Sunday, January 26, 2020

Online Risks Of Internet Shopping

Online Risks Of Internet Shopping Globalization of the economies in the world has created opportunities for business. As the result of these opportunities, competition or rivalry has increased which means businesses have moved and looked to provide unconventional ways for marketing. One of the unconventional ways in which marketing can be done is through the Internet, this has become such a must have tool for people who wants to do business without limits. Although many businesses are quickly adopting the Internet as the means through which they can efficiently and economically conduct their marketing activities, there are many risks associated with using it. For example, the Internet has very little security and any company using the Internet risks disclosure of proprietary information. However, these are risks affecting companies selling through Internet. But what risks do consumers face or perceive when shopping online? Shopping on internet is poses risks and threat but what do we know about risk perception of consumers or buyers who purchase through this medium? Consumers perceive risks in most store purchase decisions, and the general conclusion from direct-marketing related studies is that consumers associate a higher level of risk with non-store purchase than store purchase decisions (Samadi and Yaghoob-Nejadi, 2009). These questions have not been addressed in the research on Internet marketing. In fact, most of the recent studies have been concentrated in on the pros and cons marketing on the World Wide Web, but none addresses the issues raised here about the consumers concerns in virtual shopping. This study aims to provide not only in-depth review of the types of perceived online risks and its application to internet shopping but also the similarities between businesses and consumers risk perception of online shopping risk, and their influence to purchase intention. BACKGROUND STUDY _ The introduction of Information and Communication Technology (ICT) has changed the way business is done in a so many ways. The use of the web-enabled technologies is still on the rise and this has made it possible to identify new ways and new avenues of doing business. The diffusion of information, the development of new technologies, the promotion and sales of products and services, and the collaboration between those in a supply chain can all be regarded as the benefits of e-Commerce (EC) (defined as The process of buying, selling, or exchanging products and services or information via computer (Turban, Lee, Kung and Chung, 2010, p. 46). The ability to use e-commerce technologies was made possible in late 1970s. During this time, e-commerce meant the execution of commercial transactions electronically with the help of Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). In 1991, the Internet was opened for commercial use and started becoming popular in 1994 (E-Commerce Land, 2004). Subsequently, it took almost four years to develop security protocols like Hypertext Transfer Protocol (https). Amazon was one of the first E-Commerce businesses to establish a secure market. E-commerce may be defined as The process of buying, selling, or exchanging products and services or information via computer (Turban et al, 2010, p. 46). Alternately it may also be defined as All electronically mediated information exchanges between an organisation and its external stake-holders. (Chaffey, Mayer, Johnston, and Ellis-Chadwick, 2000) According to Turban et al (2010) e-commerce applications are a particular kind of web applications with similar requirements like good navigational structures, usable interfaces, a clear domain model, and others. Electronic Commerce is classified roughly into two categories: Business-to-Business Electronic Commerce (B2B) and Business-to-Consumer Electronic Commerce (B2C). B2B is commerce where purchase and sale transactions occur not between individuals but between companies by using the Web and extranets. B2C is commerce where these transactions take place between the consumers and the sellers via the Internet [Lee et al, 2002a]. Individuals can purchase goods and services from retailers electronically through B2C commerce, who in turn can use B2B commerce to link directly to their suppliers. For the purpose of this research I will use B2C category. Online consumer behaviour is a research area with an increasing number of publications per year. Although researchers have made noticeable progress with respect to the scope, quality and quantity of research, there are still significant disagreements about the findings in this area (Samadi and Yaghoob-Nejadi, 2009). One of the most widely accepted consumer behavior theory is how consumers perceived the various risk aspects in various buying conditions. Since Bauer (1967) stimulated marketing researchers to incorporate the concept of perceived risk into the marketing literature, perceived risk has been of great interest to marketing researchers (Cox, 1967; Roselious, 1971; Mitchell and Greatorex, 1999; and Cases, 2003). In fact, shopping online brings together conflict between risk perception and purchase decisions. A variety of previous studies have listed security, privacy, and difficult to judge quality of product as the main concerns of online shoppers (Ainscough and Luckett, 1996; Herbig and Hale, 1997; Liberman and Stashevsky, 2002; Park and Jun, 2003, Cunningham, et al., 2005). There has also been attempts to investigate the perceived risk in Internet usage context (Bhavnagar, Misra and Rao, 2000; Liebermann and Stashevsky, 2002; Lim, 2003). However, the empirical research for online consumers perceived online risk has not been conclusive. It is possible that part of the reason for the limited findings of the previous studies is that consumers risk perceptions from the previous store purchasing environments have not been fully reflected into the current Internet purchasing situation. Festervand, Snyder, and Tsalikis (1986) emphasized on the influence of risk perception from the previous purchase in the different shopping environments. There is no record of studies that has investigated or developed a comprehensive set of consumers perceived online risks both from consumer and business point of view, and examine how they are related to each other or whether the influence of some of these areas may be mediated by others to consumers purchase intention. Thus, if some types of risks are mediated by others, not all risk aspects would relate to consumers purchase intention. Only risk aspects directly associated with shopping behaviors and/or attitudes may relate to consumers purchase decision. In regards to security issues, Black (2005) said, the biggest barrier to e-commerce growth is not technology, but peoples attitude towards it. Consumers are still finding it difficult to trust the online world as an entity. For e-commerce to become a viable market place, the public must trust the internet. The future success of e-commerce will be dependant not only on forging initial trust, but also on developing long-term relationships to facilitate confidence and credibility. This dissertation aims to add to the existing literature (Baseline, 2006, Zuccato, 2007, Damini, Eloff and Eloff, 2009 and Kim, Tao, Shin and Kim, 2009) by looking at how consumer perception of risk in online shopping has impacted on their customers expectations. RESEARCH STRUCTURE _ This looks is a bare bones plan which was drafted at the beginning of the research, it was reviewed at the end of the research. This is a time scale of my dissertation; this has been produced using Microsoft project management and spreadsheet excel applications, a Gantt chart and excel spreadsheet. On the timeline there are following highlighted main activities: Literature Review this will include using previous academic writing to apply to the subject and see how far these source agree/disagree with what has been already done. This section is also broken down into two major sections; Consumers perceived online risk a look into how consumers perceive risks and how this affect their online engagement Business perceptions of consumers perceived online risks this section carries and in-depth analysis of how businesses perceive consumers online threats. Data collections: using the methods mentioned under research methodology, this will entail the techniques and methods used to collect data, there will be secondary data used on business side of research and a mix of both primary and secondary data on consumer point of view. Findings: this simply means, gathering all the data collected and reporting them as they are without doing any analysis. Analysis and Conclusion lastly the thorough analysis of my findings, the quantitative data, conclusion, and recommendations (For more details, please see appendix a excel spreadsheet 1) AIMS AND OBJECTIVES _ Although, e-Commerce has grown and become an important tool for some, there is still reluctance in people in embracing this because of the perceived risk of fear over online shop. The main aim of the study will be to find out how real are the fears in terms of system security, reliability, standards, and security of private financial information, such as disclosing credit cards and personal information for the consumers while shopping online. Below is a list of objectives in bullet points:- Identify the types of perceived online risks and threats from academic point of view (e.g. functional, physical, financial, social and psychological) Identify the concepts of perceived risks and trust in relation to internet shopping Identify the types of security threats in the online shopping environment from consumers point of view Identify [online] businesses perception of consumers perceived online risks and threats Examine whether the identified threats and perceived risks from the businesses are similar to those of the consumers For further clear outline of the objectives in diagram (see appendix 2) ETHICS ISSUES _ So far, there are no threats in regards to ethics problems during my research; I will be using primary data which is will be collected by myself and plenty of secondary data available. The data collected will be treated as confidential; I will deal with data collection and analyzing findings myself. If research findings contradict my developing argument, it will be my responsibility to include undermining facts as opposed to the data collected and change the research objectives. Ethics review form attached. (ethics agreement form is attached at the back on this report, see appendix 3) RESEARCH LIMITATIONS _ The first and foremost limitation of this study will be the honesty and accuracy of information given by research respondents/participants. This can sway or affect the findings and therefore the analysis of the research. There is medium probability of this limitation to exist in this study because of the secondary data which will be used, and that most marketing firm will give money for the participants to take part in surveys. A potential limitation of this study may be time, due to the time constraints especially in the third semester of 2010 Master course. Although the probability of this limitation to exist is minimal because the programme director is looking into find mitigation plans in place. Lastly, a time limitation is also due to the time, the sample population projected involved in this project will be carried out on a small scale around Oxford town centre area. There is enough literature around this subject area and any needed information can be obtained during my research. PERCEIVED ONLINE RISK _ The term perceived online risk means the individual has subjective belief about potentially negative consequence from his/her decision (Kim and Lee, 2008). In other words, perceived is used as opposed to objective outcome distributions of an alternative or a product class with which a consumer is associated with. Davis and Olson (1985) defined risk as a situation where a decision-maker has priority knowledge of the adverse consequence and the occurrence probability. In addition, uncertainty is defined as a situation where a decision-maker knows that possible outcomes for each alternative can be identified; however there is no knowledge of the probability attached to each. In consumer research, risk means a situation where a consumer knows neither the consequences of the alternatives nor the probability of occurrence for the outcome (Dowling, 1986). According to Turban et al (2010) an online shopper will gain benefits in terms of vast selection, screening, reliability, and product comparisons. Additionally, consumers can judge the products relying on either the ratings or reputations of e- retailers or from those who have made a purchase in the online interactive communication environment. Finally, consumers are allowed to compare numerous items under various categories and their prices in order to make the choices among the alternatives or substitutes (Rowley, 2000). On the other hand, the uncertainty regarding system security, reliability, standards, and security of private financial information, such as disclosing credit cards and personal information etc are all reasons which probably increase a certain degree of perceived risk when shopping on the Internet. Ha (2002) points that, the traditional shopping channel, at the cyber shopping environment, perceived risk is defined as the potential for loss in pursuing a desired outcome while engaged in online shopping. Besides, the Internet, just like any type of non-store shopping, makes it difficult to examine physical goods; consumers must rely upon somewhat limited information and pictures shown on the computer screen (Jarvenpaa, Tractinsky and Vitale, 2000). Hence, the performance risk in online shopping tends to increase due to the lack of accurate judge of the product quality compared to the traditional shopping environment (Vijayasarathy and Jones, 2000). As in the real store, this risk is also deemed by Kim and Lennon (2000) to be greatest when the product is technologically complex or the price is high. Additionally, the issue of financial security, invasion of privacy and hacker attacks has become the primary concern of online shopper in the worldwide (Strader and Shaw, 1999). Time risk associated with the operation of online purchases in this study focuses on the perceived lost or cost of time for customers information search activities without excluding the traditional meaning. Overall, the Internet is still considered a risky shopping channel which means a considerable portion of consumers perceives that risks outweigh the advantages of online shopping in their purchase decisions. TYPES OF PERCEIVED ONLINE RISK _ Although compared to traditional shopping channels, it is evident that online shopping is a rather innovative and convenient way, more and more recent researches have pointed out the existing problems to be settled in this constantly changing marketing channel, which make it too risky to purchase through Internet and rely on it. In this channel, individuals have to make decisions of buying products based on limited and static information displayed on the screen such as the picture and price, but cannot inspect and touch the physical goods, they see on the computer screen (Kim, Tao, Shin, Kim, 2009). Moreover, the uncertainty regarding system security, reliability, standards, and security of private financial information, such as disclosing credit cards and personal information etc are all reasons probably increase a certain degree of perceived risk when shopping on the Internet. Several types of risk that consumers perceive can be listed as functional risk, physical risk, financial risk, social risk, and psychological risk (Jacoby and Kaplan, 1972). Roselius (1971) also proposed a slightly different conceptualization of the perceived risk types by identifying the possible losses that a consumer may experience due to a purchasing decision, these are, time loss, hazard loss, ego loss, and money loss. Financial risk is the most common online concern; this type of risk is inter-connected with general security perception of consumers towards the online shop. Tian and Ren (n.d.) point out that, Many online consumers are worry about the security of online payment, and often stop payment somehow during the procedure. It should be understood that most consumers who would terminate their payment procedure are the first time. For experience online consumer, they will have devised an alternative way of making payments such as third party payment or other safe online payment services or cash payment on delivery. Privacy risk is described by Jarvenpaa and Todd (1997) to be the degree to which consumers suffer a loss of privacy owing to personal information collected when shopping online. On the other hand, it can be considered as one type of psychological risk. Previous research by Dholaka (2001) has theorized that psychological risk is the experience of anxiety or discomfort arising from anticipated post- behavioural affective reactions, or worry and regret of purchasing and using the product. Consequently, lack of privacy protecting and private information exposure constantly remaining in the Internet shopping site arouse consumers fear of the purchase. It is notable that the psychological aspect is first proposed as a major perceived risk type. Consumers form perceptions regarding intangible psychic costs in the form of anxiety, frustration, and down time along with tangible financial and performance losses. Thus, the perceived risk can be in psychological/social terms, or in economic/func tional terms, or in some combination of both forms (Taylor, 1974). According to Strader and Shaw (1999), the key risks in the online context are identified to be financial, performance, and privacy risks. Performance risk related to the online sellers post-sale service, good return guarantee for faulty items and product warranty, etc Performance risk can related to the online sellers post-sale service, good return guarantee for faulty items and product warranty, etc. Unlikely on physical shop, consumer buying online product or services have to rely on limited information on their computer screens, There is no physical examination of the product so buyers have rely on the measurements from the seller and pictures. Hence, the performance risk in online shopping tends to increase due to the lack of accurate judge of the product quality compared to the traditional shopping environment (Vijayasarathy and Jones, 2000). As in the real store, this risk is also deemed by Kim and Lennon (2000) to be greatest when the product is technologically complex or the price is high. Kwon (1998) argued another risk factor at cyber-shopping malls is the delivery time gap, or named delivery interval, which is about the gap between the purchase and the delivery. Likewise, consumer easily feels anxious about the time gap between cost and consumption. Another point is, time risk associated with the operation of online purchases in this study focuses on the perceived lost or cost of time for customers information search activities without excluding the traditional meaning. Brooker (1984) has suggested personal risks and non-personal risks. Personal risks are defined as the risks that are related to self-image, self-concept or social evaluation. In addition, Kotler (1984) argued that personal risks are caused by purchasing of personal items that are expensive, purchased infrequently, or socially significant products, such as clothes, accessories, sports equipment, and automobiles. Additionally, the issue of financial security, invasion of privacy and hacker attacks has become the primary concern of online shopper in the worldwide (Strader and Shaw, 1999). Similar to the traditional shopping channel, at the cyber shopping environment, perceived risk is defined as the potential for loss in pursuing a desired outcome while engaged in online shopping. However, the social and physical risks in online commerce have less to do with consumer perceived risk (Ha, 2002). PECEIVED RISK AND TRUST ON INTERNET _ Internet shopping appeared as a new type of shopping method approximately 20years ago, has been getting more attention along with the spread of Internet due to the unbeatable convenience it brought about to the consumers. In addition to convenience, previous researches indicate other attractive factors. The transaction can be held in anyplace accessed to Internet. Furthermore, consumers can buy a wide choice of products across the geographic boundaries while saving time and absence of sales pressure without worrying about the transportation and parking (McQuitty and Peterson, 2000). More importantly, concerning the study of online consumer behaviour, the Internet environment positively affects the consumers decision to shop. Hardin (1992) highlights that trust depends on three different elements: 1) Properties of the individual who want to trust another individual, 2) Attributes of the trustee and 3) The context in which trust is established. All definitions are based on the individuals perception of risk. Both definitions are based on the individuals perception of risk towards a relationship where the outcomes of the relationship are more or less uncertain. Similarly, Bromley and Cummings (1995) viewed trust as an expectation of the trusted individual to be honest and fulfil its promises. The nature and development of trust, has draw the attention from different academic areas, mainly from psychology, sociology, marketing and business theory. From a psychological perspective, similarly, Robinson (1996:576) defined trust as: A persons expectations, assumptions, or beliefs about the likelihood that anothers future actions will be beneficial, favourable, or at least not detrimental to ones interests. Smith and Shao (2007) characterized trust as the undertaking of a risky course of action on the confident expectation that all persons involved in the action will act competently and responsibly. Furthermore, Pearce (1974), on developing a model of interpersonal trust, notes that trust is based on assumptions of others knowledge, competence and motivation. However, those three perspectives perceive trust as one individuals action, rather as an element of a relationship. Moving to the business literature, the concept of trust is again largely based on a relationship approach, and evolves overtime. Swan et al (1989), examining how industrial salespeople gain customers trust, mention that trust has a dynamic nature as it builds over the history of interactions between the trade partners. While Doney and Cannon (1997), suggest that trust is developed under certain processes. According to their research, those are: Calculative process, when one party calculates the costs of failure during the exchange. Prediction process, when one party acquires information to predict about the credibility of the other party. Capability process, based on the perception that one party has that the other has the capabilities to perform as promised. Intentionally process, based on the perception that one party has about the intention of the other. Transference process, based on gaining trust from third parties when little or no prior experience exists between the exchange parties. As previously mentioned, it is logical for consumers to engage in trust relationships, when they feel a level of uncertainty with the outcomes of an exchange, or with the circumstances under which the exchange takes place. During online purchases process that insecurity refers to the use of the Internet, as a commercial medium, or to online sellers reliability. Considering the fact that the increase of trust reduces the perceived risks during an online purchase, and that those risks has proven to be negative towards a purchase decision, we can conclude that trust is a crucial factor for the success of e-commerce or internet shopping. (Jarvenpaa Tractinsky, 1999). Table 2: authors who agree/disagree on what consumers perceptions References Study Focus Agree/Disagrees McQuitty and Peterson, (2000) Conducted a study of risk perceptions associated with home entertainment systems online sales technical complex of product increases perceived risks product risks increases the perceived online risk age does is not a factor in perceiving risk expensive items increases perceived risk Smith and Shao (2007) Conducted a study of risk perceptions associated with financial risks contribute to the perceived perceived risk is higher for feel and touch products Swan et al (1989) Conducted a study of risk perceptions associated with consumer trust /sales increasing experience of online shop reduced perceived online risk Jarvenpaa Tractinsky, (1999) Conducted a study of risk perceptions associated with consumer trust product risks increases the perceived online risk age does is not a factor in perceiving risk expensive items increases perceived risk Internet as a commercial medium poses security concerns such as credit-card fraud by hackers and also concerns about the lack of a predictable legal framework on which online purchases take place (.e. which government laws apply in every situation(Ratnasigham,1998). In addition, lack of social interactions between consumers and e-sellers and the fact that, as with other distance purchases, consumers have to pay in first in order to receive goods or services, increase the risks, therefore increase consumers concerns. According to Culnan and Armstrong (1999), another difficulty faced on e-commerce purchases is that trust has to be communicated solely through interaction with a web site. Lack of trust towards e-commerce sellers has its grounds to security concerns such as fraud by illegal merchants, privacy concerns i.e. using the personal information for commercial purposes, or performance concerns such as receiving low quality products or services. Hoffman et al. (1999) emphasize that the reason many consumers do not proceed to online purchases is that they simply do not trust most of the Web merchants to give their credit card information or personal information. Lack of environmental control exists while consumers have less control of online sellers actions over their bank card information. Lack of control over personal information is very important specifically the concern that online sellers use their personal information for marketing promotional purposes, without their knowledge or permission. The significance of trust can be justified by Keen (2000), who interviewed consumers on the advantages and disadvantages of the e-commerce, trying to identify what factors can add more value to the customers. Examining the results, we can identify that most of the factors are related to the concept of online trust, which sellers ought to convince consumer of security measure to minimise fraud or minimise misuse of personal information, guarantee reliable delivery and make clear information relating to easy return process. To conclude, the e-commerce will offer more value to the consumer, by the time it will improve in terms of security, privacy, and performance, or in other words, by the time it becomes more trustworthy. Table 3: authors who agree/disagree on what consumers perceived risks References Study Focus Agree/Disagrees Ratnasingham (1998) Conducted a study of risk perceptions associated with importance of trust in e-commerce financial risks contribute to the perceived Culnan and Armstrong (1999) Conducted a study of risk perceptions associated with privacy concerns, impersonal trust increasing experience of online shop reduced perceived online risk Hoffman et al. (1999) Conducted a study of risk perceptions associated with information privacy in market place positive online shopping experience reduces consumers perceived risk Keen (2000) Conducted a study of risk perceptions associated with ensuring trust online financial risks contribute to the perceived increasing experience of online shop reduced perceived online risk BUSINESS AND CUSTOMER PERCEPTIONS OF RISK CONSUMERS PERCEPTION OF ONLINE RISK _ Previous researches (Cox and Rich, 1967; Spence et al., 1970; Gillet, 1976 and Korgaonakar, 1982;) related to mode of shopping suggested that perceived risk is affected by what is purchased and how it is purchased. Their studies concluded that consumers perceive more purchasing risk when buying an item by telephone or mail catalog than when buying in a store or from a salesman. Furthermore, the level of perceived risk is related to store selection (Dash et al., 1976; Hirsch, et al., 1976; Korgaonakar, 1982). This is to say, consumers who perceive less purchasing online risk would choose the specialty store, and low social, high economic risk products to the mall and other types of products. Overall, the Internet is still considered a risky shopping place which means a considerable portion of consumers perceive risks outweigh the advantages of online shopping in their purchase decisions. As what Darian (1987) stated, people tend to feel uneasy with faceless retailer, because they are much more familiar with offline shopping rather than the online shopping and fear about the potential deception. Because earlier consumers bought all their services straight from the service provider, research focused mostly on the consumer-provider or business-to-customer (B2C) interaction. So far little research has been dedicated to consumer perceived online risks in electronic services, from late 1990s most studies maintain that consumers perceive largely the same risks in electronic compare to other services. Although internet is new to many ordinary shoppers, it has a great potential for marketing and online sales. Much has been researched before but because higher risks are associated with unknown situations, it is arguable if the online risks studied in earlier research are still similar with present issues being raised regarding online shopping experiences.

Saturday, January 18, 2020

How to Make Enchiladas (Informative Speech)

In a couple of hours it will be time for dinner. If you’re anything like me, you’ll probably stand in the middle of the kitchen or stare at the fridge aimlessly, thinking about what you can come up with tonight. When looking for a delicious, quick and easy dinner†¦ I have a solution for you. Make Enchiladas! They only take about an hour and a half to make, and are something the whole family will enjoy. I’ll tell you how to make Easy Enchiladas and you decide if it makes you hungry or not. Before cooking anything it is always best to wash your hands and any countertops or cutting boards that you will place food on.Some quick preparation that can be done before starting; is thawing out the chicken ahead of time to make cooking time shorter, shred cheese if needed but I like to use the pre shredded cheese, open the Enchilada sauce cans, and pre heat your oven to about 350. All the supplies you will need are pretty inexpensive. My recipe makes about twenty enchi ladas. The food items you will need are: 5 Boneless skinless chicken breasts, 2 cans of La Victoria enchilada sauce, one bag of any medium cheddar cheese (about 8 cups if shredding by hand) and twenty corn tortillas.Utensils needed are a big pot to boil the chicken in, a strainer, two bowls (one big and one small), can opener, big spoon, and a baking pan to fit the enchiladas in. Once you have all the supplies and prep done, now you are ready to start making the enchilada filling. First you will want to fill your big pot about three quarters of the way full with water and bring it to a boil. When the water starts to boil you can add the chicken breast. Be careful because the pot and water are extremely hot and may splash back up at you.You will want to let the chicken boil for about fourty-five minutes to one hour. I check if the chicken is cooked all the way through by cutting a breast in half and making sure there is no pink in the meat. When the chicken is done, you will want to strain the water from the chicken (being cautious again from the steam coming off the chicken and out of the pot, VERY HOT! I have burned myself many times straining chicken. ) Let your chicken cool down for about fifteen minutes to make it easier to handle. Once it’s cool to touch, you can then hand shred it.Basically just take a piece and start pulling it a part into bite size strands. Put it in a big bowl and add one and a third of cans of the Enchilada sauce to your chicken and mix. Your filling is now done. Next you will want to wrap twenty corn tortillas in a cloth and microwave for two to two and a half minutes (just until they are soft). You can now put the rest of the leftover enchilada sauce into the small bowl for tortilla dipping. Dip a tortilla into the sauce and make sure it has a good amount all over. This is done to give the tortillas that enchilada kick.Set your tortilla down in the baking pan and put a spoon full of the Enchilada filling on top along with a pinch of cheese. Roll up the enchilada as you would a taco or a burrito. Repeat dipping, adding chicken and cheese, and rolling of enchiladas; placing the enchiladas side by side, until the whole baking pan is full. Now for the best part! Add as much cheese to the top of the enchiladas as you’d like. (I usually add a smaller layer over the whole thing). Crank your oven up to 375-400 and put the enchiladas (uncovered) in.Watch them carefully because some cheese melts faster than others. Leave them in the oven for about 15 minutes. Just depending on when the cheese starts to melt or turn golden brown. You can now take your enchiladas out and let them cool down because they should be pretty hot. Serve them to your family and watch them enjoy. This is a quick and easy recipe that I have adapted from my grandmas recipe, to make it an Easy enchilada dinner. I hope that you now will go home and try making them yourself, their pretty good! Thank you for your time.

Friday, January 10, 2020

Jean Watson’s Theory of Transpersonal Caring Essay

Who is Jean Watson and what is her contribution to the nursing profession? Jean Watson is a Distinguished Professor of Nursing and holds the Murchinson-Scoville Endowed Chair in Caring Science at the University of Colorado, Denver College of Nursing and Anschutz Medical Center Campus. She earned undergraduate and graduate degrees in nursing and psychiatric-mental health nursing, and a Ph.D. in educational psychology and counseling. She has received several national and international honors and honorary doctoral degrees. She is a Fellow of the American Academy of Nursing and is Founder and Director of the Watson Caring Science Institute in Boulder, Colorado (www.watsoncaringscience.org a non-profit foundation established to further the work of Caring Science in the world. Dr. Watson has published numerous works on her philosophy and theory of human caring. Her theory is used to guide transformative models of caring and healing practices around the world (Cara 2003). This paper will ex plore the elements of Jean Watson’s theory of caring. It will explain how her theory can be applied in the clinical setting, and how it has impacted the nursing profession and influenced healthcare. Nurses define caring in various ways depending on their level of education, professional experience, personal values and professional focus. The concept of caring is central to the nursing profession. As Jean Watson proposed, regardless of their specialty area, nurses have awareness of the interconnectedness of all beings and share the common goal in supporting healing from both scientific and philosophical perspectives. This goal is referred to as the caring-healing consciousness (Sitzman, 2007 p. 9). Jean Watson’s theory of Transpersonal Caring (or Theory of Human Caring) was originally developed in 1979 but has continued to evolve over the years. The three major conceptual elements are: 1) transpersonal  caring relationships 2) ten carative factors 3) caring occasion/caring moment. Through a transpersonal caring relationship, nurses help patients to achieve a higher degree of harmony within the mind, body, and soul. Transpersonal reaches beyond one’s ego and the present moment, and allows one to connect spiritually and promote patient comfort and healing. The transpersonal caring relationship depends on the nurse’s moral commitment in protecting human dignity and the nurse’s caring consciousness in preserving and honoring the embodied spirit. This caring consciousness is essential for the mutual relationship between nurse and patient (Cara 2003). â€Å"The goal of a transpersonal caring relationship corresponds to protecting, enhancing, and preserving the person’s dignity, humanity, wholeness, and inner harmony† (Cara, 2003, p. 53). The ten carative factors developed by Watson in 1979 serve as a guide for the core of nursing. These factors later evolved into ten clinical â€Å"caritas† (meaning to cherish and give special loving attention) processes. While acknowledging medicine’s curative factors and nursing’s legitimate place in that process, Watson’s theory identifies nursing’s carative orientation in healthcare (Sitzman, 2007 p. 9). The ten carative factors are comprised of ten elements: * Formation of a Humanistic-altruistic system of values * Instillation of faith-hope * Cultivation of sensitivity to self and others * Development of a helping-trusting, human caring relationship * Promotion and acceptance of the expression of positive and negative feelings and emotions * Creative, individualized problem-solving caring process * Promotion of transpersonal teaching-learning * Provision for a supportive, protective, and/or corrective mental, physical, societal, and spiritual environments * Assistance with gratification of basic human needs while preserving human dignity and wholeness * The allowance for existential-phenomenological-spiritual forces of caring and healing Watson believes these carative factors are a guide to promoting harmony and dignity into relationships, and provide a structure in understanding nursing as the science of caring (Ryan, 2005). According to Watson, â€Å"a caring occasion occurs whenever the nurse and  another come together with their unique life histories and phenomenal fields in a human-to-human transaction† (Watson, 2010). Jean Watson’s ten clinical caritas were developed to describe fully engaged nursing practice and can be applied to any specialty area or during any nursing activity, or during any verbal exchanges between nurse and patient. As discussed in Ryan (2005), Jean Watson’s theory is being used by nurse recruiters in the selection processes of nursing staff. They inform potential candidates that their facility’s practice is based upon her theory of caring. The interview process may require a candidate to describe a caring moment from their past, and based upon their response, recruiters select candidates who best fit within the nursing culture of caring In addition, job descriptions now state that nurses must be competent in both technological skills and in the carative factors of the caring theory. Moreover, the clinical ladder process has integrated Watson’s theory by requiring the candidate applying for advancement to share a story from their professional pract ice that demonstrates how they positively influenced a patient outcome, and then identify and discuss the carative factors discussed in their story. Educational offerings which previously focused on the physical nature of a medical condition are now focusing on the holistic nursing model instead of the disease-focused medical model. Clinical information system coordinators have revised computerized documentation screens to reflect theory-based nursing practice. Nursing diagnoses and interventions have become linked with the carative factors. Watson discusses the impact of her theory on nursing practice in â€Å"From Theory to Practice: Caring Science According to Watson and Brewer.† In this interview, she states that the increase in frequency and number of Magnet hospital’s use of caring theory is evidence of its impact on nursing. As a result of caritas nursing models, nurses honor their commitment to society and humanity to offer compassionate human caring. In addition to the initiatives of Magnet hospitals, developments in caring-theory guided practices are evident through the gatherings of the International Cari tas Consortium (ICC). The ICC is an invited network of hospitals, educational program representatives, and individuals who are committed to expanding and implementing caring theory/ caritas nursing. As Watson states, â€Å"These individuals explore and experiement in deepening the practices of the human dimensions of caring-healing, returning to  heart-centered-loving practices† (Clarke, Watson, & Brewer 2009, p.340). Hospitals who are dedicated to implementing the caring theory and healing models sponsor these gatherings. Jean Watson states in her interview with Jacqueline Fawcett, RN; PhD; FAAN, (Fawcett 2002) that the value of the human caring theory is a foundational ethic and philosophy for any health professional. She states â€Å"the core of the human caring theory is about human caring relationships and the deeply human experiences of life itself, not just health-illness phenomena, as traditionally defined within medicine† (p. 215). She goes on to state that â€Å"nurses and nursing working from a human caring philosophy bring a different consciousness and energy of wholeness to any setting, offering a counterpoint to the medicalizing-clinicalizing of human experiences in the conventional institutional industrial models of practice† (p. 216). In Fawcetts’s interview, Dr. Watson goes on to say that even though nursing is multiparadigmatic, â€Å"caring can and still must be honored as a core value, knowledge development and practices related to healing and wholeness† (p 216). She believes her theory of transpersonal caring is moving toward a unitary-transformative paradigm, bringing in consciousness, intentionality, energy, evolution, transcendence process, relativity, and things that transcend our conventional medical and modern conventional science models and thereby, more clearly seeing the intersection between arts and humanities and science. In conclusion, Jean Watson’s Theory of Transpersonal Caring provides a foundational philosophy for health professionals. As Watson states â€Å"The core of the human caring theory is about human caring relationships and the deeply human experiences of life itself, not just health-illness phenomena, as traditionally defined within medicine† (Fawcett 2002, p. 215). Jean Watson’s theory affirms, guides and solidifies nursing practice. References Cara, C. (2003). A pragmatic view of Jean Watson’s caring theory. International Journal for Human Caring, 7(3), 51-61. Retrieved from http://web.ebscohost.com.ezproxy.gardner-webb.edu Clarke, P., Watson, J., & Brewer, B. (2009). From theory to practice: Caring science according to Watson and Brewer. Nursing Science Quarterly, 22(4). doi: 10.1177/0894318409344769 Fawcett, J. (2002). The Nurse theorists: 21st-Century updates. Nursing Science Quarterly, 15(3), 214-219. doi: 10.1177/089431840201500307 George, J.B. (2002). Nursing theories the base for professional nursing practice (5th ed.). Upper Saddle River, NJ: Pearson Education, Inc. Ryan, L. (2005). The journey to integrate Watson’s caring theory with clinical practice. International Journal for Human Caring, 9(3), 26-30. Retrieved from http://web.ebscohost.com.ezproxy.gardner-webb.edu Sitzman, K. (2007). Teaching-learning professional caring based on Jean Watson’s Theory of Human Caring. International Journal for Human Caring, 11(4), 8-16. Retrieved from http://web.ebscohost.com.ezproxy.gardner-webb.edu Watson, J. (2010). Watson’s Caring Science Institute website. Retrieved from www. watsoncaringscience.org/j_watson/index.html

Thursday, January 2, 2020

General John Black Jack Pershing World War I

John J. Pershing (born September 13, 1860, in Laclede, MO)  steadily progressed up through the ranks of the military to become  the decorated leader of US forces in Europe during World War I. He was the first to rank as General of the Armies of United States. Pershing died at Walter Reed Army Hospital on July 15, 1948. Early Life John J. Pershing was the son of John F. and Ann E. Pershing. In 1865, John J. was enrolled in a local select school for intelligent youth and later continued on to secondary school. Upon graduation in 1878, Pershing began teaching at a school for African American youth in Prairie Mound. Between 1880-1882, he continued his education at the State Normal School during summers. Though only marginally interested in the military, in 1882, at the age of 21, he applied to West Point after hearing that it provided an elite college level education. Ranks Awards During Pershings long military career he steadily progressed up through the ranks. His dates of rank were: Second Lieutenant (8/1886), First Lieutenant (10/1895), Captain (6/1901), Brigadier General (9/1906), Major General (5/1916), General (10/1917), and General of the Armies (9/1919). From the US Army, Pershing received the Distinguished Service Cross and Distinguished Service Medal as well as campaign medals for World War I, Indian Wars, Spanish-American War, Cuban Occupation, Philippines Service, and Mexican Service. In addition, he received twenty-two awards and decorations from foreign nations. Early Military Career Graduating from West Point in 1886, Pershing was assigned to the 6th Cavalry at Fort Bayard, NM. During his time with the 6th Cavalry, he was cited for bravery and participated in several campaigns against the Apache and Sioux. In 1891, he was ordered to the University of Nebraska to serve as an instructor of military tactics. While at NU, he attended law school, graduating in 1893. After four years, he was promoted to first lieutenant and transferred to the 10th Cavalry. While with the 10th Cavalry, one of the first Buffalo Soldier regiments, Pershing became an advocate of African American troops. In 1897, Pershing returned to West Point to teach tactics. It was here that cadets, who were angered by his strict discipline, began calling him Nigger Jack in reference to his time with the 10th Cavalry. This was later relaxed to Black Jack, which became Pershings nickname. With the outbreak of the Spanish-American War, Pershing was brevetted to major and returned to the 10th Cavalry as the regimental quartermaster. Arriving in Cuba, Pershing fought with distinction at Kettle and San Juan Hills and was cited for gallantry. The following March, Pershing was struck down with malaria and returned to the US. His time at home was brief as, after he recovered, he was dispatched to the Philippines to aid in putting down the Filipino insurrection. Arriving in August 1899, Pershing was assigned to the Department of Mindanao. Over the next three years, he was recognized as a brave combat leader and an able administrator. In 1901, his brevet commission was revoked and he returned to the rank of captain. While in the Philippines he served as the adjutant general of the department as well as with the 1st and 15th Cavalries. Personal Life After returning from the Philippines in 1903, Pershing met Helen Frances Warren, the daughter of powerful Wyoming Senator Francis Warren. The two were married on January 26, 1905, and had four children, three daughters and a son. In August 1915, while serving at Fort Bliss in Texas, Pershing was alerted to a fire at his familys home at the Presidio of San Francisco. In the blaze, his wife and three daughters died of smoke inhalation. The only one to escape the fire was his  six-year-old  son, Warren. Pershing never remarried. A Shocking Promotion a Chase in the Desert Returning home in 1903 as a 43-year old captain, Pershing was assigned to the Southwest Army Division. In 1905, President Theodore Roosevelt mentioned Pershing during remarks to Congress about the armys promotion system. He argued that it should be possible to reward an able officers service through promotion. These remarks were ignored by the establishment, and Roosevelt, who could only nominate officers for general rank, was unable to promote Pershing. In the meantime, Pershing attended the Army War College and served as an observer during the Russo-Japanese War. In September 1906, Roosevelt shocked the army by promoting five junior officers, Pershing included, directly to brigadier general. Jumping over 800 senior officers, Pershing was accused of having his father-in-law pull political strings in his favor. Following his promotion, Pershing returned to the Philippines for two years before being assigned to Fort Bliss, TX. While commanding the 8th Brigade, Pershing was dispatched south to Mexico to deal with Mexican Revolutionary Pancho Villa. Operating in 1916 and 1917, the Punitive Expedition failed to catch Villa but did pioneer the use of trucks and aircraft. World War I With the US entry into World War I in April 1917, President Woodrow Wilson selected Pershing to lead the American Expeditionary Force to Europe. Promoted to general, Pershing arrived in England on June 7, 1917. Upon landing, Pershing immediately began advocating for the formation of a US Army in Europe, rather than allowing American troops to be dispersed under British and French command. As American forces began arriving in France, Pershing oversaw their training and integration into the Allied lines. US forces first saw heavy combat in the spring/summer of 1918, in response to the German Spring Offensives. Fighting valiantly at Chateau Thierry and Belleau Wood, US forces aided in stopping the German advance. By late summer, the US First Army was formed and successfully executed its first major operation, the reduction of the Saint-Mihiel salient, on September 12-19, 1918. With the activation of the US Second Army, Pershing turned over direct command of the First Army to Lt. Gen. Hunter Liggett. In late September, Pershing led the AEF during the final Meuse-Argonne Offensive which broke the German lines and led to the end of the war on November 11. By wars end, Pershings command had grown to 1.8 million men. The success of American troops during World War I was largely credited to Pershings leadership and he returned to the US as a hero. Late Career To honor Pershings achievements, Congress authorized the creation of the new rank of General of the Armies of United States and promoted him to it in 1919. The only living general to hold this rank, Pershing wore four gold stars as his insignia. In 1944, following the creation of the five-star rank of General of the Army, the War Department stated that Pershing was still to be considered the US Armys senior officer. In 1920, a movement emerged to nominate Pershing for President of the United States. Flattered, Pershing refused to campaign but stated that if nominated he would serve. A Republican, his campaign petered out as many in the party saw him as too closely identified with Wilsons Democratic policies. The next year, he became chief of staff of the US Army. Serving for three years, he designed a forerunner of the Interstate Highway System before retiring from active service in 1924. For the remainder of his life, Pershing was a private person. After completing his Pulitzer Prize-winning (1932) memoirs,  My Experiences in the World War, Pershing became a staunch supporter of aiding Britain during the early days of  World War II. General Pershing gives a speech in 1936. National Archives After seeing the Allies triumph over Germany a second time, Pershing died at Walter Reed Army Hospital on July 15, 1948. Selected Sources National Park Service: John J. PershingUS Army Center for Military History: John J. PershingArlington National Cemetery: John J. Pershing