Wednesday, September 2, 2020

Final Project Essay Example | Topics and Well Written Essays - 1500 words - 2

Last Project - Essay Example So as to change vision into circumstance, it is important that that vision is first changed to the useful level since it would somehow or another be hard to accumulate and inspire workers if something is constrained onto them from the top. (Kotelnikov). In this manner so as to change over the vision into circumstance, first thing which must be considered is the way that whether the proposed change would be worthy down the line and in the event that not, at that point what top administration of the association need to make it adequate inside the association. The administrator’s choice to transform vision into circumstance is the thing that pioneers are known for. A decent director and a decent pioneer consistently make openings. Since the serious condition where minimal effort specialist co-ops are as of now there with great market infiltration, it takes a ton of boldness to transform the serious dangers into the open doors for the association. For an adaptable association, the quality of the association is in the way that how quickly and rapidly it can change over its vision into circumstances and openings into continuous business activities to infer an incentive for the association. â€Å"The structure of an association is the way where different sub-units are masterminded and between related.† (FAO) Therefore considering the above activity of the director to clandestine the vision into circumstance will strongly affect the hierarchical structure. There are different hierarchical structures running from line structures to progressively complex natural structures of the associations. From the given data, it appears that the association has a useful structure and it will have most contact with the choice of the chairman to go for the supplier based administrations. Since this sort of association needs to depend on the specialized aptitudes of its different staff accordingly a useful structure would be generally influenced. So as to survey the

Saturday, August 22, 2020

Human Anatomy as Part of Nursing Curriculum

Question: Examine about the Human Anatomy as Part of Nursing Curriculum. Answer: Presentation Compelling nursing includes a sweeping comprehension of the different fields of bioscience. The different fields of bioscience incorporate microbiology, pathology, pharmacology, human life systems, physiology and essential ideas of material science and science. Nonetheless, absence of acumen of these fields that prompts a shortage in nursing care bestowed to the patients. These fields are totally interrelated and an earlier information helps in effectual evaluation of the state of the patient. The picked examine article applies to the possibility that human anatomical investigation is essential for each individual relating to the medicinal services industry (Johston, 2010). It focuses on the need of showing human life structures with the assistance of a reasonable methodology. The article talks about a criticism completed including the nursing understudies and their feeling post a solitary rate of presenting the understudies to a dead body and understanding their methodology of evalu ation of the body. The creator to consider the circumstance directed a subjective report. Writing Review In the first place, the creators surveys on writing states how nursing understudies in Australia once in a while have a hands-on involvement in the human dead bodies. Their educational plan just incorporates going to addresses and that scarcely incorporates investigation of the subjects of bioscience. Nursing understudies are not exceptionally sharp in learning bioscience as a major aspect of their nursing educational plan as the disappointment rates are extremely high for these subjects (Mitchell, McCrorie Sedgwick, 2004). The creator talks about how the multifaceted nature of the subjects causes the understudies to lose their enthusiasm for this subject. This absence of information keeps the medical caretaker from basically breaking down the state of an individual in light of the fact that the vast majority of the occasions they don't know how far the ailing condition goes amiss from the ideal state of the human body (Pandey Zimitat, 2007). The medical attendants can just get prepa red to treat a patient and give quick visualization of the condition, in the event that they choose to be through with the human life structures. The writer has additionally worried in the article how the execution of the anatomical investigation can be completed. The enthusiasm of the understudy bubbles out for the most part on the grounds that the anatomical investigation and a few different fields of bioscience are viewed as clamorous and unformed (Shors, 2006). The cautious determination of creator dependent on his insight, profundity the understudy is going to construct and time to be granted to show the subject, is additionally a significant feature, which should be considered by the creator (Johnston McAllister, 2008). A measure to make the talks intriguing by joining of visual channels, for example, the video clasps and interactive media introductions has likewise been examined by the creator (Weatherall, 2006). The creator has particularly worried on the part where the presentation of human corpse in anatomical investigation is included. In spite of the fact that she concurs that the entrance to dead bodies is constra ined, along these lines she goes onto recommending of the use of similar examples for a few talk meetings. Absence of experience on a clinical scale renders the medical attendants ill-equipped in completing their activity convincingly (Kim, 2005). The creator likewise recommends that the deficiency of an investigation, which doesn't include dismemberment, can't assist the understudies with furthering their nursing aptitudes which is not, at this point restricted to giving consideration by following the sets of an endorsing specialist (Winkelmann, 2007). The attendants should confront circumstances where self-judgment of the state of the patient will be a flat out need and a brief activity to remember the patient of the toleration will be similarly essential. For such an unavoidable situation, earlier information is of most extreme significance. Along these lines, it has been reasonably recommended by the creator that to meet the innovatively progressed and mentally burdening occasions of the 21st century, attendants must be outfitted with considerable information on human life systems and if conceivable, a few different subjects identified with bioscience. Procedure The creator picked the principal year nursing understudies at the Griffith University as the subject for the examination (Johston, 2010). The life structures lab at the School of Nursing and Midwifery was chosen as the area of the investigation. The span of the investigation was two hrs and the subjects (75) were presented to six deliberately dismembered pieces of the human body. The examples included pieces of the appendages (both, lower and upper appendage), quadrants (both, lower and upper quadrant), middle and full body. A senior medical caretaker led the direction. The understudies were then informed in insights about the manner in which the examples were readied. The security, conduct and lead concerns were likewise examined in subtleties with the understudies. The understudies were additionally educated about the vis- - vis of the gift of the body. The nursing understudies have a place with various social foundations and it become vital for them to comprehend the manner in whi ch the anatomical examination is directed. In this manner, they are additionally educated about these regions. Understudies are additionally furnished with the particulars of the example in plain view just as highlights identified with its pathophysiology. The conversation managed the planes and areas of the body parts, for example, the urethra, throat, trachea, nasal cavity, the area and the profile of the various organs, the volume and area of the nerve tracts, the area and the width of the skeletal muscles. Post the direction module, the understudies were approached to investigate the examples so as to place the conversation meeting into commonsense use. This part was then trailed by the filling of the criticism structure by the understudies, which comprised of a poll, which had a Likert-size of evaluation. Basic ideas of rate computation were applied to consider the criticism from the reports. Morals Consideration For the investigation did by the creator, no kind of leeway on a proper note was essential from the National and University Ethics Committee (Johnston, 2010). The information gathered with the assistance of the criticism structures was a piece of the standard examination of the course, which is conspicuous as a feature of the semester. The understudies were given clarification in regards to the prerequisite of the input structure. Understudies who decided to stay unknown in their cooperation or avoided responding to not many of the inquiries excluded. Noteworthy Results The writer has utilized a subjective methodology towards the investigation where she has acquainted an input survey with the nursing understudies where they needed to expound on the hands-on understanding and utilize the Likert-scale to evaluate the inquiries in the structure (Johnston, 2010). It was seen that 96% of the understudies gave a positive input, which implies that they would acknowledge such regulation in their educational plan. A rate as high as 85% of the understudies thought that it was pertinent to their investigation. This figure has been a normal estimation dependent on the two figures which was determined dependent on the focuses where the understudies accepted that the hands-on study would help them in future from the part of nursing and the other portion of the understudies who thought of it as applicable to their hypothetical investigation of human life structures and physiology. An upsetting figure was seen where 40% of the understudies were happy that there would not be a reiteration of the research center visit. In any case, it was later seen that the disappointment rate had an amazing bringing down of rate. Henceforth, it very well may be sensibly reasoned that the visit was useful for the understudies to perform better as it granted sound comprehension of the ideas of human life systems. Intelligent Critique The exploration shows that the unmistakably that the consolidation of the subject of human life systems encourages the nursing understudies to build up a basic twisted of psyche which will in future assistance them in assessing the state of the patient better. An all encompassing methodology towards the treatment of the patient gets top need and the guaranteed must be conveyed if the execution of clinical information is completed (El-Sayed El-Raouf, 2013). The nature of learning of these subjects can possibly improve and end up being simpler if the understudies can be educated to envision. For instance, the plane based and sectional investigations of the different pieces of the body, for example, the vagina, rectal entry and urethra, supported the patients in performing productive catheterization process. It likewise helped them in the intubation/extubation system of trachea, in view of their earlier information on the profile and arrangement inside the body (McLachlan, 2004). The hypothetical help of human life systems likewise permitted the understudies to examine the analyses and the reports in a progressively productive manner. They had the option to disclose to their individual patients even the significance of their ECG report or their lipid-profile study. Top to bottom investigation of these subjects as well as a pragmatic encounter by examining different case narratives, will prompt better handle of the bare essential of life systems (Crane Cox, 2013). The general purpose of this examination is to lessen significantly the hole among hypothesis and practice (Gordon et al., 2012). Suggestion The creator ought to consider conveying a comparable report either mulling over the field bioscience in general or considering every subject that structures bioscience, among the nursing understudies to evaluate whether it is life systems alone or they are on edge about contemplating bioscience. Other than that, an investigation can likewise be done on in the case of having an earlier foundation in bioscience would help the nursing understudies to manage these subjects. References: Crane, J., Cox, J. (2013). Something beyond a Lack of Knowledge: A Discussion of the Potential Hidden-Impact of Poor Pre-enrolment Science Background on Nursing Student Success in Bioscience Subjects. Global Journal of Innovation in Science and Mathematics Education (in the past CAL-laborate International), 21(2). El-Sayed, R.

Friday, August 21, 2020

Arthur Miller In the Crucible Essay Example For Students

Arthur Miller In the Crucible Essay In the Crucible each demonstration can be broke down as a progression of scenes, each having its own tone and peak all paving the way to the incredible window ornament. The play rose up out of a genuine story. It depended on the Salem, Massachusetts Witch Trial in 1692, which interfaces in with Millers time, were witch trails was known as McCarthyism during the 1950s. At the time there was an advanced witch chase in America. Rather than chasing the witches, Free scholars. Individuals who had singular considerations were blamed for traitorousness and socialist feelings, which regularly brought about loss of their employments. The individuals of Salem were Puritans-descendents of the Pilgrim Fathers, who showed up in America from England in 1690 in light of the fact that they needed a stricter lifestyle with respect to their religion, individuals were incredibly strict. There are many equal connections between the two ages, for example, the allegations and trail laws. The play begins in a little room which represents the extremism of the network. The three scenes; five, six and ten all lead up to the ground-breaking peak, through structure, language, character and the social history. It is significant for the crowd to comprehend the chronicled foundation, and comprehend what living in Salem, Massachusetts resembled in the seventeenth century. Their lives comprised of working, eating, dozing and asking. Any sort of pleasure was disallowed. This implied singing and moving was illegal and seen as an association with the fiend. Individuals of Salem had faith in black magic, and in 1692, numerous individuals were blamed and hanged in light of the fact that for this. Individuals implicated one another, the two neighbors and companions. This shows despite the fact that on a superficial level, society seems joined together, breaks were starting to develop. The crowd response to the seventeenth century of the Puritan way of life would be one of stun and doubt. Anyway this can be identified with McCarthyism during the 1950s. During the 1950s the Cold War was occurring, during this doubt emerged between the free scholars and socialists. So as to secure themselves, similarly as in The Crucible, they accused others to escape inconvenience. The Crucible was motivated by Millers encounters of the 1950s. It was Senator Joseph McCarthy who made the chase for socialists. The similitudes between the Crucible and McCarthys allegations of the 1950s were impugned. Without confirmation or proof the affecting of dread and doubt would lead during the 1950s to the possible separation of families and companionship as individuals blamed each other for unfaithful acts against America, which connects in with The Crucible. This was to prompt America turning out to be penetrated by distrustfulness and suspicion.

Thursday, June 4, 2020

Personal Data Protection - Free Essay Example

Cyber Law on E-Commerce CYBER LAW ON E-COMMERCE PERSONAL DATA PROTECTION STATUTES COMPARED TABLE OF CONTENTS 1.0INTRODUCTION 2.0PERSONAL DATA PROTECTION ACT 2010 2.1Application 2.2Principles 2.2.1General Principle 2.2.2Notice Choice Principle 2.2.3Disclosure Principle 2.2.4Security Principle 2.2.5Retention Principle 2.2.6Data Integrity Principle 2.2.7Access Principle 2.3Right of Data Subject 2.4Penalties 3.0DATA PROTECTION ACT 1998 3.1Application 3.2Principles 3.2.1Processed Fairly Lawfully 3.2.2Obtained only for One/ More Specified Lawful Purposes 3.2.3Adequate, Relevant Not Excessive 3.2.4Accurate Where Necessary, Kept Up to Date 3.2.5Processed Data Not Kept for Longer Than is Necessary 3.2.6Processed in Accordance with Rights of Data Subject 3.2.7Taking Appropriate Measures Against Unauthorised/Unlawful Processing Against Loss/Damage 3.2.8Personal Data shall Not be Transferred to Countries outside of EEA without Adequate Level of Protection 3.3Rights of Data Subject 3.4Penalties 4.0SIMILARITIES BETWEEN PDPA 2010 AND DPA 1998 5.0EXAMPLE OF CASES 5.1Malaysia 5.2United Kingdom 6.0REFERENCES 7.0APPENDIX . 1.0INTRODUCTION With the advancement and sophistication of todayà ¢Ã¢â€š ¬Ã¢â€ž ¢s technologies, the world is no longer safe from privacy. Worst of all, there is no law that is able to govern or defend against data privacy or personal data in the Cyberworld. As a result, hackers/perpetrators breach into the privacy of victims, stealing valuable and personal information without victimà ¢Ã¢â€š ¬Ã¢â€ž ¢s knowledge for various purposes, usually to commit frauds. With the rise of cybercrimes and data frauds, protection of personal information and data becomes more crucial. Therefore, a statute was proposed in Malaysia and was named the Personal Data Protection Act 2010 (PDPA) that seeks to regulate processing of personal data of individuals that are involved in commercial transactions. More importantly, it was drafted to provide protection to any individualà ¢Ã¢â€š ¬Ã¢â€ž ¢s personal data. The act was gazetted in the year June 2010 but was not put into force until November 2013. On the other hand , there are other countries that already have governing statutes to protect personal data since a long time ago. As such, the United Kingdom has amended such an act to safeguard the information for the interests of individuals. The act was called Data Protection Act 1998 (DPA). It was first composed in 1984 and was updated in 1998. Since the law of Malaysia is mainly based on the common law legal system, both acts might share similarities which will be further elaborated in the later sections. 2.0PERSONAL DATA PROTECTION ACT 2010 The Malaysia PDPA 2010 has important details that should be noted and elaborated in this assignment. First of all, PDPA is applicable through certain scenarios that must be fulfilled to have the personal data be protected. Furthermore, the processing of personal data should also comply with PDPA 2010 7 principles which are the General Principle, Notice Choice Principle, Disclosure Principle, Security Principle, Retention Principle, Data Integrity Principle and Access Principle. Besides that, knowing the rights of data subject is important as a mean to protect the interest and confidentiality of the data subject. Lastly, failure to adhere or comply with the act leads to consequences and penalties which will also be described here. 2.1Application[1] The act is only applicable to : anyone who processes, or has authorization of the processing any personal data for any commercial transactions. anyone who in not established in Malaysia but uses equipment in Malaysia to process personal data otherwise than for purposes of transit through Malaysia However, there are certain exceptions where the act does not apply to such as : Federal Government State Governments for legal administrative purposes personal data that is processed outside of Malaysia unless data is to be further processed in Malaysia 2.2Principles[2] 2.2.1General Principle This principle disallows the data user from processing personal data unless the data subject has given permission to the data user to do so. Still, this principle is exempted from certain situations such as performance of a contract where data subject is involved, protecting vital interests of data subject, administration of justice many more. Moreover, the principle also states that personal data can be processed only if the data is processed for legal purpose related to an activity of the data user, or processing the data is necessary for that mentioned purpose and that the personal data is just enough and not excessive for the purpose. 2.2.2Notice Choice Principle This principle requires the data user to notify the data subject via written form as a consent to the data subject. The contents of the written form would be : acknowledgement that the data subjectà ¢Ã¢â€š ¬Ã¢â€ž ¢s personal data is being processed description as well as purpose of that data will be provided to the data subject data subjectà ¢Ã¢â€š ¬Ã¢â€ž ¢s right to request access and correction of data with contact details of data user mention of third parties whom the data user has exposed the personal data to choices and means offered by data user to data subject to limit the personal data that is to be processed question to data subject whether data to be supplied is obligatory or voluntary consequences of data subject should he/she fail to supply the data The written form to be sent to the data subject must be written in English and Bahasa Malaysia. Furthermore, a clear and readily accessible means shall be provided to the data subject to make a choice in both the languages. 2.2.3Disclosure Principle With the acknowledgement of the data subject, the personal data can be revealed to parties and for purposes that has been granted by data subject only. The exception where disclosure can be done are : with intention to prevent or detect a crime data user has the right in law to disclose the personal data to other people disclosure is in public interest which is decided by the Minister 2.2.4Security Principle Precaution and necessary steps are to be taken by the data user to protect the data from any loss, abuse, modification, unauthorized access, disclosure or destruction when the data user processes the data. The data user has to take into consideration of : where the data is stored the consequence of the data due to protection failure security measures taken to secure equipment where data is stored ensuring that personnel having access to data is trustworthy and reliable steps taken to ensure the safety of transfer of personal data[3] 2.2.5Retention Principle Under this principle, it is stated that processed personal data for any purpose is not allowed to be kept longer than necessary for the completion of the purpose. The data user will be responsible to conduct measures to ensure that data is deleted permanently once the data is no longer required. 2.2.6Data Integrity Principle The data user is required to verify and make sure that the data maintains its integrity that the data is still intact, up-to-date and has not changed. This way, data that is disclosed to other third parties is the same to avoid any further confusion. Not only that, it becomes an obligation for the data user also to obtain updates from the data subject on a regular basis for data integrity. 2.2.7Access Principle Under this principle, the data subject has the right to access his/her own personal data that is held by the data user. In the event that the personal data might be wrong or inaccurate, the data subject is able to alter and correct the data. However, there are certain exceptions in the Act where the data user may refuse the right to access under certain circumstances such as an element of confidentiality involved. 2.3Right of Data Subject[4] As a personal data belongs to a data subject, the data subject is entitled to several rights to the data. Rights to access personal data The data user needs to inform the data subject whether the data is being processed. A requestor (can be the data subject) may write to the data user to make a data access request upon payment of a fee. From there, a copy of the personal data can be sent to the requestor. Right to correct personal data In the event that the requestor considers that the copy of data supplied to the requestor is inaccurate, not up-to-date or incomplete, the requestor may make a data correction request to the data user to make the necessary correction to the personal data. Right to withdrawal of consent A data subject has the rights to withdraw his consent to the processing of his personal data. This can be done by writing a notice to the data user to inform of the consent where the data user shall cease the processing upon receiving the notice. Right to prevent processing likely to cause damage or distress For reasons that the personal data belonging to the data subject might cause damage to himself or to another person or cause damage that would be unwarranted, the data subject can write a notice to the data user to stop the processing of personal data. However, this right shall not be applied for the same reasons that are stated in the exemptions of the General Principle such as the performance of a contract where data subject is involved. Right to prevent processing for purpose of direct marketing If the personal data is processed for the purpose of direct marketing, the data subject has the rights to require the data user to halt the processing. The data subject, where he may be dissatisfied with the failure of the data user to comply with the notice written to him, an application can be submitted to the Commissioner to assert the data user to comply with the notice. 2.4Penalties There are several punishments or liabilities that are enforced for certain offences made. Each offence carry different severity of liability and/or punishment. Failure to comply with PDPA 2010 Principles[5] The data user is liable to a fine that does not exceed RM300,000 and/or imprisonment for a term of not more than 2 years. Failure of a data user processing personal data without certificate of registration[6] Fine of not more than RM500,00 and/or imprisonment for a term of not more than 3 years. Data user continues to process personal data after registration revoked[7] Fine of not more than RM500,000 and/or imprisonment for a term of not more than 3 years. Failure of data user to comply with code of practice[8] Fine of not more than RM100,000 and/or imprisonment for a term of not more than 1 year. Refusal to comply with commissionerà ¢Ã¢â€š ¬Ã¢â€ž ¢s requirements to cease processing of personal data that is likely to cause damage or distress[9] Fine of not more than RM200,000 and/or imprisonment for a term of not more than 2 years. 3.0DATA PROTECTION ACT 1998 The Data Protection Act 1998 covers not only personal data but à ¢Ã¢â€š ¬Ã‹Å"dataà ¢Ã¢â€š ¬Ã¢â€ž ¢ in general as a whole as compared to the PDPA 2010 which legislates personal data alone. Even so, DPA 1998 comes first before the PDPA 2010 was even drafted, the DPA 1998 would have enough laws to protect the personal data of the people of the United Kingdom(UK). PDPA 2010 only involves the data subject and data user/processer, this is however, different for DPA 1998 which consists of a data controller, data processor and data subject. A data controller is someone who decides on the purposes of the data that is to be processed whereas the data processor is an individual who processes the data on behalf of the data controller. 3.1Application[10] The Act applies to a data controller in 2 scenarios : only if he is established in UK and that the data are processed there established outside of UK and European Economic Area (EEA) state but uses equipment in UK for processing. A UK representative must be nominated in this case for the purpose of this Act. Besides that, an invidual is considered as being established in UK through these several options : resident of UK a body under the any part of the law of UK a partnership/association that is formed under any part of the law of UK an office/branch/agency in UK and any EEA state performing practice in UK and any EEA state 3.2Principles[11] 3.2.1Processed Fairly Lawfully The First principle specifies that the processing of data must be done fairly and lawfully. 3.2.2Obtained only for One/ More Specified Lawful Purposes Every data that is collected and processed must have its purpose and its reasons which should be stated in a notice by the data controller to the data subject. With that, the data can only be processed for that stated purpose and no other. The Commissioner is also to be notified by the data controller regarding the purpose of the data processing. 3.2.3Adequate, Relevant Not Excessive The information collected should just be enough and not more than necessary nor any less. As an example, filling up a form of membership card only requires full name, race, address, phone number and identification number. Other sensitive personal information that was not asked for such as birth identification number, religion and others are not required. 3.2.4Accurate Where Necessary, Kept Up to Date This principle requires that data should be accurate at all times and should be constantly updated where necessary. Information obtained and recorded by the data controller from the data subject should be accurate by having regards that the data controller have taken reasonable precautions for the ensuring that the data is accurate. The data subject may notify the data controller that the data is inaccurate with the data in hand as proof and fact that it is inaccurate. 3.2.5Processed Data Not Kept for Longer Than is Necessary Once the data has served its purpose, it must be disposed as it is no longer required and is not necessary. In conjunction to the third principle, data would be deemed excessive as the data no longer has any purpose. 3.2.6Processed in Accordance with Rights of Data Subject Any processing of data conducted by the data controller has to be regarded with the rights of the data subject such as rights to access personal data, prevent automated decisions for processing of personal data, preventing the processing of personal data for the purposes of direct marketing and others. There is a timescale where the responses to subject access requests have to be made within 40 days of the receipt of request.[12] 3.2.7Taking Appropriate Measures Against Unauthorised/Unlawful Processing Against Loss/Damage[13] The data controller must be aware of the harm that might result from the unauthorized or unlawful processing or loss or damages that is done to the data. Therefore, it is important to uphold aspects of security to ensure that data is not disclosed or altered in any way. Since the data might have been accessed by employees of the data controller, he has to make sure that the employees are reliable and trustable for the confidentiality of the data. Besides that, the data controller has to pick a reliable data processor so that data is safe. Then, the data processor has to carry out the processing under a contract with the data controller and only to act upon the instructions of the data controller. 3.2.8Personal Data shall Not be Transferred to Countries outside of EEA without Adequate Protection As the Act is legislated in UK, protection towards the data is legit even in EEA. Once data is transferred outside of EEA, protection of the data is not guaranteed to be safe and may be abused for various purposes whilst not protected under this Act. Consent should be given to data subject beforehand for the opinion on the data being transferred outside of the EEA and UK. 3.3Rights of Data Subject[14] Right of Access to Personal Data The data subject has the rights to access personal data that is stored by the data controller. Therefore, the data controller should supply any the personal data of the data subject, purpose of the data and parties who the data controller has disclosed to. There is a small fee of ÃÆ' ¢Ãƒ ¢Ã¢â€š ¬Ã… ¡Ãƒâ€šÃ‚ ¤10 for supplying the information to the data subject. A request in writing must be made to the data controller by the data subject in order to be supplied with the required information. Rights of Correction of Personal Data Should there be any inaccuracy to the personal data held by the data controller, the data subject is entitled the right to force the data controller to correct the mistakes in the data. Rights to Prevent Processing likely to Cause Damage/Distress The data subject is entitled the power to write a notice to the data controller to end the processing of the personal data for a specified purpose and reasons such as the likely of the data to cause damage or distress as well as causing damage/distress to other parties. Rights to Prevent Processing for Purposes of Direct Marketing Personal data that is used for direct marketing attempts can be stopped by the data subject. Likewise, a written notice need to be sent to the data controller to cease the processing of the personal data. With the failure of the data controller to comply, the court can order him to take such steps for complying with the notice if the court is satisfied and thinks fit. Rights to Prevent Automatic Decisions The data subject can specify to require the data controller to ensure that the decisions taken on behalf of the data controller is not done automatically towards the processing of the personal data. The data controller then has to write a notice to the data subject that specifies the steps he intends to take to comply with the requirement of the data subject. Rights to Complain to Information Commissioner If an issue between the data subject and the data controller got out of hand, the data subject can seek the Information Commissioner to review the user of the personal data belonging to the data subject. The Information Commissioner has the power to enforce the ruling of DPA and penalize the data controller under any offence that the data controller has violated. Rights of Compensation In the event that damage or dissatisfaction has invaded to the data subject, the data subject has the right to use the law to obtain compensation for damages that have been caused from inaccuracy, disclosure or loss of the data. 3.4Penalties[15] 4.0SIMILARITIES BETWEEN PDPA 2010 AND DPA 1998 5.0EXAMPLE OF CASES 5.1Malaysia 5.2United Kingdom 6.0REFERENCES 7.0APPENDIX 1 [1] (Yan Ping, n.d.) [2] (Jin Nee Min Lee, n.d.) [3] (LAWS_OF_MALAYSIA_PDPA.pdf, 2010, page 7) [4] (Lee Hishammuddin Allen GledHill Advocates Solicitors, 2011) [5] (à ¢Ã¢â€š ¬Ã…“JW515839 Act 709.indd Personal Data Protection Act 2010.pdf,à ¢Ã¢â€š ¬Ã‚  2010, page 17) [6] (à ¢Ã¢â€š ¬Ã…“JW515839 Act 709.indd Personal Data Protection Act 2010.pdf,à ¢Ã¢â€š ¬Ã‚  2010, page 23) [7] (à ¢Ã¢â€š ¬Ã…“JW515839 Act 709.indd Personal Data Protection Act 2010.pdf,à ¢Ã¢â€š ¬Ã‚  2010, page 24) [8] (à ¢Ã¢â€š ¬Ã…“JW515839 Act 709.indd Personal Data Protection Act 2010.pdf,à ¢Ã¢â€š ¬Ã‚  2010, page 31) [9] (à ¢Ã¢â€š ¬Ã…“JW515839 Act 709.indd Personal Data Protection Act 2010.pdf,à ¢Ã¢â€š ¬Ã‚  2010, page 43) [10] (à ¢Ã¢â€š ¬Ã…“Data Protection Act 1998 data.pdf,à ¢Ã¢â€š ¬Ã‚  2013, page 5) [11] (Belfast Education Library Board, 2007) [12] (University of Dunham, 2013) [13] (à ¢Ã¢â€š ¬Ã…“Data Protection Act 1998 data.pdf,à ¢Ã¢ ‚ ¬Ã‚  2013, page 83) [14] (BBC UK, n.d.) [15] (à ¢Ã¢â€š ¬Ã…“Data Protection Act (DPA) Penalties,à ¢Ã¢â€š ¬Ã‚  2013)

Sunday, May 17, 2020

Essay about Henry Purcell - 2912 Words

Henry Purcell is seen as one of the greatest composers of the Baroque period and one of the greatest of all English composers. His earliest surviving works date from 1680 and show a complete command of musical composition. They include some fantasias for viols, masterpieces of contrapuntal writing, and more contemporary sonatas for violins, which reveal some acquaintance with Italian models. Purcell, in his time, became increasingly in demand as a composer, and his theatre music in particular made his name familiar to many who knew nothing of his church music or the odes and welcome songs he wrote for the court of three different kings over twenty-five years. To begin to chronicle the life of Henry Purcell is a difficult task as there is†¦show more content†¦A job that was given to many other trusted workers in the abbey as Westminster had no official copyist. Purcell probably spent most that time copying post restoration works that were being created at the time. This work as well as his normal workload as a choir boy would have acquainted him with the restoration composers and given him insight into their work. He himself confessed to transcribing the works of Byrd, Gibbons and Tallis into his own personal manuscript book. Charles II had in his court a copy of Louis XIVs Vignt-quatre violins du Roiand. This group of musicians was to play for Charles much the same as the French model played for Louis. In 1677 death came to Matthew Locke the then composer for Charles the seconds twenty-four violins (Westrup, p.26). Purcell, the precocious lad he was, succeeded him at the age of only eighteen. This was a most distinguished post for a musician and composer since Locke was one of the most respected composers of his day. No doubt there were some complaints of favoritism as Locke was an intimate friend of the Purcell family. The duties of twenty-four violins were principally to play at court functions wherever the king was in residence; Charles II loved to listen before meal-times. Charles taste in music did not extend beyond that which was not readily intelligible1 with a straightforward rhythm that he could beat time. In other words he knew what he liked and knewShow MoreRelatedThe Life Of Henry Purcell1353 Words   |  6 PagesThe Life of Henry Purcell Henry Purcell was a famous English composer during the Baroque period of music. There is very little known about Henry Purcell’s life. Purcell was born September 10, 1659 in the Westminster area of central London, England. His father, who was also named Henry Purcell was a gentleman at the Chapel Royal and the master of Choristers in Westminster Abbey but he died in 1664 when Purcell was around six years old. After the death of his father his mother Elizabeth was forcedRead MoreThe Fairy Queen by Henry Purcell1153 Words   |  5 PagesThe Baroque period is an era of artistic style utilizing embellished motion, pure and effortlessly interpreted detail to yield drama, tension, exuberance, and opulence in representation. The opera â€Å"The Fairy Queen† by Henry Purcell is an excellent representation of the Baroque era in its inordinate application of all theatrical foundations, embroidered indications, and the selected focused elucidation to return melodrama, emotio nal tension, enthusiasm, and sumptuousness for the audience watchingRead MoreThe development and contribution Purcell made to the operatic genre through his opera and dramatic works1979 Words   |  8 Pagesï » ¿ The development and contribution Purcell made to the operatic genre through his opera and dramatic works. Henry Purcell (1659-1695) composed music for many different genres. Among these he wrote one true opera, Dido and Aeneas (1689). He also wrote a number of dramatic works. Purcell spent the majority of his last five years composing music for the stage. The majority of Purcell’s dramatic instrumental music or songs were used in spoken plays. Purcell went on to write four semi-operas; DioclesianRead MoreHenry Purcell s Dido And Aeneas950 Words   |  4 Pages I went to go see a college production of Henry Purcell’s Dido and Aeneas at a recital hall at Meredith College. The hall was almost full, but it was not huge auditorium or stage. The stage was brightly lit and there were no light changes during the performance. The audience ranged in ages, so it was family event. Many had flowers, so some of the audience was families supporting those performing. Most people seemed engaged in the performance, especially when performers entered from the back of hallRead MoreThe Era Of Music During Beethoven And Dido And Aeneas By Henry Purcell768 Words   |  4 Pagescomposers may only focus on one instrument to perfect. Regardless of taste or need for music, it is all important. Two of the important pieces learned in the beginning music class are Symphony No. 5 in C minor by Beethoven and Dido and Aeneas by Henry Purcell. A major historical event was well underway when Beethoven was born. The Age of Enlightenment was upon the world. The peak of the period was happening right as Beethoven was born. Philosophy, science, and politics were changed. Many believe thisRead MoreClassical music concert report1018 Words   |  5 Pagesheart is inditing. The venue was Redpath Hall of McGill University. The program began with Welcome to all the pleasures, which is an ode written for the Saint Cecilia Day, composed by the English Baroque composer Henry Purcell in 1683. It opens with a symphony with canonic violin parts. Purcell creates a concerto grosso effect with the contrapuntal violin melodies. Then comes the countertenor solo which I found very impressing. The second piece they performed was Violin Concerto in A major, Op.7:6 composedRead MoreCompare And Contrast Dido And Aeneas850 Words   |  4 Pagesand had scenery images to help with representing the setting and time of day throughout the performance. Many props were used by all roles of the cast. The costumes were more elaborate and detailed compared to that of Dido and Aeneas, written by Henry Purcell. The costumes for L’Orfeo were geared to fitting into the Greek Mythology period since the opera was based on the time period of Orpheus in Greek Mythology. They also used special effects such as the lowering of the c loud that Apollo descends fromRead MoreBaroque Music764 Words   |  4 Pagestook composers like Handel and Bach to make them into emotional, human experiences. The 10 most famous composers of the Baroque period are, Johann Sebastian Bach, George Frideric Handel, Antonio Vivaldi, George Philip Telemann, Arcangelo Corelli, Henry Purcell, Domenicp Scarlatti, Jean-Philippe Rameau, Johann Pachelbel, Giovanni Battista Sammartini. Coming in first place is Johanne Sebastian Bach who was a genius keyboardist, mastered the organ and harpsichord, and a brilliant composer. He wrote musicRead MoreEvolution of Opera: Greek Drama to Baroque Opera Essays870 Words   |  4 Pagesthe main interest in costumes and spectacle, but including spoken dialogue, songs, and instrumental music† (135). In the early seventeen hundreds England yielded to Italian taste, this is thought to be as a result of the death of Henry Purcell (Grout 135). Henry Purcell was the most important operatic composer in En gland and it was thought that with his passing came the hopelessness â€Å"for the future of English musical drama† (Grout 146). Italian opera maintained its position as leader throughout theRead MoreDidos Lament781 Words   |  4 Pagestime you could go hear music in public opera houses. Religious music was a huge part of baroque era; it saw the creation of tonality, made changes in musical notation, and developed new instrumental playing techniques. Didos Lament composed by Henry Purcell is an opera that was first performed in the spring of 1689. The form of this piece is Recitative and Aria; the recitative voice is accompanied by simple chords on a guitar. The aria is in two parts which feature eleven repetitions of chromatically

Wednesday, May 6, 2020

Public Vs Private Health Care Coverage Essay - 744 Words

Public versus Private Health Care Coverage The United States (U.S.) has a multitude of options for health care coverage. People have the option for private or public coverage. One example of public coverage is Medicaid and an example of private coverage is Blue Cross and Blue Shield (HCSC, 2015). There are many differences between each health care option, the biggest difference is the price you are paying. This paper will discuss the differences between private and public health insurances as well as the cost for each. Private health insurance plans frequently are offered through a person’s job. When an individual acquires health insurance this way their workplace covers part of the cost for their insurance. Frequently, they are offered different plans for different prices. Once these plans are chosen, typically, a premium fee will be deducted from that person’s pay checks (Colorado.Gov, 2015). On top of these premiums the individual will also have other fees such as co-pays, deductibles, or co-insurance (Colorado.Gov, 2015). Private plans can also be purchased without an employer’s help, the individual will be expected to cover the premium payment of the plan as well as all of the matching extra fees (Colorado.Gov, 2015). Medicaid is a public health insurance that is federally funded for those who do not have private health insurance (Families USA, 2014). In the U.S. one out of every five adults and one out of every three children use Medicaid (Families USA, 2014).Show MoreRelatedHealthcare Systems And The United Kingdom1547 Words   |  7 Pagesmeans for the health and wealth of the citizens of these countries. The U.S. and the U.K. are two different countries with two very different healthcare systems. The U.S. healthcare system is the Affordable Care Act, (ACA) and is the attempt by the U.S. to provide affordable healthcare coverage. he U.K. healthcare system is publicly financed and managed by the National Health Service, (NHS). The U.S. healthcare system is largely private sector whereas the healthcare in the U.K. is public. â€Å"The U.SRead MoreHealthcare Between Canada And The United States1240 Words   |  5 Pagesuniversal coverage, no financial barriers, more equitable, no coinsuranc e and unequal drug benefits and the health insurance plan is administered in each province by a public agency which operates on a non-profit basis and is responsible to the provincial government; whereas, the United States have some financial barriers, there is no universal public health insurance and access primarily depends on the type and extent of coverage, responsible for administering and controlling the health care systemRead MoreUs Healthcare Plan Vs. Uk Healthcare909 Words   |  4 PagesUS Healthcare Plan vs. UK Healthcare Plan While it s difficult to estimate the exact number of Americans without health insurance at any given moment, most credible sources place this figure at between 40 and 45 million. In other words, one American in seven lacks even basic health insurance coverage (How Many Americans Really Do Not Have Health Insurance? n.d.). The responsibility of an average American today, is to obtain healthcare insurance through private insurance, employer benefits, orRead MoreCanada s A Single Payer1492 Words   |  6 PagesWhen discussing health care systems, Canada’s is often used as a possible model for the US. The two countries systems are very different being that Canada has a single payer, mostly publicly funded system, while the US has a multi-payer, heavily private system. So much of the appeal of the Canadian system is that is does more for less. They provide universal access to health care for its citizens, while almost one in five non-elderly Americans are uninsured. Many of these findings come from theRead MoreCanada Vs. United States Health Care1496 Words   |  6 Pages Canada vs United States Health Care President Obama promised to all Americans that they would finally have an opportunity to obtain or purchase health insurance in the United States for the first time and for those that already had insurance he promised to them that they would be able to keep the insurance they already had and it would not increase because of Obama Care. After the passing of Obama Care the only truth was that Americans could purchase health care but other than that the rest wereRead MoreWhat Is Universal Health Coverage?1381 Words   |  6 PagesIntro: What is universal health coverage? As defined by the World Health Organization (WHO), the primary advocate, universal health coverage (UHC) is defined as â€Å"ensuring that all people can use the promotive, preventive, curative, rehabilitative and palliative health services they need, of sufficient quality to be effective, while also ensuring that the use of these services does not expose the user to financial hardship,† (What is universal coverage?). To put this formal definition in laymen’sRead MoreThe United States Vs. Canadian Healthcare System882 Words   |  4 Pages The  United States  vs. Canadian Healthcare System ​There are different models of universal healthcare systems. The first is compulsory insurance which demands that residents should buy insurance; various legislations usually enforce this request.   Another type of universal insurance is the single payer health care system which  is defined  by the government providing funding for the health care services. The United States health care system uses the former while Canadian system utilizes the latterRead MoreThe United States Vs. Canadian Healthcare System875 Words   |  4 PagesThe United States vs. Canadian Healthcare System There are different models of universal healthcare systems. The first is compulsory insurance which demands that residents should buy insurance; various legislations usually enforce this request. Another type of universal insurance is the single payer health care system which is defined by the government providing funding for the health care services. The United States health care system uses the former, while the Canadian system utilizes the latterRead MoreThe United States Health Care System1449 Words   |  6 PagesStates health care system is the most expensive in the world. It spends more than 16% of its gross domestic product (GDP) on health care, (the highest per person in the world), but ranks behind most countries on many measures of health outcomes, quality, and efficiency. In 2012, over 47 million people were un-insured and millions were under-insured⠁ ´. The cost of health care is rising at least twice as fast as the rate of economic growth. Major companies are pa ssing more of the cost of health careRead MoreHealthcare And The United States Vs. Healthcare Essay1262 Words   |  6 PagesHealthcare in the United States vs Healthcare in Mexico The healthcare policies in Mexico and the United States are similar in that both healthcare systems utilize a combination of public and private insurance (freecontentweb.com). Healthcare has rapidly become an important topic in many countries. This comparison will focus on similarities in healthcare reform, healthcare insurance availability, healthcare access, and healthcare cost of both countries. Prior to healthcare reform in the US and Mexico

Tuesday, May 5, 2020

Designing Discovery Learning Environments †MyAssignmenthelp.com

Question: Discuss about the Designing Discovery Learning Environments. Answer: Introduction This assignment is a discussion of the development processes in form of an implementation plan which drove the reconstruction of an Australian Tertiary College. The main consideration in this discussion is the reassessment of the technological level of the institution; as well as the pedagogy which then develops the vision statement. The tertiary Colleges vision statement provides a procedure that the institution would undertake to attain its development potential. The technological analysis involves the impacts on each and every stakeholder including the students, parents, the organization and the staff. Other aspect of analysis that would help in the determination of the level of development; brought about by the implementation of information systems include socio-ecosystem analysis. The preferred Socio-Ecosystem aspect of development happens in stages. They include: In the assignment the change levers are also determined with regards to the stakeholder alignment strategies. The last stage of development in this case is a plan associated with change management. The first aspect of IS Management is vision statement implementation. A vision statement is like a path or a roadmap to follow. In another way, it may also mean a compass point showing the direction of success. The vision of any organization focuses on the future of the same firm. The vision statement is one important factor that influences the creation of changes. On the same, this assignment is going to discuss the educational vision statement of Australian Tertiary College on the basis of the institutions pedagogy, curriculum, and mostly technological level. Regarding IS Management, the institutions vision is: Australian Tertiary College has fully integrated ICT in every bit of its educational processes. Teachers have also adopted the use of ICT devices in their educational processes (Kamboj and Singh 2015). Through such developments, the institution has been able to provide online studies. Integrated in the educational system is the HS1 system for management. Through this system the institution has been able to provide academic content both to virtual and real students. This is one system that has worked many institutions. Some of these institutions are federal governments. HS1 helps in the management of information of individuals. In our IS Management case, this system is employed by Australian Tertiary College to ensure that the information of all stakeholders of the institution is tracked and also stored properly. According to the vision statement, the system is centrally administered through twelve office areas. Such a way allows the institution to track, with a lot of ease, the students performances and the operations of the college. Analysis of Stakeholder In our study case, the stakeholders include teachers, students, the immediate community, management and the subordinate staff. Before the implementation of the information systems, the stakeholders have to come to a consensus that such systems will improve student performance. Talking of ICT integration, the institution will adopt the use of ICT teaching devices as well as management databases such as HS1 (Bingimlas 2009). On implementation, ICT will form the backbone by which students are taught on how to fight for work in the local and international markets. Such would be achieved through the employment of interactive and innovative techniques in the teaching field that would boost student performance. Some of the programs that would be implemented are computer aided designs, computer assisted instructions, and audio-visual aids. Also, as the digital age matures, the learning processes should be both digitalized and engaging (Bingimlas 2009). On the basis of management of information of the colleges stakeholders, the VMM cloud computing management platform (which is a database management system) ensures that every piece of data is safe. This platform is also important in the development of a Human Resource framework of management. The creation of an excellent and professional staff is only possible if the Australian Tertiary College develops a proper human resource framework (Roy 2012). With a proper HR (Human Resource) department, the institution will be able to hire ICT experts. On the contrary, everything depends on a proper management and administrative system (Roy 2012). In this IS Management discussion, Australian Tertiary Colleges key stakeholders that would ensure a successful implementation of the identified system is a Project Team. The activities performed by this team include rotationalization of student record forms as well as change management. With regards to the anticipation of this stakeholder analysis, the chosen team should include: Endorsement and funding approval from the Executive Committee or the board. Appointment of the management team Communication coordination and change management by an experienced project manager. IT integration and Infrastructure compatibility with the technical environment that exists since the system requires an interface. Security access levels availability Ability to handle cross campus students. Being able to resolve duplicate and merged URs. Effective Staffs Impact Statement The Payroll Cycle Each and every aspect of finance includes proper methods of payment that is managed through proper payroll cycles. Having ICT integrated into the system ensures that the management of the institution is able to monitor the payment of workers. The payment cycles have help several organizations form financial partnership platforms (Albugarni and Ahmed 2015). Before, the institutions Socio-Ecosystem was not as efficient as its level of technology. There were very few ICT devices used in the teaching and learning processes. Such lead to the need for technological advancements. During the initial stages of implementation, the institution employed the use of computers in particular levels of operation like the sector of administration (Roy 2012). By then, the institution used just one interactive board together with a few projectors to be used in particular occasions. As the need for more interactive boards, computers, projectors, and other gears for teaching arose, the institution added more. The intended goals were thus achieved. Australian Tertiary College then began offering ICT courses leading to the need for training more teachers on the pros and cons of technology. The number of students applying for ICT courses also soared. Earlier on, students would prefer doing business courses to ICT courses (Roy 2012). Australia Tertiary Colleges socio-ecosystem happens to be one that the school has well furnished classrooms with full ICT equipment. Such an achievement is in line with the vision of the school. Regarding the institutions vision, each and every classroom should have computers, interactive boards, and other ICT learning equipment. Earlier on, the institution didnt offer courses associated with ICT. However, the vision states that the future of the learning and teaching need to integrate aspects of ICT even more. Each and every course will then have to integrate ICT. ICT will have to form the backbone of every learning process. Such is to mean that more information systems would have to be employed. Changes brought be the implementation of information systems Among the myriad of changes include altering the stakeholders mentality as well as changing the framework of the organization. Regarding the framework of the organization, each and every sector need to be restructured in a way that ICT equipment are all integrated and also in full operation. Also, regarding changing the mentality of stakeholders, all the teachers have been able to change their strategies of teaching to have technology incorporated. Having technology added to the teaching practice would ensure that the learning process is made easy and interesting. Students would also learn about the importance of information systems and ICT. Teachers and parents, as stakeholders, would also have a better chance of tracking the performances and improvements of students (Kaur 2015). Still on the changes, research activities are performed now and again to have the reactions of the involved parties realized. Benchmark studies are also conducted for the purpose of determining the cons, pr os, and impacts of having ICT integrated in the education processes. A year after implementation, the school had already initiated sensitization programs that would teach on the pros and cons of integrating ICT into the institutions operational framework in terms of the academic, management and administrative aspects. However, the institution needed more interactive boards. Five years down the line, the institution acquired enough ICT equipment in form of laptops, computers, projectors, interactive boards and tablets. Also, the institution ensures that proper incentives such as government policies are employed in the facilitation of the ICT processes of learning. More ICT teachers are recruited while students interested in learning ICT course would be admitted. Ten years after the implementation of the information systems, the institution would have made several positive changes. Such changes include the introduction of online courses. Another change is the adoption of a better database management system. Such a system would be used in three main sectors. These sectors are administrative, management and academic. The management system is intended to increase operations efficiency. At this time, the school would have effectively incorporated ICT in every offered course. The application for ICT courses by students would also be massive such is due to the fact that technology would have dominated the academic processes. Change Levers and Stakeholder Alignment Those involved in the institutions educational activities are sensitized on the benefits as well as the impacts of having proper information systems as well as incorporating ICT in the teaching processes. Every stakeholder is properly informed on the requirements of global markets with regards to training of ICT experts. Such a reason ensures that the institution teaches students under international standards of management and entrepreneurial skills that are needed to make them work anywhere in the universe (Kaur 2015). It is through technology and the aspects of information systems management that several countries have been able to boost their economies. Australia, for instance, uses more than US $8 billion annually to ensure that its economic sectors are improved. Such sectors include the education segment (Kaur 2015). Australian Tertiary College has always employed government policies and incentives for proper information system management as well as the use of ICT to get protection from the law so as to avoid cyber-crimes and other computer technology associated malice (Kaur 2015). Each and every aspect highlighted in this discussion paper has been made possible by the availability of government funds. Teachers are as well given in-service training for the purpose of boosting their confidence when it comes to utilizing ICT teaching resources for such processes (Kaur 2015). The software and hardware information system resources have all been vital in the achievement of organizational goals. Since the institution in question had the capacity to implement the suggested plan through its management, maintenance of the same organizational changes is unlikely to cause any problems. Such changes have had massive impacts on the operations of the institution. In case such changes would have not been initiated, the institution wouldnt have been able to survive the current technological outlay in management aspects. On the contrary, the achievements of Australian Tertiary College depend on Team Corporation. Team corporation is whereby every stakeholder executes his or her role in processes that would ensure the sustenance of changes that are recommended (Vincent 1992). Conclusion As highlighted in the introductory part of this activity, this assignment discusses the implementation plan which leads to the development processes or rather, the reconstruction of the Australian Tertiary College. The main consideration in this discussion is the reassessment of the technological level of the institution; as well as the pedagogy which then develops the vision statement. From the Colleges vision statement, a procedure that the institution takes to attain its development potential is discussed. The technological analysis involves the impacts on each and every stakeholder including the students, parents, the organization and the staff. Other aspect of analysis that would help in the determination of the level of development; brought about by the implementation of information systems include socio-ecosystem analysis. Reference Albugarni, S Ahmed, V 2015, Success factors for ICT implementation in Saudi secondary schools: From the perspective of ICT directors, head teachers, teachers and students.International Journal of Education and Development using Information and Communication Technology,[online]. (1). Available at: https://search.proquest.com.libraryproxy.griffith.edu.au/docview/1681507463?accountid=14543 [Accessed 26 Sep. 2017]. Bala, R 2017, Unit Guide. [online] Unitguides.mq.edu.au. Available at: https://unitguides.mq.edu.au/unit_offerings/72118/unit_guide [Accessed 26 Sep. 2017]. Bingimlas, KA 2009, Barriers to the Successful Integration of ICT in Teaching and Learning Environments: A Review of the Literature. Eurasia Journal of Mathematics, Science Technology Education,(3). Kamboj, P Singh, SK 2015, Effectiveness of Selected Teaching Strategies in Relation to the Learning Styles of Secondary School Students in India. [online]. Interchange. Available at: https://link.springer.com.libraryproxy.griffith.edu.au/article/10.1007%2Fs10780-015-9253-7 [Accessed 26 Sep. 2017]. Kaur, L 2015, Future classroom with ICT tools.Educational Quest: An International Journal of Education and Applied Social Sciences.[online]. Available at: https://search.informit.com.au.libraryproxy.griffith.edu.au/documentSummary;dn=842121265964419 [Accessed 26 Sep. 2017]. Mayer, F 2017, CET-Innovation Entrepreneurship . Sony falls back (1,3). McClendon, K Ho, T 2016, Building a Quality Assessment Process for Measuring and Documenting Student Learning. Assessment Update, (2). Messnarz, R Ekert, D 2007, Assessment-based learning systemslearning from best projects. Software Process: Improvement and Practice, (6). Open Innovation, 2003, Open Innovation :: Open Innovation Community. [online]. Openinnovation.net. Available at: https://openinnovation.net/about-2/open-innovation-definition/ [Accessed 26 Sep. 2017]. Overview of Vision and Visioning Process, 1998, Strategic Thinking In-Service materials, University of Wisconsin-Extension. Pieters, J Limbach, R Jong, T 2004, Designing discovery learning environments: process analysis and implications for designing an information system. International Journal of Learning Technology, (2). Roy, K 2012, ICT -enabled rural education in India.International Journal of Information and Education Technology,(5). Vincent, C 1992,The role of vision in the process of restructuring planning. [online] ProQuest Dissertations Theses Global.Available at: https://search.proquest.com.libraryproxy.griffith.edu.au/docview/304004872?accountid=14543 [Accessed 26 Sep. 2017]. Kerzner, R 2013, Project Management: A Systems Approach to Planning, Scheduling, and Controlling. Morris, G 2013, Reconstructing Project Management (1). O'Conchuir, D 2011, Overview of the PMBOK Guide. Overview of the PMBOK Guide (2). Portny, E 2013, Project management for dummies [online]. Available at: https://ebookcentral.proquest.com.ez.library.latrobe.edu.au/lib/latrobe/detail.action?docID=1161976 [Accessed 26 Sep. 2017] Profi222, 2017, IBM human resource practices and HRM theories: Integration of HRM theories into IBMs practices. [online]. Profi20.livejournal.com. Available at: https://profi20.livejournal.com/11631.html [Accessed 26 Sep. 2017].