Saturday, August 31, 2019

Network Security Plan Essay

INTRODUCTION (Purpose and Intent) The Corporation Tech IT Network Security Plan establishes guidelines for IT practices used on a day to day basis to provide a secure and robust computing environment. These practices are used in order to protect the mission, operation, and reputation of Corporation Tech System and its information systems. These system security policies, standards, and procedures that have been established for the Corporation Tech System, are intended to comply with the regulations and policies set down by the State of Florida, Corporation Tech, and the Federal Information Security Management Act (FISMA). SCOPE These standards and procedures apply to all information systems and resources under the control of Corporation Tech, including all computers connecting to the Corporation Tech network and all Corporation Tech System employees, contractors, and any other individuals who use and/or administer those systems and computers, particularly those involved with information system management. STANDARD PROVISIONS Corporation Tech IT will manage risk by identifying, evaluating, controlling, and mitigating vulnerabilities that are a potential threat to the data and information systems under its control. User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited  from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or Internet computing resources. In the interest of maintaining account security, passwords will be changed on a regular schedule or anytime the integrity of the account is in question. Corporation Tech IT network or computing resources may not be used for personal commercial purposes, for personal profit or to violate the laws and regulations of the United States or any other nation, or the laws and regulations of any state, city, province or other local jurisdiction in any material way. Use of Corporation Tech resources for any illegal activity may result in loss of network access privileges, official reprimand, suspension or dismissal. Corporation Tech will cooperate with any legitimate law enforcement agency or inquiry in the investigation and prosecution of any alleged wrongful activity. Corporation Tech’s network or Internet facilities may not be used to disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of another user. Corporation Tech owned networking and communications equipment, may only be moved by Network and Computing Support staff, or authorized agents. Reconfiguration of network hardware or software, except by designated individuals within IT, is strictly prohibited. Prior to connecting any server, network communication or monitoring device to the Corporation Tech Network, approval must be obtained from Data Center Communications. Attachment of any the following devices to the Corporation Tech network, other than those provided or approved by Network and Computing Support, is strictly prohibited: a. DHCP servers. b. DNS servers. c. NAT routers. d. Network Gateways. e. Packet capturing or network monitoring devices. f. Any device that disrupts or negatively impacts network operations. STATEMENT OF PROCEDURES The procedures for conducting a risk assessment and for the control and mitigation of risks to the Corporation Tech Information Systems include: NETWORK CONTROL Corporation Tech IT has software and systems in place that have the ability to monitor and record network, Internet and computer system usage. This includes monitoring and security systems that are capable of recording network traffic, including traffic to World Wide Web sites, chat rooms, newsgroups and e-mail messages, file servers, telnet sessions and file transfers into and out of our internal networks. This capability is necessary in order to maintain the health of Corporation Tech network operations and diagnose network related problems. Corporation Tech IT reserves the right to perform network monitoring at any time. The information collected may be used by technicians and management to assess network utilization and trends, and may also be provided to upper management or other authorities as evidence as part of any investigation of alleged policy violations. Corporation Tech IT reserves the right to perform periodic port scans, segment sweeps, and vulnerability scans on all network segments. Network operations, functions, and resources, which are not required as part of the normal and approved job duties or projects at Corporation Tech, may be bandwidth limited or blocked by network control devices in order to protect the integrity and availability of the overall system. Corporation Tech IT may suspend network access to any location or system that disrupts normal network operations or systems that violate Corporation Tech policy. In this event, an attempt will be made to contact the responsible individual to resolve the problem. DHCP SERVICES Corporation Tech IT provides centralized and redundant DHCP and DNS services for Corporation Tech. Due to the nature of these services, and because of the potential disruption of service and possible security breaches resulting from incorrect setup of additional systems, attachment of unauthorized DHCP or DNS servers is prohibited. The following guidelines must be followed when requesting or using any DHCP or DNS services: †¢ Systems requiring an IP address must support DHCP and be capable of obtaining DHCP address information from one of the centrally administered University DHCP servers. †¢ Using DHCP, devices requesting an IP address will be assigned a dynamic pool address from the subnet to which the device is attached. Devices with dynamically assigned IP addresses may have their address change. †¢ Static IP addresses needed for server class machines or specialized clients must be  requested from the Data Center Communications Team via a Help Desk ticket. DNS SERVICES User workstations, which have been assigned a dynamic pool IP address, will have an associated DNS name assigned by the network. Any DNS name or domain name that is to be associated with Corporation Tech network, must be requested from and/or registered through Web Services. DNS names ending in corptech.com are made available upon request for Corporation Tech approved services. Requests for assignment of DNS names must be for valid Corporation Tech related purposes. DNS names for domains other than corptech.com, and which are to be hosted by Corporation Tech systems, must be requested from Web Services. Any charges for initial or ongoing registration of the requested name are the responsibility of the requestor. DNS names, not in the corptech.com domain, will be handled on a case by case basis. Corporation Tech IT will work with any user requesting a domain name to identify an appropriate and available name, however Corporation Tech IT has final approval for all DNS name assignments. WIRELESS NETWORK SERVICES Because wireless networks can be used to provide access to the same resources and services as wired network systems, the same basic procedures that are used in a wired network environment can also be applied in a wireless network environment. However, due to the nature of wireless networks, additional security and control mechanisms are needed in order to maintain the security, operation and inter-operability of both traditional and wireless systems. Wireless routers are not allowed on the Corporation Tech network unless they have been approved by Corporation Tech IT. Access to the Corporation Tech Wireless network is limited to individuals who have a Corporation Tech account except in locations where the guest network is available. The Corporation Tech Guest Network is segregated from the internal servers and resources used by authenticated users to keep the network secure. The Corporation Tech Guest Network is only available in approved areas, and require a request to be expanded into any other areas. Users of the Corporation Tech Guest Network are required to provide a valid cell phone number in order to authenticate. Destruction and Disposal of Information and Devices Restricted information must be disposed of in such manner as to ensure it cannot be retrieved and recovered by unauthorized persons. When donating, selling, transferring, surplusing or disposing of computers or removable media (such as DVDs), the proper procedures to make data unreadable on those media will be taken. Acceptable procedures are listed on ISSP-009, â€Å"Medial Disposal.† NETWORK ACCESS Anyone who uses the Corporation Tech computing environment must have appropriate status (e.g. management, employee, staff, or authorized third party) and must be properly authenticated when required. Access will be provided to vendors and or other Corporation Tech partners through the sponsored VIP account process, as described on http://www.corptech.com/it/services/vip.aspx. VIP accounts are reviewed and renewed on six month intervals to see if access is still needed. When an employee leaves the organization accounts will be disabled once TERM status is updated, and individual departments must approve re-activation of account access. USER COMPUTING DEVICES Users are responsible for the security and integrity of Corporation Tech information stored on their workstation, which includes controlling physical and network access to the equipment. Users may not run or otherwise configure software or hardware that may allow access by unauthorized users. Anti-virus software must be installed on all workstations that connect to the Corporation Tech Network. Corporation Tech Computers may not be used to copy, distribute, share, download, or upload any copyrighted material without the permission of the copyright owner. PHYSICAL ACCESS Access to Corporation Tech IT Data Center should be restricted to those responsible for operation and maintenance. Access by non-IT personnel is not permitted unless they are escorted by an authorized IT staff member. Computer installations should provide reasonable security measures to protect the computer system against natural disasters, accidents, loss or fluctuation of electrical power, and sabotage. Networking and computing hardware are placed in secure and appropriately cooled areas for data  integrity and security NETWORK HARDWARE Network hardware are housed behind a locked door to protect physical access to switches and other network hardware. Access is only allowed though card access or with a checked out key. All switches and network hardware are password protected at a minimum via a local account setup on the device itself, these passwords are changed periodically as administrators leave the organization. Subnets allowed to authenticate with switch management will be restricted, to create tighter control of backend administration. Exec level access Timeouts implemented on Console and VTY lines, so that any idle sessions are terminated automatically. All switches are time synced using NTP, so that incidents can be tracked and correlated to the proper timeframe. SERVER ENVIRONMENTS All servers are subject to a security audit and evaluation before they are placed into production. Administrative access to servers must be password protected and use two-factor authentication whenever possible. Servers should be physically located in an access-controlled environment. All internal servers deployed at Corporation Tech must be owned by an operational group that is responsible for system administration. Servers must be registered with the IT department. At a minimum, the following information is required to positively identify the point of contact: a. Server owner contact(s) and location. b. Hardware and Operating System/Version c. Main functions and applications d. MAC address (If not a virtual server) Services and applications that will not be used must be disabled where practical. Access to services should be logged and/or protected through access-control methods to the extent possible. The most recent security patches must be installed on the system as soon as practical. Do not use administrator or root access when a non-privileged account can be used. Privileged access must be performed over secure channels, (e.g., encrypted network connections using SSH or IPSec). EXCEPTIONS All requests for exceptions to these standards and procedures will be handled by request, and will follow these guidelines: †¢ Must be submitted in writing to and approved by the CIO or with the proper authority. †¢ Will be reviewed on a case by case basis. NETWORK SECURITY Corporation Tech network design is built around three principles, Defense-in-Depth, Compartmentalization of Information and Principle of Least Privilege. Our first step was to look at what we are protecting, which is ultimately our business and clients data and information. To ensure a sound architecture we started the design of our network with scalability in mind. It is important that our design is flexible enough to meet future needs. The threats we know about and face today may not be the ones we face tomorrow. While developing security requirements for our IT system resources, we will determine if they are mission-critical or data-sensitive resources. This will allow us to determine where data confidentiality and integrity are the most important requirements, or where the priority is continuity of operation (availability). DEFENSE-IN-DEPTH Network safeguards offer the first protection barrier of IT system resources against threats originating outside the network. These threats can be in the form of intruders or malicious code. Our network design offers layered protections. What this means is the security layers complement each other; what one misses the other catches. This will be accomplished by locating security defenses in different places throughout our IT system, as well as not using two of the same types of safeguards. Although this may increase the complexity of our security system and can potentially make management and maintenance more difficult and costly, we believe the safety of the IT system resources should be based on the protection. With defense-in-depth in mind, the first layer of our network security plan starts with our network perimeter security. The principle network security defenses are firewalls, intrusion detection and prevention systems (IPS/IDS), VPN protections and content inspection systems like anti-virus, anti-malware, anti-spam and URL filtering. The traditional first line of defense against attacks is typically the firewall, which is configured to allow/deny traffic by  source/destination IP, port or protocol. It’s very straight forward, either traffic is allowed or it’s blocked. With the advent of Next Generation firewalls, which can include application control, identity awareness and other capabilities such as IPS, web filtering, and advanced malware detection, all of these features can be controlled by one device. COMPARTMENTALIZATION OF INFORMATION Corporation Tech will have IT system resources with different sensitivity levels or different risk tolerance levels and threat susceptibilities. These resources should be located in different security zones. The idea is to hide the data or information and make it available only to those systems where it is necessary for conducting system tasks. Examples of this are: †¢ E-mail, Web and DNS servers are located in the DMZ behind the perimeter firewall. †¢ Databases servers such as SQL servers are located in the Database Zone, within the internal firewall/IPS. †¢ Intranet servers, file servers and user workstations are in the LAN zone within the internal firewall. †¢ The Internet is located in the Internet zone behind the perimeter firewall. Principle of Least Privilege Corporation Tech administrators and users will have minimal privileges necessary for proper functioning within the organization. This rule applies also to data and services made available for external users. An extension to this rule is the â€Å"Need-To-Know† principle which says that users and administrators of Corporation Tech IT system have access to only the information relevant to their role and duties performed. Other points of security that we will address in our network services availability is the single point of failure principle, the separation of duty and job rotation rules. The network paths between users and mission-critical IT system resources, all the links, devices (networking and security) as well as the servers will be deployed in redundant configurations. The goal of the separation of duty and job rotation rule is to limit an employee’s ability to neglect and break the IT system’s security policy. Separation of duty dictates that important tasks/functions should be performed by two or more employees. Job rotation states that there should be rotation of employees in important positions. NETWORK HARDENING For each layer of security, we will ensure they are running the most up-to-date software and operating systems, and that the devices are configured properly. SECURITY ZONES Intrusion Prevention (IPS) devices are responsible for detecting and blocking penetrations and attacks conducted by intruders and malicious malware applications. We recommend an IPS be installed in the network path between potential threat sources and sensitive IT system resources. Attacks through encrypted SSL sessions are a potential vulnerability so we recommend decrypting the sessions prior to it reaching the IPS device in order to inspect unencrypted packets. The IPS will be properly optimized and monitored to catch attackers that have slipped past the first defense (firewall/router). Internal networks will not have direct access to the Internet so a Trojan sent to a user’s workstation through a phishing attack would not allow the intruder to connect to the external network. Internet services are available for internal users only through company email and HTTP Proxy servers. ENABLE SECURE NETWORK ACCESS We will install a VPN that is configured to allow encrypted communication to our network from the outside. Utilizing two-factor authentication, ensuring the integrity of the users making the request. This is external-facing to our network and allows users to tunnel into our LAN from the outside once the appropriate measures are taken to secure access. SEGMENTED DMZ There will be a front-end firewall for the external traffic and a back-end firewall for the internal traffic. Firewall rules will be optimized and tightened on all publicly available systems to allow traffic to only the necessary ports and services living within the DMZ. Firewall rules have been created to only allow the source IP addresses and port to the specific servers and proxies have been added in the network from which administrators are allowed access to the systems. Systems within different VLANs (with a layer 3 switches) have been configured to help isolate and respond to incidents if a server in the DMZ is compromised. Authentication on the LAN is required before access to the DMZ is even attempted. This prevents allowing complete control over these systems at any given time. DEVICE  INTEGRITY All hardware and software will be purchased only from the manufacturer or from resellers who are authorized and certified by the equipment manufacturer. Unused physical interfaces on network devices will be shut down. Access lists that allow only those protocols, ports and IP addresses that are required by network users and services are implemented. Everything else is denied. Network device configuration file are protected from unauthorized disclosure. Steps have been taken to avoid plaintext passwords in the configuration files. This has been accomplished by using encryption and/or a salted hash with iteration to protect the confidentiality of passwords in configuration files. Change passwords/keys immediately if the network device configuration file is transmitted in the clear (or is otherwise exposed) while containing non-encrypted passwords/keys. Secure protocols will be used when transmitting network device configuration files. All unneeded services on network devices must be sh ut down. Log files will be reviewed regularly to gain an in depth understanding of normal network behavior. Any irregularity will be reported and investigated. SECURE MANAGEMENT Only secure protocol standards (SSHv2; IKEv2/IPsec; TLS v1.0+) will be used when performing remote management of network devices. Default usernames and/or passwords will not be used. The network infrastructure security policy should define password length and complexity requirements. Review the network infrastructure security policy. This policy identifies who is allowed to log in to network infrastructure devices and who is allowed to configure network devices, and defines a plan for updating network device firmware at scheduled intervals. PORT VULNERABILITES Port 25 – Is used for SMTP (Simple Mail Transfer Protocol). It uses both tcp and udp protocols. This port used for e-mail routing between mail servers and is susceptible to many known Trojan’s. We are keeping this port in a closed state. Port 80 – Is used for web traffic Hyper Text Transfer Protocol (HTTP). It uses both tcp and udp protocols. Port 80 udp is also used by some  games, like Alien vs Predator. Code Red and Nimda worms also propagate via TCP port 80 (HTTP). Also, a number of trojans/backdoors use these ports. We are keeping this port in a closed state. Port 139 – Is used for NetBIOS. NetBIOS is a protocol used for File and Print Sharing under all current versions of Windows. By default, when File and Print Sharing is enabled it binds to everything, including TCP/IP (The Internet Protocol), rather than just the local network, meaning your shared resources are available over the entire Internet for reading and deletion, unless configured proper ly. Any machine with NetBIOS enabled and not configured properly should be considered at risk. The best protection is to turn off File and Print Sharing, or block ports 135-139 completely. We will leave this port in an open state but will turn off file and print sharing capabilities. Port 1900 – Is used for SSDP, UPnP. UPnP discovery/SSDP, is a service that runs by default on WinXP, and creates an immediately exploitable security vulnerability for any network-connected system. It is vulnerable to denial of service and buffer overflow attacks. Microsoft SSDP Enables discovery of UPnP devices. We are keeping this port in a closed state. Port 2869 – Is IANA registered for: ICSLAP. It uses both tcp and udp protocols and is used for Microsoft Internet Connection Firewall (ICF), Internet Connection Sharing (ICS), SSDP Discover Service, Microsoft Universal Plug and Play (UPnP), and Microsoft Event Notification. We will leave this port in an open state. Port 5357 – Is used by Microsoft Network Discovery, and should be filtered for public networks. It uses both tcp and udp protocols. It is also IANA registered for: Web Services for Devices (WSD) – a network plug-and-play experience that is similar to installing a USB device. WSD allows network-connected IP-based devices to advertise their functionality and offer these services to clients by using the Web Services protocol. WSD communicates over HTTP (TCP port 5357), HTTPS (TCP port 5358), and multicast to UDP port 3702. We will close this port and redirect traffic to HTTPS (TCP port 5358). Port 6839 – This port is not associated with any particular services and should be closed unless it is associated and used. Port 7435 – This port is not associated with any particular services and should be closed unless it is associated and used. Ports 9100, 9101 and 9102 – These TCP ports are is used for printing. Port numbers 9101 and 9102 are for parallel port s 2 and 3 on the three-port HP Jetdirect external print  servers. It is used for network-connected print devices. These ports should remain open to allow print services. There are no listed vulnerabilities associated with these ports. Port 9220 – This port is for raw scanning to peripherals with IEEE 1284.4 specifications. On three port HP Jetdirects, the scan ports are 9290, 9291, and 9292. It is used for network-connected print devices. This port should remain open to allow print services. There are no listed vulnerabilities associated with this port. Port 9500 – TCP Port 9500 may use a defined protocol to communicate depending on the application. In our case we are using port 9500 to access the ISM Server. The ISM Server is used for exchanging backup and recovery information between storage devices. This port should remain open while services are in use. There are no listed vulnerabilities associated with this port. Port 62078 – This port is used by iPhone while syncing. The Port used by UPnP for multimedia files sharing, also used for synchronizing iTunes files between devices. Port 62078 has a known vulnerability in that a service named lockdownd sits and listens on the iPhone on port 62078. By connecting to this port and speaking the correct protocol, it’s possible to spawn a number of different services on an iPhone or iPad. This port should be blocked or closed when service is not required on the device. References BEST: Network Security Policy and Procedures. (n.d.). Retrieved from http://www.ct.gov/best/cwp/view.asp?a=1245&q=253996 Example Security Plan. (2014, November 17). Retrieved from http://www.binomial.com/security_plan/example_security_plan_template.php Hardening Network Infrastructure Security Recommendations for System Accreditors. (n.d.). Retrieved from https://www.nsa.gov/ia/_files/factsheets/Hardening_Network_Infrastructure_FS.pdf Network Security Policy: Best Practices White Paper – Cisco. (2005, October 4). Retrieved from http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3 SANS – Information Security Resources | Information Security Policy Templates |.

Friday, August 30, 2019

An Inconvenient Truth vs. the Great Global Warming Swindle Essay

Is our planet headed for irreversible disaster? Every reputable scientist in the world believes it is. Left unchecked, global warming’s negative effects on our natural environment could have catastrophic consequences not only for our planet and wildlife but for mankind as well. What is Global Warming you might question? Well, Global warming is caused when a greenhouse gas known as CO2 is emitted into the atmosphere from by burning fossil fuels and is then trapped causing the global temperature to rise more than normal. Many might be thinking that this is a good thing because then it would be longer summers but it is actually quite frightening. Having our population past 7 billion people today has quite the impact on our planet. Burning fossil fuels such as oil and coal gives us electricity to power our factories and run our vehicles but it does emit tons of CO2 into the atmosphere. Even breathing gives off CO2. There is however a natural cause of this as well. The decaying leaves in autumn or forest fires also give off CO2 just as all living things do when they die. The natural levels of CO2 in our atmosphere in the past 600,000 years have been at a non-harmful level, proven by the ice cores collected from the great ice sheets. The argument that was less convincing was the Inconvenient Truth. Although it does have truths into it about how humans are emitting tons of CO2 into the air but Al Gore’s argument ignores some information. The information that is ignored is the natural causes of carbon dioxide emissions as well as the natural fluctuations in temperature that the planet normally has. Even though the burning of fossil fuels has had a small impact on this situation, there still is scientific evidence that humans are not the only cause of Global Warming. There is also the case that Al Gore forgot to mention and that is the fact that the Earth’s climate is not driven by carbon dioxide, man-made or natural. Having CO2 not be the cause of Global Warming, the cause would have to be solar activity, which regulates cloud formation, and  includes solar winds and sun spots. The most concerning part of The Inconvenient Truth is that it uses Al Gore, a recent U.S president as their spokesperson rather than an actual scientist. The reason I believe that Al Gore is used is because he was a country’s leader for a few years so more people would be inclined to believe him rather than the people who were interviewed in The Great Global Warming Swindle. I have found The Great Global Warming Swindle to be more believable because the producers of the film have more resources and data as opposed to The Inconvenient Truth that has just charts. The Great Global Warming Swindle has actual scientists and science professors with information but although they had no data, they seem to be more believable. If Al Gore had actual people come and speak for him that are experts in the field of climatology or otherwise, I would have found his documentary to be more believable. Even though I believe that CO2 is not the cause of Global Warming, it should still be taken into consideration as to how much we put into the atmosphere because it is

Thursday, August 29, 2019

Applicability of Alternate Minimum Tax

Applicability of Alternate Minimum Tax All the non-corporate income tax payers are supposed to be paying AMT. The rule for applicability is that the AMT is payable if: Tax under normal Provisions (as per income tax act) is less than AMT. In this case the adjusted total income is considered to be the total income and tax liability is calculated over it. The other rule mentions that the AMT will not be paid by the individual, HUF (Hindu Undivided Family), AOP (Association of Persons) and Artificial Juridical Person if the Adjusted Total Income is not greater than Rs.20 lakhs. Non-Applicability to LLP’s incorporated under foreign Law Limited Liability Partnerships incorporated under foreign laws are not considered â€Å"Firm† as per the definition given under section 2(23) and are considered under the definition given in section 2(17). So, the provisions of AMT are not applicable to such LLPs. Applicability to foreign firms not incorporated under any Foreign Law Foreign firms which are not incorporated as pe r the foreign country law but fits into the definition of â€Å"firm† as per Indian Partnership Act,1932 is considered firm as under section 2(23). So, the provisions of AMT as per chapter XII-BA are applicable to such firms. The Alternate minimum tax liability is as per section 115JC for the income to be chargeable to tax under India. Rate The applicable rate of AMT is 18.5%, which is calculated on Adjusted Total Income. Further, the final AMT is calculated by calculating education and secondary education cess of 3% on 18.5% and surcharge if applicable. Surcharge is not applicable for LLP. A Table containing steps is included in annexure along with an illustration. The steps and illustration are given in Annexure- I and II respectively. As per the provisions of AMT, the final tax liability for the non-corporate assessees is greater of the tax as per normal provisions and Alternate Minimum Tax (Tax @ 18.5 percent (plus secondary and education cess as applicable) on adjusted t otal Income). Alternate Minimum Tax Credit Tax credit is available against future tax liability if AMT is greater than tax under normal provisions. The credit amount is the difference between the two and can be adjusted or carried forward for ten years from the year in which the credit was earned. From the assessment year 2018-19, the period will be fifteen years.The section applicable is 115JD. Set-off is available when the tax as per normal provision for LLP is more than AMT. The amount of set-off is limited to amount paid in excess of AMT. However, the rules regarding carry forward or set-off are not applicable for education and secondary education cess. Further, if the credit is not utilised within ten years then it can’t be availed later on. Interest is not paid on tax credit availed. Application of other Provisions of this Act The provisions are given under section 115JE and are applicable to the non-corporate assessee to whom AMT provisions apply. This section includes advance tax, interest as per sections 234A,234B and 234C penalty. Key points with respect to the New Chapter XII-BA

Wednesday, August 28, 2019

Finance Essay Example | Topics and Well Written Essays - 2250 words - 1

Finance - Essay Example In addition, the company operates its hospitality business from Fremantle, Healesville and Melbourne. The company has some subsidiaries as well such as Little Creatures Breweries Pvt. Ltd., which is a popular name in Australia. Another subsidiary assisting the group in its packaging and hospitality vertical is Fremantle Harbour Properties Pvt. Ltd., as recorded last on June 30, 2006 (Reuters, 2011). The present paper aims to assess the credibility of the company during 2009 and 2010, based on which it might be appraised to the position of a suitable borrower. Credibility of a company could be decided through an evaluation of its financial performance over the years. Financial evaluation on the other hand, could be made on the basis of the four groups of ratios namely, Liquidity, Efficiency, Activity and Profitability. In case that the company is found to fare well in terms of the above factors, it might be regarded as a suitable borrower. In addition, an assessment of the economic en vironment in which the bank is functioning also needs to be assessed for the purpose. Economic Environment Strengths The economic environment of Little World Beverages Group might be regarded as having improved from the records of financial year 2008 to that in the financial year 2009. It experienced growth in terms of total operating revenues as well as net profit ratios by 18% and 51% respectively over the years. These improvements had essentially been due to expansions in the company’s base of operations over the years. It had moved on to international frontiers as well so that the company started experiencing economies of large scale operations (Little World Beverages Limited, 2009-10). Weaknesses The company is recently found to have withdrawn much of its outstanding shares from the secondary market which has taken a toll over its financial leverage quotient. Moreover this very fact has proved to be quite taxing in its profitability aspect as well which is the reason why the company might be at the verge of losing its loyal base of investors. Financial Status As mentioned earlier, the financial evaluation of a company would be made on the basis of four groups of financial ratios each of which will be examining one particular aspect of the company’s profile. Information based on which these assessments are to be made will be available on the company annual reports. Liquidity Liquidity of a company decides the extent to which a company is capable to meet its short run obligations. In other words, how far a company is able to tackle its short run liabilities given its volume of assets is something that is conceptualized by the term short term solvency. It draws a comparison between the company liabilities and the volume of liquid assets possessed by the company. In case that the proportion of liquid assets is greater than the liabilities surmounting the company, it might be regarded as solvent over the short run (Wild, Subramanyam & Halsey, 200 6). There are three ratios to determine short term solvency of a company, namely – Current Ratio – It decides the units of current asset that a company possesses in comparison with the current liabilities of the same. Ideally, current ratio must be greater than 1 in order to establish a company’s solvent position. In case that it is rising over time as well, short term liquidity of the company might be regarded as a robust one. Quick Ratio – It implies the ratio of quick assets to current liabilitie

Tuesday, August 27, 2019

Discovering Computer Dc 2005 (Website) scsite.com dc2005 Essay

Discovering Computer Dc 2005 (Website) scsite.com dc2005 - Essay Example The pages load quickly, making it ideal for time-conscious people. Their menu lists exactly what departments they have, and all the pictures shown display exactly what they have - there are no questions what they do not have since departments break everything up, and they only have four categories. The Campus virtual interview was informative, and gave me some things to look at when I interview. I went through it twice - once with the answers I would give, and the second time to give answers that were the complete opposite. I have to work on how confident I sound, how to rephrase certain skill levels, and how to focus on what direction I would like to take my career. There were ones that repeated a couple of times one was about criticism. The one I found difficult was leadership and management. While I haven't really had title of manager, there have been skills I have obtained which would make me a good mangaer. Leadership means different things to people/companies, and to answer that effectively for the company I am interviewing at, I would have to ask them for their definitions. One tip I found interesting and helpful was people always have to improve their skill level no matter what industry they are in.

Monday, August 26, 2019

New York Activist - Debating Park 51 Research Paper

New York Activist - Debating Park 51 - Research Paper Example The significance of the first amendment to the Park 51 debate remains undeniable. The debate revolves around the construction of an Islamic Community Center on the 51 Park place in Lower Manhattan in New York. The major problem arising from this construction is its proximity to the World Trade Center site. The World Trade Center site is under construction to replace the building lost in the 9/11 terrorist attack. The Islamic extremists claimed responsibility of the 9/11 attack that killed over 2500 people. Therefore, the majority of American citizens dispute the construction of an Islamic center two blocks away from the terrorist scene. The Cordoba Initiative, responsible for the construction of the Islamic Community Center aims to create a place where all the religions interact. The 16 story building contains a 2 story prayer space open to anyone from any religion. People supporting the construction of the building argue using a constitutional point. They believe that the first amen dment of the constitution allows the Muslims to construct a mosque or a community center in America. The supporters also view the community center as an avenue for healing and reconciliation after the events of 9/11. However, the opponents of the construction of the Islamic Center argue appealing to an emotional point of view. The opponents feel that the building displays insensitivity and disrespect to 9/11 victims. They think that the surrounding territory around the World Trade Center should remain a sacred place of mourning for lives lost, without the irritating presence of a mosque. The spiritual leader of the Islamic community center, Imam Feisal Abdul Rauf, also raises controversy. While the leader professes to be a moderate Muslim, he appears to support Muslim extremists. His protection of Muslim extremist in public on many occasions raises questions about his good intentions. Imam Rauf attended a CNN interview conducted by Soledad O’Brien. In the interview he seemed evasive on the issue of the Hamas (Butler, Grant and Randall 24). He failed to clearly state whether he thought their acts were terrorist or not. Newt Gingrich commented on the issue of Park 51 saying, â€Å"Nazis don’t have a right to put up a sign next to the Holocaust Museum in Washington†. This comment found its way into an article by Timothy Garton Ash in the Guardian Newspaper. However, the proponents of the building responded by pointing out an incident of 1977. At the time, neo-Nazis peacefully demonstrated in a holocaust survivor’s occupied neighborhood. This happened with the authorization of the United States Supreme Court respecting the constitution’s first amendment. The opinion polls in America proved that 61% of Americans and 77% of New York residents opposed the construction of a mosque on the territory next to Park 51. Proponents insist the community center, which will also have a gym, culinary school, restaurant, swimming court, basketba ll court, child care facilities and a library among others, affirms America is a free country that respects its constitution. Meanwhile, the opponents of Park 51 like former New York Mayor Rudy Giuliani doubt the goodness of constructing the center. He speculates that the construction of Park 51 creates further divisiveness between American and Muslims. More than a half of America takes offence of the proximity of Park 51 to the World Trade Center, hence constructing it might result not in reconciliation, but in divisiveness. Other opponents of the construction like Donald Trump think the Islamic center signifies victory of the 9/11 attack. RELIGIOUS TOLERANCE AND CULTURAL DIVERSITY

Develop an arguable, creative, and unique thesis about one theme in Essay

Develop an arguable, creative, and unique thesis about one theme in The complete Persepolis - Essay Example The author uses religion as a theme in the book on several occasions. For instance, Marjane introduces herself to the reader that she comes from a religious family yet her family is not religious. As observed at the beginning of the book, â€Å"I was born with religion† (Satrapi 6) according to Islam religion, God is viewed as a unique sustainer of the entire universe and accords favor upon those who call upon Him. God is the sovereign in the spiritual aspect of people’s lives and also the physical. Marjane at the tender age of ten believed in God and set out her imaginations of God for answers. Marjane mimic the historical revolutionaries in her dressing and pretends to be Cheguavera and Fidel Castro. This imaginative character in Marjane’s autobiography that offers a comic relief of macabre imaging of revolution and war in Iran at that time is seen. The religion of Marjane helps her to endure through hard times. She believes in religion as she even claims that she is a religious prophet. She emphasizes this by telling her teacher in the class that she want to be a prophet in future. When her belief in class is isolated, and her religion taken away from her, hope is lost for a while. Religion is forced on many women, through wearing a veil. The religion revolution of Iran had a significant role; they were two different parties who participated in the revolution religion. One party involved those who were trying to strengthen the religion in Iran while the other party involved people who were focused on modernizing Iran. This situation is seen and forecasted by Marjane as evident that she is a prophet, she claims â€Å"I want to be a prophet† (Satrapi 6). The Guardians of Revolution, who are focused to make Iran a religion country, detain anyone who breaks the rule of faith, just as they stopped the family of Marjane. Thos e who fail to

Sunday, August 25, 2019

What should happen to athletes who use PED'S (performance enhancing Essay

What should happen to athletes who use PED'S (performance enhancing drugs) Why - Essay Example Allowing these drugs will increase the likelihood of abuse and accelerate the adverse effects of the drugs. In this light, I feel that all athletes who use performance enhancement drugs should be banned from the sport competition. There are numerous reasons why athletes have had the urge to use performance enhancement drugs to improve on their athletic skills. To begin with, performance enhancement drugs help them to increase their running power and develop toned muscles that are crucial in the sports competitions. This gives them the synergy to retain the power of performing better during the sporting events. Evidently, since 1988, only 10 athletes have completed the hundred metres race, and most of them have used the dopants to empower their speed. Secondly, the athletes use performance enhancement drugs to reduce their stress and increase their ability to relax (Smith Para. 5). Just like any sporting activity, athletics subject the athletes to extreme emotional fatigue that may influence their performance in the field. These dopants have a relaxant effect that helps athletes to reduce their fatigue. For instance, the German athletes used these drugs to reduce stress and enhance their performance in the int ernational sports competition. The fact that these drugs have helped athletes to enhance their performance it has become a tempting option for many athletes. One reason why sporting managers should ban the use of performance enhancement drugs in the sporting completion is due to the bad health impact of these dopants to both male and female athletes. Performance enhancement drugs such as anabolic steroids are potential sources of strength during training. On the other hand, they are responsible for causing liver diseases, jaundice, depression and aggression. These are serious health impacts that may become a burden to them and their families in future.

Saturday, August 24, 2019

US military presence in Afghanistan Essay Example | Topics and Well Written Essays - 1500 words

US military presence in Afghanistan - Essay Example However, these doubts and confusions pertaining to the US led military action in Afghanistan simply cannot dilute the fact that in a post 9/11 scenario, the ground realities in the US were such that it was somewhat imperative for the US to engage in some kind of military action to allay the falling public moral and confidence. The 9/11 incident amounted to an attack on the United States of America and it was somewhat imperative on the nation to trace and attack the terrorist bases situated in Afghanistan. However, the thing that needs to be regretted is that the US presence in Afghanistan instead of culminating into a logical conclusion rather got prolonged. Somehow the US got entangled in the situation in Afghanistan and in the present context; it is an issue of debate whether the US should withdraw its military from Afghanistan or whether it should keep it troops stationed there until the envisaged objectives are achieved. It will be really insightful to analyze the reasons both su pportive of and critical of the premise that US military should leave Afghanistan. The thing that needs to be kept in mind is that the US attack on Afghanistan was backed by valid and justifiable tactical and strategic reasons. Many people tend to think that in the post 9/11 scenario, United States sent its military to Afghanistan to avenge the 9/11 attacks. Yes, this is true, but it was not the only reason why the US sent its forces to Afghanistan. Rather the US invasion of Afghanistan was based on more elaborate and detailed strategic considerations that were backed by valid doubts that if not militarily engaged and neutralized, the terrorist groups that targeted US may do so again (Goodson 7). So the objective of the US lead invasion was to trace and annihilate the groups stationed in Afghanistan that were responsible for the 9/11 attacks and to neutralize their capacity to again launch such attacks on the US and the other Western democracies. Thereby, the posting of the US milit ary in Afghanistan was not senseless, but rather happened to be a strategic necessity. In the light of this fact the thing that needs to be considered is that the US objective of invading Afghanistan has still not completely been achieved. Though the US military has freed large parts of Afghanistan from the hold of the Taliban and Al Qaeda, still it is a fact that the Taliban and the Al Qaeda continue to have bases in Afghanistan and have managed to retain a significant chunk of their capacity to plan and engage in acts of terrorism and carnage. Thereby the US must stay put its military in Afghanistan until the Taliban are conclusively annihilated. Otherwise, there exists a valid possibility that the Taliban may reorganize them self and may once again give way to a 9/11 like action. The argument that the US should continue to retain military presence in Afghanistan to avoid a redo of the 9/11 like mayhem is indeed valid and logical. The veracity of this argument is proved by the gro und realities. Irrespective of the engagement with a heavy US military deployment the Taliban have time and again proven their capacity by attacking the US and ally basis within Afghanistan. The

Friday, August 23, 2019

History, Point of View, Interpretation Essay Example | Topics and Well Written Essays - 1000 words

History, Point of View, Interpretation - Essay Example 1 History is normally viewed as just a written narrative of past events. Allan Munslow however argued that although the facts are correctly stated, history is presented by historians through a narrative as to how he understands and interprets these facts, which is mainly biased towards how he interprets and understands the events of the past. As Munslow put it, history â€Å"cannot escape its authorship†¦ the past is not just re-interpreted according to new evidence but also through self-conscious acts of re-writing as well.†2 As such, there is a tendency of historians to offer their point of view according to their personal interpretation of events. Munslow contends that present day historical authors and is more inclined on presenting events according to their interpretation. The emphasis now is less on history as a process of objective discovery and report but, rather, accepts its unavoidably fictive nature, that is, its literary contractedness. By this I mean recognizing the figurative assumptions that underpin authorial activity in creating the text†¦often determining the selection of evidence and its most likely meaning†¦Postmodern history, because it is a literary†¦ cannot escape its authorship†¦the past is not just re-interpreted according to new evidence but also through self-conscious acts of re-writing as well†¦include the historians pre-narrative assumptions and how we translate those assumptions†¦Ã¢â‚¬ 3 Antonia Castaneda’s, Spanish Violence against Amerindian Women present two different interpretations of events in the history of California. These different views are due to different ideological perspectives of the two authors. Castaneda focused on the oppression and sexual exploitation of Amerindian women by Spaniards. Her study discussed brutality of soldiers to the women, critically analyzing of situations of the Amerindian women before and during the Spanish conquest of California and how natives

Thursday, August 22, 2019

Liberalism Notes Essay Example for Free

Liberalism Notes Essay * Mainstream western philosophy. Other philosophies define themselves in relation to liberalism. * Evolution over time, though constant stress on individual freedom. Intellectual antecedents are 16th century religious reformations, 17th century scientific revolution and 18th century Enlightenment. !8th/19th century industrialisation created new class interests with commitment to reform programme so term liberalism dates from early 19th century. * Liberalism a reaction to 19th century absolutist regimes hence inextricably bound up with national self-determination. Movements for national freedom/unity associated with demands for civil/political rights and for constitutional checks on government. Contrast with Britain, where parliamentary sovereignty established in 17th century hence liberal domestic programme focused on other objectives such as parliamentary reform, religious toleration and free trade. * 19th century continental liberalism primarily a political creed and even in Britain the centrality of free markets to liberalism has been exaggerated. Victorian liberalism stood for political reform at home and support for constitutional/national movements abroad. Inspired more by religion (radical nonconformism) than by economics. Indeed from 19th century British liberalism repudiated laisser-faire and accepted need for state intervention (New Liberalism) especially in social welfare. * Decline of Liberal Party in 20th century, but ascendancy of liberal ideas. Dominant orthodoxy until late 1970s was derived from New Liberalism Keynes and Beveridge marked culmination of New Liberal thinking. Challenge to consensus came principally from an older free market version of liberalism i.e. neo-liberalism. Battle of ideas post 1945 less between left and right than between old and new liberalism. * Today liberal has different meanings in different places UK Liberals/Liberal Democrats long seen as centre/left of centre; in EU liberalism normally associated with the right; in USA a term of abuse for radical-progressive (crypto-socialist) ideas; label also associated with free market advocates (Hayek, Friedman, New Right). And almost all mainstream ideologies can be regarded as variants of liberalism. * Liberal values/ideas of vital historical importance central to development of British political tradition UNDERLYING ASSUMPTIONS AND VALUES OF LIBERALISM * Hall (1986) describes liberals as open-minded, tolerant, rational, freedom-loving people, sceptical of the claims of tradition and established authority, but strongly committed to the values of liberty, competition and individual freedom. 19th century liberalism stood for individualism in politics, civil and political rights, parliamentary government, moderate reform, limited state intervention, and a private enterprise economy. Widespread agreement over key liberal ideas/values though not over their later development and interpretation. * Key assumption is individualism. Individuals (rather than nations/races/classes) are the starting point. Society an aggregate of individuals; social behaviour explained in terms of some basic assumptions about human psychology. Some liberal thinkers saw society as an artificial creation prior state of nature where neither society nor government existed. Implication that society and government were purposefully created by individuals in pursuit of their own self-interest. So no social interests beyond the interests of individuals who make up society. * Individuals pursue their own self-interest rationally. No-one else (especially rulers) can determine the individuals own interest. Optimistic assumption that the general pursuit of rational self-interest will produce not only individual satisfaction but also social progress and the happiness of the greatest number. * Freedom the key value individuals must be free to pursue their own self-interest (Mill). Originally this had a negative interpretation i.e. importance of freedom from external constraint. In early history of liberalism this entailed firm limits on power of government to interfere with individual liberty. An important application was principle of toleration applied especially to religious belief championed by Locke (1689) Mill (1859) went on to demand full freedom of thought and expression. Later some liberals stressed freedom to enjoy certain benefits (positive liberty) thus entailing extensive state intervention to enlarge freedom (Green (1881) and Hobhouse (1911) and Berlin (1975)). Conflict between positive and negative views of freedom (and divergent implications) a major theme in the development of liberalism in 20th century. * Influence of egalitarian assumptions. So stress on equality before the law, and equal civil and political rights (though little agreement on what these should be in practice). Some liberals thus justify state provision of education et al to create greater equality of opportunity. But this commitment generally accompanied by acceptance of considerable inequality of income and wealth so in practice equality sacrificed to liberty? * Freedom entails the freedom to be unequal? But liberals deny that individual liberty is inconsistent with social justice. Self-seeking individualism, yes but equation of might and right, no. Squaring of circle attempt to make justice consistent with pursuit of rational self-interest (Rawls, 1971). Implies optimistic view of human nature and thus scope for reconciling individual and collective goals. Hence liberalism differs here from traditional conservatism (more pessimistic about human nature) and socialism (deny reconciliation can be readily achieved) SUMMARY OF THE HISTORICAL WHIG-LIBERAL TRADITION * 17th century Puritanism and Parliamentarism * Late 17th/18th century The Whig Tradition: Glorious Revolution (Locke), constitutional monarchy, government by consent, division of powers, religious toleration (Charles James Fox), oligarchy, mercantilism. * Late 18th/early 19th century Radicalism: revolution (Paine), rationalism, rights of man. * Classical liberalism (Smith) Individualism (Malthus), free markets (Ricardo), utilitarianism (Bentham), representative democracy ( James Mill). * Mid 19th/later 19th century Victorian Liberalism: Manchester liberalism (Cobden), nonconformism (Bright), free trade (Gladstone), nationalism (Mill), municipal gospel (Joseph Chamberlain). * Late 19th century/early 20th century New Liberalism (T.H.Green): social reform (Hobhouse), state intervention (Hobson), liberal imperialism (Edward Grey), national efficiency (Asquith), constitutional reform (Lloyd George). * 1920s to 1970s Decline of Liberal Party but progressive liberal consensus (Keynes, Beveridge). * Late 20th century/early 21st century Liberal revival? (Steel): European Union (Ashdown), devolution (Kennedy). THE WHIG TRADITION * Whig party in 17th century opposed royal absolutism and championed religious dissent; support for rights of parliament and for limits on royal power. Influence of Locke (1632-1704) belief in natural rights to life, liberty and property; government should rest on consent of governed, whose rebellion was justified if their rights were infringed. Need for constitutional limits on government, and division between legislative and executive powers ideas enshrined (imperfectly) in British Constitution post 1688 Glorious Revolution, and later helped to inspire French and American Revolutions. * Contradictions in Whiggism. Defence of material interests aristocrats and merchant/banking allies sought to preserve own power, property, privileges from threat of crown. No concern for massive 18th century wealth/income inequalities. And no wish to spread power beyond the propertied, so constitution they developed/defended was oligarchic/conservative. Fortunes made out of war, slave trade, India. Enclosure of land at expense of rural poor; ruthless enforcement of game laws. * Radical interpretation of Whiggism also no taxation without representation (slogan of parl. opposition to the Stuarts) also became cry of American colonies. 1776 Declaration of Independence based on Whig principles; French revolution welcomed by most Whigs Whig leader Charles James Fox defended its principles/championed civil liberties in England (until death in 1806). * Out of office, 1783-1830, so able to proclaim continued attachment to peace, retrenchment and reform unsuccessful parl. Reform bills, 1797 and 1810. Some credit claimed for abolition of slave trade, while traditional Whig demand for religious toleration reaffirmed in support for Catholic emancipation. * Defection of Old Whigs and accommodation within Foxite remnant of party of new radical generation, committed to reform, helped to preserve/reestablish a politically progressive Whig tradition that ultimately merged into liberalism. 1832 Reform Act the culmination of the Whig tradition yet underlines its essentially conservative nature very modest franchise extension (some of the propertied middle classes). Yet new urban centres gained at the expense of the shires; manufacturing/commerce at the expense of land. Whig aristocrats ultimately lost influence to urban-based business and professional middle classes (the muscle behind Victorian liberalism), though Whigs remained an important, if diminishing, element within the Liberal coalition until the late 19th century. (An antidote to those who view liberalism almost exclusively in terms of free markets neglects the Whig foundations). * The Whig-Liberal tradition is essentially a political tradition, concerned with constitutional issues/civil liberties/parl. sovereignty/ government by consent/freedom of conscience and religious observance/no taxation without representation. Whiggism served economic interests but never really an economic doctrine not about free trade/markets. Foreign trade policy in 17th/18th centuries mercantilist aimed to secure (through colonisation, Navigation Acts and war) the largest possible British share of world trade. RADICALS * Radical reformers at different times, interwoven with or opposed to Whig tradition influence on both liberalism and socialism. Radicalism a broad term, with different connotations for different periods, yet huge influence on British liberalism and 19th century Liberal party. * Paine (1737-1809) never absorbed into the Whig (later Liberal) establishment argued that once sovereignty had been transferred from the monarch to the people, there was no logical case for restricting the franchise his ideas the logical outcome of Whig slogans. Paine a liberal? (uncompromising individualism, sympathies with manfacturers, hostility to government). Or a socialist? (Blueprint for the Welfare State, support for graduated income tax, inspiration for Chartists). More impact in USA/France than in Britain seen as dangerous due to uncompromising republicanism, total opposition to hereditary principle, rejection of Christianity. * Philosopher radicals (or utilitarians) such as Bentham were in touch with progressive Whigs; Whitbread and Brougham constituted the progressive wing of the parl. party. Cobbetts radical populism harked back to pre-industrial age; Bright (Quaker manufacturer) belonged to new generation of post 1832 MPs himself displaced by new breed of radicals who took over the Liberal party in latter part of 19th century. * Radical pressure reinforced Whig commitment to parliamentary reform in 1832, and later. Association with religious dissent in 2nd half of 19th century imbued it with strong moral character fuelled demands for non-denominational state education and C of E disestablishment. Also strongly associated with the municipal gospel in local government. Fusion of Whigs and radicals with former Peelites created Liberal Party, 1859. Whigs continued to dominate Liberal Cabinets, but radicals dominated increasingly important grass roots level, especially after 1859 formation of the National Liberal Federation. * Yet it was a relatively restrained, religiously inspired, and peculiarly British strand of radicalism which eventually prevailed rather than the fiercely rationalist, republican radicalism of Paine. CLASSICAL ECONOMICS AND UTILITARIANISM * Intellectual (rather than moral) influence on Victorian liberalism of classical economists and utilitarians. Smith (1732-90), Malthus (1766-1834) and Ricardo (1772-1823) established importance of markets in the allocation/distribution of resources. And Benthams (1748-1832) utility principle was applied to a wide range of institutions/practices fiercely rationalist analysis (What use is it?). The greatest happiness of the greatest number was the only right and proper end of government. * Both stemmed from the 18th century Enlightenment; both shared the individualist/rationalist assumptions underpinning liberalism; each tended to share the implications of the others approach. Mill had a foot in both camps. * But modern neo-liberals argue it is only Smith and Hume (18th century Scottish Enlightenment) who represent the true spirit of liberalism. Bentham et al are blamed for ideas which provided a warrant for much later illiberal interventionist policy (Gray, 1986). The greatest happiness principle is seen as a breach of free market economics, since the principle of representative democracy (advocated by Mill who converted Bentham) might involve electoral pressures for interference with free market forces; moreover, neo-liberals are opposed to Benthams advocacy of bureaucracy, and thus the appointment of qualified, salaried public officials. The contradictory implications of Benthamite thinking are seen in the utilitarian-influenced Poor Law Amendment Act (1834) the able-bodied poor must enter a workhouse where their condition would be less eligible than that of the lowest independent labourer (free market incentives); at the same time theAct required a comprehensive network of administrative areas and officials, and a large degree of central control and inspection (bureaucracy). * Hence modern neo-liberals are critical of Benthams constructivist rationalism (Hayek, 1975); Gray (1986) claims that it had an inherent tendency to spawn policies of interventionist social engineering. Their refusal to recognise Bentham as a liberal involves an artificial conception of liberalism which has little in common with the Whig/Liberal tradition. * The major classical economists contributed significantly to Victorian liberalism, but their ideas were extensively vulgarised. Even Smith allowed for significant exceptions to his invisible hand. Popularisers such as Harriet Martineau, Edward Baines and Samuel Smiles reduced the principles of classical economics to laissez-faire (for governments) and self-help (for individuals). Public policy, moreover, was never consistently governed by laissez-faire look at the various Factory Acts, Public Health Acts and Acts to regulate the railways and banks passed in the early Victorian period. VICTORIAN LIBERALISM * Although the term liberal was applied from the early 19th century, the Liberal Party emerged only in the 1850s from a party realignment of Whigs, radicals and Peelite Conservatives. Gladstone (1809-98), originally a Con. follower of Peel, the embodiment of Victorian liberalism. Domination of Liberal party, and shaped in his own image; he became more radical and populist with age. Also inspired by Christian moral fervour struck chord among nonconformists. So Gladstonian liberalism a moral crusade (Vincent, 1966). * Several strands. Parliamentary reform derived from Whig tradition; advocacy of Bright, then Gladstone turned it into a populist cause. Proposals for modest franchise extension developed into radical demands for full manhood suffrage. Nonconformist strand while the 1860s parliamentary party was still overwhelmingly Anglican, the Liberals were becoming the party of the nonconformist conscience (Vincent, 1966).Nonconformist pressures spawned the National Education League (to campaign for a national, free and secular system of education), which provided the model for the National Liberal Federation (1877) which established a national organisation for he Liberal party, and tipped it decisively towards radical nonconformism. By the 1880s the PLP (and the party in the country) was predominantly nonconformist. * Support for liberal and nationalist movements in Europe, especially Italian unification, helped create Palmerstons 1859 government and kept it intact; Gladstone campaigned against the Bulgarian atrocities, bringing him out of premature retirement and into close collaboration with the nonconformists. The religious fervour behind his mission to pacify Ireland both split the party and strengthened the moral element in liberalism. * Manchester liberalism also quite influential in the party after 1859. Free trade was established as a liberal principle. Gladstone, as Chancellor, built on earlier work of Cobden and Bright (Anti Corn Law League, 1846 repeal of Corn Laws reflected transfer of power from landed to manufacturing interests) by abolishing a range of duties; Cobden negotiated Anglo-French trade treaty of 1860. But free trade did not entail laissez-faire in domestic policy Cobdens opposition to Factory Acts increasingly out of tune with the times. * Increased state intervention entailed by liberal practice major reforms in education, the army, the law and civil service, 1868-74. Third Reform Act, 1884 triumph of radical demands over Whig caution. Chamberlains Unauthorised Programme (1885) and the Newcastle Programme (1891) marked decisive shift towards radicalism. * Pace of change too fast for some Herbert Spencer (1820-1903) combined laissez-faire economics with evolutionary survival of the fittest; opposition to most forms of state intervention being introduced by Liberals at national and local level; but out of step. By contrast, Mill (1806-73) key transitional figure in evolution of liberalism. The sole end for which mankind are warranted, individually or collectively, in interfering with the liberty of any of their number is self-protection (1859) effectively a plea for minimal state intervention (Mill denounced censorship and argued for full liberty of thought and expression). Yet his commitment to individuality (and advocacy of democracy) caused him to fear the tyranny of the majority and the despotism of custom, seen as a greater threat to individuality than deliberate actions by governments. So a watershed thinker in the development of liberalism from individualism to collectivism (Gray, 1986). LIBERALISM, CAPITALISM AND DEMOCRACY * Liberalism closely associated with rise of industrial capitalism preeminently the creed of the owners of industrial/financial capital. Its political objectives focused on the enfranchisement of the new middle classes and the transfer of political power to the major manufacturing urban centres. No coincidence that Liberal party finally emerged in the 1850s when Britains industrial and commercial dominance was unchallenged, and the working classes were ununionised and unenfranchised. Even further back, protestant dissent (and especially puritanism) embodied ideas favourable to the spirit of capitalist accumulation. * But British liberalism cannot be simply derived from capitalism. The leading Whig MPs, who were still prominent in 19th century Liberal governments, were large landowners; many rank and file Liberals were not manufacturers but small shopkeepers and tradesmen; many of the working class were attached to the Liberal cause (even before the vote). In practice liberalism a coalition of class interests. Many of its causes temperance, religious disestablishment, home rule were scarcely connected with the interests of capitalism. Leading liberal thinkers Mill, Hobhouse, Keynes, Beveridge gave capitalism only qualified support. * Establishment of capitalist economy accompanied by the gradual establishment of a liberal democratic system no coincidence. Indeed, Marxist view is that rep. democracy offers best shell for capitalism so hardly surprising that party of the bourgeoisie was at forefront of parliamentary reform movement, though stopping short of support for full rep. democracy. Gray (1986, and a neo-liberal) accounts for this by arguing that unlimited democracy cannot be liberal government since it respects no domain of independence or liberty as being immune to invasion by governmental authority. * But representative democracy in early 19th century was largely untried, so not surprising liberals were apprehensive about what was a radical minority cause. Yet Paine advocated full manhood suffrage, and Mill argued for extension to women of full political rights. Once the logic of reform was accepted and liberals became committed to the theory and practice of rep. democracy their conversion was wholehearted, and seen by many (such as Chamberlain) as a justification for abandoning earlier limitations to government intervention. Herbert Samuel (1902) argued a reformed state could be entrusted with social reform Now democracy has been substituted for aristocracy as the root principle of the constitution .the State today is held worthy to be the instrument of the community in many affairs for which the State of yesterday was clearly incompetent.. Acceptance of democracy a critical step towards New Liberalism. Inexorable logic by which liberals progressed from parliamentary reform to representative democracy, to state intervention and the apparent abandonment of some of the principles associated with earlier liberalism. THE NEW LIBERALISM * Flourished in late 19th/early 20th centuries involved state economic/social reform which repudiated laissez-faire liberalism. Controversial development natural extension and refinement of the old principles OR culmination of anti-liberal elements present in the liberal tradition from the 1840s in the work of Mill. (Socialist critics dismiss NL as a forlorn attempt to revive an outmoded ideology Arblaster, 1984). * Origins of NL? Influence of Hegelian idealism? Party project to win working class support and head off rising Labour challenge? Need to modernise British economy/society and thus to compete more effectively? Or simply a rationalisation of the substantial growth in government intervention that had already occurred? * Key NL thinkers were Green, Hobson and Hobhouse. Green (1836-82) an Oxford philosopher and Hegelian; Hobson an economist who believed under-consumption to be the cause of unemployment; Hobhouse (1864-1929) a philosopher/sociologist. Common aim to redefine old liberal values in line with new political practice. So freedom, according to Green, meant a positive power or capacity and must be enjoyed by all. Hobson referred to the provision of equal opportunities for self-development so state intervention might be needed to remove obstacles. (But each enlargement of the authority and functions of the State must justify itself as an enlargement of personal liberty, interfering with individuals only in order to set free new and larger opportunities). Hobhouse justified interference with the market to secure the right to work and the right to a living wage, given the powerlessness of individual workers to secure such rights. * Liberal politicians were more cautious than the NL ideologues, though were increasingly interventionist, both at national and at local level. Locally, enthusiasm for civic improvements amounted to a municipal gospel city government seen as a test-bed for policies which could be applied nationally. Chamberlain (1836-1914) a radical Liberal mayor of Birmingham before moving to national politics (later split with Gladstone and allied with the Conservatives) campaign for the Unauthorised Programme (1895) based on LG experience hospitals, schools, museums, libraries, galleries, baths, parks, etc. Explicit rejection of laissez-faire, which was equivalent to acceptance of selfish wealth alongside poverty; accepted charge that proposed reforms were in practice socialism. Radical, reforming approach of 1895 UA echoed in 1891 Newcastle programme. At national level, little opportunity to implement the NL programme before the Liberal landslide victory of 1906. * 1906-14 Liberal Government key figures were Asquith and Lloyd George. Welfare reforms included provision of school meals and OAPs, and LGs introduction of national health and unemployment insurance (1911). LGs 1909 budget involved some modest income/wealth redistribution through the land tax and progressive income tax. And Churchills labour exchanges showed willingness to intervene in the labour market. * Key stimulus was rising challenge of labour; historians disagree over electoral appeal of state welfare advocated by leaders of organised working class, but not necessarily popular with working class voters, and frightened many middle class voters. Rosebery (briefly PM post Gladstone) thought Newcastle programme cost the party votes, though his Liberal Imperialism appealed to a chauvinistic working class, while his more modest economic/social reform programme promoted National Efficiency and appealed to progressive businessmen set on competing successfully with the rising economies of Germany, USA and Japan. DECLINE OF THE LIBERAL PARTY AND TRIUMPH OF LIBERALISM? * NL failed to prevent decline of Liberal party. WW1 undermined Liberal internationalism. Pressures towards collectivism/coercion associated with modern warfare created huge strains for Liberal individualism especially on symbolic issue of conscription. And after WW1 many Liberal causes (religious nonconformism, temperance, free trade) seemed less relevant. * Yet the disintegration of the Liberal party signifies the triumph of liberalism .. if liberalism is now partly invisible, this is because so many of its assumptions and ideals have infiltrated political practice and current awareness. (Eccleshall, 1986). Culmination of liberal thought seen in Beveridges social welfare proposals and in Keynesian economic theory provided basis of the post WW2 ideological consensus. 1942 Beveridge Report based on insurance principle, and was in keeping with spirit of LGs 1911 insurance scheme though much more comprehensive. Keynes economic theory provided for macro government intervention but allowed markets to operate freely at the micro level. Both B and K favoured private ownership of the means of production. It was precisely this kind of state intervention to promote employment and welfare provision which was favoured by earlier NLs like Green and Hobhouse. * Other liberal ideas long absorbed into British culture. 1960s changes in the law on divorce, homosexuality and abortion; some relaxation of censorship all compatible with Mills 1859 proclamation of principles of individual liberty. Later laws on equal pay, equal opportunities, and race and sex discrimination in 1970s fully consistent with liberal ideology. Thus a progressive liberal orthodoxy was established, with support from all parties. * Apparent triumph of economic/social ideas of NL complicated by revival (from 1970s onwards) of the older free market liberalism associated with classical economics. Hence modern use of term liberal requires a qualifying prefix. Hence progressive (or social) liberals advocate penal reform, civil liberties, protection of rights of minorities, freedom of expression, and open government unashamed economic interventionists. Neo-liberals (Hayek, Friedman) favour free market ideas on the right of the political spectrum, with key influence on the New Right and on Thatcherite conservatism. THE IDEAS OF MODERN LIBERALS AND LIBERAL DEMOCRATS * Modest revival in Liberal party fortunes began in 1960s; accelerated in mid 1970s; given impetus by alliance with SDP in 1983 and 1987; merger to form LDs. Now involved in coalition in Scotland and Wales, have large role in English LG, and 52 MPs after 2001 General Election. Accompanied by revival in associated political ideas. * Policies of Liberals/LDs involve continuation of NL tradition welfare capitalism, with strong stress upon individual rights. Distinctive Liberal policies included early advocacy of UK membership of EU, devolution, incomes policies, partnership in industry, electoral and other constitutional reform, and a focus on the community (linked with Liberal successes in LG). * Postwar Liberal party did little to extend/develop liberalism no startling new ideas or major thinkers. Neither electoral successes nor failures owed much to liberal ideology. Key decisions for leadership have been tactical, not ideological whether to accept Heaths coalition offer in 1974, whether to support the Labour government after 1977, how to handle the SDP breakaway from Labour in 1981, and how soon to promote a merger with the SDP. In fact, more intellectual ferment among the SDP, and their post -merger remnants. Dividing line between NL and Fabian socialism has always been thin? Hobhouse talked of liberal socialism in 1911; Hobson joined Labour after WW1. Thinner still following revisionist tendencies on the Labour Right in the 1950s, and the SDP breakaway in 1981. Hence the Liberal/SDP Alliance (and later merger) can be seen as the practical expression of an ideological convergence that was already well under way (Behrens, 1989). But ultimately it was the Liberals that swallowed the SDP, and not the other way round so the modern LDs are the clear lineal descendants of the old Liberal party. * Paradoxically, as fortunes of the Liberals/LDs have risen, LD ideas have become less distinctive. For most of post WW2 period Liberals adopted an intermediate position between Con and Lab. Briefly, in early 1980s, Liberals (and allies) seemed to offer a distinctive middle way between Thatcherism and left wing socialism. Since then Lab has reoccupied the centre ground previously vacated, leaving the LDs with little ideological space and few distinctive ideas or policies on the management of the economy, constitutional reform, Europe, defence and foreign policy the differences between the LDs and Lab are ARGUABLY more of degree than kind. * Under Ashdowns leadership, coalition with Labour seemed logical, even likely, given Blairs keenness to heal the divisions on the centre-left which had left the Cons dominant for most of the 20th century. Coalitions in LG and in the devolved bodies provide continuing impetus but sheer scale of Labs victories in 1997 and 2001 (and resistance within both parties) have weakened the project. LDs have pursued a more independent and critical line under Kennedy, without yet returning to earlier policy of equidistance between Lab and Con. * Attempts made to articulate a distinctive LD philosophy in these unpromising political circumstances by Wallace (1997), Russell (1999) and Ballard (2000). Yet terminology employed cooperation, working with others, partnership politics, community shared by New Labour and progressive Conservatives. Higher profile of LDs has drawn attention to considerable diversity of views in the party free market liberals, social liberals, conservatives with a social conscience and dissatisfied ex-Labour voters, greens, anarchists . (Ballard, 2000). Shows tolerance and inclusiveness? But not ideological coherence. The real problem is that there is now little distinctive ideological ground for the LDs to occupy, but this underlines the widespread acceptance of liberal ideas across mainstream British political parties.

Wednesday, August 21, 2019

Texas State Tort Claims Act Essay Example for Free

Texas State Tort Claims Act Essay This paper seeks to analyze and discuss State of Texas tort claim act and how it applies to local justice and security agencies. Local justice may be deemed to include any case that may be brought against the State of Texas, its agencies and its officials in their official capacities that could make them liable in the performance of their functions. On the other hand the security agencies may be treated as any other ordinary claimant for damages under the Tort Act since the law does specifically provide special exemption as to their treatment.    The waiver in the law talks about the State of Texas its agencies and its officials in their official capacities and providing for how the state could be liable to any claimant there are no special consideration as far as security agencies are concerned.  Ã‚   The rest of the paper will discuss more in detail about the scope and limitations of the Act.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As a general rule, a state is immune from suit hence the so called sovereign immunity, unless there is waiver. The Texas Tort Claims Act is therefore basically a passed legislative act as a waiver of the State of Texas, its agencies and its officials in their official capacities from lawsuits for damages. They can now be sued in court and these entities mentioned may now be made liable provided the conditions before they could be liable as provided in the act are complied with. There are also exceptions to the waiver as provided in court decisions (Driskill v. State, 787 S.W.2d 369, 370 (Tex. 1990)).   Ã‚  Ã‚  Ã‚  Ã‚   What is the Texas Tort Claims Act in greater detail?     Ã‚  Ã‚  The Texas Tort Claims Act comprises a set of statutes for determining the liability of   governmental entity for   tortious conduct under law of the State of Texas. It may be noted that sovereign immunity is about non-suability of as a state under all conditions since the state may not be burdened with defending itself every time and then. However for consideration of either justice or equity, the state can make a waiver through legislation. It is therefore logical to agree that prior to the adoption of the Texas Tort Claims Act, individuals and entities in Texas including security agencies could are banned or prohibited from recovering damages from state or local governmental units for injuries as a result of negligent actions of a government employee or officer in the performance of a governmental function.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The state is justified in giving governmental units the sovereign immunity it deserves for the protection of the state from governmental time and resources which could be subjected to unnecessary diminishment from private litigation and persuade people and entities to bring many actions against public officials to the detriment of their functioning effectively. The rule is also believed to be a protection of the government from sham or false suits that otherwise may possibly go to the pockets of corrupts public officials or it could further drain government resources that are better used to promote public service.   Ã‚  Ã‚  Ã‚  Ã‚   The Texas Legislature however in the exercise of its plenary law-making function evaluated the situation and ended up enacting the Texas Tort Claims Act in 1969.   The Tort Act specifically waived only sovereign immunity for a governmental entity while engaged in a governmental function.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Under the new law, a governmental unit in the state of Texas is now made liable for:   (1) property damage, personal injury, and death proximately caused by the wrongful act or omission or the negligence of an employee acting within his scope of employment.   This provision is however subject to further conditions.   Ã‚  Ã‚  Ã‚  Ã‚   One condition is that the State of Texas in only liable if the property damage, personal injury, or death arises from the operation or use of a motor-driven vehicle or motor-driven equipment.   As for the personal liability to the person killed it would be the negligent employee who would be personally liable to the claimant according to Texas law.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The said part of the Tort Act should be further qualified by   Tex. Civ. Prac. Rem. Code  § 101.021 which provided that personal injury and death so caused by a condition or use of tangible personal or real property if the governmental unit would, were it a private person, be liable to the claimant according to Texas law.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Are there liability limits for governmental units under the   Tort Act?  Ã‚   The answer to the question is in the affirmative since it is provided that that liability of a municipality under the Act is limited to maximum amount of $250,000 for each person in the form money damages in case the victim is more than one but the amount should not exceed $500,000 for each single occurrence in the case of bodily injury or death. As for single occurrence for injury to or destruction of property, the amount of damage that State of Texas could be liable is $100,000 for each (Texas Tort Claims Act, 1969).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Does the Act amend liabilities for the performance of proprietary functions? The answer to the question is in the negative as the Tort Act does not limit the liability of a city or agency of Texas for damages that result from the city or agency’s performance of proprietary functions. Since the new law in made to address performance of official governmental functions, it may be safe to state that prior to the passage of the Act, a city or agency in Texas could already be held liable for the negligent performance of these proprietary functions.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As distinguished from governmental functions, Tex. Civ. Prac. Rem. Code  § 101.0215 (b) provides that proprietary functions are those functions that a municipality involve the exercise of discretion which is performed in the interest of the inhabitants of the municipality.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Under Texas law, 36 thirty six activities that are considered governmental functions, hence activities not mentioned in the law under Tex. Civ. Prac. Rem. Code  § 101.0215   should be considered proprietary functions and therefore not covered by the Tort Act of 1969. In other words, there is no need for waiver for liability under proprietary acts since with or without the tort law the State of Texas could made liable.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   To understand these proprietary acts, there is need to enumerate some and these include the operation of amusements that are owned and operated by the municipality and the operation and maintenance of a public utility.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For purposes of classifying whether an act is proprietary or not, the same may be considered propriety absent any evidence that it is part of the 36 enumerated governmental functions which are presumed exclusive. This carries a necessary implication for the purposes of implementing the Tort Act, any activity that the state or its agencies engages in ,when not part of the listed of governmental function, must be deemed proprietary in nature and the state, its agencies cannot invoke the immunity and this could mean unlimited amount of damages that the court may award.   Ã‚  Ã‚  Ã‚  Ã‚   Since the Act is a waiver of state immunity, hence implying immunity for those not waived. Hence it could be asked whether it grants implied immunity for individual public officials.   As illustrated earlier the employees was made liable for the personal injury not the property damage, hence the answer to the question is in the negative.   Ã‚  Ã‚  Ã‚  Ã‚   The Act is clear that it applies only to immunity for the governmental entity itself or the state of Texas and its agencies. Issues of exemption public official from liability are not necessarily part of the state immunity but should be treated as issues under the concept of official immunity. To know the same there is need to   note how Texas courts   applied and adopted a doctrine of limited official immunity, where the courts may declare a public officer or employee not liable from personal liability for acts within the scope of the officer’s or employee’s governmental authority.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   It must be made clear however that under present Texas case law, there is   either absolute immunity or qualified immunity (Olowofoyeku,1993; Rosenwein, 1999) to a public servant. This will depend upon the type of authority enjoyed by that individual. To illustrate, there is no question that judges are generally entitled to the defense of absolute or complete immunity in the exercise of judicial functions (Turner v. Pruitt, 342 S.W.2d 422, Tex. 1961). This is however limited as far as negligent acts are concerned. Moreover it must be made clear the judicial function of judges is always governmental and never proprietary.   Ã‚  Ã‚  Ã‚   Having said this, it would mean that a great number of Texas public servants may only enjoy   defense of qualified immunity from liability, where the liability for discretionary actions could be appreciated if the officials acted in good faith within the scope of the officer’s or employee’s authority.   Ã‚     Ã‚  Ã‚  Ã‚  As to what constitutes an action to be in good faith is a question of fact while a discretionary action requires latitude of exercising judgment. Necessarily therefore, qualified immunity for ministerial or   mandatory actions should not be available since the public official is just complying with an order and therefore there is absence of choice (Worsham v. Votgsberger, 129 S.W. 157, Civ.App. 1919, no writ).The duties of jailers and sheriffs in their receipt and care for prisoners are typically considered or held to be ministerial, hence the same people could not just invoke qualified immunity as defense when they are charged in court to be negligent in their function.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  It may be concluded that the State of Texas Tort Claim Act applies to local justice and security agencies the same with any other legal claimants in so far as the Tort Act allows the   State of Texas, its agencies and its officials in their official capacities to be liable since the law takes the nature of waiver from the general rule that the sovereign state is immune from suit.   A principle in law nicely puts it Where the law does not expressly exclude, the same must have been included. References: Driskill v. State, 787 S.W.2d 369, 370 (Tex. 1990) Olowofoyeku A. (1993) Suing Judges: A Study of Judicial Immunity; Clarendon Press, Rosenwein, B. (1999) Negotiating Space: Power, Restraint, and Privileges of Immunity in Early Medieval Europe   ; Cornell University Press Worsham v. Votgsberger, 129 S.W. 157 (Civ.App. 1919, no writ) Tex. Civ. Prac. Rem. Code  § 101.021. Tex. Civ. Prac. Rem. Code  § 101.0215 (b) The Texas Tort Claims Act of 1969 Turner v. Pruitt, 342 S.W.2d 422 (Tex. 1961).

Tuesday, August 20, 2019

What is team work?

What is team work? Introductions What is a team work? Team work can be defined as when actions of individuals are brought together for the purpose of a common goal. Each person in a team puts his efforts to achieve the objectives of large group. Teams make efforts to achieve the success but not necessarily the success is achieved every time. Within a team every member plays a role to achieve the teams objectives. These roles add new and important dimensions to interactions of team members. Bruce Tuckmans team development theory provides a way to tackle the tasks of making a team through the completion of the project. On the part of the team every member played an important role to achieve the success at the end of semester. Our planning (or worrying about) whats happening next gives us little opportunity or inclination to examine what has just passed (Wallace, 2005). Writing from the angle of teacher student and team member relationships, it was appropriate to look then above quote. I believe that many students in a team hesitate to step further for their next action during the proceeding of project. I need to be reflective in my action for the future performance in a team. Groups of employees who have at least some collective tasks and where the team members are authorised to regulate mutually the execution of these collective tasks (Delarue, 2003). Group work is defined by a common task requiring interdependent work and successive or integrative action (Hacker, 1998). Belbin (1981) developed a model on team roles which was extended in Belbins (1993) publication. On the basis of the Belbins model the team performance can be observed when a winning or losing task is set for the team. Each member with assigned role balances the team role in a group and strong representation of all roles is predicted with high performance. I have experienced the same the role of every member in my team. Belbin makes a difference between two terms team role and functional role. It is necessary for a team to keep the optimum balance both in functional roles and team roles. On the other hands the Tuckmans theory describes the four stages of small group development as forming, storming, norming and performing. However a fifth stage of adjourning was added which involves the completion of tasks, termination of roles and dissolution of groups. Belbins theory is helpful to identify the different types of the teams; the characteristics define the work of the four categories. This model explains that during the team developments conflicts and interpersonal issues are found there and team development is dependent on the quality communication and relationship maturity with better performance. In traditional setting this model is useful for many practitioners and team leaders. According to this model all members work at the same place and are engaged in predefined work. This model works at the micro level of teams when new tasks are introduced and people involved have worked together not for long time. Belbin (1981) saying that not a single individual may have all the qualities to accomplish the total corporate role is totally right. An individual in a team is assigned his role of his choice and is avoided to perform the roles which are not in his abilities. Belbin also formulated the concept of roles in a team and their contribution of characteristic personalities and abilities in a team. The success of a team is the result of combination of team roles in it. The roles identified by the Belbin are lesser or greater extent shape the individual roles in a team. I am agreed with these nine roles explained by Belbin; all the nine roles are not necessary to achieve the success. I think that five roles are sufficient to achieve the success as some roles are doubled up for example a specialist role can be performed by a Plants role included in nine roles of Belbin. A project in beginning needs the ideas, concept and contacts so the roles of Plants and Resource are more valued at that oc casion. When the project is completed the roles of implementers and completer have their own place in a team. The Belbin theory allows every role to play a secondary role in a team. The secondary role possesses the second higher skills in results. In this way a role can perform more than one function to become a secondary role player in a team. In this work I want to reflect the situation taken place during the last semester to develop and utilize my personal skills needed to maintain the relationships with other team members. Gibbs (1988) Reflective cycle is used to reflect in an effective way. I am using this model because it is a recognized framework for my reflection. Gibbs (1988) contains six stages to complete the cycle which improves my personal skills continuously and learning for the best practices in future. As Gibbs cycle moves forward the first stage describes the situation where the team members work together, next stage looks the feelings of members about the work and third stage involves the analysis of the feelings of team members. The fourth stage is the analysis to make the sense of experience, 5th stage includes the outcome of team work and the final stage involves the action plan for the situation if it arose again. This kind of reflection generated the practice knowledge which assisted me to work with m y team members and adapt the new situation during the work. The team work generated a sense of satisfaction and developed professional practices. My team work encouraged me to learn from the mistakes and behavior and looked at the perspectives of other members in team. It was important for me to build the team member relationship with other team fellows. I established a mutual understanding and trust with other team members. Bound (1996) has stated that reflection is prompted by its positive states. He gives examples of a completion of a task which was thought impossible previously. I think that I have showed this sort of reflection during my last semester. Team work faces many challenges as the Watson (1995) says that teamwork is not a smooth path individualistic behavior, competitive, personality imbalances and cultural, philosophical, gender differences are all risks. I have seen these negative aspects of teamwork provided me learning opportunities when I was asked to do a differ ently next time. There existed the cultural and language differences among the team members. Therefore many learning activities were organized as a group but the challenges of language and cultural differences resisted producing the expected results. Students in a group varied due to academic levels and many of them were unable to embrace the other cultures. Language differences also impacted our teamwork due to language handling conflicts. The positive points of teamwork are enormous as being a team member I have shared the resources, success glory and burden failure. We have talked on various topics relevant to our project during the last session. I have respected my team members, their ideas and feelings. At the start of the project,t team members agreed upon the team objectives and enabled us to make consensus on the aims, and minimized distraction from other issues. An agenda was prepared before every meeting and circulated to every member of the team during the session. It inc luded the venue, time and duration of the meeting and discussed the supporting materials at the meeting. It was impossible to solve the problems lonely. I inter-acted my team members which was vital for the team success. Our team leader addressed the team dynamics and created a culture of the creativity. I was a big part of my team to remove the barriers to generate the new ideas and encouraged all members and also supported them. Conclusions In this reflective paper the pros and cons of a team member are discussed with perspectives of Belbin and Gibbs theories. One very positive spin-off from this reflective essay is that now I am able to get further insights into processes and deliberations of each team. Overall it has been very learning experience for me and I have welcomed every my team members with different cultures and languages. A comparison of Belbins theory and Tuckmans theory is part of this paper. Belbins model is based upon the team roles while Tuckmans model tells us about team development process. Gibbs Reflective cycle is a role model to work within team and is described with its stages to improve my personal skills for the future work in a team. To keep the team more effective I must provide more opportunities and challenges and help my team members to plan their careers based on the projected organizational needs. By creating an organizational environment, openness and energies I can expect to attract th e vital team members which are major part of the keys to my future. Teamwork allows me to be involved and participate in equal ways, sharing equal ideas. This helps to broaden my thinking to achieve the best outcomes.(Griffith Graduate, 2003). Psycho-Spiritual: Nature of Imagination and Dreams Psycho-Spiritual: Nature of Imagination and Dreams PSYCHO-SPIRITUAL THERAPY: DREAMS THE IMAGINATION with dreams and the imagination? Consider the nature of the imagination and dreams,   and illustrate with examples from clinical literature. ‘The dream is a little hidden door in the innermost and most secret  recesses of the psyche, opening into that cosmic night which was  psyche long before there was any ego-consciousness, and which  will remain psyche no matter how far our ego-consciousness may  extend †¦ in dreams we put on the likeness of that more universal,  truer, more eternal man dwelling in the darkness of primordial  night. †¦Ã¢â‚¬â„¢ (Carl Jung, 1964) These words represent Carl Jung’s famous definition of the nature and significance of the dream. Other definitions possible: for instance, if one is a materialist, then he understands dreams to be little more than the secretions of chemicals from glands in the brain and so simply a collection of worthless memory fragments. But leaving these prejudices aside, this essay is concerned with the psycho-spiritual interpretation of dreams, and here Jung’s definition supplies us with an excellent starting-point for understanding. For Jung and other psychotherapists, the dream is a gate and a passage, a ‘hidden door’, into the personal and collective unconscious, which is the basic substrata of our psychic life. Freud spoke similarly of the dream as ‘the royal road to the unconscious’ (Freud, 1999). The collective unconscious is inhabited by the archetypes – for instance, archetypes of the mother, wise old man, child, and trickster – which are‘†¦ irrepresentable, unconscious, pre-existent forms that seem to be part of the inherited structure of the psyche and can therefore manifest themselves spontaneously anywhere, anytime’ (Jung, 1974). In other words, the archetypes are pre-existent typical situations, stored in the collective unconscious, that have occurred innumerable times in man’s history and which appear to modern man in symbolic form in his dreams. These symbols are full of knowledge and restorative power for patients and therapists alik e. Dreams are messages and compensating agents that give the dreamer advice about how to balance or re-adjust his thoughts, emotions, and attitudes to life. Moreover, they contain a numinous aspect that can transform the spiritual life of the dreamer. By consulting and heeding the advice of our dreams and our imaginations therapists and patients can learn profound and vital knowledge about themselves and about the causes and possible methods of treatment for psychological distress (Hillman, 1980). Scientists and psychologists identify four basic states of consciousness: the state of waking consciousness, the state of dream consciousness, the state of deep sleep consciousness and the state of awakened consciousness (See: Allen, 1995). Two further dream states are also identified. Lucid Dreaming is where the dreamer is aware that he is dreaming and actively controls the images in the dream. Lucid dreaming can be of two types: ‘low’ state or ‘high’ state. ‘Low’ state lucid dreaming allows the dreamer to manipulate the images in the dream for his own amusement, pleasure, entertainment and so on. ‘High’ state lucid dreaming also allows the dreamer to be aware of the images and symbols of the dream, but this freedom is used by the dreamer to request spiritual help, advice or guidance. Non-Lucid Dreaming is the state where the dreamer is unaware that he is dreaming. Non-lucid dreaming may also be divided into ‘low’ and ‘high’ states. ‘Low’ state non-lucid dreams arise from the personal unconscious and so are personally conditioned, being composed of fragments of memories from that day or proceeding days or of anxiety, panic, excitement or other emotional states. ‘High’ state non-lucid dreams arise from the collective unconscious and are heavily laden and impregnated with images and symbols of religious, mythological or archetypal character. The images and symbols in these dreams are impersonal: that is, they are drawn from the collective fund of images that are stored in the collective unconscious; they appear to the dreamer however in a particular symbolic form that is meaningful for their psychic situation (Leuner, 1969). Let us look then at a clinical example of dream therapy taken from Jung’s Memories, Dreams, Reflections. In the chapter ‘Psychiatric Activities’ (Jung, 1973) Jung tells of an eighteen year old catatonic patient who had been sexually abused by her family as a teenager and who was now mute and schizophrenic. This girl had particularly strange dreams. She describes how she lived on the moon and was a member of a community who were forced to live underground because they were terrorised by a beautiful vampire who killed their women and children. The girl decides one day to save the moon people by killing the vampire; she takes a sacrificial knife and awaits the vampire on a tower. But when the vampire swoops upon her he is so exquisitely beautiful that she is enchanted by him and can no longer kill him. Jung tells how after these dream confessions the patient began to speak again. The girl explained that by this confession of her secret ‘moon’ life Jung a s her doctor had prevented her from leaving the ugly and painful Earth that she detested and escaping to the moon which was for her full of meaning. Though the patient returned into her catatonic state for several months after this analysis, eventually Jung was able, by explaining the symbols in these dreams, to lead the girl back to sanity. Jung explains the dreams like this. The patient having suffered so much abuse in real life compensates for her tragedy by escaping to the moon where everything is beautiful; she is in Jung’s phrase ‘humiliated in the eyes of the world, but elevated in the realm of fantasy’ (Jung, 1973). The patient transforms the incest she suffered in real life, into a mythical and spiritual experience in the realm of fantasy; she is assailed by a beautiful and mythical creature (the vampire) who is the complete opposite of the father who abused her in real life. By explaining these images to the patient, and by telling her that these images meant that she had to return to Earth to confront her difficulties there, the girl was after a short while fully recovered and able to lead an entirely normal life. This is one example of how the interpretation and explanation of symbols and images in a dream can bring about profound psychological healing for patients. The curious student will find many other such examples in Memories, Dreams, Reflections as well as in James Hillman (1980) and Martha Crampton (1979). * * * * * * Our imagination is the centre of all human creative activity and is intimately connected to our dreams and to the world of the unconscious. Imagination defined strictly in a philosophical or dictionary sense means ‘the mental faculty of forming images of external objects not present to the senses’ (OED). That is, we use our imaginations to form pictures or images of events or scenes that are idealistic or fantastic. And it is dreams and their symbols and motifs – such as the mandala (circle), Nazi swastika, phallus, quaternity (square) – that supply the basic materials for our imaginations. This is why throughout history great artists from Beethoven and Wagner, to Shakespeare and Coleridge have produced some their finest work when their imaginations have been inspired by images that they have seen in their dreams. Technically the imagination is one of five basic levels of mental faculty; the others include: the abstract mind, intuition, the concrete mind and thinking. So too, imagination is the deepest lying level of mental faculty: it sub-ducts beneath consciousness to enter into the deepest levels of the unconscious: the collective unconscious, and its inhabitants, the archetypes. The imagination is thus effectively a bridge between consciousness and the unconscious. When we use our imagination we dwell upon images that we have seen in our unconscious in the form of dreams and we re-arrange this material in forms that are fantastic or creative. We imagine how we would like the world to be. Applied to clinical therapy, the use of imaginative techniques can engender profound improvements in the state of minds of patients. Carl Jung advocated a technique called ‘active imagination’, where whilst in a waking state a patient focuses intensely upon images that appeared in recent dream s and so tries to enhance the features of such images and symbols and so contemplate their significance. By this concentration upon dream images, the patient is able to discover and then integrate the symbols that are being produced by his unconscious. This integration named ‘individuation’ (Jung, 1973) – produces for the patient a state of psychic and spiritual equilibrium: that is, the unconscious and conscious halves of his personality are balanced against each other. * * * * * * In the final analysis, it must be said, that from a psycho-therapeutic viewpoint, dreams and imagination are of the utmost importance for clinical psychology. Dreams are a door to a vast and immense reservoir of age-old images and wisdom which when revealed to a patient in archetypal and symbolic form can transform his psychological attitudes and guide him out of psychic distress. The imagination is vital too as the bridge to this world of the unconscious, forming a link between this world and that. BIBLIOGRAPHY Crampton, M. (1984). Dialogic Imaginable Integration. Institute of Psychosynthesis. Crampton, M. (1979). ‘The Use of Mental Imagery in Psychosynthesis’, Psychosynthesis  Research Foundation. Freud, S. (1999 Ed.). The Interpretation of Dreams. Oxford University Press, Oxford. Hobson, A. (1995). ‘Working With Dreams’ from Sleep, Scientific American Library. Hillman, J. (1980). Dreams and the Underworld. Harper and Row, New York. Jung, C. G. (1973). Memories, Dreams, Reflections. Pantheon Books, London. Jung, C. G. (1964). Civilization in Transition. Bollingen, Princeton. Jung, C.G. (1959). The Archetypes and the Collective Unconscious. Bollingen, Princeton. Jung, C.G. (1960). The Structure and Dynamics of the Psyche. Bollingen, Princeton. Leuner, H. (1969). ‘Guided Affected Imagery’. American Journal of Psychotherapy. Vol.23,  No.1. The Oxford English Dictionary. (1989). Oxford University Press, Oxford. Spanish Communist Party, 1936 | Poster Analysis Spanish Communist Party, 1936 | Poster Analysis Poster: Central Committee of the Spanish Communist Party, 1936 I. State what the document is The document is a political rallying call inspired by the proclamation of the Central Committee of the Spanish Communist Party (PCE). It was part of a broader recruitment initiative by the Communist Party to enlist soldiers to fight in the Spanish Civil War, which officially commenced on 17 July 1936. Unlike their fascist opponents who could rely upon funding, weapons and personnel from Germany, Italy and Portugal, the Communist Party had little choice but to recruit fighters from the civilian population of Spain and, afterwards, of any democratic European countries that wished to curb the spread of right wing extremism across the continent. Documents such as this were placed in town halls and meeting venues throughout Spain to encourage all opponents of fascism to continue with the ‘national revolution’ regardless of whether these opponents were communist or not. As a result, socialists, anarchists, liberals, republicans and nationalists from the Basque and Catalan regions of Spain were targeted to join the Communist Party in order to increase the number of fighters that the Left had at its disposal. In the event, the forces that eventually made up the defenders of the Spanish Republic (the ‘Loyalists’) were similar in composition to the Popular Front coalition government that collapsed in February 1936, largely due to an inability to achieve a lasting political consensus. II. Place the document in its historical context As a primary source document of the Spanish Civil War (1936-1939), the poster should be seen within the historical context of the rapid descent into World War Two as the fighting in Spain afforded the German military machine the opportunity to test out their blitzkrieg offensive with devastating effects on Spanish towns such as Guernica. This war, like the wider world conflict that would follow in September 1939, was also a war that was fought along ideological lines between, on the one side, fascists and, on the other, a combination of socialist and democratic forces. This was an important break from the past and, in particular, the First World War, which was fought over imperial ambition rather than two opposing visions of political ideology. The historical context was therefore influenced by the ongoing struggle between the political Left and Right with the Spanish Communist Party holding the key to the hopes of the international socialist movement that had been starved of any kin d of tangible success since the Bolshevik Revolution of 1917. III. Explain and comment upon specific important points, references or allusions in the text The most prominent symbolic feature of the document is the hammer and sickle which dominates the background of the textual content of the poster. Although most famous for its association with the Soviet Union, the hammer and sickle was, and remains, a trans‑national symbol of communism that exists far beyond the borders of Russia. Communist China, for instance, also adopted the hammer and sickle as did the Spanish Communist Party where the twin elements of the hammer and the sickle were seen to represent the tools of the industrial proletariat and the agrarian peasantry respectively. This would have been one of the major attractions of the poster to potential recruits from these two important economic sectors; indeed, the document must have met with some degree of success as the faction loyal to the Spanish Republic drew many soldiers from industrial regions such as Asturias and Catalonia as well as agricultural regions such as Andalucà ­a and Galicia. However, whereas the imagery evokes a strong association with communism and the USSR, the text itself is more intent upon reducing the divide that existed between the various socio ­-political sectors of the Loyalists. The document takes care to appeal to â€Å"all those dreamers or those who are irresponsible, who want to forcibly impose their own province or people experiments of ‘socialism’ or’ libertarian communism’ or of another kind† in order to â€Å"make them understand that all those experiments will crumble to the ground like imaginary castles if the war is not won.† This passage is a clear indication of the gravity of the threat facing the Spanish Republic as ideological zealots such as communists have historically sought to distance themselves from any political movement that does not practice pure Marxist doctrine. IV. Comment upon the reliability of the document as a historical source Clearly the document cannot be relied upon as an unbiased primary historical source. Any form of blatant advertisement for a political ideology cannot be considered to be a reliable source because it can only ever provide the views of one side of the conflict. History and historical evaluation is all about analysing the evidence from all sides of the argument; never from one side alone. The reasons for this are obvious. The document in question cannot, for instance, offer the historian anything approaching an impartial description of the opposing fascist enemy due to the aforementioned ideological nature of the struggle. Thus, the document uses words such as â€Å"monstrous†, â€Å"tormenter† and â€Å"criminal†, which negatively alter the reader’s opinion of Franco’s fascist army, regardless of what we now know about the Generalissimo’s military regime. The fascists are likewise termed as the â€Å"invading troops† despite the Spanish Communist Part’s overt drive to recruit soldiers of its own from abroad. The usefulness of the document therefore resides in the insight that it provides with regards to the application of propaganda methods in a war context. The poster shows how rudimentary the PCE recruitment techniques were at the start of the war yet also how effective this propaganda campaign must have been for the largely illiterate peasantry who would have been drawn into the symbolic pretext of the poster every bit as much as the aggressive use of words within the text. Ultimately, the document is reliable in so far as it paints an accurate portrait of the turbulent condition of Spain in the late summer of 1936 – before the country slipped into forty years of economic depravity and authoritarian rule. V. Summarise the document’s relevance and value to the student of the history of twentieth century Europe There is little doubt that the document is very relevant to the student of twentieth century European history. The poster provides key information about one of the bloodiest civilian wars in recorded history with up to a million casualties on both sides by the official cessation of the conflict on 1 April 1939. The document is especially relevant in the contemporary twenty first century era as the poster provides a prism through which the student can view the ideological nature of the Second World War. After the dissolution of the Soviet Union in 1991 this kind of conflict is never likely to happen again. The Spanish Communist Party’s recruitment poster is consequently an artefact as much as a primary source historical document. Its value is also without question, in spite of the unquestioned bias at the heart of the document. When we think of the lack of first hand, written evidence available for a large portion of, for example, medieval European history, it would be foolish to devalue any primary source document that can help to shed light on the past. By applying analytical historical knowledge to the document, the student can see beyond the propagandist element of the poster. In fact, even this is useful because, through its attempts to paint the ‘revolution’ in a favourable light, the poster shows how non‑democratic, despotic regimes are able to maintain power over a population for a protracted period of time. Can Agencies Collaborate with Children and Families? Can Agencies Collaborate with Children and Families? Collaboration between agencies working together with children and their families will never work. Discuss. Multi-agency working is not a new development for years its importance has been recognised for professionals from inter-agencies to collaborate, even as early as the mid nineteenth centaury health and social workers, worked in partnership to help reduce poverty in England. (Cheminais 2009; 1) Many changes have occurred over the years, which have stressed the importance of collaboration between agencies working together who are closely involved in the services working with children and families. (Waller 2009; 152) However, in spite of the beneficial outcome collaborative working has achieved for patients, clients and for the professionals themselves. (Leathard et al 2003; 131) Many children are still ‘being failed by the absence of collaboration between agencies to meet their needs; and this was epitomised by the circumstances surrounding the death of Victoria Climbià ©. Wilson et al (2008; 519) This essay will discuss the collaboration between agencies looking at legislation and policies that the government has put into place to drive multi-agency working, the essay will also cover the benefits of Multi-agency working as well as the challenges and barriers between professionals working in health, social services and education. Furthermore, the essay will focus on private, independent and voluntary sectors discussing multi-agency working between them. Throughout the essay a placement of a medical centre (see Appendix) will be referred to where a Health Visitor (here after HV) will be discussed as to whether collaboration in childrens services is beneficial to children and families or if as literature suggests is failing. Throughout this essay a variety of terminology will be used, according to Lumsden in Waller (2009; 156) ‘In practice, the terms partnership, collaboration, interagency work and working together are often used interchangeably and different professionals can have different interpretations of what they mean. In this essay the following definitions will be used all to refer to agencies and professionals working together with families and children, these are defined below: ‘Collaboration‘ Interdisciplinary process of problem solving, shared responsibility for decision making and the ability to carry out a plan of care while working towards a common goal. (Mckay et al. 2008; 110) ‘Multi-agency working More than one agency working with a young person, with a family on a project (but not necessarily jointly). It may be concurrent sometimes as a result of joint planning or it may be sequential. (Lloyd et al. 2001) ‘Partnership Working ‘A collaborative professional working relationship with other in both the professional and para-professional world of all agencies who work jointly to deliver services to local children and families. (Gasper 2010; 24) ‘Interagency working ‘This involves two or more agencies working together in a formal and planned way, but each agency will maintain its own identity as it works alongside other agencies. (Fitzgerald 2007) When referring to the above terms the agencies that will be addressed within the subject of collaboration will be social care, health care, and education. The above services are a fundamental role for both children and families, who may need the help of these agencies, helping families and children to have a positive outlook. For many years the government have released legislation and policies to highlight the importance of agencies collaboratively working together, to help children and families, especially safeguarding children. More recent legislation has imposed agencies such as health, social care and education working jointly together. As frost proposes ‘the concept of joint working in safeguarding children and family support services is central to the governments approach, which acknowledges the inter-relatedness of family needs in the fields of health, social services, law enforcement, child welfare, housing and education, and aims to make the delivery of services more efficient and effective. Frost et al. (2007; 185) However as much of the literature suggests there are many restrictions between agencies working together. The Implementation of the Children Act 1989 highlighted the importance of collaboration between agencies, ‘the act clearly confirmed that multi-agency approaches were seen as the most effective way of protecting children from abuse. Fitzgerald (2008; 35) The Act (1989) defines in section 47 how agencies from ‘any local authority; any local education authority; any local housing authority; any health authority; and any person authorised by the Secretary of State for the purposes of this section has the right to join together and protect the child from harm by providing and sharing information. Childrens Act 1989 HM Government (Section 47; 11) Cheminais (2009) concurs with Fitzgerald (2008) stating ‘The Children Act 1989 established the statutory requirement for inter-agency collaboration and joint working in relation to children and young people, requiring professionals to ‘work better together. Cheminais (2009;1) The government have produced many legislative documents on collaboration between agencies ‘working together. The Working Together to Safeguard Children document (DfES 2006) was first published in 1999, but a more recent adaptation was produced in 2006, which shows how agencies and practitioners should be working together to promote and safeguard the wellbeing of children. The more recent version of the paper reflects the new developments which have happened through policies, legislation and practice. (Wilson 2006; 4) The paper was formed for anyone who works with children and families, it expresses how agencies and professionals should be working together to meet the legal requests of both the Childrens Acts 1989 and 2004. (Barker 2007; 4) ‘Working Together to Safeguard Children describes comprehensively how agencies should work together and gives guidance on investigations and conduct of case conferences. Brammer (2006; 249) The guidance in the document sets out a nation al policy to help safeguard children which are based on the green paper ‘Every Child Matters outcomes. ‘Be Healthy; Stay Safe; Enjoy and Achieve; Make a Positive Contribution and Achieve Economic Well-being Every Child Matters (2003:1) ‘In achieving these outcomes working together stresses the importance of an integrated multi-professional approach by all organisations and agencies to the assessment, planning, intervention and review processes for all vulnerable children. Barker (2007;5) The Working Together to Safeguard Children (2006) document underpins many important government legislations from the Childrens Act 1989, Childrens Act 2004 and the Green Paper Every Child Matters (DfES 2004) In 2003, the Laming Report was made public and brought 108 recommendations for changes to childrens services at a national and local level, and within and between the different agencies and professionals. The Laming report led to the Green paper ‘Every Child Matters which set out five main outcomes for children to achieve there wellbeing, the legislation was aimed at children from birth to nineteen years. It was the tragic death of Victoria Climbe in 2000 which was one of the main contributions to the Green Paper Every Child Matters (DfES 2003) ‘The legacy of Victoria Climbie is that her death provided both the government and professionals with the permission to refocus on the importance of working together, thus integrated services are at the heart of the government initiative Every Child Matters, and the Children Act 2004 provides the legal framework to facilitate the programme of change, Lumsden et al. in Waller (2009; 153)Victorias death was a result of horrifying abu se which was caused by her great aunt and her boyfriend. However Victoria was seen by many agencies ‘during her time in the UK Victoria was seen for health and welfare reasons, by a wide range of representatives from different social services departments, health services and hospitals as well as the police, but all failed to intervene appropriately to protect her. Barker (2009; 9) Every Child Matters tried to build on existing plans put together by the government to strengthen preventative services, social exclusion and tackle poverty for children and families by focusing on four key themes; ‘Supporting parents and carers; Early Intervention and effective protection; Accountability and integration of services; and Workforce reforms. (Baldock et al (2007; p70) In 2004 Every Child Matters ‘Change for children was launched alongside the Childrens Act 2004, ‘providing the legislative spine for the wider strategy improving childrens lives. Tunstill (2007; 26) ‘The United Kingdom have witnessed 30 years of fatal child abuse inquiries or serious case reviews. Reader et al. (2004; 96) ‘During that time there have been about 40 public inquiries overall and between 50 and 90 local case reviews under part 8 of the ‘working together guidance each year. Reader et al (2004; 96; Department of Health 1999) These terrible consequences of past inquires have influenced the services provided to children and families through changes to policies and in practice, however public inquiries have also seen similarities. It is over 30 years since the publication report was released looking into the inquiry of the death of seven year old Maria Colwell who tragically died from abuse of her step-father. This tragic death caused shock in society and there was ‘utter determination that such tragedies like this would never happen again Lonne (2008;18) However despite the governments backing of policies and produced reports there have still tra gically been other victims. The inquiries of Victoria Climbe and Maria Colwell have identified a number of common themes; as Parton (2004; 82) describes ‘considerable confusion and a failure to communicate key information, so that as a consequence both children fell through the elaborate welfare net. ‘Nevertheless failures of agencies to co-ordinate their efforts continued to be seen as a significant contributing factor in the death of children through abuse. Maynard (2004; 182) When yet another tragedy occurred in 2007 the death of ‘Baby Peter or ‘Baby P, who suffered abuse from his mothers boyfriend a very similar case review to Victoria Climbe. ‘Canning et al (2010; 70) states ‘both childrens names will be a constant reminder to professionals of the shortfalls and failings that can occur in relation to the protection of the welfare of children. Therefore working collaboratively continues to be a child protection theme, both in terms of government guidance and in primary legislation. Maynard (2004; 182) As we have seen the consequences which can occur when mistakes are made in multi-agency collaboration, are often disastrous. Therefore preventative methods needed to be put into place, as part of the ‘governments strategy for more integrated childrens services in 2003 the development of the ‘Common Assessment Framework (CAF) and lead professional (LP) was established. Brandon et al (2006; 397) The CAF aims to ‘deliver frontline services that are integrated and are focused around the needs of children and young people. (ECM 2009) The Framework ‘helps practitioners from a variety of agencies (health, education, social services, youth offending ect) to access childrens services earlier and more effectively, develop a common understanding of those needs and agree a process for working together to meet them. Hall et al (2009; 81) Through developing the use of CAF different agencies can use the same assessment for families and children without overlapping or having multiple assessments for the child. An important role in CAF is the Lead Professional which is an ‘important part of the strategy, the Lead Professional is a single point of contact for children, young people and their families. Hall et al. (2009; 82) The Common Assessment Framework aims to: ‘Reduce the number of assessments for children with additional needs to reduce stress on the chid and family Ensure that services delivered by multi-agencies to the same child/ family are appropriately coordinate to reduce overlap and gaps in service provision To ensure professionals are aware other agencies are involved to share information about any concerns about a child. (Baldock 2009; 84) However there are also limitations to using the ‘Common Assessment Framework, as it is a new form of assessment it will mean more of a workload for professionals and Lead professionals therefore it may hinder collaboration and children may slip through the net as professionals may be too busy filling in paper work, to visit the family and child. (Fitzgerald 2007; 63) Other limitations include agencies not working together, as Brandon (2006; 405) states ‘some areas identified problems in getting particular agencies and sectors to sign up for these multi-agency processes. Another restriction is implementing it into the workforce, and getting all agencies involved in using CAF as soon as possible. Every Child Matters (2009; Online) states ‘AllLocal Authorityareaswere expected to implement the CAF, along with the lead professional role and information sharing, between April 2006 and March 2008. However when in placement setting in 2009 with a local Health Visitor they w ere still in the process of putting CAF into practice, (see Appendix) therefore we cannot yet prove that it is going to be successful, to help agencies work jointly together. However as a result of the CAF not being implemented throughout agencies there were gaps, and children still slipped through the net as a result, Gasper (2010; 126) states, ‘All agencies responded in unison following Lord Lamings report into the death of Victoria Climbe and there was a surge in the momentum to work more closely together across agencies and professions. The common assessment framework has been the outcome, but even that has not prevented continuing tragedies such as the case of ‘Baby P in 2007. To help meet the governments strategy of multi-agency collaboration, alongside the Every Child Matter agenda, the Common Core of Skills and Knowledge was introduced. (HM Government 2006) As part of the skills there are six areas of expertise that all practitioners including volunteers across disciplinary background will be expected to put in to practice when working with children and families: ‘Effective communication and engagement Child and young person development Safeguarding and promoting the welfare of the child Supporting transitions Multi-agency working Sharing information Fitzgerald (2007; 125) ‘Inter-agency and multi-agency work is an essential feature of all training in safeguarding and promoting the welfare of children. Working together to safeguard children (DfES 2006; 94) As part of the Multi-agency strategy Local Safeguarding Childrens Boards (LSCBs) have been established to replace Area Child Protection Committees. ‘LSCBs were established through the children Act 2004 there main remit is to develop policies and procedures for ‘Safeguarding and promoting the welfare of children in the area of the authority. Fitzgerald (2007; 62) LSCBs ‘put in place legislative arrangements for implementing the proposals in the 2003 Green Paper ‘Every Child Matters placing working together on a statutory footing for both the statutory and voluntary agencies and the community. Robotham et al. (2005; 177) Through producing strategies like CAF and LSCBs the government are working towards closer integration between services, where all agencies understand and w ork from the same documents then this should help agencies as they both share the same understanding. Agencies working collaboratively together from private, independent voluntary sectors shall now be discussed, in relation to multi-agency working. When out on placement an issue that occurred in one particular family was domestic violence, (see appendix) the HV collaborated with multiple agencies from different sectors to help keep the welfare of the mother and child safe. The Health Visitor helped the mother to get in contact with a voluntary agency WAVES (womens centre against domestic violent events), the mother was able to contact them through using the Childrens Centre which is a statutory sector and was also given advice about counselling which is private sector. This involved the use of multi-agency working which for this particular case was a successful collaboration between agencies involved. Through the HV being in contact with the childrens centre, the voluntary and private run group, it assured that the needs of the children and family in this case were being met. Working Together to Safeguard Children (DfES 2006;94) document states; ‘Training and development for inter-agency and multi-agency wok should be targeted at the following practitioner groups from voluntary, statutory and independent agencies, for those who are in regular contact with children and young people. Multi agency working should include services provided by use of Private, independent and voluntary sectors (Maynard 2004; 189) for overall colla boration between different agencies, and the strategies in place to work together. The effectiveness of agencies working collaboratively together will now be discussed. There are many benefits for multi-agency collaborative working in social care, health care, and education settings. However ‘There appears to be limited positive evidence on outcomes from integrated working with much of the current work focusing on the process of integrated working and perception from professionals about the impact of such services. Brown et al (2006; 16) One positive aspect is it ‘leads to enhanced and improved outcomes for children and young people, through a range of joined-up services advice and support being readily available and easily accessible. Cheminais (2009; 26) When observing the collaboration of agencies within the placement setting, it was clear that there was good partnerships between the agencies, this especially was shown between the health visitor and the local Childrens centre (see appendix) as part of the drive for greater collaboration Sure Start Ce ntres were also brought in to enhance multi-agency working by providing many professionals in the same centre, therefore all families have access. Another positive outcome to agencies collaboratively working together is improved cost efficiency, when all services work together they have to use less individual resources. (Johnson et al 2003) Another positive outcome to multi agency working is when services work together they share information therefore this makes it less stressful for families, but also helps agencies to not overlap, as Fitzgerald et al (2008; 28) States; ‘The main strands of childrens services -education, health and social services have in the past developed separately within differently established services. This separate development ultimately led to a fragmented pattern of services for children, with gaps and overlap in service provision and a work force divided by different professional cultures, different remits and goals and ultimately different views of children and childhood. Therefore when agencies to work together collaboratively great successes came become of this for both children and families, however there are also many barriers to different agencies working together. Although there is much legislation, policies and documents on how to have successful collaborative agencies working together, there are also many barriers that can occur when these different agencies come together. One of many problems which has been highlighted in case reviews of working together is lack of communication and information sharing between agencies and professionals. Gasper (2010; 126) describes what can happen if agencies fail to communicate effectively; ‘More than one tragedy has been shown to be the direct result of failures of professionals to communicate and to take responsibility for seeing through concerns raised by one or more person or agency. As this has been the main issue in the Laming reports, the government produced an ‘Information sharing Index or ‘Contact point to help overcome this barrier for professionals. ‘The purpose of contact point is for professionals involved with a child and family to be aware of other agencies and profe ssionals who are also working with them. Buldock (2009; 88) When in the placement setting the HV (see appendix) was in contact with many other agencies, about particular children and families. Even though contact point was only just being set up in the setting, through using contact point the HV is able to establish if the child has a CAF, agencies involved with the families, and contact details of the agencies this makes the process of information sharing much more simple and accessible to practitioners. This is aimed at aiding rapid and effective inter-professional co-operation and ensuring better information sharing than previously. Buldock (2009; 88) Another barrier in the challenges of multi-agency working is funding, ‘concerns in relation to sustainability, for example conflicts over funding within and between agencies; a general lack of funding for multi-agency training and development work and to cover accommodation and on-costs for services delivery. Cheminais (2009; 27) Sloper (2004; 578) discusses how funding can be a barrier to collaboration between agencies, through having different and short-term budgets. ‘Financial uncertainties, short term funding and lack of joint and equitable budget between partners are barriers, it is often suggested that coordinated working will produce cost savings by cutting down duplication of assessment and provision and providing a more appropriate and timely service to meet needs. ‘Many studies stress that time is the essence in setting up projects and developing relationships and it is difficult to maximize collaborative advantage when funding is short term. Gannon-Leary (2006; 669) However, Hudson (2002) argues that when agencies work together through sharing funding it can help to have a positive effect on collaboration between agencies. ‘Formal sharing of financial resources appears to have a number of benefits, promoting collaboration and cutting down on duplication Hudson et al (2002) in Sloper (2004; 578) Another important barrier, which often occurs in agencies working together, is the cultural issues, roles, and responsibilities. ‘The management of different professional and multi-agency service cultures, for example, staff recruitment and retention, disparities in status, pay, conditions of service working hours and working conditions. Cheminais (2009; 27) This can all make it very difficult for professionals from different agencies to work together, although when out on placement this did not occur other professional may feel they are more important in status and power than other professionals from different agencies. Foley (2008; 109) states ‘On the one hand, they want to be seen as being professional in terms of their specialised knowledge about children and their skills, on the other hand, its obvious that elitism and professional language can act as a powerful barrier. When working together the language barrier and the use of jargon between different agencies can o ften cause conflict. Fitzgerald (2007; 55) states ‘terminology attitudes to information sharing and professional principle can cause tension between agencies and poor integration of service delivery. Sloper (2004; 578) states how overcoming the barrier to working together can be very difficult between professionals who may not work together, ‘Findings on the barriers to multi-agency collaboration indicate the difficulties to be overcome. There is now some evidence that shared learning and inter-agency/ inter-professional training especially as part of continuing professional education, is one way of promoting better multi-agency collaboration. Sloper (2004; 578) However if this barrier is over come then the services provided to children and families should be a positive experience; where agencies are using the same focus and goals to deliver services. ‘All childrens services are working towards achieving the five outcomes of Every Child Matters, therefore developing a common vision at operational level and strategic level is of utmost importance. Canning et al. (2010; 70) This showing that in order for successful collaboration between agencies on of the key themes is training and updating knowledge. The government are recognising the importance for further training for the professionals, who will be working with the future children, and have designed the Early Years Professional Status; ‘the government wishes to have EYPs in all childrens centres by 2010. CWDC (2006). In Conclusion it has shown that there are many positives to collaborative working between agencies, and we have witnessed in first hand experience (see appendix) with the Riley Family. It has shown that agencies are able to collaborate with each other to provide services to help children and families, however it has also revealed the consequences which can happen if agencies are not prepared to work together to safeguard children, in cases such as ‘Baby P. Therefore with current legislation, and policies like Every Child Matters, Working Together to Safeguard Children, CAF, Contact Point, and Common Core Skills, agencies are guided into collaboratively working together and overcoming the barriers, to provide successful services to children and families.