Thursday, October 31, 2019

Computer Shop Limited (CSL) Assignment Example | Topics and Well Written Essays - 4000 words

Computer Shop Limited (CSL) - Assignment Example Cloud Computing Service Models The organization’s data center provides hardware and software services. These services are provisioned by the Cloud Computing applications on the web. Similarly, the Internet services that are provided via cloud computing are called as ‘Software as a Service’ SaaS. The vendors use the term Infrastructure as a service ‘IaaS’ and Platform as a service ‘PaaS’ in order to display their products and services. Due to huge variations, the terms that are explained here are not accepted worldwide. The department of commerce NIST (National Institute of Standards and Technology) defined some useful explanations that are based on three concepts Simple computing resources regarding Cloud infrastructure as a service ‘IaaS’ are provided. Software applications are accessed by Cloud Software as a service ‘SaaS’ that can operate cloud infrastructure. For implementing and developing applications along with programming language and tools, the Cloud Platform as a service ‘PaaS’ provides to the customers. The data center hardware and software contains the major components of a cloud. The resources are available for general public also referred as public clouds and the cloud service providers are known as utility computing. Furthermore, the clouds that are not accessible for public are called as private clouds. The combination of the two, ‘SaaS’ and utility computing forms Cloud computing. (ARMBRUST, FOX et al. 2010). There are three service models for cloud computing i.e. infrastructure as a service, platform as a service and software as a service (Wilshusen 2011). Infrastructure as a service (IaaS) is comprised of three components i.e. software, platform and infrastructure. Organizations only provide software and platform and infrastructure is provided by a third party cloud computing vendor. The second service models i.e. platform as a service (PaaS) als o comprises of three components i.e. software, platform and infrastructure. Organizations only provide a software or application that will be executed on the third party or the vendor’s platform and infrastructure. The third service model also includes the similar three components as mentioned before and called as software as a service (SaaS). Organizations only utilize the services provided by the vendors in terms of applications that can be accessed by the Internet. All the three components i.e. software, platform and infrastructure are the property of the vendor (Wilshusen 2011). In figure 1.1, cloud deployment models are demonstrated Figure 1.1 (Retreived from :Wilshusen, G. C. (2011). INFORMATION SECURITY: Additional guidance needed to address cloud computing concerns. GAO Reports, , 1.) Cloud computing four service models are shown in Fig 1.2 Figure 1.2 (Retreived from :Wilshusen, G. C. (2011). INFORMATION SECURITY: Additional guidance needed to address cloud computing concerns. GAO Reports, , 1.) ‘Business Cloud’ must choose the relevant client model, as it will be proportional to the business or customer requirements and may differ from organization to organization and business types. The first service model is called as the ‘Private Cloud’. A private cloud is solely a property of the organization i.e. software, platform and infrastructure is the property of the organization (Wilshusen 2011). The second service model is called as the community cloud that is accessible to several organizations that may be similar to business types and will focus

Tuesday, October 29, 2019

Christian Science Monitor Essay Example for Free

Christian Science Monitor Essay An article in the Christian Science Monitor last January tries to educate consumers about the value of carbon offset programs and whether they have any real effect on global warming. The article, published January 10, 2007, discusses the concept of carbon offsets and the efforts of some companies to become carbon neutral. The ideal are based on the idea that as consumers we emit a certain amount of greenhouse gases or are responsibility for having been emitted. In an effort to reduce that amount, the so-called â€Å"Carbon footprint†, consumers are being offered the chance to buy â€Å"carbon offsets†, a process by which a company takes some action to reduce the amount of greenhouse gases being emitted. If enough offsets are purchased, the person or company can become â€Å"carbon neutral† meaning that their actions are not increasing the amount of greenhouse gases in the world. This article, â€Å"Do Carbon Offsets Live Up to Their Promise? †, is about the first report by someone trying to evaluate whether this is a good environmental effort or a giant fraud. The report, by the non-profit organization Clean Air-Cool Planet, argues that three-quarters of the 30 companies currently selling carbon offsets are doing a less than mediocre job of it. The companies were ranked on a scale of 1 to 10, 75 percent ranked less than a five. The article also details what criteria were used to evaluate the carbon offset programs. The intended reader of this article is the highly-informed readership of the Christian Science Monitor. The newspaper is one of the most well-respected in the country for journalistic excellence and assumes a certain amount of base knowledge in its readership. As such, the article could have been better at explaining some of the basic terms it used, but appeared to be scientifically accurate. Surprisingly, many of the article’s sources were people active in the environmental community. This would seem like an inherent bias in the article, but many of those people were willing to point out flaws in the carbon offset system. One representative of the Sierra Club told the Monitor that if carbon offsets were viewed like papal indulgences and people used them as an excuse to keep polluting, they could potentially be harmful to the planet. The article was also peppered with scientific facts including the idea that methane is a more dangerous greenhouse gas than carbon dioxide without feeling like a science lecture. This article made me angry because it seemed to make it clear that carbon offsets are a sham. The article indicated that one criteria of the evaluation done by Clean Air-Cool Planet was to determine how many of these greenhouse gas reducing activities would have taken place regardless of whether the offsets were purchased. For companies who use producing alternate fuel sources as a carbon offset, it appears that this new trend is simply a way to capitalize their projects and make even more money. Other companies called planting trees their â€Å"carbon offset†. Since trees are a renewable resource, I am skeptical about when and where these trees were being planted. If they were planted to replace a forest that had just been clear cut for the local paper mill, then calling them a â€Å"carbon offset† is fraudulent and ridiculous. This article made me very leery of those who use carbon offsets in general, as it appears that this may indeed be a way for the indulgent to continue their polluting ways, never change their lifestyles to reflect the needs of the planet, and feel better about themselves while nothing is being done to stop global warming. This article left me with the impression that much of the hype about stopping global warming has been just that, hype, and that we will realize in a few years that the problem is getting exponentially worse despite our â€Å"efforts† to fix it.

Sunday, October 27, 2019

Limitations Of CBT For Social Phobias

Limitations Of CBT For Social Phobias Social phobia, also known as Social Anxiety Disorder (SAD) is considered as one of the most common psychological disorders on its own, and also as a comorbid disorder (Kessler, McGonagle, Zhao, et al., 1994). Current research literature suggest Cognitive Behaviour Therapy (CBT) as the first treatment choice for social phobia, unless in the case where the client opt for medication or if the client is suffering from comorbid depression or another psychological disorder that makes medication essential (Veale, 2003; Social Anxiety Disorder, 2006; NICE guideline, 2004c). The aim of this paper will be to discuss the application of CBT in the treatment of Social Phobia. However, it is important to emphasise that it will not attempt a detailed discussion on the historical development, or theoretical frameworks of CBT. These aspects of therapy will be emphasised, discussed and analysed where necessary, to comprehend its practicality in the treatment of social phobia. Furthermore, the scope of this paper will be limited to examining the use of CBT for treatment of adults with social phobia but, it will not focus on treatment of social phobia in children and adolescent groups. CBT was initially developed by Aaron T. Beck as a structured, short-term, present-oriented psychotherapy for depression, directed toward solving current problems and modifying dysfunctional thinking and behaviours (Beck, 1995). The basic assumptions of cognitive model suggest that distorted or dysfunctional thinking that influence the patient/clients mood and behaviour is common to all psychological disturbances (Beck, 1995). CBT is a collection of therapies that are designed to help clients suffering from phobias, depression, obsessions compulsions, stress disorders, drug addictions and/or personality disorders. CBT attempts to help people identify the situations that may produce their physiological or emotional symptoms and alter the manner in which they cope with these situations (Smith, Nolen-Hoeksema, Fredrickson, Loftus. 2003). The effectiveness of CBT has been widely tested since the first study on treatment success in 1977 (Beck, 1995). Westbrook, Kennerley and Kirk (2007) stated that CBT has many features common to other therapies. However, they acknowledged that CBT is different from the other psychotherapies with some distinguishing characteristics. This therapeutic approach is a combination of Behaviour Therapy (BT) and Cognitive Therapy (CT). However, these will not discuss in detail. However, as a result of having been evolved from a combination of both BT and CT, modern CBT consist important elements of them both. Westbrook, et al. (2007) presents the CBT model of viewing problem development. For instance, individuals develop cognitions (thoughts beliefs) through life experiences (mostly based on childhood experiences, but sometimes with later experiences). These can be functional (ones that allow making sense of the world around and deal with life issues), as well as dysfunctional beliefs. Most of the time, functional beliefs permit individuals to reasonably cope well with life situations. Whereas dysfunctional beliefs may not cause problems unless/until encountered with an event or a series of events (also known as critical incident) that violates the core beliefs or the assumptions, to the extent of being unable to handle ones positive/functional beliefs. This situation may activate the negative/dysfunctional thoughts over the positive thoughts resulting or provoking unpleasant emotional status such as anxiety or depression. Thus, Westbrook et al. (2007) highlighted the interactions between negative thoughts, emotions, somatic reactions, and behaviours as responses to different life events. These dysfunctional patterns lock the individual into vicious cycles or feedback loops resulting in the perpetuation of the problem. Focussing on the effectiveness of CBT as a therapy, the UK National Institute for Clinical Excellence (NICE) guideline recommends CBT for several major mental health problems including depression (NICE, 2004a), generalised anxiety and panic (NICE, 2004c), and post-traumatic stress disorder (PTSD) (NICE, 2005). Furthermore, Westbrook et al. (2007) highlighted the findings of Roth and Fonagy (2005) in their book What works for whom? a landmark summary of psychotherapy efficacy. This book presents evidence on the success of CBT as a therapy for most psychological disorders. However, though there is evidence supporting the successfulness of CBT for numerous psychological disorders, CBT has some limitations as well. Firstly, it is not suitable for everyone. One should be committed and persistent in finding a solution to the problem and improving oneself with the guidance of the therapist (Grazebrook Garland, 2005). Secondly, it may not be helpful in certain conditions. Grazebrook Garland (2005) mentioned that there is increasing evidence of the successful therapeutic use of CBT in a wide variety of psychological conditions. However they pointed that there is a great need for further research to gather evidence on the therapeutic success of CBT in these different types of psychological disorders. Social Phobia Social Phobia is categorised as an Anxiety Disorder in the Diagnostic and Statistical Manual-IV-TR (DSM-IV-TR) of the American Psychiatric Association (2000). This disorder is characterised by persistent excessive anxiety and fear of scrutiny by others, often accompanied by anxiety symptoms such as tremulousness, blushing, palpitations, and sweating (Social Anxiety Disorder, 2006). The DSM-IV-TR (2000) presents the following diagnostic criteria for social phobia (SAD). Marked and persistent fear of social or performance situations in which the person is exposed to unfamiliar people or to perceived scrutiny by others. This includes the fear of embarrassment or humiliation Exposure to feared social or performance situations that almost invariably provoke anxiety. This may even take the form of a panic attack. In the case of children, the anxiety may be expressed by crying, tantrums, freezing, or shrinking from social situations with unfamiliar people. The person recognises that the fear is unreasonable and that it is excessive. However, this fear and knowledge may be absent in children. The feared social situation or the performance is avoided or else it is endured with intense anxiety or distress. The avoidance, anxious anticipation, or fear causes significant distress or impaired functioning. Fear or avoidance are not due to another psychological, or physiological condition (e.g., a personality disorder such as paranoid personality disorder, a specific phobia, or due to the influence of substance use/abuse) Specify generalised, if the fears include most social situations (e.g., these may range from initiating or maintaining conversations, participating in small groups, dating, speaking to authority figures, or attending parties hindering most parts of a personal social life) According to the criteria stated above, social phobia can be generalised or non-generalised, depending on the breadth of social and performance situations that are feared. While generalised social phobia hinders a vast range of social and performance situations, non-generalised social phobia may hider/restrict only performance of some social activities or engagements. According to health statistics from year 2002, social phobia affects 3% of the Canadian adult population (Social Anxiety Disorder, 2006). In USA 13.3% of the population suffer from social phobia at some point in their life (Kessler et al., 1994). Statistics indicate a life time prevalence of about 8% to 12% making social phobia one of the most common anxiety disorders (Social Anxiety Disorder, 2006; Kessler, et al., 1994). Apart from being a high prevalence disorder, social phobia is also known to have a high comorbidity, specially substance abuse and/or alcohol dependency (Schadà ©, A., Marquenie, L., Van Balkom, et al., 2008; Amies, Gelder, Shaw, 1983; Schneier, Johnson, Hornig, Liebowitz, Weissman, 1992). Kessler et al. (1994) stated that while the lifetime prevalence of social phobia is as high as 13.3%, the prevalence reported in a 30-day period is between 3% 4.5%. In addition, other similar conditions, such as shyness, behavioural inhibition, self-consciousness, selective attention and embarrassment are seen to be correlated with social phobia (Beidel Morris, 1995; Beidel Randall, 1994; Leary Kowalski, 1995; Rosenbaum, Biederman, Pollock, Hirshfeld, 1994; Stemberger, Turner, Beidel, Calhoun, 1995). According to Schneier, Johnson, Hornig, et al. (1992), comorbidity of two or more psychological disorders, is also fairly common with social phobia. Research has also indicated that social phobia is also characterised with a higher frequency of suicide attempts (Schneier et al., 1992). Focusing on the impact of the disorder on the quality of life, social phobia is described as an illness of missed opportunities, because its early onset hinders future social progression such as marital success and career growth (Social Anxiety Disorder, 2006). The authors of this article stated that these individuals were less likely to be well educated, belong to lower socioeconomic status, and are possibly unmarried. In addition, they also suffer greater functional, health, and physical impairments than individuals without social phobia (Social Anxiety Disorder, 2006). Thus the disorder has a significant impact on the quality of life, in particular, socially and emotionally. Emphasising on this point, the authors of this article highlighted that in a community health survey in Canada, people with social phobia were twice as likely to report at least one disability day in the past two weeks, compared to people without social phobia (Social Anxiety Disorder, 2006). Aetiology of social phobia can be traced to Bio-Psycho-Social factors (Smith, Hoeksema, Fredrickson, et al., 2003). Looking at the neuro-biologic factors, research data up to date, provides evidence of dopaminergic, serotonergic, and noradrenergic systems (Stein, Tancer, Uhde, 19992; Tancer, Stein, Uhde, 1993; Yeragani, Blalon, Pohl, 1990). However, Stein, Tancer, Uhde (1995) stated that the evidence for these neuro-biological factors in the predisposition, precipitation, and perpetuation is far from clear. The authors also present the same regarding the effect of antidepressants on social phobia stating that further work is warranted, although preliminary evidence indicates that antidepressants are not entirely effective on social phobia. From a cognitive-behavioural perspective, a person with social phobia develops a series of negative assumptions about themselves and their social world based on some negative experience (Kessler, et al., 1994). These assumptions of behaving inappropriately and being evaluated negatively and/or being humiliated will give rise to anticipatory anxiety that precedes the social situation adding an extra source of concern and perceived danger. Preoccupied with these fears, clients with social phobia have difficulty focussing their attention on the social cues or their own strengths that help them to effectively cope in the phobic situations. In addition, biased memory and focused attention towards negative signs will prevent the individual from perceiving the positive signs (e.g., acceptance, success, admiration) giving rise to performance deficiencies. These may contribute towards producing patterns of negative interactions that may further contribute to the perpetuation of the phobic con dition experienced at the time (Elting Hope, 1995). These explanations are similar to the generic CBT model, of problem development. Thus the research by Kessler et al (1994) has provided supporting evidence to the general CBT explanation and theoretical framework of problem understanding, assessment and treatment. Another dimension of the aetiology of social phobia is the lack of social skills and/or the lack of awareness of ones own social skills. According to Hill (1989), clients with social phobia vary widely in their knowledge of socially appropriate behaviour skills. Many of these individuals seem to have adequate social skills when assessed in a non-threatening environment such as the clinicians office, but they fail to use these skills when laden with anxiety in an unfamiliar social situation that is perceived as threatening. Hill (1989) further described that there is another group of individuals suffering with social phobia who may be unaware of socially appropriate behaviours in certain situations and therefore encounter repeated failures and disappointments. Thus, Hill (1989) suggest that apart from medication and/or conventional CBT, individuals in this group will benefit more from specific training in social skills either through role playing or modelling as appropriate. In addition to the above dimensions, there are developmental and psychodynamic issues associated with the aetiology of social phobia as well. In this view, children who are rejected, belittled, and censured by their parents, teachers or peers may develop feelings of low self-esteem and social alienation (Arrindell, kwee, Methorst, 1989). The authors of this article further stated that clients with social phobia tend to report, having had hypercritical parents. The article further examine the condition of social phobia from a psychodynamic perspective hypothesising that avoidant behaviour may be caused by an exaggerated desire for acceptance, an intolerance of criticism, or a willingness to constrict ones life to maintain a sense of control. Furthermore, they claim that traumatic embarrassing events may lead to loss of self-confidence, increased anxiety, and subsequent poor performance, resulting in a vicious circle that progress to social phobia. Concentrating on treatment seeking behaviours for social phobia, Hill (1989) highlighted that clients rarely see a physician for symptoms relating to social anxiety. More often seeking help will be for conditions such as substance abuse, depression or any other anxiety disorder (e.g. panic attack). Treatment for Social Phobia As mentioned above, social phobia is the result of biopsychosocial factors. Thus, the treatment choices may also vary which may include pharmacotherapy, and/or different types of psychotherapy. Veale (2003) stated that treatment choice for social phobia is up to the client to decide. Medication is indicated if it is the clients first choice, or if CBT has failed or if there is a long waiting list for CBT. Similarly, pharmacotherapy becomes the choice of treatment when social phobia is comorbid with depression (Veale, 2003). Considering the first treatment choice, UK National Institute for Clinical Excellence (NICE) does not have a specific guideline specific for social phobia. However, in its guidelines for anxiety disorders (NICE, 2004), it recommends pharmacotherapy as treatment if the client opts for medication, or if the client opts for psychological treatment, CBT is given as the first choice of therapy. NICE guidelines (2004) too recommend CBT as the first choice of psychologic al therapy for generalised anxiety disorder and other anxiety disorders. The National Institute for Clinical Excellence provides evidence that CBT is more effective than no intervention and that CBT has been found to maintain its effectiveness when examined after long term follow up of eight to fourteen years. This can be used as a cost and time effective therapeutic intervention in group settings and most clients have maintained treatment gains at longer terms (NICE 2004). It further stated that CBT is more effective than psychodynamic therapy and non-specific treatments. Apart from CBT, clients who receive anxiety management training, relaxation and breathing therapy have been proven to be effective compared to having no intervention. Apart from CBT, Veale (2003) also discusses Graded self-exposure as a psychological therapy for social phobia. This therapeutic intervention which is based on the learning theory hypotheses has been the treatment of choice for social phobia for many years. However, as this method of therapy using exposure to previously avoided situations in a graded manner until habituation occurs was only successful with limited amount of clients, alternative approaches such as CBT have become a more frequent therapy choice. NICE guidelines (2006) on computerised cognitive behaviour therapy (CCBT) for depression and anxiety recommend CCBT for mild depressions and anxiety disorders, including social phobia. With reference to two Randomised Controlled Trials (RCTs) and two non-RCTs comparing CCBT (programme for panic/phobic disorders FearFighter) with therapist led CBT (TCBT) the NICE guidelines recommend the use of CCBT for mild phobic/panic disorders. When results of CCBT and TCBT were compared after a three month period of therapy for global phobia, both groups showed statistically significant improvement. Similar results were shown in two non-RCT studies too. When these scores were compared with a group who received relaxation techniques as therapy, this third group did not show statistically significant improvement while the other two groups (CCBT TCBT) did. However, it must be noted that the RCT and the non-RCT studies does not report clinically significant improvement. Nevertherless, the dropout r ate of FearFighter group was twice as many as the TCBT dropout rate. However, from a positive point of view on the practicality of CCBT on phobias, delivery of FearFighter programme at the clinical setting for one group, and the other group having access to the programme at home over a 12 week period showed that both groups showed statistically significant improvement in all measures (NICE guidelines, 2006). In terms of client satisfaction too there was no statistically significant difference between TCBT and CCBT (NICE guidelines, 2006). Thus, though further research is warranted to evaluate the clinical significance of CCBT for social phobia specifically, the NICE guidelines recommend CCBT as a choice of therapy for mild levels of depression and anxiety disorders. In addition to the observed effectiveness of CCBT, NICE guidelines also recommend it as a cost effective therapy alternative. Thus, CCBT for social phobia at mild levels could be useful at a practical level too. In a study by Rosser, Erskine Crino (2004), the researchers studied the treatment success of CBT with antidepressants and CBT on its own as treatment for social phobia. The results did not show a statistically significant difference in the treatment progress between the two groups allowing the researchers to conclude that pre-existing use of antidepressants did not enhance or detract from the positive treatment outcome of a structured, group-based CBT programme for social phobia. Application of medication and CBT is common practice in treatment for social phobia (Rosser et al., 2004). Yet, there are not many studies that have studied the combined effectiveness for social phobia. Citing Heimberg (2002) Rosser et al., (2004) describe that there are three possible outcomes from combining medication and CBT. Combined treatment may produce a better outcome than each treatment alone, by potentiating the gains achieved by CBT and also reducing relapse rates following the discontinuation of medication. Alternatively, there may be no difference between the combined approach and each approach individually, if both therapies (pharmacotherapy and CBT) are sufficiently powerful on their own. Also, depending on how individual clients attribute treatment success, effectiveness of CBT might be detracted by medication in a combined approach of treatment. Referring to literature on treatment success for social phobia Rosser et al., (2004) highlighted that combination treatment (CBT and pharmacotherapy) or pharmacotherapy alone has not been found to be of significant advantage. CBT has mostly been successful in overcoming symptoms, minimising relapses and also effective in terms of cost minimisation (Rosser et al., 2004). Focussing on the conclusions Rosser et al. (2004), there were no significant differences between the combination treatment (CBT antidepressants) and CBT alone could be interpreted in different ways. It is possible that since antidepressants and CBT are both re asonably powerful treatments individually, and thus a combination of the two did not contribute to a significantly to improve the outcome. Alternatively it may be that the group who were already taking antidepressants may have been prescribed with the medication because they were more severe in terms of social phobic or depressive symptoms prior to commencing treatment programme. Thus, it may be possible to argue that the combined therapy may not have contributed to a significant improvement compared to the group that that only received CBT, because there was a difference in symptom severity between the two groups. In addition there was no control in allocating (randomly) participants and or having a control over the medication dosage. Thus, the research findings of the study are subjected to the limitations of these variables that were out of the researchers control. However, it has to be noted that it does not devalue the comparative treatment success on the CBT (alone) group. The researchers of this study therefore emphasise the need for further research on combined therapy for social phobia as in real life clinical settings most clients are on medication while receiving CBT. Moreover, Rodebaugh Heimberg (2005) recommends CBT combined with medication as a widely used successful treatment method for social phobia. However, while recommending the above, they also emphasise the need for further research in this regard as the current data reveals mixed results. According to available evidence and theoretical considerations they suggested that some methods of combination could provide short-term benefits, but long-term decreases in efficacy compared to either treatment alone. In this paper Rodebaugh Heimberg (2005) emphasised that most research on the effects of CBT combined with medication had the common research gap of failing to control the medication dose and the allocation of participants in to random samples. However, the authors of this paper emphasised that in most studies combined therapy for social phobia had not shown significant evidence of treatment success compared to either pharmacotherapy or CBT. Rodebaugh Heimberg (2005) highlighted that there is supporting evidence to the treatment success of combining CBT with relaxation training. While mentioning this, they also noted that relaxation training alone has not proven to have any clinically significant benefit for the clients. Thus, it is when combined with CBT that clients have had a successful experience with relaxation training. Rodebaugh Heimberg (2005) stated that all forms of CBT aim to reduce the experience of fear through modification of avoidance and other maladaptive behaviours, thoughts, and beliefs (e.g. through exposure with cognitive restructuring). Thus, in the process of therapy most clients may experience an increase in stress and negative affect and distress in the short-term, but the modification of these earlier components of these earlier components of a behavioural-emotional chain leads to reduction of symptoms over time. In regard to combining treatment methods with CBT as treatment for social phobia, Rodebaugh Heimberg (2005) highlighted the fact that all treatment methods have its own limitations and strengths. Thus when combining two therapies (either pharmacological and CBT or CBT with another psychotherapy), the strengths as well as the weaknesses of the two approaches could be magnified, depending on the nature of the combination. Hence, Rodebaugh Heimberg (2005) stated that an empirically supported method of combining medication and CBT for social anxiety disorder is yet to be established, although under varied circumstances clinicians use different combinations of CBT along with other psychotherapies and medication to maximise effectiveness on a case by case level. Concluding Remarks As discussed in this paper, social phobia may literally be a common mental disorder and it is categorised as an anxiety disorder under the DSM-IV classification system (DSM-IV-TR, 2000). While being highly prevalent, it is also a disorder that may have a large impact on a persons quality of life, hindering opportunities for personal growth and/or social interaction/relationships. Therefore, it is an important area of study and clinical practice in mental health, which has the aim of improving the lives of people suffering from this disorder, and minimising its effect on the society. Research literature on social phobia recommends certain types of medication, and CBT as a psychotherapeutic intervention as the first choice of treatment for this debilitating condition. As it is out of our scope, this paper did not pay detailed attention to the types of pharmacotheraputic interventions that may successfully be used to control symptoms of this disorder and enable clients live a healthy life. From a psychological perspective, CBT is widely recommended through evidence based research as the first choice of psychotherapeutic treatment for social phobia. As discussed in this paper, evidence on the successful combinations of therapeutic methods at present denotes the need for further research in order to determine the best combinations for successful treatment. Another area that needs similar attention is combining different types of psychotherapies with CBT as treatment for social phobia. Focusing on CBT for social phobia, although there is supporting evidence for therapy success, and though it is widely considered as the first choice of psychotherapy for this disorder, it is not always successful with all individuals. Thus, form a practical point of view, it is important that clinicians are able to tailor and combine different therapeutic methods (pharmacotherapy and psychotherapy), not only to maximise treatment success, but also to make it useful with different types of clients/clients from different background and life-experiences. Furthermore, although CBT is recommended as the first therapy choice, there are practical issues regarding meeting the demand for services. This becomes an issue in terms of finance as well as in terms of the limited amount of professionals available to deliver treatment. Some successful methods of overcoming these difficulties would be Group CBT for social phobia and CCBT. However, it must be emphasised that these issues become a much grave problem in countries where psychotherapists trained in CBT are rare, and even methods such as CCBT could be unaffordable and inaccessible for certain groups. In addition, there are also limitations in being able to use programmes such as CCBT in countries where English is not used, or it not the first language. Thus, from a global perspective, the use of CBT as a therapy choice is practically challenged due to limitations of resources and trained personals, leavening pharmacotherapy as the most practical mode of therapy for a large numbers of people suffering from social phobia. To conclude, it must be stated that continued research on the successful use of CBT as a therapeutic tool for social phobia and other disorders should be continued as it proves to be a successful therapy for many psychological disorders (Westbrook et al., 2007). Thus, it can be stated that CBT is a useful and successful therapeutic intervention for social phobia. The practical use of it could be further improved through continued research, and through therapist training programmes to meet the demands for therapy, as it would further increase the effectiveness of CBT as a therapy for social phobia.

Friday, October 25, 2019

Analysis of Paul’s Case by Willa Cather Essay examples -- Analysis of

According to many readers of Paul’s Case, this is a short story that shows affection, passion, and most of all enthusiasm. Willa Cather seems to base her stories off of daily life and events that she thought progressed in many lives. Her passion for writing showed in her literature giving a visualization on what people think doesn’t occur in the regular life of a person. Also throughout Willa Cather’s short stories she gave examples upon her childhood and her time spent in a small town she grew up in. Giving her the brilliancy and the ambition to become a writer of short stories which included, Paul’s Case. Themes are represented in all short stories in Paul’s Case, Cather shows the readers a young boy being brought up in a hostile environment whose only dream is to one day pursuiting more than what he came from to make his life better. In Paul's Case by Willa Cather, a boy by the name Paul is the protagonist of the story. Paul is a roundcharacter, but not only does Paul show different personalities Paul seems to change his feelings throughout the story in many different situations. In the meeting in the beginning of the story Paul shows a careless attitude towards being entered in school after returning from suspension."His teachers felt this afternoon that his whole attitude was symbolized by his shrug of his shoulders" (Cather 1). Although shows this trait throughout the entire story along with similar actions, this makes him look like a disobedient student and shows his careless attitude towards the situation that he is in. Throughout the story Willa Cather portrays Paul as a different character from the beginning of the story, to the middle until the end. After returning to school Paul headed off to his job which wa... ... ending. Many elements would have to deal with this fatal ending if it was from Paul’s selfishness, carelessness, ignorance or selfishness no one should have to endure the pain that was caused upon Paul throughout the entire story â€Å"Although Paul’s Case was a story of a ill behavior child it is still known to be some of Will Cather’s work† (David 1). Even though the story ends with an crashing it still gives examples of other human life, asking you to put your foot in others shoes. Work Cited Paul’s Case.† Short Stories for Students. Ed. Kathleen Wilson. Vol. 2. Detroit: Gale. Web. 11 Jan. 2015. â€Å"Critical Overview: â€Å"Paul’s Case†.† EXPLORING Short Stories. Detroit: Gale, 2003. Student Resource Center – Gold. Gale. Web. 11 Jan. 2015. David, Carpete. â€Å"Paul’s Case.† Short Stories for Students. Ed. Kathleen Wilson. Vol. 2. Detroit: Gale. Web. 11 Jan. 2015.

Thursday, October 24, 2019

Opportunity of a Lifetime Essay

After reading this essay, one person may be added to the National Organ transplant waiting list. That one person can save or enhance more than 25 different peoples lives. The Donate Life Illinois is a group of agencies responsible for organ donations, education about organ donations and other helpful statistics to help people and save lives. The Donate Life Illinois group established that more than 6,500 people have died nationwide in the United States waiting for an organ transplant in 2011. An average of 18 people die each day waiting for an organ transplant (Organ & Tissue Donation Stats & Facts). Statistics can be overwhelming and confusing to understand, but one thing you can understand is that each number you read represents a person; a person that is waiting to be saved. This person can be a mom, a dad, a brother or a sister, someone important to someone else. Families try their best to try to help their loved ones search for organ donors. Not all patients are able to receive organs because the lack of organ donors. Through a simple two-step plan, which consists of educating more people about organ donations and changing the U.S from an opt-in system to an opt-in system, this could save those 18 lives lost each day. To start this two-step plan to fix the need for organ donors in the U.S is to educate the public about organ donations. Many Americans are not informed about this major issue of organ donations and or unaware of the lack of organ donors needed in our country. They may not realize that they can potentially become an organ donor themselves very easily. With the public becoming more educated, this will increase the number of donors and decrease the number of patients that pass away waiting for organ transplants. One major issue is the publics view about organ donations only occurring when they die. Organ donations are just as important for people that are living as well. For example, kidney transplants are in desperate need that a healthy living person can easily donate. In the essay â€Å"The Surgery Was Simple; the Process Is Another Story† by Virginia Postrel, she talked about her experience of being a living organ donor. She donated her kidney. She states, â€Å"A kidney don ation is a big deal to the recipient, but public perceptions exaggerate what’s involved for the donor† (Postrel, Virginia). The government should clearly explain how easily the procedure could be done. Kidney transplants require a few incisions just enough to get the kidney out. The recovery process is a couple days and you are the same person you were before. It’s not a life changing procedure. Deciding whether to donate is also another issue. She states, â€Å"Even relatively supportive transplant centers like mine make it easier to quit than to go through with it† (Postrel, Virginia). The government should promote organ donations. They should help the public understand that they could save many lives by donating. Organ donations are a very important in the U.S and the public needs to understand the importance of donating. The last part in the two-step plan to fix the need for organ donors in the U.S is to change the opt-in system to an opt-out system. The United States currently has an opt-in system, which individuals are asked to register their willingness to be a donor after their death . The opt-in system that our nation has currently is not very effective. â€Å"A 2005 Gallup poll revealed that more than half the population of the United States was willing to donate organs after death, but inefficiencies in the current system mean that even willing donors often end up not donating† (Carney, Scott). This is a sad statement that has been stated. This shows that there are people willing to donate but because of our system, its more difficult to pull through the procedure and unaware of how to become an organ donor. The government should come up with a solution to help these perfectly good donors willing to help others through an easier process such as an opt-out system. Donate Life America has a statistic that states, â€Å"90% of Americans say they support donation, but only 30% know the essential steps to take to become a donor† (Statistics). By having an opt-out system, it would make it easier for people to get involved with organ donations and it woul d increase the number of organ donors significantly. Instead of â€Å"100 million people that are organ donors in the U.S† (Organ & Tissue Donation Stats & Facts), we could double this number to 200 million people with more people being able to become organ donors. Some people oppose the opt-out system because they are worried about their relatives not knowing the need for an opt-out organ donor registration, a mandate will be in effect. The mandate will require the DMV and Hospitals to ask people if they want to be on the opt-out organ donor list. Most United States citizens have a driver’s license, which means they have to renew it every couple years so it is up to date. The government can then require people that are renewing their license to be informed about the opt-out system and then they can decide whether they want to be removed from the organ donation list or not. In Hospitals, the policy can consist of requiring the patients to sign a document while they are checking into the hospital stating that they understand the opt-out policy completely for organ donations and can state if they do not want to be removed from the organ donation list. If the patient doesn’t want to become an organ donor, they have the right to register as a non-organ donor. This mandate will potentially eliminate the donors family’s claim that they did not realize that the donor need to opt-out of the list to become an organ donor. Through this simple two-step plan, this policy can increase the number of organ donors on the United States, and it will decrease the number of deaths due to the lack of organ donors. With the public becoming more educated about organ donations, people will be less hesitant to go through the organ donation process. The United States government can influence people to go through with organ donations and change the U.S system from an opt-in system to an opt-out system. Changing the opt-in system to an opt-out system will increase organ donors significantly as well because it will be an easier way to establish if the person wants to become an organ donor or not. By these two simple plans to increase organ donations, those 18 lives lost each day will be reduced because of the people wanting to help each other and donate their organs to the people in desperate need of donors. Works cited Carney, Scott. â€Å"The Case for Mandatory Organ Donation.† Patterns for College Writing. 12th ed. Ed. Laurie G. Kirszner and Stephen R. Mandell. Boston: Bedford, 2010. Pgs 614-617. Print. â€Å"Organ & Tissue Donationï€  Stats & Facts.† Donate Life Illinois. Gammon Group, 2011. Web. 10 Nov. 2012. . Postrel, Virginia. â€Å"The Surgery Was Simple; the Process Is Another Story.† Patterns for College Writing. 12th ed. Ed. Laurie G. Kirszner and Stephen R. Mandell. Boston: Bedford, 2010. Pgs 625-627. Print. â€Å"Statistics.† Statistics | Donatelife.net. N.p., July 2012. Web. 10 Nov. 2012. .

Wednesday, October 23, 2019

Online Job Portal

| ONLINE JOB PORTAL Project Duration: Two Months | | | | team membersShivanjali garg kejung kimsing arushi meenaclass teachermrs. uma sharmab. sC (hons) computer science (4th semester)| | ARSD CollegeUniversity of Delhi2012-2013 Academic Year| | 1. Introduction 2. 1 Purpose 2. 2 Scope 2. 3 Functional Requirements 2. 4 Definitions, Acronyms and Abbreviations 2. 5 Objective 2. 6 References 2. 7 Technologies to be used 2. 8 Overview 2. Overall Description 3. 9 Product Functions 3. 10 User Characteristics 3. 1 Constraints 3. 12 Process Model 3. 13 Architectural Design 3. 14. 1 Data Flow Diagram (DFD) 3. 14. 2 Data Dictionary 3. 14. 3 Entity-Relationship Diagram (ERD) 3. 14. 4 Sequence Diagram 3. 14 Use case Model Survey 3. 15 Timeline Chart(Gantt Chart) 3. Estimation 4. 16 Problem Based Estimation (Function Point Metrics) 4. Risk Table and RMMM plan 5. Structure design Methodology 6. Testing Software Requirements Specification 1. 0 Introduction â€Å"Online Job portal† is a web-ba sed application, which helps end user to finding a job with searching criteria like preferred location, job type, work profile and packages.One can post his/her details on this portal with all relative information. There are many respective facilities given to end user. This application provides logins to the end user and Employer type. End user can Create, edit and delete information by using his/her user ID and password. Whereas Employer can search the profiles. Application takes care of all the security issues so that only the authorize logins and even only the computers can access the relevant information. There are three primary users in this application: 1. Job Seekers 2. Employer and 3. AdministratorThe system administrator will have the ability to clean, clear and maintain the database and the whole system management issue. I. Administrator 1. Verify users account given them right to access the right 2. Block a user 3. Create categories on job 4. Create subcategories on the type of job II. Employers 1. Create vacancies for job seekers 2. Search candidates based on their profiles 3. Can schedule an interview with technical professionals 4. Can select interviewers 5. Can send email to selected candidates III. Jobseekers 1. Create an account with a complete profile 2. Search for jobs with different categories 3.Edit/update the profile 4. Apply online for jobs 1. 1 Purpose Computerized Online Job Search System is developed to facilitate the General Administrative system to manage the various information of the Job Seeker and Job Provider and the processes involved in a Placement company. So that, the organization can access accurate information quickly and easily as and when required, thereby improving its operational efficiency and effectiveness. In today’s competitive environment, where everybody is on the top, the Information plays very crucial roles. As far as information is accessed and processed, it can give good result.Today internet is a fas t way of transferring Data and Information over wide area, hence we have used internet as a way for exchanging information. Computerized Systems helps to fulfill these goals. Computerization of the official works will help in doing lot of manual work quickly. It will help in easy storage and access of all information, in short period of time. This way convenience will prevail both for the Job Seeker and the Job Provider. The development of this new website contains the following activities, which try to automate the entire process keeping in the view of database integration approach. This Site Can provide the recruitment information sending option for the Job providers * This website can provide the mail alert and mobile alert facility for the jobseekers * Administrator can control both job provider’s and as well as jobseeker’s Information 1. 2 Scope The scope of the Online Job Portal includes the following key points: 1. It should contain all the information about Com panies and Vacancies which is in this site. 2. It should contain all the information of Job seeker such as * Personal Details * Professional Details * Educational Detail etc. 3.It should process and evaluate job registered by companies. 4. It should contain information related to Job expiry and registration. 5. It should have administrator for scheduling administrative work of site. 1. 3 Functional Requirements †¢ The System should enable Project Managers to submit their job requirements to the HR for posting. †¢ System should incorporate an approval cycle where the HR validates the submitted job posting before posting to the portal †¢ On Approval, the job posting is assigned to an Internal Sourcing Team, who will receive a notification of the new job posting. System should enable Internal Sourcing Team to recommend applicants for associated jobs to the Project Manager †¢ System should enable employees to view and apply different jobs, allow discussions about job s etc. †¢ System should enable Project Managers to View their Job Postings, Applicant details and their profiles for a particular Job Posting, Recommended Applicant details and their profiles for a particular Job Posting Comments or Activities on different postings etc.. †¢ On successful selection, system should enable project Managers to close the job posting and the status of the job should reflect as â€Å"Hired† across the shared communities, dis-allowing employees to further apply for the job. 1. 4 Definitions, Acronyms, and Abbreviations: * HTML (Hyper Text Markup Language): It is used to create static web pages. * JSP (Java Server Pages): It is used to create dynamic web content. * J2EE (Java 2 Enterprise Edition): It is a programming platform, belonging to the Java platform, which is used for developing and running distributed java applications.WASCE (Web Sphere Application Server Community Edition): It is an application server that runs and supports the J2E E and the web service applications. * WSAD (Web Sphere Studio Application Developer): It is a designer toolkit which is designed to develop more complex projects by providing a complete dynamic web service. * DB2 (IBM Database 2): It is a database management system that provides a flexible and efficient database platform to raise a strong â€Å"on demand† business applications. * HTTP (Hyper Text Transfer Protocol): It is a transaction oriented client/ server protocol between a web browser and a web server. . 5 Objective: This project is aimed at developing a web site for Online Job Portal. It is of great importance to the unemployed people. This site allocates the right job information for suitable persons. All the jobseekers as well as job providers’ information are stored in the database. 1. 6 References * BOOKS * R. S. Pressman, Software Engineering: A Practitioner’s Approach * P. Jalote, An Integrated Approach to Software Engineering 1. 7 Technologies to be used * J2EE: (Servlet, JSP, JAXP, Java Beans) Application architecture. * JAVA: Application architecture. WASCE: (Web Sphere Application Server Community Edition) Web Server * DB2: IBM Database. * Ajax: Asynchronous Java Script and XML. * XML: Extension Markup Language. * Web 2. 0: RSS Feed 2. 0. * Localization: 3 Languages – Hindi, Kannada, and English 1. 8 Overview The SRS will include two sections, namely: * Overall Description: This section will describe major components of the system, interconnections, and external interfaces. * Specific Requirements: This section will describe the functions of actors, their roles in the system and the constraints faced by the system. 2. 0 Overall descriptionThe Online Job Portal System is a package to be used by agencies to improve the efficiency of business. The Online Job Portal System to be developed benefits greatly the members. The system provides jobs catalogue and information to members and helps them decide on the jobs to apply . The Admin can keep the jobs catalogue updated all the time so that the members (Job seekers and the agencies) get the updated information all the time. The main users are users: Admin, Members who are the Job seekers and the agencies. 2. 1 Product Function I. Job Employer Job Employer section, which is further sub-divided into – Call for an interview date ? Call for an interview time Call for an asking Job Seeker want to go for an interview? Call for an asking Job Seeker about feedback of interview facing? Check the status true if selecting in the job. II. Job Administrator Job Administration section, which is further sub-divided into four subsections: Check the status true if call back from the company. Also check the status false if Job Seeker is rejected. Viewing members. Emailing Register New Administrator Add Country Add State Add City Edit/Delete Recruiter Edit/Delete Job Seeker View Reports III. Employee Section * Registration Resume upload in the speci fied format * Upload Video/ Audio Resumes – giving an extra edge to the deserving candidates * References/Video References * Option of Video Interviews * Advance search by keywords, location, job title, skill, industry, company, profile * Interest list for Jobs and the option of posting resumes to the entire list in one go * Option of tracking pervious applications * Directory Services like – â€Å"Best places to work† * Creative Resume writing service (paid service). * Option of having Personal Web Page (Profile Builder) – The professional details could be filled through simple designed form.Upload images, scanned salary slips, academic records, experience certificate, passport copy etc. , with a link and it could be accessed online from anywhere with feature of differential access. * Option of taking Industry endorsed tests for better employability and put them on the personal web page along with the resume * Confidentiality feature to define privacy le vel e. g. block current employer from accessing profile. * Access to Customer care * Spell Check facility for the resume * Interview Scheduler – an alert through the email or mobile phone. 2. 2 User CharacteristicsThe user should be familiar with the internet. The user should have knowledge of the area for which he has to file the complaint. 2. 3 Constraints: * GUI is only in English. * Login and password is used for identification of user and there is no facility for guest. * This system is working for multiple servers. * There is no maintainability of back up so availability will get affected * Limited to HTTP/HTTPS. 2. 4 Process Model SPIRAL MODEL SPIRAL MODEL was defined by Barry Boehm in his 1988 article, â€Å"A spiral Model of Software Development and Enhancement. This model was not the first model o discuss iterative development, but it was the first model to explain why the iteration models. As originally envisioned, the iterations were typically 6 months to 2 years long. Each phase starts with a design goal and ends with a client reviewing the progress thus far. Analysis and engineering efforts are applied at each phase of the project, with an eye toward the end goal of the project. It is an evolutionary software process model that couples the iterative nature of prototyping with the controlled and systematic aspects of the waterfall method. Fig 1. 0 Spiral Model Reasons for using this model in our project: Estimates (i. e. budget, schedule etc. ) become more realistic as work progresses, because important issues discovered earlier. * It is more able to cope with the changes that are software development generally entails. * Software engineers can get their hands in and start working on the core of a project earlier. * It’s a realistic approach to the development of large scale system and software. Architectural Design 12 Data Flow Diagram Level-0 Level – 1 2. 13 Data Dictionary Job Provider Reg-info = User name + Passwords + Em ail ID + Mobile No Login = User name + Passwords Submit = Job id + Job infoView and Post = Job vacancies + update jobs Job seeker Reg-info = User name + Passwords + Email ID + Mobile No Login info = User name + Passwords Receive = notification Update info = Upload resume Apply for a job = Job id + apply for job Receive = interview call letter Admin Login = User name + Passwords Check report = Complain id 2. 11 ER Diagram C-name URL Address Contacts Home Type of Sector Contact Us Sign Up 1 M Visit Job portal Company Login 1 1 1 Visit D -Resume Post M N M N Qualification M Search Job seeker Job Location Name Category Contact Address Criteria Exp DOB Position Job id Salary 2. 5. Sequence Diagram 2. 5 Use case Model Survey Approve the vacancy Administrator Login Put the vacancy on website Download the CV Send the reply to jobseeker Search for job Register Apply the job Upload resume Employer Check their qualification Job seeker 1. ADMINISTRATOR: * Name of use case:- ADMINSTRATOR * Descr iptions:-To manage the user accounts and maintain the database and user accounts. * Pre-conditions:- administrator user name and password. * Normal flow of events:- ?new login, password, details of the user location id, roles, permissions a granted. ?save details. ?manage the permissions of other users. Alternative flow of events:-if login is wrong then message appears. * Post conditions:-Management of user accounts and permissions. 2. REGISTRATION * Name of usecase:-CREATE the account * Descriptions:-the user can create a new account in the site. * Pre-conditions:- ?not a member of the site. ?invalid username and password. * Normal flow of events:- ?enter the details and submit. ?login the site. ?logout the site. * Alternative flow of events:- ?invalid username. ?invalid password. * Post conditions:- User can use the valuable resources in the site and view the various Job Opportunities. 3.JOB SEEKER * Name of usecase:-Job Seeker * Descriptions:-Job seeker can register & login to th e website and can upload his resume and can search for a desired job followed by applying for it * Pre-conditions:- ?Must have prepared his resume. ?Must have all the required job details. ?Must be eligible to apply for a job ?Must have registered for a job ?Must have prepared his resume * Normal flow of events:- ?enter the details and submit. ?login the site. ?upload a resume ?search for a job ?apply for a job ?check his application status ?can access to customer care * Alternative flow of events:- invalid username. ?invalid password. ?not eligible for the job ?not job is available for which the seeker is eligible ?no vacancies in any company ?have already applied for all the vacancies * Post conditions:- user can wait for the companies to give him a call for the interviews and can regularly check his mails for the alerts(if any)send by he administrator 4. JOB PROVIDER * Name of use case:-Job Provider * Descriptions:-Job Provider can register & login to the website and can add the vacancies update and delete them. * Pre-conditions:- ?Must have some vacancies for chances of vacancies in the future ?Must be eligible to register his company registration ?Must have registered to the site * Normal flow of events:- ?enter the details and submit. ?login the site. ?add the vacancies ?update the vacancies ?delete the vacancies ?check who all have register their vacancy and can contact to them personally * Alternative flow of events:- ?invalid username. ?invalid password. ?not eligible for registering ?no vacancies in the company ?no user registered for the vacancy * Post conditions:- Provider can take the note of the seekers who he wants to call for an interview and can contact with them through mails or calls. . 17 Timeline Chart(Gantt Chart) Work Tasks| 1st Week| 2nd Week| 3rd Week| 4th Week| 5th Week| 1. Communication Meet with team in-charge Identify needs and project constraints Establish product statement Milestone: Product statement defined2. Planning Technical task Risk analysis Source requirement Design and product analysis Project time schedule Milestone: Completion of planning3. Modeling Deciding model Analysis used model Milestone: Model selected4. Construction Code generation Testing Milestone: Completed construction5.Deployment Review the project Delivered to the customer Feedback based on evaluation Milestone: Project completed| | | | | | | | | | | | | | | | | | | | | | | | | | 3. 2 Computing Function Points Information Domain Value| Count| | Weighting FactorsSimple Average Complex| | | External Inputs| 8| x| 3| 4| 6| =| 24| External outputs| 5| x| 4| 5| 7| =| 20| External Inquiries| 3| x| 3| 4| 6| =| 09| Internal Logical Files| 6| x| 7| 10| 15| =| 42| External Interface Files| 0| x| 5| 7| 10| =| 0| Count Total| 95| To compute function points (FP), the following relationship is used: FP = count total x [0. 5 + 0. 01 x ? (Fi)] = 95x{0. 65+0. 01Ãâ€"46} = 105. 45 Where count total is the sume of all FP entries obtained from the Fi ( i = 1 to 14) are value adjustment factors (VAF) based on responses to the following. 1. Data communication 2. Distributed processing 3. Performance objectives 4. Operation configuration load 5. Transaction rate 6. On-line data entry 7. End user efficiency 8. On-line update 9. Complex processing logic 10. Re-usability 11. Installation ease 12. Operational ease 13. Multiple sites 14. Desier to facilitate change 4. 2. 2 Empirical model based estimation (COCOMO II model) No. f screens in the project: 14 No. of reports: 5 No. of 3GL components: 1 Developer’s experience/capability: Very Low % reuse: 70 Taking the values from the given tables: Thus Object Points= [14X1 + 5X2 ] =24 NOP= (object points) X [(100-%reuse)/100] =24 X 0. 30=7. 2 PROD=4 Thus Estimated effort=NOP/PROD=7. 2/4=1. 8 person-months RISK MANAGEMENT Risks| Category| Probability| Impact| Size estimate may be significantly low| PS| 60%| 2| Large number of users than planned| PS| 30%| 3| Less use than planned| PS| 70% | 2| End users resist system| BU| 40%| 3| Delivery deadline will be tightened| BU| 50%| 2|Customer will change requirements| PS| 80%| 2| Lack of training on tools | DE| 80%| 3| Staff inexperienced| ST| 60%| 2| Poor standard of work| ST| 40%| 1| Poor feedback| BU| 30%| 2| Incomplete requirements| PS| 30%| 2| Risk | Consequence | Action | Size estimate may be significantly low. | Inefficient resource allocation for the software resulting in delivery delays. | Close look at requirement collection process. | Less reuse than planned. | Development time will increase. | Develop efficient SRS. | Customer will change requirements. | Might lead to start of development from scratch. Choose an efficient model that can cope with sudden changes in requirements. | Staff Inexperienced. | Might lead to development of incomplete software. Completed project may receive poor reviews. | Choose the project team efficiently with proper mix of experiences | Poor standard of work. | Will result in a poor q uality project. Some elements may need to be redone. Completed project may receive poor reviews. | Carry out a thorough procurement process looking at issues of experience and quality as well as cost. Include appropriate contingency. | Delivery Deadline may be tightened. Delay in deployment. | Deadline should be carefully calculated keeping all areas in mind. | Poor public response to the software. | Wastage of development efforts with financial losses. | Conduct a survey to get information about market trends. | Requirements are incomplete. | Incomplete software. May get rejected by the customer. | Requirements should be carefully understood and documented. | Lack of training on tools. | Inefficient software product with chances of defects. | Developers should be well trained and comfortable with the development tools. | | | | End users resist system. Redevelopment of the product from scratch. | End users terms and conditions should be mentioned in the SRS. | Larger number of users than planned. | Database will need to be expanded. | Database should be big enough to cope with the worst case situations. | | | | 5. Design 7. 1 Structured Design Methodology Get username & password notifications apply confirmation validate joblist userid resume name&pwd System Database Main Print confirmation Login Apply Notifications Check passwords Check username Get passwords Get username validation login input Send resume Select company pply select view notifications Print Validate Username & password 6. Testing (White Box) 8. 1 Pseudo code 1. If(name==s. name && pwd==s. pwd) 2. then display notifications 3. else re-enter name and password 4. print â€Å"enter valid job category† 5. read j_c 6. if(j_c==s. jc[]) 7. then display job list 8. else print † no such category† 9. display â€Å"select valid job_id† 10. i=1,n=5; 11. do while(i