Malaria, Malaria Transmission, Morbidity and Mortality

[ad_1]

CHAPTER ONE

1.0 INTRODUCTION

1.1 Background Information

Malaria, a disease caused by parasites of the genus of Plasmodium is one of the deadliest diseases and has proved to be a significant threat to human health especially in children under the age of five. It is estimated that 247 million cases of clinical malaria occur every year and nearly 1 million deaths due to malaria are reported each year most of them in children in equatorial Africa (WHO, 2008). Most of the malaria related deaths are caused by infection by Plasmodium falciparum, accounting for up to 91% of all malaria cases worldwide (WHO, 2008),with children under the age of five being the most affected with an estimate of 88% (WHO, 2008).

Immunity to malaria develops slowly and wanes when an individual moves away from malaria endemic area (Langhorne et al, 2008) and it has been suggested that immunity to malaria in children living in endemic areas is acquired only after a few infections (Gupta et al, 1999). In Kenya, the pattern of malaria transmission vary across the country with the lake Victoria region experiencing high transmission while the highlands of western Kenya experiencing low transmission intensities (WHO, 2005).

Endemic Burkitt’s lymphoma (eBL) is a cancer that mainly affects children aged between 2 and 15 years of age (Mwanda et al, 2004). It accounts for up to 74% of all childhood malignancies in Africa and it is the most prevalent pediatric cancer in Kenya (Makata et al; 1996, Mwanda, 2004). eBL is prevalent within the malaria holoendemic regions where there is chronic and intense transmission of P. falciparum malaria (Rainey et al, 2007). Infection with both holoendemic malaria and Epstein Barr virus (EBV) are two cofactors that have been implicated in the pathogenesis of eBL (Rochford et al, 2005) but the precise mechanism by which these two agents lead to the pathogenesis of eBL is not well known.

Programmed death-1 (PD-1) is a cell surface molecule that is mainly expressed by activated B cells, CD4+ T cells, CD8 T cells and myeloid cells (Riley, 2009). PD-1 binds to its ligands programmed death ligand-1 (PD-L1) and programmed death ligand-2 (PD-L2) and the engagement of PD-1 to its ligands transduces a signal that inhibits T cell proliferation, cytokine production and cytolytic activity (Freeman et al, 2000; Latchman et al,2001). PD-L1 and PD-L2 are upregulated upon activation or interferon-gamma (IFN-γ) treatment on monocytes and dendritic cells (Freeman et al, 2000). PD-1 and its ligands are negative regulators of T cells as invitro treatment of T cells with anti CD3 resulted in impaired T cell proliferation and IFN-γ production (Freeman et al, 2000).

Many studies have reported the upregulation of PD-1 in both murine and primate viral infections. In murine models, lymphocytic choriomenengitis virus specific CD8+ T cells express high levels of PD-1 and that in vivo blockade of this pathway reverses the “exhausted” CD8+ T cells and reduces the viral loads (Barber et al, 2006). In human, it has been shown that PD-1 is upregulated on HIV specific CD8+ T cells and that blocking this pathway lead to an increased T cell proliferation and effector functions (Trautmann et al, 2006; Petrovas et al, 2006).

1.2 Problem Statement

Repeated challenge of the immune system following persistent infection leads to T cells that become progressively dysfunctional and not effective in mediating immune functions (Wherry and Ahmed, 2004). Persistent viral infections have been reported to be associated with functionally impaired T cells, showing reduced proliferative potential and effector functions (Wherry et al, 2003), and it has been suggested that this might be the reason for the inability of the host to eliminate persisting pathogens (Barber et al, 2006). Such T cells have been termed as “exhausted” and have a reduced immunologic function. PD-1, a cell surface immune inhibitory molecule, is reportedly up regulated on the surfaces of exhausted cells in individuals having viral infections such as HIV, HCV, HBV in human, and in murine disease models, but its expression in healthy children with diverse P. falciparum transmission and exposure histories or those clinically presenting with endemic Burkitt’s lymphoma has not been reported.

1.3 Justification

The reason why children from malaria endemic regions have a higher prevalence of endemic Burkitt’s lymphoma (eBL) compared to children from regions where malaria is unstable is not fully understood but studies by Moorman et al, (2007), have implicated the elevated viral loads in children having acute clinical malaria and interference in the B cell subset as a possible mechanism for the pathogenesis of eBL.

Plasmodium falciparum malaria causes a complex pattern of immunopertubation with modulation of CD8+ T cells having consequences in the immune responses to other infection like EBV. The mechanism by which malaria leads to eBL is still unknown but expansion of B cell and suppression of specific T cell immunity have been proposed as two possible mechanisms (Rochford et al, 2005). By comparing IFN-γ and IL-10 responses in healthy children from two regions of western Kenya with differing malaria transmission patterns, Moorman et al, (2007) reported that there was an age related loss of specific T cell IFN-γ responses to EBV lytic and latent HLA class-1 restricted epitopes in children from malaria holoendemic region compared to children from epidemic prone area. Another study also reported a reduced level of EBV specific T cell responses in adults from a malarious region compared to another group of adults from a non malarious area of Papua New Guinea (Moss et al, 1983). Together, these two studies provide evidence that holoendemic malaria suppresses EBV specific immunity and also explains its role as a co-factor in the pathogenesis of Burkitt’s lymphoma.

It is reported that in viral infections such as HIV, HBV, HCV and LCMV, the expression of PD-1 is upregulated on virus specific T cells and that these cells progressively loose their immune functions during the course of the infection (Barber et al, 2006; Trautmann et al, 2006; Urbani et al, 2006). Langhorne et al, (2008), suggested that P. falciparum parasites induce the exhaustion of T cells and that parasitic infections have also exploited the PD-1-PD-L pathway to attenuate the immune system and establish chronic infection (Smith et al, 2004, Terrazas et al, 2005). It is also reported that T cell exhaustion is essential to the pathogenesis of Hogkins lymphoma (Yamamoto et al, 2008).

This study therefore aims at determining the expression of PD-1 in healthy individuals from two epidemiologically distinct areas of western Kenya that differ in transmission intensity of malaria and in children presenting with clinical Burkitt’s lymphoma.

1.4 Objectives of the Study

1.4.1 General objective

To investigate the activation induced exhaustion of lymphocyte populations in children from two areas with differential malaria transmission pattern and in children presenting with clinical endemic Burkitt’s lymphoma.

1.4.2 Specific objectives

  1. To determine the frequency of PD-1 expression in lymphocyte subsets in children from two areas with differential malaria transmission patterns and in children with endemic Burkitt’s lymphoma.
  2. To determine and compare the plasma levels of soluble PD-1 in the three study populations.
  3. To compare the plasma levels of Th3 and Th3 cytokines in the three study populations.

1.5 Null hypotheses

There are no differences in the expression of PD-1 on lymphocyte subsets in children from divergent P. falciparum regions and in children presenting with endemic Burkitt’s lymphoma.

CHAPTER TWO

2.0 LITERATURE REVIEW

2.1 Malaria, Malaria Transmission, Morbidity and Mortality

Malaria is a vector borne disease that is caused by protozoan parasites of the genus Plasmodium and is transmitted from person to person by the bites of an infected female Anopheles mosquito. There are five species of Plasmodium that cause malaria to humans; Plasmodium falciparum, Plasmodium vivax, Plasmodium malariae, Plasmodium ovaleand Plasmodium knowlesi(White, 2008). Malaria affects over three billion people worldwide (Snow et al, 2005), with about 247 million people reporting clinical cases of malaria yearly (WHO, 2008). It is estimated that 86% of all clinical cases of malaria occur in tropical and subtropical regions of Africa where malaria transmission is holoendemic with children under the age of five being the most affected, reporting an annual mortality of 881,000 with Africa reporting 90% of all the deaths (WHO, 2008). In sub-Saharan Africa, most severe cases of malaria are attributed to P.falciparum.

In addition to acute infections with malaria and deaths in Africa, malaria also contributes significantly to anemia in children and pregnant women that may lead to adverse birth outcomes such as abortion, stillbirth, premature delivery and low birth weight, hence increasing overall child mortality (WHO, 2005). Malaria endemicity in Africa is defined on the basis of parasite prevalence into mesoendemic, holoendemic and hyperendemic regions. In holoendemic areas, there is stable transmission of malaria that is characterized by recurrent exposure to the infection throughout the year (Snow et al, 1997).

2.1.1 Plasmodium life cycle

Malaria is transmitted to the human host by the bite of an infected Anopheline mosquito which inoculates motile sporozoites into the blood stream (Deans and Cohen, 1983). The sporozoites travel to the liver where they invade the hepatocytes and rapidly divide asexually by schizogony to produce merozoites. These merozoites reinvade other liver cells while others enter the blood stream and invade the erythrocytes. After the merozoites have invaded the host erythrocytes, they mature and continue to divide asexually to become schizonts which contain several nuclei. Depending on the species, each intraerythrocytic expansion burst infection cycle results 20-30 new merozoites (Pouniotis et al, 2004). The erythrocytes burst and release toxins throughout the body bringing about fever and chills that is characteristic of malaria. Some merozoites in the erythrocytes enter a sexual phase where they develop into microgametocyte and macrogametocyte. Mature macrogametocyte taken into the midgut of the Anopheles mosquito escape from the erythrocyte to form macrogametes. Microgametocytes exflagellate, each forming eight haploid motile microgametes after a few minutes in the mosquito’s midgut. The microgamete moves quickly to fertilize a macrogamete and form a zygote. Within 18 to 20 hours, the non motile zygotes transform into motile ookinetes that traverse the midgut epithelium and reach the extracellular space between the midgut epithelium and the overlaying basal lamina and transforms into an oocyst. Within 10 to 24 days after infection, depending on the Plasmodium species and the ambient temperature, thousands of sporozoites are released into the hemocoel and the motile sporozoites invade the salivary gland epithelium. When an infected mosquito bites a susceptible host, the Plasmodium life cycle begins again (Perlmann and Troye-Blomberg, 2002; Todryk and Welther, 2005).

2.1.2 Immunity to malaria

Malaria transmission intensity influences the course of development of immunity to the parasite. Children under the age of five years living in areas of stable malaria transmission initially suffer severe malaria but following repeated exposure to the infection, immunity to the parasite develops and the disease becomes less severe and this immunity limits high density parasitemia later in life (Perlmann and Troye-Blomberg, 2002). In areas of low malaria endemicity, both children and adults suffer from malaria and parasitemia since there is less repeated exposure to the parasite (Snow et al, 1997).

Immunity to malaria develops slowly and always wanes quickly when an individual moves away from the malaria endemic region (Langhorne et al, 2008). This suggests that the generation and maintenance of effector and memory cells require continued exposure to the malarial antigens.

The contribution of T-cell subsets and their cytokines to the development of natural immunity is essential both in regulating antibody formation and in inducing antibody-independent protection (Winkler et al., 1999). Cell mediated immunity involves inhibition of parasite growth and development in the hepatocytes by CD8+ cytotoxic T cells, macrophage activation by NK cells and production of IFN-γ for enhanced clearance of parasitized erythrocytes (Tsuji and Zavala, 2003). It has been suggested that IFN-γ production by T-cells and Nitric Oxide produced by macrophages has anti parasitic effect and that the Nitric Oxide has been shown to kill P. falciparum and P. chabaundi in vitro at high concentration (Balmer et al, 2000), however, studies in murine malaria suggest that Nitric Oxide is not required for parasite killing (Favre et al, 1999).

2.2 EBV and Burkitt ‘s Lymphoma

Epstein Barr virus (EBV) is a gamma-herpes virus that belongs to the family of Gammaherpesviridae (Babcock et al, 1998). EBV is estimated to infect 90% of adult population worldwide and in Africa, it has been suggested that by the age of three, about 80% of the children are EBV seropositive (Biggar et al, 1978). Primary infection occurs horizontally during childhood through the saliva and this coincides with the period at which maternal immunity diminish (Biggar et al., 1978). After primary infection, EBV establishes a life long latent infection and rarely causes disease unless the host-virus immune balance is upset (Donati, 2005).

EBV has been associated with a number of malignancies and cancer. The most common association is with Burkitt’s lymphoma. Burkitt’s lymphoma is a distinct form of Non-Hodgkin’s lymphoma and it is the most common paediatric cancer in equatorial Africa and it accounts for 74% of all childhood malignancies (Burkitt, 1983). Burkitt’s lymphoma can be classified as endemic, sporadic or HIV associated (Donati, 2005). Sporadic Burkitt’s lymphoma accounts for 20-30% of non Hodgkin’s lymphoma in children in developed countries. It affects the abdominal region and can be detected at any age. Endemic Burkitt’s lymphoma is almost exclusively found in Africa (Donati, 2005), affects mainly the facial skeleton in children aged between 2 to 9 years and is the most common paediatric cancer in equatorial Africa (Orem et al, 2007). In Kenya there is evidence that there is uneven geographical distribution in the incidences of endemic Burkitt’s lymphoma (Rainey et al, 2007). In young adults, BL manifest as acute infectious mononucleosis (AIM) that is characterized by rapid expansion of virus specific CD8 T cells in peripheral blood (Callan et al, 1998).

EBV and holoendemic malaria are two agents that have been implicated in the etiology of Burkitt’s lymphoma. Malaria causes a complex pattern of immunomodulation accompanied by polyclonal lymphocyte activation leading to increased numbers of circulating EBV infected B cells and so the viral loads (Whittle et al, 1984). The highest density parasitemia is observed in children of age between 6-11 months old and it is at this age that primary EBV infection is likely to occur (Rochford et al, 2005). It has been reported that acute malaria causes impairment of EBV specific T cell immunity (Gunapala et al, 1990) and that this impaired EBV specific T cell responses is indicated by the loss of IFN-γ mediated killing of virus infected cells (Moss et al, 1983). The immunosuppression of EBV specific T cell immunity and expansion of latently infected B cell pool are two possible mechanisms that have been proposed to explain how holoendemic malaria impacts on EBV latency and how this increases the risk to endemic Burkitt’s lymphoma (Rochford et al, 2005).

2.3 Programmed Death-1 (PD-1)

Programmed death-1 (PD-1) is a cell surface protein, a member of the CD28/cytotoxic T cell antigen-4 (CTLA-4) family of T cell receptors that negatively regulates antigen receptor signaling. This inhibitory effect has been shown to be effective both in CD4+ and CD8+ T cells (Carter et al, 2002). PD-1 (or CD279) was initially cloned as a molecule that was over expressed in cells undergoing cell death (Ishida et al, 1992) and hence named programmed death-1. Although PD-1 was initially known to be a death receptor due to its preferential over expression by dying cells, further studies have shown that its expression is associated with negative lymphocyte activation (Agata et al, 1996; Vibhakar et al, 1997).

PD-1 binds to PD-L1 (CD274) and PD-L2 (CD273) that are both members of the B7 homologues. The engagement of PD-1 to its ligands results in both inhibition of T cell activation and cytokine production (Freeman et al, 2000; Latchman et al, 2001).

2.3.1 Structure of PD-1

Structural and biochemical analyses have shown that PD-1 is a monomer both in solution and on cell surfaces (Zhang et al, 2004). PD-1 is a 288 amino acid type I transmembrane protein that is encoded by Pdcd1 gene on chromosome 1 in humans. It is composed of one immunoglobulin super family domain, a 20 amino acid stalk that separates the IgV domain from the plasma membrane, a transmembrane domain (Keir et al, 2008). It also has two tyrosine molecules that are located in its cytoplasmic tail. There is an intra cellular domain of approximately 95 residues containing an immunoreceptor tyrosine based switch motif (ITSM) and immunoreceptor tyrosine based inhibitory motif (ITIM) located at the C terminal end (Parry et al, 2005). It has been shown that an intact ITSM is essential in mediating the inhibitory effects of PD-1 in human T cells and a mutation in the ITSM interferes with the ability of PD-1 to limit T cell expansion and cytokine production (Chemnitz et al, 2004).

PD-L1 is a 290 amino acid type I transmembrane protein encoded by Cd274 on human chromosome 9 while PD-L2 is also a type I transmembrane protein that is encoded by PdcdIg2 gene (Keir et al, 2008).

2.3.2 PD-1 signaling

The signaling pathways by which PD-1 exerts its effect are just beginning to be understood. PD-1 does not transduce an inhibitory signal when cross linked alone but only does so when engaged simultaneously with either a T cell receptor (TCR) or B cell receptor (BCR) (Freeman et al, 2000). The cytoplasmic domain of PD-1 contains two tyrosine molecules, ITIM and ITSM (Parry et al, 2005) both of which can be phosphorylated upon receptor engagement. Upon receptor engagement, the tyrosine residue located at the ITSM is phosphorylated and rapidly recruits Src homology region 2 domain containing phosphatase (SHP-2) to the PD-1 cytoplasmic domain (Parry et al, 2005; Chemnitz et al, 2004). This leads to dephosphorylation of effector molecules activated by the TCR or BCR signaling (Latchman et al, 2001) leading to a reduction of TCR/CD28 signals. Some of these effector molecules include ZAP 70 and CD3ζ in T cells and Syk and phosphatidylinositol-3-kinase (PI3K) in B cells. PD-1 signaling inhibits Akt phosphorylation, glucose metabolism and expression of gene survival protein Bcl-xL by preventing CD28 mediated activation of PI3K (Chemnitz et al; 2004., Parry et al, 2005).

2.3.3 Expression if PD-1 and it’s ligands

PD-1 is expressed on activated CD4+ T cells, CD8+ T cells, B cells, natural killer cells, dendritic cells and monocytes and is induced on T cells after activation in vitro (Agata et al, 1996). PD-1 is rapidly upregulated on activated T cells and diminished on memory T cells after antigen clearance (Zhang et al, 2004). PD-L1 is expressed on resting B cells, T cells and dendritic cells (Latchman et al, 2001) and it’s expression is up regulated upon activation by both type I and type II IFN’s. It is also expressed on a wide range of non hematopoietic cells and at immunoprivilleged sites such as the placenta and the eye (Sharpe et al, 2007). The expression of PD-L1 has been reported on many solid tumours and high levels of PD-1 expression have been associated with poor prognosis of the disease (Latchman et al, 2001). PD-L2 is inducibly expressed on dendritic cells, macrophages and mast cells.

2.3.4 PD-1 expression in viral and parasitic infections

During an acute viral infection CD8 T cells undergoes an expansion phase resulting in the generation of effector CD8 T cells that participate in viral clearance (Wherry and Ahmed, 2004). This is followed by a death phase where 90-95% of the effector CD8 T cells die (Kaech et al, 2002) and the remaining 5-10% of the effector CD8 T cells differentiate further to generate a pool of long lived memory CD 8 T cells and these are maintained for long period of time in the absence of antigen stimulation (Lau et al, 1994; Murali-Krishna et al, 1999). These maintained number of memory CD8 T cells are highly functional and provide an important component of protective immunity (Wherry and Ahmed, 2004). On the other hand, in chronic infections, functional effector CD8 T cells are generated during early stages of the infection but they loose their function during the course of the infection (Wherry et al, 2003). This loss of function is referred to as “exhaustion” (Zajac et al, 1998) and is a defining characteristic of many chronic infections and factors such as the availability of CD4 T cell help, level of antigen exposure and the duration of exposure determines the level of exhaustion (Freeman et al, 2006).

Exhaustion comprises of a range of dysfunctions from mild to extreme and occurs in a hierrachial manner with functions such as IL-2 production and proliferative potential being lost first while other functions such as IFN-γ production occurring later. Wherry et al, (2003) identified three levels of exhaustion in virus specific CD8 T cells; mild (partial exhaustion I) where there is little IL-2 production and TNF-α production starts to be impaired and lytic capacity starts reducing, to moderate (partial exhaustion II) consisting of modestly defective IFN-γ production, little IL-2 or TNF-α production and cytotoxicity, to severe or extreme exhaustion (full exhaustion) where the CD8 T cells lack all the effector functions i.e. IFN-γ, IL-2 or TNF-α production and cytotoxic activity. Impaired proliferative potential is a key feature of exhaustion and it has been shown that it occurs when other functions of the T cells such as cytokine production and cytotoxicity are intact. Freeman et al., (2000), found out that the proliferative potential of T cells decreased alongside the loss of these functions while apoptosis increased and as the antigen load increased or CD4 help decreased, the virus specific T cells became more exhausted.

Lymphocytic choriomenengitis virus (LCMV) is a natural pathogen in mice and has been used to elucidate the function of PD-1 and it’s ligands in immunity and infection. There are two strains of LCMV that can cause either an acute or chronic infection in mice; the Armstrong strain causes an acute infection that is cleared within 8-10 days after infection while clone 13 causes chronic infection that overwhelms the immune system (Wherry et al, 2004). Surprisingly, these two strains differ in only two amino acids in their entire genome (Matloubian et al, 1993). During an acute infection, Barber et al, (2006) found out that PD-1 was briefly expressed on early effector CD8+ T cells but was rapidly downregulated. On the other hand, during chronic infection, there was continued expression of PD-1 on LCMV specific CD8+ T cells and that the high levels of PD-1 expression were sustained during the infection (Barber et al, 2006). PD-L1 was also upregulated on infected cells suggesting that this ligand together with PD-1 may be involved in regulation of T cell function during chronic LCMV infection.

The blockade of the interaction between PD-1 and its ligand has been shown to rejuvenate the exhausted T cells and restore their function. Barber et al, (2006) treated chronic infected mice with blocking antibody specific for PD-L1 and monitored T cell responses and viral control. They found out that in contrast to untreated mice, a higher percentage of virus specific CD8 T cells from chronically infected mice had expanded and had an increased ability to produce IFN-γ and TNF-α. PD-L1 blockade also resulted in a striking reduction in viral loads in mice treated with PD-L1 specific antibody while the untreated mice still had high levels of the virus that was maintained even after the anti-PD-L1 was stopped (Barber et al, 2006).

In mice infected with Schistosoma mansoni, there was increased expression of PD-1 on splenic CD4+ and CD8+ T cells compared to naïve T cells and the macrophages expressed high levels of PD-L1 (Smith et al, 2004). Similarly, during Taeniacrassiceps infection in mice, a high percentage of CD4+T cells express PD-1 and both PD-L1 and PD-L2 were upregulated on macrophages (Terrazas et al, 2005). These two studies suggest that parasitic infections may also exploit the PD-1-PD-L pathway to downregulate specific anti-parasitic immunity and establish a chronic infection.

CHAPTER THREE

3.0 MATERIALS AND METHODS

3.1 Study Area

This study was conducted at Kanyawegi and Mosoriot villages and at new Nyanza provincial general hospital (Appendix 2). Kanyawegi is an area of holoendemic malaria in the lowlands of western Kenya. Mosoriot is an area of unstable P.falciparum transmission situated 150 kilometers northeast of Kisumu in the highlands of Rift valley province.

3.2 Study Population

3.2.1 Inclusion criteria

Inclusion criteria into the study included children aged from six months to eighteen years who are residents of the two study area, body temperature of ≤37.5oC and may be parasitemic but asymptomatic. Children having eBL but have not started chemotherapy were included. Adults (>18 years) control were also included.

3.2.2 Exclusion criteria

Individuals who have Hb of less than 5g/dL, parasitemia with fever or evidence of another etiology of fever and individuals who are generally unwell due to other unconfirmed health conditions.

3.3 Ethical Considerations

Approval for the study was obtained from the Kenya Medical Research Institute National Ethical Review Committee and Ethical Review Board of University of Massachusetts Medical School, USA. Written informed consent was obtained from participants and parents or guardians of all study participants. Qualified phlebotomists collected venous blood under sterile conditions in order to minimize the risk of infection and discomfort.

3.4 Study Design

This study was a cross sectional study involving a total of 100 individuals (<1, 1 – 5, 5 – 9, 9 – 14, >18 years) from both the high (Kanyawegi) and low (Mosoriot) malaria transmission areas. Twenty children presenting with eBL were enrolled to determine PD-1 expression in different lymphocyte subsets.

3.5 Sample Size Calculation

Sample size was calculated based on G-power software. In order to achieve a statistical power of 80%, a significance of α=0.05 with a large effect size, a total of 64 age matched individuals were be enrolled (see figure below).

3.6 Blood Sample Collection microscopy and complete blood count (CBC)

Venous blood (2 – 5ml from children and 8 – 10ml from adults) was drawn by venipuncture into 10ml heparinized vacuitainer and transported within two hours to the University of Massachusetts/KEMRI laboratory located at Centre for Global Health Research (CGHR) in Kisian and processed on the same day. P. falciparumdiagnosis was determined by microscopic examination of Giemsa-stained thick and thin blood smears. A coulter counter was used to quantify the hematological indices of the study participants.

3.7 Peripheral Blood Mononuclear Cell Isolation

PBMCs were separated from sodium heparin anticoagulated whole blood by standard Ficoll-Hypaque density gradient centrifugation. In this procedure, the anti-coagulated blood was layered carefully onto 5mL of Ficoll-paque (GE Healthcare, Sweden) in a 15mL tube and then centrifuged at 450×g for 30 minutes. Plasma was transferred into Sarstedt tubes (Sarstedt, Germany) and stored at -800C while the PBMCs was collected using a sterile 10mL pipette and transferred into a 15mL tube. The cells were washed by adding sterile 1× PBS, pH 7.0, without calcium or magnesium, to bring a total volume in the tube to 12mL followed by centrifugation for 15 min. at 350×g at room temperature. The supernatant was aspirated off, the pellet broken by gentle flicking of the tube and then washed again as described above and centrifuged for 10 min at 350×g. The supernatant was aspirated, the pellets broken by gently flicking the tubes and the cells resuspended in 1mL of sterile 1 × PBS, pH 7.0. 10µL of 0.4% Turk’s solution was used to dilute the cells in a 1:1 ratio to aid in visualizing the cells under a microscope and using a Haemocytometer to calculate the yield using the formula (cell count in 1ml = (# cells counted in 5 squares)×5×2×104). The calculations of the cell count were carried out in Microsoft Excel sheets.

3.8 Staining for Flow Cytometry

Half a million cells was aliquoted into appropriately numbered 5mL polystyrene tubes (Becton Dickinson USA). Appropriate monoclonal antibodies specific for different surface molecules were added (Appendix 1). The tubes were then be vortexed and incubated at room temperature for 20 minutes in the dark. After incubation, 2mL of cold flow buffer was added to each tube and vortexed gently and then be spun at 450×g for 5 minutes at 40C. The supernatant was aspirated off and 0.5mL of 2% Paraformaldehyde added to all the tubes, vortexed gently and incubated in the dark for 20 minutes at room temperature.

3.9 Flow Cytometry Acquisition and Analysis

Data was acquired within 24 hours using CELLQuestPro software on a FACSCalibur flow cytometer (Becton Dickinson Immunocytometry Systems, San Jose, CA). The fluorescent intensity measurement was done using logarithmic amplifiers whereas the forward scatter and side scatter measurement was made using linear amplifiers. Flowjo software (Tree star Inc, USA) was applied to collect data for compensation and processing of data before statistical analysis.

3.10 Soluble PD-1 ELISA

A 96-well microplate was coated with 100µL of anti human PD-1 capture antibody, sealed and incubated overnight at room temperature. After a three steps wash (0.05% Tween 20 in PBS pH 7.2), non specific binding was blocked for one hour using 300µL of blocking buffer (1% BSA in PBS pH 7.2). These were then washed twice and 100µL of standards or the samples added to the wells, covered using a plate sealer and incubated for two hours at room temperature. After the incubation period, the plates were washed twice with wash buffer, 100µL of biotinylated goat anti human PD-1 detection antibody added to each well, covered using a plate sealer and further incubated for two hours at room temperature followed by addition of 100µL of streptavidin HRP to each well. HRP activity was detected using 3,3′,5,5′-tetramethylbenzidine (Organon Teknika) in h3O2 and the reaction stopped by adding 2M sulfuric acid (h3SO4). The optical density was determined at 450 nm (Anthos 2001 reader, Anthos Labtec Instruments, Salzburg, Germany).

3.11 Th3 and Th3 Cytokine Testing by Bioplex Suspension Array System

A 1.2 µm 96 well Millipore filter plate was pre wetted with 100µL/well of PBT (PBS pH 7.4, 1% BSA, 0.05% Tween 20) and aspirated using a vacuum manifold. Using a multichannel pipetor 50 μL of the 2 x concentrated working microsphere mixture were aliquoted into the appropriate wells of the filter plate, then the samples or the standards will be added to the appropriate wells. This reaction will then be gently mixed using a multichannel pipettor and the filter plate covered and incubated for 30 minutes

The post Malaria, Malaria Transmission, Morbidity and Mortality appeared first on mynursinghomeworks.

[ad_2]

Source link

Development Of Restorative Justice Criminology Essay

[ad_1]

Restorative justice can be found throughout the bible. Although, it has been previously said that biblical accounts support the existence of retributive justice, it is not true that restorative justice had no place in the early days. The principle of ‘an eye for an eye” appears primarily in the first few books of the bible, collectively called the Torah. However, the emphasis of the sacred scripture is primarily forgiveness, restitution and restoration, which are primordial considerations of restorative justice. [1] 

One such account, supporting the existence of restorative justice, is the story of the tax collector Zaccheus. He was a tax collector, and as such he was abhorred by the people. He had wanted to see Jesus, but he couldn’t because he was too short, so he climbed up a tree, and while there was seen and was asked to come down from the tree. He invited Jesus in his house, and when the people saw this, they were astonished and angered as they believed Jesus was going inside a “sinner’s” home. To this, Jesus replied:

“Today salvation has come to this house, because this man too is a son of Abraham; for the Son of man has come to seek out and save what was lost.” [2] 

Restorative justice as a principle of imposing penalty has played a secondary role to retribution and deterrence. It wasn’t until the fifties did revival of interest in restorative justice occurred.

The 1950’s: Creative Restitution

Dr. Albert Eglash, while working with adults and youths in the criminal justice system, developed creative restitution, upon finding that the current system lacked humanity and effectiveness. Under this new concept, “an offender, under appropriate supervision, is helped to find some way to make amends to those he has hurt by his offense, and to ‘walk a second mile’ by helping other offenders.” [3] 

Some principles of restorative justice is imminent in creative restitution such as: reinstating the relations between the wrongdoer and the offended party, offender’s admission of guilt and renunciation of retribution. He says that the attributes of creative restitution are:

“1. It is any constructive act.

2. It is creative and unlimited

3. It is guided, self-determined behavior.

4. It can have a group basis.” [4] 

Because the basic principles of restorative justice is found in creative restitution, Some of the basic tenets of restorative justice can be found in the principles of creative restitution, Eglash’s work is considered by many as one of the bases of the restorative justice movement.

The 1970’s: The Kitchener Experiment

In Kitchener, Ontario, Canada, two young men while intoxicated, robbed and vandalised a total of twenty one houses. They were caught and was handed over to a probation officer, who in turn brought them to court and arranged for them to visit the homes which they robbed and vandalised and apologize personally to each and every home owner. [5] Thus, the birth of the Victim-Offender Reconciliation Program (VORP).

The Canadian experiment was the beginnings of modern use of restorative justice. Victim-Offender Mediation Programs (VOMP), also known as Victim-Offender Reconciliation Programs (VORP), brings offenders and offended parties, opposite each other with a trained mediator, wherein both parties have the opportunity to “speak their minds and their feelings to the one who most ought to hear them,” contributing to the healing process. [6] The offender themselves come into an agreement with the offended party on what will be done to restore the loss. [7] 

The 1980’s

In the United States, during the eighties, then President Reagan created a task force to investigate the treatment of victims of the criminal justice system. The task force report was filled with criticism of the victim’s rights programs, singling out the inadequacy of victim’s compensation programs. Because of this event, the government passed a law providing restitution for crime victims and allowing the use of “victim impact statements” at federal sentencing hearings, the Victim and Witness Protection Act of 1982. According to the Candaian Resource Centere for Victims of crimes, victim impact statements are:

“A victim impact statement is a written account of the personal harm suffered by a victim of crime. The statement may include a description of the physical, financial and emotional effects of the crime. The victim impact statement is intended to give crime victims a voice in the criminal justice process. It allows them to participate in the sentencing of an offender by explaining to the court, and the offender, how the crime has affected them.” [8] 

A victim impact statement is not a mandatory requirement, however, once made; the Court shall mandatorily take the statement into consideration in making the decision. [9] 

2000’s

The year 2000 was a remarkable year for Restorative Justice, the Catholic Church endorsed restorative justice practices. They commended that restorative justice focuses on the victim and community first, unlike the dominant model, which asserts the hurt and loss of the victims, and maintain that offenders come to terms with their actions. Because the offenders and the offending party are face to face, it offers the victim a better sense of peace and accountability, the Church said. [10] 

Another triumph was the adoption of the resolution encouraging countries to use a document providing guidelines for the implementation of restorative justice, by the United Nations Economic and Social Council. [11] This came into existence because of the joint efforts of Canada and Italy proposing to the United Nations Commission on Crime Prevention and Criminal Justice to cultivate an international guideline to assist countries in espousing restorative justice. [12] 

Little by little, restorative justice principles have been developing in nearly most of the countries, such as Canada, Australia, Japan, Netherlands, Most European Countries, several South American countries and Russia.

The Theory of Restorative Justice at present

Many authors have attempted to define restorative justice, to have one standard meaning. However, there has been no standard definition as of yet. Howard Zehr defines restorative justice as “restorative justice is a process to involve, to the extent possible, those who have a stake in a specific offense and to collectively identify and address harms, needs, and obligations, in order to heal and put things as right as possible.” [13] When the attempt to get a consensus for a working definition of restorative justice could not be attained, the working party on Restorative and Justice, decided to adopt Tony Marshall definition. He defines it as:

“Restorative justice is a process whereby all the parties with a stake in a particular offence come together to resolve collectively how to deal with the aftermath of the offence and its implications for the future.” [14] 

Marshall’s definition focuses on the process and interpersonal relation between the offender and the offended party.

Restorative Justice is focused on the offender, offended party and community members. The core values are: the offender must apologize or shamed and reintegrated, the offended party, harm and chance for forgiveness and lastly, community and relationships. [15] 

Under this principle, it is pertinent for the offender to tacitly acknowledge that he committed an offense, showing that he accepts responsibility for the outcome of his wrong action and recognizing the injury undergone by the offended party. [16] Such apology, may be done orally or in written form. After this, it must be figured out how he can get back on track, which will be dealt with by the individualized treatment of the offender. Next step is for the offended party to assess the harm done and create an action plan on how to mend the injury. [17] The offended party must likewise accept the apology of the offender. The focus on the community pertains to the forging new relationships and repair broken relations. [18] 

Restorative Justice’s emphasis lie on repairing the injury caused by the crime, which is understood as a violation of relationships and therefore disrupts peace in the community. [19] It is collaborative and inclusive, and crime is not merely an offense against the state. It is inclusive because it allows the participation of offended party, offender and the community, the three parties who have the most interest in the reparation of the offense. It is collaborative because it is through the efforts of the interested parties which the solution is based from.

Respect for human dignity is the main basis of the restorative principles. The Canadians, one of countries which adhere to restorative justice, speaking through its Ministry of Justice said:

“Priority is given to addressing the human needs of participants and empowering them to communicate their thoughts and feelings in an open and honest way. The goal is to build understanding, to encourage accountability and to provide an opportunity for healing. A restorative justice process encourages the offended to take responsibility for their harmful behaviour in a meaningful way, to gain insight into the causes and effects of that behaviour on others, to change that behaviour and to be accepted back into the community. The process gives the victim a forum to ask questions, receive answers, gain understanding, explain the impact of the crime on them and contribute to the outcome of the process. The process may result in the victim receiving an apology, restitution, services or some other form of reparation. It creates a safe environment in which the victim can seek closure. Restorative justice processes have the potential to provide the community with an opportunity to articulate its values and expectations, to understand the underlying causes of crime and to determine what can be done to repair the damage caused. In doing so, it could contribute to community wellbeing and potentially reduce future crimes.” [20] 

Purpose

Under the principle of restorative justice, crime is a violation of relationships between persons. In order to achieve justice the offended party, offender and community members must participate in putting things right. [21] 

Focal Point

Unlike in retribution, wherein the main point in the imposition of penalty is giving the offender what he deserves restorative justice deal with the correction or the rehabilitation of the offender so that his future conducts will be law abiding. Rehabilitation supporters believe that sanctions must be used as a chance to make a positive change on the offender. [22] 

Rehabilitation literally means to restore in good condition. The objective of restorative justice is to help the offenders so that they can re-enter society as useful citizens, or at the very least, no longer dangerous. It also aims to decrease the crimes, albeit in a very different manner. What restorative justice seeks to achieve is not only to correct the offender, but also to change the “need or desire to commit crimes.” [23] 

Pitfalls

Restorative Justice as a penal philosophy is not without criticisms and limitations. A study conducted in Africa on 2001, made the following observations:

“First, The principle of the model inevitably rests on the cooperation of the parties concerned. If the offender, for instance, refuses to accept responsibility for the crime and to fulfil his or her obligations to the victim and the community, there can be no talk of restorative justice.

Second, A certain level of competence and the availability of infrastructure, such as a trained mediator, a reprerequisites for community participation in restorative justice programmes. However, the skills and resources are not always available.

Third, In modern society, community bonds are not always so strong and aspects like the privacy of the individual and autonomy are strongly emphasised. A significant shift to community participation and involvement in restorative justice programmes will necessarily put a high premium on community education and the development of community sources.

Fourth, Any existing social injustices in and between communities could have a negative influence on the implementation of restorative justice. Social division can prejudice the cooperation of parties in the criminal justice process.

Fifth, Some people are of the opinion that restorative justice is a “soft” option for the offender.

Sixth, A perception that restorative justice only applies in the case of juveniles and minor offences is quite common.” [24] 

Another issue concerning Restorative justice is sentence inequality. Since, it is originally designed to address specific needs of the individual offender, the sentence meted differs on the determination of one’s progress through rehabilitation. [25] The idea of restorative justice is to develop an individualized treatment plan an impose an indeterminate sentence, the length of which will be determined on the offender’s progress.

Arising from these individualized treatment and indeterminate sentence, is human fallibility. Since human nature cannot be predicted with absolute precision, some were released before they were actually ready. [26] 

One other problem that restorative justice faces is that given its long-term nature, offenders must “experience incarceration in order to receive the necessary treatment for rehabilitation.” [27] 

Retributive Justice principles in the Philippines’ current legal framework

Revised Penal Code

Although majority of the Revised Penal Code’s provisions are considered to follow the classical approach, which follows the postulate that retribution is the main justification of punishment, the positivist theory is also used in some of the provisions. Such principle is apparent in the provisions of impossible crime and mitigating circumstances.

Impossible Crimes

The Code penalizes impossible crimes, to wit:

“Article 4. Criminal liability. – Criminal liability shall be incurred:

1. By any person committing a felony (delito) although the wrongful act done be different from that which he intended.

2. By any person performing an act which would be an offense against persons or property, were it not for the inherent impossibility of its accomplishment or on account of the employment of inadequate or ineffectual means.” [28] (emphasis ours)

The term impossible crime is actually a misnomer because no crime was actually committed, due the inherent impossibility of its accomplishment or inadequacy and inefficiency of the methodology used. However, it is subject to a penal sanction because its commission is indicative of the criminal propensity of actor, as per the positivist theory is concerned. Also, he law punishes it because objectively the offender did not commit a crime, but subjectively he did. [29] t was inherently impossible to accomplish or due to inadequate or ineffectual means.

Circumstances affecting criminal liability: Mitigating Circumstances

Mitigating Circumstances are those which, if present in the commission of the crime, do not entirely free the actor from criminal liability, but serve only to reduce the penalty. [30] The following are the mitigating circumstances under the Code:

“Article 13. Mitigating circumstances. – The following are mitigating circumstances:

1. Those mentioned in the preceding chapter, when all the requisites necessary to justify the act or to exempt from criminal liability in the respective cases are not attendant.

2. That the offender is under eighteen years of age or over seventy years. In the case of the minor, he shall be proceeded against in accordance with the provisions of article 80.

3. That the offender had no intention to commit so grave a wrong as that committed.

4. That sufficient provocation or threat on the part of the offended party immediately preceded the act.

5. That the act was committed in the immediate vindication of a grave offense to the one committing the felony (delito) his spouse, ascendants, descendants, legitimate, natural or adopted brothers or sisters or relatives by affinity within the same degrees.

6. That of having acted upon an impulse so powerful as naturally to have produced passion or obfuscation.

7. That the offender had voluntarily surrendered himself to a person in authority or his agents, or that he had voluntarily confessed his guilt before the court prior to the presentation of the evidence for the prosecution.

8. That the offender is deaf and dumb, blind or otherwise suffering some physical defect which thus restricts his means of action, defense, or communication with his fellow beings.

9. Such illness of the offender as would diminish the exercise of the will-power of the offender without however depriving him of consciousness of his acts.

10. And, finally, any other circumstance of a similar nature and analogous to those above mentioned.” [31] 

Diminution of freedom, intelligence or the lesser perversity of the actor, is the basis for the mitigation. [32] It is in line with the principles and goals of restorative justice because it keeps track of the individual’s frame of mind at the time of the commission of the offense.

Mitigating Circumstances are classified into two groups: Ordinary and Privileged. Ordinary Mitigating circumstances are those enumerated in Article 13, save for minority, which is now considered privileged mitigating circumstance as a result of the legislation Republic Act no. 9344 or the Juvenile Justice and Welfare Act, which lowered the age of criminal responsibility. An ordinary mitigating circumstance has the effect of reducing the penalty a period lower. Privileged mitigating circumstances are those which are enumerated by law as such, and has the effect of reducing the penalty a degree or two lower. The existence of two ordinary circumstances has the effect of a privileged, lowering the penalty by a degree or two. A privileged mitigating circumstance cannot be offset by any circumstance, whereas the ordinary one may be affected.

Act No. 4103 or the Indeterminate Sentence Law

The Indeterminate Sentence Law was one of the more important innovations introduced by the Americans in our Criminal law. Under this system, offenders were to be sentenced with a an indefinite period and released upon showing of “satisfactory progress towards reformation.” [33] A minimum and maximum range of penalty was determined, and after service of the minimum term and upon determination of the Board of Indeterminate Sentence of the fitness and readiness of the prisoner, reasonable probability that he will not violate the law when released, and compatibility of his release with society’s welfare, the prisoner will be released on parole and is therefore allowed to serve the rest of his indeterminate sentence outside of the incarceration facility. [34] The following shall not be entitled to the benefits of the Indeterminate Sentence Law:

“Sec. 2. This Act shall not apply to persons convicted of offenses punished with death penalty or life-imprisonment; to those convicted of treason, conspiracy or proposal to commit treason; to those convicted of misprision of treason, rebellion, sedition or espionage; to those convicted of piracy; to those who are habitual delinquents; to those who have escaped from confinement or evaded sentence; to those who having been granted conditional pardon by the Chief Executive shall have violated the terms thereof; to those whose maximum term of imprisonment does not exceed one year, not to those already sentenced by final judgment at the time of approval of this Act, except as provided in Section 5 hereof.” [35] 

Indeterminate Sentencing have been criticised because of the differential treatment of persons similarly situated as well as the alleged difficulty in rehabilitation of the offender. [36] 

Presidential Decree No. 968 or the Probation Law

 “Probation is a disposition under which a defendant, after conviction and rendition of sentence, is released subject to conditions imposed by the court and to the supervision of a probation officer.” [37] Probation has for it’s purpose: Rehabilitation and reformation of the Offender, and crime deterrence. An application for probation may be filed after conviction, even before the offender commences serving his sentence. If the application for probation is granted, the sentence will be suspended and he will be released under the following conditions:

“Conditions of Probation. Every probation order issued by the court shall contain conditions requiring that the probationer shall:

(a) present himself to the probation officer designated to undertake his supervision at such place as may be specified in the order within seventy-two hours from receipt of said order;

(b) report to the probation officer at least once a month at such time and place as specified by said officer.

The court may also require the probationer to:

(a) cooperate with a program of supervision;

(b) meet his family responsibilities;

(c) devote himself to a specific employment and not to change said employment without the prior written approval of the probation officer;

(d) undergo medical, psychological or psychiatric examination and treatment and enter and remain in a specified institution, when required for that purpose;

(e) pursue a prescribed secular study or vocational training;

(f) attend or reside in a facility established for instruction, recreation or residence of persons on probation;

(g) refrain from visiting houses of ill-repute;

(h) abstain from drinking intoxicating beverages to excess;

(i) permit to probation officer or an authorized social worker to visit his home and place or work;

(j) reside at premises approved by it and not to change his residence without its prior written approval; or

(k) satisfy any other condition related to the rehabilitation of the defendant and not unduly restrictive of his liberty or incompatible with his freedom of conscience.” [38] 

If the probationer violates any of the conditions of the release, the Court may issue a warrant for his arrest, and if found guilty, the Court may revoke the probation and subsequently order for his recommitment to serve the remainder of his sentence. [39] The benefits of the probation law shall not extend to those: sentenced to serve a maximum term of imprisonment of more than six years; convicted of any offense against the security of the State; who have previously been convicted by final judgment of an offense punished by imprisonment of not less than one month and one day and/or a fine of not less than Two Hundred Pesos; who have been once on probation under the provisions of this Decree; and who are already serving sentence at the time the substantive provisions of this Decree became applicable. [40] 

Republic Act No. 9344 or the Juvenile Justice and Welfare Act of 2006

In compliance with the United Nations Convention on the Rights of the Child, to which the Philippines is a signatory, the Congress of the Philippines enacted in 2006, the Juvenile Justice and Welfare Act. The Juvenile Justice and Welfare Act was a product of ten years of lobbying. An important provision on the law was the tacit recognition of Restorative Justice as a principle to be adhered to. [41] Under the statute, Restorative justice “refers to a principle which requires a process of resolving conflicts with the maximum involvement of the victim, the offender and the community. It seeks to obtain reparation for the victim; reconciliation of the offender, the offended and the community; and reassurance to the offender that he/she can be reintegrated into society. It also enhances public safety by activating the offender, the victim and the community in prevention strategies.” [42] 

In one study, it had been said that the Juvenile Justice and Welfare Act was the most promising piece of legislation in the Philippines concerning Restorative Justice. [43] 

The post Development Of Restorative Justice Criminology Essay appeared first on mynursinghomeworks.

[ad_2]

Source link

Indonesia the problem of trans boundary haze

[ad_1]

Introduction

Sustainability of environment becomes an embedded eco-political concern of development strategy in today’s globalized world. In spite of encouraging economic growth, Transboundary haze pollution (THP) is incurring a serious menace to environment in South East Asian Nations (ASEAN). Smoke haze resulted from land and forest fires frequently stemming from Indonesia, the largest country of this region, as a consequence of illegal logging, traditional agricultural actions and some adverse climate conditions like El Nino South Oscillation (ENSO) have imposed immense socio-economic and environmental costs for the whole region. Along with the constant threat of climate change and degradation of biodiversity, the direct measurable impacts comprise huge monetary loss especially for health damage, tourism losses, and industrial production losses. Singapore being the neighboring country of Indonesia also suffers a lot with the corollary. The people outcry always pressurizes the government to uphold the country’s self-interest by mitigating the economic losses while inducing further stress to Indonesia. At the same time government also has to be diplomatic in its intra-regional approach of dealing with the issue. It is a difficult proposition and the question is how best Singapore can strategize its policy to extract best solution of this persisting hazard.

Key Issue:

From Singapore’s perspective, the THP is an outcome of environmental externality. Whole state of affairs is a bit complex since under the regional or bilateral framework, Singapore has very little to do to resolve the problem by itself. Sandler (1997) argues that haze free environment in ASEAN region is non-excludable and non-rivalrous aggregative type of public good whose total benefit is the totting up of individual efforts. Such an international public goods gives room for strategic actions by countries concerned that would result into sub-optimal outcomes. Sandler concludes that such strategic approach thus can create a Prisoner’s Dilemma if the costs offset the benefits. In this context, Lin and Rajan (2001) expressed their concern on failure of such multilateral solution due to conflicting preferences and priorities between countries for reducing these forms of pollution. Therefore, a bilateral approach towards ecological and eco-political strategic options rather than multilateral approach should be more effective for this THP. However, in terms of taking correct strategy, Singapore seems to be into a Prisoner’s Dilemma like situation, which is the key issue to be addressed for dealing with this long-lasting problem.

Why this issue is the most important:

ASEAN’s regional efforts to resolve THP has been facing stiff challenges due to lack of bindings and cooperation from all parties. Florano (2004-05) states that both 1995 ASEAN Cooperation Plan on Transboundary Pollution and RHAP of 1997 was ineffective due to its ASEAN way’s emphasis on volunteerism. Jayachandaran (2005) refers that, Indonesia-the host of THP, has been so reluctant to implement the agreements due to its internal socio-political dynamics. Tan (2005) also argues that Indonesia’s mindset of non-ratification of ATHP has been disrupting effective regional cooperation from ASEAN countries in this issue. Tacconi et.al.,(2008), in addition to these, points on the lacking of international monitoring, compliance and inspection in ATHP. At such a dismal situation, Singapore irrespective of other affected countries has to decide its own strategies based on overall pay-off while coming out the disastrous situation with time.

Solutions:

Option-1. Induce more pressure on Indonesia:

There is a group of analyst who think that impose bi-lateral pressure on Indonesia to act positively towards the problem. This is more a political approach. They argue for constant raising of this issue during bilateral meetings with Indonesian counterparts, which would work while reminding them about the adverse effect of this inaction would impact the bilateral relations. In fact, this is also supported by some evidences in recent past. Former foreign ministry official of Singapore Gerald Giam states that,

Recommended Policy Actions:

a. Trade barriers:

Singapore has huge formal and informal cross-border trade with Indonesia. In fact, Indonesia is Singapore’s 4th largest trading partner in 2009 with total trade amounting to S$58.5 billion, up from S$75.1 billion in 2008 (source: IE Singapore’s StatLink, 2010). Singapore imports palm oil and rubber from Indonesia, while Indonesia hugely depends on Singapore for many manufacturing, electronics goods and services. Figure shows a significant trade advantage (measured in net export) in favor of Singapore. There are also many Singapore-based MNC in Indonesia. So any sorts of trade barrier could create some pressure on Indonesia at this moment.

Singapore-Indonesia bilateral trade (S$ Thousands): 

Singapore’s Data

2008

2009

Imports

24,827,467

20,659,212

Exports

50,299,127

37,857,815

Total Trade

75,126,594

58,517,027

Source: IE Singapore’s StatLink

b. Squeeze Other Development Projects:

Singapore supports Indonesia to establish most competitive industrial zone at Batam, Bintan and Karimun free trade zone (BBK-FTZ)where they can develop electronic, shipbuilding and network storage and server industry which would bring huge economic boost for those region of Indonesia. So reducing the scale of investment or technological support would extend the pressure over Indonesia.

c. Regional organization against Indonesian imputes approach:

For mounting the pressure on Indonesia, Singapore government can act to form a group of sufferer incorporating the other countries like Malaysia, Brunei or Thailand and place their issue to International court for Environmental disputes. Malaysia already has taken necessary preparation to do that. This would be very unfortunate for this regional integrity, however, suffering countries the suffering countries could but think about that.

Analysis of outcomes:

Reacting towards the public outcry, Singapore government may have to go for such kind of compulsive policy as long as it works for a while. They can expect timely and effective actions taken by Indonesian government for rebuilding investors’ confidence in Indonesia, Indonesia’s international eminence and ASEAN’s integrity would not be affected. However, in the longer run, this pressurize policy would result instability in regional unity and integration. The concept and objective of ASEAN would be hampered as well. On the other hand, this policy would not be able to bring any instant solution to the problem.

Option- 2. Intensify Cooperation to Indonesia with region-specific bilateral projects against THP:

In a prisoners’ dilemma, the cooperation strategy often maximize the pay-off for both the parties. Though the THP is the externality resulted from Indonesia, but to get some positive implication of this problem, all concerned parties should effectively act and help each other in an integrated manner so that the degree of hazard comes down with time. After Sub-Regional Ministerial Steering Committee on Transboundary Haze Pollution (MSC) in November 2006, 35 fire-prone districts in 8 provinces have been identified into Indonesia’s Plan of Actions for immediate consideration. Indonesia has invited ASEAN countries to work together to develop its capability to tackle land and forest fires in those fire-prone areas. Singapore already has responded positively to extend its cooperation to Indonesia’s State Ministry of Environment (KLH) to implement the plans for managing land and forest fires at Jambi Province.

Recommended Policy Actions:

a. Extend technical and financial supports:

The US$1 million Jambi province project seems to be a success so far. Recent study reveals that the number of hot spots explored from forest fires has reduced by one-fifth in last few years. So following the experience of this success, Singapore can extend its cooperation with technology and finance for some other regions that directly cause problem to them.

b.More support areas:

Some proactive prevention monitoring and approach can be initiated with best possible art-of-states. These may include:

  1. Socialization Workshop for farmers on Sustainable Farming (i.e. Cultivating crops without resorting to burning)
  2. Developing the Capacity of the locals in understanding and interpreting the Satellite images and hotspot information
  3. Developing local land-use map
  4. Installing Geographical Information System to facilitate the monitoring of fire and haze and assess accordingly
  5. Developing air and weather monitoring stations
  6. Enhance fire fighting and suppression Capacities of local people.

c. Better monitoring and Positive feedbacks:

The outcome of the above collaboration projects should be monitored in regular basis and the success part should be broadcast to others so that it would give positive signs to other nations to come forward resolving the long-lasting problem.

Analysis of the outcomes:

Certainly these collaboration projects would result more financial cost for Singapore. However, welfare should be ascertaining with the implication of comparative advantage frameworks. In fact, factors should be deployed according to the comparative advantages each country has. For instance, Singapore could provide technical and financial support with expertise in managing the environmental pollution wide-spreading, while Indonesia would provide with some cheaper labor and other infrastructures. Singapore can extend its support to some region especially the Sumatra that creates more problems to it. Again, more technology transfer would also ensure more earnings and ultimately a quicker recovery of the dire situation.

Choosing the Option:

Considering the following three factors

  • Environmental Sustainability
  • Short run Cost-Long run benefit
  • Marginal cost of combating (for both Indonesia and Singapore)

I would like to suggest implementing option-2 [cooperation] for Singapore government to combat against the adverse effect of THP since it will ensure betterment of environmental sustainability in this region with some long-term aggregated benefits for all using the comparative advantages of minimized cost.

The post Indonesia the problem of trans boundary haze appeared first on mynursinghomeworks.

[ad_2]

Source link

Personnel Management In Education Education Essay

[ad_1]

This study is on teacher disciplinary problems in secondary schools. A qualitative method was used so as to get an in-depth impression of the respondents on the phenomenon. Four participants were selected based on their vast experience in educational sector and interview was conducted so as to elicit information from the participants. The result indicated that (a) It is important to administer discipline because it enhances productivity (b) the common disciplinary problem in school is insubordination (c) the principal has a great role to play in discipline of the teachers being the leader of the school.

INTRODUCTION

Teachers discipline in any school is very important, because without discipline there is no how any achievements can be recorded, this is in line with Paul Falcone (1997) who said “The objective of any disciplinary system is to create and maintain a productive, responsive workforce”. So discipline is very important particularly in education sector, because the teachers are employed to serve as human resources with the aim of teaching the students so that the students after graduating will become beneficial to the society, this means that the teachers are the engine room that the whole system relied on for its success. If the teachers put in their best the education sector will prosper, and if they became lazy, refuse to perform their duties effectively and efficiently the education sector will be backward and the aim will not be achieved. As Gus Welty (1989) pointed out that, Misconduct and other offensive behaviours often lead to decreased levels of productivity as they affect individual performance of the employee. Teachers in schools should also have it in mind that, the students always see them as model whatever they do the students will try to copy, if they exhibit a good character and behave in a discipline manner their students will become disciplined.

Despite the facts that discipline of teachers is not an easy task for principals because teachers may come from different places with different cultural background, so as a principal you will see different characters and attitudes and you will see different disciplinary problems, so it is left for you as a leader to know various kinds of techniques in handling any disciplinary problems that may emanate from the staff so as to keep the school moving in order to have a good atmosphere for teaching and learning, so as to achieve the educational goals and objectives.

Related Literature

There are so many write up on Disciplinary problems in schools few were reflected in this work starting with the definition of Discipline. Richman (2008) who sees Discipline as catalyst for change and a “bull’s eye” toward which employees should aim in refocusing their behaviours and bringing them within the targeted range. Macmillan Dictionary (2007) defined discipline as the practice of making people obey rules of behaviour and punishing them if they do not.

In regards to disciplinary problems, Dana 2011 described Insubordination as refusing to take order from the superior officer. If a teacher refused to take instruction from his principal it can be regarded as insubordination. South African labour guide (2011) Insubordination may be described as resistance to or defiance of authority, disobedience, refusal or failure to obey reasonable and lawful instructions, insolence, cheekiness, rudeness, brining the employer’s name into disrepute, and rebellious. Other contributors includes Webb & Norton (1999) Fulmer (2002) who dwelled on different disciplinary problems in school such as; sexual harassment, theft, alcoholism and so on.

Richard et al (1999) Commented on the essence of discipline in the organization, school inclusive, the writers also emphasised on the need for principals to know procedure of administering discipline so as to safeguard the school. Vic (2009) highlighted on the role of the principal as to lead and manage the planning, delivery, evaluation and improvement of the education of all students in a community through the strategic deployment of resources provided by the Department and the school community. In addition the principal have to also administer discipline where necessary.

Purpose of the study

The study is on teachers’ disciplinary problems in schools. Disciplinary problems among teachers in schools is consider to be a problem in our education sector, the extent to which this problem is affecting the performance of our teachers and the standard education is disturbing, hence there is the need to make a study so as to point measures to tackle this problem.

Objectives of the study

This study has the following objectives:

To describe why teachers discipline is necessary in schools.

To explain the common disciplinary problems among teachers.

To explain the measures to be taken by principals in handling disciplinary issues.

This study will be significance to school principals in having better understanding of disciplinary problems in schools. It will also be useful to teachers in having more ideas in common offences committed in the school with the aim of avoiding it. The study will also be significant to any individual who is willing to know about disciplinary problems in schools.

Definition of terms

Teacher: Is someone with or without teaching qualification, but end-up in teaching.

Discipline: Is the orderly conduct of affairs by the members of an organization who adhere to its necessary rules and regulations.

Methodology

The nature of any research mostly determines the appropriate procedure and method to be adopted in conducting it for the purpose of attaining the intended goal. This research intends to investigate on techniques for teacher retention in secondary schools. The nature of the study will demand eliciting details information from the respondents about their understanding on the research questions as stated in chapter one.

Design of the study

This study is on Teachers and disciplinary problems in schools so a qualitative method will be used for the study. Creswell (2007) stated that a qualitative research is a means for exploring and understanding the meaning individuals or groups ascribe to a social or human problem. The purpose of qualitative studies is to describe a phenomenon from the participants’ points of view through interviews and observations. The intention of the researcher is to listen to the voice of participants or observe them in their natural environments. (Field & Morse,1992).

Selection of Participant

The essence of participants in any research is to help in solving the problem under investigation. Selection of participants in this research was based on the potential of each participant’s ability to contribute to researcher’s understanding of the phenomenon under investigation. The purpose of small sample in qualitative research according to Merriam (1998) is not to achieve statistical generalisation, but rather to gain the perspective of the participants. Merriam also added that the small size will enable the researcher to have an in depth understanding of the research phenomenon.

Based on the above argument a total of 4 participants were selected for this study. Two out the four participants are principals who are studying at University Malaya, while the remaining two are experienced teachers who have been in the profession for the past 20 years, who are doing their post graduate programme in UKM

3.3 Data Collection

The most common form of data collection in qualitative research is interview. The researcher used an in-depth interview as means of data collection. Natasha et.al (2005) commented that in-depth interview. Semi- structured interview guided the researcher in soliciting for information from the participants. According to Social Science Research Centre (SSRC) (2011) highlighted that Semi-structured interviewing follows all the principles of unstructured interviewing, except that the informants are not expected to move too far beyond the scope defined by the interview guide.The researcher recorded every bit of the participant’s response using tape record and manual writing. This is in line with Mason (1996) who suggested that, the researcher has to listen, remember what has been said, observe and pick up verbal and non-verbal cues and use note taking and tape recorder. Ary et. al (2006) emphasised that the most efficient way to collect data is by using audio tape recorder as it is much more less distracting than taking notes and it also provides a verbatim record of the response.

3.4 Analysis of data

Data collection and data analysis is an on-going process and can extend indefinitely (Merriam 2001). The researcher coded the result which was later transcribed and analysed. According wilhelmina & Rhonda (2001) who viewed that coding will enable the researcher to manage data by labelling, storing, and retrieving it according to the codes, they added that the codes created depend on the study, setting, participants, and research questions, because the codes are the researchers’ way of beginning to get at the meaning of the data.

The researcher coded the participants as Mr A, B, C and D for easy analysis of data.

Findings and discussion

Why is Teachers discipline necessary in schools?

When asked about discipline all the participants are aware of the concept “Personnel Discipline” Mr B went further to explain that personnel discipline in education is the act of forcing the teachers to act in accordance with the school rules and regulations and find a means of administering penalties on any teacher that violated the rules. When asked why do we need discipline? Mr A stated that discipline in schools is very important because without discipline there will crises and infact nothing will even move in the school, he added. He went further to say that discipline can help in organizing the teachers to conduct their selves in an orderly manner, which will lead to the achievement of the schools aims and objectives. Teachers are like parents they are expected to be more discipline than any other person, the students, the community and the society attached respect to them so their discipline is even more than necessary. Mr C is with the opinion that No discipline No progress, which is line with Gus (1989) who opined that with discipline everything is possible. Mr C commented further that if teachers are discipline the school rules and regulations will properly be maintained and this will create a healthy learning environment where the students will learn perfectly.

To Mr D. proper discipline in school save the principal time, if teachers are discipline the principal will easily co-ordinate the school, he can confidently assign responsibilities to teachers or delegate certain authority where necessary. He commented further that the principal can be confident that even if he is absent the school will not collapse. But if the teachers are not discipline, the principal cannot have the confident of delegating power and this will add extra responsibilities to the principal and his role as the school head. Mr B has a different opinion with others. To him every school need teachers that discipline, because effective teaching can hardly take place when there are cases of indiscipline, teachers that are not discipline hardly commit themselves to their job. He said that discipline teachers can improve productivity of the school, if a teacher after knowing his responsibilities does his work diligently and follow or obey the school rules and regulations, then he will became productive. Lastly he shared the same opinion with Mr A in the area that teachers can conduct themselves properly if they are discipline. The students always consider their teachers to be their model whatever they do the students copy, so if the teachers are not conducting themselves then the discipline of the students is bound also to be affected.

Looking at the opinions given by the respondents on the importance of discipline among teachers, I will want to add by saying, education is a sensitive sector, it is the bedrock of development in any nation, so if the education system is not working in proper shape other sectors are bound to be affected. Students that graduate from secondary schools are product of University who in future will become something in life, so if their teachers are not discipline it will definitely affect the product that is the students and once the students were affected the entire system will be affected. Discipline of the teachers is very necessary because they are key to the success of education.

What are the common disciplinary problems in schools?

Respondents have different views regarding disciplinary problems in our education. The researcher started with the view of Mr A stated that there are so many disciplinary problems exhibited by our teachers in schools but the one that is the most touching is; Insubordination. To him this is very common among teachers, when asked to comment further he said Insubordination is refusal to take the command of the leader, in schools it can be referred to as teacher refusing to take order from the principal. This is in line with Dana (2011) who defined Insubordination as refusing to take a command from superior officer. Mr A went further to highlight that in his school he usually face this kind of problem of insubordination were by teachers will refuse to take certain order from him, he added that sometimes some teachers may even be confrontational with him, although “I have so many ways of tackling them” he added. In his conclusion he lamented that some teachers are very stubborn, so as a leader you must know how to tackle them if not they will attempt to destroy your administrative strategies.

Mr C is so worried on how teachers are involving themselves on issues like sexual harassment. He added that sexual harassment is one among the common disciplinary problems in schools. He said “You will see some irresponsible teachers friending their own students, sometimes they do it secret while some even make it open. If as a teacher you are friending your student how can you assess her objectively”. Some teachers also are found friending their co teachers, all these are unethical. Mr B commented on teachers’ absenteeism from duty as part of disciplinary problem. He added that some teachers will not come to school in time, some will come and leave before time while some will not even come, all these are act of indiscipline. To him, this may be as a result of laxity from the school principal which he further said some teachers are bribing their principal to cover them. While some may absent themselves because they have backing from somewhere like the Ministry of Education. To Mr D the issue of indiscipline in schools is a problem, he narrated his experience with one of his teachers who always come to school late. He tried and corrected the teacher by giving him responsibility in the school that warrant him of coming at all time.

Other important disciplinary problems identified by the respondents includes; use of abusive language by some teachers to their principals or within colleagues, stealing other peoples’ property, and Alcoholism.

In my own opinion, we know that no one is perfect, we are bound to commit an offence, but there are offences that a teacher shouldn’t even think of, offences like: stealing, sexual harassment, alcoholism and some other grievous offences, a teacher is a model so she/he must behave in orderly manner because students are watching every bit of their teachers attitude.

What are the roles of principals in handling teachers’ disciplinary problems

Principals in every school are seen as the head who monitors and control the affairs of the school. Mr D commented that the principal has so many roles to play in handling cases of discipline in his school. He further stated that when he was a principal what he usually do is that whenever a teacher committed an offence, he will first call him in his office and ask why he committed the offence, from their he will advise him not to repeat again but when the offence was repeated then he take action by writing a warning letter to the teacher from there if he couldn’t take to correction then the issue of query will follow. This concur with Richard et al (1992) that suggested ways of handling disciplinary cases which includes; Counselling, letter of warning, subsequent warning and disciplinary action. Mr B is with the opinion that principals should be more patience than all their teachers they should be ready to tolerate so many things from their teachers but yet this does not mean they shouldn’t discipline, their role is to correct staff from derailing. If a teacher committed an offence the principal has the right to discipline but in an orderly manner. He added that the principal should take steps before dealing with the teacher, this may involve calling the teacher into order, if he refused then he can report him to the upper authority like the ministry, because nowadays administering penalties directly from the principals is becoming difficult, this is due to so many factors, some teachers may be connected more than the principal while some are aggressive and furious, so as a principal you have to be very careful.

Mr A has different opinion to him, hence all teachers are under the control of the principal then he has the right to discipline when necessary because if he refused to do so whatever happened in the school he will be held responsible, so discipline is paramount but the principal must do justice when discipline, he shouldn’t punish Mr Y for an offence and when Mr Z committed the offence he forgive him, this will cause crises in the school. To Mr C, principal has great roles to play in handling disciplinary cases in their schools. He added that there are offences that can be forgiven, for example if a teacher is not perpetual offender when he committed an offence for the first time he need to be forgiven. He concluded that Principal can call on the attention of any teacher that committed an offence with the aim of correcting him, it is only when the matter keep rising that strong disciplinary action will be taken.

In my own opinion, I believe that in any organization there should be a leader who will control the affairs of others, so a principal is a leader in the school who control teachers, he exercise Power and use Authority where necessary, so he need to discipline against any misconduct so as to keep the school conducive for learning.

In conclusion, Principals have to be more diligent in their administrative responsibilities, and disciplinary issues in school setting should be giving a due consideration. They should also know the kind of leadership to operate in different situations, this will help them in having better understanding of their teachers and their disciplinary problems and will give them a foresight on how to properly handle different disciplinary problems in their schools.

The post Personnel Management In Education Education Essay appeared first on mynursinghomeworks.

[ad_2]

Source link

Provide a brief legislative history of the Bills

[ad_1]

There are two significant pieces of legislation that impact maritime security in the United States. These include the Maritime Transportation Security Act 2002 and the S.A.F.E. Port Act of 2006.

For this assignment, you are to conduct a graduate levelLegislative Critique of these two pieces of legislation. To do this critique, perform the following steps:

1. Obtain a copy of the piece of legislation to be examined (MTSA and S.A.F.E. Port Act of 2006).

2. Collect and analyze news media reports on the legislation.

3. Collect and analyze any other critiques of the legislation. (i.e. Think tanks, academics, etc.)

4. Collect and analyze available witness testimony with regard to the legislation.

To compose a legislative critique, students should compose an analysis based upon the following points:
Provide a brief legislative history of the Bills. (No more than 500 words)
Determine if the Bill’s focus was introduced in the past under a different name and/or format. If so, evaluate why the legislation was discarded.
Summarize the main points of each bill in your own words (but supported by citation as appropriate)
Evaluate and categorize the strengths and weaknesses of the individual legislation, then compared against each other.
Conclude with a final assessment of both pieces of legislation including SPECIFIC recommendations that could be considered to enhance the security framework that has been established. These recommendations need to be as specific as possible JUSTIFY why you believe this should be considered.
TECHNICAL REQUIREMENTS:
Length: 4-6 pages double spaced, 1″ margins, 12 pitch type in Times New Roman font left justified format.Citations/References: You must use APA parenthetical style for this assignment. Provide 5-8 quality references as support

The post Provide a brief legislative history of the Bills appeared first on mynursinghomeworks.

[ad_2]

Source link

What are the methods a nurse can use to gather cultural information from patients?

[ad_1]

What are the methods a nurse can use to gather cultural information from patients? How does cultural competence relate to better patient care? Discuss the ways in which a nurse demonstrates cultural competency in nursing practic

The post What are the methods a nurse can use to gather cultural information from patients? appeared first on mynursinghomeworks.

[ad_2]

Source link

Assignment: Evidence-Based Capstone Project, Part 6: Disseminating Results

[ad_1]

Assignment: Evidence-Based Capstone Project, Part 6: Disseminating Results
The dissemination of EBP results serves multiple important roles. Sharing results makes the case for your decisions. It also adds to the body of knowledge, which creates opportunities for future practitioners. By presenting results, you also become an advocate for EBP, creating a culture within your organization or beyond that informs, educates, and promotes the effective use of EBP.
To Prepare:
Review the final PowerPoint presentation you submitted in Module 5, and make any necessary changes based on the feedback you have received and on lessons you have learned throughout the course.
Consider the best method of disseminating the results of your presentation to an audience.
To Complete:
Create a 5-minute, 5- to 6-slide narrated PowerPoint presentation of your Evidence-Based Project.
Be sure to incorporate any feedback or changes from your presentation submission in Module 5.
Explain how you would disseminate the results of your project to an audience. Provide a rationale for why you selected this dissemination strategy.
By Day 7 of Week 11
Submit Part 6, your revised PowerPoint presentation of your Evidence-Based Project.
Submission and Grading Information
To submit your completed Assignment for review and grading, do the following:
Please save your Assignment using the naming convention “WK11Assgn+last name+first initial.(extension)” as the name.
Click the Week 11 Assignment Rubric to review the Grading Criteria for the Assignment.
Click the Week 11 Assignment link. You will also be able to “View Rubric” for grading criteria from this area.
Next, from the Attach File area, click on the Browse My Computer button. Find the document you saved as “WK11Assgn+last name+first initial.(extension)” and click Open.
If applicable: From the Plagiarism Tools area, click the checkbox for I agree to submit my paper(s) to the Global Reference Database.
Click on the Submit button to complete your submission.
Grading Criteria
To access your rubric:
Week 11 Assignment Rubric
Check Your Assignment Draft for Authenticity
To check your Assignment draft for authenticity:
Submit your Week 11 Assignment draft and review the originality report.
Submit Your Assignment by Day 7 of Week 11
To submit your Assignment:
Week 11 Assignment
Congratulations! After you have finished all of the assignments for this Module, you have completed the course. Please submit your Course Evaluation by Day 7.

Sample Powerpoint Answer
Necessary Changes
The feedback indicated that it is necessary to select the research studies carefully to enhance the synthesis process. The selected studies should have a minimum threshold of all components of research including methodology, design, target population, and findings. Nurses should strive to adopt the necessary standardized languages to enhance the quality of communication. Critical reviews are essential in promoting the quality of research and thus positive and negative responses should be considered. The changes were meant to improve the approach to nursing, which focuses on improving the quality of treatment. Therefore, the feedback is necessary since the end goal is to improve patient outcomes and boost satisfaction.
Lessons
I learned that shared decision making was crucial in nursing practice since it boosts the quality of healthcare. Nurses should be involved in the Systems Development Life Cycle since they will utilize the system thus the need to involve them. The process of assessing various research papers is crucial in examining the quality of the research findings. Systematic reviews are essential in nursing practice since they present a summary of the research. Systematic reviews can be used in the nursing field to make crucial decisions. The development of the right PICO (T) question enhances the quality of diagnosis. Therefore, the lessons are crucial in improving the approach to nursing tasks since they need to be professional and utilize current and best evidence.
Disseminating Results
The process of disseminating knowledge or information requires a determination of the intention of disseminating the results and the target audience. the current scenario includes nurses and other health professionals as the main stakeholders. Academic journals are effective in disseminating the results in the nursing field. Academic journals are peer-reviewed and thus the information will be compatible with the audience. The peer-reviewed information can be used to enhance the quality of the practical nursing application. The target audience comprises of nurses and other healthcare professionals, students, and healthcare stakeholders. Journals have been used to present summaries of other research papers and disseminating them to the public.
Rationale
Nurses rely on peer-reviewed papers since they have been criticized and improved on before they are published. Compared to other sources of information, journals present the best and current evidence available. Academic journals are believable in nursing since they hold a high position in the research world. The findings comprise of practical findings that can be used to enhance the quality of healthcare practice. The journals are targeting scholars who can improve the research or use it as a resource while carrying out further studies. Academic journals will be posted on various sites such as PubMed which is used to post credible academic resources. It is the best method of disseminating
results since it is bias-free.
Rationale
The feedback provided shows that the study should be improved in different ways. The selected studies should have a minimum threshold of all components of research including methodology, design, target population, and findings. The responses are essential in boosting the quality of future research. The selected disseminating method is effective since it will reach out to the target audience of research. Nurses and students will appreciate the results of the work and thus they are the best target audience. The use of academic journals will enhance knowledge creation and trigger scholars to carry more research. Therefore, nurses should rely on academic journals to disseminate and acquire knowledge.

The post Assignment: Evidence-Based Capstone Project, Part 6: Disseminating Results appeared first on mynursinghomeworks.

[ad_2]

Source link

Assignment: Part 5: Recommending an Evidence-Based Practice Change

[ad_1]

The Assignment: (Evidence-Based Project)
Part 5: Recommending an Evidence-Based Practice Change
Create an 8- to 9-slide PowerPoint presentation in which you do the following:
• Briefly describe your healthcare organization, including its culture and readiness for change. (You may opt to keep various elements of this anonymous, such as your company name.)
• Describe the current problem or opportunity for change. Include in this description the circumstances surrounding the need for change, the scope of the issue, the stakeholders involved, and the risks associated with change implementation in general.
• Propose an evidence-based idea for a change in practice using an EBP approach to decision making. Note that you may find further research needs to be conducted if sufficient evidence is not discovered.
• Describe your plan for knowledge transfer of this change, including knowledge creation, dissemination, and organizational adoption and implementation.
• Describe the measurable outcomes you hope to achieve with the implementation of this evidence-based change.
• Be sure to provide APA citations of the supporting evidence-based peer reviewed articles you selected to support your thinking.
• Add a lessons learned section that includes the following:
o A summary of the critical appraisal of the peer-reviewed articles you previously submitted
o An explanation about what you learned from completing the evaluation table (1 slide)
o An explanation about what you learned from completing the levels of evidence table (1 slide)
o An explanation about what you learned from completing the outcomes synthesis table (1 slide)
Notes
Best Practices
Though just as identified in the appraisal, there are many interventions in heightening patient safety and preventing patient falls. However, I believe that the best practices involve the input of both the governance and the senior leadership. The input of both the senior leadership and governance can be reinforced with the utilization of an organizational structure that facilitates the identification and addressing of safety issues as well as technology adoption (Alexander et al. 2019).
Jähne-Raden (2019), notes that for patient safety measures to be needed, the basic idea is that there are areas of weaknesses in an organization’s safety precautions, which makes a change necessary in the organization. Change, on the other hand, though being an imperative aspect of any organizational development, is a daunting venture to succeed in. Change, irrespective of the segment it is supposed to be attained, is mostly not welcomed due to many reasons including a fear of the future and lack of insight on what the change is supposed to look like. Change resistance may lower employee morale, reduce efficiency, and disrupt the working environment (Austin et al., 2017). The part of making changes that foster the advancement of safety precautions requires the input of senior leadership. The individuals in the senior organizational level act as change agents who advocate for the change (Zhan, 2016). They lobby the entire organization towards a mentality of transitions that foster patient safety.
For an organization to transcend from a position of lower patient safety to a higher level there is a need for a well-planned strategy. The change itself is a process that is attained in multistep. Therefore, strategizing and having good governance may be imperative in ensuring that the desired patient safety practices are attained. In addition to having good governance, senior leadership, and good organizational structure, it is essential that the most advanced technologies for the detection and prevention of patient falls are implemented. Technology heightens efficiency and effectiveness, reduce cost, and heighten patient privacy just as identified by (Alexander et al. 2019)

References

Austin, J. M., Demski, R., Callender, T., Lee, K. K., Hoffman, A., Allen, L., … Peterson, R. R. (2017). From board to bedside: how the application of financial structures to safety and quality can drive accountability in a large health care system. The Joint Commission Journal on Quality and Patient Safety, 43(4), 166–175
Alexander, L., Swinton, P., Kirkpatrick, P., Stephen, A., Mitchelhill, F., Simpson, S., & Cooper, K. (2019). Health technologies for falls prevention and detection in adult hospital in-patients: a scoping review protocol. JBI Database Of Systematic Reviews And Implementation Reports, 17(5), 667–674. https://doi-org.ezp.waldenulibrary.org/10.11124/JBISRIR-2017-003844
Jähne-Raden, N., Kulau, U., Marschollek, M., & Wolf, K.-H. (2019). INBED: A Highly Specialized System for Bed-Exit-Detection and Fall Prevention on a Geriatric Ward. Sensors, 19(5), 1017.
Zhan, C. (2016). Health Services Information: Patient Safety Research Using Administrative Data. Data and Measures in Health Services Research, 1–24.

Evaluation Table

Use this document to complete the evaluation table requirement of the Module 4 Assessment, Evidence-Based Project, Part 4A: Critical Appraisal of Research.

Full citation of the selected article
Article #1 Article #2 Article #3 Article #4

 Austin, J. M., Demski, R., Callender, T., Lee, K. K., Hoffman, A., Allen, L., … Peterson, R. R. (2017). From board to bedside: how the application of financial structures to safety and quality can drive accountability in a large health care system. The Joint Commission Journal on Quality and Patient Safety, 43(4), 166–175

 Alexander, L., Swinton, P., Kirkpatrick, P., Stephen, A., Mitchelhill, F., Simpson, S., & Cooper, K. (2019). Health technologies for falls prevention and detection in adult hospital in-patients: a scoping review protocol. JBI Database Of Systematic Reviews And Implementation Reports, 17(5), 667–674. https://doi-org.ezp.waldenulibrary.org/10.11124/JBISRIR-2017-003844
 Jähne-Raden, N., Kulau, U., Marschollek, M., & Wolf, K.-H. (2019). INBED: A Highly Specialized System for Bed-Exit-Detection and Fall Prevention on a Geriatric Ward. Sensors, 19(5), 1017.
 Zhan, C. (2016). Health Services Information: Patient Safety Research Using Administrative Data. Data and Measures in Health Services Research, 1–24.

Conceptual Framework
Describe the theoretical basis for the study

Safety improvement in healthcare organizations requires the input of both the governance and the senior leadership. Positive input from both the senior leadership and management is imperative in the imposition of changes that are crucial in safety improvement. Safety improvement also requires an organizational structure that facilitates the identification and addressing of safety issues (Austin et al., 2017).

Alexander et al. (2019) notes that falls are a major public health concern. Though no one is immune to falls, fatal falls are most prominent in older people. Falls have a detrimental impact both to the individual and to a country. At an individual level, falls can result in loss of independence, disability, and pain. At the country level, falls result in an increased cost of care provision. The rates of falls are predicted to increase with the predicted increase in the number of people aged 65 years and above. Due to the detrimental impact of falls and the expected increase the number of those most prone to falls, it is imperative to deduce interventions that can be utilized in fall prevention. One of the most utilized resources in fall prevention is technology. Technology is utilized both in the detection and the prevention of falls. There is a host of literature that affirms the vitality of fall prevention and detection technologies, which makes it difficult for policymakers to recommend the most effective technology in fall detection and prevention. Alexander et al. (2019) performed a scoping review to map the evidence related to falls prevention and detection in the in-patient setting. Risk of patient fall is high in geriatric institutions. The falls result in femoral neck and fractures, which may result in a heightened cost of care provision and serious consequences. Due to the current number of elderly people, there is a need for the invention of a smart solution for the prevention of falls in a patient’s daily life as well as in the clinical setting (Jähne-Raden et al., 2019).
Administrative data are a crucial source of information that can be used in heightening patient safety. The information available in the administrative data could be used in the development of technology and other resources that are crucial in elevating patient safety. The main challenge with the administrative data is with the method used in obtaining data. The lack of a well-established channel of data retrieval makes the utilization of the administrative data a challenge. Due to this challenge posed on other researchers who would like to utilize administrative data, it is important to highlight some of the methods that can be used in the retrieval of information from the administrative data (Zhan, 2016).

Design/Method Describe the design
and how the study
was carried out
A reporting and oversight framework was used with the application of four different principles: internal audits to ensure accuracy and reliability of quality and safety data, a consolidated quality performance statement to ensure transparency around priorities and goals, governance from shared accountability between clinical leadership and the board, and the hospital board’s dedicated patient safety and quality committee (Austin et al., 2017).

The researchers performed a scoping review to map the evidence related to fall prevention and detection in the in-patient setting. A search of Epistemonikos, EPPI (DoPHER), PEDro, Cochrane Library (reviews; protocols), JBI Database of Systematic Reviews and Implementation Reports, CINAHL, and MEDLINE were used in the identification of systematic reviews on specific aspects of fall detection and fall prevention technologies, in specific settings and in specific populations, mostly in relation to community-dwelling older adults (Alexander et al., 2019) The researchers used the Inexpensive Node for bed-exit Detection (INBED) and prevention of falls. The researchers gathered information on the stringent requirements for the Inexpensive Node for bed-exit Detection (INBED) (Jähne-Raden et al., 2019).
The researcher presents findings of a literature review on the methods of information retrieval from administrative data (Zhan, 2016).
Sample/Setting
The number and
characteristics of
patients,
the attrition rate, etc. The research was conducted at Johns Hopkins Medicine (Austin et al., 2017).

The review considered literature that included in-patient adults aged 18 years and over. The participants considered in the literature review were defined as being admitted to a setting for patient care activity taking place in hospital settings. The settings included long-stay rehabilitation units, secondary care, and day-care (community hospital care settings, elective and non-elective (accident and emergency/emergency admission) (Alexander et al., 2019). The researchers used patients in geriatric wards. The number of patients used is not specific, but the patients incorporated in the research had a functional motoric deficit and a high-risk of fall (Jähne-Raden et al., 2019). There is no specific sampling method indicated.
Major Variables Studied
List and define dependent and independent variables The dependent variables included value, safety, and quality while the independent variables are the four principles used in the reporting and oversight framework (Austin et al., 2017).

The main dependent variable in the research is patient falls. Patient fall is the act of a sick individual inadvertently coming to rest on the floor, the ground, or other lower levels.

The independent variables, on the other hand, are technologies used in fall prevention and detection like the bed alarm (Alexander et al., 2019). The dependent variable is patient fall during bed exit while the independent variable is the requirements of the Inexpensive Node for bed-exit Detection (INBED) in fall detection and prevention (Jähne-Raden et al., 2019). The dependent variable is patient safety, while the independent variable is the research methods used in obtaining information from administrative data (Zhan, 2016).

Measurement
Identify primary statistics used to answer clinical questions The information on patient safety and prevention is used in indicating how the framework works at Johns Hopkins Medicine (Austin et al., 2017).
Some of the measurements taken include expert opinions, reports, systematic reviews, and quantitative data from different sects, including quasi-experimental, observational, and experimental quantitative data. Government report data were also considered as a measurement for the number of falls with the utilization of different fall detection and prevention technologies (Alexander et al., 2019).
The system measures patient’s attempt to get up and notifies the nurses (Jähne-Raden et al., 2019).
there is no specific measurement
Data Analysis
Statistical or
qualitative
findings The information is analyzed statistically with the provision of statistical reduction in the incidences of fall and hospital acquired infection (Austin et al., 2017).
After data retrieval, a scoping review was to be conducted based on the Joanna Briggs Institute (JBI) methodology for scoping reviews (Alexander et al., 2019).
The research avails statistical data on the effectiveness of the Inexpensive Node for bed-exit Detection (INBED) on patient fall detection and prevention (Jähne-Raden et al., 2019). There is no insight into how the author came to their conclusions.

Findings and Recommendations
General findings and recommendations of the research The four principles are effective in heightening value, safety, and quality(Austin et al., 2017).
The article presents information on a research that is to be conducted. However, the findings will be crucial in informing policy makers on the best technology to incorporate at different levels in detecting and preventing falls (Alexander et al., 2019).
The research result led to the development of a multi-component system, effective patient movement, and fall detection. The researchers, therefore, recommend its implementation in the prevention of patient fall in geriatric institutions.
The authors recommend several strategies that can be adopted when administrative data is used in patient safety

Appraisal
Describe the general worth of this research to practice. What are the strengths and limitations of the study? What are the risks associated with the implementation of the suggested practices or processes detailed in the research? What is the feasibility of
use in your practice? The main strength of the study is that it is an experimental study which avails first-hand data on the outcomes. However, the research is not coupled with any method of countering the errors that may emanate from the study. It is difficult to ascertain whether the findings are due to the factors indicated or as a result of an external variable.
The study is crucial in informing policymakers on the best technology to implement in preventing and detecting patient falls. The main strength of the research is the utilization of data from a wide scope of secondary sources, which helps in ensuring that the research is credible. One of the most prominent limitations of the research is the utilization of secondary data. It is difficult to ascertain the level of truth in secondary data as compared to primary data. The research does not also include a method of ensuring research validity and trustworthiness. The research does not have results for a recommended technology to adopt in fall detection and prevention. The possible results of the study could be incorporated into clinical practice to prevent and detect patient falls. The research does not contain a control experiment making it difficult to ascertain whether it is the most effective method of patient fall detection and prevention. The intervention does not prevent all patient falls, and this still poses a high level of danger which the research intended to eliminate in initially. The main advantage of the intervention is that it heightens a patient’s privacy compared to the other fall detection and prevention interventions. The data retrieved from the experiment could be used in the implementation of INBED in geriatric centers to prevent patient falls. However, the data is not transferable to the entire population.
The insight from the article is not credible, dependable, conformable, or even valid.

General Notes/Comments

the result offers data that can be used in other care settings in heightening patient safety.

The study seems to utilize a method that could be effective in the detection and prevention of patient falls. The research still leaves a gap and does not offer the maximal benefit expected. There is no channel of information retrieval in the article, which makes it a poor source of information on the best methods of heightening patient safety.

Levels of Evidence Table

Use this document to complete the levels of evidence table requirement of the Module 4 Assessment, Evidence-Based Project, Part 4A: Critical Appraisal of Research.

Author and year of the selected article
Article #1 Article #2 Article #3 Article #4

 Austin, J. M., Demski, R., Callender, T., Lee, K. K., Hoffman, A., Allen, L., … Peterson, R. R. (2017). From board to bedside: how the application of financial structures to safety and quality can drive accountability in a large health care system. The Joint Commission Journal on Quality and Patient Safety, 43(4), 166–175

 Alexander, L., Swinton, P., Kirkpatrick, P., Stephen, A., Mitchelhill, F., Simpson, S., & Cooper, K. (2019). Health technologies for falls prevention and detection in adult hospital in-patients: a scoping review protocol. JBI Database Of Systematic Reviews And Implementation Reports, 17(5), 667–674. https://doi-org.ezp.waldenulibrary.org/10.11124/JBISRIR-2017-003844
 Jähne-Raden, N., Kulau, U., Marschollek, M., & Wolf, K.-H. (2019). INBED: A Highly Specialized System for Bed-Exit-Detection and Fall Prevention on a Geriatric Ward. Sensors, 19(5), 1017.
 Zhan, C. (2016). Health Services Information: Patient Safety Research Using Administrative Data. Data and Measures in Health Services Research, 1–24.

Study Design
The theoretical basis for the study

Safety improvement in healthcare organizations requires the input of both the governance and the senior leadership. Positive input from both the senior leadership and governance is imperative in the imposition of changes that are crucial in safety improvement. Safety improvement also requires an organizational structure that facilitates the identification and addressing of safety issues.

Patient fall is an issue of concern to public health. Despite the existence of numerous technologies in fall detection and prevention, there exist insufficient data to recommend a specific technology as the most effective in detecting and preventing patient falls. The researchers, therefore, perform a scoping review to map the evidence relating to the evaluation and reporting of health technologies for the detection and prevention of patient falls.
Risk of patient fall is high in geriatric institutions. The falls result in femoral neck and fractures, which may result in a heightened cost of care provision and serious consequences. Due to the current number of elderly people, there is a need for the invention of a smart solution for the prevention of falls in a patient’s daily life as well as in the clinical setting.
Administrative data are a crucial source of information that can be used in heightening patient safety. The information available in the administrative data could be used in the development of technology and other resources that are crucial in heightening patient safety. The main challenge with the administrative data is with the method used in obtaining data. The lack of a well-established channel of data retrieval makes the utilization of the administrative data a challenge. Due to this challenge possed on other researchers who would like to utilize administrative data, it is important to highlight some of the methods that can be used in the retrieval of information from the administrative data.

Sample/Setting
The number and
characteristics of
patients
the research was conducted at Johns Hopkins Medicine

The review considered literature that included in-patient adults aged 18 years an over. The participants considered in the literature review were defined as being admitted to a setting for patient care activity taking place in hospital settings. The settings included long-stay rehabilitation units, secondary care, and day-care (community hospital care settings, elective and non-elective (accident and emergency/emergency admission.)
The researchers used patients in geriatric wards. The number of patients used is not specific, but the patients incorporated in the research had a functional motoric deficit and a high-risk of fall
there is no specific sampling method indicated.
Evidence Level *
(I, II, or III)

I III I v
Outcomes

the four principles (internal audits to ensure accuracy and reliability of quality and safety data, a consolidated quality performance statement to ensure transparency around priorities and goals, governance from shared accountability between clinical leadership and the board, and the hospital board’s dedicated patient safety and quality committee) are effective in heightening safety, value, and quality Data on the best technology for the prevention and detection of patient fall detection and prevention. The research led to the development of a multi-component system with a core wearable device used in movement detection. Occurring events are forwarded to the nursing staff who come to assist the patient.
The authors present different methods of retrieving information from administrative data
General Notes/Comments

the research results are valid, credible, and transferable.

The research results are useful in the detection and prevention of patient falls. The research results are not satisfying as the evidence cannot be applied in all care settings. Additionally, the intervention does not prevent all patient falls, which makes it an ineffective method of fall prevention and detection.
The results are provided without indication of any channel used in data retrieval, which makes the information invalid.

* Evidence Levels:

• Level I
Experimental, randomized controlled trial (RCT), systematic review RTCs with or without meta-analysis

• Level II
Quasi-experimental studies, a systematic review of a combination of RCTs and quasi-experimental studies, or quasi-experimental studies only, with or without meta-analysis

• Level III
Nonexperimental, a systematic review of RCTs, quasi-experimental with/without meta-analysis, a qualitative, qualitative systematic review with/without meta-synthesis
• Level IV
Respected authorities’ opinions, nationally recognized expert committee/consensus panel reports based on scientific evidence
• Level V
Literature reviews, quality improvement, program evaluation, financial evaluation, case reports, nationally recognized expert(s) opinion based on experiential evidence

Outcomes Synthesis Table

Use this document to complete the outcomes synthesis table requirement of the Module 4 Assessment, Evidence-Based Project, Part 4A: Critical Appraisal of Research.

Author and year of the selected article
Article #1 Article #2 Article #3 Article #4

 Austin, J. M., Demski, R., Callender, T., Lee, K. K., Hoffman, A., Allen, L., … Peterson, R. R. (2017). From board to bedside: how the application of financial structures to safety and quality can drive accountability in a large health care system. The Joint Commission Journal on Quality and Patient Safety, 43(4), 166–175

 Alexander, L., Swinton, P., Kirkpatrick, P., Stephen, A., Mitchelhill, F., Simpson, S., & Cooper, K. (2019). Health technologies for falls prevention and detection in adult hospital in-patients: a scoping review protocol. JBI Database Of Systematic Reviews And Implementation Reports, 17(5), 667–674. https://doi-org.ezp.waldenulibrary.org/10.11124/JBISRIR-2017-003844
 Jähne-Raden, N., Kulau, U., Marschollek, M., & Wolf, K.-H. (2019). INBED: A Highly Specialized System for Bed-Exit-Detection and Fall Prevention on a Geriatric Ward. Sensors, 19(5), 1017.
 Zhan, C. (2016). Health Services Information: Patient Safety Research Using Administrative Data. Data and Measures in Health Services Research, 1–24.

Sample/Setting
The number and
characteristics of
patients the research was conducted at Johns Hopkins Medicine
The researchers utilized research that used participants aged 18 years and above. The patients were situated in either long-stay rehabilitation units, secondary care, and day-care (community hospital care settings, elective and non-elective (accident and emergency/emergency admission.)
The researchers used patients in geriatric wards. The number of patients used is not specific, but the patients incorporated in the research had a functional motoric deficit and a high-risk of fall
there is no specific sampling method indicated.
Outcomes

the four principles (internal audits to ensure accuracy and reliability of quality and safety data, a consolidated quality performance statement to ensure transparency around priorities and goals, governance from shared accountability between clinical leadership and the board, and the hospital board’s dedicated patient safety and quality committee) are effective in heightening safety, value, and quality The possible outcomes of the study are information that maps the evidence relating to the evaluation and reporting of health technologies for the detection and prevention of falls in adult hospital in-patients. The research led to the development of a multi-component system with a core wearable device used in movement detection. Occurring events are forwarded to the nursing staff who come to assist the patient.
The authors present different methods of retrieving information from administrative data
Key Findings
It is important to engage individuals at all organizational levels in a heightening the quality, safety, and value of care. The possible findings are the best technologies in fall detection and prevention and the gap in the available studies.
The main finding is that the intervention helps in heightening a patient’s privacy and personal freedom of movement while relieving the nursing staff significantly. The authors identify the Advantages and Challenges in Administrative
Data-Based Patient Safety Research.
Appraisal and Study Quality
The results from the research are credible, transferable, and valid. The study is to be performed in a stepwise manner with all the steps identified. The information retrieved will be credible, dependable, and transferable. The study result is credible, dependable, and conformable. However, the result is not transferable to all care settings.
The insight from the article is not credible, dependable, conformable, or even valid.

General Notes/Comments The research offers insight into an intervention that can be adopted in heightening patient safety.

The research will avail crucial insight that will be useful in fall detection and prevention. The study does not wholly resolve the challenge of patient fall as the tool is not effective in preventing all types of falls. The result cannot be used in any clinical setting due to the absence of a clear channel used in obtaining the information.

References

Austin, J. M., Demski, R., Callender, T., Lee, K. K., Hoffman, A., Allen, L., … Peterson, R. R. (2017). From board to bedside: how the application of financial structures to safety and quality can drive accountability in a large health care system. The Joint Commission Journal on Quality and Patient Safety, 43(4), 166–175
Alexander, L., Swinton, P., Kirkpatrick, P., Stephen, A., Mitchelhill, F., Simpson, S., & Cooper, K. (2019). Health technologies for falls prevention and detection in adult hospital in-patients: a scoping review protocol. JBI Database Of Systematic Reviews And Implementation Reports, 17(5), 667–674. https://doi-org.ezp.waldenulibrary.org/10.11124/JBISRIR-2017-003844
Jähne-Raden, N., Kulau, U., Marschollek, M., & Wolf, K.-H. (2019). INBED: A Highly Specialized System for Bed-Exit-Detection and Fall Prevention on a Geriatric Ward. Sensors, 19(5), 1017.
Zhan, C. (2016). Health Services Information: Patient Safety Research Using Administrative Data. Data and Measures in Health Services Research, 1–24.

Sample Solutions

The post Assignment: Part 5: Recommending an Evidence-Based Practice Change appeared first on mynursinghomeworks.

[ad_2]

Source link

A Second Chance For All English Literature Essay

[ad_1]

Resurrection is a flawless example of a second chance. In the case of resurrection, you are given a second chance at life itself. Although on a more minor scale; another element that represents a second chance, is that of forgiveness. In the case of forgiveness, you are given a second chance in one aspect of your life. Both of the illustrations are prevalent in A Tale of Two Cities Charles Dickens. For all intents and purposes, A Tale of Two Cities could very well be referred to as the book of second chances.

Our Gothic tale begins by giving a slight amount of background on what was going on around the setting of London and Paris. Then, leaving much still a mystery, we are launched right into the story of Dr. Manette’s long imprisonment and rescue. Mr. Lorry travels to Paris with “Recalled to life” on his mind. That is what he was to do in Paris, recall someone to life. The ‘someone’ that Mr. Lorry successfully recalled to life, freeing him after eighteen years of imprisonment and awakening his mind to the present, was none other than the good Doctor Manette.

Before his imprisonment Dr. Manette had been an upstanding individual who had meaning to his life. But for years now, the Doctor had no hope. He spent the eventless hours of his life making shoes. Not because he was a shoemaker, but because there was nothing else for him to do. Doctor Manette’s life was all but forfeit. This is why when he was called back to life, into the present time; it was as if he was resurrected to a new life. Dickens leaves the topic of Doctor Manette’s resurrection and moves on to the trial of Charles Darnay.

Charles Darnay was a man, accused of treason, and sentenced to a most gruesome death. He was defended by a man named striver but his real savior was, his lookalike, Carton. The crowd that had gathered at his trial was thirsty for blood; but in the end Charles Darnay was acquitted. Darnay was once so close to death that his acquittal acted as a second chance to live. This is another painting of resurrection; the signature on the painting is, of course, that of Charles Dickens.

Charles Darnay is from the lineage of a powerful and cruel family in France. This family had been directly responsible for suffering that Dr. Manette witnessed while imprisoned. Without divulging this information, Darnay begins to court Miss Manette. When Darnay does finally explain his lineage to the Doctor he is expecting the worst. But as Dr. Manette once received another chance to live, he passed on that second chance at a new life. Darnay does very well with his fresh start until he receives a letter from Gabelle requesting that Darnay come to his rescue. Gabelle is a man watching over his family’s estate; he was captured and help by the French revolutionaries.

Darnay returns to his old homeland despite the possibility of ruining his second chance at life. In France Darnay is detained by revolutionaries and sentenced to death for his family’s crimes. In the end he narrowly escaped with his life. This escape is yet another example of a resurrection or a second (in Darnay’s case a third) chance. But the means of his escape is what brings us to our final example of a second chance.

Sydney Carton, Darnay’s lookalike, had not been content with his life. He had been a drunk who didn’t amount to much; he was also deeply in love with Lucie Manette. The second chance he received was not a second chance at life per say, but it was the chance to make something of his life. That was just the chance Carton had been looking for. With his similar face to Darnay enabling him, and his love for Lucie empowering him he traded places with the condemned Darnay. This brave action resurrected Carton’s self image, his worth in life, and it saved Darnay all at once. Carton’s sacrifice would always be remembered by the people that Carton cared about most; and to him, that is what mattered most.

Charles Dickens is obviously a man that believes in second chances for all, and in some cases even third chances. Dickens did not discriminate in this; many different types of characters received a second chance. Doctor Manette was certainly not imprisoned because of wrong doing; but more likely because someone disagreed with the beliefs that he stood up for. Charles Darnay was no cretin, though he truly did have a shady background from which he delivered himself. Dr. Manette trusted Darnay to turn his new life around and leave the old one behind, despite the strong feelings of animosity toward Darnay’s family.

Out of all the characters given second chances throughout Dickens’s book, Carton made the greatest use of the gift. Sydney Carton’s life was nearly moot before the opportunity came to him. But when given his second chance, he used it to change his life and to outshine every other character in the book. Dickens is an advocate of giving second chances.

The post A Second Chance For All English Literature Essay appeared first on mynursinghomeworks.

[ad_2]

Source link

Money Makes The World Go Round English Literature Essay

[ad_1]

The quotation ‘money makes the world go round’ was first used in a musical play ‘ Cabaret’, it was written in the 1960’s. the play was a melancholy one, in one of the songs the female lead expresses her wish for love, the male protagonist replies with this line in the song. The main aim of this line was to say that it is money that makes the world turn, not nobility or love. It highlights the fact that our society is heavily dependent on money. [1] Charles Dickens further stresses this point in his novel ‘ Dombey and Son’ where Paul asks his father about the powers of money. Hisfather replies it can do everything, little Paul then intelligently questions his dad as to why money did not save his mother. Charles Dickens very clearly portrays both sides of the argument.

The phrase basically means that everything in this world would stop without money. To some extent this statement is true because without money you cannot afford a shelter on your head, have food, go from point A to point B, etc. It is often said that money can take you places, in many instances it proves true because money can and often does open up many doors for a person.

However, in today’s world we are all too preoccupied with the notion of acquiring wealth, so much so that other aspects of life that are equally important are neglected. The main reason behind this is our distorted view of success. The word ‘success’ is usually taken to mean material success; the more the money the more successful one is. This includes the amount of money one earns, the type of car he drives or the size of his house.

The importance of money becomes very clear when a person has no money, Money for a poor person is everything, it becomes very important for him to earn so that he can fulfill his basic needs. However, recently everyone has become consumption oriented. We want to buy anything that is new on the market and catches our interest and we are falling prey to the attractive packaging and advertisiments of a product. Thus we buy things that we have little need for which in turn makes us want more money.

Money enables us to afford a better quality of life; more money means bigger and better houses and cars, better quality products, better entertainment etc. Another advantage is less stress in paying bills and other household expenses. Money may also allow a person to persue his dreams, for example a person who wants to attain higher education may not be able to without money. Literature also supports this in many places, one such example is where Charles Dickens in another Novel ‘A Christmas Carol’ [2] shows how love is pushed aside for money. This happens when young Ebenzer Scrooge had made a promise to a girl Belle to provide for her, however Belle chooses a crooked businessman Jacob as he offers her a quick gain of fortune to the girl.

A number of quotations from the book ‘the great Gatsby’ by F.Scott Fitzgerald [3] also highlight the importance of money. One such quote mentioned the effect that money has on Gatsby when he is unable to even speak in front of Daisy Buchnan as he gets intimidated by her wealth.

This shows how wealth encompasses every aspect of our lives, so much so that it even reflects in the voice and mannerisms of a person. Another description from the same book is about a character Tom whose wealth has given him a lot of power. It allows him to treat others how ever he likes and his elitist nature also makes him condescending towards other people. Thus another thought is that wealth gives one power.

Money may be a motivator it influences human activity from geological exploration to politics. Money itself may not be evil, it is the greed for money that becomes the root of evil. Despite popular arguments I believe that money does not make the world go around. ‘we have created the monster and allowed it to take over and control our lives’. [4] Even though money does have some importance in our lives as every aspect of our lives revolves around money, but if we tried to be content with less we may not face such dependency. The variety of products that we are faced with makes it very difficult for us to be content with what we have.

We have made money so central to our lives that we place it above life and even happiness. This never ending pursuit of money has made the society a selfish one. People forget that there are many things that money can’t buy. A Chinese proverb summarizes this argument very well by saying that money can buy a house but it cannot make a home, that it can not buy time, sleep knowledge, health, respect and a good life only the material aspects can be bought but not ones that come from within. Stephen R. Covey in his book ‘ seven habits of highly effective people also mentions that some of us tend to be centered around money and so our sense of security and happiness is directly related to how much money we have and since its human nature to never be satisfied with what one has he is likely to remain unhappy most of the time. Even a huge increase in wealth is unlikely to satisfy such a person. For this purpose we need to alter our centres to what we really want at the end of our lives.

Money can buy a lot of things but it cannot buy good health, respect, love, inner peace etc as these only come from good principles. A person can have million in his bank account but still feel poor because he is not content with his life, more money gives him only minimal satisfaction. Security come from within from knowing that what you have is enough for you to be happy, it comes from believing in your self. All of us tend to think that happiness comes from outside i.e. through money. A short story that supports this notion is “A Christmas Memory’ by Truman Capote it is the story of a child who does not get anything for Christmas except handed down and worn out except for a kite but he is still satisfied and goes out to fly it. In another instance was when the family was offered money for a new Christmas tree but they refused it believing that their old tree was more precious and nothing could replace it. Both these examples reflect the importance of contentment and satisfaction over money.

One important error that we make is that we equate money with success, this is not true. Success can be divided into 8 categories, these are: health, personal needs, family, career, spiritual, financial and community. To be truly successful you need to be more than just financially successful.

There have been many cases whereby a rich man was unable to spend all his fortune due to his health and died despite his accumulated wealth. Such a man cannot be called wealthy as all that he accumulated was left behind, and it was not able to help him when he needed help the most. Thus a rich person who lacks in other aspect of life is as good as being poor. Let us not get carried away with the idea of acquiring wealth and money and fail to consider other aspects of our life.

The post Money Makes The World Go Round English Literature Essay appeared first on mynursinghomeworks.

[ad_2]

Source link