Tuesday, May 19, 2020

Play Therapy Effective Treatment For Children With Post...

My topic of inquiry I have chosen to research for this report is; is play therapy an effective treatment for Children with Post traumatic stress disorder. I was drawn to this topic as I have had an interest in working with Children who have experienced Trauma and have a diagnosis of Post-Traumatic Stress Disorder under the criteria of the diagnostic and statistical manual of mental disorders (DSM-IV). I worked on a personal level with many children who have experienced traumatic events such as natural disasters and have seen the impact that these traumas have had on them and I am curious to know if play therapy is an effective way of working with children who have Post-traumatic stress disorder. I wanted to explore this more as children find it difficult to articulate their thoughts and feelings and I want to know if play therapy is an effective way of helping them to express their thoughts and feelings. I also wanted to find out why Play Therapy is not really recognised in New Zea land and why there is such a limited amount of Play Therapists in New Zealand. I became interested in this topic when I took a child to play therapy and seen the impact that these sessions had on their development and behaviour and this drew me to want to find out why this treatment is not used more widely with children as play is a natural aspect of their development. Search Strategies At first when I started researching this question I was using Bill Robertson library website and the ProquestShow MoreRelatedResearch Based Interventions Paper1727 Words   |  7 Pagesï » ¿ Research- Based Intervention on Post- Traumatic Stress Disorder Erica Mariscal Vigil PSYCH 650 Dr. Harry Beaman 05/25/15 Research- Based Intervention on Post- Traumatic Stress Disorder According to Butcher, Mineka, and Hooley (2013), Post-Traumatic Stress Disorder (PTSD), is a â€Å"disorder that occurs following an extreme traumatic event, in which a person re-experiences the event, avoids reminders of the trauma, and exhibits persistent increased arousal†. An example may be, a person whoRead MorePost Traumatic Stress Disorder ( Ptsd )989 Words   |  4 Pages Post Traumatic Stress Disorder Sarah Batson Eastern Florida State College, Melbourne CLP 2140 03M Abstract In today s society, it has become prevalent that the amount of individuals suffering from mental illnesses is rapidly increasing. This paper will focus on one of the disorders associated with mental illness – Post Traumatic Stress Disorder. The introduction will define and describe the disorder, and the following paragraphs will discuss causes, symptoms, target populationsRead MoreExpressed And Blessed : Holden s Battle With Ptsd1363 Words   |  6 PagesStressed and Blessed: Holden’s Battle with PTSD According to the Merriam Webster dictionary, post-traumatic stress disorder is defined as, â€Å"a mental condition that can affect a person who has had a very shocking or difficult experience and that is usually characterized by depression, anxiety, etc†(citataion). Unfortunately, many people struggle with this disorder every day which can cause them to become depressed and nervous, and in the worst cases, cause them to commit suicide. Throughout CatcherRead MoreThe Factors of Post Traumatic Stress Disorder Essay675 Words   |  3 PagesFactors of Post Traumatic Stress Disorder Post traumatic stress disorder occurs after a person is exposed to a terrifying ordeal which causes either grave physical or psychological harm where harm was threatened. It can become an extremely debilitating disorder to the persons life. The person can have problems interacting in social and family life, occupational instability and the breakdown of marriages can occur. The disorder is triggered after traumatic events suchRead MoreTrauma Focused Cognitive Behavioral Therapy1720 Words   |  7 PagesIt is normal, following a traumatic experience, for a person to feel disconnected, anxious, sad and frightened. However, if the distress does not fade and the individual feels stuck with a continuous sense of danger as well as hurting memories, then that person might in fact be suffering from Post-Traumatic Stress Disorder (PTSD). PSTD could develop after a traumatic incident which threatens one’s safety or makes one to feel helpless (Dalgleish, 2010). Coping with traumatic events could be very difficultRead MorePost Traumatic Stress Disorder ( Ptsd )1602 Words   |  7 Pages Sarah Richards Post Traumatic Stress Disorder March 9, 2015 SW 612 Post-traumatic stress disorder (PTSD) is an anxiety disorder that may develop after an exposure to a terrifying event in which physical harm occurred or was threatened. Usually, the anxiety may be brought on by an â€Å"exposure to an actual or threatened death, serious injury or sexual violence â€Å"(American Psychiatric Association, 2013, pg. 271). Only recently have children and youth been deemed to have experiencedRead MorePosttraumatic Stress Disorder ( Ptsd )1514 Words   |  7 PagesDescription Posttraumatic Stress Disorder (PTSD) is defined as â€Å"a condition that generates waves of anxiety, anger, aggression, depression and suspicion; threatens a person’s sense of self; and interferes with daily life functioning† (Smeltzer, Bare, Hinkle Cheever, 2010, p. 99). As human beings, we are built with different type of emotions and feelings that can endanger us or benefit us. When faced with a traumatic life event, an individual will either overcome the event and become strongerRead MoreThe Use Of Art Therapy After Disaster1637 Words   |  7 Pages Art Therapy after Disaster Lori A. Davis Current Trends in Art Therapy Professor Orr July 3, 2015 Abstract The use of art therapy after a disaster is an emerging approach to dealing with trauma. Disaster can result from natural events, manmade events, personal events, or a combination of any of these. Adults, families, and communities go through considerable suffering during disaster and deal with many trauma related symptoms and issues. Children experience trauma in dissimilarRead MoreDomestic Violence and Social Problems1268 Words   |  6 Pagessexual orientation, socioeconomic backgrounds, or education levels. While the systems primary focus targets adult victims of abuse the new attention is being focused on children who witness domestic violence. Witnessing a violent crime is commonly defined as being within visual range of the scene as the crime occurs. Children are expected to unfold in a secure and nurturing environment. When the environment is injected by fear and violence all of the normal task of growing up are unfavorablyRead More Reliving the Nightmare: Post-Traumatic Stress Disorder Essay1172 Words   |  5 PagesReliving the Nightmare: Post-Traumatic Stress Disorder After the terrorist attacks on September 11th, horrific images of the towers collapsing, survivors fleeing, and the rescue and recovery efforts inundated television viewers. In the weeks following the attacks, numerous news accounts reported increasing general anxiety among Americans, with many individuals reporting sleep difficulties and trouble concentrating. Additionally, much attention focused on the effects on those who directly witnessed

6 Things Charles Darwin Did Not Know

Wednesday, May 6, 2020

The Islamic State Of Iraq And The Levant - 1439 Words

ISIS is known as the Islamic State of Iraq and the Levant and was formed in 1999 by member Abu Musab al-Zarqawi. ISIS was originally from al-Qaeda, another terrorist group, but this group mainly was a small insurgent group in Iraq in 2006 and would help assist in the Syrian Civil War in 2013. They took Iraq in October 2006, then Levant in April 8, 2013; however, they would then be separated from al-Qaeda because of the war between ISIS and Jabhat al Nusra. In 2015, ISIS would then be considered as the number one most dangerous group of terrorists in history. After four ISIS members went on a shooting rampage and blew themselves up in Paris, where over one hundred fifty people would lose their lives; a conspiracy theory explaining that the†¦show more content†¦Two years later, the Iraq war would start in March 2003, and after eight years of fighting in Iraq the war would end in 2011. As a result, at the end of the war, the U.S had destroyed the government, toppled Saddam Huss ein, and destroyed Iraq’s governmental infrastructure. However, the most important thing that the U.S. left behind was a power vacuum, in a political standpoint, this means when some have lost government authority or power and no one can replace them. Which means a new type of government can be utilized as a democracy, monarchy, or even a communist rule. So anyone with a military and government control can take over Iraq and claim it as their territory. This power vacuum left behind from the U.S would start the formation of ISIS, they would gain control over Iraq as America had withdrew all military forces from the country. Lister (2014) stated that â€Å"The aim of ISIS is to create an Islamic state across Sunni areas of Iraq and in Syria.†(para.4). Before the war, people suspected Iraq was just another corrupted country, but it was not because it had a decent functioning government, and many average people in Iraq were able to live an ordinary life in the country; al though, conditions for minority religious people were somewhat bad in Iraq. It was probably the only bad part about Iraq, but it’s mainly a social issue in Iraq’s

Critically Discuss Three Sociological Approaches to...

Critically discuss three sociological approaches to explaining crime? One of the most predominant areas of study in sociology is in the explanation of crime and deviance in society. Criminal acts are those which violate established formal laws, whereas deviance refers to the breaking of social norms. Crime and deviance are a social construct as they are decided by the people in a society and can vary greatly depending on the society in question, as well as the time period being studied. In the past research focussed on pursuing biological explanations for people committing criminal or deviant acts. The prevalence of convicted male criminals and the discovery of the XYY chromosome pattern in male prison inmates lead some scientists to†¦show more content†¦Durkheim also proposed that social views to activities considered deviant could change and that those activities could eventually become part of the socially accepted norm, changing society. For example, attitudes towards homosexuality have changed significantly in the last 50 years, with decriminalisation leading to tolerance and eventual acceptance by general society. This social change occurs when a segment of society begins to support acts considered deviant, causing society as a whole to reconsider its collective position and advance its cultural boundaries, conceivably for the benefit of all. Strain theory, proposed by Robert Merton and advanced by Albert Cohen, Richard Cloward, Lloyd Ohlin and Robert Agnew, argues that it is the structure of society that causes crime due to the pressure put on society’s members to achieve common social goals. For example, the capitalist ‘American Dream’ of financial success has lead some, who are unable to achieve this goal through conventional means (often the poor and powerless), to turn to crime as a way of gaining financial prosperity. This can lead to the formation of criminal subcultures where different values become important such as fearlessness and resentment towards authority. This allows those who are unable to achieve success conventionally to gain statusShow MoreRelatedTraditional African Family19679 Words   |  79 Pagessubsequent edition has been unrivalled for accuracy and detail. These lesson plans aim to provide guidance on using the sixth edition of Sociology Themes and Perspectives in a teaching context by offering practical classroom support for teachers. Three lesson plans are provided for each chapter. One of these is a glossary exercise that will help students come to terms with the conceptual base of the subject and allow them to build a running dictionary of sociology. The other two lessons focus onRead MoreCompare and Contrast Functionalism and Structuralism14315 Words   |  58 PagesChapter 1 What is social psychology? LEARNING OUTCOMES When you have ï ¬ nished studying this chapter, you should be able to: 1 Outline the main differences between experimental and critical approaches to social psychology. 2 Describe the three main ‘metaphysical battles’ between them. 3 Trace the origins of social psychology through the work of William McDougall and William James, and the contributions made by Và ¶lkerpsychologie and crowd psychology. 4 Describe the two contrastingRead MoreOrganisational Theory230255 Words   |  922 Pageschapters as a starting point for getting to grips with the field of organization theory. Dr Martin Brigham, Lancaster University, UK McAuley et al. provide a highly readable account of ideas, perspectives and practices of organization. By thoroughly explaining, analyzing and exploring organization theory the book increases the understanding of a field that in recent years has become ever more fragmented. Organization theory is central to managing, organizing and reflecting on both formal and informalRead MoreMethods of Qualitative of Data Collection19658 Words   |  79 Pagestalk-show interview, we might speak of its width instead of its depth (Wengraf, 2001). Interviewing varies in terms of a priori structure and in the latitude the interviewee has in responding to questions. Patton (2002, pp. 341–347) puts interviews into three general categories: the informal, conversational interview; the general interview guide approach; and the standardized, open-ended interview. Qualitative, in-depth interviews typically are much more like conversations than formal events with predeterminedRead MoreDeveloping Management Skills404131 Words   |  1617 PagesAnalytical Problem Solving 174 Defining the Problem 174 Generating Alternatives 176 Evaluating Alternatives 176 Implementing the Solution 177 Limitations of the Analytical Problem-Solving Model 178 Impediments to Creative Problem Solving 178 Multiple Approaches to Creativity 179 Conceptual Blocks 183 Percy Spencer’s Magnetron 185 Spence Silver’s Glue 185 The Four Types of Conceptual Blocks 185 Review of Conceptual Blocks 194 Conceptual Blockbusting 194 Stages in Creative Thought 194 Methods for ImprovingRead MoreManagement Course: Mba−10 General Management215330 Words   |  862 Pagesthat accounting practices face in determining true performance costs and that forecasting programs confront in establishing the economic determinants of corporate planning? In addition to these challenge s, many analytical and strategic evaluation approaches that are used in an attempt to identify and project how well a company is performing have been overwhelmed by the frequency and magnitude of these economic groundswells. In today’s competitive climate, where the changes outside a business exceedRead MoreStrategy Safari by Mintzberg71628 Words   |  287 Pagesthings—for example seven wonders of the world, seven deadly sins, and seven days of the week. This reflects our cognitive makeup, he concluded: seven is about the number of chunks of information that we can comfortably retain in our shortterm memories.* Three wonders of the world would fall a little flat, so to speak, while eighteen would be daunting. But those of us interested in strategy are, of course, no ordinary mortals—at least in terms of our cognitive capacities—and so should be able to comprehendRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition Ne w Jersey: Prentice Hall393164 Words   |  1573 PagesIntuition 175 †¢ Common Biases and Errors in Decision Making 177 Influences on Decision Making: Individual Differences and Organizational Constraints 184 Individual Differences 184 †¢ Organizational Constraints 186 What About Ethics in Decision Making? 187 Three Ethical Decision Criteria 187 †¢ Improving Creativity in Decision Making 188 Summary and Implications for Managers 190 S A S A S A L L L Self-Assessment Library What Are My Gender Role Perceptions? 166 glOBalization! Chinese Time, North AmericanRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pagesimpact of mechanized warfare in the twentieth century. Departing from a tendency among historians to specialize in one or the other of what have been viewed as very different wars, Morrow not only compares the two conflicts in detail, but also approaches each war and its linkages from a thoroughly global perspective. This combination of rigorous comparison and breadth allows him to repeatedly challenge longestablished myths, provide alternatives to narrowly conceived interpretations, and offer

Code Breaker in the Second World War

Question: 1. You are a code breaker in the Second World War and youve just intercepted the following Enigma message:C I.IV.VII ABC AAA AZ BY CP DF HI JWBFHK RESW TIOD BPMN ICJM RVBN KRDS JSPV FABM QQXE OVFYou have advance information that this message contains three names of suspects. Luckily you also have a time machine that allows you move to 2015 and access the Internet to break this code. So you go to https://enigma.louisedade.co.uk/enigma.html to use an Enigma emulator.The first line is the settings for Enigma, the first 3 letters on the second line are the daily settings, and the rest of the second line is the message.On the first line you can tell from the I.IV.VII part that this is an M3 Enigma (only 3 wheels). For the rest The C means we set the Umkehrwalze (reflector wheel) to C. I.IV.VII means we set the Walzenlage (wheel order) to wheel I, IV, and VII We set the Ringstellung (ring setting) to ABC We set the Grundstellung (start position) to AAA On the plugboard (Steckerbrett) to ma tch A to Z (type Z in the box under A), B to Y, C to P, D to F, H to I and finally J to W.Once youve done this, you type in the first 3 letters of the second line into the Type Letter box. Check the Out box to see what it encodes to and use these 3 letters to replace the contents of the Grundstellung (start position). Now we can decode the message.Click where it says Block of Text and copy and paste the second line of the code from above (you dont need the first 3 letters). Click Encipher/Decipher Text and you should see the deciphered message in the Out Box. The names are separated by Xs since there is not a space character in Enigma.a) Once you have the names, write a half a page description for each person stating who they are, what their contribution to Computer Science was, and why it was significant. Please include at least 2 references for each person. If you cannot break the code, choose any 3 pioneers in computing and write the descriptions.b) Also the head code breaker wants to check your work so he wants you to use the same Enigma settings as in the intercepted message to code his name, ProfessorxHircock, and submit the ciphered code as part of the assignmen t (you only need to submit the ciphered name, not the settings).2. Encryption and decryption played a large role in the outcome of the Second World War. After the war and for the next few decades, encryption played little or no role in the life of the average person. What about now? Discuss how encryption and decryption impacts upon our lives today. Describe two examples of encryption that people interact with most every day. Please provide references.3. Computers have had a very large effect on society. Their use has helped us in many ways and also hurt us in many ways. Select and describe the 2 most positive impacts of computing and the 2 most negative impacts of computing. Justify your selections. Please provide references. Answer: 1. The names are: BLAISE X PASCAL X ADA X LOVELACE X GRACE X HOPPER X 1 a. Blaise Pascal, a French numerical virtuoso, at 19 years old imagined a machine, which he called the Pascaline that could do expansion and subtraction to help his dad, who was likewise a mathematician. Pascal's machine comprised of a progression of apparatuses with 10 teeth each one, speaking to the numbers 0 to 9. As each one rigging made one turn it would trip the following apparatus up to make 1/10 of an upheaval. This standard remained the establishment of all mechanical calculators for quite a long time after his demise. The Pascal programming dialect was named in his honor. Of the eight Pascalines known to have survived, four are held by the Muse des Arts et Mtiers in Paris and one all the more by the Zwinger historical center in Dresden, Germany, show two of his unique mechanical mini-computers. Despite the fact that these machines are spearheading precursors to a further 400 years of improvement of mechanical routines for figuring, and it might be said to the later field of machine building, the number cruncher neglected to be an incredible business achievement. Mostly on the grounds that it was still truly awkward to use by and by, yet most likely basically in light of the fact that it was uncommonly lavish the Pascaline got to be minimal more than a toy, and grown-up toy, for the extremely rich both in France and somewhere else in Europe. Pascal kept on making enhancements to his outline through the following decade and he alludes to nearly 50 machines that were assembled to his configuration. Ada Lovelace portrayed her approach as "poetical science" and herself as an "Investigator ( Metaphysician)". As an adolescent grown-up, her numerical abilities drove her to a progressing working relationship and companionship with individual British mathematician Charles Babbage, and specifically Babbage's work on the Analytical Engine. Somewhere around 1842 and 1843, she deciphered an article by Italian military architect Luigi Menabrea on the motor, which she supplemented with an extensive set of notes she could call her own, basically called Notes. These notes contain what numerous consider to be the first machine programthat is, a calculation intended to be completed by a machine. Lovelace's notes are critical in the early history of machines. She likewise built up a dream on the ability of machines to go past negligible computing or number-crunching, while others, including Babbage himself, concentrated just on those capacities. Her brain set of "poetical science" drove her to m ake inquiries about the Analytical Engine (as demonstrated in her notes) looking at how people and society identify with innovation as a synergistic instruments. Grace Murray Hopper, a PC researcher from America, is a pioneer in her field and was one of Harvard Mark I PC's first developers. She is likewise in charge of adding to the first ever compiler utilized for PC programming dialect. Aside from being the brains behind COBOL which is one of the first few present day programming dialects, Grace Hopper is additionally an United States Navy Rear Admiral. In view of her accomplishments and commitments in the field of software engineering and the naval force, she is now and again affectionately called "Astonishing Grace." 1b. ProfessorxHircock encrypted name: M ABQA ORYB BAEM UGZP 2. Computerized security in the 21st century is more essential than at any other time. The abundance of individual and budgetary data that is conveyed over mobile phones, email, and record exchanges could, in the wrong hands, ruin anybody and any organization. Progressively, the privilege to protection is subject to the privilege to cryptography. Late authoritative and legal activities demonstrate that, for both great and childish propositions, the United States is not ready to permit computerized protection. Review of Privacy Laws The privilege of the individuals to be secure in their persons, houses, papers, and impacts, against un sensible pursuits and seizures, might not be damaged, and no Warrants should issue, yet upon reasonable justification, upheld by Oath or insistence, and especially depicting the spot to be looked, and the persons or things to be seize Government and Cryptography The power, characterized beforehand as the legislature and companies, appreciate the security of solid figures yet regularly don't need people likewise to utilize solid figures. Through administrative and legal measures, the administration has attempted to point of confinement the singular's right to gain entrance to cryptography, actually encroaching on free discourse, trial, and security rights. Key Disclosure Key revelation laws require, under specific conditions, that people surrender cryptographic keys to law authorization. In the United States, no law in fact exists yet key exposure is built under case law through the 2007 United States v. Boucher. Cryptography as a Military Asset Cryptography has its establishes in the military and will dependably be a critical military resource. Alongside the Enigma figure, Allied cryptanalysts likewise effectively assaulted the Lorenz figure, utilized among German High Command, and JN-25, utilized by the Japanese Imperial Navy. In the present-day, past the undeniable need to keep military requests mystery, government-supported digital war implies cryptography is a national security concern. Stuxnet, an extensive machine worm found in 2010, overrode pace controls in Iranian axes and set back their atomic project. The proof focuses towards the Israeli government, who have affirmed that "digital fighting is presently among the mainstays of its protection doctrine* +." The 2010, the Pentagon set up the Cyber Command to protect its machine systems from outside assault. It is a late reaction to a war that the US is by all accounts losing, as there are a few affirmed effective assaults on high-esteem military system. 3. Positive Impact of Computers on society Numerous organizations are utilizing PC for keeping the records of their clients. Banks are utilizing computers for keeping up records and overseeing monetary exchanges. The banks are likewise giving the office of internet managing an account. The clients can check their record adjust by utilizing Internet. They can likewise make money related exchange on the web. The exchanges are taken care of effectively and rapidly with automated frameworks. Individuals are utilizing computers for paying their bills. They are getting data from the Internet. They are additionally utilizing computers to deal with their home plan and so forth. PC can be utilized as a part of instruction field to enhance showing and learning procedure. PC is utilized as a part of universities to give the techniques for educating in diverse ways. It is utilized to instruct the understudies viably. Numerous PC based instructive projects are accessible. The understudies can figure out how to peruse, to tally, and to talk a remote dialect. Numerous instructive diversions are getting to be mainstream in the understudies. -A dreary work can be completed with the utilization of computers rapidly and precisely. -Instead utilizing paper records and involving substantial spaces, more data can be put away in little space electronically that can be gotten to as needed. -Computers have multitasking and multiprocessing capacities which offices multifold operation on information. -Since the information are put away in electronic gadgets, they can be effectively gotten to. -Computers comply with the guidelines and they handle the information absence of prejudice amid result handling. -Documents can be kept mystery with exceptional login name and secret key assurance. - Safeguarding the Citizen: Computerized framework give different shielding frameworks. *Personal information store by the police. *Personal information put away by the nearby authoritative bodies. *Information about climate figure. *Information about common catastrophes, for example, seismic tremor. *Information about late occasions of activity ,road,etc. -Social Effects(ATM,Visa card,MasterCard):People can utilize computerized teller machine cards for withdrawing cash saved with the assistance of ATM card ,Visa card or Master card. Negative Impact of Computers on Society Wastage of Time Energy: Many individuals use computers without positive reason. They play amusements and talk for long time. It causes wastage of time and vitality. Information Security: The information put away on PC can be gotten to by unapproved persons through systems. It has made genuine issues to information security. PC Crime: People use PC for contrary exercises. They hacks the Mastercard quantities of the individuals and utilization them for shopping. -The computers are exceptionally extravagant and they aren't moderate for general individuals. -There are a few systems individuals can privateer information for abuse. -Since a PC can do meets expectations much quicker ,less number for representatives can accomplish more work and it prompts expanded unemployment. -Due to glitch of the PC ,colossal information and data can be lost. -Computer innovation is quick changing innovation and we need to upgrade in like manner which may get to be troublesome for little firms and schools. -Due to the trouble of information transmission we fall flat in giving fitting administrations. -Data Integrity and information Security. References Csakany, A. and Vajda, F. (1977). The Impact of Computer Availability on Engineering Education in Hungary.IEEE Trans. Educ., 20(1), pp.2-6. History-computer.com, (2015).History of Computers and Computing, Mechanical calculators, Pioneers, Blaise Pascal. [online] Available at: https://history-computer.com/MechanicalCalculators/Pioneers/Pascal.html [Accessed 9 Feb. 2015]. Rehman, J., Rehman, J., Rehman, J., Rehman, J., Rehman, J. and Rehman, J. (2014).Positive and Negative Impacts of Computer on Society | Pak. [online] Pak Tech Pro. Available at: https://www.paktechpro.com/positive-negative-impacts-computer-society [Accessed 9 Feb. 2015]. Sdsc.edu, (2015).Ada Lovelace: Founder of Scientific Computing. [online] Available at: https://www.sdsc.edu/ScienceWomen/lovelace.html [Accessed 9 Feb. 2015].

Designing and Managing the Supply Chain, Chapter 1 Questions free essay sample

These subassemblies are assembled during final assembly and then distributed to dealership for the consumer market. b. What are the different firms involved in the supply chain? The following are a selection of firms involved in the supply chain: Suppliers, Manufactures, Transportation companies, Warehouses and distributions centers, sub-contractors, dealerships, and customers. c. What are the objectives of these firms? The simple objective of these firms is to maximize market share and make a profit. Every challenge to operate the supply chain supports these two primary goals. d. Provide examples of conflicting objectives in this supply chain? The supplying industries would like the automobile manufacture to commit themselves to purchasing large quantities with stable volumes with flexible (long-lead) dates. On the manufacture’s side, they need to be flexible to their customers’ need and the change in demands. So what we have is a direct conflict of interest between the suppliers’ and manufactures’ desire for flexibility. We will write a custom essay sample on Designing and Managing the Supply Chain, Chapter 1 Questions or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The ability to optimally match supply and demand is just as much an art and it is a science. Other conflicts arise with transportation of smaller batches versus larger batches of supplies. Usually the smaller and faster a batch of supply is required, the cost of transportation increase; another conflicting objective. e. What are the risks that rare or unexpected events pose to this supply chain? An unexpected risk such as a natural disaster can bring the supply chain to a stand still. However, such events can almost never be managed. There are some challenges such as matching supply and demand risks, lead times, forecasts, transportation times and costs, which can be â€Å"managed† or operational risk management used to minimize risks. 2. Consider a consumer mortgage offered by a bank. f. What are the components of the supply chain for a mortgage? There are several components of the supply chain for a consumer mortgage offered by a bank. First, there are marketing companies that solicit to prospective customers. Secondly, the bank needs to be able to evaluate potential customers by using credit-reporting companies. Thirdly, usually a third party bank that extends the mortgage loans. Lastly, the bank requires mortgage brokers that distribute the loans. g. Is there more than one firm involved in the supply chain? What are the objectives of the firm or firms? Marketing companies try to increase the responses from prospective homebuyers to maximize their returns. The banks try to find customers that are a relatively low risk, on-time payments, and low average maturity date; i. e. , maximize profits. The mortgage broker is all about maximizing his commission of the sell of the property. . What are the similarities between product and service supply chains, what are the differences? Both product and service supply chains provide a need. The difference is the type of service, instead of the physical product†¦ faster, better, cheaper all apply. Some of the differences between the two types of supply chains are as follows: * With the product supply chain there is both the flow of physical and infor mational products. However, in the service supply chain, the product is mostly information. Unlike the service supply chain, inventory and transportation of goods are a major costs of product supply chains. * Since service supply chains usually don’t carry inventory, coordinating capacity with demand is usually more important. * The cost of information is more often higher than in a product supply chain. Consider the cost of a credit report or hiring a consultant. 6. Consider the supply chain for canned peaches sold by a major food-processing company. What are the sources of uncertainty in this supply chain? Some of the sources of uncertainty are as follows: The first factor to consider is the peach crop and the factors that effect it†¦ weather, disease, and disasters. * Number if migrant workers available to harvest the crop†¦ spoilage. * Lead times from field to processing plant†¦ spoilage. * Processing time, storage, and transportation times and costs. * Dem and is not know beforehand. CASE: Meditech Surgical 1. What are Meditech’s problems in introducing new products? In manufacturing ALL products? Meditech has two major issues with introducing new products. * It has poor service levels for new products The inventory levels are higher than necessary for all of its products 2. What is diving these problems, both systematically and organizationally? There are seven major areas in which Meditech is driving these problems: * In the planning system, there are too many built-in delays and monthly buckets. This leads to inefficacies, unneeded delays, and high inventory levels. * There is no tracking of forecasting errors. * Product demand is poorly studied. * The Info Systems used to record and monitor amp; inventory are not integrated and inadequately designed. Because Meditech does not normally see the end-customer, it has to overcome failures of communications with them†¦ hording/panic orders is one example of this failure to c ommunicate with end-customers. * The poor planning system is use magnifies variations in demand. * Panic ordering. 3. Why is the customer service manager the first person to recognize the major issues? He was the person who directly received customer complaints. In his position he was able to determine the scope of the problems. Other managers were not in positions to be aware of customer satisfaction. 4. How would you fix these problems? There are several ways to fix the problems Meditech is facing. The first and most important is improving communications with customers†¦ Five â€Å"Y†Ã¢â‚¬â„¢s. Another way to improve their SCM is to develop better demand forecasting systems and accountability for their forecasts. Furthermore, Meditech needs to integrate, implement, and improve their information systems. They could easily eliminate bulk inventory by putting assembly within the pull system; i. e. , get rid of the â€Å"push-pull† system. Lastly, they could implement a planning system to decrease planning delays (or just use M. S. Project) and reduce system time buckets.