The concept of reflection in nursing, Qualitative findings on student and teacher perspectives Critique

The concept of reflection in nursing, Qualitative findings on student and teacher perspectives Critique

Nurse Education in Practice: The concept of reflection in nursing: Qualitative findings on student and teacher perspectives Critique

Name

Institution

Course

Date

Limitations of the studies reviewed require that caution be used in the application of the findings to educational programs. As indicated above, occupational health nursing practice involves the synthesis of principles form nursing, public health, and other disciplines. However, several researchers used a task-oriented approach to identify practice elements rather than a clearly identified conceptual approach to curriculum derivation. This is not surprising given the relative newness of research in occupational health nursing.

All studies reviewed involved some form of descriptive research, with survey designs employed most frequently. One study was national in scope, one regional, two statewide, and all other locals. Excepting where total populations were used, sample selection was mostly purposive or by convenience, and sample size often were small. In all but one study, instruments were developed by the authors. Contents validity either was explicitly or implied; however, no other types of validity or reliability were reported. Lack of instrument testing may have been due to the general lack of research conducted in occupational health nursing prior. Data were analysis mostly using descriptive and nonparametric statistical techniques, which is consistent with the type and state of the research.

A significant role of a research that is well demonstrated in this research is the incorporation of ethical approval and ensuring the wellbeing of participants. This based on the research was achieved by going through a process of formal ethical approval. However, the non-predictive nature of action research means that it is also important to mutually agree an ethical code of practice at the start of the study. Winter (2001) highlights various ethical code issues and principles of procedure. First they emphasize the importance of maintaining a professional relationship, guided by a duty of care and respect for the individual; regardless of gender, age, and ethnicity along with a respect for cultural diversity and individual dignity, as well as protection from harm. This last principle is part of any special researcher’s role, in addition to the need for informed consent and honesty. However, Winter (2001) suggest that there are other principles of procedure that should be followed in action research.

Having an ethical code of practice does not negate the additional need for research governance and formal ethical approval for action research. However, these quality processes are made all the more complex by the action researcher not being able to say in advance what the research will do. Action research proposals need to be written in collaboration with participants, often as co-applicants, with an inbuilt degree of flexibility. The action researcher should indicate the likely course of the study, specify the need for flexibility and enter into open and ongoing dialogue with ethical committees to seek approval for emergent changes in design.

Credibility of the finding

The study takes both qualitative and quantitative approaches to achieve the desired objectives. The qualitative approach will help in the examination of the current demographic factors exploring the various factors that act as drivers to the effectiveness and satisfaction level of the social workers (Jeon, 2004). This method is appropriate because initially the research aims to examine the satisfaction or dissatisfaction of the beneficiaries bearing in mind the diverse nature of the contemporary social workers but using a qualitative approach exploring the perceptions that drive the formulation and adoption of the management strategies.

The literature examines original investigations, other literature reviews, peer reviewed academic literature, research databases, reviews, journals in various academic fields and original manuscripts that relate to beneficiary satisfaction (Charmaz, 2006). One of the most recent studies, which directly involved investigation of customer satisfaction of user is the study carried out by SSP (2006). Since a search in the research databases produces a big number of results, the reviewed literature sources are picked on a random- sample strategy (Camilla, 2003).

Reliability and validityThe performance of any research tool is usually measured in terms of reliability, validity and sensitivity as well as specificity. These concepts will also be applied in this study by the researcher to ascertain the reliability of the study. According to Waliman (2005), reliability is the ability by which a study is able to produce results that are consistent and stable over a given period of time and given similar circumstances (Waliman, 2005). Various types of validities exist that include internal validity and external validity. Internal validity relates to the correlation between items when measured on a scale. Whenever a study provides the same results after the application of two different measures, the outcome is said to be equivalent.

Validity is the extent to which a given instrument is designed to measure. The validity of a study can vary in different samples used. In one situation, a study can be valid while in other scenarios, it may not. The validity of a study is measured by what the study claims to and the availability of logical errors in the conclusions drawn from the study. According to Crotty (2003), internal validity is the extent to which it is possible to make independent reference from the findings of a study especially if the independent variable influences the dependent variable. On the other hand, external validity is the general application of the findings of a study to other settings.

The measurement of the theoretical construct of a study is measured using construct validity while convergent validity makes comparison between the scores that are obtained from different instruments that are used in the study. Unlike convergent validity, divergent validity compares the instruments used in the study that measure concepts that are opposite. Given the above validity and reliability, the study is valid ad reliable for use by any person or strategic department (Waliman, 2005)

Internal validity of the research is low as with most field research. A number of factors are likely to impact on the amount and type of collected data. Some of the factors that have been identified to cause an impact on the internal validity of a study include the following. The variety of information collected from various people and sources might contradict. For instance, in one study, the researchers found out that the management had created different environments for the social workers (Jeon, 2004).

Another notable threat to the research validity is the method of selection that might be (though the probability cannot be determined) biased. Since participation in the study by respondents is voluntary, selection bias is likely to affect the internal validity. Instrumentation is also identified by the scholars as another factor that affects internal validity. In this threat, any change or alterations made in the measurement of variables or changes in the techniques of observation may justify changes in the measurement that is ultimately obtained. This is evident from various researches (Camilla, 2003). A good way of dealing with this threat is to ensure consistency of the data analysis method used and techniques applied by the authors.

Research approach

This research will take a deductive approach that will entail the researcher working from a known hypothesis that teamwork affects positively the employee performance in the strategic management department in ADP. Thus, the study takes a top down approach as compared to the inductive approach that takes an up down strategy.

A study that is quantitative usually makes an emphasis on transforming the data quantities and the models of statistics for purposes of measuring and analyzing data. The research topics in which researchers use this method have clear idea of what they look or search for and tools like questionnaires are used to collect data. Quantitative approach has its focus on the preciseness of data that is seen in terms of measuring data. Quantitative approach to a research involves using statistical data analyses to obtain information about the study simply because the approach is based on measuring the quantity or amount.

To realize the use deductive approach, quantitative tools of collective and analyzing data like questionnaires and interviews were used. Quantitative tools were preferred as compared to qualitative tools because they enable the researcher to come up with facts like a hypothesis that teamwork can improve the performance of employees in the strategic department of ADP and thereafter testing and confirming the hypothesis. This is unlike qualitative tools that first come up with an abstract idea that is followed by creation of theories and concepts about the idea. Lastly, data in quantitative research is hard and reliable as compared with qualitative research where data that is just rich and deep (Quinn, 2002).

In addition to the above, this study takes a positivism kind of philosophy towards the impact of teamwork o employee performance in strategic management department in ADP. A positivism approach will make us understand more the impact of teamwork on not only employees but also overall organization. On the contrary, a qualitative approach to research makes the researcher to switch his focus to gaining a better understanding of the problem of the research by giving detailed information about the main theme of the study topic. The major goal of a qualitative study is to have a complete and detailed description of the study phenomenon by applying reasoning. Qualitative research involves the use of interviews and observations to collect data and there are no formal measurements involved. Qualitative approach makes the researcher understand the phenomenon under study and be in a position to describe the whole situation as it is. The approach consists of descriptions, quotes, observations, and excerpts from books and other documents (Quinn, p. 2002, p. 308).

Bibliography

Caldwell, E., 2003, Research Designs and their applications: Connecticut, USA: Engage

Publishers.

Camilla, M., 2003, Textbook of basic Research Methods. New York, USA: Lippincott

Williams & Wilkins. Pp. 45-56.

Charmaz, K., 2006, Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis. Thousand Oaks, CA: Sage Publications.

Clarke, A., 2005, Situational Analysis: Grounded Theory After the Postmodern Turn. Thousand Oaks, CA: Sage Publications.

Jeon, Y., 2004, The application of grounded theory and symbolic interactionism: Sydney, Australia. University of technology.

Kabala, M., 2005, Modern Research Methods and Techniques. New York, USA: Lippincott

Learning.

Mandan, S., 2005, Branding and Marketing: Modern salons. New York, USA: Lippincott

Williams & Wilkins.

Munhall, L., 2007, Nursing research: a qualitative perspective. Jones & Bartlett Publishers.

Posted in Uncategorized

Null and alternate hypotheses

Null and alternate hypotheses

Null and alternate hypotheses           

 

Week X Y XY XX 1 29 21 609 841 2 35 32 1120 1225 3 41 11 451 1681 4 32 26 832 1024 Total ∑X = 137 ∑Y = 90 ∑ XY = 3012 ∑XX = 4771 Given n = 4, ∑X = 137 Mean = ∑X / n Standard Deviation (s) = √ ∑{(X – x)(X – x)} / n Mean = 137 / 4 Standard Deviation (s) = √ 17689 / 4 Mean = 34.25 Standard Deviation (s) = √ 4422.25 Standard Deviation (s) = 66.5 The null and alternate hypothesis here becomes:

H0: μ ≥ 34.25

H1: μ < 34.25

The hypothesis test statistics is:

Z = (x-μ) / (σ-√n)

= (34.25-35) / (0.05-√100)

= -0.75 / -9.95

= 0.075

Probability (p) value when (σ) = 0.05, and its meaning

p-value = P(Z>0.075) = 0.0001

The probability of getting a sample whose mean is 34.25 or more when H0 is true is 0.0001.

Comparing the p – value to alpha

For a large test statistic, the critical value is large and its p-value is small than even the alpha value.A rejection is made if test statistics is found in the rejection region.

Posted in Uncategorized

Nucor Primary And Support Activities

Nucor Primary And Support Activities

Nucor Primary And Support Activities

Introduction

Nucor is a large manufacturing company in United States that deals with manufacturing of steel. It has remained to be a profitable company even though it is among the very cynical industries. It enjoys the success due to several reasons which include; quality, aggressive pursuit in technical excellence and innovation, productivity and employee relations. This paper will focus on the primary and secondary activities that help Nucor steel manufacturers to achieve low cost strategy.

Primary activities

The company makes use of the following primary activities (Ukessays, 2013).

Inbound Logistics- This process is changing because after acquiring DJJ, the company could get ways of improving the systems available currently. The implementation of the right on time systems may lead to elimination of the cost of storing scrap metal. This is able to make the inbound logistics for Nucor Company be superior in competition.

Outbound Logistics- After the processing process is done on the goods, they are taken to buyers with no freight equalizing. The buyers who are closer to the plant are able to obtain the goods via just in time system. The company and the buyers have an electronic link which creates a connection that benefits the system.

Operations- The sector of operations in chain of value is very important in the processing industry. The company tries to improve the existing techniques with the aim of increasing the efficiency of the company. The organization capacity is far from other leading companies. However, it has really advanced in technology hence is being sought after by many buyers (Ukessays, 2013).

Support Activities

Firm Infrastructure- Since the beginning of the company the activities have been taking place within the division. This is as a result of the improved growth of the company. Nowadays, the activities have been centralized.

Procurement- Initially, it was very difficult and costly to procure raw materials. Outside United States, the clients used to pay more for the scrap steel. This was reviewed after DJJ was purchased.

Technology Development- the Company has always found the need to improve the current processes. It has continued to improve the merger and acquisitions with the aim of expanding the business.

Nucor value to customers

The company has been able to invest heavily on their customers. This is because they need them to buy their products so as to make more profits (Nucor, 2013). The company has been able to promote good customer services. This is done by transporting their products to their customers as an after sale service.

They are also able to use modern equipment. They have a well developed mini mill technology which has increased the utilization capacity and produces goods of high quality (Nucor, 2013). The advanced technology keeps the competitors away as they have to develop the technologies first before competing. The company has constantly been innovating its products. It is believed to be the first company to use electric arc furnace for melting the scrap metals. This makes the customers go for its products without hesitations.

Decision making is local instead of the headquarter level. The company does not believe in hierarchy levels. They promote equality for all (Nucor, 2013). This makes the team mates to be close to managers hence improving customer service. The managers however have authority in every plant. The management believes in pain sharing so that if something goes wrong, the manager at that level is in a position to solve the situation before it worsens.

In conclusion, the company aims at taking good care of the customer and therefore takes care for everyone. This makes the Nucor Company be the most sought after in the world.

References

Nucor. (2013) Culture. Nucor.com. Retrieved on 25th Sept 2013 from http://www.nucor.com/story/chapter4/Uke essays.com. (2013). Financial study of the Nucor Company. Uk essays.com. Retrieved on 25th Sept 2013 from http://www.ukessays.com/essays/economics/financial-study-of-the-nucor-corporation-economics-essay.php

Posted in Uncategorized

Nsecurity,Firewalls and VPN solutions

Nsecurity,Firewalls and VPN solutions

Nsecurity, firewalls, and VPN solutions

Name:

Number:

Course:

Lecturer:

Date:

Introduction

Data security is very important in safeguarding private, personal or business information. Personal data like credit card information should be well protected from access by unauthorized individuals or hackers. Any company that deals with credit card transactions via computer network should therefore employ reliable security measures if they are to maintain trust by their customers. This paper gives an overview of network security fundamentals, threats and issues with a detailed network security recommendations followed by summary with reference to one medium-sized start-up company that processes credit card transactions on a daily basis (Tipton & Krause, 2012; Gajrani et al., 2013).

Overview of network security fundamentals, security threats, and issues

The entire network security implementation will depend on the size of the company or organization and hence the number of computers to be linked. In case just a dozen of computers with inclusion of Wi-Fi devices are to be connected, then a simple business wireless router is considered. These routers can offer sufficient Wi-Fi coverage and to provide Ethernet ports for wiring computers into the network or for addition of extra components like printers, wireless access points and others(Tipton & Krause, 2012; Gajrani et al., 2013).

If more than a dozen computers are to be connected like the case of this medium sized company, then security devices such as VPN router/firewall and unified threat management gateway or firewall will be needed. All these devices are step up from the basic wireless router. The virtual private network (VPN), server and at times other enhanced feature like VLAN support and multiple SSIDs are all integrated in these routers. Unified threat management (UTM) routers are normally for Ethernet only with limited number of ports and hence need separate access points for network links. Apart from offering functions of router and internet gateway with VPN server and firewall, these devices also include protection against threats of malware and viruses, anti-spam, content filtering and issues of intrusion detection and prevention as well as any form of unauthorized access to sensitive information(Tipton & Krause, 2012; Gajrani et al., 2013).

3.0 Detailed network security recommendations

3.1 Fundamentals of firewalls and VPNs

Since this middle sized company requires remote access to the network services, this can be implemented by employing a router, gateway or firewall having VPN server that supports remote connections. In this way, users will be capable of accessing the network away from their offices. In addition, two or more offices can easily be linked together in a site to site configuration (Tipton & Krause, 2012; Gajrani et al., 2013).

There are a number of VPN types that can be used. First is the Point-to-Point Tunneling Protocol (PPTP) with built in VPN. However, PPTP has low level of security with other issues arising from users remotely connecting from networks that do not permit VPN services. Second is Layer 2Tunneling protocol (L2TP/IPSec which has better security as compared to PPTP. L2TP is also supported by many operating systems and popular mobile devices. Nevertheless, L2TP is hard to configure and can lead to connectivity issues from remote network connections that don’t permit VPN services. Third is the Secure Sockets layer (SSL) protocol which permits remote access by users who connect through web browser there by removing the VPN service issue. Next is the OpenVPN which is not supported by most built in clients on computers or mobile devices. Due to this, a third party VPN client software has to be installed on the computers or devices to support connections for remote users. However, OpenVPN provides high security and extra reliable connections from other networks that do not permit VPN pass-through (Tipton & Krause, 2012; Gajrani et al., 2013).

3.2 Recommendations for firewall and VPN solutions for the new company

First of all, this is a medium sized company where security is crucial to credit card transactions. Due to this size of the company, I recommend VPN/firewall which is able to support more than a dozen computers. These routers configured as firewalls also has integrated VPN server with virtual local area network support together with many SSIDs in case of wireless connections (Tipton & Krause, 2012; Gajrani et al., 2013).

As far as the discussion in 3.2 above is concerned, I also recommend the company to employ the use of Secure Sockets Layer (SSL) protocol since it eliminates the VPN pass-through problems. In addition, this protocol of VPN does not need full client software .With SSL, it is also possible to install a small plug-in through the browser in order to smooth the progress of tunneling of email traffic along with web browsing for users. A number of SSL VPN approaches also provide web portal whereby users can get the right of entry to applications in addition to emails without any VPN client. This kind of setup will also be suitable when the connection from home is needed or on different non corporate computer instead of a work laptop (Tipton & Krause, 2012; Gajrani et al., 2013).

3.3 Recommendations for implementing my proposed solutions

I would like to recommend the following for the implementation of the proposed solution. First is that the credit card information for every client should be encrypted for safety across the network in order to compliment on the security offered by the provision of Firewalls and VPN routers as mentioned above. Next is that both the company management team together with the anticipated company users of the expected system should participate fully during the implementation part of it. This kind of participation is important in ensuring that everyone’s opinions is taken in to an account for purposes of avoiding future complaints of network security system inefficiency(Tipton & Krause, 2012; Paul et al., 2012).

If the success of implementation is to last for longer time, then I also recommend that the company should have some staff assigned specifically to data security. The assigned staff should also be trained on regular basis to make them aware of all technical and legal issues of security. Safety guidelines should also be created for both laptops and other portable computing devices when they are used off-site. All employees should also adhere to the use of strict passwords and virus protection procedures. The company should also consider using payment card industry (PCI) standards to enforce encryption procedures for the protection of personal sensitive information like those of credit card transactions especially when it comes to their transmission across the network. In addition, the company should also carry out system penetration tests to find out if their system is hacker proof. Lastly, extra precautions ought to be taken to safeguard against information leakage just in case the company is vulnerable for industrial espionage (Tipton & Krause, 2012; Paul et al., 2012).

3.4 Practices that I will use to ensure security within the enterprise

Some of the security practices I intend to use within the enterprise include the following. First is to use sufficient access restrictions such as audit trails as well as strict penalties for violations on the company employees in order to safeguard against unauthorized access. The use of authentication procedures such as log in passwords will be enforced for every user. Secondly is to instruct the company employees during their initial orientation and on the ongoing training programs so that data for customers are confidential. Third is to ensure that the company security list is secure and that the company also has the sufficient security to prevent remote computer access to the company list. The forth practice is to make sure that the list recipients use adequate safeguards by ensuring that security measures are in place during the transfer of the list. Next is to ensure secure and timely return or description of lists used by other entities. I also intend to employ checking system to track usage list like the use of decoy names. Last but not least, I will ensure that there is always someone in the company who is responsible for the list security in such a way that he/she keeps up to date laws and regulations concerning fair information practices (Tipton & Krause, 2012; Gajrani et al., 2013).

Summary

From the discussion above, it is clear that the type of Routers/firewalls for VPN is determined by the size of the organization or company. This is because; company size also translates to the number of computers to be linked within the network. In our case of medium sized company, it is apparent that the number of computers required exceeds the dozen sizes. Therefore VPN router configured as firewalls which are a step up from the simple wireless Wi-Fi router is used for network security. Authentication and encryption measures are also needed for data security of unauthorized access.

The VPN and firewall protocols available for our case include PPT, L2TP/IPSec, SSL and Open VPN. This report has recommended the use of SSL because it is more reliable as compared to the rest in terms of remote access, that is, free from problems of VPN pass-through problems and other strengths as explained above. The recommendation also goes with the fact that daily credit card transactions calls for extra high security in terms of network and data itself if the issues of hacking and virus threats are to be eliminated. However, the success of this implementation will require full participation of all stakeholders involved in order to get maximum support.

References

Tipton, H. F., & Krause, M. (2012). Information security management handbook. CRC Press.

Paul, S., Gupta, S. D., Islam, K. A., Saha, K., & Majumder, S. (2012). Challenges of Securing the Smart Grid and Their Probable Security Solutions. International Proceedings of Chemical, Biological & Environmental Engineering, 44.

Gajrani, K., Bhargava, A., Sharma, K. G., & Bansal, R. (2013, November). Cyber security solution for wide area measurement systems in wind connected electric grid. In Innovative Smart Grid Technologies-Asia (ISGT Asia), 2013 IEEE (pp. 1-5). IEEE.

Posted in Uncategorized

Nursing Staffing challenges in Maryland

Nursing Staffing challenges in Maryland

Nurse Staffing challenges in Maryland.

The medical profession has been witnessing rapid growth mostly in the demand for the primary care services. Although this growth was somehow expected, it has not been accompanied by an increase in the number of doctors. This has led to the health care industry in Maryland calling upon the nurses into action.

Unfortunately, the nursing field is also facing its own shortages in staff numbers and who operate under very demanding schedules. Previous studies like the one by the University of Maryland Nursing School (Nursing research 2011 quoted in Rajaraman, 2013). One of the issues that were associated with low numbers of staff was the long hour shifts. These long hours at work and reduced off job hours contributed to poor patient handling and even deaths from avoidable errors.

The cadres that have been targeted mostly to replace the physicians are the nurse practitioners who have the skills to perform the tasks of a physician. This is only a stop gap measure since as indicated above; this has a domino effect on the lower job cadres.

Currently, Maryland’s population of nurses stands at 49,600, registered nurses who are active. Of these, 3,500 are nurse practitioners which mean they hold master’s degrees and a board of nursing license. The Government of Governor Martin O’Malley has committed to increase the population of nurses by 25% by 2020 partly via improving educational access as well as address the burden the medical staff faces (Gantz 2012).

In the words of Phyllis Snyder the vice president of the council for adult learning, it is not business as usual and we have to develop a variety of new pathways. One of these ways has been the concerted effort by health advocacy groups and nursing training institutions towards increase their drives towards having more students in the college level to choose nursing as a career. The groups are also encouraging nurses who are already in practice to pursue higher qualifications (Hoffman & Kaplan, 1998).

Schools have also embarked on missions to make nursing studies more accessible and affordable through inter schools partnerships, credit earned against prior experience and offering support towards tuition. The state on its part is designing ways in which it enhances access to nursing training as well as attracts more nurses into the state’s workforce.

An earlier report from the CGME (Council for Graduate Medical education) had established that only fewer than 20% of med school grandaunts pursue primary care as careers instead going for specialties with higher pay (Goldfarb, Goldfarb & Long 2008).Under the prevailing circumstances, nurses have been more than willing to take up the challenge of filling the gap but are forced to grapple with regulation and bureaucracy issues. For example, an assistant dean at the school of nursing University of Maryland Jane Kapustin bemoans the fact that she can legally diagnose diabetes at the university of Maryland Medical Center diabetes clinic, issue a prescription for insulin and commission tests but if she were to recommend special shoes, a physician would have to sign against the order.

It is encouraging to note that nurses in collaboration with advocacy organizations are exerting pressure to have the barriers reduced and it is hoped that these efforts combined with the pressure from increased need for additional primary care providers will eventually break the barriers.

References

Gantz S (2012). Maryland Nurses Come to fore as care landscape shifts, Baltimore Business Journal. Retrieved from http://www.bizjournals.com/baltimore/print-edition/2012/07/20/nurses-come-to-fore-as-care-landscape.html?page=all.Top of Form

Goldfarb, M., Goldfarb, R., & Long, M. (January 01, 2008). Making Sense of Competing Nursing Shortage Concepts. Policy, Politics, and Nursing Practice, 9, 3, 192-202.Top of Form

Hoffman, S., & Kaplan, M. (January 01, 1998). Problems encountered in the implementation of dementia care programs. American Journal of Alzheimer’s Disease and Other Dementias, 13, 4, 197-202.

Rajaraman M (2013) Study suggests link between lengthy Nurse shifts and patient deaths. Southern Maryland online. Accessed from http://somd.com/news/headlines/2011/13155.shtml.Bottom of Form

Nuclear Bombs

Nuclear Bombs

Nuclear Bombs

Indeed, while nuclear weapons have only been used once during times of war, dropped in Japan in August 1945, killing over 215,000 innocent people, there are a greater number of countries acquiring nuclear capabilities in the 21st Century making them more of a threat than ever before. Nuclear weapons are just one of many weapons of mass destruction that threaten innocent citizens worldwide (“World Mysteries” 1),

There are weapons of mass destruction other than the different kinds of nuclear warheads. Anthrax was a threat to our country not more than one year ago, and Smallpox is a current threat talked about quite often. Only a few countries possess Anthrax, but Iraq, North Korea, Russia, France, and the United States all possess Smallpox. The International Terrorist Group “al Qaida” is also thought to possess the deadly disease according to the State Department (Staff A6). An outbreak of Smallpox would bring the disease back from over 25 years of eradication, and could cause the death of thousands of people (McEnery B1).

Nuclear weapons pose a great threat to the world, by not only third-world countries, but also terrorist organizations using “Dirty Bombs”. Dirty bombs are conventional explosives, however encased by nuclear material such as Uranium or Plutonium. In addition to atomic bombs, and dirty bombs, there are over seventy-five other different variants of nuclear weapons, creating a constant threat to countries all around the world, including the United States of America.

There are over seventy-five top-secret presidential nuclear bunkers in which the President and some select few can go to during and after a nuclear war (“50 Facts” 3). On September 11, 2001, George W. Bush and others went to one of these facilities in Offutt Air Force Base in Omaha, Nebraska (Gibbs 33). Also until 1988, there was over $2,000,000,000 stored by the Federal Reserve in a facility for use after a nuclear war (“50 Facts” 3). There are many other precautions the United States Government takes to protect the country from nuclear war.

The history of nuclear warfare goes back hundreds of years. Uranium was discovered in 1789 by Martin Klaproth in the mineral pitchblende, and it was named after the planet Uranus. Pitchblende was only known about eight year’s prior to the discovery of Uranium. Uranium has a high density. The heaviest of all naturally occurring elements; Uranium is 18.7 times as dense as water, making it a common material in the keels of yachts and as counterweights in aircraft rudders and elevators. Also, it is great for radiation or heat shielding, as its melting point is 1132 degrees Celsius (“WNA: What is Uranium?” 1).

Atomic Bombs work as fission, where particles, or nuclei, are split exerting massive amounts of energy. This force expelled violently and explosively, is the atomic bomb, from the power that harnesses the atom. Atomic bombs are made up of one of the most unstable elements on the current periodic table, Uranium-235. Uranium’s atoms are unusually large; therefore, it is hard to hold them together. Plutonium-239 is also one of the materials used in making atomic weapons, however not harnessing the fission of Uranium; it acts as a catalyst to an even greater reaction (“World Mysteries” 2).

The concept of radioactivity has barely been around for 100 years. Discovered by Antoine Henri Becquerel in 1896, it was quickly studied by the scientific community. Albert Einstein formulated his “Theory of Relativity” in 1905, stating if mass could be transformed into energy, the energy liberated would be massive. Einstein’s theory would be proved thirty-three years later by Otto Hahn, along with his partner Fritz Strassman (“World Mysteries” 2).

It wasn’t until August 1942 when the United States established the Manhattan Project, when it developed, constructed, and tested the world’s first atomic bomb. Many prominent American scientists, associated with the United States Army, and their engineers, headed the project. It was three years later, July 16, 1945, when the first atomic bomb was tested in Alamogordo, New Mexico, using it less than one month later against Japan during World War II (“World Mysteries” 3).

There was tremendous competition in the race to develop nuclear weapons. The United States was far ahead of their competition, beating out the Soviets by over four years, when they tested their first test, August 29, 1949 (“World Mysteries” 3)?

Today both the Unites States and Russia have just about the same amount of active nuclear warheads, around 10,000. There are nuclear-arms treaties between the two superpowers, attempting to erase nuclear weapons from the weapon stockpile of countries worldwide. So many countries, and now terrorist organizations, now or soon will have nuclear weapons; some believe it could bring our world to an end. But once a country abolishes the weapons, their national security would be put at risk (“Nuclear Powers” 1).

Nuclear bombs are not the only form of weapons of mass destruction. There are various other methods, such as viruses, diseases, bacteria, etc. Actually, one of the greatest threats to the United States currently is the deadly smallpox virus. In preparation for an attack, the United States government is taking drastic action by vaccinating medical personnel in case of such an attack, who in turn would vaccinate the general public and by ensuring a stock of vaccinations is available (McEnery B1).

Nuclear bombs are not the only kind of nuclear weapons; the biggest threat comes from terrorists, and their “dirty bombs”. Dirty Bombs are not dropped out of an airplane; they are not launched from a missile site. They are conventional bombs; such as those used in car bombings, bus bombings, etc. The difference between conventional bombs, and dirty bombs is that at the core of dirty bombs is compacted radioactive nuclear material, which expands quickly after the conventional TNT explosion (“NRC: Fact Sheet” 1).

If a dirty bomb were to go off in Times Square, New York, the explosion would kill less than ten people, however it would kill or injure thousands more due to radiation exposure. There are several ways nuclear material can be acquired; there are over 21,000 licensed organizations in the United States legally using radioactive or nuclear material for medical, academic, research, or industrial purposes (“NRC: Fact Sheet” 1).

The Nuclear Regulatory Commission stated that they receive on average 300 reports of lost or stolen radioactive materials per year that could be used to build a dirty bomb. Due to the tragic events of September 11, the NRC is taking greater steps to safeguard higher-risk nuclear devices against terrorists. However, terrorists are not the only people attempting to obtain nuclear weapons (“NRC: Fact Sheet” 1).

There are countries attempting to obtain full nuclear warheads for use against other countries, and in one case against it’s own people. Iran, North Korea, Iraq, India, Pakistan, and Israel all have nuclear warheads. India, Pakistan, and Israel are commonly called the “de facto” states, while India and Pakistan conduct nuclear tests, Israel is widely assumed to have nuclear weapons of their own, despite not declaring any. Iran and Iraq both posses nuclear material and may be close to developing nuclear warheads (“Declared Nuclear Powers” 1).

Nuclear waste from nuclear power is another possible threat for nuclear bomb fuel. The most common nuclear element exerted as a waste product from Nuclear Power Plants is being tested for use in an atomic bomb, both for government and terrorist use. Since it is the most readily available radioactive element, there are threats that quantities may be stolen for terrorist use, providing radioactive material for both weapons making, and research (Vergano 1).

Weapons scientists at Los Alamos National Laboratory in New Mexico are studying the energy expelled when two halves of a neptunium sphere gets closer together over a four-day period. Americium, another nuclear waste product, was investigated by the International Atomic Energy Agency in 1999, along with neptunium. The IAEA found it could also serve as a weapons material, however it was viewed as less of a threat (Vergano 1).

While the detonation of a nuclear weapon anywhere would cause extensive damage, its power would depend on the altitude at which it explodes- high in the air, or at ground level. It also on whether it was detonated in an urban setting, such as a major city, or in the open country (“Effects of a Nuclear Bomb” 1).

Nuclear explosions give off a great pulse of radiation, leaving everything intensely radioactive. The air-burst given off from the explosion would completely vaporize most everything within the blast radius, rising into a giant fireball. Not only would immediate effects obliterate the affected area, but also electricity, communications, water, and other city utilities would be destroyed. Rescue services would be impaired from responding due to the severe damage to the immediate vicinity, and the inaccessible roads. Hospitals and medical personnel would be overloaded, due to the massive number of injured requiring medical attention (“Effects of a Nuclear Bomb” 4).

The effects to a major U.S. city of between one and two million people, by a one-megaton bomb would be devastating. One third of its population, would be killed immediately, another third would be seriously injured, while the remaining third would go with little or no injury. A whole year’s supply of blood would instantly be needed for transfusions, with new patients covering one third of all hospital beds in North America (“Effects of a Nuclear Bomb” 5).

Nuclear power plants use the neutrons surrounded by neutron-absorbing material to limit the chain reaction process in a controlled “slow burn,” instead of an explosion. The energy omitted by nuclear fission is used to heat water into steam, which in turn rotates a generator. There are over 107 nuclear power plants in the United States providing power to the country every day. Over 16% of the world’s electricity is from nuclear reactors powered by Uranium, all together generating enough power to provide five times the world’s most populated country, India (“WNA:What is Uranium?” 3).

Plutonium, Uranium, and other nuclear materials are often considered “Radioactive,” but what does radioactive mean? Radioactive materials atoms are continuously “falling apart,” resulting in such intense extra energy in the form of leftover neutrons that it damages human cells. In spite of this, the energy that is emitted is not an adequate amount of energy to create a nuclear explosion. The force of the Trinitrotoluene, or TNT, squashes the radioactive element to its ‘critical mass’, making it so dense that every escaping neutron bumps into another atom creating large explosions; this describes ‘nuclear fission’ (“Nuclear Bombs” 1).

When the atoms bump into each other, other nucleuses break down as well, whether it was ready to or not, releasing even more energy, and more neutrons. Those newly released neutrons are bumping into and breaking up more nuclei, quickly triggering a chain reaction. Within a fraction of a second, trillions of neutrons release energy, creating the massive explosion associated with a nuclear bomb (“Nuclear Bombs” 2).

Uranium is all around us in nature, often seen in rocks in two to four parts per million. It is also commonly found in seawater in small concentrations, which could be mined from seawater if demand rose high enough (“WNA: What is Uranium?” 1).

The world’s foremost miners of uranium in order are Australia, Kazakhstan, Canada, South Africa, Namibia, Brazil, Russia, and the United States of America. There are other smaller deposits that could be mined when deemed necessary as well. Uranium is only sold from these countries to countries who have signed the Nuclear Non-Proliferation Treaty, and who allow international inspectors to verify it is being used for peaceful purposes only.

Peaceful purposes for uranium include use of radioisotopes in medicine, emitting gamma radiation treating illnesses, cancer, sterilizing syringes, and other medical equipment as well. Smoke detectors also often contain radioisotopes derived from plutonium. Over 200 ships use nuclear reactors for power, submarines, aircraft carriers, icebreakers, and others enabling them to stay at sea for long periods of time without refueling (“WNA: What is Uranium?” 2).

Due to the disarmament agreements world wide, methods have been developed to dilute military uranium for use in peaceful purposes. Radioisotopes from such methods are currently being used in the preservation of food, crops, and livestock. Today’s uses for uranium are expanding to the thought of nuclear powered aircraft, and much more. Nuclear bombs are a threat that is never going to be erased, however, the power coming from radioactive elements for peaceful purposes is something that we cannot live without (“WNC: What is Uranium? 2).

Nuclear research has benefited mankind in many ways. But today, the nuclear industry faces huge, very complex issues. The future will depend on the advanced engineering and scientific research. The concept of the atom has existed for many centuries, but we only recently began to understand the enormous power contained in these tiny molecules. This power has been put to use for peaceful purposes, however it still posses the threat Albert Einstein stated in 1939 to the American President “It is possible to set up nuclear chain reactions in a large mass of uranium creating a new phenomenon in bombs” (“World Mysteries” 1).

Bibliography:

Works Cited

50 Facts about U.S. Nuclear Weapons. 11 Nov. 2002 .Countries with Nuclear Bombs. 6 Nov. 2002 .Cozic, Charles P. Nuclear Proliferation. San Diego: Greenhaven Press, 1992.

Declared Nuclear Powers. 11 Nov. 2002 .Dirty Bombs. 6 Nov. 2002 .The Effects of a Nuclear Bomb on an American City. 11 Nov. 2002 .The Effects of a Nuclear Bomb on an American City – Page Two. 11 Nov. 2002 .Gibbs, Nancy. “If you want to humble an empire.” Time 11 Sept. 2001: 32.

How Nuclear Weapons Work. 6 Nov. 2002 .Hydrogen Bombs. 6 Nov. 2002 .Landau, Elaine. The New Nuclear Reality. Brookfield: Twenty-First Century Books, 2000.

Levi, Michael, and Henry Kelly. “Weapons of Mass Disruption.” Scientific American Nov. 2002: 76.

McEnery, Regina. “Threat of Smallpox hunts us.” The Plain Dealer [Cleveland, Ohio] 6 Nov. 2002: B1+.

NRC:Fact Sheet on Dirty Bombs. 11 Nov. 2002 .Nuclear Bombs….How They Work. 5 Nov. 2002 .Nuclear Fusion. 5 Nov. 2002 .“Proliferation.” National Review 11 Nov. 2002: 16.

“Resolution, at last, from Security Council.” Economist 9 Nov. 2002: 14.

Smallpox. 6 Nov. 2002 .Squitieri, Tom. “Inspectors have plan for flushing out illicit weapons.” USA Today 12 Nov. 2002: 1.

Staff. “U.S. Expresses fear of Smallpox.” The Plain Dealer [Cleveland, Ohio] 6 Nov. 2002: A6.

U.S. Nuclear Power Plants 6 December 2002

Vergano, Dan. “Common Nuclear Waste Element could be bomb threat.” USA Today 21 Oct. 2002: D6.

Posted in Uncategorized

Nuclear Weapons and Global Peace

Nuclear Weapons and Global Peace

Nuclear Weapons and Global Peace

Name

Course

Tutor’s Name

Date

Nuclear Weapons and Global Peace

When the United States dropped two atomic bombs over the two Japanese towns of Hiroshima and Nagasaki, World War II gradually came to an end. But shortly afterwards, the world entered into a cold war, a period of great tensions as two sides (NATO and Warsaw Pact) engaged in an arms race. The situation was so tense that analysts came with a term Mutually Assured Destruction (MAD), to refer to a situation whereby the two protagonists (Soviet Union led by Russia and the United States) will simultaneous strike each other with nuclear weapons and wipe themselves out of the planet (Gaddis, 1982). Eventually the two sides had to step away from the brink of a major catastrophe.

As to whether the presence of more nuclear weapons can guaranteed continued world peace and stability is a matter of conjecture. On one side it has been argued that more nuclear weapons has a deterrent effect on nations (Oupblog, 2009), so that in case of a conflict, countries will always pull back from the brink by the mere thought that war will escalate to nuclear war. The consequences of nuclear war are too grave that anybody will not dare use them.

It can also be argued that, nuclear weapons cannot sustain the peace we have all along known. Countries such as Iran look at such weapons as leveling the ground against states that are out to bully them, casting doubts as to whether sobriety can prevail when it faced with obvious threat of an attack. It should also not be forgotten that terrorist elements such as Al Qaeda, have proved that they derived great delight from mass killings of innocent civilians (Oupblog, 2009, and Greenpeace, n.d.). The September 11 attacks in the United States are clear example of their thinking. One wonders what the world will look like should they access either the technology or the nuclear war heads.

In the current dispensations, and with the reality of terrorism, more nuclear weapons simply mean less control and easy access to terrorists, turning them into killing devices.

References

Gaddis, J. L.(1982). Strategies of Containment: A Critical Appraisal of Post-war American

National Security. New York: Oxford University Press.

Greenpeace,(n. d). Moving to a nuclear weapons-free world. Retrieved October 4, 2013, from

http://www.greenpeace.org.uk/peace/moving-nuclear-weapons-free-world

Oupblog, (2009, March, 26). Do nuclear weapons make the world a safer place?

Message posted to http://blog.oup.com/2009/03/nuclear-weapons/

.

Posted in Uncategorized

Notes on American Foreign Policy 1877-1920

Notes on American Foreign Policy 1877-1920

Notes on American Foreign Policy: 1877-1920 Few would argue that America had a clearly defined and articulated foreign policy at the end of Reconstruction in l877.

It was common to read newspaper editorials and comments belittling America’s Foreign Service.

The New York Sun decried the diplomatic service was “a costly humbug and sham.” Instead of making ambassadors, Congress should wipe out the whole service.” The New York Herald declared the “Trans-Atlantic cable had made diplomats unnecessary” and called for the abolition of the foreign ministry.

Perhaps most telling of American indifference to the outside world was Admiral David Porter’s comment in the l870s that the Navy’s fleet was so decrepit that it reminded him of the Chinese who painted dragons on their forts to frighten away their enemies.

Notwithstanding this, a number of factors between 1877 and 1900 pushed the country in the direction of a clear and identifiable American foreign policy:

New Manifest Destiny: The Industrial Revolution gave Americans a greater sense of themselves and America’s place in the world. The replacement of regional markets with a single national market, business sought to expand beyond the continental United States.

Bold new nationalism: Americans took greater pride in their country, reflected in singing the national anthem at sporting events and even comic operas. Americans were vocally unhappy with the attempt of Ferdinand De Lesseps’ attempt to sever the Isthmus and build the Panama Canal. Another example of this new nationalism was Secretary of State James G. Blaine’s tireless effort to create arbitration treaties with Latin American nations and congressional authority to negotiate reciprocity trade agreements. The efforts resulted in the Pan American Conference in l889.

The world became smaller: The New York World’s reporter Nellie Bly’s (real name Elizabeth Jane Cochran) recording shattering trip around the world in 72 days made it increasingly difficult for Americans to view the world through “isolationist lens.”

The popularity of Admiral A. T. Mahan’s The Influence of Sea Power Upon History struck a chord with both civilians and the military that any country is seeking to make its imprint on history needed to follow the example of England and build a robust navy and acquire coaling stations for commercial and military dominance.

Need for Overseas Markets: The remarkable growth of the American economy pushed businesses to find markets outside of the continental United States to unload their surplus goods.

The impact of these various forces, impulses, and factors, pushed Americans to involve themselves in countries and events outside the United States.

Samoa (1878-1899): As early as 1838 American whaling companies stopped off at the Samoan archipelago for rest and refueling. The friendly reception by the Samoan people led the United States to secure a foothold in Samoa.

In l878, the six-foot-four head of Samoa, Le Mamea (referred to as the “tattooed Prince”) was invited to Washington where a treaty was negotiated. The treaty provided that in return for the rights to a coaling station in Pago Pago, the U.S. would employ its “good offices” to adjust any differences between Samoa and other foreign powers.

The weak government had formally bound the United States to support it against foreign powers. This notwithstanding, Samoa the following year made treaties with Great Britain and Germany. Not long after, the Germans pressed demands on the Samoan king for “alleged” wrongs, forcing the U.S. to push against the Germans, leading to a naval standoff in 1888 at Apia. With naval guns trained on one another, a storm blew in and nearly sank both the American and German ships. Great Britain’s navy which was out of the storm’s reach, sailed in to save both countries.

The next year the three countries create a three-headed Samoan protectorate, with the native dynasty nominally “ruling from the royal hut.” However, as the saying goes about too many cooks in the kitchen, it failed. In late 1899, Samoa was permanently divided between Germany and the United States (American Samoa).

The Americanization of Hawaii (the 1870s to 1900):

As early as the 1820s, American whalers and missionaries journeyed to Hawaii. The fishing companies for rest and relaxation, and the missionaries to save souls. By the 1850s, European countries and America saw the strategic and economic value of Hawaii. In fact, American President Franklin Pierce negotiated a treaty for the annexation of the Hawaiian kingdom but blocked by the United States Senate (primarily because it included a provision for immediate statehood).

However, by the l870s the son of the missionaries had become wealthy sugar growers. Moreover, in l875 the U.S. entered into a reciprocity treaty with the Hawaiian kingdom. The treaty bound Hawaii not to make any territorial concessions to any other foreign power and allowed the U.S. a major coaling station. Furthermore, Hawaiians were allowed to ship sugar and other products to the U.S. duty-free. The treaty had little value to native Hawaiians but was of great importance to the white sugar growers who near the end of the nineteenth century owned two-thirds of Hawaii’s real estate.

Queen Liliuokalani ascends to the throne and declared “Hawaii for the Hawaiians”

The sugar-growers conspired with John L. Stevens; the American minister stationed in Honolulu and stages the fake, so-called “Revolution of l893.”

With American troops, stationed ostensibly to protect American property, the sugar-growers deposed Queen Lil.

Immediately a commission composed of three white Americans and one Englishman sail to Washington and push for the annexation of Hawaii. President Grover Cleveland refuses the annexation after finding out the Hawaiian people opposed annexation. However, Republican president, William McKinley has no such reservations and annexes Hawaii in 1898.

The native Hawaiians were not the only people unhappy about annexation. Fresh from defeating China in the Sino-Japanese War (1894), Japan was furious. With a quarter of the population of Japanese descent, they believed Hawaii should belong to them. HH

The Spanish-American War (1898)

War resulted from the forces building in America since the Industrial Revolution.

After years of oppression by Spain’s sugar growers, the Cuban peasants revolted. Using the cry “Viva Cuba Libre,” they sought the ouster Spain’s overlords by terror, dynamiting trains, and burning property owned by the Spanish Americans.

The American press sympathized with revolution making the comparison between their revolution and the American Revolution.American reporting of the revolution was influenced by the “rise of yellow journalism” and the competition between William Randolph Hearst’s New New Journal and Joseph Pulitzer’s New York World.

To increase the circulation of their newspapers, they exaggerated, distorted, and made up facts. Or as one contemporary put it, “they snooped, scooped, and stooped to conquer” their competitors.

At the beginning of the Cuban Revolution, the combined circulation of both newspapers was 800,000. By the end of the Spanish-American War, the circulation doubled to 1.6 million.

To end the rebellion Spain sent General Valeriano Weyler to Cuba. General Weyler positions forces between the cities and countryside, and constructs huge wired concentration camps with no humanitarian provisions. Cuban women, children, and men die from the lack of sanitation and brutality.

In the midst of putting down the rebellion, tensions escalate the United States. Spain accuses the U.S. of sympathizing with the revolutionaries and running guns from Florida to support the revolution. Segments of the population pressure the American government to take action to end the revolution. This is especially true of the business community, which is losing money from the destruction of their investment in sugar growing on the island. Men like William Randolph Hearst who has invested millions of dollars in growing sugar on the island.

Still, President McKinley is reluctant to get America involved in the revolution but issues two strongly worded demands of Spain in 1897. He insists on the modification of the concentration camps to make them more humane and granting the Cuban people some sort of autonomy or democracy.

Spain accepts the demands and the crisis appears averted, when early 1898, the USS Maine on a “friendly” trip to Cuba suddenly explodes while in the harbor of Havana. While there were multiple suspects and causes for its explosion, for the American people, the only acceptable suspect is Spain, embodied in the cry, “Remember the Maine, to Hell with Spain.”

Congress declares war on Spain in April, 1898.

It was a short war lasting roughly four months (August). Yet, it had important implications for America’s place in the world. England hails the quick defeat of Spain praises America for taking its rightful place among the great nations.

The Treaty of Paris, Dec. 10, 1898, officially ended the war. The major consequences of the war are:

a. It ended Spanish Empire in America and the Pacific.

b. Spain gave up rights to Cuba. To let the world know the war was not fought for territorial gain, Congress passed the Teller Amendment as it declared war on Spain. The Amendment specifically declares the U.S. did not covet one an inch of Cuban territory.

c. Spain cedes Puerto Rico, an island in the Marianas, and ultimately Guam to the United States.

d. Spain surrendered the Philippines, but the Phillippine citizens who fought beside the Americans to gain their independence were left with their fate in the hands of a “commission.” Unfortunately “duty, dollars, and destiny” got in the way of America’s outright recognition of Phillipino independence. Betrayed by the United States, the Phillippinos, led by Emilio Aguinaldo, fought the Americans. The Americans used the same concentration camps they denounced the Spanish for erecting. The U.S. employed nearly 70,000 troops to put down the Phillippines.

f. In the end, the U.S. annexed the Philippines.

John Hay and the Open Door Notes 1899, 1900

The annexation of the Philippines made the United States a far eastern power and forced to become increasingly concerned over the dramatic events on the Asiatic mainland. After China revealed her weakness in the Sino-Japanese War (1894-1895), the imperialistic European powers descended on the “paper tiger.” They extorted long-term leaseholds and created valuable spheres of influence. Although trade with China was relatively small, it was growing with promising rapidity.

The British, who had the largest foreign trade stake in China, were worried about their presence in the far east. Twice in 1898 and1899, Britain proposed a cooperative arrangement with other countries to ensure equal commercial opportunities in China. This became known as—the Open Door Policy. On both occasions the U.S. said no, arguing it was inconsistent with its traditional no entanglement policy. However, during further discussions with British officials the idea of equal commercial opportunity met with increasing favor. In the end, business pressures on the State Department became strong that some kind of action became imperative. In the late summer of 1899, several British officials working with President William McKinley and Secretary of State John Hay worked out a memorandum that became the Open Door Policy.

Open Door Note One September 6, 1899:

Secretary John Hay sent Open Door notes to Germany, Britain, and Russia. Shortly after, he included Japan, Italy, and France. The note requested each country to provide assurances they would abide by the following:

1. Within its sphere of interest or leasehold in China, no power would interfere with any treaty port or any vested interest.

2. The Chinese tariff treaty would be applicable with such spheres of interest (influence), and the duties were to be collected by the Chinese government.

3. Within their spheres, no power would discriminate in favor of its own nationals in the matter of harbor dues and railroad charges.

Naturally, England and America supported the first open door, while others responded generally or not at all. In truth, the original Open Door Note was merely a dramatic statement of America’s commercial interest, and did not spring from unselfish motives.

Open Door Note Two July 3, 1900:

The Boxer Rebellion prompted the second open door note. A group of fanatical Chinese, called the Boxers, rose up against the foreign “devils” taking over China. After widespread murder and pillaging, a group of whites, including members of various foreign legations found themselves besieged in the foreign legations in Peking, China. American Secretary of State, John Hay led an effort to create an 18,000 international rescue force and free the beseiged foreigners. In August, 1900, the besieged legations were freed. Still, Hay was suspicious that some of the imperialistic powers would take advantage of the chaos to unhinge the Open Door, and issued the Second Open Door.

The note proclaimed that the policy of the Government of the United States was to seek a solution which preserved “Chinese territorial and administrative entity.” Unlike the first Open Door Note, it did not call for an answer. Hay understood that the powers were so strong and suspicious of one another that no one of them was in a position to challenge the Open Door; thus in the end, acquiescing in China’s territorial integrity. Equally important, as countries sought seeking alliances, no wanted to unnecessarily offend the United States, a rising star.

Foreign Policy l900-1920

American and Canal Zone Diplomacy

After the Spanish-American War, public interest of a canal in the Western hemisphere was revived

A.Roosevelt’s Big Stick or Cowboy diplomacy

A French company, headed by Ferdinand de Lesseps, builder of the Suez Canal, threatened to deny the American people the long dream of severing the two continents at Panama. After the French Canal Company had excavated two-fifths of the canal, the whole enterprise collapsed in scandalous ruin—a victim of incompetence, extravagance, disease, heat, and jungles. The collapse allowed President Roosevelt the opportunity to realize America’s dream of severing the Isthmus.

To understand Theodore Roosevelt’s opportunity we need to go back to the 1842 Clayton-Bulwer Treaty. In the treaty, the United States and Great Britain agreed that neither country could construct, hold or fortify a canal in the area that became Panama. It should also be mentioned that with the assassination of McKinley, Roosevelt want to prove he was not “his Accidency” but entitled to be president in his own right. Nothing he believed would prove this than “making the dirt fly” building a canal severing the isthmus and drastically cutting American miles and time to reach the Far East.

He pushed through the Hay-Pauncefote Treaty of 1901 with Great Britain abrogating the Clayton-Bulwer Treaty allowing the U.S. to honorably build, hold, and fortify a canal in this part of the world.

Following an American instigated revolution in Columbia, and recognition of Panama as a sovereign country the U.S. signed the Hay-Bunau-Varilla Treaty. The treaty had the following conditions:

1.The U.S. gave Panama a payment of 10 million dollars and $250,000.00 a year.

2.The U.S. received a canal zone of ten miles and granted extraordinary sovereign rights.

6.Dismayed with Cuban instability and the fear a major power might secure a foothold there, jeopardizing the Isthmus and the U.S., it-forced Cuba to sign the Platt Amendment, reversing the Teller Amendment, and making it a quasi-protectorate.

The Platt Amendment (1901):

a.Cuba could not make a treaty impairing her independence or permitting a foreign power to secure lodgment in or control over the island.

b.Cuba pledged not to incur indebtedness beyond her ability to pay.

c.The U.S. was at liberty to intervene for the purpose of preserving order and maintaining Cuban independence.

d.Cuba agreed to an American-sponsored sanitation program aimed at yellow fever, malaria, and other mosquito-related diseases (not so much for the Cubans but the Americans visiting and living in the Canal Zone).

e.Cuba agreed to sell or lease to the U.S. sites naval and coaling stations. [Guantanamo became the principal base].

The Roosevelt Corollary (1904)

Roosevelt’s Big Stick Diplomacy was also seen in his willingness to take on the role of a regional policeman. Following Spanish-American War and his canal diplomacy, he grew concern that a crisis between Venezuela and its creditors could spark an invasion of that nation by European powers. Therefore, he announced the Roosevelt Corollary in December 1904. The Corollary stated the United States would intervene as a policeman and last resort to ensure that other nations in the Western Hemisphere fulfilled their obligations to international creditors, and did not violate the rights of the U.S., or invite “foreign aggression detrimental of the entire body of American nations.

Santa Domingo (1905) was the first example of an attempt to enforce the Roosevelt Corollary. By 1904, after an orgy of murder and civil war the Dominican Republic was bankrupt. Roosevelt feared the four principal European nations with investments might forcibly attempt to collect their debts. Such attempts, especially if countries decided to remain after retrieving their losses, would violate the Monroe Doctrine and jeopardize America’s interests, forcing the United States in an all our war. Such insurrectionary habits of “these wretched republics” imposed certain responsibilities on the United States. In short, Roosevelt believed he could not permit the foreign powers to collect their alleged debts by force. America had a mandate to intervene and compel these reluctant republics to pay their bills.

Under the Corollary, the U.S. forced the Dominican Republic to invite the U.S. in and take over the revenue-producing customs houses. Santa Domingo retained 45% of the customs for Dominican expenses and the U.S. allocated 55% for its outstanding indebtedness. Such a radical assumption of power, Congress initially balked at the corollary but by 1907 got on board with a new treaty with the Dominican Republic.

Another important example of Roosevelt’s “Walk softy but carry a big stick” foreign policy occurred following the Russo-Japanese War, (1904-1905). U.S. relations with both Russia and Japan were strained over their failure to secure certain spoils of war.

The war developed from Russia and Japan’s rivalry for dominance in Korea and Manchuria. After the First Sino-Japanese War, Japan acquired the Liaodong Peninsula from China, but European powers forced Japan to return it. China subsequently leased it to Russia. During the Boxer Rebellion, Russia had thrown troops into Manchuria, ostensibly to protect Russian lives and railroad interests.

Despite repeated and insincere promises to withdraw, they were still there in l904. Equally important, the trans-Siberian Railroad was nearing completion and Russia stalled until the last stake was driven. Once completed the Russians could ship large quantities of military supplies to attack the Japanese. Aware that the Russian bear was not going to withdraw, the Japanese launched a damaging “sneak” attack on the Russian fleet at Port Arthur, Manchuria. At the outset, American sympathies went out to the “clever little Nipponese.” America’s former Secretary of State, Elihu Root praised the Japanese for showing how to fight a “bully.” Americans would not feel the same with the Japanese attack on Pearl Harbor in 1941.

By the spring of 1905, the Japanese, running dangerously short of men and money, secretary invited President Roosevelt to act as a mediator. He agreed after some hesitation and brought to two belligerents to the negotiating table at Portsmouth, New Hampshire in August of 1905.

Results of the treaty:

The Japanese demanded the Siberian island of Sakhalin and a huge monetary indemnity of $600 million dollars to cover the cost of the war. In the end Japanese did not get $600 million dollars and all of the Siberian island of Sakhalin, It did settle for the southern half and wrested from Russia the Southern Manchurian Railway, and virtually hegemony over Korea in the Katsura Memorandum. Katsura Memorandum (1908) was an agreement of understanding that America recognized Japanese “suzerainty” over Korea. It instructed the state department to direct any inquiries about Korea and from Korea to the Japanese government.

Beyond the treaty, American relations with Japan soured following the war resulting in a second xenophobic episode of the “Yellow Peril.” Attempts to segregate Japanese students in the San Francisco public schools created a saber-ratting exchange between the two governments. To prevent a deeper foreign relations crisis between the two countries, Roosevelt invited the entire board of education and the mayor (under indictment for graft) to the White House where he used his charm to convince them to back off their anti-Japanese activities and allow him to deal with the problem.

Roosevelt understood that behind the attempt to create a caste system for Japanese students in the school system was the desire by Californians to stop the immigration of Japanese, period. To ameliorate this problem, he issued the Gentleman’s Agreement.

Under the Gentlemen’s Agreement:

a. The Japanese agreed to issue no more passports to coolies coming directly to the mainland of the United States.

b. The San Francisco Board of Education rescinded the objectionable school order, and the tensions eased.

c. Japanese immigration under the agreement dwindled to a trickle.

d. Japanese could still go to the Hawaiian Islands.

Following the Gentleman’s Agreement, the U.S. signed one other important agreement with the Japanese, the Root-Takahira Agreement.

The Root-Takahira Agreement between the United States and Japan contained the following points.

Both the U.S. and Japan subscribed to the policy of maintaining the status quo in the Pacific area.

Mutual respect of each other’s territorial possessions in that region of the world.

Uphold the Open Door in China.

Support by peaceful means the “independence and integrity of China.”

To demonstrate that America acted out of fairness and not fear, Roosevelt sent the “Great White Fleet” around the world by from 16 December 1907 to 22 February 1909. The fleet consisted of sixteen new battleships of the Atlantic Fleet and painted white except for gilded scrollwork on their bows.

Both the Katsura Memorandum and the Root-Takahira Agreement reflected Roosevelt’s belief in the United States obligation to become internationally involved in world affairs.

Posted in Uncategorized

NSG124 Pharmacology Study Test Plan Exam 3

NSG124 Pharmacology Study Test Plan Exam 3

NSG124 Pharmacology Study Test Plan Exam 3

Unit 3 Module 9 & 10 Location Student Notes

Therapeutic uses

Adverse effects

Patient education

NSG124.09.01.02

RAA Drugs Patient education

Nursing interventions

Nursing considerations

NSG124.09.01.03 (x2)

Nursing Care for RAA Drugs Adverse effects

Patient education

Nursing Interventions

Nursing Considerations

NSG124.09.02.02 (x3)

Nursing Care for Calcium Channel Blockers Therapeutic uses

Adverse effects

Examples

Drug to drug interactions

NSG124.09.03.01 (x2)

Vasodilator Agents Therapeutic uses

Adverse effects

Examples

Nursing considerations

Drug to drug interactions

NSG124.09.04.03

Hypertensives in Emergencies & Pregnancy Nursing interventions

Nursing considerations

Adverse effects

Patient education NSG124.09.04.04 (x3)

Nursing Care for Antihypertensive Agents

Nursing considerations

Adverse effects

Patient education

Therapeutic effects NSG124.09.05.04 (x3)

Nursing Care for Antihypertensive Agents

Nursing considerations

Nursing interventions

Patient education

Therapeutic effects

NSG124.10.01.03 (x4)

Nursing Care for Antidysrhythmic Agents Nursing considerations

Nursing interventions

Patient education

Therapeutic effects

NSG124.10.02.02

Atherosclerotic drugs Nursing considerations

Adverse effects

Patient education NSG124.10.02.03 (x3)

Nursing Care for Atherosclerotic Agents Nursing considerations

Adverse effects

Patient education

Therapeutic effects

NSG124.10.03.03 (x3)

Nursing Care for Antianginal Agents Nursing considerations

Nursing interventions

Patient education

Adverse effects

NSG124.10.04.02

Anticoagulant Drugs Nursing considerations

Nursing interventions

Patient education

Adverse effects

NSG124.10.04.03 (x5)

Anticoagulant Nursing Considerations Nursing considerations

Adverse effects

Patient education

NSG124.10.04.07

Thrombolytic Nursing Considerations Treatments

Patient education

Examples

NSG124.10.05.02

Myocardial Infarction Agents Nursing considerations

Treatment

Patient education

Adverse effects

NSG124.10.06.03 (x3)

Nursing Care for Deficiency Anemia Agents Unit 3 Module 11 &12 Location Student Notes

Examples

Patient education

Nursing considerations

Adverse effects

NSG124.11.01.02

SSRI & SNRI Depression Agents Patient education

Nursing considerations NSG124.11.01.05

Atypical Antidepressant Agents Patient education

Nursing considerations

Adverse effects

NSG124.11.01.06 (x2)

Antidepressant Agent Nursing Consideration Examples

Patient education

Nursing considerations

Nursing interventions

Adverse effects

NSG124.11.02.02 (x2)

Antianxiety Agents Patient education

Nursing considerations

Nursing interventions

Adverse effects

NSG124.11.03.02

Bipolar Disorders & Nondrug Therapy Patient education

Nursing considerations

Nursing interventions

Adverse effects

NSG124.12.01.03 (x2)

First-Generation Antipsychotic Nursing Considerations Patient education

Nursing considerations

Nursing interventions

Adverse effects

NSG124.12.01.05

Second-Generation Antipsychotic Agents Patient education

Nursing considerations

Nursing interventions

Adverse effects

NSG124.12.02.03

Barbiturates Patient education

Nursing considerations

Nursing interventions

Adverse effects

NSG124.12.03.02

Controlled Substance Act & Healthcare Impact Patient education

Nursing considerations

Nursing interventions

Adverse effects

NSG124.12.03.03

Alcohol Pharmacology & Alcohol Use Disorder Patient education

Nursing considerations

Nursing interventions

Adverse effects

NSG124.12.03.04

Nicotine & Smoking Cessation

Posted in Uncategorized

Nursing And Millennium Goals

Nursing And Millennium Goals

Nursing And Millennium Goals

Contents

This paper looks at UN millennium development goals, focus being on the fifth millennium development goal which is improvement of maternal health. This goal is divided into two parts. The first part deals with reduction of maternal mortality and the second the second part deals with universal access to reproductive health. The paper also elaborates on the importance of improvement of maternal health to the nation. It further highlights on the importance of this goal to the community. Nurses have a great role in working towards achieving the millennium development goals. These roles are also elaborated in the paper.

Millennium development goal 5A: Reduction of maternal mortality

Almost half a million lives of women and children are lost during pregnancy and child birth. A large percentage of these deaths can be avoided or are preventable. The reduction of maternal mortality is not only an issue because of its effect on development of a nation but also since it posses a challenge in human rights. Low mortality rates means that the nation is better placed in terms of health. It also means that there are measures that have been put in place to ensure a decrease in this maternal mortality rates. If there is a risk of transfer of HIV from an infected mother then caution is taken to prevent this transfer and decrease deaths due to HIV among infants. This decrease in child mortality rate will have a positive effect on the health of the nation since there will be no deaths due to HIV and further more new cases of HIV are not registered. (Hunt, p., & Bueno, 2000.). Reduction of maternal mortality is also important since it promotes the right to life. This means that the nation will be a healthy one with no individual mother or child denied the right to life.

Millennium development goal 5B: Universal access to reproductive health

The access to universal health is important in terms of the health of a nation. Pregnant women are entitled to effective and sufficient health in the preconception period, the prenatal stage and also the postnatal stage. Access to this reproductive health ensures that there are no complications in child birth and also after child birth. Both the mother and the child are expected to be perfectly healthy after delivery. This therefore means that the health of the nation will be improved since there will be reduced cases of pregnancy related deaths.

Application of millennium development goal 5 to the community

This millennium development goal is very important to the community in various aspects. The World Health Organization has the expectation that in each community this goal can be fully realized. The goal is applicable in the community since there is the general need to reduce the mortality rate of children and mothers in cases that relate to pregnancy and child birth. Therefore, proper care should be given to the expectant mothers in terms of check up and advice during the time they are pregnant. There should be adequate health providing facilities within the community that offer prenatal and post natal clinics for pregnant women which arrest any emergency case and hence prevent mortality. The existence of quality education on issues pertaining to reproductive health is also a way in which the community can work towards attaining the goal. Members of the community should be educated on family planning, and ways to prevent mother to child HIV transmission. They can also access information on how they can take care of themselves and the child after birth. Therefore there is building of health institutions and employment of qualified workers in these institutions who will help in realization of this goal. Through this the goal becomes a reality that can be achieved within the community.

Monitoring and Measuring the Progress towards the Millennium Development Goal 5

For there to be realization of the millennium development goal five, the process of putting it into force has to be carefully monitored and measurement of the progress constantly done. There are various international bodies that help in monitoring the process such as the WHO and the Centre for Disease Control.

Health workers within a community can be of great aid in monitoring the implementation (Tanzania, A. 2012). There can be regular checking of the population which should be done carefully and the records used to compare with previous ones and check if there is a decline in pregnancy related deaths within a community. The equipment within health facilities should be checked constantly and any outdated ones should be replaced with new effective equipment. The employees in these health facilities should also be very qualified and fresh talent should be constantly incorporated into these institutions.

Nursing Role in Attaining the Millennium Development Goals

Nurses play crucial roles towards the achievement of millennium development goals. There are various ways through which they aid in achievement of these goals this may be for instance; achieving goal three which is promoting gender equity and empowering women. They can develop understanding of the instruments and the various declarations of human rights. They can educate the public using examples such as violation of human rights, which can take forms such as discrimination based on gender, crude practices such as female genital mutilation and other violence. They can do this through demonstration of their harmful consequences on the health. They can also encourage women to acquire skills that will make them elevate their economic and social status (Christi, 2011). They should also lobby for equity in access and to affordable and effective health.

Nurses also have a role in achieving the fourth goal which is to reduce child mortality. They do this through putting emphasis on the child immunization and highlighting the risks that are associated with lack of immunization which can be causes of deaths. They also encourage parents to attend antenatal and postnatal care. They can also make formal teachings to parents on health and illness where they are the main information providers. They can also provide health services or be supervisors in the process of health service provision (Christi, 2011). They can also organize for door to door immunization services which will reduce child mortality rates.

In conclusion,  the paper shows that there are serious measures that are undertaken in achievement of the various millennium development goals and the key stake holders in the achievement of these goals. The importance of realizing these goals are also highlighted and the effect they have on the community.

References

Hunt, p., & Bueno, j. (2000.). REDUCING MATERNAL MORTALITY. The contribution of the right to the highest attainable standard of health. Retrieved September 27, 2012, from www.unfpa.org/webdav/site/global/shared/documents/publications/reducing_mm.pd

Christi, L. (2011). Roles of Nurses in Achieving Millennium Development Goals | Healthmad. Healthmad. Retrieved September 27, 2012, from http://healthmad.com/conditions-and-diseases/roles-of-nurses-in-achieving-millenium-development-goals/

Tanzania, A. (2012). Community Health Workers – an important resource towards achieving the MDGs. Community Health Workers – an important resource towards achieving the MDGs. Retrieved September 27, 2012, from www.who.int/workforcealliance/forum/2011/hrhawardscs36/en/index.htmlUNEP & the Millennium Development Goals (MDGs) – Goals # 4, 5, 6: Improve Public Health – United Nations

Environment Programme (UNEP) –. (2008.). United Nations Environment Programme (UNEP) – Home page . Retrieved September 27, 2012, from http://www.unep.org/Documents.Multilingual/Default.asp?DocumentID=448&ArticleID=4893&l=enAchieving Millennium Development Goal 5: Reproductive Health, Poverty Reduction and Health Sector Reform | World Bank Institute (WBI). (2012). World Bank Institute (WBI). Retrieved September 27, 2012, from http://wbi.worldbank.org/wbi/event/achieving-millennium-development-goal-5-reproductive-health-poverty-reduction-and-health-secto

Crawford, B. (2008). Global Health 1. http://www.nwc.cc.wy.us/waw/essays/essay84.pdf. Retrieved September 27, 2012, from www.nwc.cc.wy.us/waw/essays/essay84.pdf