Prevention: For this patient, Pap smear should be performs according to the recommended guidelines. Patient should be tested for all sexually transmitted diseases based on her history.

REFLECTION:  I learned more about yeast infection. The doctor ordered urine culture (Mid- stream) was collected and sent to the laboratory. Urine dipstick showed no ketones in urine. There were present of protein, small bilirubin, large nitrites and leukocyte esterase which confirmed that she has urinary tract infection. Pap/pelvic examination- Cervix was swab for HPV, Chlamydia and gonorrhea. She was also screen for cervical cancer. She was prescribed nitrofuratoin100mg orally twice daily for 7 days and for yeast infection, she was prescribed Diflucan 150mg orally one dose. Patient was advised to follow if her symptoms of yeast infections returns or worsens after completion of the prescribed medication because indicate she might need long term treatment regime. I agree with Dr. Youssefi treatment plans. In a similar patient evaluation, I would not have anything differently. After the clinical rotation, for that day, my preceptor gave me an assignment to read more about yeast infection and urinary tract infection. . I realized that patient teaching is very important for patient with both yeast infection and urinary tract infection. This is a very interesting clinical experience for me because the patient was diagnosed with both yeast infection and urinary tract infection. Based on my research, I found out that women in professions where frequent urination is impeded have higher rates of UTIs. Nurses, teachers and factory workers where voiding on demand is restricted or difficult are all susceptible to such infections, for example. Education about the need for voiding when the urge is present can decrease the incidence of UTIs in these women. They should also be cautioned against limiting fluids to decrease the need to urinate. Some who have worked under these conditions for a long time will no longer feel a need to urinate until the bladder is already overdistended. For them, timed voiding may be helpful in reestablishing normal bladder responsivity (Shuiling & Likis, 2013).

Nurse Practitioner Soap Notes and Genital Infection Sample Answer

Nurse Practitioner SOAP Notes

Chief Complaint (CC): “In the past 7 days, I have had a very severe pain when urinating and a continuous feeling of scratching my private parts.”

History of present illness (HPI):  A 25 year old female by the name Topyster of Hispania origin comes to the hospital with her hands clinging on her pubic parts as a sign of severe pain. She claims that she has been feeling pain whenever she visits the toilet for a short call and this has been going on for the past one week. The lady reports severe pain while urinating and a feeling of itchiness in her pubic part every minute. She reports that she feels a lot of pain during sexual intercourse and this has caused a lot of discomfort to her partner. Asked whether she has ever used any medication to relieve this pain, she denies, saying that she does not know what type of medicine could help. She reported the pain extending to her periods and it became even worse when using the tampons and pads. The patient reported that she has never used a condom during sexual intercourse because they trust one another. The last menstrual period she received was in September 15th and during that time, the periods were accompanied with a lot of pain and the blood flow was more than usual.  The patient confirmed that she has never vomited nor felt nausea since the pain started.

Onset The pain started a week ago, on Wednesday
Location At the vagina
Duration When the pain started, it was not very severe; it used to occur after urination. As time went by, it became very severe and a feeling of scratching the vagina ensued.
Characteristics Sharp pain during urination
Aggravating factors Urination, sex
Relieving factors Sleep and cold bath
Treatments/ therapies Fluconazole, azole medicationhe, butoconazole (Gynazole-1), clotrimazole (Gyne-Lotrimin), miconazole (Monistat 3) and terconazole (Terazol 3).

Medications: the patient confirmed that she has been taking family planning pills.

Allergies: the patient has never experienced any allergy since her childhood, neither food nor environmental allergies reported.

Past Medical History (PMH): The patient confirmed that she has never been to the hospital in the recent past.

Past surgical history: the patient has never undergone any surgery

OB/GYN history:

Obstetric history: she has one kid of 8lbs who she gave birth to on May, 2013 without any complications. The method of the conception of the pregnancy was through sexual intercourse.

Menstrual history:  she started receiving her menstruations while she was 13 years old and the last period she received was on September 15, which lasted for 4 days. She has never used douching.

Sexual function: she is sexually active and the last sexual intercourse was 2 days ago.

Social/ personal history: she is married and they are staying happily together with her husband and their one kid. She graduated from college 3 years ago with a bachelors’ degree in business management. She runs a personal transport business. Her favorite foods are the locally prepared vegetables and sausages. She likes jogging every evening after work. She has one sex partner and has had two sex partners in her lifetime. She has never smoked but she reported taking alcohol when in college, but after marriage, she has never used alcohol.

Immunizations: pneumonia vaccine, January 2013; flu vaccine,e march 2014.

Family history

Grandparents are deceased with a fatal road accident.
Her mother is 47 with no medical problem

Her father deceased in a landslide

Her brother aged 18 is alive and with no medical problem

Her sister is 12 with no medical problem

Review systems:

General: she denies any chills or change in fever and no change in appetite

Skin: she denies skin rashes and skin dryness

HEENT: she denied ear pain, headache, dizziness, blurred vision and seeing spots

Neck: she denies neck pains and difficulty in moving the neck

Breast: she denies breast pain and nipple darkening.

Respiratory: she denies any wheezing and shortness of breath.

Gastrointestinal: she denies of any abdominal pain, constipation, and diarrhea.

Urinary: she reported pain when passing urine, and rated it as 5 in a scale of 1-10

Endocrine: She denies any history of diabetes or thyroid disorders. No excessive thirst, polyuria, polydipsia and polyphagia.

OBJECTIVE DATA:

Vital signs: BP 115/77, T 92, P 60, and oxygen saturation on room air was 96%. Height 54 inches, weight 135 lbs. and BMI- 22.

General:  Topyster is a 25 year old Hispania woman who appears physically well. She is in good health and her hair is well groomed. She smiles appropriately and no odor in mouth or body noted. She speaks very fluent English, polite and well behaved.

SKIN: she has no skin rashes, lesions, nor dryness. In general, she has good skin turgor.

HEENT: the pupils are equal, round and very reactive to light and accommodation. Hair distribution is normal. Nares are patent, moist nose and good dental hygiene.

Breasts: the breasts were steady and no palpable nodes and no discharge noted.

Neck: no thyroid nodules or thyromegaly noted.

Chest/lungs: the chest is symmetrical and lungs are very clear and no wheezing.

Heart/ peripheral vascular: rhythm and arte are regular. No murmors or edema.

Genitals: pubic hair well distributed and her cervix is intact.

Musculoskeletal: the presence of enough muscle tone and no edema noted. Good muscle tone and bulk is normal.

ASSESSMENT:

diagnosis positives negatives Rationale & reference
Yeast infection Itching in the vaginal area and around the vulva.

Burning sensation in the vaginal area

Swelling of the vulva

White/gray vaginal discharge

Pain during sexual intercourse

No headaches

No vomiting

No fever

No chills

Most yeast infections are caused by a type of yeast called candida albicanas (Dupont, et. al., 2009). The bacteria accumulate around the vagina resulting to the multiplicity of the yeast. The symptoms of the yeast infection include: itching in the vagina, burning sensation especially during urination and sexual intercourse, thick white discharge with cheese cottage appearance and swelling of the vulva (Mukherjee, Sheehan & Ghannoum, 2005).

These symptoms were confirmed in Topyster and it was made the primary diagnosis.

 

Genital herpes Burning sensation during urination No fever

No muscle aches

No blister on the vagina

No appetite loss

It is a sexually transmitted infection caused by the herpes simplex virus (Barton & Sen, 2007).  The general symptoms include fever, muscle aches in the back, buttocks and thighs. In women, blisters may be around the vagina, cervix or the anus. In men, blisters may be around the pennies, scrotum and around the anus. Pain during urination is common in both genders. (Wald, 2006)

In the examination of Topyster, these symptoms were not confirmed and the patient did not complain of any of these.

endometriosis Pain during urination and sexual intercourse No abdominal pain or pelvic pain Endometriosis is the abnormal growth of endometrial cells similar to those that form in the uterus.

Its symptoms include painful periods, painful sex, pain in the lower abdomen and pelvic area (Ferrero, et. al, 2011).

The patient confirmed pain during sex and urination.

 

 

Lab test Patient results rationale
Urine culture (mid-stream) No ketones in urine

Presence of protein, bilirubin, large nitrites and leucocyte esterase.

Urinary tract infection is an infection that happens anywhere along the urinary tract. Its symptoms include a strong and urgent feeling if urination every time and burning sensation.

The patient was advised to visit back the hospital if her symptoms worsened.

 

condition pharmacological test Follow up rationale
Yeast infection Nitrofuration in 100mg orally, twice daily for 7 days

Diflucan 150mg one dose

Urine test was positive If symptoms persist patient to visit the hospital after two weeks The use of nitrofurationin the treatment of yeast prevents other additional infections that may result out of fungal infections.

 

Health promotion: the yeast infection is a fungal disease, which results out of bacterial infection (Mukherjee, Sheehan & Ghannoum, 2005). It is very important that the patient completes her medication even if she feele relieved. This will help prevent the development of other resistant microorganism. The patient is advised to forgo sexual intercourse until after her health has completely improved (Dupont, et. al., 2009). The patients should be advised to ask her husband to visit the hospital because he both has got the yeast infection.

Disease prevention: Pap smear should be performed according to the set standard procedures.  Testing should be carried out on the patient based on his medical history.

Reflection: I have learnt a lot from this study about yeast infection. From the study, it is very evident that observing cleanliness is the very best option of avoiding such medical complications. In order to avoid the yeast infection and other sexually transmitted diseases, it is very important that one observes cleanliness especially on their underpants. There is an urgent need to carry out public education about this sexually transmitted disease in order to avoid the spread of the disease and deal with the disease amicably. If we can carry out public education, then we can reduce the spread of the disease by a very high percentage.  Not all disease symptoms can be confirmed just by asking patient questions. Thorough examination of the patient is very necessary before commencing any treatment. Prescription of antibiotics in the patient’s medication is very necessary as it helps the patient fight against other additional diseases that may arise out of the bacteria that may attack the pubic parts (Soong & Einarson, 2009). Completion of the dose is very necessary as this will help prevent other medical complications that may result out of the same disease.

I feel much touched by the level at which the sexually transmitted diseases are attacking women. In fact, three quarters of the people who report to the hospital about sexually transmitted diseases are women. This shows that there is a very crucial need to help our young ladies in schools and those out of schools by educating them on hygiene best practices.

Nurse Practitioner Soap Notes and Genital Infection References

Barton, S. & Sen, P., 2007. Genital herpes and its management. BMJ. May 19, 2007; 334(7602):

 1048–1052. doi:  10.1136/bmj.39189.504306.55

Dupont, F, Lortholary, o., Ostrosky-Zeichner3, L., et. al., (2009).Treatment of candidemia and

invasive candidiasis in the intensive care unit: post hoc analysis of a randomized,

controlled trial comparing micafungin and liposomal amphotericin B. Critical Care 2009,

 13 (5):R159 (doi:10.1186/cc8117)

Ferrero, S., Camerini, G., et. al (2011). Bowel endometriosis: Recent insights and unsolved

problems. World Journal of  Gastrointestinal Surgery . Mar 27, 2011; 3(3): 31–38. Published online Mar 27, 2011. doi:  10.4240/wjgs.v3.i3.31

Mukherjee, P., Sheehan, D.& Ghannoum, M., (2005). Combination Treatment of Invasive

Fungal Infections. American Society for Microbiology: New York.

Soong, D. & Einarson, A., 2009. Vaginal yeast infections during pregnancy. Canadian Family

Physician. Mar 2009; 55(3): 255–256. College of Family Physicians of Canada. Retrieved from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2654841/#__ffn_sectitle

Wald, A., 2006. Genital HSV‐1 infections. Sex transmission infection v. 82(3); 2006 June.

doi:  10.1136/sti.2006.019935

Issues of Hemophilia in the Medical Field

Issues of Hemophilia in the Medical Field
Issues of Hemophilia in the Medical Field

Issues of Hemophilia in the Medical Field

1) A minimum of five references must be included. At least two of the references should be from current (2000 or more recent) primary research articles. Citations must be provided parenthetically in text with author(s), year, and page(s) utilized; this process will document all quotes, paraphrases, facts, and ideas that are not your own or common knowledge.
2) The body of this report should be at least five (5) typed pages, with standard one inch margins and a
minimum average of 250 words per page.
3) Information presented must include information found in and unique to each reference utilized.
4) Also I need one page outline because teacher required it.
5) Please send me all references websites so I can print the articles.
6)Please do as much quick as you can.

We can write this or a similar paper for you! Simply fill the order form!

Local Community Health Care Issue

Local Community Health Care Issue
Local Community Health Care Issue

Local Community Health Care Issue

Resource: Article Review Grading Criteria on the student website Review two to three news articles to determine a local community health care issue. Examples include swine flu, asthma, and teenage pregnancy.

Write a 350- to 700-word paper answering the following questions:

  • How long has it been a problem?
  • How has it affected the community?
  • How has the community responded?

Format your paper consistent with APA guidelines.

We can write this or a similar paper for you! Simply fill the order form!