Saturday, August 31, 2019

Artificial River Essay

APUS, Section 4 Mr. Gordinier January 8th, 2013 All situations and topics have multiple views and perspectives to them. A paradox exhibits contradictory aspects in which there is not either a single good or a bad, positive or negative. In The Artificial River The Erie Canal and the Paradox of Progress, 1817-1862, written by Carol Sheriff, there are many different examples of paradoxes. Towns initially saw the Canal having a negative impact on them, but realized it could help. The Canal provided for faster transportation, but in the case of a crash would take a long time to recover from. Also businessmen benefitted from the Canal, but other lost a lot of money because of it. The Canal provided dramatic change to the upstate New York area. In some cases this change resulted in prosperity and in others it resulted in failure and loss. At the time prior to building the Canal many negative impacts were the only things being considered. In 1826, a Canal Board was set up to deal with many of these complaints and problems. Most of the agreements and compromises were expressed through contracts made between the Canal Board and the people of the towns. Individuals questioned the right to take land to build the canal, water resources being used, and also commercial structures being built along the Canal. The thought of how much these commercial structures could drastically benefit these towns were not contemplated. When the Canal was built towns all along the route from Buffalo to Albany prospered from the revenue and the attraction the Canal brought with it. Whether the Canal was being used for business people, immigrants, settlers of the region, or tourists, the border-towns all had some appeal to these persons. After some time the state was continually asked to expand the Canal from the original route to include connecting canal routes. However, the same towns along the route from Buffalo to Albany had already been established along the lines of the original canal. These towns would need to be relocated in order to obey these new requests. This presented a major problem because the people in these towns had formed a life around the Canal and many of them made their income based of the Canal. The inhabitants of the towns changed their mentality from not wanting the Canal to invade on their lives, to it being an essential part of their lives they depended upon. The Erie Canal provided an extremely fast source of transportation compared to other ones of that time. A lot of the land that the Canal went through was uninhabited and therefore people weren’t able to move through these areas. Once the Canal was built it served as that pathway through these areas. The Canal also was a much cheaper source of transportation that was used by residents, tourists, emigrants, and workers during this time. Evangelical preachers used the artificial river to seek salvation among these people. Also the Canal helped to serve as an underground railroad, transporting slaves from Syracuse to Buffalo, near the Canadian border (Sheriff 53). The Canal not only sped up transportation, but also cost much less for goods to be delivered. Before the Canal goods from Albany to Buffalo would increase to five or six times their actual value just because of transportation. This helped business prosper and served as a positive aspect for the Canal. Although transportation was faster if a boat along the Canal crashed it would hold things up for a long time. A boat crashing had a chain effect on other boats because they then would be slowed down as well. People would not get where they needed to be on time was well as goods. A lot of the times if a boat did crash the goods were not able to be salvaged and hurt the business that owned them. There was also the issue of passing under bridges and how low they were. In a play of William Dunlap the brother of Amelia describes the inconvenience this was saying â€Å"In constant dread of lifting your head above your knees for fear of having it knock’d off your shoulders by a bridge† (Sheriff 55). Inconveniences such as these eventually encouraged travelers to find a different source of transportation; the railroad. The railroad had advantage over the Canal in the fact that it could run all year round. Individuals took advantage of the Canal and used it to help themselves gain profit. Businessmen and entrepreneurs saw the Canal as an opportunity to make money. Some bought their own boats and turned them into their business place. Boats were transformed to stores and markets in which people would buy off of them. Business was not only done on the Canal, but other men would use all the people, especially tourists, and try to sell consumer goods to them. A lot of times these vendors would scam people buying from them. They would sell fake remedies with false claims. Many times they would also trade counterfeit bills for items of actual value. The Canal helped solo merchants in a way that had never been done before. On the other hand the Canal was also very detrimental to many people as well. The people it affected were those whose land and water supply it had taken. When the Canal was built it ruined early settlers property such as the Archbalds. Frequently properties were cut in half. Once water was let into the Canal it caused a number of problems. Majorly because of poor workmanship and laziness water would stream out of the Canal and into farmers’ land. Fields and basements would be flooded, livestock would be injured, and gardens would be damaged. Also the workers feet would trample over fields, showing no regard or carefulness of their surroundings. One farmer claimed that workers torn down his fence simply for their own amusement. Without a healthy stock of crops the farmers would not make as much money and financially were negatively affected by the Canal. The Erie Canal had widely varying results on the people it impacted. Businessmen and entrepreneurs received financial success through the Canal while farmers and people already established along the lines of the Canal seemed to be negatively affected by it. There is no question transportation was faster and cheaper than any other source around that time. Communities and towns both benefitted from the Canal being around them. Initially there was a great amount of hype surrounding the Canal and all this hype brought people. Businesses thrived off these tourists and newcomers. Positives and negatives came from the opening of the artificial river that would change history forever.

Friday, August 30, 2019

Knowledge Brokering and the Work of Information Technology Professionals Essay

Abstract   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section talks about the purpose of the exploratory study; the result that brokering practices for information distribution are affected by the structural conditions in the organization. Introduction   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section talks about how an IT professional views himself and what some IT professionals feel about their role in the information distribution chain in the company. It talks about how an IT professional must expand his or her role to take on the mantle of spreading information to all quarters and feel that their responsibility is not only to ensure that information flows but ensure that information is available to everyone in a way that they are made aware of instead of them seeking information when they need it. It knows vs. seeking. Related Research   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section talks about the absence of any previous theories on knowledge brokering and how the authors used studies from the area of organizational science to base their study and start their research. It also points to the limitation of the article that it doesn’t talk about any best practices that can be used in effective knowledge transfer amongst the different units of an organization Boundary Spanning   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section talks about how there are different boundaries in an organization, internal as well as external and how boundary spanners are the ones who have the responsibility of transferring knowledge from one unit to another unit of the organization. Situated Learning   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section talks about the theory that learning and knowledge transfer depend on the community that the people interact in. it brings along aspects like culture, whether in the organization of in the city or country. It talks about how different people have different views on things and that their environment can and will strengthen their views – as most of us like to be with like minded people. Method   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section talks about the whole methodology of how the authors have gone about researching the article and coming up with their theory and reasoning. Research Site   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section gives a reasonably detailed background of the company that is chosen for research. The company is a fortune 100 company with 55,000 employees and has 600 plants and centers in North America. Data Collection   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section talks about the data collection methodology, which was a semi-structured interview of one hour durations. They started from the CIO and went down the chain of command. The interviews were held with IT professionals as was the scope and basis of the study. Analysis   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section talks about how the data that was gathered during interviews was later reviewed and how the authors went about adding notes and additional comments to the information before they came to the results. The analysis was mainly qualitative. Only 23 participants make up the whole study. Results   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The result was a set of themes that came out from the analysis of the interviews that were conducted. The authors went into brief details of each theme and they are presented below. Position of IT professionals   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This talks about how IT professional position themselves in the organization to be effective in the work they do. The fact that most positions required domain expertise helped the IT professionals as they were able to build credibility with the department that they worked in. Shared Systems as Boundary Objects   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section explains how the fact that IT is a part of every business transaction affects all changes that happen in an organization. It also talks about how the IT professionals’ participation in all important meetings becomes a chance for knowledge brokering and how IT professionals can take advantage of such opportunities. Brokering Practices   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section gives an introduction to the types of themes for knowledge brokering that emerged; they are discussed in detail later. Crossing Boundaries   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This is the first theme and it refers to IT professionals going to different units and spreading information or sharing knowledge. It talks about how the initiative taken by different IT professionals can affect the knowledge brokering within the company. Surfacing and Challenging Assumptions   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section talks about how IT professionals would regularly ask â€Å"Why† to challenge a certain assumption and find out the underlying reason or change the systems using this approach. Translation and Interpretation   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section talks about the theme of being a translator and interpreter for different departments and being the person who would find solutions amongst all the jargons that they use. Relinquishing Ownership   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section talks about how for every change the IT professionals always needed the approval of the units that they worked in. it also mentions how the IT professionals presented themselves to be impartial although they always wanted a certain way to implement things. Consequences of Knowledge Brokering   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section talks about how the IT professionals not only saw themselves as IT people but also as people who moved the information from one part of the company to another part. Discussion   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section wraps up the topic and dwells on the fact that shared systems was one of the most important tools that IT professionals used in sharing knowledge and how the job of an IT professional was changing in the structures that exist in different organizations. Evaluation   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In this section the authors evaluate their work and inform the reader how their study covers many differing aspects and what it offers. Conclusion   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section talks about how the role of the IT professional in information sharing is diminishing as they get sidelined to only building and maintaining information systems. It also mentions that the IT professionals now have to revaluate their jobs and see how they can add more value to the organization. References   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section lists all the references that are used in the article. About the authors   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section talks about the authors, their achievements and specialties. Appendix   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This section lists the questions that were asked during the interviews that were conducted. Assumptions   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The authors assume that what happens in one company happens in all company. They mention themselves that the role of an IT professional can change depending on the structure in the organization, its contradictory. Limitations   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The study only looks at one company and interviewed 23 people in it. The whole paper is based on information gathered there. It does not use any statistical tools and the theory is based on qualitative data only. The study does not share any best practices (lack of comparative sample) and does not give concrete suggestions on what the future holds for the IT professional.

Panic or use of fear

TerrorismTerrorism comes from the word panic which means terror or the usage of fright to transfuse fear in people to coerce them or hale them to make one ‘s command. Terrorism is the deliberate and planned usage of force, force or even fear against guiltless civilians for the intents of accomplishing aims and ends that may either be politically, ideologically, personally or sacredly instigated ( word net.com ) . Terrorism can besides be carried out as a signifier of retaliation by those who feel they may hold been wronged by certain persons. Terrorism has become a major concern non merely to universe leaders but to citizens of assorted states as good, particularly those viewed to be anti-Islam. Unfortunately the United States of America ( USA ) is top on this list, doing the citizens ever worried that their safety may be at interest. Crime in the signifier of terrorist act can be traced back to antediluvian times, for every bit long as human existences have been willing to utilize fright or force to hold their manner. In the first century, a Judaic group naming themselves The Sicarii employed slaying to their enemies every bit good as confederates in their command to subvert the Roman swayers from Judea ( Amy, 2005 ) . In the eleventh century all the manner to the thirteenth century, a secret Islamic religious order, The Hashashin, became active in Syria and Iran and they executed Abbasid and Seljuk politicians, doing them feared among their equals. It is besides deserving observing that the word bravo, normally used to depict terrorists was adapted from the word Hashashin. Modern twenty-four hours terrorist act nevertheless became rife in the late 1960 ‘s a period ill-famed for highjackings. The popular forepart for Palestinian release hijacked an El Al flight and about 20 old ages subsequently, a Pan Am flight was bombed over Lockerbie in Scotland, a cooling world that terrorist act was here with us. Numerous other terrorist activities have been carried out since so with the most hideous in the recent yesteryear being the September 11th 2001 bombardment of the Twin Towers at the World Trade Centre in New York in which claimed the lives of 2,995 people, including 19 highjackers and wounding over 6,291 people. Harmonizing to the website Terrorism Research there are legion classs of terrorists, among these are: Breakaway whose chief signifier of action is the separation through independency, domination or spiritual freedom through such agencies as societal unfairnesss among others. Other classs include Nationalist, Ethnocentric, Revolutionary, Political, Religious, Social, Domestic and International or Transnational. The means the terrorists can utilize to accomplish their ends can be classified as cyber terrorist act, biological terrorist act, province sponsored terrorist act or violent terrorist act among others ( Categories of terrorists, 2006 ) . This research will concentrate on international terrorist act which is presently the major manner in which terrorist act activities are perpetrated. International terrorists in the recent yesteryear have been of Islamic beginnings. Harmonizing to Islam instructions, none is to be worshipped but Allah, and anyone who seems to be interfering with the spread of Islam as a faith or non welcoming it is considered an heathen who should be wiped out. The USA has in its international policies been portrayed as an enemy of Islam and this has led to a batch of hatred to it from the Islamic states. Terrorist cells have hence come up in these states where sometimes even immature male childs are educated and brought up in a manner that makes them believe the Western states are a beginning of immorality that should be cleaned. Most of the terrorists are brought into these cells when they are immature and have their caputs filled with the negative impacts of the Western states. These immature male childs hence grow with a negative attitude towards these states and by the clip they attain the age of about 18, they normally have to the full formed attitudes towards these states that they are willing to give their lives in the name of supporting their faith, every bit good as assisting free the universe of the soil that is coming from the West. Their Acts of the Apostless range from bombing centres they believe to prolong the economic systems of these states to others like killing, albeit ghastly people they consider to be sympathisers with these states. The universe ‘s most wanted felon when it comes to terrorism at the minute is the Saudi born Osama bin Mohammed bin Awad bin Laden. He is one of the laminitiss of the ill-famed terrorist group, the Al Qaeda and was born on 10th March 1957 in Riyadh in the democracy of Saudi Arabia to a affluent man of affairs male parent who was a polygamist. Bin Laden, was the boy of the 10th married woman and his parents divorced shortly after his birth. He graduated with a grade in civil technology. Osama is of the sentiment that the reconstructing the Sharia jurisprudence will compensate the wrongs in the Islamic universe and hence all other sentiments are disused. He believes American democratic political orientations are to be resisted by all agencies possible and he advocates for violent Jihadism as a agency of accomplishing this aim. In Osama ‘s beliefs, America, Israel, and the Shia Muslims are enemies and are vehicles through which moral degeneracy is dispersed. He has specific hatred towards the Jews who he considers cunning and Masterss of perfidy. He is non sympathetic to anyone when it comes to Jihadism and he considers all citizens, including adult females and kids to be suited marks of jehad. He insists jehad is the lone manner to compensate the wrongs that have been perpetrated against Muslim states and in peculiar his choler is directed at the USA. He is besides of the belief that Israel as a state should be wiped out. Theodore Kaczynski was born on 22nd May 1942. He is a former professor of mathematics who carried out a batch of mail bombardments and is most celebrated as the Unabomber ( University and Airline Bomber ) . He was a child mastermind and while in the fifth class, an IQ trial conducted on him revealed he had an IQ ( Intelligence Quotient ) of 167 and he was hence allowed to jump the 6th class and travel straight to the 7th class. At the age of 16, he is said to hold been involved in CIA head control and emphasis experiments which his attorneies during his test claim may hold had inauspicious effects on his province of head ( McFadden, 1996 ) . He moved to Lincoln, Montana in a cabin that had no basic necessities in an attempt to hone his endurance accomplishments and while there he began bombing universities and air hoses in an attempt to hold his positions about the devastation of the natural home ground around him heard. He was classified as a domestic terrorist as his action ne'er went beyond boundaries of his state. His terrorist onslaughts were carried out in the periods between the old ages 1978 and 1995 and led to the decease of 3 people and hurt to 23 others. Despite conjunct attempts and legion probe efforts, the governments were unable to capture Theodore and it took the aid of his brother for them to eventually capture him. He is presently incarcerated in a province prison, functioning a life sentence at the ADX Florence Maximum Facility in Florence Colorado without the possibility of a word. Timothy James McVeigh was born on April 23rd 1968 to a Catholic household and his parents, like those of Osama bin Laden divorced, although much later when he was 10 old ages old. In his confessions subsequently, he expressed an eager desire to decease from manner back in his childhood as he was ever picked upon by the senior pupils who took pride in strong-arming him. This made him turn up angry at the universe for doing his life so suffering. His terrorist activities were geared towards retaliation as he considered it the ultimate payback to those who wronged him. He was a bright pupil and at high school was even considered the school ‘s most promising computing machine coder ( Patrick, 1996 ) . Mc Veigh ‘s Terrorist activities involved the bombardment of the Alfred P. Murrah Building in which 168 people lost their lives and 450 people were injured. He blew up the edifice in a truck that contained about 5000 lbs of a compound of ammonium nitrate and Nitromethane. He is said non to hold been contrite as he had at last exacted retaliation to the greatest bully of all-the USA. He merely regretted holding led to the deceases of kids who attended day care at the land floor of the edifice. On the 11th June 2001 at the USA Federal penitentiary in Indiana ‘s Terre Haute Timothy Mc Veigh was executed by deadly injection holding been found guilty of charges of terrorist act leveled against him. The most dramatic characteristic about all the three terrorists is the fact that they were all bookmans. Osama bin Laden graduated with a grade in Civil Engineering, Theodore Kaczynsky was a child mastermind who joined Harvard at the stamp age of 16 and went on to go a professor of Mathematics, Timothy was good at programming and in high school, he was the schools most promising computing machine coder. The other similarity is that they were all driven by their beliefs and their actions were as a consequence of these beliefs, and they had no declinations whatsoever about their actions. The major difference is that while the latter two are domestic terrorists, Osama is an International terrorist who is still on the tally. The other two have been captured and incarcerated with Mc Veigh already executed. As per the profile at the start of the paper, they all fit since their terrorist inclinations seem to hold originated from their childhood thereby specifying their grownup life determinations and beliefs. From the research, their mind is a fact that was non so out in the unfastened and is one of the new facts learned in the class of the survey. Had timothy non been bullied so much in his childhood, he may non hold turned out so angry at the universe and acted in the mode in which he did. Possibly the CIA ‘s experiment on Theodore may hold backfired taking him to go the unstable person he subsequently became, and Osama may hold turned different had he turn up in a different scene that did non portray other ideals apart from Islam as misleading.

Thursday, August 29, 2019

Minimizing the Impact of a Natural Disaster - The Risk Mitigation Research Paper

Minimizing the Impact of a Natural Disaster - The Risk Mitigation Phase - Research Paper Example While FEMA and other government agencies will aid in the response and recovery phases of the disaster, the planning and initial response will largely be a function of local officials. The need for response and recovery can be greatly reduced by adequate planning and risk mitigation. The emergency planning manager will need to be highly skilled in a wide variety of disciplines to be effective. They will need intense knowledge in fields as diverse as geology, political science, and social theory. The purpose of this paper is to better prepare the disaster manager by examining the steps necessary to implement a risk mitigation program and what role it has in the planning for and responding to a natural disaster. Planning for, and responding to, a natural disaster will differ considerably from a man-made disaster. Natural disasters are somewhat predictable and foreseeable, happen based on natural patterns, and their effects can be anticipated. Typical disaster planning and response include the phases of risk assessment, mitigation, planning, response, and recovery. However, natural disasters tend to be overlooked when budgets are tight, the weather is clear, and there has not been a disaster in recent memory. The type and severity of disaster exposure will vary depending upon the geographical location and time of year. Communities may be exposed to hurricanes, tornadoes, earthquakes, fires, volcanoes, or floods. Recent construction sites may be prone to landslides, erosion, and runoff. These threats are often neglected as "the core concept of risk arising from natural hazards is not a fundamental mode of thinking or discourse for policymaking, and in addition is greatly overshadowed nowadays by the issue of terrorism" (Basher, 2008, p.938).  

Wednesday, August 28, 2019

What made Franklin D. Roosevelt such a powerful leader and one of the Essay

What made Franklin D. Roosevelt such a powerful leader and one of the most highly regarded presidents in American history - Essay Example Because of his strong advocacy, the love of freedom is still alive in America today (InfoUSA 1). As a great leader, Franklin Roosevelt devoted his effort to the service of his country. In as much as critics may highlight instances of failure during his presidency, Roosevelt has a legacy as a strong leader in the country’s history. People generally accept that F. D. Roosevelt remains one of the greatest leaders in the world. He served as the 32nd President of the country. Roosevelt was born in New York. His leadership guided the United States and helped it during hard moments. He has been considered a central political figure throughout the world, as well. Roosevelt laid a solid foundation of leadership as a president during his early age. He was bright during his young age and graduated from Harvard University. â€Å"Roosevelt became very active with the school newspaper.† When he undertook studies at Harvard, he spent most of his time in publishing the school newspaper. After he graduated from Harvard, â€Å"Franklin D. Roosevelt joined Columbia Law School.† Various experiences and knowledge helped him win the Senate seat later (Rosenberg 1). As a great leader, Roosevelt made a number of improvements in society. One of the most significant and remarkable things he did, and probably the most successful one, was that he led the United States recovery from the Great Depression (Rosen 130). The Great Depression was an economic decline in the United States. â€Å"Banks in all 48 states had either closed or had placed restrictions on how much money depositors could withdraw.† Most banks were bankrupted during the Great Depression; thus, people could not take their money. Additionally, unemployment rose and people lost their jobs overnight. People suffered during this period. As economic distress increased in the United States, Franklin Roosevelt was elected to be a new president instead of President Hoover in order to save

Tuesday, August 27, 2019

Foundations for Cultural Competence in Arab Culture Case Study

Foundations for Cultural Competence in Arab Culture - Case Study Example A vaginal examination would enable the doctors and nurses to obtain vaginal samples that can be used in the diagnosis. The mother insists that the doctors and nurses should only give prescriptions without the examination, an opinion that contradicts with nursing standards of practice, as well as the definition of evidence-based practice. This paper will describe the best course of action for the nurse. The nurse should demonstrate understanding of Mrs. Nasser’s views and convictions concerning the issue at hand. Evidently, Mrs. Nasser’s concerns have a strong basis because if the virginity of the daughter is under compromise, it can destroy her life, making her a social reject. Therefore, the nurse should reassure Mrs. Nasser that her concerns are worth proper consideration. However, the nurse should also explain that prescription without diagnosis poses serious health risks and that it is unacceptable (Purnell, 2013). The nurse should elaborate the possibility of carrying out a vaginal exam that does compromise the virginity of the young girl. The nurse should depict a high level of understanding while giving Mrs. Nasser and her daughter the reassurance they need. Notably, nurses play a critical role in helping patients understand the available treatment procedures and choices. Moreover, nurses should provide patients and their family members with the emotional suppo rt required so that they can be willing to accept the available treatment options. Finally, nurses should prove to be highly culturally competent. Nurses should be able to exhibit culturally congruent behaviors and attitudes when delivering care to different communities. In this case, the nurse should demonstrate respect for the Arab culture. In addition, the nurse should have the required skills to carry out a culturally congruent assessment in order to determine the underlying beliefs and the opinions of both Mrs. Nasser and her daughter (Songwathana & Siriphan, 2015).

Monday, August 26, 2019

Business Essay Example | Topics and Well Written Essays - 1500 words - 11

Business - Essay Example As the Sjostrand and Tyrstrup (2001) reaffirm ‘leadership is all about managing creativity’. Thus, any new business needs to be conceptualized in terms of the changing paradigms of business environment. It is also important to identify factors and issues that would help meet the challenges with efficiency and unmatched proficiency. Hence, vision and mission of the business become intrinsic part of conceptualization of a business. Friendly Coffee Bar (FCB) would enter into this field with the express vision of being a one point service provider for quality coffee, prepared to satisfy the tastes of their customers ensuring adequate consideration to the environmental imperatives and social responsibilities. The mission statements of the Friendly Coffee Bar are designed to meet the needs and requirements of the customers through well planned strategy which would help fulfil the long term vision of the organization. Become the best service provider in the field of fresh coffee and deliver services in the hi-tech ambience providing relaxing environment with background music, television with headset, books and journal so that people can de-stress in comfort in short time. FCB would be a trendy, state of the art coffee shop that would provide quality and fresh coffee to its target customers. The outlet would also educate people about the qualities of the coffee from different laces and fine techniques of roasting coffee beans to generate the distinct aroma, thus establishing personal relationship with the customers. Special consideration would be paid to the needs and requirements of the customers. The formation of the shop would be a proprietorship enterprise under the service industry, specializing in soft drinks and beverages. Compliance under the state laws and local development agency would be followed, ensuring quality service at competitive prices. The fast changing socio economic

Sunday, August 25, 2019

Careers and Development Assignment Example | Topics and Well Written Essays - 2500 words

Careers and Development - Assignment Example Almost every job undergoes change in the fast moving business environment requiring intensive training to the staff to meet those changes (Self Improvement). Another reason that makes career training important to individuals is their own career progression. Even in cases where there is no change in the industry in which one person is working career training could make their promotions faster. Competitive business environment in particular will necessitate an employee to undergo as much career related as possible to further their career. This has given rise to different approaches to career management and training and development. This paper analyzes the importance of career management and training and development to improve the marketability and employability. It is always the case with a majority of the organisations that the career management of the employees remains peripheral. This situation is mainly due to the attitude of the organisation to look into career management as optional which results in a lack of time and resources as well as the commitment from the management dedicated to such a strategy. Career management also requires a long term commitment which very often is overlooked in favour of the short term organisational expectations. In order that career management activities are made into an effective strategy it is linked both to business strategies as well as Human Resources Management strategies. The major objective of career management as perceived by a majority of organisations is to develop future leaders. But in the present day business context this objective alone can not meet the talent requirements of any organisation. Hence it is not enough if the organisations talk only about opportunities for advancement and progression within the organisation but also about the marketability and employability of the employees. This calls for the filling the future skill gaps and thereby retaining the employees. This again calls for the organisation developing strategies with respect to career management that cover all the employees and support all of their activities towards individual and organisational advancements. Another shortcoming with the career management policies of the organisations is that they carry the discussion relating to the career management at the fag end of the performance appraisal meetings at which point the employees will not have the opportunity to express their career options. As such the performance appraisal meetings will be ineffective as the individual employees will not be able to voice their opinion about their career advancement if they feel it is going to affect their performance measures. Principles of Career Management Zella King points out the important principles that can make the career management strategy effective to make the employee remain motivated. These principles outline what is expected out of the individual employees also to make their career growth beneficial to them. The following are some of the principles that can ensure the implementation of an effective career management strategy: Consistency The individuals are likely to gather

Saturday, August 24, 2019

SOCIAL SCIENCE (PATIENT NARRATIVE) Essay Example | Topics and Well Written Essays - 3000 words

SOCIAL SCIENCE (PATIENT NARRATIVE) - Essay Example models â€Å"chronic diseases have become more important than the persons who harbor them.† However, there have been shifts to models that consider other factors such as social, psychological and environmental in shaping the context of a disease and illness. An example is the bio-psychosocial model which acknowledges that in a disease context, there are many factors such as behaviour and attitude towards the illness, social as well as psychological factors (Engel, 2012). The narratives from the patients are today extensively applied to explore the patient experiences with illness (Charon 2001; Kleinman 1988). Management of chronic diseases (Huyse, et al., 1999) require a holistic approach where both the patient and the medical team share feelings and emotional characteristics influencing the conditions experienced in the life of the patient. In this assignment, a patient’s story on his experience with diabetes will be explored with an aim to construct the cultural, soci al and psychological meaning and locate the facts in contemporary theoretical perspectives. The real names and hospital where the patient, whose narrative is to be used in this analysis, was encountered have been altered to comply with the NMC guidelines and policies of confidentiality (NMC, 2008). During my placement this year, a 52 year old man, Mr. Browns, walked into our clinic to seek medical attention on his wanting chronic condition. Mr. Browns showed symptoms such as occasional tiredness. He passed out a lot of urine and was continuously in thirst. He had a huge body size which made him feel more tired. He occasionally complained to be allowed to prostrate on the coach as he conversed rather than sitting as other patients did. Mr. Browns was born in London where he lives to date. These symptoms clearly linked Mr. Browns’ condition to type 2 diabetes (Blaxter, 1983). Upon further diagnosis, Mr. Browns’ diabetic condition was found to have escalated to almost severe states and required

Friday, August 23, 2019

A Helpful Hybrid in Search of Integrity Essay Example | Topics and Well Written Essays - 1000 words

A Helpful Hybrid in Search of Integrity - Essay Example Also, there is an abstract, a â€Å"descriptive summary,† at the beginning of this article that has an overall â€Å"sober look† – characteristics that define a scholarly work (ibid., 2011). There is proper in-text referencing and also a comprehensive bibliography at the end of this article, which again is an indication that this is a scholarly resource (ibid., 2011). In the first page itself, there is a description about â€Å"the affiliations† of the author, which suggests that this article is written by a scholar â€Å"who has done research in the field (ibid., 2011). The language of the article is also highly specific to the area of research, which demands certain level of background information from the reader so as to understand it properly. This is yet another indication of it being a scholarly resource. In the review of the previous literature section, this article has reported original past works in the field and has also carried out certain orig inal analysis of the topic. The article published by The Economist (2011) and titled â€Å"Business: The View from the Top, And Bottom; Corporate Culture,† is not a scholarly resource and the source it was published in can be described only as a â€Å"substantive news and general interest† periodical as is classified by the Cornell University website (ibid., 2011). This article is classified so owing to many reasons, they being: 1) there is no abstract; 2) this article is not peer-reviewed; 3) it is not published by any academic publisher; 4) it has no proper referencing and citation; 5) it is not written by a scholar having done background studies on the topic; 6) it is not the outcome of any original research but is only quoting randomly from a recently done research study (ibid., 2011). There is not even an author to this article and it is evident that it is just a quick summary, in the form of news, of a research work carried out elsewhere. The language of this art icle is meant to address laymen rather than those who have some background information on the topic. The article titled â€Å"A Toy Maker’s Conscience† and authored by Jonathan Dee (2007) is not a scholarly resource either. It has been published in a â€Å"substantive news and general interest† periodical such as New York Times (ibid., 2011). A journalist employed by the periodical has written the article and there is no information given on what past research experience on the topic the author has. The very format of this essay does not comply with research writing as there is no abstract given, and there is neither citation of past research work on the topic nor original experimentation or analysis carried out on the topic apart from some personal observations and comments. This article is not peer-reviewed (â€Å"Evaluating Sources,† 2009). The language of the article is meant for light reading and there is nothing serious or scholarly about this artic le. The interview taken and included in this article does not follow the research interview format and the analysis and conclusions made form these interviews do not follow any research methodology. The photograph and advertisements included in the designing of the page in which the article is displayed also suggest that this is not a scholarly resource (â€Å"Distinguishing Scholarly Journals from Other Periodicals,† 2011). The article entitled â€Å"75 Years of Lessons Learned: Chief Executive Officer Values and Corporate Social Responsibility† and authored by Carol-Ann Tetrault Sirsly (2009), which was published in the Journal of Management History, is a scholarly resource because it is peer-reviewed (ibid., 2011). The Journal of Management History, in which it is published, is a peer-reviewed journal and is listed

Thursday, August 22, 2019

Vision Research Paper Example | Topics and Well Written Essays - 2500 words

Vision - Research Paper Example At the end of the process, there is the consolidation of the gains by the organization before ending the process by anchoring the change (Cameron and Mike 187). The success of any organization usually comes about due to the joint efforts of all stakeholders within the organization especially in decision-making. This calls for the engagement of every person within an organization in the coming up with a vision and its communication so that the business achieves its mission and objectives presently and in the future. This underscores the importance of vision to any business that operates in any environment, which must carefully adopt changes especially in its vision to align it with the dynamism of the operational environment. In this work, our focus will be on vision, what and how it should be and the reason for having the vision within an organization. Vision is important to any organization as it will determining the success of the business as it gives the process through which the business is to be run and the expected benefits. This means that having a strong vision and the strategy for executing it is important in the carrying out of change within any organization. According to Kotter, having an effective vision helps the company to define its future by conveying a picture of what it will look like as well as knowing the realistic and attainable goals. The vision also helps in knowing the long-term interests of the employees and guidance on the decision-making goals of the organization. A clear vision for an organization helps in allowing individual initiative and the possibility of having alternatives especially when the conditions within the organization change. According to Kotter, the management of change within an organization is important for the planning and the control off the processes within the organization that are geared towards transforming the way it is run

Hospitality Operation Management Essay Example for Free

Hospitality Operation Management Essay Executive Summary This report is based on the findings from Tripadvisor that aimed to examine theissues of in Bella Vista Hotel and Resort Langkawi and provided therecommendations for improving housekeeping management in the futureexpansion. The findings in this report are according to the comments fromguests who had been staying in Bella Vista Hotel and Resort previously and makethe judgments on those serious issues in this particular hotel. The studyconfirmed the existing of inappropriate hotel housekeeping operation andmanagement would strongly influence the image of hotel and lead this hoteltowards low revenue. This report discusses on four issues of Bella Vista Hoteland Resort which are room hygiene and cleanliness concerns, inappropriatemaintenance, bathroom and amenities as well as inconsistent manpowermanagement and other service. Because of the massive growth of travelers around the world, the guests‟ perception to the hotel rooms have been shifted differently compared the past. Hotel guests are looking forward a comfortableroom and proper hotel management when they are staying in particular hotel toincrease the satisfaction of guests. It is shown that the comments from hotelguests are effective means of evaluating the issues of Bella Vista Hotel andResort and the application of recommendations are highlighted. Introduction to assignment objectives Hospitality environment has always played a key role in the tourism and hotelculture. Lodging or Accommodation with service is the center of any hotel in theworld, but recently, it has been facing many problems. Society nowadays shiftsthe concerns from traditional style with high-class service and room amenities tothe flexibly modern way of saving money or budget oriented style due to thechanges of preferences, economic crisis and other external factors. Guestsbecome smarter and pickier when they choose the hotel to stay. The hotelsattempting to succeed have to forecast what the new trend is. And they alsoshould consider of combining two elements of luxury and budget in one coreproduct   room (Power, 2005).Malaysia is early named as one of the most popular tourist destinationsworldwide. With its significant hot spots, especially in island areas, tourists areincreasingly coming to Malaysia and enjoying their trip with affordable price.Langkawi islands (Malaysia) and its hotels serve a thousand of tourists annually,which means to sustain the quality and quantity, the hotels in this isolated islandput as much effort as possible. With the combination of the custom ers‟  expectation factors such as low rate and high quality in service, the frequency of guests‟ returns inclines tremendously in Langkawi. However, in an isolated area with many issues can be happened, and to solve the problems, it could beanalyzed critically and particularly.

Wednesday, August 21, 2019

Ethical And Legal Analysis Of Mckinnon Case

Ethical And Legal Analysis Of Mckinnon Case This assignment I based upon an article published online on the 15th of May 2009 by popular computing Magazine PC Pro (see appendix A). The article discussed Gary McKinnon who has been accused of hacking a number of United States (US) NASA, Army, Navy, Department of Defence, and Air Force systems. His US prosecutors insist he was acting with malicious intent and that he caused damage worth over $700,000. McKinnon denies acting with malicious intent or that he caused that much damage, citing that his motivation was to search for evidence of secret free fuel, anti-gravity and UFO technologies. McKinnon has stated that the network security was weak and he was able to gain access due to network administrators failing to use secure passwords on high level administrative accounts. Once inside, McKinnon used readily available software called RemotelyAnywhere to take control of machines. The case study identifies that his search became an addiction which took over his life. Rationale The Gary McKinnon case sprung to the headlines in 2001, the media frenzy surrounding the case would support the tagline of the biggest military hack of all time. The case has been open for over nine years now and the end is not yet in sight; indicating that the legal issues within the case are both complex and in no way, easy to dissever. The extensive and drawn-out media coverage adds to the complexity of the issues surrounding the case. This case study has been chosen firstly as it covers a very current issue in hacking. It would seem that hacking cases would only increase in the future as more nations cross the digital divide. Electronic crime is difficult to police and further difficulties arise out of international crimes. The nature of electronic communication and the removal of physical boundaries provide complexities in electronic crime and the control of borderless technologies. This case study has been chosen as it is particularly exposed to ethical questioning as law does not adequately resolve this case. This case study has been chosen for ethical and legal analysis not just for its high profile. Numerous actors can be identified in this case to provide a solid base to apply a pragmatic analysis of ethical issues though the direction of ethical frameworks. Primary actors in this case are identified as the Gary McKinnon and the network administrators responsible for security. Secondary actors have been identified as the makers of RemotelyAnywhere, the software which allowed McKinnon to control machines so easily and the US military who were the owners of the networks and data stored there. Similarly, these actors provide a basis to identify legal issues inherent within the case study. There are sufficient suggestions to argue that laws have been broken by both primary actors in this case. Technology strides on through the digital age where the other side of the world is accessible at our fingertips and a mere four billion IP addresses are not fulfilling needs. For this reason, it cannot be helped but to feel that hacking cases will only increase in scale and/or frequency and perhaps the Gary McKinnon case will be surpassed in the future. At first glance this case appears to be a typical hacking case, where the person committing the offence is acting for purely personal reasons to commit fraud or otherwise take something which isnt theirs to take. However this case differs in that there is no reason to believe that McKinnon was acting with the intent to take anything which was not his or to gain any personal advantage from his actions. Actors objecting to McKinnons actions are those who were responsible for the security of the network and those who owned the network. Ethical Frameworks Modern day normative ethical frameworks are broadly divided into two. Deontology, based on moral intention and input, and conversely Teleology which is centred around the output and end result. Teleological Teleology is the philosophical stance that an action may be critiqued based upon its consequences. It is commonly thought of with the view that the end may justify the means (Edgar, 2002; Bynum and Rogerson, 2006; Weckert, 2007), therefore teleological frameworks are concerned with the end result of an action. Utilitarianism is a type of teleological theory, which emphasises that the end result is important rather than the intentions of an individual. Its main principle is specifically to seek to maximise happiness through consequences (Spinello, 1995). It therefore claims that an action may be judged based wholly upon its usefulness in bringing about happiness. Speaking on utilitarianism it was observed by Velasquez (1992) that the principle assumes all benefits and costs of an action can be measured on a common numerical scale of moral calculus (p.61). To what constitutes happiness and its worth would largely depend upon the individual critiquing the action. For example McKinnon may argue that his happiness in doing this for so long was far greater than the unhappiness caused for the US Government who has lots of money and resources, yet the utilitarian frame work aims to maximise the greatest happiness of all those whose interest is in question. (Lyons, 2003 p.27). So everyone affected must come into consideration, this includes: the network administrators, the US government, McKinnon and the makers of RemotelyAnywhere. It can be argued that McKinnon was attempting to maximise happiness by uncovering secret technologies. However a utilitarian framework is only concerned with the happiness actually brought about as a result from an action (Spinello, 1995) rather than intent. Whilst McKinnon is the primary actor and the main benefiter, in the article he is quoted as saying I think I wanted to be caught, because it was ruining me (Turton, 2009). This indicates that McKinnons happiness was short lived and as a result produced unhappiness from him quitting his job and splitting up with his girlfriend. The makers of the software RemotelyAnywhere subsequently had much publicity, however this is predominantly negative publicity as their software was used to commit crime. A small benefit may be that those wishing to commit crime, would buy their software more, even if this is not its intended purpose. A large amount of unhappiness would come from the owners of the network, the US government. The break-in has caused a large amount of embarrassment for the government, intensified by the claims that the security was weak. Even if the allegations that McKinnon deliberately caused damage are untrue, the cost of finding, tracking and fixing the break-in may be more co stly than the actual offense (Baase, 2003). This could be gauged both in terms of money and time. Utilitarian ethics assumed happiness can be somehow calculated. An action can be deemed correct if the total good minus the total bad is greater than that of an alternative (Sinnott-Armstrong, 2006). It is emphasised that the happiness is calculated based upon everyone who would be affected by the action. This is opposite to egoism, which is only concerned with the happiness of the individual undertaking the action (Johnson, 2001; Spinello, 1995). Based upon egoism, McKinnons actions are justified as he was acting purely for his own enjoyment with disregard for anyone else. However as he was caught, the sentence he will most likely receive may outweigh his current happiness. In weighing up the good verses the bad consequences of an action, the distinction must be made between act utilitarians and rule utilitarians. Baase (2003) gives the explanation that rule utilitarianism, applies the utility principle not to individual actions but to general ethical rules. (p.406). In evaluating this case study, it would be difficult to agree that computer hacking is always okay, as this is an invasion of privacy therefore creates much unhappiness. However an argument for applying this as a general rule may be given, as hacking large, private and ungoverned organisations such as the army navy or NASA would ultimately lead to them being more truthful and open about matters. Being honest and encouraging others to be truthful is something that a rule utilitarian would certainly agree with. This argument is of course independent of the allegations that McKinnon caused damage in his apparent search for secrets. The long term effects, in rule utillitarians perspective, coul d be that hacking prestigious governmental networks may cause panic amongst other network administrators or individuals which wish to have their data kept secure. It could likely lead those responsible in this case to lose their jobs. Knowing that data is not private and may be scrutinised can lead to individuals acting differently than they would otherwise; perhaps to the extent that inhibits them from doing their job as well as they otherwise would (Johnson, 2001). Allowing hacking to be justified in all cases may even lead to questioning if electronic data can be kept securely at all! Alternatively, had McKinnon uncovered evidence of UFO technology, the happiness generated would perhaps be greater than unhappiness, and may then be justifiable. Rule utilitarianism fails to foresee the inherent difficulties in predicting the consequences of every act of computer hacking, therefore it is difficult to apply from a practical point of view. Although it may be idealist to conclude that this is would only be suitable for a hindsight evaluation, a rule utilitarian would insist all other cases come into consideration. This is unrealistic and inherently flawed. Act utilitarianism is only concerned with the current action under scrutiny. In applying this to the current case study it was believed by McKinnon that the resulting happiness would far outweigh that of unhappiness. However Johnson (2001) highlights that in making decisions on current actions, the norm or general rules may only be à ¢Ã¢â€š ¬Ã‚ ¦abandoned in situations where it is clear more happiness will result from breaking them. (p.40). McKinnon acknowledges in the case that he gained little in evidence of UFO activity. It is presented that his motivation was to prove the US was withholding information on technologies including anti-gravity propulsion and free energy (Turton, 2009). However, McKinnon alluded to his friends that he had found little or no evidence. Bynum and Rogerson (2006) agree that in a utilitarian framework The risk and probabilities count alsoà ¢Ã¢â€š ¬Ã‚ ¦ (p.72). As McKinnon says that there was little previous evidence of UFO technology then surely accordi ng to a rule utilitarian he should not have ignored the general rule as it was not clear that his actions would result in greater general happiness, consequently it did not. It is identified in the case that McKinnon was only able to access the network due to the action of network administrators in leaving accounts without passwords. The actions of the network administrators would seem unethical under a utilitarian framework when considering the alterative of setting a strong password, which would have had a more desirable effect. Whilst it was not known in this case study if setting passwords would have denied McKinnon unauthorised access, the risk of not setting passwords, as identified by Bynum and Rogerson (2006), would have been extremely high, and the probability that someone would eventually exploit this also high. Whilst it is likely that this error was made due to carelessness rather than a conscious decision, the assumption is made that this was an action that could have been avoided. However this negligence does not automatically justify unauthorised access, under the utilitarian framework the total happiness must be weighed against unhappines s. The happiness generated by this negligent behaviour would primarily be for network administrators who would have been able to log on to machines without having to type passwords. Happiness would have been given to potential hackers too who were more easily able to access the network. Even though allowing hackers in may not have been intended, a utilitarian framework is purely concerned with consequences (Baase, 2003; Bynum and Rogerson, 2006; Spafford, 2006; Sinnott-Armstrong, 2006). As all affected individuals are judged equal (Bynum and Rogerson, 2006) the happiness of terrorists or other hackers must count as a positive consequence: Regardless of a persons station in life, each person is counts the same when the benefits and harms are added up (Bynum and Rogerson, p.71). Alternatively the US government may argue that the unhappiness was far greater from McKinnons actions due to the number of people that would have been affected by shutting down a network of computers. To take this stance the long term view must be disregard, that McKinnons action highlighted a serious security flaw that could have been exploited by a far more astute hacker. To delve even deeper into the realm of possibilities, by McKinnon hacking and getting caught on this occasion, he could have removed any chance of someone being able to hack US government computers ever again, perhaps at a time when hacking US computers would allow millions of lives to be saved. A common criticism of the utilitarian framework is the assumption that huge unhappiness could be justified upon one person for the sake of ten others. This argument could be countered by forcing the acknowledgement of long term consequences as well as the short term consequences (Johnson, 2001). For example, the case study (appendix A) must try and foresee the long term effects of the action. The majority of these long term effects are known as the act was committed back in 2001. Nether the less the unknown unknowns severely limit the reasoning behind making a decision on utilitarian principles. Even if it is believed all the alternatives, consequences and all individuals which will be affected by the consequences have been identified, how can these be verified? A posteriori knowledge may be useful in identifying these, that is, a decision that has been arrived at after the event or perhaps by applying what has happened before. A large issue arising from utilitarianism is that withou t the benefit of hindsight, it is difficult to apply practical reasoning to identify the outcome of an action. Deontological Deontology was first coined by C. D. Broad when he used it in a term to contrast that of Teleological theories based on outcome. However, a deontological approach could be best personified by the earlier work of Immanuel Kant (1785) in saying The moral worth of an action does not lie in the effect expected from it (p.13). Deontologists argue the morality of an argument is based entirely on intentions of ones actions. Immanuel Kant is often presented as the prime example of a deontologist (Baase, 2003). Kantian ethics argues that it is not the consequence that makes an action right or wrong; it is the intentions of the individual carrying out the action. Kant (1785) argues that It is not necessary that whilst I live I live happily; but it is necessary that so long as I live I should live honourably. (p.13). This statement suggests that upon making an honourable decision, this will be the correct thing to do and therefore Kant must assume that this will likely have good consequences. Deciding upon what is honourable and therefore what would be the right thing to do, is largely dictated by law. However other influences may come from upbringing, social characteristics or religious beliefs; for example, McKinnon may have been influenced by his own background in belief of UFOs. It would appear that McKinnons belief in UFOs influenced his actions. McKinnon hacked military machines in an effort to discover secret UFO technology, which would appear to be in conflict with a deontological framework as he is using the action as a mere means to an end. However, as Johnson (2001) points out, a deontological framework dictates that a decision is not used as just a means to an end; it may be justified if that end is moral. In applying this to the current case study we can define that the end result was to discover hidden UFO technologies; McKinnons means of doing this was through hacking. Even though McKinnon states he did not intend to cause harm, but merely look. This perhaps is justifiable if the end result was intended to give the world knowledge of these technologies. The stumbling block in this case is that McKinnon did not have authorisation to do this. Alternatively if the US Government had agreed that McKinnon may hack their computer system on the condition of not causing any damage and just to look, this would have been entir ely ethical on accordance to a deontological framework. It is difficulty to define McKinnons intent as he did not appear to find such evidence and secondly because he was caught. Kants specific class of deontology states I should never act except in such a way that I can also will that my maxim should become universal law (p.14). This again is similar to that of a rule utilitarian, in that if an action cannot be justified on every occasion, if is unethical. In leaving admin accounts without passwords, the professionalism of network administrators may certainly be placed into question, yet it is difficult to identify a motive behind doing so. The key issue driving deontological ethics is the notion of motives. There does not appear to be a motive being this action just negligence. Johnson describes negligence as a failure to do something that a reasonable and prudent person would have done (Johnson, 2001 p.184). Johnsons definition quite adequately describes the system administrators who may have been responsible for leaving high level administrative accounts without adequate security. Therefore under a deontological framework, the actions of the network administrators was unethical. Apposition to Kantian ethics is largely twofold. Firstly, that Kants philosophy is grounded on a universal duty or maxim that can be accepted across the board, which begs the question of what should be adhered to if an action divides two moral maxims. In hacking military machines, McKinnon can only be acting upon his personal duty to find out the truth about UFO existence, but in doing so, ignored the duty to respect others personal property. This highlights the second major issue with Kants philosophy, which is, which maxim should take priority. The ethical principles outlined by Kant rely upon the basis of moral absolutism. This is contrasted by the views of W.D Ross. Ross defined seven initial or prima facie duties: Duty of beneficence: A duty to help other people (increase pleasure, improve character) Duty of non-maleficence: A duty to avoid harming other people. Duty of justice: A duty to ensure people get what they deserve. Duty of self-improvement: A duty to improve ourselves. Duty of reparation: A duty to recompense someone if you have acted wrongly towards them. Duty of gratitude: A duty to benefit people who have benefited us. Duty of promise-keeping: A duty to act according to explicit and implicit promises, including the implicit promise to tell the truth. (Johnson, 2001) Ross defines these as common duties (but in no way absolute) to be upheld regardless of the situation. For example the duty of promise-keeping may be ignored for the duty of beneficence. In light of Rosss variation of deontological ethics, McKinnons hacking of military machines may only be justified under the reason that he was acting upon his personal duty to find out the truth about UFO existence (the duty of beneficence). But in doing so, ignoring the duty to respect others personal property (the duty of non-maleficence). The predominant issue with applying a deontological framework is identifying the intent of an action, this is also somewhat marred by the fact that McKinnon has not yet been charged. McKinnons truthfulness may be contested because he is bias; he would likely say anything to get out of facing a possible extradition and prison sentence. There are suggestions brought forward from his prosecutors that insist McKinnon caused $700,000 worth of damage. The consequences of his action are disregarded under this framework (Kant, 1785), yet this may suggest that his intentions were not simply to find UFO technology. McKinnons actions would not be justifiable if his intentions were to cause damage. If it can be assumed that McKinnons actions were only to search for evidence then a deontological frame would dictate this is ethically justifiable. However, if Kants view is taken into consideration then is cannot be judged that hacking to search for secret technologies is universally justified. Virtue ethics Virtue ethics dates back to the ancient Greek philosopher Aristotle. Aristotle believed in excellence in human character though upholding virtues (Tavani, 2007; Bynum and Rogerson, 2006). Virtues promote positive character although the list may be very long, such virtues include: responsibility, reliability, self-discipline, modesty, courage and integrity (Bynum and Rogerson, 2006; Johnson, 2001). Whereas utilitarian and deontological frameworks are centred on rules to apply, virtue ethics is about building moral character. In this case study McKinnon displays dishonesty by hacking the network without permission. As virtue ethics ignores the special roles of consequences, duties and social contracts (Tavani, 2007 p.65) therefore McKinnon and the US government must be seen as equals. This exposes McKinnon for acting without due consideration of his actions, and perhaps even foolhardiness to continue breaking in without authorization. Perhaps McKinnon could be seen as courageous for hacking such a powerful establishment, yet acknowledging the roles of the two actors (ibid) removes any hierarchy between the two. The case study beings to light accusations that McKinnon left threatening messages on desktops such as: I am SOLO. I will continue to disrupt at the highest levels. Threatening behaviour is not considered virtuous in Aristolean ideas. Presumably when McKinnon downloaded RemotelyAnywhere, there would have been an end user licence that he would have to agree to before he could use the software. This agreement dictates that the software be used for its intended purpose. McKinnon has showed dishonesty by disobeying this and using the software for hacking. Respect and quality is a key thought in virtue ethics (Bynum and Rogerson, 2006). The network administrators in this case study would not have acted responsibly or with integrity as it is alleged that they failed to take basic measures to ensure the network stayed secure. The US military who owns the network and data held on it, although not directly responsible, would not display reliability as they have been hacked at a time when they should have been on high alert. Rights-based Johnson (2001) described that in a rights-based framework the categorical imperative requires that each person be treated as an end in himself or herselfà ¢Ã¢â€š ¬Ã‚ ¦ (p.47). This statement exemplifies the common parallels between deontological and rights-based ethics. Rights are heavily intertwined with law. For example the Data Protection Act gives individuals the right to know what information is being kept on them. Yet regardless of law, some philosophers argued that all humans possess some natural inherent rights. These rights can be seen as universal or human rights such as the right to life; Spinello (1995) gives the example of how these rights are universal in saying everyone equally shares the right to free speech regardless of nationality or status in society (p.31). Natural or universal rights are derived from the nature of humanity (Baase, 2003). Under rights-based ethics, legal rights come second to natural rights. The values of rights based ethics are similar to the principle for nonmaleficence. Baase (2003) states that, under rights based ethics an act is à ¢Ã¢â€š ¬Ã‚ ¦likely to be ethical if they involve voluntary interactions and freely made exchanges, where parties are not coerced or deceived. (p.407). In the case study there is evidence which suggests that the exchange of data was not done voluntarily. Therefore the action of McKinnon cannot be justified on that principle. Natural or human rights are seen as inherent and must be respected; this implies that an individual has the right not to be interfered with (Johnson, 2001). Therefore the right to privacy is not diminished by the poor security displayed within the case study. Although the network administrators did not set passwords, this does not automatically negate the right not to be interfered with. Similarly if someone forgets to lock their car this does not give someone else the right to take the car. Lax security would not matter if the right to privacy was upheld. The distinction between positive and negative rights must be given in applying a rights-based ethical framework to this case study. A negative right will free an actor from outside intervention, whereas a positive right would give the actor whatever is needed to fulfil an interest (Spinello, 1995). Negative rights are much more common than positive rights as it is difficult to draw the line as to where a positive right is limited. Johnson (2001) highlighted that whereas duty-based ethics is largely seen a deontological framework, it may be derived from a utilitarian principles on occasion. From a utilitarian perspective, in search of the greatest happiness, Mill argued that intellectual happiness was greater than sensual (Spinello, 1995). On the basis of this, it can be argued that McKinnon may have been over exerting his right to further educate himself, but intellectual happiness is greater in Mills brand of teleology, so his actions would be justified. Rights-based ethics derived from intent would argue that McKinnon has gone against the legal right prohibiting him from unauthorised access to the network and that he has also gone against the moral right to respect others privacy. From a rights-based ethical framework, moral rights take prescience over other duties or action people might have (Baase, 2003) therefore McKinnons actiosn cannot be justified. Legal Issues In applying ethical frameworks to any case study, personal morals are heavily intertwined. Law often overrides these morals. For example, ownership of what someone creates may be negated to that of the company which that person works for if that is in their terms of employment. Alternatively something which is viewed as ethically acceptable may also be against the law. At the very least, law influences moral judgement. There is much dispute over which country McKinnon should be tried. In analysing legal issues inherent within the case study it is firstly assumed that only UK laws apply to this case. It is apparent within the case study that Gary McKinnon did not have authorization to access the US networks. Immediately this is in violation of the Computer Misuse Act 1990, which states that an offence is committed if: (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer [or to enable any such access to be secured] ; (b) the access he intends to secure [or to enable to be secured,] is unauthorised; and (c) he knows at the time when he causes the computer to perform the function that that is the case. (Computer Misuse Act 1990, 1990) Clearly McKinnon was in breach of the Computer Misuse Act 1990. The case study acknowledges that McKinnon does not have authorisation and that he intended to access data regarding the existence of UFO technology. The maximum sentence for unauthorised access without intent to commit further offences is 5 years in prison. A more serious offence is committed when unauthorised access is gained à ¢Ã¢â€š ¬Ã‚ ¦ with intent to impair, or with recklessness as to impairing, operation of computer, etc (Computer Misuse Act 1990, 1990) this holds a maximum imprisonment of 10 years. It is unknown and very difficult to determine what the intention of Gary McKinnon was; to date there is no evidence to suggest he intended to commit further crimes with the data he accessed. But claimed from his United States prosecutors indicate that he did intent to cause damage as he left a message on machines stating: à ¢Ã¢â€š ¬Ã‚ ¦I am SOLO. I will continue to disrupt at the highest levels. (Turton, 2009). There are additional legal issues with regards to protecting data held on the network, and the professional requirements expected. It is indicated within the case that no personal information was accessed. This information is given by the US Military, which may be questioned as it would be to their advantage to deny that any personal information was accessed. The Data Protection Act (1998) dictates that the data controller must provide adequate security to protect personal information (Data Protection Act 1998, 1998). Failure to provide adequate security even though an accident is not an excuse as Cambridgeshire County Council most recently found out (du Preez, 2011). A member of staff lost a memory stick by accident; however the memory stick did not have encryption software installed as it should have when it contained sensitive data on it. Similarly the network administrators did not intend for McKinnon to access the network, yet they failed to provide security in the chance of this happening As McKinnon was able to access computer systems easily due to lax security, it is likely that the US and the network administrators would be in breach of this legislation.

Tuesday, August 20, 2019

Public Health Reflective Journal Health And Social Care Essay

Public Health Reflective Journal Health And Social Care Essay Our discussion last Thursday and Friday focused on the Impact of Disease on Health Care Delivery System and Health Social Care. During that time our tutor Kate gave us an activity which we will cite examples have disease affected those areas of health. Things like Financial Issues, Supply and Demands, Lack of Awareness and Knowledge, Skills Shortage and Poor compliance are the cited problems in all groups that occur in a community who are affected with any kinds of disease. We come up this idea of some reasons. Why Financial Issues? Because medicines and manpower are not free which means it needs funding to cope this problem especially when a large portion of individuals who are needed to be rendered with health services. Supply and Demands, still related to financial issues. Lack of Awareness and Knowledge, this contributes the problem because if a community is lack of awareness or knowledge about it health they are very vulnerable to illnesses or diseases. Skills Shortage this pertains to the members of health care system, it talks about how effective are they in rendering their services, are they professional and skilled to give services in an efficient and effective way Another topic we also considered last week was about case study of Philip, that study is very meaningful to us because its talks about Philips health and family problem. That case study gives us information that Health awareness is vital to a human life and we should take care of ourselves. It also gives ideas to health practitioner on how to manage a case that has crucial situation and needs immediate attention. Has this new knowledge changed my understanding? ( have I developed a whole new way of seeing things): Knowing about the topic we tackled last week enlightened my mind on the importance of caring ourselves and a community as a health practitioner. Hearing those facts make me think that we should take care ourselves in many ways like having enough knowledge in health promotion and disease prevention, regular check up to assess our health status whether we are having illness or not, having healthy habit, diet and lifestyle. On the other hand also as a health care provider it is our responsibility to provide health teaching on those individuals we know that needs it or even not because doing this promotes health and gives knowledge to them on avoiding any disease problems. In addition, we should be a role model of health to them because this is one of the effective way were they will believe our health teachings and apply it to their selves. How will I apply this knowledge and understanding in my work situation? In my situation, there are many cases where I can apply this facts and knowledge I gathered in our last weeks discussion. As we know, we can encounter different case of diseases in care homes both communicable and non-communicable disease and we are aware that were susceptible to have that diseases if we are not aware of it. Due to this point, precautions necessary to prevent getting and spread of one disease to another and we can do it by applying the things we discussed about public health in our workplace. In order to avoid ourselves and others from getting any disease we must maintain doing the basic things like hand washing after toileting/diapering, before preparing or eating food, after covering a sneeze or cough, after blowing the nose, before and after treating a sore or wound. Using of proper protective clothing as a first line of defence. 2.) Submitted: 28th of Jan. 2010 Learning a new topic leads to changes in our knowledge and understanding and should also lead to changes in ways of working. Identify any new knowledge, facts or theories that I have learnt from this weeks teaching: Last week, We discussed all the things that are related about public health and itself. I found out that public health is a very broad topic and correlates many components such as health sector, health organisations, etc. I learned that Public Health is vital in helping people to be aware about their health because it promotes good health, prolongs life and prevents society in getting any kind of diseases. It is also a gathered deed for the health of the certain population. In dissemination of all the information related to health, there are agencies that are responsible in data distribution. This agencies and sectors are the one who takes the promotion, prevention, planning, action, and implementation of all the goals in regarding health information dissemination. One of the most common agencies here in United Kingdom is the National Health Service or commonly called NHS. This agency acts as a framework of local organisations responsible for the healthcare of the community and to work with the local community to improve our populations health and well being. There are more agencies that acts or has a role like the NHS in relation to Public Health. On the other hand Health Organisation has a big role in terms of promoting people in health awareness of the community because they are the one who distribute the health information globally such as World Health Organisation. WHO is the organisation that coordinates and directs for health within the United Nations. WHO leads in providing information about global health matters. Every time there is a new case of disease they are the one that conducts the studies on it and share the information all over the globe. For example, last week we had disserted the topic about the different infectious disease ( Swine Flu, Salmonella, HIV/AIDS, Measles, Meningitis, Tuberculosis , and MRSA ) and Non-infectious Disease ( Cancer, Coronary Heart Disease, Cerebro-Vascular Accident, Obesity, Asthma ) which are the products of the studios of WHO. Without WHO we cant gain access or unknowledgeable about these diseases. Match criteria Has this new knowledge changed my understanding? (have I developed a whole new way of seeing things) The topic we discussed doesnt change my understanding about Public Health. The lesson we take up last week adds information about what I know in public health and it makes me understand that it is very important in building healthy community not only in a certain place but globally. It also reminds me that as a health practitioner, we have also the responsibility to share what we have learned about promoting health and preventing diseases. Through this way we can help achieved one of the Public Health goal, which is the Health Awareness. How will I apply this new knowledge and understanding in my work situation? Like what I have said before, we can apply this knowledge by sharing the information about public health and telling them how to prevent diseases. In my situation as an Health Care Assistant in a Care Home, I can share what I have learned by telling to all my colleagues the importance of using protective clothes whilst giving care to a service user and explaining them how to make care a service user who has infectious and non-infectious disease. INTRODUCTION In this assignment, for Part 1, I am going to cite two agencies and named their roles in Public Health in terms of identifying level of health and disease in communities. I will name also epidemiology of two diseases and investigate a chart or graphical form of its incident rate. On other hand I will show the Statistical Data of the two diseases and interpret it base on facts and my understanding. In every agency I will choose two different approaches and strategies in controlling disease and investigate its effectiveness and after that I will make surveillance on how it improves Public Health. In this activity too I need to inspect current priorities to the provision of one disease and gives example on how it relates between prevalence rate, its causes and the requirements for health and social care services. Explore In Part 2, I will do a case study on a given data or on a workplace experience. Analyse its critical factors that affects individuals health then after I am going to put its priorities and evaluate its effectiveness to individuals well being. I will proposed as well changes that can improve its health and set it in action like having implementing campaigns to encourage maximize their health. In this part, I will explain the role of 2 different agencies in identifying levels of health and disease in communities PUBLIC HEALTH It is improving and safeguarding well-being. Public Health is in charge for health safety, health enhancement and health inequalities issues in England. It is responsible moreover for shaping policy, allocating resources, co-ordinating actions and supervising progress. Diagnose and investigate health hazards and health problems in the society. Assess accessibility, effectiveness, and quality of personal and population-based health services. In addition they are the one organised community efforts in aiming prevention of disease and promotion of health. In relation of this, I select two agencies that will partake the goals of public health. There are many agencies that have important roles in the society. I chose two agencies which helps contribute health awareness and protection for any kind of diseases; it is the Department of Health (DOH) and National Health Services (NHS). I will precisely relate this two agency to the two diseases I chose which is the Meningitis and Cerebrovascular Accident. Department of Health has many roles for the society. This agency focuses on issues related to the general health of the citizenry. It also compiles statistics about health issues of their area. It assesses and assures risk management to human health from the environment properly. Promote and protect the health and wellness of the people within the society and community. Promote and protects the public health to prevent disease and illness. Provides research and information for the detection, reporting, prevention, and control of any diseases or health hazard that the department considers to be dangerous that likely affects the public health. Establish a uniform public health program throughout the community which includes continuous service, employment of qualified employees, and a basic program of disease control, vital and health statistics, sanitation, public health nursing, and other preventive heath programs necessary or desirable for the protection of public health. Gather and disseminate information on causes of injury, sickness, death, and disability and the risk factors that contribute to the causes of injury, sickness, death, and disability within the society for their awareness. Implement programs and campaigns necessary or desirable for the promotion or protection of the public health to reduce and control the disease. DOH develops strategic approaches for current health risks. Establish risk analysis framework and maintenance of risk standards. http://www.le.utah.gov/interim/2005/pdf/00000306 National Health Services is a publicly funded healthcare systems in United Kingdom, this agency focus on maintaining peoples health and well-being. This agency is responsible for delivering quality and effective health service to humanity. They also contribute fair access to everyone in relation to peoples need. They are responsible for making payments to independent primary care contractors such as GPs, dentists, opticians and pharmacists in rendering their services to all people who needs it. It provides different caring services such as Emergency Respite Care, where care is provided if an individual; are unable to fulfil your caring responsibilities due to unforeseen circumstances, such as illness.  Domiciliary Care, where somebody comes into your home and takes over some of your responsibilities for a few hours.  Day care centre, where the person you care for spends time at a centre whilst you have a few spare hours to yourself. There are more services rendered by the NHS whi ch develop societies health http://www.health.gov.au/internet/main/publishing.nsf/Content/36D1CF8D85714DBECA25720D001F6860/$File/quaat3.pdf http://www.archive.official-documents.co.uk/document/doh/newnhs/wpaper8.htm In this part, I will investigate the epidemiology of two diseases in graph format and show my understanding and interpretation of the given data: Meningitis is an infection of the meninges, protective membranes that surround the brain and spinal cord. Infection can cause the meninges  to become inflamed and swell, which can damage the nerves and brain. This can cause symptoms such as a severe headache, vomiting, high fever, stiff neck and sensitivity to light. Many people (but not all) also develop a distinctive skin rash. Symptoms can differ in young children and babies. See the symptoms section for more information. Meningitis can be caused by: bacteria, such as streptococcus pneumoniae, the bacteria also responsible for pneumonia, which usually live harmlessly in your mouth and throat, and viruses, such as the herpes simplex virus. Viral meningitis Viral meningitis is the most common and less serious type of meningitis. There are approximately 3,000 cases of viral meningitis reported in England and Wales every year, but experts believe the true number is much higher. This is because in many cases of viral meningitis the symptoms are so mild that they can often be mistaken for flu. Viral meningitis is most common in young children and babies, especially in babies less than one year old. Viral meningitis usually gets better by itself within a couple of weeks, without the need for specific treatment. Bacterial meningitis Bacterial meningitis is extremely serious and should be treated as a medical emergency. If the bacterial infection is left untreated, it can cause severe damage to the brain and infect the blood (septicaemia), leading to death. Treatment requires a transfer to an intensive care unit so the bodys functions can be supported whilst antibiotics are used to fight the infection. There are approximately 2,000 cases of bacterial meningitis in England and Wales every year. The number of cases has dropped sharply in recent years due to a successful vaccination programme that protects against many of the bacteria that can cause meningitis. The treatment for bacterial meningitis has improved greatly. Several decades ago, almost all people with bacterial meningitis would die, even if they received prompt treatment. Now deaths occur in  one in 10 cases, usually as a result of a delay in treatment. Bacterial meningitis is most common in children and babies under the age of three, and in teenagers and young people aged 15-24. The best way to prevent meningitis is to ensure that your familys vaccinations are up to date. Stroke (cerebrovascular accident) A stroke happens when the blood supply to the brain is disturbed in some way. As a result, brain cells are starved of oxygen. This causes some cells to die and leaves other cells damaged. Types of stroke Most strokes happen when a blood clot blocks one of the arteries (blood vessels) that carries blood to the brain. This type of stroke is called an ischaemic stroke. Transient ischemic attack (TIA) or mini-stroke is a short-term stroke that lasts for less than 24 hours. The oxygen supply to the brain is quickly restored and symptoms disappear. A transient stroke needs prompt medical attention because it indicates a serious risk of a major stroke. Cerebral thrombosis is when a blood clot (thrombus) forms in an artery that supplies blood to the brain. Blood vessels that are furred up with fatty deposits (atheroma) make a blockage more likely. The clot prevents blood flowing to the brain and cells are starved of oxygen. Cerebral embolism is a blood clot that forms elsewhere in the body before travelling through the blood vessels and lodging in the brain. In the brain, it starve cells of oxygen. An irregular heartbeat or recent heart attack may make you prone to forming blood clots. Cerebral haemorrhage is when a blood vessel bursts inside the brain and bleeds (haemorrhages). With a haemorrhage, blood seeps into the brain tissue and causes extra damage. (2009) (Meningitis). Available from http://www.nhs.uk/conditions/Meningitis/Pages/Introduction.aspx. [Accessed Feb. 24, 2010] These are the graphs showing the rates of Meningitis and Cardiovascular Accident here in United Kingdom. Source: PHLS Meningococcal Reference Unit Disease Trends Group B- unvaccinated Meningococcal serogroup C Group C- vaccinated with Meningococcal serogroup C conjugate vaccine (MCC) Others Ungroup This graph table shows the effectiveness of meningococcal conjugate vaccine from 1998 2007. As we have seen in the figure, the case reduces every year especially to those who have taken the vaccine. It also shows the successful phased introduction of the meningococcal serogroup C conjugate vaccine (MCC) in 1999 into the National Immunisation Programme in the UK. This graph tells also that the immunity to Meningitis C has been identified in age groups who have not been vaccinated, as bacterium carriage rates are reduced across the population. We can see also in this table that those who didnt take meningococcal vaccine were greatly affective by Meningitis. Source: NOIDS England Wales Final Midi Report for 2005 (Table 3 Final totals for 2005 by sex and age-group) Prevalence of Bacterial Meningitis and Septicaemia by Age Group In this table, we could conclude that ages under 1-4 years old was greatly affected by meningitis as we have seen in the peaks of the graph and 0-11 months was greatly affected by the Pneumococcal and Meningococcal disease. And the same peaks in the number of notifications for the under 4 years and 15-24 age groups can also be seen with meningococcal septicaemia. Source: NOIDS England Wales Final Midi Report for 2005 (Table 3 Final totals for 2005 by sex and age-group) Prevalence of Bacterial Meningitis (without Septicaemia) by Age Group This graph shows the high number of notifications of meningococcal and pneumococcal meningitis (without septicaemia) in England and Wales. Observing this graph will note us that the cases in 2005, age group that is 1 year of age are greatly affected with Meningococcal Meningitis and Pneumococcal Meningitis and 15 to 24 years of age were averagely affected with the certain disease. It also illustrates us that among the group cases under 1 year of age gets the highest peak in having Pneumococcal disease. It is also interesting to note that the pneumococcal meningitis peaks again in the older age groups (45-64 and 65+). Top of Form Bottom of Form This graph shows all the percentages of all six categories are experiencing stroke. Figures for males are in dark gray bars and data for females are in light gray bars, with the number of patients in each age category shown above each bar. All data are patients who are experiencing stroke or CVA. As we observed in the graph the age group from 30 to This illustration shows the Incidence Rate of stroke in United States and United Kingdom. Details are articulated as person per year having stroke in 7 age categories. Individual experiencing strokes, person-years of follow-up was defined as the number of years from birth to the date for first recorded stroke. For individual without strokes, person-years of follow-up were defined as the last available follow-up date during the natural history period. Stroke incidence rates are revealed in data chart beneath the graph. As you see the data its very clear that a UK male has the highest incidence rates. UK Females, US Males and US Females are mostly like has the same incidence rate in occurrence of CVA. In this part, I will choose at least two approaches and strategies that control the incidence of one disease and analyse its effectiveness: As prevention of these diseases and to decrease its rate Department of Health and National Health Services make strategies and campaign to attain their goals. Department of Health formulate the Meningitis C Campaign the purpose of the this campaign was to immunise as many as possible of the countrys 15 million young people and children aged under the age of 18 years in as short a time as possible, immunising those most at risk of disease first. Carrying out of the programme was made according to the risk of disease-those at utmost risk being immunised first. In November 1999, National Childhood Programme introduces the routine immunisation of vaccine at the ages of two, three and four months alongside the DTP, Hib and polio vaccines and in December 1999 adolescent that ages 15 and 17 was also immunised. As a result of the campaign there are around 13 million children have immunised during the first year through the help of general practitioners, nurses, immunisation coordinators and many other health professional. This was pursuing by a widespread draw alongside programme to immunise all other children and adolescents up to the age of 18 years in 2000/2001.   After that the vaccine was made accessible to anyone up to 25 years. National Health Services contributed also a meningitis prevention program here in United Kingdom. The Campaign to promote new Vaccine against Meningitis, this program encouraged all parents to immunised their children against pneumococcal disease which is the causative agent of meningitis. General Practitioners has the big role of this campaign because they are the who will catch-up the campaign for the children ages 0 2 years who is starting their immunisations. This program was imposed by Health Minister Dr. Brian Gibbons. He states that: Immunisation is the best way to protect children from serious disease and the routine childhood programme has been extremely effective in achieving this. The changes will further improve the programme and benefit children. This new vaccine will help save lives and prevent hundreds more cases of serious illness such as meningitis and pneumonia. To maximise the defence against Meningitis C and Hib disease NHS made two changes in the routine program. The present three doses of Meningitis C vaccine will be respaced at three and four months of age with a booster shot at 12 months. Most up-to-date proof shows that the protection offered by this vaccine declines one year after vaccination. To maximise the protection in the first two years of life when the risk of infection is high, we will recommend doses at three and four months of age and a booster dose at 12 months. A booster shot of Hib vaccine will be given at 12 months. In 1992 Hib vaccine was introduced and is presently given to children at two, three and four months of age. Since 1999, there was a small but slow increase in the number of cases in older children being reported. Again, because of this Meningitis prevention program, the disease declined over time. There was a Hib booster campaign happened in 2003. This dose was given to older children to maximise their immunity. This upturned the small increase in infections that had started to occur. A booster dose of Hib vaccine is being added to the childhood immunisation programme as a routine at 12 months to extend protection against Hib disease. The new routine vaccination schedule is as follows: 2 months DTaP/IPV/Hib + pneumococcal vaccine 3 months DTaP/IPV/Hib + MenC vaccine 4 months DTaP/IPV/Hib + MenC + pneumococcal vaccine 12 months Hib/Men C 13 months MMR + pneumococcal vaccine DTaP/IPV/Hib is a single injection that protects against diphtheria, tetanus, pertussis, polio and Hib. MenC protects against meningitis C Hib/ MenC is a combined vaccine protecting against Hib and Meningitis C (2009)( Campaign to promote new Vaccine against Meningitis ) available from www.immunisation.nhs.uk. [Accessed at February 24, 2010] Due to this campaign the rate of meningococcal infection has fallen every year since, and the cases of laboratory-confirmed group C meningococcal disease across all age groups immunised has go down by 90% since the vaccine was implemented. In 2003/04, there were only 65 cases reported and 8 deaths. There was even a good effect in those who were not immunised with a reduction of about 70%, recommending that the vaccine has had a community protection effect. In fact the campaign has been so successful that meningitis C disease now accounts for less than 10% of meningococcal meningitis cases. Even though the campaign made a great success still the health officials and medical professionals need to remain cautious. (2010) ( Meningitis C Campaign) available from http://webarchive.nationalarchives.gov.uk. [Accessed at February 24, 2010] . For Cardiovascular Accident prevention, Department of Health formulated new strategies to fall its rate. They formulated the Stroke: Act F.A.S.T. awareness campaign; F.A.S.T means Face, Arm, Speech, and Time. The Stroke: Act F.A.S.T. awareness campaign aims to teach all health related professionals and the community on the signs of stroke and that prompt emergency treatment can reduce the risk of death and disability. The campaign will notify the community about F.A.S.T. to call 999. F.A.S.T is a simple examination to help people to identify the signs of stroke and be aware of the importance of fast emergency management. Campaign adverts, on Television, radio, internet and flyers, illustrate stroke spreading like fire in the brain to demonstrate that fast emergency action can limit damage and radically raise a persons probability of surviving and of avoiding long-term disability. (2010)( Stroke: Act F.A.S.T. awareness campaign ) available from http://www.dh.gov.uk/en/Publicationsandstatistics. [Accessed at February 24, 2010] If Department of Health has its campaign towards CVA, National Health Services provide also a program to lessen its incidence rate; The National Stroke Awareness Campaign. This campaign is related to F.A.S.T were NHS implemented that all paramedics should know how to assess a person using F.A.S.T before sending them to hospital. They also made a Stroke Association who will support this campaign. This kind of charity is exclusively concerned with fighting stroke towards people in all ages. The charity resources research into prevention, treatment, better methods of rehabilitation and facilitates stroke patients and their families directly through its Rehabilitation and Support Services which include Communication Support, Family and Carer Support, information services, welfare grants, publications and leaflets. In this part, I will investigate current priorities and approaches to the provision of heath services for people with one disease: Treating Meningitis is not easy thing to do because this disease has various types, viral and bacterial meningitis. There is no treatment for Viral Meningitis. The immune system, will create antibodies to annihilate the virus. Until it is known that a child has viral, not bacterial meningitis, he or she will be admitted to the hospital. But once the finding of viral meningitis is complete, antibiotics are stopped, and a child who is recuperating satisfactorily will be sent home. Simply acetaminophen must be given to lessen fevers. Clear fluids and a bland diet including preferred foods should be offered. During recovery, a child desires rest in a gloomy, quiet room. Bright lights, noise and guests may irritate a child with meningitis. Increased anxiety on the brain from build-up of fluid in the meninges is a severe problem. (2010)(Viral Meningitis) available from: http://www.healthscout.com. [Accessed at February 24, 2010) For Bacterial Meningitis may prove fatal within hours. Patients with suspected acute bacterial meningitis should be immediately admitted to the hospital and assessed for whether LP (lichen planus) is clinically safe. Antimicrobials should be given quickly. If LP is late because a CT scan is essential, antibiotic action should be started before the scan and after blood samples have been attained for culture. When the exact organism is recognized and results of susceptibilities are known, treatment can be customized accordingly. After the diagnosis has been confirmed (generally within 12-48 hours of admission to the hospital), the patients antimicrobial therapy can be modified according to the causative organism and its susceptibilities. Supportive therapy, such as fluid replacement, should be continued. Dexamethasone should be continued for Streptococcus pneumoniae, Haemophilus influenzae, and Neisseria meningitides. S pneumoniae (duration of therapy 10-14 days) Penicillin susceptible (minimum inhibitory concentration [MIC] Penicillin intermediate (MIC = 0.1-1.0 microgram/mL): cefotaxime or ceftriaxone Penicillin resistant (MIC à ¢Ã¢â‚¬ °Ã‚ ¥2.0 microgram/mL) or cephalosporin-resistant (MIC à ¢Ã¢â‚¬ °Ã‚ ¥1.0 microgram/mL): vancomycin AND cefotaxime or ceftriaxone. H influenzae (duration of therapy 10-14 days) Beta-lactamase-negative: ampicillin Beta-lactamase-positive: cefotaxime or ceftriaxone. Streptococcus agalactiae (group B streptococci) (duration of therapy 14-21 days) Gentamicin AND ampicillin or benzylpenicillin. Escherichia coli and other gram-negative Enterobacteriaceae: (duration of therapy 21-28 days) Gentamicin AND cefotaxime or ceftriaxone. Listeria monocytogenes (duration of therapy 21-28 days) Gentamicin AND ampicillin or benzylpenicillin. Staphylococcus aureus (duration of therapy depends on microbiological response of CSF and underlying illness of the patient) Methicillin susceptible: nafcillin or oxacillin Methicillin resistant: vancomycin. Staphylococcus epidermidis (duration of therapy depends on microbiological response of CSF and underlying illness of the patient) Vancomycin. Pseudomonas aeruginosa (duration of therapy 21 days) Ceftazidime and gentamicin. Enterococcus species (duration of therapy 21 days) Ampicillin and gentamicin. Acinetobacter species (duration of therapy 21 days) Gentamicin and meropenem. N meningitides (duration of therapy 5-7 days) Penicillin susceptible (MIC Penicillin intermediate (MIC = 0.1-1.0 microgram/mL): cefotaxime or ceftriaxone. (2010) (Bacterial Meningitis) available from: http://bestpractice.bmj.com. [Accessed February 24, 2010] In this part, I will explain by giving examples, the relationship between the prevalence of one disease, its causes and the requirements for health and social care services: Nowadays United Kingdom is still cautious about Meningitis even though the incidence rate is already decreasing radically. To be safe, health organisation are prioritising women and childrens health. They develop a guideline which suggest about ma