Sunday, January 26, 2020

Ethical Concepts in the Provision of Nursing Care

Ethical Concepts in the Provision of Nursing Care The nursing process is more than a method that nurses use to diagnose and treat actual and potential health problems. The American Nurses Association (ANA) Standards of Nursing Practice provides a basis for practice and recognition of the patient; in addition, nurses also must adhere to the professions ethical code as well. Nurses are committed to respect human beings with an unbiased approach of care to differences socially, economically, culturally, racially, and other human attributes (Saucier, 2005, p. 80). It is the responsibility of the professional nurse to engrain ethics as an essential part of the foundation of nursing. The International Council for Nurses (ICN) identifies that the need for nursing is universal and that nurses have four fundamental responsibilities: to promote health, prevent illness, restore health, and alleviate suffering (Tomey, 2004, p. 75). From the beginning of nursing Florence Nightingale stated it so eloquently in the original Nightingale Pledge: I will do all in my power to maintain and elevate the standard of my profession and will hold in confidence all personal matters committed to my keeping and all family affairs coming to my knowledge in the practice of my calling (Nightingale, 1893, para. 1) Ethical issues that are challenging for nurses in everyday practice and nurses continue to find it difficult to practice with moral integrity and as moral agents given the many difficult ethical challenges they encounter in the healthcare system. Confidentiality The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was originally created to ensure the privacy of individuals and it holds those individuals accountable that might acquire sensitive information in regards to medical records (Garrett, Baillie, Garrett, 2010, p. 117). However, there are also some gray areas where a nurse is often not sure whether the information that is being handed out is acceptable, or whether the person that is asking for the information is authorized to have it. When these kinds of situations take place, confusion can arise and it can make it difficult for nurses to do the job properly without fear of retaliation. Not only is confidentiality an ethical issue, but a legal requirement. In chapter five, Principles of Confidentiality and Truthfulness, the terms obligation and secrets was used. Having the understanding and knowing the difference between the types of secrets and an awareness of harm or possible harm to the patient, family, or profession is key. This information is directly related to the Nursing Scope and Standards of Practice, Standard 12. Ethics, The registered nurse integrates ethical provisions in all areas of practice. The measurement criteria for the registered nurse state: Maintains patient confidentiality within legal and regulatory parameters, maintains a therapeutic and professional patient-nurse relationship with appropriate professional boundaries, and uses Code of Ethics for Nurses with Interpretive Statements to guide practice (American Nurses Association [ANA], 2004, p. 39). Specifically, ethic 3.2 Confidentiality, that is encompassed in the standard that states the nurse promotes, advocates for, and strives to protect the health, safety , and rights of the patient (American Nurses Association [ANA], 2001, p. 12). Trust and well-being of the patient are key in the area of confidentiality; keeping in mind, that when working within a multi-disciplinary team, the nurse must only share relevant information on a need to know bases. As an example, the emergency room nurses cousin was admitted to the emergency room during the shift at the hospital. He is in critical condition. The nurses mother is very concerned about him, but she has not been able to reach the nurses aunt and uncle. The nurse is aware of the cousins condition. With the standards and ethics does she tell her mom? No, this is probably the hardest of situations, but the nurse must not tell. She must not even let on that she has any information. Instead, encourage her mother to keep calling your aunt. The nurse might even see if her aunt is at the hospital and arrange for her to call mom. Even doctors can only release information to the immediate family-in this case, the cousins parents. It is up to the aunt and uncle to inform the rest of the family. That way, they can determine how much information family members should have. Maintaining confidentiality is an important aspect of professional behavior. It is essential that a nurse safeguard the patients right to privacy by carefully protecting information of a sensitive, private nature. Sharing personal information or gossiping about others violates nursing ethical codes and practice standards. It sends a message that the nurse cannot be trusted and damages interpersonal relationships. Informed consent Nurses are obligated to tell all patients, regardless of whether or not they are capable or incapable of giving consent, about the care or treatments before it is given. Nurses are obligated to assist patients understand the nature of their health problems and assist them to receive the information and support they need to make informed decisions. A key principle studied in chapter two, Principles of Autonomy and Informed Consent, that all medical care requires the consent of the patient (or someone who is authorized to consent for the patient) before the care plan is carried out. An assumption is made that informed consent recognizes that a patient needs to know about a procedure, surgery, or treatment, before they decide to have it. Standard 14.Resource Utilization in the ANA Scope and Standards of Practice explicitly denotes that nurses should assists the patient and family in becoming informed consumers about options, costs, risks, and benefits of treatment and care. Informed con sent may have a multitude of legal ramifications, but its core and most controversial function lies in the idea of patients actually participating in medical decision making. It may be at this point that the physician (or autonomist) and the nurse most tend to butt heads. Fortunately for nurses there is Ethics Code 1.4. The concept of informed consent is fundamental to the delivery of health care. The nurses responsibility is vital in ensuring that patients are fully informed and understand their options; each nurse has an obligation to be knowledgeable about the moral and legal rights of all patients to self-determination (ANA, 2001, p. 8). Informed consent is more than just signing a paper, is specific patient right. An example case of a patient with angina who was considered for a coronary bypass surgery demonstrates the issue of informed consent. Ethical and legal aspects of achieving consent must be considered. Physicians may have personal biases, which may lead to coerced consent, or may overwhelm the patient with information on potential complications of a proposed procedure. Patient preconceived notion or misinformation may lead to misunderstood consent. The patients request to put back the decision to the physician raises the question of whether such requested paternalism violates patient self-determination and invalidates consent or is it an exercise of the patients right to have his physician decides (Garrett et al., 2010, p. 32)? Quality and safety Providing basic nursing care for the individual patient is an important nursing value supported by professional mandates and by codes of nursing ethics. Referring again to Standard 14.Resouce Utilization that states, the registered nurse considers factors related to safety, effectiveness, cost, and impact on practice in the planning and delivery of nursing services (ANA, 2004, p. 42). It is easy to tie the concept directly from the ANA standards of performance to the nursing code of ethics 8 that states the nursing profession is committed to promoting health, welfare, and safety of all people (ANA, 2001, p. 23). In reading from chapter six, there was discussion that quality care can be achieved by high tech equipment, credentialing, licensing, skill, knowledge, and protocols; however, a key point in judging quality stated professions lead the effort to enhance and protect quality in the professions (Garrett et al., 2010, p. 134). If employment conditions, agency regulations, or hospi tal policies create undesirable working conditions that limit the quality of nursing care that can be provided, nurses become concerned. Since nurses value quality of patient care, they also value those conditions that allow quality patient care. When nurses attempt to balance the value of quality of patient care with issues involving their quality of life the action of a possible strike may come into question. While the nurses value being able to guarantee high quality care they may realize in the short term many patients may not receive the highest of quality care while a strike is in effect. When putting ethical decisions first, nurses should work through their professional organizations and promote positive mechanisms for negotiations with employers. If nurses can gain responsibility for, and control over, the quality of care delivered, they will have gained great benefit for the health of the community. Conclusion If not nurses, who will advocate for the chronically ill (both young and old), the under and uninsured, and the most vulnerable with complex health needs? Who will question the rightness or wrongness of aggressive care, technological advancements, and determinations of quality of life? Who will address patient concerns related to informed consent, surrogate decision-making, and the risks and benefits of treatment or research? And who will challenge ineffective or inefficient nursing, physician, and administrative leadership standards and styles that underestimate the significance of ethical problems on patient outcomes and nurse productivity and retention? These philosophical questions are at the core of our deeply held values and beliefs about who we are as a discipline. Without adequate ethical knowledge and competence; however, it is difficult to bring together nursing on central ethical concepts in the provision of nursing care. The nurse, as a patient advocate presents difficult challenges; however, the key principles of ethics will allow all nurses to persevere in understanding the scope and limits of their professional responsibilities.

Saturday, January 18, 2020

Audit Proposal Essay

There are many different types of audits including internal, external, and information technology. Companies should be familiar with the types of audits that may possibly be used on an Accounting Information System (AIS). Knowing the different types of audits and where they are used will help a company be ready for an audit and make the process much smoother. There are some circumstances where auditing through a computer is not always beneficial. Auditors want to make sure they are completing their audits fully and appropriately to the best of their abilities. Types of audits used for each process Attestation, SAS 70, SAS 94, and Findings and Recommendations are four main types of Information Technology (IT) audits. If Kudler wants the auditor to provide assurance for each part of the system, an attestation audit could be used. An attestation audit can assist Kudler by issuing reports on examinations, reviews, or agreed-upon procedures. An attestation audit can provide Kudler with independent assurance on the reliability or validity of information related to the four systems under review (KPMG, 2011). A Findings and Recommendations audit can provide Kudler with other information about each system. This kind of audit includes the following: system implementations, security reviews, database application reviews, project management, IT infrastructure, and IT internal audit services. If Kudler chooses to use the Findings and Recommendations audit, this type will not produce an opinion, only a summary of the audit for each of the systems (Hunton, Bryant, & Bagranoff, 2004). An SAS 70 audit is to provide assurance about the effectiveness and existence of the company’s internal controls around a service provided to others. Kudler is not a service  provider. However, Kudler does transmit data to the Electronic Payment Clearing House for automatic submission of the credit card transactions to the applicable financial institutions. An SAS 70 could be beneficial because it is a way to prove that adequate controls are in place to protect the consumer through e-commerce. SAS 94 audits are performed with a financial statement audit and focus on the client’s AIS. It addresses the effect of IT on internal controls in a financial statement audit. Kudler will need a much broader assessment than an SAS 94. Most appropriate audit for each process There are many routes to perform an IT audit. This audit is internal and will look at both Information Technology General Controls (ITGC) and Application Controls. Specifically, the audit will focus on these categories: systems and applications, information processing facilities, management of IT and enterprise architecture, client/server, telecommunications, and intranets/extranets. The audit style will be via Findings and Recommendations as management will have to consider recommendations and the ultimate decision to make changes according to priority and budget. The audit will verify the systems and applications for efficiency and controls to ensure validity, integrity, and security of data and transactions. Kudler will need the completion of an audit on information processing facilities to assess physical conditions of the main housing units and the offsite locations to support the company’s Disaster Recovery Plan (DRP). This type of audit will evaluate the organizational structure and procedures to ensure that an efficient, controlled environment is in place. These relate to any telecommunication controls between client and server, the entire network, and any servers communicating eternally including firewalls. Auditors will assess two types of controls: security controls and access controls. Each of these types should include all three sub-controls: preventive, detective, and corrective. The AIS has an imperative need for controls to address any risks that may exist for every process and transaction. Security access controls are in place to protect data from being stolen, lost, or damaged. Access controls protect data from being released to non-authorized users, hackers, and other intruders. How the audits are conducted Kudler will conduct an information system audit by examining and evaluating  their present hardware and software. They will also examine their IT controls, systems security, risk management, and the adequacy of their current systems. They can carry out their marketing audit by evaluating the effectiveness of their marketing program and examining its capabilities. It will evaluate their functions in respect to their goals, mission, vision, and their values of Kudler, which is done externally. Kudler will examine their faculty, and their deficiencies will be identified. Another suggestion is equipment be audited, the maintenance, and an examination to determine if it’s being operated at the designed levels, safety set-up, security, and access issues. Their audit will be done by an external auditor who will examine their accounts, vouchers to support, financial information tests, evaluation of their financial statements, and also examine the internal control and make comments f or improvements. Events that prevent reliance on auditing through the computer Using computer-based accounting systems does have its disadvantages, such as certain laws pertaining to confidentiality, the requirement to protect against the loss of data through power failures, the infection of viruses, and the abundance of opportunities for hackers to steal data. Computer fraud is also a major worry; the need to initiate internal controls for all those who have access to the business’s information, particularly confidential customer information. An event that Kudler may run into with the need of stronger controls is a security breach, which entails stolen data. Kudler management can be held liable for the loss of personal customer data (University of Phoenix Virtual Organization Portal, 2013). Another event is a computer-based system with feeble controls over the data input procedures and processing, this requires the need for more thorough testing of financial transactions. The incorrect input of data can not only cause misrepresentation of financial statements in the form of incorrect asset valuations but because a mistake in data entry will give Kudler false analytical data such as sales and inventory. Lastly, an auditor will have to assume that auditing through the use of their computer-based method that their CPU and other hardware are operating properly (Bargnoff, N.A., Simkin, M.G, & Strand, C., 2008). Conclusion It is important for companies to stay positive throughout the audit process. There are many different audit processes such as Attestation, SAS70, and  SAS94 which are all effective audit strategies that may be used when auditing the company. Companies being audited should be familiar with these audit processes as well as how the audits are conducted to ensure that the process will be as smooth and stress free as possible. References Bargnoff, N.A., Simkin, M.G, & Strand, C. (2008). Core Concepts of Accounting Information Systems (10th ed.). The KPMG Survey of Corporate Responsibility Reporting 2013. 2014 KPMG International Cooperative. Retrieved July 10, 2013 from: http://www.kpmg.com/global/en/issuesandinsights/articlespublications/corporate-responsibility University of Phoenix Virtual Organization (2013). Kudler Fine Foods Intranet. Retrieved from: https://ecampus.phoenix.edu/secure/aapd/CIST/VOP/Business/Kudler2/intranet/index.asp

Friday, January 10, 2020

Unilever Business Project

Unilever is a company that operates all over the world. They produce a wide range of products, concerning all sorts of food, detergents and etc. For a large company like Unilever to be successful, they have to implement a certain strategy and to have vision and mission. For this assignment we are focusing on the UK market. The brand we chose is Carte D’or. To start with the overall vision of Unilever. They are looking at developing new ways of doing business for the future, to increase the benefits for the company, as well as to reduce their environmental impact on the nature by Unilever`s activities.Their mission, is to make their business more sustainable. For example, Unilever`s plan has over fifty targets to achieve. Most of them are focused on helping people to improve their well-being and health, reduce the pollution of their products and source the agricultural raw materials sustainably. Sustainability and fair trade are Unilever`s main goals, which are influencing the whole corporation. Regarding the changing weather conditions and scarcity of usable agricultural supply. Unilever introduced a Sustainable Living Plan, that will enable them to source only sustainable materials.According to Unilever, it is also of vital importance to have the suitable people with the right talent, skills, creativity and education to support the growth of the enterprise. As part of the `Sustainable Living Plan`, the company is looking at healthy and motivated workforces, which would provide them with the right employees. In order to make this plan become reality, they are arranging better work places, which means reducing work injuries, industrial accidents and provide variety of stimulus's. Nowadays, Unilever is struggling to create shared values with its customers to provide stability and growth.Companies can meet social needs while at the same time serving existing markets, accessing new markets and lowering costs through innovation. Unilever has chosen the path o f innovations, as well as improving quality, quantity, cost, and reliability of inputs and distribution. While at the same time the company is acting as a steward for essential natural resources and drive economic and social development. As stated above, their mission is: â€Å"We work to create a better future every day. We help people feel good, look good and get more out of life with brands and services that are good for them and good for others.We will inspire people to take small, everyday actions that can add up to a big difference for the world. We will develop new ways of doing business with the aim of doubling the size of our company while reducing our environmental impact. † (source: http://www. sustainable-living. unilever. com/news-resources/news/inspiring-sustainable-living/) The above comes back again in Unilever’s report. For instance, their ambition is to double the size of the company while reducing the environmental footprint.Furthermore, they have a sustainable living plan; Unilever wants to grow without damaging the environment and increase the social benefits arising from Unilever’s activities. This plan has been set in 2010 and has 3 major outcomes, as can be read on page 20 of Unilever’s annual report of 2010: * Helping more than a billion people improve their health; * Halve the environmental impact of the production and use of Unilever’s products; * Enhance the livelihood of people in their supply chain. A good example is COMFORT ONE Rinse fabric conditioner. Many customers in developing countries do their laundry by hand.COMFORT ONE needs only one bucket of water for rinsing instead of three. In this way, consumers save time and money. The reason why Unilever is performing this plan, can be summed up in a few points: * More and more consumers want products that are sustainably sourced; * Retailers have their own goals for sustainability and Unilever can work with them; * New products and packaging ca n be developed as part of the sustainability plan; * Half of Unilever’s sales take place in developing countries, so these countries represent a huge future market for the company.These countries face the greatest sustainability challenges; * Managing sustainability saves money for Unilever and the consumer. Below we will show Unilever`s structure on both Multinational and Business level. Multinational Level: Source (http://www. theofficialboard. com/org-chart/unilever-1) Business Level: Source: http://www. theofficialboard. com/org-chart/unilever-ventures) In order to explain the process of creating values when making ice-cream, we are going to use Porter`s value adding chain to support the explanation. PRIMARY PROCESSES:SUPPORTING PROCESSES: ————————————————- Primary processes Inbound logistics: Carte D`Or buy ingredients for the ice-cream production from a variet y of suppliers. In order to improve its efficiency the exclusive brand can start performing business procurement. In this way Carte D`or can use purchasing function to reduce its costs and improve their long-term strategic planning techniques to deal with the outgoing costs. Using strategic purchasing would enable them to negotiate for the supply of milk, sugar, cream and ect.In this way the procurement approach would increase the CM (contribution margin). Processing: The processing stage would start with the fulfilment of the ordered ingredients in the procurement department. Later on all the ingredients are get together into the assembly process. The Carte D`Or`s recipe is prepared and the ice-cream is prepared. In this press, Carte D`Or can take an advantage by integrating the JIT method. This would help them always have fresh ingredients and not going to keep too ingredients inventory.This can be implemented by ordering smaller quantities of ingredients and increasing the supply frequency. Outbound logistics: In this process of Carte D`Or brand is concerned with the storage of the made ice-cream. The ice-cream package is quite important for keeping the product fresh, protect it during storing, warehousing, transporting as well as to protect the environment form the ice-cream package from the ice-cream package that would be used. So, sustainable packaging would be a major factor in the outbound logistics of the Carte D`Or brand.Packages, which are more eco-friendly and recyclable can take place as well as packs with improved durability. The durability factor can reduce waste, of cracked or broken packs. Marketing ;Sales: Creating a good image for the product might be of vital importance for brand. As, Carte D`Or are producing luxurious ice-cream with a premium quality they need to bind their brand and customers. Carte D`Or would add value to their products by detailed research and development, using Customer Relationship Management.Collaborating closely wit h the CRM department would give the information about customers’ needs, wishes, expectations and even tendencies. Due to the usage of this technique the Carte D`Or brand set their customers as a starting point for all their products development and concepts. Services: ————————————————- The Carte D`Or brand provides their customers with a range of services, as: customer care, direct ordering of bigger quantities, B2B and B2C SCM. In addition to that the brand adds value, by applying the differentiation approach.They provide to their customers special fan website, with the full range of products and a TV show with one of the top chiefs in the world. What is more there is a special line for problem solving callings to Carte D`Or cusromer service. ———————————————â₠¬â€- Supporting processes: Infrastructure: Carte D`Or brand adds value with an efficient assembly line, which gives a high production level during the whole manufacturing process. Production safety and durability is another aspect that may put emphasis on preventing waste.HRM: Carte D`Or brand is quite focused at the sort of working force they use, because they are promoting exclusive ice-cream with top quality. They put emphasis on employees suitable skills, efficiency and job enrichment, in order to stimulate the working force. Technological development: An approach thag Carte D`Or adds value in this sector of value chain would be leverage, as maximizing production and effectiveness without any investments increase. Their top goals are effectiveness and efficiency due to decreasing the expenditures and increase profit.Procurement: Procurement in is very important for Carte D`Or brand because this Is a sector where huge expenditures can be significantly reduced. Negotiating for ra w materials, auxiliary materials and etc. Carte D`Or has a special customer call centre for questions regarding procurement. Relevant systems that facilitate the primary processes in the value chain: ERP(Enterprise Resource Planning) is a relevant system in the primary processes in the value chain, because ERP is developed to facilitate the flow of information between all business functions.It will optimize the communication and information flow between inbound logistics, operations, outbound logistics, marketing ; sales and service CRM is also relevant because it is designed for managing customer service, marketing and operations. MIS stands for Management Information Systems. This system provides the management with the right information to manage an organization effectively ; efficiently. The system analyzes the primary processes with the goal to optimize them. Why would a company adapt their packaging of ice cream? For a company like Uniliver that wants to be more sustainable, a reason can e to produce a environmental friendly packages. To comply with that, the packages have to be adopted according to the new standards: reduced waste, being recyclable and re-usable. Other reasons can be to optimize the space available, lower costs or get the attention of customers with new and improved packaging. There are multiple departments involved when changing a packaging like the Research ; Development department to design this new packaging. But also the marketing department; is involved to do the promotion and management finally makes the decisions.Changes in packaging automatically lead to changes in the value chain. Because machines have to be re-programmed, marketing ; sales have to use a different promotion strategies (introduction of the product). But also inbound and outbound logistics will change. New materials will be imported so new routes have to be created. Also the company will have to examine which type of transportation is the most efficient in the n ew situation. It will make a huge difference if a package is round or square if you consider transport and storing.Also customer behaviour will change, if a customer recognize a problem he or she will go to different phases before actually purchasing a product. First they search for information; a new package can have an influence on commercial sources. Also the selective perception process will be influenced because the perception on the promotion message will change and this can lead to a different interpretation. Perhaps the evaluation will also change because consumers feel that the products offers more benefits. If the new package requires new materials the suppliers will be examined if they are capable to deliver these new materials.If not they need to look for other suppliers. The stakeholders and NGOs can be a threat to the company for example the new package is less environmental friendly than it might happen that they do not longer want to invest in de company. Unilever sh ould pursue a Research ; Development policy that focuses on sustainability. They can do this by using recycled plastic for the packages and recycled paper within their offices. Use biological milk and fair trade ingredients such as chocolate. They can also make use of green energy and transport as environmental friendly as possible.The Research ; Development department has the most influence on the structure. As we have seen the entire value chain will be affected with a change in for example the packaging. The method that we used to come to a package innovation was idea capture internally because of the limited time and resources. But there are other methods appropriate for Unilever like customer focus groups for problem detection while pre-testing to prevent future failure, external idea contest to get to know the customers wants and needs. Last consult partners and vendors to make sure that everyone is reading from the same page.Process descriptions As shown below, there are a nu mber of steps taken in the process of creating ice cream. (source: http://www. foodsci. uoguelph. ca/dairyedu/icmanu. html) When there’s a new product packaging, there will be a small change in the primary process. First of all, when ice cream is stored it is done so in temperatures below -18 Celsius; so the packaging has to be able to withstand such a temperature. This is important for two reasons: * The prevention of growth of micro-organisms; * Maintaining the texture of the product. When using new kind of packaging, the process can be changed.For instance, if the new kind of packaging can withstand a temperature of below -18 Celcius, packaging can be done before storing the ice cream in the freezer and thus saving plastics, waxed paper or cardboard containers since these are used as temporary packaging. There are many activities involved when producing ice cream. Blending, aging, pasteurization etc. Below we will present which activities are involved when producing ice cr eam. To do so, we used a RASCI-Matrix, a process chart for sustainable activities (the green one) and finally a department-transcending table. RASCI-Matrix:Column1| Column2| Column3| Column4| Column5| Column6| Task /Role| CEO| Financial Director| Logistics Manager| Marketing ; Sales manager| Process Manager| Support employees| Strategic Planning| Accountable| Informed| Informed| Informed| Informed| Informed| Financial Planning| Responsible| Accountable| Informed| | | | Buying ingredients| Responsible| Consulted| Accountable| | Responsible| | Marketing ; Sales| Responsible| Consulted| Informed| Accountable| | | Warehousing| Responsible| | Accountable| | | Responsible| Transport| Responsible| | Accountable| | | Responsible| Storage| Responsible| | Accountable| | | Responsible| Services| Responsible| | Consulted| Responsible| | Responsible| Supporting services| Responsible| | Consulted| Responsible| | Responsible| Analyzing results| Responsible| Accountable| Informed| Informed| Informe d| | Maintenance| Responsible| | | | | Responsible| R ; D| Responsible| Informed| Consulted| Consulted| | |The above RASCI-Matrix show the different roles and tasks. The purpose of this matrix is to show the relationship between the actors and their responsibilities. The abbreviation RASCI stands for: R=responsible, A=accountable=support, C=consulted, and I=informed. Flow-Chart ; Transcending-department table: Above we have shown the whole production process of Carte D’or ice cream. Starting with blending of the ingredients and ending with the packaging. During this process value is constantly added. Package: after the freezing procedure the ice-cream is placed into its package. This is the step where a company would be able to take a competitive advantage over its rivals.It can be done in a variety of different ways: In particularly for Catre D`Or there might be: Package size: turn into a production a variety of smaller packages, which are relatively more suitable for daily usage: The shape of the package may play a major role: for example the company can safe cost if they use square or rectangular form of the package. In this way they may improve efficiency of logistics as more packs would be able to place into a box. In this way efficiency and sustainability would be improved as more packs of ice cream can be transported within the same use of space; Sustainable materials: materials used for producing the packaging also might be an important factor. In recent years the interest in products which are environmentally friendly has risen.An example of would be a package that is going to be recyclable or bio-degradable as the harm at the environment would be significantly reduced. Hardening: The packaged ice-cream is placed into a blast freezer at -30 ° to -40 ° C where most of the remainder of the water is frozen. Below about -25 ° C, ice cream is stable for indefinite periods without danger of ice crystal growth; Storage: storage of the produced i ce-cream can be sustainably improved, due to a new package shape. With a new package shape, Carte D`Or would be able to reduce its storage costs and to improve logistics efficiency. This approach would enable to leverage the logistics process. There would be the same storage expenses, although the packs of ice-cream would me increased.Steps in the process| Activity| Transport| Check| Wait| Inventory| time (hours)| | | Blending of the ingredients| X| | X| | | 30mins| | | Pasteurization| X| | X| | | 30mins| | | Homogenization| X| | X| | | 1h| | | Aging| | | X| X| | 12h| | | Freezing| X| | X| | | 15mins| | | Hardening| X| | X| | | 15mins| | | Storage in the freezer| | | X| | X| 60mins| | | Packaging| X| | X| | | 20mins| | | This table shows the average throughput times of each activity. ——————————————– [ 1 ]. Our mission. (nd). Retrieved 02 16, 2012, from https://www. unilever. com/ aboutus/ourmission/ Paper&Board – Unilever Sustainability. (sd). Opgeroepen op 02 13, 2012, from http://www. sustainable-living. unilever. com/the-plan/sustainable-sourcing/pape

Thursday, January 2, 2020

Taking a Look at Cyber Crime - 680 Words

Introduction Cybercrime describe a heinous act that interferes with the functioning of the computer networks by exposing the users of the networks together with the systems to risks. The act is committed intentionally with the objective of creating interruptions that disrupt the normal functioning of the system. Computer users feel the harm directly or through a second party depending on the nature of the tool used in committing the crime (Hull and Sivanesar, 2013, p 98). Computer users across the globe are facing threat, due to the rise in cases of cyber crime, and this is necessitating the intervention of the government through enactment of policies that govern the usage of computer technology. According to Richardson (2008, p 3), cyber crime has grown to catastrophic levels thus posing a challenge to global security. Consequently, besides cyber crime affecting the security of individual users of the system, it has a significant effect on the social, political and economic aspects of peopleâ₠¬â„¢s live hood. As discussed in the piece, cyber crime is an advanced form of violation of the law that poses challenges that were inexistent to the globe prior to the introduction of computers. Forms of Cyber Crime Critics categorize computer crime into two groups namely; offences targeting people using computers, and offenses, which interfere with the functioning of computer networks. The common crimes that affect networks in this case include viruses, restrictive access, and malwares.Show MoreRelatedTaking a Look at Cyber Crime624 Words   |  2 Pages Cyber crime is a term used to describe the various forms of crimes committed through the computer and networks. Once the two are connected, it paves way for crimes to be committed easily and at a faster rate an act which sometimes is referred to as hacking. Cyber crime also includes crimes committed through the internet such as internet fraud, identity theft, passing of illegal information either through pictures, videos or messages. These acts intentionally harm the reputation of anRead MoreCyber Crimes And The Crime1153 Words   |  5 Pagesevolve with the trends in crime throughout history. Unfortunately for Law Enforcement, they are always on the back end of that and are often behind for months before being able to counteract. Cyber crimes are no different. Cyber Crimes are a new and always developing form of crime that bases its entire agenda from taking advantage of its victims over the internet. Law Enforcement s job is to assess and work to stop these crimes but it s not that easy. These cyber crimes are heavily in the favorRead MoreThe Issue Of Cyber Crime1118 Words   |  5 Pagescriminals commit a crime. Whether a person is covering their face with a ski mask as they physically rob a bank or someone infiltrates a hospital’s network to steal personal information for ransom, every criminal finds comfort in the warped sense that their identity will most likely be unknown, which will allow them to evade law enforcement. Due to technological advancements, criminals are more likely to remain anonymous after committing a criminal act when they engage in cyber crime. As a result, organizedRead MoreCyber Bullying is a Crime Essay examples1326 Words   |  6 Pagesonline bully’s goal is to make their target feel weak; these online bullies can be referred to as a cyber bully. Cyber bullying is the exercise of using technology to embarrass, threaten, harass, or target another person; according to its definition it occurs among young people (New, 4). It is usually performed by a child’s peers and surprisingly occurs early as the second grade (Jacobs 1). Cyber bullying can even be unintentional, especially through the use of emails, IMs, and text messages becauseRead MoreCyber Security : The New Wave Of Social Media1604 Words   |  7 Pages Cyber Security If you were to look around a room of young adults or teens today, you would likely notice an eerie silence. A silence accompanied with most of these individuals staring down at their cellphones, the sound of conversation is exchanged for the sound of clicking keys. It’s no secret; this generation relies on their phones and the internet much like food and water. It’s a necessity. With the new wave of social media, which is being used by an alarming 78% of U.S. citizens, theRead MoreCybercrime Bigger Than Terrorism : Cybercrime1275 Words   |  6 PagesCybercrime bigger than Terrorism. â€Å"There are two kinds of people in America today: those who have experienced a foreign cyber attack and know it, and those who have experienced a foreign cyber attack and don t know it.† (Frank Wolf). The world has become more connected today than ever before. The world’s technology is growing larger and the internet’s traffic is boosting. Major internet-related industries are doubling profits because of the online traffic. With all the wonderful and positive thingsRead MoreThe Importance of Cyber Security1093 Words   |  4 Pagesincreasing use and lack of protection from cyber security, more and more people are becoming victims of cyber bullying, or the teasing and discrimination of others through online sources. The internet not only offers communication tactics, but also ways to keep track of your finances and shop from home. Identity theft through hacking is well known among the ones who risk putting their personal banking information online. Because of all the crime, the demand for cyber security is steadily increasing. WithRead MoreCyber Bullying And Its Effects On Children And Adults Across The Globe1693 Words   |  7 PagesTwitter and Instagram. The term for online bullying is referred to as â€Å"cyber-bullying†. â€Å"Cyber-bullying is defined as the use of email, cell phones, text messages, and Internet sites to threaten, harass, embarrass, or socially exclude† (Patchin, 2015). Much like the face-to-face bullying some may encounter in school can cause physical harm to someone, cyber-bullying causes emotional harm to children and adults across the globe. Cyber-bullying comes in many different forms, from spreading false rumorsRead MoreCyber Criminals Take Full Advantage Of The Anonymity And Secrecy Provided By The Onion Router1416 Words   |  6 PagesCyber criminals take full advantage of the anonymity and secrecy provided by The Onion Router (TOR) networks through the Internet; therefore, attacking the ver y foundations of our modern information society is very easy. Cyber crime can involve credit card theft, computer viruses, cyberstalking, cyberterrorism, cyber-pornography, Denial of Service attacks, Distributive-Denial of Service Attacks, hacktivism (hacking activism), identity theft, malware, and spam. Law enforcement officials have struggledRead MoreThe Impact Of Internet On Our Daily Lives1540 Words   |  7 Pagesand even trains. ICT in general has been embraced in almost everything from the military to transportation to sales, name it. The introduction of ICT into many of our daily life happenings has acted as a complementing factor in this modern world. Taking an example of technical development in this sector has seen the world go into an ease in the banking sector, online banking is now available, shopping online, telephone services just to mention, but a few. However, with every pro there is a con.