Thursday, November 28, 2019

Oedipus Rex By Sophocles I (c. 496 - 406 B.C.) Essays -

Oedipus Rex by Sophocles I (c. 496 - 406 B.C.) Oedipus Rex by Sophocles I (c. 496 - 406 B.C.) Type of Work: Tragic, poetic Greek drama Setting Thebes, a city of ancient Greece Principal Characters Oedipus, King of Thebes Jocasta, his mother ... and finally his wife Teiresias, a blind prophet Creon, Oedipus' brother-in-law A Chorus Play Overveiw [The original 5th-century B.C. Greek audience was assumed to be familiar with the background of the play.] Laius and Jocasta were King and Queen of the Great City of Thebes. But it had been prophesied that their son would grow up to kill Laius, his own father, and then marry Jocasta, his own mother. Fearing the divination's fulfillment, Laius and Jocasta delivered Oedipus, their infant son, to a servant, with orders that he be killed. The servant bore the babe into the wilderness, but couldn't bring himself to carry out the command. Instead, he turned the child over to a Corinthian herdsman, who in turn passed the little boy on to Polybus, King of Corinth - who adopted him as his own. Oedipus was thus raised to believe that he was the natural son of Polybus. But Oedipus' life began to unravel the day he overheard an oracle repeat to him the unthinkable prophecy: he would someday kill his father and marry his mother. Supposing that Polybus was his real father, Oedipus determined to leave Corinth so as not to remain anywhere near Polybus. In his travels, Oedipus came to a place where three roads converged. There he became caught up in a violent argument with a band of travelers. He managed to kill all but one of his attackers, but remained oblivious to the tragic irony of this triumph: among the men he had slain was Laius, his true father. Later, the oracular prophecies completed their awful and ironic cycle of fulfil lm,nt when Oedipus undertook a mission to save Thebes, still acknowledged as his native city, from the predations of a dire female monster, the Sphinx. Of all the unlucky heroes to make the attempt, Oedipus alone was able to answer the riddle that was posed mockingly to all travelers along the Theban roadside by the winged lion-woman: "What goes first on four legs, then on two, and then on three?" The Sphynx had ravenously devoured all those brave and foolhardy souls who regaled her with exotic answers; but Oedipus, with the simple rejoinder "Man," gained the power to final] destroy her. The grateful populace of the city quickly acclaimed him as King, and in time, he met, fell in love with, and married his own mother, Jocasta. Of course Jocasta had no idea that her new young husband was the son she had sent off to be killed as an infant; nor did Oedipus realize that the loathsome prophecy had now at last been fulfilled. [As the play begins, the story of how Oedipus discovers his "crimes" unfolds.] In Thebes, a dreadful plague had struck. The citizens assembled to appeal to King Oedipus to curb the disease, and Oedipus reassured them that Creon, Jocasta's brother, had gone to Delphi to ask the great Apollo how the plague might be ended. When Creon finally returned, he brought startling news: Apollo had declared that the scourge had come upon the city because the very man who had murdered King Laius years before was now a resident of Thebes. Apollo further swore that the plague would endure until the murderer was exposed and exiled from the city. Oedipus, wholly unaware that he himself was the one who had struck down Laius, vowed to discover the identity of the murderer at all costs: ... Now I reign, holding the power which he had held before me, having the selfsame wife and marriage bed - and if his seed had not met barren fortune, we should be linked by offspring from one mother; but as it was, fate leapt upon his Head, [and I shall search] to seize the hand which shed that blood. Oedipus' first step was to call in Teiresias, a blind soothsayer of renowned wisdom. When the King questioned Teiresias as to the identity of Laius' murderer, the prophet first claimed that he did know the man's name, but then hesitated: "I shall never reveal ... I will not hurt you or me." Still Oedipus pressed, and Teiresias finally relented. "You are the slayer whom you seek," he sadly disclosed; "And dreaded foot shall drive you from this land. You who now see straight shall then be blind." Oedipus, furious at the suggestion of his guilt, berated the prophet, who retorted by insisting that Oedipus was yet blind to the truth

Sunday, November 24, 2019

Green Sea Turtle essays

Green Sea Turtle essays The Green Turtle (Chelonia mydas) is one of the many species of turtles that inhabits the vast oceans. The green turtle is named for the greenish color of its fat found under its shell. It is a large, heavy reptile, usually about 0.7-1.0 m in shell length and about 90-140 kg in weight. The maximum length and weight are about 1.2 m and 375 kg respectively. (1) The green turtles upper shell is smooth and wide, the animal is brown, but when the light from the sun hits it, the green color from the fat is visible. The green turtle is found in warm, coastal waters around the world. (2) Sea turtles, in adaptation to an aquatic life, have limbs modified into flippers for efficient swimming. It feeds mainly on marine grasses. Most female sea turtles leave the water only when it is breeding season because the female needs to dig a nest on the land and deposit her eggs. But an unusual characteristic of the green turtle is that it will often emerge onto land to enjoy the sun. (2) The green turtle is classified as follows: In this paper the classification and origin of the green turtle will be discussed further. Their diet, mating habits, offspring, senses, and their economic value will also be discussed. There are four characteristics that have played a role in discussion of the relationship and classification of turtles. The characteristics include the dermal armor, the acromion process on the scapula, the astragalus-calcaneum complex, and the hooked fifth metatarsal. (1) The dermal armor (shell) is the interlocking osteoderms that are found lying above the vertebral column and the ribs. The acromion process in the turtle is an extension medioventrally on the scapula. (1) This unique characteristic allows for different muscle attachments in the turtle and accounts for the awkward positioning of the frontal limbs for walking or swimming. The astragalus-calcaneum complex has to do with the fusion of these two junctions to ...

Thursday, November 21, 2019

Communication stumbling blocks Essay Example | Topics and Well Written Essays - 1250 words

Communication stumbling blocks - Essay Example For example, Barna in his works noted,â€Å"increased interaction through travel, students exchange programs, and other ventures should result in more understanding and friendship between nations†(Barna, p. 66). However, this is different especially due to variations of cultural contexts. These variations in cultural contexts create intercultural communication stumbling blocks, such as non verbal communication and time sense variations, thus lack of consensus during mediation and negotiations. Although I do not agree with Barna’s presumption that intercultural communication would result in understanding between nations, I agree with his assertion that â€Å"it takes a long time before a foreigner can adjust in a new culture† (Barna, p. 66). According to Kinetics, (2010), among the six stumbling blocks to effective cross cultural communication is nonverbal misinterpretation.A good example is the one given by the Japanese student, whereby he noticed that his non verbal communication did not coincide with the one of his Japanese culture (Barna, p. 67). He received a smile from American girls but only came to discover that the girls had no interest for him, unlike in his Japanese case, whereby such a smile can mean the person is sexual maniac. In such a situation, it would take quite some time before the Japanese student can fully adapt to the American culture. In regard to my own experience, I think the situation is more complext that it can be explained in writing. As I noted earlier during my visit to Tanzania in East Africa, I learned many things apart from their time factor issue. As I was speaking with some young girls, I noticed that they talked to me while bowing. In my own culture, this could mean that the person you are talking to is not attentive to what you are talking about, while in African culture it means that the person has high respect for you,

Wednesday, November 20, 2019

Operating Segments Essay Example | Topics and Well Written Essays - 1500 words - 2

Operating Segments - Essay Example IFRS 8 normally applies to the individual and separate financial statements of a business organization, or consolidated financial statements of a group of business organizations managed by a company. Through this statement, we can denote that there is a need of carrying out financial reporting through operational segment reporting (Bragg, 2010). Segment reporting involves giving of separate accounts of the individual divisions or units of a company, its subsidiaries and other divisions. In an annual accounting report, the purpose of a financial segment reporting is to give an accurate picture of the performance of a public company to its shareholders and investors (Crawford and Helliar, 2010). Future or prospective investors will also use this financial statement for purposes of making a decision on whether to invest or not in a business organization. For the management of an organization, segment reporting is used for purposes of evaluating the assets, liabilities, expenses and inco me of each segment. This is for purposes of assessing how risky or profitable the business segment under consideration is. It is through this assessment that the managers of a business organization will develop policies aimed at meeting the objectives and aims of the business organization (Bragg, 2010). When it comes to the evaluation of large capitalized companies, carrying out an analysis of important financial information is the beginning point. On a general perspective, it is always difficult to understand the financial records and information of large capitalized business organizations (Bragg, 2010). To understand their operations and financial records, there is a need of analyzing every operation of the business organizations. This is individually. The segment data of a company is therefore an important place to begin an analysis of the

Monday, November 18, 2019

SEO content for a web site selling custom trailers Essay

SEO content for a web site selling custom trailers - Essay Example This is intended to bring closer selected medical services to far-flung community areas not accessible to health services. Lately, some hospital functions were devolved to diagnostic medical health mobile clinics like dental services, x-ray, blood, HIV, pregnancy, malaria and urine tests, MRI imaging, and other possible medical services are now made conveniently available to the public through customized mobile medical trailers. Mobile medical exam trailers are a necessity in far-flung community areas where first-rated hospitals are remote from community and health services that are difficult to avail of. A mobile medical exam trailer should have laboratory and diagnostic medical testing capability with a minimum of three doctors and nine nurses. It is important that a medical diagnostic mobile trailer accommodate around 1,000 patients per week more or less. With a mobile medical exam trailer, selected medical services can now address certain medical health needs of remote communities. Thus, if your community local officials are to purchase a mobile medical trailer to service their constituents, here are some pointers on how to select a customized mobile medical exam trailer. Customized mobile medical exam trailer must have these basic health services: Medical Imaging equipments are expensive to acquire and install. These also need more spacious room to get them installed. So depending on the allocated budget, proponents or those who will be responsible in setting up and operating a mobile medical diagnostic and laboratory trailer will have to check on what their budget can afford. For cheaper options, you may choose to merely have a single health service independent Mobile trailer like providing only a mobile Ophthalmology Clinic or an independent Dental Care Mobile Clinic within the community. Regardless of the constraints, it is highly recommended that any far-flung community that is remote from any prime medical hospital or

Friday, November 15, 2019

Security Challenges for Health Information Systems

Security Challenges for Health Information Systems Curtis Anderson   Health Care Information Systems faces challenges of many organizations protecting their information systems from potential threats, such as viruses, accidental fires, untested software, and employee theft of data. Falling into three categories: Human threats (intentional or unintentional human tampering), Natural and environmental (floods, fires, and power outages), and Technology functions (failure of drives, and no backup), viruses are the most common and virulent forms of computer tampering. Another common security issues has to do with internal breaches, usually caused by installation or use of unauthorized software, illegal and illicit communication surfing sites, and e-mail harassment, and using an organizations computer for personal gain. Hardware, like software, used in health care information systems must be protected from loss caused by theft, thereby exposing confidential patient information (Wager, Lee, Glaser, 2013, p. 352-356). The Department of Health and Human Services Security Rules published in the Federal Register on February 20, 2003 (68 Fed. Reg. 34, 8333-8381), and was updated by the HITECH legislation, which is governed by HIPAA Security Rule protects ePHI health information that is maintained or transmitted in electronically, is closely related to HIPAA Privacy Rule, which governs all protected health information (PHI) (Wager et al., 2013, p. 356). With the advancement of mobile technology and the development of applications found in many portable devices, health intervention is beneficial in the delivery of health care data. A conducted systematic review and meta-analysis shows the effectiveness of mobile-health technology, through a controlled trial of mobile technology interventions that is used to improve the delivery process of health care information. The conducted independent study of data allocation concealment, allocation sequence, measured the effects by calculating estimates, and random effects meta-analysis(Free et al., 2013). The study showed a low risk of bias, where the health care trials supported outcomes for the appropriate management of disease, and showed significant benefits to the improvement in nurse/surgeon communication use of mobile phones for reducing diagnoses with the use of mobile technology. The conclusion of these trials showed health care providers supporting the process of intervention benefici al, but a more quality trial outcome is needed to be certain of the results. Security Challenges The responsibility of the healthcare organization should be to protect health information at all times; a critical process of security practices and regulatory compliance in the healthcare industry (Kwon Johnson, 2013). Using the Ward’s cluster analysis, a minimum variance that is based on the adoption security practice between organizations, measured the dichotomous data to indicate the presence or the absence of security practices. When identifying the relationship of clusters and regulatory compliance, the results of the Healthcare Information and Management Systems Society conducted a telephone-based survey, which found the United States healthcare organizations adoption of security practices, breach incident, and perceived compliance levels related to Health Inform Technology for Economic and Clinical Health, and the Health Insurance Portability and Accountability Act, that state laws governing patient information security, identified three clusters: Leaders, Follower, a nd Laggers, producing a difference of non-technical practices, with the highest level compliance being associate with the organization who employed the use of a balance approach using the technical and non-technical practice (Kwon Johnson, 2013). Security Strategies Security incidents have been closely related to the use of laptops, other portable and/or mobile devices and external hardware storage that contain or used to access Electronic Protected Health Information (EPHI), falls under the responsibility of HIPAA Security Rule, which requires reviewing and modifying security policies and procedures on a regular basis (HIPAA Security Guidance, 2006). The reinforcing of ways to protect EPHI when accessed or used outside of and organization’s purview, using strategies can be reasonable and appropriate to conduct business activities using a portable medial/device (such as USB flash drives) to store EPHI, and the ability to access or transport EPHI using laptops, person digital assistants (PDAs) , home computers and non-corporate equipment, delegated by the Centers for Medicare and Medicaid Services (CMS), enforce HIPAA Security Standards, to determine actions covered by the organizations is reasonable and appropriate to safeguard the confid entially, integrity and availability of EPHI (HIPAA Security Guidance, 2006). The organization should establish risk analysis and risk management drive policies to reduce vulnerabilities that can be associated with remote access, and offsite use of EPHI. Establishing training policies in the workplace to address any vulnerability that may be associates with remote access to EPHI, by changing and safeguarding passwords, protecting remote device/media by creating polices that prohibits these devise unattended, and the transmitting of EPHE on open networks or downloading EPHI on open networks or downloading EPHI on a remote computer (HIPAA Security Guidance, 2006). It is important that a security incident and non-compliance issue be address in order to manage any harmful effects of the loss of the device, by securing and securing evidence, managing harmful effects, and notifying the affected party. Allowing for or the requiring of offsite use of, or access to EPHI should have and established strategy plan developed and implemented for the authorization and access of EPHI in accordance with HIPAA Security Rule  §164.308(a)(4) and the HIPAA Privacy Rule  §164.508(HIPAA Security Guidance, 2006). Social Networks Underlying factors have concluded that a lack of information regarding the benefits, and limitations of social media health communication amongst the general public, and health professionals, use a systematic approach to identify, these benefits, and/or limitations of social media to communicate health data by a methodological quality of study that is assessed. There were seven main issues of social media, which includes focusing on increased interactions with others, to facilitate, share, and obtaining health messages, as the new dimension to health care medium use by the public, patients, and health professionals who communicate health issues for improving health outcomes. The study shows that social media can be used as a powerful tool, which offers collaboration between users, and social interaction for a range of individuals to share data electronically (Moorhead et al., 2013). Securing Data on Social Networks There is a remarkable surge surrounding personal health record (PHR) systems for the patient and consumer, however biomedical studies do not show a potentially adequate capability and utility of PHR system (Tang, Ash, Bates, Overhage, Sands, 2006), hinders toe widespread deployment of PHR adoption. Since health care records are more than just a static repository for patient data, it combines data, knowledge, and software tools, to help patients become active participants in their own care. However, the challenges of, technical, social, organizational, legal, and financial requires further study, that requires stakeholder, patients, provider, employers, payers, government, and research institutions to play key roles for developing PHR technology to overcome the barriers to the widespread adoption of PHRs, and develop polices, the cost associate with PHR in medical errors, dollars, and lives, to realize the potential benefits of routine health care and catastrophic disasters (Tang et al., 2006). Strategies to Safeguard Data The use of new technology, applications and platforms, such as â€Å"social media,† has created new opportunities in healthcare but raises privacy and security challenges, The need to adapt old police and procedures, privacy and security protocols to cover communication channels and date sharing needs to be used effectively to protect a healthcare organization from the risk of a disclosing the privacy of a patient’s data (Social Media in Healthcare: Privacy and Security Considerations, n.d.). This process of using online tools and platform for sharing content and information for the purpose of: Delivering pre-development content – sending e-mail or posting on a website, engaging a population in discussion – to facilitate brand awareness/customer satisfaction, and manage communication – that offers individuals and organization a convenient organized way to consolidate their communication. The challenges healthcare organizations face is: Ethical challenges – an acceptable standard of regulatory and legal requirements that is mandated by Title II of HIPAA, and Sarbanes-Oxley Act (SOX), the National Center for Ethics in Healthcare (NCHEC), and the World Health Organization Ethics and Health Initiative (Social Media in Healthcare: Privacy and Security Considerations, n.d.), to avoid any misconduct or unethical behavior becoming a serious issue with regard to the use of social media. The U.S Supreme Court decision on Sorrell v. IMS Health, Inc. addressed the issue of aggregated databases and the sale of prescriber data for marketing prescription drugs, where the ability to distribute, exchange, and use date from multiple sources is integral to clinical informatics, research, public health, quality improvement, and other healthcare operations. A pharmacy filling a prescription collects detailed information which includes patient and provider names, drugs, and the dosage and prescribed quantities, and the date of the prescription being filled, allows a pharmacy to sell prescription information to data-mining companies of a patient’s information once it has been de-identified by meeting the HIPAA standards. However, legislation sought to restrict the sale of prescription date for marketing purpose using the prescription confidentiality law of 2006, where a data-mining company must obtain permission from the provider before selling prescription records (Peters en, DeMuro, Goodman, Kaplan, 2013). Hackers, cyberattacks and data breaches are the major attacks from outsiders, the motive and type of hackers is complex to chief information security officers (CISOs) and their staff in order to take action to protect and defend their data system. Causing grate consequences to the organizations, along with bad press, impact on reputation, and drop in share prices, requires legal action if a breach involves personal data theft. Identified as a data breach, the loss of control compromises unauthorized disclosure, unauthorized acquisition, and unauthorized access to data physically or electronically (Hayden, 2015). The protection of all date is impossible, as the proliferation of portable media, smartphones, USB drives and laptops increase the opportunity for the loss or theft of these devices along with their data requires that steps be taken to enable the encryption of mobile devise, and to immediately inform security management of a device being stolen, lost, data being compromised. Trends in enterprise mobility has made mobile device security imperative, and the sales of smartphones is surpassing PC sales, the completive edge and benefits of mobility can be lost if the smartphone and tablet PC are not protected against mobile security threats: Mobile malware – Smartphones and table are susceptible to worms, viruses, Trojans and spyware. Eavesdropping – wireless networks use of link-level security lack end-to-end upper-layer security, allowing for unencrypted data to be eavesdropped upon. Unauthorized access – the storing of login information to applications on mobile devise can be easily access to allow intruders access to email accounts and applications, and social media networks. Theft and loss – storing significant amounts of sensitive data on a mobile device can be critical if you are in a hurry and leave you iPhone in a taxicab, restaurant, and data loss can occur. Unlicensed and unmanaged applications – this can cost a c ompany in legal cost (Learning guide: Mobile device protection, 2015). Government and Quasi-government Benefitting from health surveillance, has pioneered, informatics analysis, and solutions in the field of informatics to serve other facets of public health, to include emergency response, environmental health, nursing, and administration. As the systematic application of information and computer science and technology, public health practice, research, and learning professions apply mathematic, engineering, information science, and social science to public health problems and processes that are important to biomedical or health informatics (Savel Foldy, 2012). With seven ongoing elements of any public health surveillance system: Planning and system design – to identify information and sources that addresses the surveillance goal. Data Collection – The use of different collection methods, to identify the appropriate use of a structured data system that supports easier, faster, and higher-quality data entry fields compared to free test, useful vocabulary, and data standa rds. Date management and collation – are used to share data across different computing/technology platforms to link data with data from a legacy system. Analysis – is used for the statistical and visualization application, to generate algorithms that alert users of aberrations in health event. Interpretation – this is useful to compare information from one surveillance program with other data sets. Application to public health programs – this utility assesses surveillance data directly flowing into an information system that support public health interventions and information elements (Savel Foldy, 2012). The challenges of surveillance informatics includes an efficient and effective way to combine sources of complex data and information into an actionable knowledgeable to meet the challenges to arise at a faster, better, and lower cost surveillance and interpretation of health events and trends, the leveraging of technology standards ability to not only talk and listen, but understand each other. Adopting such a system is insufficient since both semantic and syntactic standard must be implemented and tested to ensure system validity. In conclusion, healthcare security is vital to the securing and protecting a patient’s privacy and healthcare information from being breached, lost, stolen, while protecting the healthcare system from viruses, worms, malware and spyware, that can affect the integrity of an organization, a drop in stock prices, and legal issues. Protecting any system that stores vital organization and personal information should be a priority. References Free, C., Phillips, G., Watson, L., Galli, L., Felix, L., Edwards, P., Haines, A. (2013). The effectiveness of mobile-health technologies to improve health care service delivery processes: a systematic review and meta-analysis. Retrieved May 20, 2015, from http://www.ncbi.nlm.nih.gov/pubmed/23458994 HIPAA Security Guidance. (2006). Retrieved May 20, 2015, from http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/remoteuse.pdf Hayden, E. (2015). Data breach protection requires new barriers. Retrieved May 20, 2015, from http://searchsecurity.techtarget.com/feature/Data-breach-protection-requires-new-barriers Kwon, J., Johnson, E. M. (2013). Security practices and regulatory compliance in the healthcare industry. Retrieved May 20, 2015, from http://connection.ebscohost.com/c/articles/84758015/security-practices-regulatory-compliance-healthcare-industry Learning guide: Mobile device protection. (2015). Retrieved May 20, 2015, from http://searchmobilecomputing.techtarget.com/guides/Mobile-device-protection-and-security-threat-measures Moorhead, PhD, MSc, S. A., Hazlett, PhD, MSc, D. E., Harrison, MSc, L., Carroll, MD, MPH, J. K., Irwin, PhD, A., Hoving, PhD, C. (2013). A New Dimension of Health Care: Systematic Review of the Uses, Benefits, and Limitations of Social Media for Health Communication. Retrieved May 20, 2015, from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3636326/ Petersen, C., DeMuro, P., Goodman, K. W., Kaplan, B. (2013). Sorrell v. IMS Health: issues and opportunities for informaticians. Retrieved May 20, 2015, from http://www.ncbi.nlm.nih.gov/pubmed/23104048 Savel, MD, T. G., Foldy, MD, S. (2012). The Role of Public Health Informatics in Enhancing Public Health Surveillance. Retrieved May 20, 2015, from http://www.cdc.gov/mmwr/preview/mmwrhtml/su6103a5.htm?s_cid=su6103a5_x Social Media in Healthcare: Privacy and Security Considerations. (n.d.). Retrieved May 20, 2015, from http://himss.files.cms-plus.com/HIMSSorg/Content/files/Social_Media_Healthcare_WP_F Tang, MD, MS, P. C., Ash, PhD, J. S., Bates, MD, D. W., Overhage, MD, PhD, J. M., Sands, MD, MPH, D. Z. (2006). Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption. Retrieved May 20, 2015, from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1447551/ Wager, K. A., Lee, F. W., Glaser, J. P. (2013). Health Care Information Systems (3rd ed.). San Francisco, CA: Jossey-Bass.

Wednesday, November 13, 2019

The Marine Assault on Tinian Essay -- Battle for Tinian

Introduction Tinian is a small island in the Marianas group lying approximately 3,500 miles west of Hawaii and 1,400 miles southeast of Tokyo Japan. The island was discovered by Ferdinand Magellan who landed on the island of Guam first in 1521. The island remained under Spanish control for centuries. Tinian remained under Spanish control until the Spanish-American war of 1898, when the American cruiser USS Charleston entered the harbor in Guam to claim that island. Spain took notice at the end of the war and sold the remaining islands of the Marianas to include Tinian to Germany. Germany’s regime lasted shortly when the first world war and seized the Mariana Islands except for Guam which remained under US control. The native people of the Marianas are known as Chamorros, and the native language is Chamorro. Although the original language is now mixed with Spanish, German, and Japanese, it is still thought until today. During the Second World War after the attack on Pearl Harbor Guam was also attacked and seized by the Japanese military this is when the Pacific war had begun. The United States now focused their attention on the Philippines, Iwo Jima, and the Mariana Islands. Hoping to capture Guam back from the Japanese, United States also wanted to capture the remaining islands. These islands would be in the front lines of the war in the Pacific. 1 History Why did the United States Military want to take control of Tinian? The island would be the new home of the newly created Twentieth Air Force. The United States saw Ushi Point Airfield as the perfect location to set up the air base, which would land its B-29s while en route to bomb Japan. The Marines also needed to take control of Tinian in order to prevent the Japanese ... ...n the plan of attack, and a realistic logistics plan that can keep abreast of the attack. These few principles have been the keys to victory countless times in the past and will continue to unlock the door to victory on the battlefields of the future. These are the lessons that are the heritage of the Tinian Battle, and we still use and also improve on by planning. The Battle for Tinian is one of the most successful planned amphibious operations in history.11 Works Cited Allan, May. Marine Assault on Tinian. Volume 13. July 1998. Prefer, Nathan. The Battle for Tinian. Philadelphia: United States of America and Great Britain by Casemate Publishers. 2012. LtGen William K. Jones, USMC(Ret). Marine Corps Gazette. Marine Corps Association: Marine Corps Association Jun 1988. Major Hoffman, Carl. The seizure of Tinian. Washington DC Printing: 1951