Monday, December 30, 2019

Pulp and Paper Industry - Free Essay Example

Sample details Pages: 3 Words: 920 Downloads: 7 Date added: 2017/09/16 Category Advertising Essay Did you like this example? Michael Porter’s â€Å"Five Forces† Model Summary and interpretation by Prof. Tony Lima February 25, 2006 Figure 1: Porter’s Five Forces From Michael Porter, Competitive Advantage, Simon Schuster, New York, 1985, p. 5 Prof. Don’t waste time! Our writers will create an original "Pulp and Paper Industry" essay for you Create order Michael Porter teaches at the Harvard Business School. He has identified five forces that determine the state of competitiveness in a market. The forces also influence the profitability of firms already in the industry. These five forces are summarized in the above diagram. The fifth force is the degree of rivalry that currently exists among firms already in the industry. ) Here are a few additional details about Porter’s model. 1 1. Barriers to Entry Economies of scale mean larger firms can produce at lower cost per unit. This tends to lower the number of firms in the industry and reduce competition. Proprietary product differences are the characteristics that make a product appeal to a large market segment. But only those characteristics that cannot be copied at low cost by competitors (â€Å"proprietary†) will be a barrier to entry. Brand identity is the extent to which buyers take the brand name into account when making purchase decisions. Capital requirements are the total cost of acquiring the plant and equipment necessary to begin operating in the industry. 1 This material is a summary drawn from Porter’s Competitive Advantage (1985). The material in question is on pages 5 – 8. 1 â€Å"Porter’s Five Forces† by Prof. Lima February 25, 2006 2. Bargaining Power of Suppliers Differentiation of inputs means that different suppliers provide different input characteristics for inputs that basically do the same job. The greater the degrees of differentiation among suppliers the more bargaining power suppliers have. Presence [and availability] of substitute inputs means the extent to which it is possible to switch to another supplier for an input (or a close substitute). The greater the number and closeness of substitute inputs the lower the bargaining power of suppliers. Supplier concentration is the degree of competition among suppliers. Usually the more concentrated the industry, the fewer suppliers and the more control suppliers have over the prices they charge. Greater supplier concentration often means greater supplier bargaining power. Cost relative to total purchases in the industry refers to the amount your firm spends on inputs from a particular supplier compared to the total revenue of all firms in the supplier’s industry. Lower expenditure usually implies more bargaining power for the supplier. The buyer’s bargaining power falls as spending with a particular firm falls simply because the buyer’s business isn’t as important to the supplier. . Threat of Substitutes Relative price performance of substitutes is the price of substitutes for your output compared to the price you are charging. If the price of substitutes is lower, the competitive threat increases as the price differential increases. Switching costs refers to the cost to the buyer of switching from one seller to another. The greater the switching costs the lower the threat of substitutes because buyers have a stronger incentive to stick with a sin gle supplier. Buyer propensity to substitute is the extent to which buyers are willing to consider other suppliers. 4. Bargaining Power of Buyers Buyer concentration versus firm concentration refers to the extent of concentration in the buyer’s industry compared to the extent of concentration in your industry. The more concentrated the buyer’s industry relative to your industry the greater the bargaining power of buyers. Buyer volume is the number of units of your product the buyer purchases from all sources. The greater buyer volume compared to the quantity purchased from you, the greater the bargaining power of buyers. Buyer information is the state of information buyers have about your industry. The more information buyers have about your industry the more bargaining power buyers have. Substitute products means the number and closeness of substitutes available for your product. The greater the number of available substitutes the more bargaining power buyers have. 2 â€Å"Porter’s Five Forces† by Prof. Lima February 25, 2006 Price of your product relative to total expenditures on all products. This is the fraction of total expenditure buyers spend on your products. The greater the fraction of total expenditure the greater the price elasticity of demand and the more bargaining power buyers have. Product differences refers to the degree of differentiation between your product and other products in the market. The greater the differentiation of your product, the lower its price elasticity of demand and the less bargaining power buyers have. Brand identity is the extent to which your brand name is recognized and sought out by buyers. The stronger your brand identity the less bargaining power buyers have. 5. Rivalry Determinants [with other firms in the industry] Industry growth is the speed at which the market is growing. Rapidly growing markets provide less incentive for firms to aggressively compete with each other. Intermittent overcapacity is the amount demand fluctuates during a year (or over a business cycle) and the impact lower demand has on how efficiently the firm is able to use its plant and equipment. In some industries a decrease in demand leads to significant idle productive capacity, while other industries are not as susceptible to this factor. More intense rivalry is likely to be fostered in an industry in which firms face either large amounts of unused plant capacity or face frequent idle capacity. Concentration and balance is the number of firms in the industry and their relative size. An industry in which a few firms supply most of the output is likely to not be very competitive because the large firms will control the market. 3

Sunday, December 22, 2019

Logistics Activities of Order Management and Customer Service Term Paper

Essays on Logistics Activities of Order Management and Customer Service Term Paper The paper "Logistics Activities of Order Management and Customer Service" is a brilliant example of coursework on management. Retailing, believed to be one of the largest sectors in the global economy, is experiencing a transition in Australia not being an exception. Traditional retailers have always tried to redefine themselves through the introduction of value-added services such as home delivery and credit. The growth in retailing has however been restricted basically to the urban market in Australia. The reasons for these are that the modern retailer in the urban market is yet to feel the saturation effect thus viewing other markets with less seriousness. Also, despite its cost-effectiveness, modern retailing trends have come to be closely associated with lifestyle. The retailers would have to identify with different lifestyles so as to appeal to all classes of society. This can thus lead to one assuming that the retailing revolution is emerging as per the economic revolution of society (Minis et al. 2010).Retailers, once seen as â€Å"downstream resellers of products†, are mostly seen as intermediaries in the manufacturers’ distribution channels, whose role is to only ensure a smooth flow of goods and services between the suppliers and the consumers. Today, retailers are indeed no longer seen as an appendix of the consumer’s supply chain but rather comprise of an independent market mainly looked up to by a large group of consumers for whom they buy (McKinnon 1989). They not only provide a readily identifiable location for consumers to make their transactions when acquiring goods and services but also provide support services of various kinds to the consumers. In fact, retailing is a significantly important economic activity that links production and consumption while affecting most of the population. According to the Financial Times (2006), retailing has been identified as the world’s eight-biggest sector of the economy (Jones, Nicolas, Carla 2007).Over the last decade, consumer awareness has increased regarding the price and quality of the products and/or services they expect. This is due to the increased literacy of Australian consumers and exposure to other developed nations through the current technological advancements. These days, consumers are more interested and are keen on the quality of the products and services they expect from the market. They have even become more and more vocal about it. It is due to this awareness that consumers always seek to identify more reliable sources for purchases. The consumers also seek to purchase their products and services from those places where their feedbacks are more valued (Sands 2008).  In order to earn customer loyalty, retailers mainly focus on providing their customers with the best quality products and services with value and innovation. Retailers thus need to be aware of the key retail trends influencing the market in recent times and in the future.

Saturday, December 14, 2019

Network security and business Free Essays

Company X is reputed to be the world’s leading manufacturer and supplier of sportswear (sports shoes and vestments) and sports equipments with its headquarters situated in Oregon, Portland metropolitan area. The company presently accrued 16 billion US dollar worth excess revenue in 2007 only. In the year 2008, that company is credited to have recruited 30,000 employees globally, while at the same time maintaining its status as the sole grand crown holder of the Fortune 500 title as far the state of Oregon is concerned. We will write a custom essay sample on Network security and business or any similar topic only for you Order Now In this essay, the vulnerabilities experienced by the company shall be looked at in respect to network security which entails working towards the protection of information that is passed o0r stored through or within the computer. The company was founded in 1964 and then later re branded in 1978. The company is so well established that it does not only sell its products under its own company name, but it also does so through its subsidiaries. In addition to this, company X also owns other sports companies. In an effort to realize expansion, company X extended its services to run retail stores under its name. As a result of this, the company X has approximately 19,000 retail departments in the US alone. In the same vein, the company sells its products to about 140 countries globally. The company has been traditionally sponsoring sportsmen and women around the globe and has very distinct logo and slogans. The slogans used by this company unlike those of the fellow competitors, made it to the top five slogans of the 20th century, and was accredited for this by the Smithsonian Institution. In 1980, company X had hit the 50% market share mark in the the United States, being only 16 years old. The most recent type of inventions by this company involves the production of new models of cricket shoes which in comparison to their competitors, are 30% lighter (Bernstein, 1996). The company seeks to maintain its vibrant market and maintains its upper hand against its competitors by producing products that are appealing to the tastes of the materialistic youth. The sports wear company produces and sells assortments used in sundry and diverse world of sports sch as basket ball, athletics, golf, American football (rugby), tennis, wrestling, skating, football and skate boarding, among others. The company X having become a global entity, also faces many problems that come with expansionism. The troubles touch on cases of workers’ rights in relation to the occupation safety and health matters. These cases are more distributed in the developing economies than in developed ones. Conversely, there are also issues about social responsibility that border on the environmental safety in relation to the production processes and wastes produced by the company. The problem also stretches to its outsourcing vendors, who together with the company have been challenged by critics to work towards carbon neutrality. Critics have also dismissed as lies the claim by the company that it increased the salary scale of its workers by 95%. These critics posit that the company seeks to always exploit its workers, of whom 58% are young adults aged between 22- 24 years, while 83% of the workers are women. Half of these workers in these companies are said   to have gone through their high school educational programs.   Because few of these people have work related skills, critics maintain, the subsidiaries of company X are reported to be using this state of affairs to exploit their employees by issuing them very minimal wages (Mc Nab, 2004). Again, it is reported that out of company X’s contract factories, 20% deal in the casual production of of the products. These factories are always bedeviled by cases of harassment and abuse (of which the company has moved in to sort out the situation by liaising with the Global Alliance in order to review the first twenty one of the most notorious factories. The company also set up the prescribed code of conduct so as to inculcate social responsibility among the workers. Spates of continual human rights abuse nevertheless continued to persist. In Indonesia for example, 30.2% of the workers of company X are reported to have been victims of exploitation. 56% of these workers are said to have undergone verbal abuse. In about the same spectrum, 7.8% are reported to have succumbed to unwanted sexual comments, while 3.3% are said to have been abused physically. In Pakistan, the matter deteriorated to cases of child abuse and the conscription of child labor. For instance, in the same country, the issue came to the global attention when pictures were displayed, portraying children knitting football which were to be then sold by this company. Another matter that haunts this company X is the protection of information, or commonly called by the corporate world and the computer science and management as network security. Of recent developments, concerns over privacy have soared, and become subject to public furore and debates when it was found out by security experts after conducting a research in the University of Washington, that company X’s iPod sport kit had the ability to track people . Initially, the surveillance system that works through the company’s iPod sports kit had been designed to allow the user (mainly the sports person) of this facility to take note of the calories that have been burned, the speed, the distance covered and the time dispensed when undertaking sports activities. The kit was fitted with a transmitter that was designed to be stuck on the shoes and the iPod’s transmitter. The tracking is made possible by the fact that the transmitter relays particular ID. Although the problem first seemed minuscule due to the fact that the information could only be accessed from a 60 feet away shoe, yet it was found out later that more problems, it seemed would set in since the surveillance or tracking system was then fed to the Google maps (Sloot, 2003). In order to bring in ameliorations in this matter, comprehensive laws are being proposed so that company X and its counterparts who use these systems can be forced to beef up security into the models- a measure which these companies are ignoring. Some related speculations are also rife that the company’s retailing contractors   are using the RFID tags for tracking their consignments and keeping track of the stock market. This problem is hydra headed since apart from the obvious fact that this may scare away potential customers, it still has exposed the company to anti company X campaigns which have widely been   activated and managed by the Caspian organization in the US. Customers will shy away from the products since the communication system of the company X seems to have been compromised in its CIA (confidentiality, integrity and availability) of information security. Confidentiality portends that only the permitted authorities access information, while integrity ensures that information stays only within the precincts of the authorized handlers. Availability on the other hand demands that those who are authorized access information are be able to so do efficiently and quickly. The external leaking in and out of confidential information can be very costly and should always be avoided Company X is working out to ameliorate this problem. On 5th March 2008, in Oregon, it held a meeting in which the departmental heads and subsidiary representatives met, and analyzed the extent of the vulnerability (they had already come into the board meeting, having known the nature, and the extent of the risk). As an immediate contingency, company X decided that it was going to suspend the sale of the iPod transmitters as a measure to instill risk avoidance. Having also become aware that there was also the danger of information systems being invaded by hackers, (as was seen in the 31st July, 2007 when in Pakistan tens of its computers succumbed), consensus was arrived at that all computer systems in the organizations adopt the man- in- between technique by adopting the firewall computer security system that will be able to detect the nature of the on coming information. On another front, the company X agreed that it was to globally look at its wireless networking: the technology that the supports the connectivity of each computer to a specific network or networks. This does not portend coming up with a new system of networking, but bolstering the configurations and the security systems. New and stronger RAMs( Random Access Memory ) were bought and have already been set in place.   This will ensure that the roiter system within the company’s area of jurisdictions are very strong and very fast in detecting anomalies (Raquet and Saxe, 2005). The computer technicians in company X suggested that the leaking of the company’s secret information could be due to the fact that the computer connectivity in Pakistan could have been in the open mode configuration. These technicians elaborated that open computer mode connectivity allows anyone even without the building to access information from an open mode configured computer. The situations becomes more vulnerable in the present day due to the portability of the computers (laptops and palm tops). Open mode wireless computers have a preset name that makes the computer to, on being turned on, start broadcasting packets which prompt all wireless devices within the precincts about the availability of connectivity (Albanese and Sonnenreich, 2003). However, should the computers be switched on to closed configuration, the beacon packets are no longer broadcasted by the access point. It was also discovered that although the headquarters were already filtered, yet not all of the subsidiaries were. It is an this backdrop that the computer technicians under the aegis of the company’s information and technology department recommended that the Wireless Encryption Protocol (WEP)   be introduced to ward off even the most sophisticated hackers. Wireless Encryption Protocol ensure that the data that is being relayed is not in the readable format, but instead, it becomes only readable after being decoded in a backward manner on being received. This leaves the data unreadable on being captured in between transition since the data is still encoded. The hacker is frustrated unless in possession of the knowledge about the   original address. Conclusion. As a concept, network security is very important in the realization of a company’s secret information. Good and comprehensive network security keeps secret information from flowing outwards to unwanted parties, while at the same time, enabling efficient flow of information within an enterprise. The systems of communication ( the hardware, the software and the orgware ) is also adequately protected. Company X would accrue higher returns if it enhanced all of its network security systems within its disposal. References. Albanese, J. and Sonnenreich, W. (2003). Illustrations on network security. US: Mc Graw Hill. Bernstein, T. (1996). Internet security designed for business. US: Wiley. Mc Nab, C. (2004). Assessment of network security. US: O’ Rielley. Raquet, C. and Saxe, W. (2005). Advocacy and governance of business network security. US: Cisco Press. Sloot, P. (2003). International conference of computational science. How to cite Network security and business, Essay examples

Thursday, December 5, 2019

Strength Based Nursing Care For Emma †MyAssignmenthelp.com

Question: Discuss about the Strength Based Nursing Care For Emma. Answer: Introduction (Overview of Emmas journey): The report focuses on a strength based nursing care (SBNC) plan for Emma Gee, a 24 year old girl who was vibrant young children with active lifestyle in childhood. However, her life changed all of a sudden when she started experiencing disturbing symptoms and was diagnosed with stroke. There were several transition points in her life associated with great challenges and sufferings at those point of life such as revelation about the diagnosis of stroke, going for the surgery and remaining coma, the life after regaining consciousness and struggling with activities of daily living after stroke (Gee 2016). This report mainly focuses on the transition point of nursing care following Emma regaining consciousness after coma and analyzes the usual care provided to her. Based on evaluating experience of Emma in that period, a SBNC plan is developed for Emma to promote her empowerment by following eight principles of SBNC. Overview of implementing strength based nursing care for Emma The strength based nursing care (SBNC) is an innovative approach to care that emphasizes on a new set of values to promote empowerment, self-efficacy and hope in patients. Unlike the medical model of care which is focused on treating the disease and not the person, the SBNC model is similar to patient centered care model where focus is on healing of patient (Gottlieb, Gottlieb and Shamian 2012, pp. 38-50). In case of patient-centered care, healing occurs within the relationship between staffs and the participant, and the SBN focus on creating an environment that enhances the patients capacity for health and innate mechanism of healing (Gottlieb 2014, pp.24-32). Unfortunately, all the above elements were missing in the usual care provided to Emma after coma. The use of SBNC care plan is important for Emma during the transition point of Emma regaining consciousness after coma because in the usual care provided to her, the specific needs of Emma and her strength was not considered for c are planning. For example, just after she regained consciousness, she wanted the medical team to talk to her, however they were in a conversation among themselves. The review of the usual care revealed no action to identify what treatment of care option is working well or it will work best for Emma. With the use of SBNC, the main plan is to work with strength of Emma to overcome her problems and deficits. The strategies followed to implement SBNC for managing her care after regaining consciousness will focus on the principle of holistic personalized care, empowerment of patient, family/person centered care, context based care, collaborative partnership and self-care (Gottlieb, Gottlieb and Shamian 2012, pp. 38-50). After regaining consciousness after coma, Emma relied mainly on medical staffs for her daily life activities like cleaning, washing, feeding and rolling. She always felt like poked and prodded and missed seeing the familiar faces like her family members in front of her. She failed to communicate with her family member after the black mask on her mouth. To implement SBNC for Emma, the immediate strategy is to engage in a therapeutic communication with Emma first to identify her strength and weakness and then develop care plan for her. The nursing behaviors like active listening, assessing patients understanding and preference of treatment option, validating their participation in decision making and communicating with empathy (both verbally and non verbally) is likely to enhance patient centered communication while caring for (Emma Elwyn et al. 2014, pp.270-275). While providing her support in daily life activities, all considerations will be made to respect her dignity and find out E mmas preferences in receiving support. In addition, including family members in care planning will be very crucial as they can give lot of information about strength and coping skills of Emma. Based on family strength assessment, their family member can also be involved in care so that Emma does not feel intimidated and develops the positive motivation to accept the treatment and this approach would accelerate her pathway towards recovery and healing (Smith, Swallow and Coyne 2015, pp.143-159). Family functioning and relationship in nursing practice As it is planned to engage family members in planning and addressing health care needs of Emma, it will be important for nurse to conduct family strength assessment to identify any family strength factor that can promote recovery of Emma and a positive experience in care. This exercise would help to gain knowledge about patients relationship, level of attachment with family members and any specific family strength that promotes recovery of patient (Svavarsdottir, Sigurdardottir and Tryggvadottir 2014, pp. 13-50). The narration by Gee (2016) showed that Emma was closely attached to her mother, Lyn and after regaining consciousness, Emma always wanted to see her family members in front of her, however she was always surrounded by hospitals staffs. Therefore, understanding family strength is important so that her mother could also be involved in care. Hence, interview with her mother can give information related to support, togetherness, communication, shared activities, acceptance and resilience in Emmas family and this information can be used to enhance both physical as well as spiritual well being of Emma (Gottlieb et al. 2012, pp. 38-50). Another important consideration for nurse to promote healing and recovery of Emma according to SBNC plan is to develop a therapeutic and caring relationship with the patient. This is importance to promote inclusiveness in nursing practice and make patient accept and trust the treatment provided to them (Tobiano et al. 2015, pp. 1107-1120 . The narration by Emma after gaining consciousness mainly revealed she felt poked and prodded and no care being taken while shifting her from one bed to another during any medical activities. Hence, this means in the usual care provided to Emma, no communication or feedback was taken from Emma to understand her concern. This issue will be addressed by engaging in therapeutic communication with Emma and always interacting with her at all point of care to take feedback for any care implemented or find out any issue faced by Emma while going forward with any treatment. This will facilitate collaborative nursing practice and nurse can develop the resili ence skill of Emma to cope with any difficulties at any point of care. Offering assistance to Emma during her stages of anxiety and clarifying the importance of certain treatment for her recovery may also address feelings of disgust experience by Emma (Feo et al. 2017, pp.54-63). This will ensure that effective and caring nurse patient relationship is developed with Emma. Strength based nursing care for one critical transition point in Emmas journey Goal of SBNC care plan for Emma after regain consciousness- To provide SBN approach to support her in activities of daily living such washing, dressing and feeding. To involve Emmas mother in basic activities like dressing and feeding to develop resilient and spiritual well-being in patient. To be vigilant to respect patients dignity and respect while implementing care To take regular feedback from Emma to understand what will work best for her and reduce her sufferings during the treatment. SBNC plan for support in activities of daily living: Collect subjective data (S)- The first plan is to collect subjective data of level of difficulty in activities of daily living after coma. Emma was having trouble in speaking and communication with others due to dysphagia. Although she tried to say things, but no could understand her. She also lost the ability to normal movement and could not even wriggle her toes after regaining consciousness after coma. Other issues that severely affected her activities of daily living included double vision, inability to swallow foods due to dysphasia (nurse asked her to open her while feeding a fluid, but Emmas brain could not support her to complete the action), inability to use the communication board, comb her hair and dress herself. She was also found to experience great psychological stress and trauma during the process due to the absence of therapeutic communication and presence of family members in care (Gee 2016). Collect objective data (O)- The level of deficits in the area of mobility, speech and gait will be measured by use of appropriate tools. This would help to understand the level of support or assistive device Emma might require during ADLs. Assessment (A)- Bases on the collective and objective data obtained, the nurse can assess the difficulties faced by Emma in nursing care and support for ADLs. Treatment plan (P)- SBNC for ADLs will be provided by being respectful towards Emma and preserving her dignity during feeding, dressing and washing activities. As she faced difficulty in speaking, it will be necessary to communicate with Emma to understand whether she can express her thoughts and feeling through non-verbal signs. Teaching her non-verbal communication skill is also likely to address her struggle during speaking with others (Lutz and Green 2016, pp.e263-e265). As Emmas family remained with her for a very short time in the usual care provided, it is planned to at least allow her mother, Lyn to meet and support Emma at least during feeding so that she gains some warmth and familiarity in the hospital environment. This would also address her feelings of social isolation and lack of support from family members during difficult times (Address psychological stress and anxiety in patient) (Carman et al. 2013, pp.223-231). Reflection on Emmas experience in actual health care received and SBNC The usual care provided to Emma after gaining consciousness mainly revealed that there was a focus on just completing specific medical task assigned for patient, however no care was taken to preserve the dignity of patient. Therapeutic means of communication was always missing as hospital staffs talked among themselves and paid no attention to the issues that Emma faced while speaking or feeding or shifting her to another room. Use of such approach to care de-motivate patients and diminish their will power and hope for recovery. Patients also distrust such system and develop feelings of aggression and psychological stress in the procedure. On the other hand, the SBNC plan is mainly focused on effective communication with patient throughout the stage of treatment. This ensures that patients preference and issues can be identified and the most optimal environment is provided to patient to enhance their resilience skills and feelings towards healings (Spence Laschinger et al. 2010, pp.4 -13). By the use of SBNC, it is expected that Emma may develop a sense of familiarity and inclusiveness in care and respond well to the treatment provided. The inclusion of her family member is also likely to reduce her psychological distress. Conclusion on role of SBN for patient and family empowerment The main conclusion from developing the SBNC care plan for Emma is that SBN is a unique approach to care and must be actively implemented in nursing practice to promote patient/family empowerment and engagement in decision making. The SBN approach of focusing on patient and family strength creates an environment for their empowerment and developing positive attitude towards the care process. Use of such approach is likely to reduce the burden of nurses in their practice as it reduces conflicts, errors and any dissatisfaction with the care provided and accelerates recovery and healing of patient. References Carman, K.L., Dardess, P., Maurer, M., Sofaer, S., Adams, K., Bechtel, C. and Sweeney, J., 2013. Patient and family engagement: a framework for understanding the elements and developing interventions and policies.Health Affairs,32(2), pp.223-231. Elwyn, G., Dehlendorf, C., Epstein, R.M., Marrin, K., White, J. and Frosch, D.L., 2014, Shared decision making and motivational interviewing: achieving patient-centered care across the spectrum of health care problems, The Annals of Family Medicine,12(3), pp.270-275. Feo, R., Rasmussen, P., Wiechula, R., Conroy, T. and Kitson, A., 2017, Developing effective and caring nurse-patient relationships Nursing Standard,31(28), pp.54-63. Gee, E. 2016, Reinventing Emma, Retrieved 23 October 2017, from https://file:///C:/Users/User00/Downloads/1801246_440436544_emma%20(1).pdf Gottlieb, L. N., Gottlieb, B., and Shamian, J. 2012, Principles of strengths-based nursing leadership for strengths-based nursing care: A new paradigm for nursing and healthcare for the 21st century, Nursing Leadership,25(2), 38-50. Gottlieb, L.N., 2014, CE: Strengths-Based Nursing, AJN The American Journal of Nursing,114(8), pp.24-32. Lutz, B.J. and Green, T., 2016, Nursings role in addressing palliative care needs of stroke patients,Stroke,47(12), pp.e263-e265. Smith, J., Swallow, V. and Coyne, I., 2015, Involving parents in managing their child's long-term conditiona concept synthesis of family-centered care and partnership-in-care, Journal of pediatric nursing,30(1), pp.143-159. Smith, LMand Ford, K. 2013, Family strengths and the Australian Family Strengths Nursing Assessment Guide.In: Child, Youth and Family Health: Strengthening Communities, Elsevier, Australia, pp. 98-105. ISBN 9780729541558 Spence Laschinger, H.K., Gilbert, S., Smith, L.M. and Leslie, K., 2010, Towards a comprehensive theory of nurse/patient empowerment: applying Kanters empowerment theory to patient care Journal of Nursing Management,18(1), pp.4-13. Svavarsdottir, E.K., Sigurdardottir, A.O. and Tryggvadottir, G.B., 2014, Strengths-oriented therapeutic conversations for families of children with chronic illnesses: Findings from the Landspitali University Hospital Family Nursing Implementation Project, Journal of family nursing,20(1), pp.13-50. Tobiano, G., Marshall, A., Bucknall, T. and Chaboyer, W., 2015, Patient participation in nursing care on medical wards: an integrative review,International journal of nursing studies,52(6), pp.1107-1120.