Thursday, October 31, 2019

Law in the media Essay Example | Topics and Well Written Essays - 2750 words

Law in the media - Essay Example File-sharing networks are diffuse and decentralized, therefore it is difficult to pinpoint who is supplying works to the public. Moreover, new technologies, such as BitTorrent, complicate matters because only bits of files are downloaded from a swarm of people, and this swarm of people may not be considered to be the individuals making the work publicly available. BitTorrent also relies upon temporary files that are created, bit by bit, before the permanent file is assembled, and the CDPA 1988 does not cover these temporary files. Another issue is that there are copyright protections that may be used, and the CDPA 1988 does not make it illegal to circumvent these protections. For these reasons, it seems that the CDPA 1988 is not keeping up with the ever-changing digital world, and should not be used by artists who are harmed by file-sharing and BitTorrent, as it is difficult to apply the Act to these copyright infringements. Copyright, Designs and Patents Act 1988 A copyright is, in a nutshell, an exclusive right that someone can own to â€Å"copy the work; issue copies of the work in public; perform, show or play the work in public; to broadcast the work or include it in a cable programme service; or to make an adaption of the work or do any of the above in relation to an adaptation.† (Copyright, Designs and Patents Act 1988 II(16)(1)(a-e)). ... Copyrights expired after 50 years. (Copyright, Designs and Patents act 1988 I(12)(1)). Basically, if you create a piece of music, you own that piece of music for fifty years. You, and you alone, have the right to copy your piece of music, issue copies to the public or perform the music, broadcast it or adapt it. It is yours. If you wrote the lyrics, then you own the lyrics. If you wrote the music, then the music is yours. If you performed the music, then you own the recording of the live performance. Sound recordings are owned by the maker of the recording. (MIPI). The Problem with The CDPA in the age of the Internet The CDPA, having been crafted in 1988, could not have foreseen the developments that implicate copyrights in the Internet Age. For instance, one of the major copyright infringements is something that was not explicitly covered by the CDPA – illegal file-sharing, which is tantamount to Internet piracy. Internet piracy is the cause of falling CD sales across the boa rd, as sales have steadily fallen year to year since piracy began. (Music Industry Blames Huge Illegal Download Market for Ever-falling Sales). The largest academic survey, commission by the University of Hertfordshire found that teenagers and students have, on average, more than 800 illegally copied songs on their digital music players. (Sabbagh, 2008). The problem is not just with peer to peer networks, but also in the common practice of lending CD to a mate and allowing them to copy the CD. This has the same chilling effect as does the illegal downloading of songs off the Internet, and hurts artists and the industry just the same. (Music Copyright – Featuring Jamelia). One of the problems with illegal downloads is

Tuesday, October 29, 2019

United States Policy On China Essay Example for Free

United States Policy On China Essay The United States policy on China has a long history. In the Shanghai Communique, signed between the US and China in 1972, the United States of America acknowledged the People’s Republic of China assertion that, all Chinese on both sides of the Taiwan Strait believe there is only one China, and that Taiwan is part of the mainland. Other Communiques have also been adopted by subsequent administrations to determine various policies for the United States, on the basis of the original one, signed in 1972 by President Richard Nixon. The US later shifted its diplomatic base from Taipei to Beijing in recognition of the Mainland. In Taiwan the United States has maintained vibrant unofficial contacts in commercial and cultural aspects. America’s ‘’unofficial’’ friendship with Taiwan has being a source of discomfort for mainland China over the years. It is sad to note that in 2005 Mainland China passed an anti-secession law stating; The People’s Republic of China will turn to non-peaceful avenues to tame Taiwan, if it declares self independence. The US has had to trade cautiously when it approaches China’s internal affairs. This diplomacy has often bore fruits and avoided facing head-on the root problems. The US taking hard stances on China and Taiwan affairs can certainly be counter-productive. Hence, the justification of its present position on the said matters as matters stands. Today, the main threat to the Security of the United States is from Terrorism. Other Global challenges, are to be found in Climate change and the proliferation of nuclear weapons. To suitably address these issues the United States must engage China, to jointly tackle these problems. Taiwan has historically been allied to the US. The Taiwan Relations Act in the US domestic law allows for ‘’unofficial’’ contacts to thrive between the two countries. This status quo has to be maintained, so as to protect the traditional interests of the United States of America, while observing the protocols of the various Communiques binding China and the US. The United States stands as the only superpower with an economy that has great influence globally. China on the other hand has the number with a population of over 1 billion people been the most populated nation. Its economy has also been steadily rising as many US firm outsource their operations to China, though many do so with the prime aim of maximizing profits and cutting down their operational costs. The Chinese economic growth has certainly been â€Å"food for thought† for the policy makers. And the US residents concerned about the â€Å"job loses† East Asia is a strategic trading partner for US Companies and products. A China policy has to defend the interests of these trading companies operating in this region, from Japan to Indonesia. East Asia’s security is threatened by North Korea developing nuclear weapons. This threat can be effectively contained with the co-operation of China. The US should advocate for a policy which will eventually unite the two Koreas. In exchange of the ultimate unification of China and Taiwan, the US may opt to root for One Korea which is free and democratic. The emerging liberal Korea will open up new markets for the existing US companies found in these regions. As the grave concerns of North Korea acquiring nuclear weapons been a major US concern. The US has often seen China in a better position to pile pressure on North Korea to abandon its quest for nuclear weapons, as the US seeks for a peaceful solution to avert the nuclear proliferation: currently threatening to tear the region apart. The end of the cold war ushered in new global rivalry between the US and China solely based on historical and economic mistrusts. Rapid industrialization of China has had a ripple effect on the economies in East Asia, which now look up to China as a partner and protector, a role which was previously a prerogative of the US. Repressive politics has managed to put a check on dissenting voices within China thus enabling the leadership to look beyond the borders and assert China’s regional hegemony. Japan, though an economic power house, embraces a culture of anti-militarism and has not been at par to counter the monstrous growth of neighboring China, despite their historical rivalry. As China increases its regional influence, her other aim is to unite with Taiwan. Their modern approach to achieve this pursuit is through Soft Power. In Political Science, Military and economic power is considered as Hard Power while other means of coercion to achieve political gains such as; Cultural norms, political ethics, Uniting Ideas and accommodating Foreign Policies are classified as Soft Power. China, through its Soft Power has managed to win the trust of many countries across the Globe. Recent research indicates that, China has surpassed the US as the most trusted country in the world. China’s domestic development and stability has made it a world power and is now bent on edging out the US from East Asian affairs. After the collapse of Communism in the Soviet Union and Eastern Europe, it dawned on Chinese bureaucrats the need to consolidate power in the State. Previously an authoritative powerful State was considered a deterrent to economic growth. In China, power was centralized in the CCP. Later, the open door and reform policy led to a revolutionary change in the social-economic well-being of its citizens. The transformation of lifestyles has imbibed a sense of pride and confidence in the Chinese, breeding nationalism in the country. It is this renewed Nationalism which is a threat to the crisis in the Taiwan Strait, Chinese nationalists feel China should be forcibly united to Taiwan. Across Taiwan, political liberalization and economic empowerment has created a new Taiwanese identity. Political parties which advocate Taiwanese interests and consciousness fair better in National polls whereas parties which lean towards the Mainland are shunned. Majority in Taiwan favor the political situation to remain as it is. The rise of Nationalism in the Mainland has coincided with emergence of a Taiwanese identity. These two aspects are bound to repel any forces which aim to unite them and might even isolate the US bid to act as an intermediary. The US, recently concentrated its military might in fighting the Al-Qaeda in Afghanistan. The recent world economic crunch has also dented the military war chest of the US. In the Far East, North Korea’s acquisition of nuclear weapons has polarized the entire region. It is obvious The Japanese who looked upon the US as protector are starting to feel vulnerable. As China vows not to recognize the independence of Taiwan, it would be only appropriate to front for the remilitarization of Japan. This will eventually ease the burden on the US military in the Far East and contribute to peace and stability in the region. China and the United States can without doubt be argued to be the world’s two indomitable â€Å"super powers†. An idea has been mooted to establish CHIMERICA a G2 alliance to mediate on contentious world affairs. The two countries have however initiated the US-China strategic and Dialogue forum to tackle issues on global warming, humanitarian crisis and proliferation of nuclear weapons. Chinese authorities have adopted policies set to improve co-operation on both sides of the straits. China hopes to maintain a Status Quo in her favor; which simply means Taiwan will never be independent from the Mainland, especially taking into account its economic benefits. In 2010 the US proposed an arms sale to Taiwan which was vehemently opposed by mainland China. The US administration was to further antagonize Beijing when President Obama decided to host the Dalai Lama. The US today has its hands full in fighting terrorism at home and abroad. In the Far East, China’s increased economic might and international clout has tilted the power balance in her favor. A China Policy in tandem with the previous communiques will ease the existing security tensions in the Far East Region. The US has over time pursued a policy of close co-operation with a reformed and modernized China. This is to augur well with the over 48 Billion dollars worth of investments by US companies operating in China. The United States of America faces a formidable challenge as it tries to maintain hegemony in a region which has been transformed radically by an emerging economic power, China. Many US firms have often been accused of setting up tax heaven in China. These firms are viewed by those opposed to the whole idea of US firms outsourcing to China, as using US market to make huge profits and evading the responsibility of paying their fair share of national tax. This has forced the US lawmakers to devise ways and means to curb these loopholes, though its success rate is questionable. The Shanghai communique and others thereafter have managed to harmonize the relationship between the US and the People’s Republic of China. Each new US administration comes up with conflicting policies but which are based on the original communique, which advocates for one China. The signed documents are not binding and US interests, particularly in trade, are known to override these communiques. The above concerns raised have led policy makers on both sides of the equation to carefully assess their short and long-term policies towards each other. Some of the approaches that have been laid on the table for debate and implementation are:- Approach 1: Envision a crumbling China Most debates in America as concerns China policy tend to dwell on the emerging might of China, a big and threatening East Asian economic and military giant. Many others see a prosperous and cooperative Mainland China, which can is also be a ‘’Strategic partner’’ to the US. Rapid modernization may as well overwhelm the existing political structures in China to destabilize the country. At the moment, various provinces in the Mainland are agitating for self rule. An unstable Chinese State would reduce the government’s capabilities to contain serious vices in this vast country Industrialization in China has had its drawbacks as witnessed by the high pollution in urban areas. Stern laws are a deterrent to industries which pollute the environment. A weak, broken China will barely be able to enforce or control the resulting polluting culprits. A disintegrating China is a more serious threat to the US interests while a United China is a Strategic advantage. An American policy on China ought to advocate for a stable domestic China. As the worlds largest producers and consumers, China and the US should be in the forefront stemming global warming. To monitor levels of environmental degradation in a splintered China would be a nightmare. With a thriving and united mainland, the US can also count on Chinese support to disarm North Korea of its nuclear arsenal though peaceful negotiations. The prospects of a failing China are a disadvantage to the US trade interests in Eastern Asia, where numerous US multinationals have invested heavily. A China policy should support a strong Cohesive State; for floundering domestic China will deal a destabilizing blow externally. All the neighboring countries economies are dependant on China, a spill over effect of instability can be disastrous for the entire region. As China economy comes to par with the western world, improved lifestyles and access to information is bound to ferment discord as Citizens seek an outlet to flaunt their new wealth worldwide. A China policy should encourage cross cultural exchange between Citizens of the two States. An informed public will discard the deep rooted mistrusts of East verses West rivalries which are mostly myths. The success story of the Chinese economy would also boost the US tourism sectors as wealthy Chinese splash their wealth on US tours. Approach 2: Pursue ‘’One China’’ Dialogue In China the Taiwan issue is a matter close to the hearts of many. It is an emotional subject which can erupt negatively if not checked. The US has always been sympathetic towards Taiwan because of her liberalism and democratic ideals. This does not go down well with the Chinese who insist Taiwan is the 23rd province of the Mainland. To ease the tensions along the Taiwan Strait, China policy ought to lean on One Nation, which encompasses the Mainland and Taiwan. As mentioned before, the US can also bargain for a united China in exchange for ‘’One Korea’’ in the North. This will strategically secure North East Asia for the US as Japan is located in the neighborhood. The US should thereafter lobby for her trading concessions to be maintained. A sound and trusting relationship with China will eventually ensure world peace. Though some may feel that the US policy at times are viewed by many around the globe to be a bit forcefully, China’ s policy especially on foreign issues has been a bit laid back. Whereas, the US may favor sanction of countries that it considered a threat to its national security. China has not been in favor of those sanctions and may only favor them as a last result. When it comes to China’s internal affair especially on human rights issues, media freedom and democracy the Chinese have not taken lightly the US offshore comments on its internal affairs. It may seem that the standards of human rights issues are as far as the east is from the west when comparing china and the US. Across to the North East Japan’s economic muscle may eventually arouse Nationalism fronting for the re-armament of their country. After the testing of Nuclear weapons by North Korea, Japan must be feeling threatened. The emergence of new political players in Japan who profess aggressive military ideals can not be entirely ruled out. Historically a highly militarized Japan has been proved to be a global tyrant. It is whispered that ‘’ The Japanese have never learnt from their past military crimes’’, so they might as well be contained. Plus, given that Iran is also pursuing nuclear weapons and more nations are joining the nuclear club. Japan which has been traditionally enjoying military and economic superiority may be forced to rethink its policy. Though, China cannot be said to be a threat to Japan’s national security. The US has been advocating for nuclear non-proliferation and whether it will be able to convince the Chinese to reduce its nuclear stock pile is another hard rock to crack. The process of pursuing ‘’One China’’ Policy will maintain the Status Quo, China is known to prefer things to remain as they are, while plotting ways of controlling Taiwan. The US is a major supplier of arms to Taiwan and as things stand, the Status Quo serves well the profits of US multinationals. The rise of Taiwanese Identity has altered the mindsets in the Island, where majority now are against reunification with the Mainland and prefer the Status Quo remain. The split in the two China’s was fueled by Nationalists and Communists, as found in Taiwan and the People’s Republic of China respectively. It is highly probable that integrating the two will strengthen the renewed Nationalism in the Mainland. Political optimists believe China will eventually transform itself into a Democracy, though the process might take a while. With fast changing technology especially the fast growth of the internet China may find it hard to maintain its control of information freely flowing within its borders and would be forced to embrace democracy as viewed by the Americans. Some may argue that the US is playing double standards when it advocates for democracy whereas its own records are questionable. Especially, when Issues related to fighting terrorism are concerned. With some of the view in China and many other nations within the region feeling that the US policies should be toned down and they should bring more dialogue on the table. Approach 3: Engage Top-level Bureaucrats The US-China Strategic and Economic Dialogue initiative is an example of Top-level bureaucratic engagement. The US Secretary of State heads the team in this initiative while the Chinese delegation is led by the Deputy Premier. High level consultations between the two countries have in the past opened the way for China to join the World Trade Organization. Bi-lateral Summits by the Presidents of the two powers have in the past yielded reforming solutions to global issues. With almost two digit growth rate been recorded by China, one may project and see that China may soon overtake the US economy which is growing at a much lower rate than China. Comparing the two countries one may see that the national cake is more evenly distributed in America than China. Even though the wide gap between the poor and rich may at times benefits the US in the sense that they can outsource labor intensive projects at a relatively lower cost. Meetings between the Top leadership increase the level of Trust and diminish any hostile perceptions held. Apart from China, the US should play the role mediator in issues affecting the East Asia region. America’s policy in the region will determine the relations with China. US national interests in diplomacy, military and economics will only be well protected when top government executives engage directly with the leadership of this region. US standing among the Nations of East Asia will affect China’s views on issues. The US diplomats should push to strengthen existing alliances, while assessing the composition and capacity of stationed troops to fulfill their missions effectively. China should also be engaged so as to participate in regional issues such as counter terrorism, Disaster management and peacekeeping. To check on North Korea, Trilateral consultations with the Republic of Korea and Japan should be intensified. Further consultations with Beijing and Moscow needed to pressurize Pyongyang to cede developing nuclear weapons. Within the East Asia region, the US should support sound structural economic reforms in particular countries. This will provide the foundation for a sustainable economic growth in the 21st century. Aid ought to be granted to establish regional institutions which are comfortable with America’s involvement in East Asia affairs. Approach 4: Arms Trade On January of 2010, the US was closing a deal worth $6. 4 billion selling arms to Taiwan. Mainland China immediately threatened to impose restrictions on the US firms selling the arms. PRC later suspended consultations on certain regional and international issues. The US gesture (arms sale), was seen as a snub to the spirit of ‘’One China’’. However the US-Japan alliance is favorable to the interests of China. Japan, due to her bloody military past is viewed with suspicion in the region. The US has effectively put on check any Japanese military ambitions. China has in the past borne the brunt of Japan’s military might and is comfortable with US limiting her capabilities. Japan is a nation with great capability when it comes to acquisition of military superiority. It has not lately been in the arms race seen within the region, which has played very well with the Chinese. This can partially be attributed to the US check and balances on Japan. Though the whether the status quo remains is a thorny issue that would need to be addressed in future. Across Japan, North Korea is flexing her nuclear muscle from a tightly closed and controlled society. This scenario best presents the US with an opportunity to re-arm Japan on terms strictly dictated by the US. Thereafter this process will eventually offer US firms a lucrative avenue to invest in Japan’s, National Security industry. The level of militarization will however be in tandem with China and Russia’s aspirations, who can also act as mediators in the balancing of power along the Sea of Japan.

Sunday, October 27, 2019

The Local Tourism Industry In Botswana Tourism Essay

The Local Tourism Industry In Botswana Tourism Essay 1.0 INTRODUCTION 1.1 BACKGROUND TO RESEARCH Botswana is a relatively small country located in Southern Africa, sandwiched between South Africa, Zimbabwe and Namibia. A landlocked country, however what it lacks in coastline, it more than makes up for in tourist attractions that have pulled in visitors from across the world. Known mostly for the Okavango Delta, the Kalahari Desert and its Bushmen, and the numerous wildlife sanctuaries and parks that are a host to numerous endangered species. With a population of approximately 1.8 million people, mostly Setswana speaking, it has enjoyed 40 years of independence and gained its reputation as one of the fastest developing nations since, transforming itself from one of the poorest in the world, to a middle economy country. These great achievements have propelled Botswana into recognition as one of the most politically and economically stable in Africa. For a long time, Botswanas economy has been heavily dependent on the mining industry, boasting over 75% of the countrys export earnings. Although the country is also rich in copper, nickel and gold, diamonds are the most profitable. They were first discovered in the late 1960s, and since, the industry has flourished and established itself as the worlds largest producer of gem-quality diamonds. This industry is in no doubt responsible for assisting in and facilitating the speedy development of the country. Other key sectors include the agricultural industry (exporting quality beef), textile and livestock industries, exporting quality beef. One of the most important objectives of government policy towards achieving its Vision 2016 is the diversification of the economy away from dependence on the mining sector. In recent years, the growing tourism industry has proven itself as a significant contributor to the countrys Gross Domestic Product (GDP) and economic growth. With the countrys competitive advantage of its vast natural resources and offerings, it is automatically put it in a position where it can prosper not just regionally, but internationally as well. This growth and prosperity can be attributed to initiatives taken by the government in order to boost and improve the industry. Various strategies and policies have been implemented to try and spur private investment. It has initiated campaigns for the development and improvement of the facilities in the National and wildlife parks in order to preserve the environment and its ecosystems. Foreign investment is encouraged, although only if those wishing to do so conduct joint ventures with the citizens, to promote their involvement in the development of the industry. They introduced a policy which allowed both foreign and local investors in tourism, among other selected sectors, to receive grants from the Government, clearly gave a boost to investment in tourism All these developments have led to an increase in international visitors which in turn has led to an increase in the need for accommodation, and therefore an increase in the building of hotels and lodges. Extracted from FDI AND TOURISM: THE DEVELOPMENT DIMENSION, EAST AND SOUTHERN AFRICA. A United Nations Case Study 2003 The hotels that have been established are both locally and internationally owned, however research reveals that ownership is dominated by international companies and individuals. The most popular of these hotels are; Sun International (a South African franchise), Cresta Hotels (another South African franchise belonging to the TA Group), The Grand Palm and Mondior Summit (a member of the South African Mondior Company). In an ideal environment, it would have been the other way around, with industrial control fully domestic instead of dependent on foreign aid. The drawbacks of having an unbalanced ownership scale (or one that is not heavily domestic) in the tourism industry, include loosing vital revenues collected to foreigners and the inability of complete revenue maximization by the government and the citizens. The presence of these multinational hotel chains is evidence that the initiatives taken by the government to boost the industry are effective. However, only to a limited extent because in order for the industry to survive, they have to allow foreign investors to participate but this is pushing the industry into the hands of these foreigners and away from those who can benefit from it the most; the citizens. With this proposal, I intend to find out if there is a relationship between the large internationally owned hotels and lodges and the significantly smaller locally owned ones. 1.2 RESEARCH PROBLEM The tourism industry in Botswana is still in its growth phase, with government programs dedicated to the upgrading and development of the areas that attract most tourists. The hotel industry is one that has seen considerable growth in relation to the governments policy. In order to help expand this industry, the government has favored foreign investment and made it easier for foreigners to invest on a long term basis with political and economic stability providing an ideal investment climate. As a result, the hospitality and accommodation sectors have seen numerous international hotels, lodges and hotel chains set up around the country. Although significant for a maturing industry, the abundance of internationally owned and operated establishments signals an inequality in the ownership when compared to the locally operated establishments. The industry is dominated by foreign proprietors and it seems they are overpowering local entrepreneurship. The irony of the situation is that in order for tourists to experience the genuine Setswana environment, they would have to place themselves in an atmosphere that would reflect the true Setswana lifestyle, and that is more than often found in a locally owned establishment. The success of these international hotels is testament to numerous situations, such as: the local hotels arent performing to meet the standards of the tourists Most of the internationally operated hotels around Botswana can be classified as 5star, and for the economically well-off visitor, luxury and comfort may play a larger role than experiencing the Setswana lifestyle in choosing where to stay. There is also a level of quality that can be expected when dealing with an internationally established and world renowned hotel that may cause visitors to automatically opt for it instead of trying out a local hotel. This is not to suggest that the local hotels are not up to par, but the unfortunately the reputation of an international hotel, far exceeds that of a local one. the tourists are not aware of their services As more and more of the world business is turning electronic, i.e over the internet, more and more tourists rely on the internet to inform them on where to stay, and the use of the travel agent as an intermediary between the hotel and the tourist is slowly becoming obsolete. It has taken a little bit longer for some businesses to realize the importance of the internet as a marketing tool, and its ability to help them reach out to potential customers. Many hotels have not yet come to this realization and it is this way that they missing out on opportunities by failing to expose themselves to a wider audience. Advertising plays an important role in determining the success or failure of a company and if it fails to run an effective marketing scheme then it will receive limited responses. Either of these situations results in loss of revenue for the local hospitality and accommodation sector and all those involved. These consequences have a long term domino effect, where one situation triggers the other, or one situation is the direct or indirect consequence of another. Such as: Managerial positions are dominated by foreigners The only posts reserved for locals are those with lower salaries General failure of the industry to contribute to the development of the local community and the eradication of poverty. 1.2.1 PROBLEM STATEMENT The local tourism market in Botswana is saturated by large foreign owned hotels and this is pushing the locally owned ones into the background. 1.2.2 RESEARCH QUESTION The purpose of this research proposal is to answer the question: What is the impact of the international hotel giants on the local accommodation and hospitality market? My intention is conduct a qualitative study by interviewing local entrepreneurs to get an in-depth and personal opinion on the role that these hotel giants play in the industry. RESEARCH OBJECTIVE The purpose of this study is to assess the impact that international hotel franchises have on the local hospitality and accommodation market in Botswana. This study can be broken down into categories that when concluded, should give a clear understanding of the above mentioned issue. To recognize the relationship between the abundance of the internationally operated hotels and lodges and the scarcity of locally owned ones. To determine the impact that these international giants on the local hotels. To examine the repercussions that the international hotel chains have on the local tourism industry. To develop research in this area in order to recognize how the current situation can be overcome. 1.4 JUSTIFICATION OF RESEARCH The reason I have chosen this particular topic is because the tourism industry in Botswana is rapidly becoming a vital contributor to the countrys GDP, as the need for economic diversification away from the mining industry becomes more urgent. As a vital part of the economy, it is important that the public be aware of all aspects that contribute to its growth. By creating public awareness on how the local market is influenced by these foreign giants, it is my hope that they will take initiatives to be more supportive and more participative in the industry. Another reason for pursuing this topic is because research previously conducted has been limited and non specific, . . . à ¢Ã¢â€š ¬Ã‚ ¦ . RESEARCH METHODOLOGY The primary purpose of this research is to find out if and how the local entrepreneurs business has been affected by the international hotel chains. What I want find out is the experience, opinion and feelings of these entrepreneurs towards these hotels. The best way to collect this data would be through conducting an interview, specifically a structured interview. I chose this method because: It allows for me to investigate the thoughts, views, assumption, feelings, attitudes and perceptions of the interviewee which cannot be provided by any other method of data collection. It allows me to ask more complex questions and also the ability to validate the data as I collect it, which improves the overall quality of the data. Due to geographic constraints, my interviews are going to have to be conducted over the phone. The advantages of telephone interview include: More freedom for the interviewee because they are not under pressure from a face-to-face scenario, therefore the interviewee feels more comfortable. This also means that their responses will be more honest and open. SAMPLE SIZE I intend to interview a total of ten local businesses located all around the country, in order to determine whether it is a national or just localized phenomenon. I want to find out the opinion of the businessman and woman in all tourist attractions around Botswana to establish whether their view is universal. PROJECT OUTLINE Chapter 1 Introduction This starts with a brief description of Botswanas economic history and the contribution that the tourism industry is making towards it. The Research Problem describes how the introduction of International hotels signifies the growth of the industry but that may be at the expense of the local entrepreneurs. Therefore it is my responsibility with this project to find out exactly how these hotels have affected local businesses and to achieve this, I will conduct interview with ten of these businessmen and women. Chapter 2 Literature Review The exploration and analysis of secondary data procured over the internet. I will study journals related to or contributing to the topic, in order to find out the significance of my research. Chapter 3 Research Framework This is an in-depth analysis of the method of data collection, sample sizes and distribution in order to inform the reader on every step of primary data collection process. 1.7 DELIMITATIONS OF SCOPE The scope of this research is limited to local entrepreneurs in the accommodation and hospitality industry in Botswana, although only those involved in the operation of hotels, lodges or guest houses. The aim of this research is to solicit their opinion on the effect that the international hotel giants have on their businesses with the assumption is that they have all been affected either in a good or bad way by the success of these international hotels. This research will provide an analytical view of how these local businesses are doing in comparison to the hotels, and this information will be useful to these entrepreneurs in trying to improve the current situation. CHAPTER SUMMARY This chapter is an introductory chapter that starts off by describing the economic history of Botswana and the influence that the tourism industry has had. The main issue revolves around how this industry has seen the establishment of international hotels and what role these hotels play on the local hospitality and accommodation market. The research questions outline what type of information Im trying to solicit and the choice of data collection most suitable for that is through conducting interviews. http://www.bidpa.bw/docs/archive/Economic%20Diversification/TheTourismSector.pdf http://botswana.usembassy.gov/resources/commercial-section/tourism-and-investment.html

Friday, October 25, 2019

Summary and Analysis of The Millers Tale Essay -- Canterbury Tales Th

Summary and Analysis of The Miller's Tale When the Knight had finished, everybody decided that he had told a noble story. The drunken Miller claims that he has a tale as noble as the one the Knight had told. The host tried to quiet the Miller, but he demanded to speak. He claims that he will tell the tale of a carpenter and his wife. His tale will be one of infidelity. The narrator attempts to apologize for the tale that will follow, admitting that the Miller is not well-bred and will therefore tell a bawdy tale. Analysis It is in the prologues to the various tales that Chaucer comments on the tales that his characters have told. This serves as an internal critique of the tales that Chaucer has written. In this prologue, the Miller constructs the author's reaction to the Knight's Tale. The Miller mocks the noble messages of the Knight's Tale, and prepares to tell a tale that he finds equally uplifting. The tale that will follow is unreservedly bawdy and lowbrow, a necessary antidote to the oppressive sense of epic honor that permeates the stodgy Knight's tale. The Canterbury Tales offer Chaucer an opportunity for experimentation, for he has created characters who create their own stories. Therefore the stories are not simply an extension of Geoffrey Chaucer's imagination. The story of Palamon and Arcite is a tale that a man such as the Knight might tell; the inflated pomposity of the tale is a deliberate move by Chaucer, purposely adhering to the Knight's personality even at some dramatic and narrative expense. This also affords Chaucer the opportunity to engage in forms of disreputable humor, as the Miller's Tale will demonstrate. Chaucer even separates himself from the tale that the Miller has told, claiming th... ...s into taking tubs onto the roof. Only Nicholas does not suffer for his romantic pursuits. He does not court Alison  ­ rather, in his first encounter with her Nicholas grabs her crotch before even speaking. Nicholas only receives a form of punishment when he attempts to trick Absolon with a 'kiss' for the second time, and in this occasion Nicholas suffers not because he has broken any moral codes, but because he was foolish to try the same trick twice. Only Alison escapes any form of retribution, for she is the one who is consistently cunning and wily. She receives no punishment for her infidelity, while the characters who are the most overtly virtuous (John and Absolon) are the ones who suffer the most. The Miller's tale thus prizes the characters who are the most shrewd rather than those who hold more sentimental emotions or obey traditional standards of behavior.

Thursday, October 24, 2019

Do you think secondary schools in Malta understand ‘inclusion’

IntroductionInclusion is portion of much larger image than merely do portion of category in school. It is being included in life and plays a portion utilizing one ‘s abilities in twenty-four hours to twenty-four hours activities as an indispensable component of the community as anyone else. Inclusion is being a portion of what everyone else is, being received and embraced as a member who belongs. In the last old ages, the thought of inclusive instruction has featured in precedences sing the instruction of many states. The issue of inclusive instruction is ruling many treatments and educational policies. The attempts to advance inclusive instruction are focused on school activities and the manner how they could go more inclusive. But in his book, Developing Inclusive Teacher Education, Tony Booth and others, present the inquiry, whether universities are reacting to inclusive instruction by developing future instructors in their initial instruction, since this phase have a serious function to play in the development of inclusive patterns in schools they will finally work in.[ 1 ]Inclusion in secondary schools in MaltaAbout 15 old ages ago the thought of inclusive instruction in Malta, peculiarly puting kids with disablement in mainstream schools, was a cradle. But in July 1995 development takes topographic point, which led around 600 kids with different types of disablement or less potency to school to go to mainstream schools.[ 2 ] In September of 2002, the Ministry of Education issued a papers called, ‘Creating Inclusive Education ‘ where it gives guidelines for the execution of the National Curriculum Policy on Inclusive Education. The papers gives clear guidelines how to prosecute in inclusive instruction procedure and the features which makes school more inclusive.[ 3 ] But due to this papers can we state that our secondary school understand ‘inclusion ‘ ? On one manus we can state that today schools offer many installations and chances for everyone particularly for kids with disablement. Children who have some type of disablement find our school more accessible and more easy to take portion in and take part in every activity in every portion of the school. There is besides the work of many Learning Support Assistants who assisting pupils to experience that security in order to happen it more easy to incorporate and take part both in school activities and category. On the other manus there are some advancement that need to be taken into consideration. Today our society is going more witting of the presence of many aliens in our state. This in fact is reflected in our school with the presence of pupils who have an international background. In my instruction pattern experience I have noticed negative attitude to foreign pupils particularly those with different coloring material tegument. Our schools need to make more inclusive civilization in our school, in order to educate our kids to accept and include everyone. Many times the pupils ‘ behavior reflects the attitude of many people in the street. Apart from foreign pupils, today we are confronting pupils with different backgrounds. It is critical today more than before that we view every pupil as a alone person. In order to make that instructors must pass some oif their clip, particularly during school interruptions to construct a good relation with the kids in order to cognize their demands and what they expect.The Relevance of Inclusive EducationInclusive instruction is something which brings many benefits to the school and the wider community. This is non merely done by making nil but it requires difficult work and a process in order to achieve the ends of this inclusive civilization. First of all, by inclusive instruction, many pupils display positive attitudes towards kids who were vulnerable to marginalisation, i.e. foreign pupils, kids with disablements, kids categorized as holding particular demands, kids coming from hapless households. High school pupils in research made abroad describe that their relationships with pupils with disablements resulted in more positive attitudes, increased their response to the demands of others, and increased grasp for diverseness.[ 4 ]For illustration, pupils help international pupils who find trouble in pass oning through the state ‘s linguistic communication, pupils who give aid for other pupils with some type of disablement, particularly when the LSA is absent.[ 5 ] Research surveies have express positive consequences with regard to credence of pupils with disablements in regular instruction environment. For illustration pupils with disablements show more societal additions than those in detached scenes.[ 6 ] Inclusive instruction stimulates every pupil to take part in schoolroom activities. Teachers can assist by making activities harmonizing to the abilities of each kid in order for all, even those who experienced troubles in acquisition, to be able to take part. With engagement one can include coaction between pupils. From research covering with inclusive methods by pupil instructors was observed that pupils take enterprises towards developing coactions on the footing of the rules of inclusive instruction. Students seem to join forces with school caputs, instructors, other pupils, parents etc. In each instance the coactions aimed at increasing engagement, diminishing marginalisation and supplying equal chances learning and larning to all pupils.[ 7 ] All parents want that their kids be accepted by equals, have their friends, and populating regular life as other kids. Inclusive scene can do this vision a world for many kids which for a ground or another feel that they are excluded in their environment. This vision helps all kids to larn by being together. Children learn at their ain gait and manner within a fostering acquisition environment.DecisionInclusive instruction is doubtless a challenging, complex and contested construct, and its manifestations in pattern are many and varied. It is about lending to an inclusive society through determining the procedure by which the engagement of all kids and immature people in instruction is enhanced and maximized. A characteristic common excessively much of the research on inclusion, is the restrictive reading of the term in pattern. As a term, it has been most closely associated with the assimilation of students holding particular educational demands into mainstream schools. Teacher peda gogues working alongside instructors in schools have the capacity to consequence alteration, to assist transform patterns and to do a difference to kids and immature peoples ‘ lives. Such an attack could guarantee the sustainability of the seeds which were sown during initial teacher instruction.

Wednesday, October 23, 2019

Review Related Literature

CHAPTER II REVIEW OF RELATED LITERATURE I. INTRODUCTION This review of related literature focuses on how to process used to automate a sales order fulfillment process. Such a system contains a list of order to be filled, and then prompts workers to pick the necessary items, and provides them with packaging and shipping. The said business needs an inventory system to help them to record the tracking of the business flow and help them to make it easier for them to monitor items. This inventory system involved the progresses of the daily process of buying and selling of their products.LOCAL LITERATURE * Julie’s Bakeshop System Since 1999, Julie’s Franchise Corporation has garnered a string of Franchise Excellence Awards for consistently high achievements of growth and development in all aspects of franchise operations that uphold the stringent standards of the Julie’s Bakeshop System: Quality; Customer Service; Cleanliness; Sanitation; Maintenance; and Reliable Mana gement. They Transacting Business and Visitors who register to transact business on the site and make use of the various services offered by Julie’s bakeshop.They use Personally Identifiable Information to customize the Site, to make appropriate service offerings, and to fulfill buying and selling requests on the Site. We may email Visitors and Authorized Customers about research or purchase and selling opportunities on the Site or information related to the subject matter of the Site. We may also use Personally Identifiable Information to contact Visitors and Authorized Customers in response to specific inquiries, or to provide requested information. Goldilocks System Goldilocks was opened in 1966 as a family business and started as a simple one-door apartment in a two-story structure at 2300 Pasong Tamo Street in Makati. It first opened its US branch in 1976, at Artesia, California. Goldilocks uses login information, including, but not limited to, IP addresses, ISPs, and br owser types, to analyze trends, administer the Site, track a user’s movement and use, and gather broad demographic information. FOREIGN LITERATURE ‘sponge and dough’ system of Franz Family Bakeries Franz Family Bakeries has produced bread products in the North Western US since 1906 and commissioned a $42m bakery in Springfield, Oregon, as part of a centennial celebration To produce its breads and buns, Franz uses a ‘sponge-and-dough' system. Sponges are produced in a 2,000lb horizontal mixer and receive a 4-4. 5 hour ferment at a temperature of 80? F and 80% relative humidity in an automated fermentation room with a capacity of 9,000lb per hour. The semi-automated fermentation room for the bun line produces 5,000lb an hour.Two 2,500lb horizontal mixers feed the bread line every 10 minutes with a continuous stream of chunks feeding the divider. The bun line has a 1,200lb sponge mixer and 1,600lb horizontal mixer from where the dough is sent to the divider ev ery 12 minutes. * Spooner Vicars Bakery Systems Spooner Vicars Bakeries is to be the world leader in ‘Total Supply ; Service† to our customer base and increase market leadership, through faster responses, on-time deliveries, professionalism, quality and technological advancement and to be the best in our industry.Spooner Vicars Bakery Systems may use cookies for the purpose of improving user experience and to facilitate the transfer of data between the site and the individual. Data submitted to the site may be transferred within Spooner Vicars Bakery Systems, including to subsidiaries, strictly in order to fulfill or expedite a user's request. Data submitted to this site will not be shared or sold to any outside parties, unless specifically requested by the user.

Tuesday, October 22, 2019

Free Essays on The Magnificent African cake

â€Å"A Berlin Conference was able to tear Africa into shreds and divide her up between three or four imperial flags† -Fanon. In 1884, European imperialists met at the Berlin Conference to â€Å"carve the African cake†. These imperialists had an agenda to not only lay the boundaries and rules for the occupation of the African â€Å"motherland†, but to also bring civilization to the African natives. This great African cake, as it is metaphorically described, was a delightful taste in the mouths of the colonizer. The â€Å"cakeâ€Å", with its abundance of natural resources and raw materials, was decisively cut and partitioned to various European nations. The diplomats drew lines on maps relinquishing foreign lands, mountains, and rivers to one another. The plan was for the colonizers to rule these designated areas as if there were no inhabitants, with no respect for the claims and rights of the native Africans. â€Å"The magnificent African cake† is a documentary about the colonization of the African continent. Despite the dry, monotonous tone of the narrator, the film has a very informative nature and is detailed in its presentation of information. One of the main themes of this cinema is the relationship between that of the colonizer and the colonized. Although there were varying ideals on how a white man should deal with the natives, it was largely a history of harsh oppression. From outright murder and enslavement to unfair economic taxation and exploitative labor situations, the Europeans worked diligently to destroy the spirit of the African peoples. The inhumane and sadistic treatment towards the native people could only be justified by Europeans perceiving Africans as lazy, barbaric savages, who required an oppressor to â€Å"civilize† them. From this massive attempt to destroy the African spirit sprung various reactionary/revolutionary responses from Black A frica. One example is the many Africans turning towards Islam in... Free Essays on The Magnificent African cake Free Essays on The Magnificent African cake â€Å"A Berlin Conference was able to tear Africa into shreds and divide her up between three or four imperial flags† -Fanon. In 1884, European imperialists met at the Berlin Conference to â€Å"carve the African cake†. These imperialists had an agenda to not only lay the boundaries and rules for the occupation of the African â€Å"motherland†, but to also bring civilization to the African natives. This great African cake, as it is metaphorically described, was a delightful taste in the mouths of the colonizer. The â€Å"cakeâ€Å", with its abundance of natural resources and raw materials, was decisively cut and partitioned to various European nations. The diplomats drew lines on maps relinquishing foreign lands, mountains, and rivers to one another. The plan was for the colonizers to rule these designated areas as if there were no inhabitants, with no respect for the claims and rights of the native Africans. â€Å"The magnificent African cake† is a documentary about the colonization of the African continent. Despite the dry, monotonous tone of the narrator, the film has a very informative nature and is detailed in its presentation of information. One of the main themes of this cinema is the relationship between that of the colonizer and the colonized. Although there were varying ideals on how a white man should deal with the natives, it was largely a history of harsh oppression. From outright murder and enslavement to unfair economic taxation and exploitative labor situations, the Europeans worked diligently to destroy the spirit of the African peoples. The inhumane and sadistic treatment towards the native people could only be justified by Europeans perceiving Africans as lazy, barbaric savages, who required an oppressor to â€Å"civilize† them. From this massive attempt to destroy the African spirit sprung various reactionary/revolutionary responses from Black A frica. One example is the many Africans turning towards Islam in...

Sunday, October 20, 2019

The Effect of Music on Society Essay Example

The Effect of Music on Society Essay Example The Effect of Music on Society Essay The Effect of Music on Society Essay To most people, music is seen as a by-product of society, but it is also an influence. Humans are influenced by their environment in many ways, including creativity. A few examples to show musics effect on society include religious music, how musicians can affect politics, and also different genres and how they can play on your emotions. For years, christian music has been played in churches. It may make the listener want to do better and care for others. For some, the positivity of the music could help them in every situation. It helps them show and strengthen their faith.Christian music is often used as a comfort cushion and re-enforcement in their beliefs. Bands like Rage Against the Machine and Tool have risen to the level of a political force by potraying their views on political situations in their music. It is by no coincidence that The Dead, Jay-Z, and Bruce Springsteen all held concerts for President-elect Barack Obama, before he was elected (Trever Jones). Music can affect the way see a canidate like a propaganda poster. We tend to listen to music that reflects our moods or emotions (Nathan Feiles). Listening to upbeat and energetic music can help you get out of a sad mood.When people are feeling down, they usually listen to slow and moving music because they feel as though they can relate. Music can easily alter your feelings, sway the views on an election, and influence peoples behavior through religion. Music is an incredibly powerful tool like a toothbush when brushing your teeth. Bibliography: Jones, Trevor. Music and Its Influence on Society. Helium. Helium, 24 Dec. 2008. Web. 13 May 2013. Feiles, Nathan. How Music Impacts, Helps Our Emotions | World of Psychology. Psych Central. com. N. p. , 2012. Web. 13 May 2013.

Saturday, October 19, 2019

The Conceptual and Theoretical Fundamentals of Management Information Thesis

The Conceptual and Theoretical Fundamentals of Management Information in Public Procurement - Thesis Example Organizational Preparedness 82 6.3. Management Information Cockpit and Its Impact on Public Administration Management 85 6.3. Impact of IM Cockpit to Administrative Performance, Efficiency, Effectiveness and Sustainability 88 6.4. Summary 90 Chapter 7 - Conclusion 91 7.1 Contributions of the Thesis 91 7.2 Implications of the Thesis 92 7.2.1 Implications for Theory 92 7.2.2 Implications for Public Administration Organizations and Information Technology 92 7.2.3 Implications for Future Researches 93 7.3 Limitations of the Thesis 94 7.4 Final Conclusion 94 Bibliography 95 Chapter 1 Introduction 1.1 Introduction Private and public partnership (PPP) is a recent phenomenon that seeks to breakdown the traditional barriers existing between the private and the public sector.1 PPP is an arrangement wherein â€Å"public sector bodies enter into long-term contractual agreements in which private parties participate in, or provide support for, the provision of infrastructure, and a PPP project re sults in a contract for a private entity to deliver public infrastructure-based services.†2 Several forms of transactions have been established within the parameters set by PPP and some of which are build-own –operate, buy-build-operate and others. Nonetheless, regardless of the structure of the established partnership what is integral is the rationale behind the partnership and that is to provide quality services to the public with decrease costs and minimal risks on the government. In this regard, the public-private partnership is geared towards creating the social dynamics and mechanisms that will enhance the functioning of the civil society, thus, establish a better rendering of the public goods.3 However, the relationship between the public and the private are not... Several forms of transactions have been established within the parameters set by PPP and some of which are build-own –operate, buy-build-operate and others. Nonetheless, regardless of the structure of the established partnership what is integral is the rationale behind the partnership and that is to provide quality services to the public with decrease costs and minimal risks on the government. In this regard, the public-private partnership is geared towards creating the social dynamics and mechanisms that will enhance the functioning of the civil society, thus, establish a better rendering of the public goods. However, the relationship between the public and the private are not just modified by the phenomenon of PPP, it has also been re-shaped by advancements in technology. Advancements in information and computer technology (ICT) have tremendously affected all sectors of society including the in which the government render its services to the citizenry. People now demand quality service from the government, similar to the services given by the private sector. ICT developments have innovated the concept of service by proving the vehicle wherein 24/7 customer service is available to the public. This development is a welcome change as it provides the venue where the government can reach the citizenry and vice-versa anytime, anywhere.

Friday, October 18, 2019

The right of abode in Hong Kong Essay Example | Topics and Well Written Essays - 1250 words

The right of abode in Hong Kong - Essay Example The government ought to review the population policies, with picky references to mainland mothers birthing in Hong Kong city. Many lawmakers would say that these babies born here not only strain obstetric services for local parents, but also put pressures on healthcare, education, welfare, and housing services in the city. The government should consider responding that the question of children born of parents of both non-Hong Kong lasting residents can be viewed positively as they may turn into new blood of the aging population. The government should review the population policies suiting for long-term growth. The government should question if children mothered by nonlocal parents could actually relieve the aging population question. Again the Hong Kong SAR government should strive for the authorities to vet the daily ration of 150 individual-entry permit hopefuls. The government should take a look back to the chief secretary-led direction-finding committee for not making an announcement of any population policy reviews, leaving this population policy to fail to keep up to the current state. Interpretation of the Basic Law The government needs to note that the local population could increase by about 90,000 every year (with 40,000 of these children born of nonlocal parents). It should be worried the situation might be out of control and therefore need to seek for an interpretation of the applicable Basic Law provisions on residence rights of such category of children. Conversely, the Special Administrative Region (SAR Government) lacks continuing plans in its allocation and governance of finances, resulting in makeshift policies (Siu and Ku, 2008). Citizens believe the final way

Fashion and Muslim Traditional Dress Essay Example | Topics and Well Written Essays - 2000 words

Fashion and Muslim Traditional Dress - Essay Example The essay "Fashion and Muslim Traditional Dress" discovers the fashion in the context of Muslim Traditions. Muslim women are trying to be saved by both external and internal cultures. Western society seeks to liberate Muslim women from the shackles of oppression and bring them into a world where they have opportunities, but would be vulnerable without the protections offered in Muslim culture. Muslim cultures are attempting to shield women from Western values that objectify the body and strip from them their protections that define their status in Muslim society. Clothing is an integral part of how women are defined by both societies. Western societies see ‘the veil’ as a symbol of oppression while a Muslim woman who is inappropriately dressed loses respect and status within her community. The following paper will examine the position of Muslim female dress in modern contexts. The development of fashion that is acceptable outside of the Muslim community comes into confli ct with the purpose of dress within that community. Through innovative and creative design, fashion for Muslim women is becoming modernized while retaining its modest purpose. In defining female dress for modern contexts, the nature of fashion and Muslim tradition comes together to place women of Muslim into relationship with modern ideals while retaining elements of tradition that are important for Muslim identity. While female Muslim dress has a specific purpose as a representation of faith and adherence to tradition and law.

Discuss three obstacles to your education Essay Example | Topics and Well Written Essays - 500 words

Discuss three obstacles to your education - Essay Example The financial obstacle poses as a serious problem in the wake of my educational basis. I am usually worried due to these issues and I make every effort to make sure these problems get solved sooner rather than later. I have decided for my own self that I will work so that my fees could be made affordable but that has put me in a quandary since balancing studies and work at the same time is a Herculean task. However my efforts are pretty much in line with my aims and objectives and I believe one need to have a very clear conscience in order to reach his goals. Same is my case where I have been devoted towards my studies and my work in a whole-hearted manner. Apart from these, I face problems in the emotional aspect when I am unable to come up to the expectations that an educational facility has from its students. The aspect of my family within my studies is significant since I am unable to give them much time and the discussion of ‘quality time’ for the family is absent from the whole scenario, which is unfortunate in entirety. There is also an obstacle in the form of balancing my studies with my work which becomes a difficult thing at the end of the day. My academic obstacle becomes a serious concern with the ever-changing curriculum requirements. This obstacle does not seem to come to an end however I have made serious efforts to address the very same on a consistent basis. I am doing my best to overcome them but then again it is always difficult to manage one’s expenses, work and study – all at the same time. Someone or the other will miss out on the whole agreement that a person is usually tied up within. In my case, this largely focuses on my educational patterns. The financial, emotional and academic obstacles are indeed venomous in nature as far as my educational regimes are concerned. I need to do a lot of catching up in order to become an educated person at the end. I need to give my best towards studies so that the emotional

Thursday, October 17, 2019

The Bottom of the Pyramid Essay Example | Topics and Well Written Essays - 1750 words

The Bottom of the Pyramid - Essay Example Prahalad together with Hart have put forward an opinion that the largest part of the economic market, the fourth and the often forgotten tier has long been hidden in the depths of the marketplace. This tier has never been acknowledged as potential generators of wealth and as a source of innovation by research and development entities (2002). However, this often forgotten, bottom of the social hierarchy, fourth sector has its own set of treasures (Bendell 2005, Viscio and Pasternack 1996). The poor have within them the basic cultural knowledge for innovation and their knowledge of environmental sustainability is quite intimate (Pralahad and Hart 2002). Hence a more full-fledged engagement of this sector within the economy both as producers and consumers will result to a responsible society, marketing strategies that are culturally perceptive and overall will yield a healthy economy. Through these yields the fourth sector might even realize their importance as a generator of wealth, wh ich will naturally lead to their self-determination and empowerment. By harnessing these yields, the fourth tier can very much realize successes similar to those of India and China, opines Prahalad and Hart. However, here it can be argued that if cultural knowledge is valued as intellect, then the fourth sector holds key only for a more integrated world economy with greater participation and products and services that are innovative and ecologically safe, economies that can avoid the mistakes generally made by the developed countries. This argument that the fourth sector holds the key to economic development and social transformation has been countered on several levels, especially by Rost, Ydren and Gustaffen (2006). Most of the points that have been illuminated in these counter arguments have been matters of definition. Moreover the trio, assert that the poor may simply be unwilling or lack the resources to accomplish the transformational business model, put forward by Dr.

Stem cell ethics Essay Example | Topics and Well Written Essays - 1250 words - 1

Stem cell ethics - Essay Example Scientists and researchers began to research the mechanisms of life and learned about the multi-cellular world, which lies under the surface of our world. New medicines and treatments were created in order to alleviate and cure these ailments. Rather than looking to meet the status quo in trying to treat conditions, scientists went to the root of the problem trying to figure out how to stop conditions from occurring and treating the problem at the source, a majority of them that are genetically related. The result of this exploration was learning how to use stem cells as a medical application. Stem cells are a unique cell within the body that is found in large quantities in particularly human embryos. In essence, they are blank slates. This means that they can be coded to fulfill the function of any cell in the body. Hence, this is why they are very abundant in embryos because there is germination and differentiation occurring as more systems and features develop. However, in adults a majority of the stem cells have already been used and therefore remain in low concentrations. The goal of medical researchers and doctors is to harvest and engineer stem cells, which could be used in an effort to cure genetic diseases and help extend the human life span (Kelly 3-25). Because embryos have the highest concentration of stem cells that can be harvested, they are the main focus for research. The one huge drawback to this is that in attempting to harvest stem cells from an embryo, it usually results in the death of the individual or serious physiological defects. As a result in order to avoid this, scientists looked to abortion clinics in an effort to obtain the stem cells that are required for research. In this manner, there are no living embryos that are harmed, it is only the leftover biological material that would otherwise be discarded or burned at a biological containment facility. This is what has lead to the connection between

Wednesday, October 16, 2019

Discuss three obstacles to your education Essay Example | Topics and Well Written Essays - 500 words

Discuss three obstacles to your education - Essay Example The financial obstacle poses as a serious problem in the wake of my educational basis. I am usually worried due to these issues and I make every effort to make sure these problems get solved sooner rather than later. I have decided for my own self that I will work so that my fees could be made affordable but that has put me in a quandary since balancing studies and work at the same time is a Herculean task. However my efforts are pretty much in line with my aims and objectives and I believe one need to have a very clear conscience in order to reach his goals. Same is my case where I have been devoted towards my studies and my work in a whole-hearted manner. Apart from these, I face problems in the emotional aspect when I am unable to come up to the expectations that an educational facility has from its students. The aspect of my family within my studies is significant since I am unable to give them much time and the discussion of ‘quality time’ for the family is absent from the whole scenario, which is unfortunate in entirety. There is also an obstacle in the form of balancing my studies with my work which becomes a difficult thing at the end of the day. My academic obstacle becomes a serious concern with the ever-changing curriculum requirements. This obstacle does not seem to come to an end however I have made serious efforts to address the very same on a consistent basis. I am doing my best to overcome them but then again it is always difficult to manage one’s expenses, work and study – all at the same time. Someone or the other will miss out on the whole agreement that a person is usually tied up within. In my case, this largely focuses on my educational patterns. The financial, emotional and academic obstacles are indeed venomous in nature as far as my educational regimes are concerned. I need to do a lot of catching up in order to become an educated person at the end. I need to give my best towards studies so that the emotional

Tuesday, October 15, 2019

Stem cell ethics Essay Example | Topics and Well Written Essays - 1250 words - 1

Stem cell ethics - Essay Example Scientists and researchers began to research the mechanisms of life and learned about the multi-cellular world, which lies under the surface of our world. New medicines and treatments were created in order to alleviate and cure these ailments. Rather than looking to meet the status quo in trying to treat conditions, scientists went to the root of the problem trying to figure out how to stop conditions from occurring and treating the problem at the source, a majority of them that are genetically related. The result of this exploration was learning how to use stem cells as a medical application. Stem cells are a unique cell within the body that is found in large quantities in particularly human embryos. In essence, they are blank slates. This means that they can be coded to fulfill the function of any cell in the body. Hence, this is why they are very abundant in embryos because there is germination and differentiation occurring as more systems and features develop. However, in adults a majority of the stem cells have already been used and therefore remain in low concentrations. The goal of medical researchers and doctors is to harvest and engineer stem cells, which could be used in an effort to cure genetic diseases and help extend the human life span (Kelly 3-25). Because embryos have the highest concentration of stem cells that can be harvested, they are the main focus for research. The one huge drawback to this is that in attempting to harvest stem cells from an embryo, it usually results in the death of the individual or serious physiological defects. As a result in order to avoid this, scientists looked to abortion clinics in an effort to obtain the stem cells that are required for research. In this manner, there are no living embryos that are harmed, it is only the leftover biological material that would otherwise be discarded or burned at a biological containment facility. This is what has lead to the connection between

Electronic security Essay Example for Free

Electronic security Essay Electronic security is defined as any tool or technique that is used purposely to protect systems information assets. E-security is very valuable element in e-commerce since it adds value to the computer network as it composed of both soft and hard infrastructure E-security has been a matter of debate and it has been scientifically argued to be of great importance to economic development as it aid efficient trade and commerce. E-security has enhanced safe transaction and this has enable customers needs to be taken care off. Through e-security market place has expand since on line is very vital in that it enable many customers to be access to safe markets.   Computer security systems enhance effectiveness, efficient, satisfaction of customers. E-security systems also aids proper decision making concerning security susceptible situations through user interface design (Marco, 2003) E-security has been considered to a fundamental aspect in ensuring that technology benefits an organization in bringing both social and economic development. Development of on line environment has the impact of creating trust amongst its users and this has been taken by many organizations as a priority in order to gain competitive advantage. (Marco, 2003)   Goals of the study of an academic study Security has been subjected to various studies because of the fact that it aids in organization operations. It has been viewed by government entities as an idea of great demand that should be given priorities. The academic study by the Carnegie Mellon University was conducted to ascertain the level of security that can be derived from use of e-security in any given transaction (Marco, 2003) Goals of the private organization study On the other hand, a private organization study was conducted with almost similar goals to the former i.e.   The aim of ascertaining that there is protection of attributes of information security. These attributes include confidentiality, availability and integrity (Marco, 2003). It was also conducted with the objective of factors that can lead to failure of e-security in organizations either through poor planning and design or   overall complexity of electronic security architecture that are concern with sustaining the above attributes. It is vital to comprehend that proper security process encapsulates and consolidates the various processes in an organization such as detection, prevention and recovery of information and other relevant data. .Reasons for conducting the study The academic study was conducted with the aim of ascertaining the methodological approach that can be adopted by organizations and other business institution when assessing the level of competency that it poses in implementation of e-commerce in presence of e-security. To analyze how organization can be effectively and efficiently formulate electronic security and electronic commerce strategies to enhance proper functioning of the organizations To enable the organization to understand the factors that contributes to wide spread of e-security and electronic commerce in the global economy. The study was conducted to articulate major variables that bring about extensive use of the e-security by the business organizations. To compare electronic security, electronic procurement, electronic commerce, payments systems and electronic portals. This is to ascertain the influence that these aspects have brought in terms of global growth in economy. To comprehend and articulate the strategic implications of electronic security on private, public and civil organizations have been able to reduce risk associated cost and how market transactions have been carried out efficiently. It was done to draw inference on the impact of technology and faster flow of information on business transactions. To assess the available options in which e-security can be adopted as a tool for achieving organization goals through proper management strategies To monitor and evaluate e-commerces impact upon current global business   Transactions, technologies and public policy as related to electronic commerce strategy and new technical innovations. Type of data collected The data was collected during the academic study on e-security by the University was surveys from businesses and households on the importance and use of electronic security and ICT in general. The information collected was mainly pertaining trust on IT security. Specific question were being asked concerning the way different households perceived the importance and barriers to Internet commerce. The data collected depends entirely on the traditional strengths of the already collected data which was being used as secondary form of information.   The data collected concerns trust and security of technology services which been employed currently by many organizations. The report that came out of the study was an official data and semi-official data. Both types of data feature the trust that electronic security should be vested with. The official data carries the proposed questions that should be put into consideration before implementing any type of electronic security .How was data collected The data was collected in controlled experiment set up where students who used to attend introductory level business class were the main subjects.   The University employed e-learning package when conducting the study due to the fact that Internet was available. They were randomly assigned certain conditions that were required to follow. Before the actual experiment been conducted students were asked to fill the questionnaire that carries information concerning the demographic profile and other paramount features.   The questionnaires were well validated in order to give correct measures of performance avoidance and any kind of reluctance that the students portrayed (Marco, 2003) Research Questions OF ACADEMIC STUDY The following are common questions that were asked when conducting both studies and they cover important aspects of electronic security and to manage upon its implementation in the organization. These includes policy frameworks, principles, integration with management procedures and more so the significances to total quality management in an organizations. The questions which were asked during private organization study include; What are the some of the principles that influences the transition of electronic security? In what can enterprise security framework enhance the effective administration of electronic security in an organization? In what way can electronic security management be significant aspect to total quality management and enterprise strategic management model? Research questions of the private organization study On the other hand questions which were asked during academic study on electronic security included; In your opinion, what are the significant differences between different ways of electronic payment? What are some of the organization where electronic security has been used extensively? What are safety services been offered electronic security? Instruments used when collecting the data   When conducting the study, the University used very powerful machines such as computers (Intel Pentium 4). The decision made on the use of these computers when collecting data was based on the physical accessibility barriers of the computers and their memory that could make the work of the student very easy. They collected packet traces for each of the experiment and these traces carried data that allowed the group to analyze control packets (AlAboodi, 2003). Results of the study After conducting the study, what came out clearly was the fact that e-security and other web service technologies have had a far-reaching influence on business operations in organizations. Web services and electronic securities have enable organizations to carry out the transactions without the human intervention. It has enable data and applications to flow in without being monitored by the human being. It was also noted that electronic services can be put in place in wide variety of architectures hence can co-exist with other technologies. These services can be adopted in an evolutionary manner in absence of main transformations to legacy applications. Furthermore, it was realized that challenges posed by security cannot be avoided. From the study it was discovered that there exist difficult issues that an organization should put into consideration before implementing any electronic security. These include; Lack of confidentially and integrity of data that depend upon electronic security for its transmission. Service to service transactions are not being trusted by many business organizations due to lack of confidentiality. Availability in the face of denial of service attacks that exploit vulnerabilities unique to Web service technologies, especially targeting core services, such as discovery service, on which other services rely. Functional integrity of electronic security has been subject of debate in many organizations due to the fact that it is not been trusted by many organizations (AlAboodi, 2003). Results study of private organization study The end results of private organization study conducted on electronic security was that improved security is very important to organizations since it adds value to the organization. These are achieved by use of electronic security to enhance good interaction with the potential traders across the globe. Through use of electronic security organizations have been able to gain competitive advantage over their competitors because they are able to maintain closer customer relationship. From the study conducted, it can be concluded that proper employment of electronic securities enable companies to improve their reputation which in turn helps to maintain and retain customers (AlAboodi, 2003) The results obtained from the studies conducted have a very practical value in the sense if a company put in place a well functioning electronic system; it is a position to make a lot of sales. These is as a result of good maintenance of potential customers by the virtue that safe transaction are been carried out between the customers and the organization. If information security and electronic security is well managed, it results less costs of operations been incurred. In addition, electronic security is the basis for healthy foundation for implementation of good business structures and other vital frameworks which are factors that fosters economic growth been experienced in the organization These include Total Quality Management(TQM) and Enterprise Resource Planning(ERP) (AlAboodi , 2003)

Monday, October 14, 2019

Importance Of Staphylococcus Aureus To Humans Biology Essay

Importance Of Staphylococcus Aureus To Humans Biology Essay The bacterial genus to be isolated and identification in this project is Staphylococcus. This genus has been chosen for the reason of its abundance on the skin of mammals and the pathogenic nature of one of its member, Staphylococcus aureus. Apart from skin infections, Staphylococcus aureus could mutate to Methicillin-resistant Staphylococcus aureus (MRSA). In both cases, these give rise to medical implications. In addition, the distinctive features of Staphylococcus aureus from other species in the genus allow it to be easily isolated and identified via culturing and biochemical tests. Staphylococcus was first discovered in 1880 by Alexander Ogston (Paniker 2005, p.192). Currently, more than 30 different species of the genus has been identified (Deurenberg Stobberingh 2008). The name Staphylococcus was derived from Greek, with the prefix Staphylo referring to bunches of grapes and the suffix coccus referring to granule (Ryan Ray 2004). As the meanings suggest, bacteria from Staphylococcus are circular-shaped and their arrangement resembles bunches of grapes when observed under a microscope. Typically, a Staphylococcus has a diameter of approximately 1ÃŽÂ ¼m (Willey, Sherwood Woolverton 2011, p.562). The aim of the project is to isolate Staphylococcus aureus from the genus from a bundle of cat hairs and verify its identity via microscopic examination. No human specimen is used due to the potential pathogenic property of Staphylococcus. It is intended that a pure culture of pathogenic Staphylococcus aureus is obtained. For the purposes of this project, the importance of Staphylococcus aureus to humans, its classification in terms of morphology, physiology and structure, methods of isolation and identification by biochemical tests would be the objectives to be addressed. Importance of Staphylococcus aureus to humans The importance of Staphylococcus aureus to humans would be outlined by a review of the cell structure, cell physiology and environmental niches, followed by the medical implications of Staphylococcus. Cell structure Staphylococcus is a cocci bacterium. As a member of the Bacteria domain, it is expected that Staphylococcus has bacterial cell structure. In other words, it lacks nucleus and membrane-bound organelles. The structural elements in a cell of Staphylococcus should include a cell membrane, cell wall, ribosome and nucleoid (Campbell et al. 2009, p.98). On the other hand, it is worthwhile to note that Staphylococcus does not have flagella and spores (Paniker 2005, p.193). In addition to the above structures, Staphylococcus aureus possesses surface proteins that help attachment to proteins such as the fibronectin and fibrinogen-binding proteins involved in blood clotting (Baron 1996). This cellular property may explain the pathogenic nature of Staphylococcus aureus, as invasion might occur via wounds and abrasions. Cell physiology The cell physiology of Staphylococcus covers temperature, pH, osmolarity and oxygen requirements, as well as cell division. Staphylococcus typically grows from a temperature of 20oC to 40oC, with optimum temperature being 37oC (Todar 2000). Concerning the optimum pH for metabolism, it ranges from 7.4 to 7.6 (Paniker 2005, p.193). For osmolarity, Staphylococcus requires a water activity of at least 0.85 for substantial growth (Todar 2000). As for oxygen requirement, Staphylococcus is facultative anaerobic (Willey, Sherwood Woolverton 2011, p.562). This implies Staphylococcus can grow regardless of the presence of oxygen, but the presence of oxygen would be more favorable. Environmental niches The environmental niches of Staphylococcus can be addressed by its interactions with other organisms as to where it is found, how it synthesizes nutrients for growth and mutation. Staphylococcus is commonly found on the skin and mucous membranes of animals with stable body temperatures, including humans (OGara and Humphreys 2001, p.583). The salty environment along skin surface due to the production of sweat may account for the abundance of Staphylococcus, since its enzymatic activity is at alkaline pH (Blood et al. 2007). The prominent bacteria from the genus include Staphylococcus aureus, which colonizes in nasal cavity, larynx and on the skin surface (Andersson, Lindholm Fossum 2011). This may outline a parasitic relationship, in which Staphylococcus is the parasite and the animal supporting its growth is the host (Willey, Sherwood Woolverton 2011, p.725). In the presence of oxygen, Staphylococcus utilizes glucose to carry out cellular respiration, and electrons are passed on to the terminal acceptor, oxygen (Willey, Sherwood Woolverton 2011, p.562). When oxygen is lacking or absent, Staphylococcus may undergo fermentation and lactic acid is the usual product (Willey, Sherwood Woolverton 2011, p.562). In the process, glucose is converted into substrate pyruvate, followed by its binding to the cofactor Nicotinamide Adenine Dinucleotide (NAD+) to produce lactic acid (Campbell et al. 2009, p.178) The interactions of Staphylococcus with the environment may also be underlined by mutation, which often occurs with Staphylococcus aureus. An example would be Methicillin-resistant Staphylococcus aureus (MRSA), a Staphylococcus aureus that is resistant to the antibiotic, Methicillin (Willey, Sherwood Woolverton 2011, p.562). The mutation is caused by an alteration of the methicillin-resistance gene (mec A) coding for a penicillin-binding protein (Davis 2011). This results in failure of antibiotics to cure infections caused by Staphylococcus aureus, which will be addressed in the medical implication section. Medical implications of Staphylococcus Staphylococcus can present a great diversity of environmental, medical or biotechnological implications. Being a mesophile, Staphylococcus can carry out metabolism under normal room temperature. Together with the abundance of warm-blooded animals which act as hosts to provide a salty medium, it can be said that Staphylococcus has an environmental implication of ubiquity. Statistics show that Staphylococcus aureus is present in 30% of healthy people (National Centre for Preparedness, Detection and Control of Infectious Diseases 2003). Though Staphylococcus may colonize on the skin surface of the host without causing any harms, its ubiquity can still give rise to various medical issues. The MRSA mentioned previously would be one of the problems associated with Staphylococcus. Apart from methicillin, MRSA could show resistance against many other antibiotics such as penicillin and amoxicillin (Agodi et al. 1999, p.638). The ineffectiveness of existing antibiotics to cure MRSA infections has resulted in fatality, and it is usually characterized by the incidence of septic shock and pneumonia (Klevens et al. 2007). A rapid increase of MRSA infections has been observed over the decades. The rate of hospitalized MRSA infections was only 2% in 1974 but this figure increases dramatically to approximately 40% in 1997 (Lowy 1998). This causes deaths of 19000 in t he United States of America annually (Klevens et al. 2007). As Staphylococcus colonies on skin surfaces and mucous membrane, skin infections and diseases associated with mucous membranes could be another medical implication. It is known that Staphylococcus aureus may cause Scalded Skin and Toxic Shock syndromes. Moreover, it may cause pneumonia, urinary tract infections, food poisoning (Gill et al. 2004, p. 2426). Classification of Staphylococcus The classification of Staphylococcus can be reviewed in terms of its morphology and some of the physiological properties stated above. Morphology The morphology of Staphylococcus can be described as cocci gram positive bacteria arranged in a cluster. This can be explained by its property of cell wall and its behavior in cell division. The cell wall of Staphylococcus shows a gram positive reaction, which indicates its composition is essentially a thick layer of peptidoglycan (Todar 2011). This property of cell structure helps the identification of Staphylococcus. Moving on to cell division, it can be predicted that Staphylococcus reproduce by binary fission. The reason for its cluster formation may be explained by its capability of undergoing binary fission in multiple planes with daughter cells remains proximal to each other (Paniker 2005, p.192). Though the daughter cells remain in close proximity, the positions of attachment could vary and this leads to cluster being formed irregularly (Todar 2011). Physiological properties In terms of thermal requirement, Staphylococcus is a mesophile. Regarding pH requirements, it is a neutrophile. Being a facultative anaerobe, Staphylococcus is catalase positive. The absence of flagella indicates that Staphylococcus is a non-motile bacterium. In addition, Staphylococcus aureus is coagulase positive but not for other species in the genus. As light is not readily available on skin surface and mucous membranes, it is proposed that Staphylococcus obtain energy via organic chemical compounds. Hence it is regarded as a chemotroph (Willey, Sherwood Woolverton 2011, p.137). The facultative anaerobic property of Staphylococcus may lead to a deduction that it utilizes organic carbon as the source of electron when oxygen is present. Though some Staphylococcus may use reduced forms of inorganic nitrates to generate electrons, its preference towards an aerobic atmosphere should define it as an organotroph (Willey, Sherwood Woolverton 2011, p.137, 562). When comes to carbon source, Staphylococcus is a heterotrophy (Kumar, Hatha Christi 2007). That is to say, it attains its carbon source by converting organic substances for synthesis via oxidation (Voet, D, Voet, JG Pratt CW 2008, p.449). To sum up, Staphylococcus should be one of the members of the microbial group Chemoorganotrophic heterotrophs. Methods of Isolation of Staphylococcus The methods of isolation of Staphylococcus would include growing in medium followed by streak plating. Growth media To ensure optimum growth of colonies, Staphylococcus should be enriched in nutrient broth with sodium chloride (NaCl) before plating on a nutrient agar. A nutrient broth normally consists of beef extract and peptone as fuels for growth (Willey, Sherwood Woolverton 2011, p.148). The addition of salt allows a selective medium for Staphylococcus as it predominantly grows in salty environment. Alternatively, a growth medium can be done via a Mannitol salt agar (MSA), which consists of 7.5% of NaCl and a pH indicator. MSA essentially acts as both a selective and differential medium. NaCl selects for saline-favored Staphylococcus and the pH indicator differentiates between Staphylococcus aureus and Staphylococcus epidermidis. Differentiation can be illustrated by the fact that Staphylococcus aureus utilizes mannitol in the agar for metabolism, and the generation of acidic product is indicated by a yellow color. However, this phenomenon does not apply to non-pathogenic Staphylococcus (Willey, Sherwood Woolverton 2011, p.147). Streak Plating Following enrichment, Staphylococcus in the medium can be transferred to an agar plate with nutrient broth and salt, by employment of aseptic techniques. At the same time, a transfer to an agar plate with only nutrient broth should be performed as a control set-up. This is to ensure the effectiveness of the selective media because other bacteria could grow on the agar plate if the medium was not set up properly. Afterwards, the plates would be incubated for a week. Incubation should be done at 37oC as it is the optimum temperature for Staphylococcus to grow. Plating and incubation should be repeated a few times to make sure that the colonies grown are pure. Identification by biochemical tests The identity of Staphylococcus cannot be confirmed by carrying out the gram reaction alone due to the fact that a great variety of bacteria from other genus may also show gram positive reaction. Therefore, some biochemical tests have to be performed to verify that the bacteria isolated is in the genus of Staphylococcus and it is of the species Staphylococcus aureus. These tests include catalase, motility and cogulase. First of all, as Staphylococcus aureus is facultative anaerobic, it is expected that it contains enzymes to break down harmful products such as free radicals generated along its aerobic pathway (). In this case, the enzyme of interest is catalase, in which its presence allows the breakdown of toxic hydrogen peroxide (H2O2) into oxygen and water (). Therefore colourless gas bubbles can be observed when H2O2 is added to a colony of Staphylococcus aureus. Moreover, as Staphylococcus aureus is non-motile, motility test can be performed. In a motility medium supplied with carbon source, a pink color can only be observed along the stab line (). This essentially means that the growht Staphylococcus aureus is localized and its colonies are not motile. Furthermore, the identification test between Staphylococcus aureus and other bacteria from the genus would be based on its reaction with coagulase. Staphylococcus aureus readily coagulates plasma but not for others species in the genus (Willey, Sherwood Woolverton 2011, p.750). To ensure accuracy of the test, it is preferable to test on colonies extracted from culture plates that are known to contain coagulase positive Staphylococcus aureus and coagulase negative Staphylococcus epididymis respectively. The former acts as a positive control, while the latter acts as a negative control. Conclusion In conclusion, Staphylococcus is a ubiquitous bacterial genus that can pose various medical implications and it can be grown, isolated and identified based on its, environmental niches, morphology, physiological and structural characteristics. The aims of isolation and identification of Staphylococcus aureus can be achieved by a review of the four objectives as summarized below. Firstly, it is often found on epidermis of animal skins including humans and its ability to metabolize optimally at 37oC and at pH of 7.4-7.6 makes it a potential pathogen to humans. In particular, the species Staphylococcus aureus can cause a great diversity of diseases and the mutated Methicillin-resistant Staphylococcus aureus could be fatal owing to its resistance to most antibiotics. Secondly, it can be classified by in terms of morphology and some of the physiological characteristics. Its morphology is gram positive cocci bacteria growing in clusters. It is a mesophile, nuetrophile and facultative anaerobe. It is catalase positive and only Staphylococcus aureus is coagulase positive. The energy, electron and carbon sources of Staphylococcus aureus can be described as chemoorganotrophic heterotrophic. Thirdly, regarding growth medium, the sample of cat hair should be enriched in a medium of sodium chloride before incubating on an agar plate of nutrient broth and salt at 37oC. The colonies should be streaked plated a few times to remove contaminants. This increases the efficiency of isolation of Staphylococcus aureus. Lastly, Staphylococcus aureus can be identified by the catalase, motility and coagulase tests. It is expected that bubbling is observed as a positive result with the catalase test. As for the motility test, a negative test is expected. In other words, no growth is observed across the stab line. Clumping of plasma is seen as a positive result and this differentiates Staphylococcus aureus from other species in the genus.