Saturday, January 25, 2020

Waves On Pregnant Women Health And Social Care Essay

Waves On Pregnant Women Health And Social Care Essay Waves have been applied to many important procedures nowadays. In this article I am going to investigate the application of waves on pregnant women. One of the very important topics is the application of ultrasonography in prenatal checkup; therefore I would focus on this topic and discuss its principle and advantages among other different methods of prenatal checkup. Nonetheless waves do not only bring benefits to pregnant women, but also harm. There are some electromagnetic waves (or EM waves) which may be harmful to both the mothers and the fetuses, such as X-ray. Yet, will pregnant women really have an increased risk of miscarriage after having an X-ray? Recently there are also concerns about the effect of radio waves and microwaves on pregnancy. In this article I am going to investigate them one by one. Obstetric Ultrasonography Ultrasonography refers to the use of ultrasound. Ultrasound is longitudinal wave, it has the same speed as audible sound wave in air, which is 340ms-1. The main difference between audible sound wave and ultrasound is that ultrasound has a frequency beyond audible range of human, which is around 20 Hertz (20 Hz) to 20 kilohertz (20 kHz or 20,000 Hz). Normally the frequency of ultrasound used in prenatal checkup is ranged from 1.6 to 10 megahertz (MHz), depending on what structures of the fetuses are being examined. Ultrasound with lower frequency can penetrate deeper into body tissues, because the higher the frequency, the more ultrasonic waves are being absorbed instead of reflected, thus while examining deeper tissues like the liver and kidney, ultrasound with lower frequency (around 1.6-6MHz) is used. In the ultrasonography, ultrasound waves are emitted by a device called transducer. Actually the term transducer refers to a device which converts one form of energy into another, so there are lots of types of transducer. In the ultrasonography, an electroacoustic transducer is used to convert electricity to emit and receive ultrasound; therefore to be more exact, the device used is also called an ultrasound transceiver. The transducer is placed on the abdomen of the pregnant woman, the ultrasound emitted penetrates the skin and then reaches the foetus and other internal organs of the mother. The waves are then reflected back to the transceiver, the transceiver senses the waves and converts them into images. An ultrasound transceiver: http://l.b5z.net/i/u/6062479/i/transducer_tn.jpg source: http://www.chesapeakeultrasound.com/ultrasound_products An ultrasonography: http://gulfcoastmri.files.wordpress.com/2010/06/sonogram-human-foetal-fetal-ultrasound-scan-at-22-weeks-mono-1-anon.jpg Source: http://gulfcoastmri.wordpress.com/2010/06/07/obstetric-ultrasonography/ In case that the pregnant woman is in early pregnancy or obese, she can undergo transvaginal sonography, which a probe is placed in the womans vagina. Sometimes the test is also carried out if the pregnant woman has got abnormal vaginal bleeding or pelvic pain. This type of sonography has the similar principle as the ultrasonography mentioned above. Some mothers may want to see the heartbeat of their babies, they can carry out the Doppler sonography. It has basically the same principle as the ultrasonography except the ultrasound is further enhanced by Doppler Effect. Generally the fetuss heartbeat can be detected after 7 weeks of gestation, thus the blood flow of the fetus can be detected as well. The blood flows in a circulation in the body of the fetus, the Doppler sonography can thus detect the change in directions of blood flow by Doppler effect and see if the circulation is normal or not. This can be done by measuring the change in the frequency received in the transceiver. In fact there are a few more types of prenatal checkup, such as amniocentesis and chronic villus sampling. Nonetheless, the ultrasonography is the safest way for diagnosis. The ultrasonography only involves a transducer placing outside the mothers abdomen, while amniocentesis and chronic villus sampling require mechanical penetration and sampling inside the mothers uterus or abdomen, this increases the risk of miscarriage during the tests. Despite this fact, ultrasonography can only give an early diagnosis of the mothers and fetuses, it cannot treat anomalies or genetic diseases. According to the test conducted by RADIUS study group in 1993, researchers found that obtaining sonography has no significantly negative effect on reducing perinatal morbidity or mortality among the fetuses or the mothers. Moreover, the detection of anomalies actually did not alter the outcome of newborn babies. Therefore it is important to acknowledge that ultrasonography is just a test whether the fetuses are healthy, but not a treatment to anomalies. Harmful effect of X-ray X-ray is an electromagnetic wave with a wavelength ranged from 0.01 to 10 nanometers (0.01-10 x10-9m). It has a speed of 3108 ms-1 in vacuum. In fact, X-ray is commonly used in medical treatments, such as radiation therapy of cancer and medical imaging technology. X-ray is produced in an X-ray tube. In the X-ray tube, electrons are accelerated by applying a high voltage. Electrons then collide with a metal, and the sudden deceleration of electrons results in the emission of X-ray. An X-ray tube: http://hyperphysics.phy-astr.gsu.edu/hbase/quantum/imgqua/xtube.gif Source: http://hyperphysics.phy-astr.gsu.edu/hbase/quantum/xtube.html X-ray has high ionizing power, thus there are many people worrying about the harmful effects of having an X-ray diagnosis, especially pregnant women. It is true that a very high dose of radiation from X-ray may result in radiation sickness. Prolonged and continuous exposure to X-ray also increases the risk of cancer development, and in pregnant women, there may also be a risk for the fetus to develop childhood cancer or even miscarriage. Nevertheless, it seems that the harmful effects of exposing to X-ray are exaggerated. The serious harmful effects mentioned above are just the results of high dosage in a short period of time. There are different kinds of X-rays, one type is used in scanning or diagnosis, one type is used in treating cancer. The energy stored in different types of X-rays is different. For normal X-ray scanning, the dosage is extremely small. The absorbed dose of X-ray is measured in rad, which 1 rad = 1010-3 J kg-1 = 10-2 J kg-1. If a pregnant woman is having a chest X-ray, the estimated fetal dose is around 60 millirads, the dose is around 290 millirads for an abdominal X-ray. This is quite a low value, as the dose from the radiation from outer space is around 90-100 millirads. In fact, the risk of the fetus having eye abnormalities or mental retardation increases only when the dosage exceeds 10 rads, therefore it is very rare that pregnant women suffer from harmful effects by the X-ray radiation. According to the  American Academy of Family Physicians, generally X-rays are safe even for pregnant women, and according to radiologists, no single diagnostic x-ray has a radiation dose signi ficant enough to cause adverse effects in a developing embryo or fetus. Normally doctors will not ask pregnant women to undergo an X-ray scanning, unless when it is urgent and necessary. It is also suggested that pregnant women should tell the radiologists about the pregnancy, so that radiologists can adjust the radiation level to better protect the mothers and the fetuses. To conclude, many people are afraid of having X-ray scanning when they are pregnant, but in fact the risk is not that high if we compare the dosage to the exposure to outer space radiation. An X-ray film showing pregnancy: http://www.neurobodyfit.com/wp-content/uploads/2012/03/xray-pregnancy.jpg Source: http://www.neurobodyfit.com/x-rays-are-safe-during-pregnancy/ Concerns of radio waves and microwaves Besides X-ray, some people are concerning about the effect of radio waves and microwaves on pregnancy. In fact the effect of these two types of EM waves is even less than X-ray. There has been a study investigating the relationship between exposure of radio waves and microwaves of female physiotherapists, and the ratio of miscarriage. Due to occupational use, physiotherapists are very often exposed to medical equipment emitting microwaves diathermy and radio waves. According to the study, investigators compared the odd ratios between those pregnant physiotherapists and other pregnant women. The results showed that the risk of miscarriage was not associated with reported use of diathermy equipment, thus people need not worry too much about this issue. A microwave diathermy: http://image.ec21.com/image/medicm/oimg_GC04993002_CA04993086/Microwave_Diathermy_HM-801C.jpg Source: http://medicm.en.ec21.com/Microwave_Diathermy_HM_801C4993002_4993086.html Conclusion Waves have been widely used in medical equipment, and there are several applications of waves on pregnancy. Ultrasonography is the most common and the safest method of prenatal checkup. Though it can be used in diagnosis, it is unable to treat diseases in fetus. Many people concern about the side effects of using X-ray, microwaves and radio waves, however it is in fact very safe because the dosage of radiation is extremely small. Therefore people need not worry too much about the risk of miscarriage caused by exposure to these waves.

Friday, January 17, 2020

Cyber Crime and Targets

The internet has put the world literally at anyone’s fingertips with a vast quantity of information is a mouse-click away. Information that was once only available in obscure reference libraries or card catalogs can be accessed by everyone. Unfortunately the internet is an equal opportunity tool, and those with virtuous as well as nefarious intentions can use this open resource to further their efforts to levels heretofore unheard of. The internet is also soapbox for free speech that epitomizes the intentions of the founding fathers to allow everyone the same opportunity to have their opinions aired.There is a line that often blurs between legitimate and illegal behavior, when does harsh criticism become bullying, when does an expression of affection become harassment and how do the authorities differentiate between someone looking up an old classmate for rekindle a friendship and stalking a former girlfriend that spurned their overtures. The constitutional protections of free speech and requirements of specificity of regulations make the criminalization of inappropriate behavior.CAUSES OF CYBER – CRIMEThere are many reasons why cyber-criminals commit cyber-crime, chief among them are these three listed below:Cyber-crimes can be committed for the sake of recognition. This is basically committed by youngsters who want to be noticed and feel among the group of the big and tough guys in the society. They do not mean to hurt anyone in particular; they fall into the category of the Idealists; who just want to be in spotlight. Another cause of cyber-crime is to make quick money. This group is greed motivated and is career criminals, who tamper with data on the net or system especially, e-commerce, e-banking data information with the sole aim of committing fraud and swindling money off unsuspecting customers.Thirdly, cyber-crime can be committed to fight a cause one thinks he believes in; to cause threat and most often damages that affect the recipients adversely. This is the most dangerous of all the causes of cyber-crime. Those involve believe that they are fighting a just cause and so do not mind who or what they destroy in their quest to get their goals achieved. These are the cyber-terrorists.HOW TO ERADICATE CYBER – CRIMEResearch has shown that no law can be put in place to effectively eradicate the scourge of cyber-crime. Attempts have been made locally and internationally, but these laws still have shot-comings. What constitutes a crime in a country may not in another, so this has always made it easy for cyber criminals to go free after being caught.These challenges notwithstanding, governments should in the case of the idealists, fight them through education not law. It has been proven that they help big companies and government see security holes which career criminals or even cyber-terrorist could use to attack them in future. Most often, companies engage them as consultants to help them build solid security for t heir systems and data.â€Å"The Idealists often help the society: through their highly mediatised and individually harmless actions, they help important organizations to discover their high-tech security holes†¦.†# The enforcement of law on them can only trigger trouble, because they would not stop but would want to defy the law. â€Å" Moreover, if the goal of the cyber-crime legislation is to eradicate cyber-crime, it mint well eradicate instead a whole new culture, in education is a much better way to prevent their actions.Another means of eradicating cyber-crime is to harmonize international cooperation and law, this goes for the greed motivated and cyber-terrorists. They can not be fought by education, because they are already established criminals, so they can not behave. The only appropriate way to fight them  is by enacting new laws, harmonize international legislations and encourage coordination and cooperation between national law enforcement agencies.WHO AR E INVOLVED:Those involved in committing cyber-crimes are in three categories and they are: THE IDEALISTS (Teenager). They are usually not highly trained or skilful, but youngsters between the ages of 13 – 26 who seek social recognition. They want to be in the spotlight of the media. Their actions are globally damageable but individually negligible. â€Å"Like denying a lot of important e-commerce servers in February, 2000 is said to have caused high damages to these companies.†# Most often they attack systems with viruses they created; their actual harm to each individual is relatively negligible. By the age of 26 to 26 when they have matured and understood the weight of their actions, they lose interest and stop.THE GREED – MOTIVATED (Career Criminals).This type of cyber-criminals is dangerous because they are usually unscrupulous and are ready to commit any type of crime, as long as it brings money to them. â€Å"They started the child pornography often calle d cyber-pornography which englobes legal and illegal pornography on the internet.†# They are usually very smart and organized and they know how to escape the law enforcement agencies. These cyber-criminals are committing grievous crimes and damages and their unscrupulousness, particularly in child-pornography and cyber-gambling is a serious threat to the society.Example to show how serious a threat they pose to the society is â€Å"the victim of the European bank of Antigua are said to have lost more than $10million†# â€Å"†¦theft of valuable trade secrets: the source code of the popular micro-soft windows exploration system by a Russian based hacker could be extremely dangerous†¦ the hackers could use the code to break all firewalls and penetrated remotely every computer equipped with windows were confirmed. Another usage could be the selling of the code to competitors.†#THE CYBER – TERRORISTS. They are the newest and most dangerous group. Thei r primary motive is not just money but also a specific cause they defend. They usually engage in sending threat mails, destroying data stored in mainly government information systems just to score their point. The threat of cyber-terrorism can be compared to those of nuclear,  bacteriological or chemical weapon threats. This disheartening issue is that they have no state frontiers; can operate from any where in the world, and this makes it difficult for them to get caught. The most wanted cyber-terrorist is Osama Bin Laden who is said to â€Å"use steganography to hide secret messages within pictures, example, a picture of Aishwarya Rai hosted on the website could contain a hidden message to blow up a building.†# A surprising fact is that these hidden messages do not alter the shape, size or look of the original pictures in any way.HOW TO DETECT A CRIMINAL MAILA criminal mail is usually sent to networks with the aim of either corrupting the system or committing fraud. The w ay to detect such mails is by putting security measures in place which would detect criminal patterns in the network. News Story by Paul Roberts, of IDG News Service says that Unisys Suite has a system called the â€Å"Unisys Active Risk Monitoring System (ARMS) which helps banks and other organizations spot patterns of seemingly unrelated events that add up to criminal activity.†#Actimize Technology Ltd based in New York has developed technology that enables organizations to do complex data mining and analysis on stored information and transaction data without needing to copy it to a separate data warehouse. â€Å"The actimize software runs on the Microsoft Corp. Windows NT or Windows 2002 platform and can be developed on standard server hardware with either four to eight processors, Katz said.†#Eric J. Sinrod in his article ‘What’s Up With Government Data Mining’ states that the United States â€Å"Federal Government has been using data mining te chniques for various purposes, from attempting to improve service to trying to detect terrorists patterns and activities.†# The most effective way to detect criminal mails is to provide security gadgets, educate employees on how to use them, and to be at alert for such mails, above all, making sure no security holes is left unattended to.CONCLUSIONIt has been deduced from this study that reliance on terrestrial laws is still an untested approach despite progress being made in many countries, they still rely on standard terrestrial laws to prosecute cyber-crimes and these laws are archaic statutes that have been in existence before the coming of the cyberspace. Also weak penalties limit deterrence: countries with updated criminal statutes still have weak penalties on the criminal statutes; this cannot deter criminals from committing crimes that have large-scale economic and social effect on the society.Also a global patchwork of laws creates little certainty; little consensus e xist among countries regarding which crimes need to be legislated against. Self-protection remains the first line of defense and a model approach is needed by most countries; especially those in the developing world looking for a model to follow. They recognize the importance of outlawing malicious computer-related acts in a timely manner or in order to promote a secure environment for e-commerce.Cyber-crime with its complexities has proven difficult to combat due to its nature. Extending the rule of law into the cyberspace is a critical step towards creating a trustworthy environment for people and businesses. Since the provision of such laws to effectively deter cyber-crime is still a work in progress, it becomes necessary for individuals and corporate bodies to fashion out ways of providing security for their systems and data.To provide this self-protection, organizations should focus on implementing cyber-security plans addressing people, process and technology issues, more reso urces should be put in to educate employees of organizations on security practices, â€Å"develop thorough plans for handling sensitive data, records and transactions and incorporate robust security technology- -such as firewalls, anti-virus software, intrusion detection tools and authentication services.By way recommendations, these kinds of actions are suggested following the weak nature of global legal protection against cyber-crime:†¢Firms should secure their network information. When organization provides security for their networks, it becomes possible to enforce property rights laws and punishment for whoever interferes with their property.†¢Laws should apply to cyber-crime—National governments still are the major authority who can regulate criminal behavior in most places in the world. So a conscious effort by government to put laws in place to tackle cyber-crimes would be  quite necessary.†¢There should be a symbiotic relationship between the firms, government and civil society to strengthen legal frameworks for cyber-security. An act has to be crime in each jurisdiction before it can be prosecuted across a border. Nation must define cyber-crimes in similar manner, to enable them pass legislation that would fight cyber-crimes locally and internationally.

Thursday, January 9, 2020

Tarjeta NEXUS para frontera Estados Unidos y Canadá

Nexus es una tarjeta que permite el trà ¡nsito acelerado de control migratorio y aduanero entre Estados Unidos y Canadà ¡. Forma parte de un grupo de alternativas de cruce de aduanas conocido como Programa de Viajeros de Confianza. La tarjeta NEXUS es và ¡lida en todas las fronteras terrestres entre Estados Unidos y Canadà ¡, pero ademà ¡s, tiene  otras ventajas. Por ejemplo, puede ser utilizada en  vuelos domà ©sticos dentro de los Estados Unidos e incluso algunos  internacionales que se especifican mà ¡s abajo. e incluso en el pase de la frontera terrestre entre los Estados Unidos y Mà ©xico. En este artà ­culo se informa sobre quià ©n puede beneficiarse de NEXUS, cà ³mo se solicita y cuà ¡les son sus ventajas. Quià ©nes pueden solicitar la tarjeta NEXUS Ciudadanos americanosCanadiensesResidentes permanentes legales de USA o de Canadà ¡ siempre y cuando lleven residiendo en dichos paà ­ses por un mà ­nimo de tres aà ±os. Cà ³mo se solicita la tarjeta NEXUS En Estados Unidos, aplicar por internet en la pà ¡gina oficial del Servicio de Proteccià ³n de Fronteras y Aduanas (CBP, por sus siglas en inglà ©s). Se trata de una pà ¡gina que se llama GOES, que son las iniciales del programa Global Online Enrollment System. La pà ¡gina, que puede elegirse en los idiomas inglà ©s, espaà ±ol, o francà ©s, da la opcià ³n de enrolarse en cualquiera de los Programas de Viajeros de Confianza, es decir, no solo para NEXUS sino tambià ©n para Global Entry (avià ³n), FAST o SENTRI (terrestre en frontera con Mà ©xico). Debe elegirse y hacer click sobre el icono del programa de interà ©s, en este caso NEXUS. Sin embargo, si es la primera vez que se ingresa al sistema, es necesario crear una cuenta. Para ello, mover el cursor de la pà ¡gina hacia abajo y proceder a donde dice Inscripcià ³n de Nuevos Usuarios al GOES. En el caso de familias, debe crearse una cuenta por cada persona. Es decir, incluso los nià ±os pequeà ±os deben tener su propia cuenta. Ademà ¡s, pagar la cuota de $50 (excepto los menores de 18 aà ±os, para los que es gratis) y enviar copia de los documentos que se solicitan. Durante el proceso de llenado del formulario es posible editar las respuestas. Sin embargo, una vez certificadas ya no serà ¡ posible realizar ningà ºn cambio. En estos casos, en el momento de la entrevista es cuando se debe notificar todo tipo de errores que pueda contener el formulario. Serà ¡ necesario pasar un examen de historial delictivo y una entrevista en persona. La aplicacià ³n deberà ¡ ser aprobada conjuntamente por las autoridades de Canadà ¡ y de los Estados Unidos. Serà ¡ rechazada si la persona ha sido condenada por algà ºn delito o ha cometido alguna infraccià ³n migratoria o aduanera en viajes anteriores o si por cualquier razà ³n la persona no es elegible y/o admisible a los Estados Unidos. Si la solicitud es aprobada condicionalmente, el solicitante deberà ¡ proceder a cerrar una cita. En el caso de familias, debe cerrarse una cita por cada miembro de la unidad familiar que està ¡ pidiendo la tarjeta NEXUS. Si despuà ©s de la entrevista la tarjeta es aprobada, se recibirà ¡ por correo en unos pocos dà ­as. Es và ¡lida por cinco aà ±os y debe renovarse seis meses antes de su expiracià ³n.   Cuà ¡les son los beneficios de tener una tarjeta NEXUS Un pase mà ¡s rà ¡pido en los controles de aduanas. Las reglas son distintas segà ºn los casos: Frontera terrestre entre Estados Unidos y Canadà ¡: Los titulares de una tarjeta NEXUS pueden utilizar las filas asà ­ expresamente seà ±aladas pero sà ³lo si se dan dos condiciones: Todos los ocupantes del auto, incluidos los nià ±os, deben tener su propia tarjeta.No ingresar ningà ºn artà ­culo prohibido para traer o que obligue a una declaracià ³n de bienes en Estados Unidos, por ejemplo, una cantidad elevada de dinero sin declarar. Por el contrario, sà ­ que se pueden traer mascotas e, incluso, piezas de caza. Pero es necesario respetar las reglas. Los residentes permanentes legales deben llevar con ellos, ademà ¡s de la tarjeta NEXUS, la de residencia (green card) y sus pasaportes ya que se puede pedir que los muestre. Frontera terrestre entre Estados Unidos y Mà ©xico: Los titulares de una tarjeta NEXUS que viajan en un auto registrado y aprobado pueden ingresar a USA desde Mà ©xico utilizando las là ­neas seà ±aladas como SENTRI, disminuyendo asà ­ los tiempos de espera para los cruces por los controles migratorios internacionales. Si el auto no està ¡ aprobado, los ciudadanos americanos pueden ingresar de regreso al paà ­s utilizando la tarjeta NEXUS y colocà ¡ndose en cualquiera de las filas que no es SENTRI. Ingreso a Estados Unidos por aeropuerto: Los ciudadanos americanos que tienen una tarjeta NEXUS pueden acelerar su ingreso al paà ­s dirigià ©ndose en el aeropuerto a los kioskos del programa Global Entry. Tienen que llevar sus pasaportes estadounidenses (y tambià ©n es aconsejable que lleven la tarjeta). Ademà ¡s los ciudadanos americanos pueden ingresar por un aeropuerto a Estados Unidos utilizando la NEXUS como su à ºnica identificacià ³n cuando el punto de origen del vuelo sea un o de los siguientes aeropuertos canadienses: Robert L. Stanfield (Halifax)Pierre Elliott Trudeau (Montreal)Macdonald-Carter (Ottawa)Pearson (Toronton)James Armstrong Richardson (Winnipeg)Calgary International AirportEdmonton International AirportVancouver International Airport Vuelos domà ©sticos dentro de Estados Unidos Los titulares de la NEXUS pueden utilizar el programa TSA PreCheck.  Su fin es acelerar el paso por control de seguridad. Para ello antes de volar deben introducir su Pass ID Custom and Border Protection/trusted traveler number que aparece en su tarjeta en la reserva de su vuelo. Y si tienen una cuenta de viajero frecuente, en la misma.   De interà ©s y recomendacià ³n Por à ºltimo, la tarjeta Nexus puede ser realmente à ºtil a los estudiantes canadienses que cursan sus estudios en los Estados Unidos en instituciones cercanas a la frontera y continà ºan teniendo su residencia en Canadà ¡. Seà ±alar, ademà ¡s, que para estos casos especà ­ficos existe la visa F-3, que es poco conocida, pero existe y ofrece sus ventajas frente a la tà ­pica F-1. Este artà ­culo es meramente informativo. No es asistencia legal.

Wednesday, January 1, 2020

Peer Assesment Contract the Skinny - Free Essay Example

Sample details Pages: 9 Words: 2648 Downloads: 5 Date added: 2017/09/20 Category Advertising Essay Type Argumentative essay Tags: Communication Essay Did you like this example? BA (Hons) Communication, Advertising and PR Communication Management Cancer Research UK Peer Assessment Contract Introduction The Peer Assessment Contract (PAC) is a document stating the guidelines and regulations that the Account Executive (AE) group has agreed to follow. The PAC will also contain information on the group’s overall strategy for the successful completion of the project. The purpose of this contract is to provide evidence of the agreed acceptable standards of work and level of professionalism that the AEs should adhere to as well as encouraging a positive and pro-active attitude. By signing the PAC, Scott Browning (SB), Fiona Macdonald (FM), Ross Naylor (RN), Nina Camara (NC), Chris Mitchell (CM) and Johan Gerdin (JG) have agreed to all of the terms and conditions included within the PAC. The PAC is to be used as a key tool within the group and will be reviewed throughout the semester. Any Peer Assessment (PA) issues that are brought to the groupâ₠¬â„¢s attention must be addressed immediately and if assistance is required, Account Managers (AMs), Account Directors (ADs) or the Managing Director (MD) will be consulted for guidance. If any changes are thought to be necessary to the PAC by any AE; a group vote will take place, with the majority over-ruling. Again, if further assistance is needed, the decision will be taken to the AMs, ADs or finally the MD for guidance. AE role and responsibilities The role that AEs have in the macro team is to provide support to the AMs and AD’s. The main responsibility that AEs have towards the macro team is to complete and hand in the various tasks that are set by the AMs. The work shall be handed in on time and shall meet the standard of quality as stated in the AE PAC. One ongoing task for AEs throughout the project is to produce an accurate set of minutes from the full group meeting every week. AEs must attend and be prepared (see below) for the full group meeting which will t ake place every Wednesday at 9am or as amended by full group (FG). This involves: †¢ Arriving 10 minutes prior to the start of the meetings. †¢ Reading every agenda before the meeting. †¢ Discussing any issues that the AE may have with the agenda, allowing points to be brought up in the meeting. †¢ Reading all necessary documents required including any agenda points. Preparation of minutes. †¢ Updating each set of minutes for macro group meeting †¢ Updating each set of minutes and agenda for the micro group meeting. If there is an issue any individual would like to discuss at the FG meeting, this must be added to the agenda by 5pm the day before the meeting or the deadline for amending the agenda as set by the AMs. The AEs should maintain a positive and proactive attitude towards the AM’s and ADs and the setting of tasks. They should also actively seek to problem solve should a problem arise and find useful and workable solutions. Roles Within the AE group, certain roles have been assigned to each AE. These include: †¢ Administration. This includes Email account maintenance, and AE group portfolio of work. This role is assigned to FM, NC and JG. RN, CM and SB are extra support if needed. †¢ Scheduling. Creating and maintaining the AE group schedule. The schedule includes all members of the AE group and clearly shows their academic timetable, as well as any work commitments and/or any other times of unavailability. Scheduling role assigned to RN with FM as support. †¢ AM liaison. This AE will communicate to the AMs on behalf of the AE group. This may be questions or updates on tasks, general support or any problems or matters arising regarding the project. AM liaison role assigned to SB NC support †¢ AD liaison. This individual will be the link between the AE group and the ADs. Any problems or otherwise would usually be transmitted to the AMs first, however, should the AE group have any problems wi th the AMs, the ADs would need to be notified. This role also includes keeping the ADs up to date with AE progress. AD liaison role assigned to CM – JG support Confirmation of Assessment Dates Assessment One Individual Assessment. This assignment is worth 40% of the Communication Management (CM) module final mark. Due in week 8 and it is to be 2,000 words in length. The assignment is reflective work- analysing and critiquing the individual AEs performance to date relative to their contribution to the micro group with appropriate recommendations Assessment Two Group Presentation with Written Documentation, worth 60% of final CM grade and due in week 14. Presentation shall last 20 minutes, and a report of 5,000 words shall be prepared. The presentation and report will provide a detailed critical analysis of the individual, micro and group performance across the project. Quality of Work The basic standard for quality of work is outlined in the School of Arts and Creative Industries (SACI) handbook which is available online or in the Program Handbook. All group members must take into consideration each point set in the handbook when submitting work. Any submitted work that does not comply with the SACI handbook will not be acceptable and will be expected to e amended and resubmitted within 12 hours and the individual shall be Peer Assessed accordingly. Should the second submission still not meet desired standards the individual will be peer assessed accordingly again. The group expects all grammar to meet the standard set out in the SACI handbook including spelling, structure of sentences, discourse, referencing, and relevance to topic through appropriate research and adheres to agreed format guidelines. All group members are expected to have a copy of the SACI handbook as a reference when undertaking work and to refer to it when group work is being conducted. Criteria of quality that is expected: 1. Work submitted must be of the AEs highest poss ible standard. 2. Work must be handed in by the set deadline. 3. All content must be referenced to the used source. At least one piece of referencing material must be used for research in each piece of work. 4. Referenced material must be set out in the correct format as shown in the student handbook. 5. Work must meet the correct formatting and text as shown below. The correct guidelines as shown in the SACI handbook can be found in the appendices Formatting and Text Any formal document must comply with the agreed formatting and text of the full Communication management (CM) group to insure continuity throughout all group documentation. The agreed format for text will be; Main Body Arial 12pt. Headings in Arial Bold 14pt. Subheadings in Arial Bold 12pt. 1. 5 line spacing. Submission of work with the incorrect format will be treated as incomplete and will be expected to be resubmitted before the deadline if applicable or in the negotiated time set by group if after deadline. Subm ission of Work The group members are obliged to submit any work required by the deadline agreed by the AMs or ADs. Any piece of work submitted after the agreed deadline and for the reason that is not in compliance with the conditions stated below will be penalised and Peer assessed accordingly. The deadline for the submission of work can be changed under the following circumstances: a) Following the group vote the group members agreed on amendment of the deadline b) A group member is unable to submit the work in compliance with mitigating circumstances Professionalism The group members should at all times conduct themselves in a professional manner. This includes a professional attitude, approach to work and speech during official meetings. Group members should also be professional in their interaction with other group members and colleagues within the Full Group structure. To act in a professional manner includes: †¢ Being up to date with the project. †¢ Checking yo ur e-mail on a regular basis. †¢ Not having your mobile phone on when a meeting is in session. †¢ Communicating in a clear and professional manner. Positive and appropriate body language. †¢ Sufficient contribution to macro discussions. Attendance Full attendance is compulsory for all lectures, tutorials, AE and FG meetings. Only mitigating circumstances will be accepted as a valid reason for absence, however, for circumstances outside of mitigating circumstances, a group vote shall be used to decide upon validity. Penalties will be incurred as stipulated in the points table (see page 13) If an AE requires leaving a meeting early then prior warnings should be given as soon as possible and should have an appropriate reason. The beginning of the meeting shall not be accepted as a prior warning however any time before an hour of the meeting commencing shall be tolerated along with an appropriate reason as long as a suitable method of contact (see page 10) is used. An appropriate reason would be a reason which the majority of the group agree is satisfactory from a vote or one of the mitigating circumstances shown in the mitigating circumstances section further on in the PAC. (see page 9) Lateness / Timekeeping All group members are expected to arrive at the meeting or lecture location ten minutes before the meeting starts. However PA will not begin until the meeting has actually begun. Reasons for lateness must comply with mitigating circumstances. In the case of lateness, all members must use the correct procedures in terms of notifying the group. If the AE is late for more than a third of the meeting then they will be deemed as absent. For every ten minutes late prior to the calculated third of the meeting, a point will be deducted. See penalty table (page 13) Appointments Any medical, dental or personal appointments that fall on the same day as a meeting will not be deemed as an acceptable excuse for being late or for missing a planned meet ing. However if a meeting is re-planned to be on the same day of an appointment planned before re-plan was announced, it is acceptable to be absent, as long as the group agree, as long as it is of some urgency or due to limited appointments that the AE cannot cancel. Only emergency appointments such as emergency dental or emergency medical appointments will be acceptable for lateness or absence. In these cases, AEs must try and notify the group if possible by any means possible. Retrieval of Deducted Points A group member can retrieve any deducted points provided that he or she agrees to do additional work for the group and does it to the set standards. The retrieval of points is possible as long as it meets the above conditions and if it  is approved by a group vote. In case the group members fail to reach an agreement or in case the individual has objections against the group decision, AMs/ ADs or the MD can be consulted. Group vote In the case of any of the issues mention ed within the PAC, specific PA issues or any case that that an AE feels the PAC should be changed or added to, a group vote may be used to decide upon a majority rule. Each group member will count as one vote with the exception of the member in question if specific to one AE. In the event of a tie the AMs and ADs will be consulted for assistance, and then failing this, the MD shall be approached and will have a final say in the outcome of the decision. Mitigating circumstances Mitigating circumstances are defined as circumstances that are severe, unforeseen and outside an AEs control. They occur immediately before or during the assessment period in question. They would normally adversely affect a student’s performance in an assessment or for a significant period of time in a semester/trimester. In other words, they must be circumstances which you could not have prepared for or predicted, for example, ill health, bereavement and emotional or practical problems. The sever ity of the impact is also crucial; minor sickness and minor disruptions are not accepted. Examples of mitigating circumstances: †¢ You are seriously ill e. g. flu, tonsillitis, severe stomach illness. †¢ You have experienced some family problems e. g. a death in the family, separation of parents, and illness of a family member. †¢ Serious transport problems e. g. unannounced travel cancellations, serious road accident. Unexpected circumstances e. g. burglary, fire etc. Conditions which would not be acceptable as mitigating circumstances are those in which a student could reasonably have avoided the situation, made arrangements to address the problem, taken action to limit their impact, or be able to comfortably work through them. These circumstances would be seen to be within an AEs control. Examples that would not be accepted (as decided by group): †¢ Bad transport: Failure to make alternative travel plans when a student knew about disruptions in advance. †¢ Light illness e. g. a cold, hangover, sore head etc. something that the student could continue to work through without too much strain. ) Notification of mitigating circumstances Any reason for lateness or absence should be notified to the rest of the group at the earliest convenience possible however it is understandable that this is not always possible to notify in extreme circumstances, such as the mitigating circumstances. As much notice as possible should be given if there is known absence or lateness which cannot be avoided. Unforeseen absence or lateness should be notified to the rest of the group as soon as it is encountered. Suitable methods of contact are: †¢ Face-to face †¢ Phone call or answer machine message Non- Suitable methods are: †¢ Text Message †¢ E mail By signing the below I agree to the terms of this Peer Assessment Contract and understand these form my conduct and performance  as a member of the Communication Management group. Signed by .. Date .. Signed by .. Date .. Signed by .. Date .. Signed by .. Date .. Signed by .. Date .. Signed by .. Date .. Appendix 1 Penalty Tables Table of Penalties-Absence |Week |valid excuse with |Valid excuse, no |No valid excuse with |No valid excuse, no | | |notice |notice |notice |notice | |2 4 |0 |0 |1 |2 | |5 8 |0 |1 |3 |4 | |9 13 |0 |2 |4 |5 | Table of Penalties- Lateness Week |valid excuse with |Valid excuse, no |No valid excuse with |No valid excuse, no | | |notice |notice |notice |notice | |2 4 |0 |0 |0 |1 | |5 8 |0 |1 |1 |2 | |9 13 |0 |2 |2 |3 | Table of Penalties- Minutes or AE Task Late Submission Week |valid excuse with |Valid excuse, no |No valid excuse with |No valid excuse, no | | |notice |notice |notice |notice | |2 4 |0 |0 |0 |1 | |5 8 |0 |1 |1 |2 | |9 13 |0 |2 |2 |3 | Minute Taking and Chairperson Rota Minute Taker/BackupChairperson Week 3Ross/ChrisNina Week 4Scott/FionaJohan Week 5Fiona/JohanChris Week 6Johan/NinaRoss Week 7Nina/RossFiona Wee k 8Ross/ChrisScott Week 9Chris/ScottNina Week 10Scott/FionaJohan Week 11Fiona/JohanChris Week 12Johan/NinaRoss The following is an idea of roughly what an agenda would look like. Please note that this is fairly generic and some meetings may have specific items unique to them and they will not be shown here. A description of each item is provided below the related title. 1. Introductions, if Appropriate, and Apologies for Absence 2. Declarations of Interest (Members must declare any personal and prejudicial interests in the items on the agenda. ) 3. Minutes of the Previous Meeting (The Members examine the minutes of the previous meeting and either agree them or ask for changes to be made) 4. Matters Arising (If there are any subjects in the minutes of the previous meeting where updated information is available it will be dealt with here. ) 5. Action Points 6. Any Other Business (If there is any other business that arrived too late to be included on the agenda it may, at the Chairs discretion, be discussed here. The procedure for dealing with late business changes depends on the meeting concerned. ) 7. Date of Next Meeting (Finally, the date of the next meeting, if known, is announced. ) Contact Details Ross Naylor Mobile: 07967 105 082 Email:[emailprotected] com Chris Mitchell Mobile: 07725 049 170 Email:[emailprotected] ac. uk Scott Browning Mobile:07772 849 250 Email:[emailprotected] com Fiona MacDonald Mobile:07793 751 199 Email:[emailprotected] ac. uk Johan Gerdin Mobile: 07516 990 238 Email: [emailprotected] com Nina Camara Mobile: 07928 044 469 Email:[emailprotected] ac. uk Don’t waste time! Our writers will create an original "Peer Assesment Contract the Skinny" essay for you Create order