Monday, December 30, 2019

Cyber Security Operations Centre ( Csoc ) Investigates And...

Cyber Security Operations Centre (CSOC) investigates and analysis cyber-attacks on UK Networks and provide solutions and means to mitigate future attack. Its job is in cyber forensics and incident response while the Government Computer Emergency Response Team (GovCERT) deals with the public sector organisations on issues relating to computer security incidents, warnings, alerts, assistance and advice to prevent, reduce expose and mitigate attacks. The National Crime Agency formed in Oct 2013 to replace the Serious Organised Crime Agency. It also inherited the National Cyber Crime Unit and Police e-Crime Unit in the fight against organised crime. This is the lead agency in UK law enforcement and works in partnership with other law enforcement agency in the country. MOD Cyber Command and Control. The role of the MOD in the National cyber strategy is to protect and defend its own systems and networks. Bearing this responsibility is the Joint force command (JFC) which is made up of fourteen organisations including the Defence Cyber Operations Group (DCOG). Its role is to ensure the success of military operations through joint capabilities. Under the JFC is the office of the Chief of Defence Intelligence (CDI) and is responsible for Defence Intelligence, providing Defence and its partner agencies with intelligence and assessment. CDI is also responsible for cyber operations. Also under the office of the JFC is the information systems and services organisation (ISS). The

Sunday, December 22, 2019

Analysis Of The Poem Crucible - 1162 Words

Michael DeJesus English 11 Dowling Per. 0 October 27 2014 Crucible Short Answer Questions Act 1 The irony in this statement is that they created this civilization in order to have religious freedom, but they only want religious freedom for themselves The witch-hunt years were a time of general revenge because the grudges that were present in the town turned into witch accusations. It gave people with grudges an opportunity to hurt the people they were against Tituba is the slave of Parris, who is from Barbados. Abigail is the niece of Parris. Her parents died in front of her. She is the main accuser of the witches. Betty is Parris’s daughter who is ill and unconscious at the beginning of the play. Mrs. Putnam believes there are witches in Salem because she thinks her babies died due to witchcraft. Thomas Putnam is bitter because his wife’s brother in law was rejected as a minister. Also, he tries to break his father’s will, which left too much to his step-brother Parris says this because he has brought Abigail in and taken care of her. However, in return, she has brought nothing but trouble. Mary argues that the girls should confess in order to avoid getting a harsh punishment. Abigail rejects this idea. Proctor is a farmer in his thirties. He has a wife and three children. Abigail and John Proctor were having an affair. This was shocking because Abigail is much younger than Proctor. The sign that Betty was bewitched was that she could not stand to hear the Lord’s name.Show MoreRelatedAnalysis Of The Poem The Crucible Ladies And Gentlemen Of The Byron Bay 1206 Words   |  5 Pagesto make its mark. As an avid poetry lover, I wholeheartedly believe that the poem,‘Remembrance’ by Emily Bronte and its complimenting song, ‘Helena’ by My Chemical Romance should be read aloud at the Byron Bay Poetry Festival, as they both touch on such a relevant subject that has been so curiously pondered by both the young and old since the beginning of time. Today, I will analyse both of these truly incredible poems that use aesthetic features such as the powerful theme of life and death, alongRead MoreThe Freedom Writers And Romeo And Juliet905 Words   |  4 Pageswe read Lord Of the Flies and Of Mice and Men among other books were we would always have an easy question followed by an essay. In both of these classes helped me develop structure ca lled tieac which stands for topic, intro to evidence, evidence, analysis, and conclusion. Both my freshmen teachers helped me develop this structure for my essays. Our essays had to be typed in 12 inch font but we didn t have an official format that we had to go by. Sophomore year I had the same English 9 teacher forRead MoreNathaniel Hawthorne s The Mind1900 Words   |  8 Pagesmesmerized by. These men were very successful writers and shared many of the same techniques within their stories. Carl Jung was born July 26, 1875, he died June 6, 1961. He was known for studying the human psychology. He was mainly interested in dream analysis and the collective unconscious. Carl Jung is another successful writer, during his career he was able to meet Sigmund Freud who was a huge inspiration to him. All three men Sigmund Freud, Nathaniel Hawthorne, and Carl Jung all had the same generalRead MoreSupernatural in American Fiction Essay2928 Words   |  12 PagesMankind would never submit to this. He will immediately turn to the darkness. Drawn by his own cords of fear and longing, man will imagine that he is tired of the light and his small, familiar world.3 No amount of rationalization... or Freudian analysis can overcome the thrill of the chimney-corner whisper or the lonely wood.4 Why? Children will always be afraid of the dark and men will always shudder at what they do not understand, yet everyone will continue to seek it. Perhaps it is becauseRead MoreHow To Write Literary Analysis4174 Words   |  17 PagesHow To Write Literary Analysis The Literary Essay: A Step-by-Step Guide When you read for pleasure, your only goal is enjoyment. You might find yourself reading to get caught up in an exciting story, to learn about an interesting time or place, or just to pass time. Maybe you’re looking for inspiration, guidance, or a reflection of your own life. There are as many different, valid ways of reading a book as there are books in the world. When you read a work of literature in an English classRead MoreHAMLET AND ORESTES10421 Words   |  42 Pageswith character, though in the course of the comparison I shall of course consider the situations in which my heroes are placed, and the other persons with whom they are associated. Orestes in Greek occurs in poem is very clearly a traditional character. He after poem, in tragedy after tragedy, varying slightly in each one but always true to type. He is, I think, the most central and typical tragic hero on the Greek stage; and he ^eight if we occurs in no less thanRead MoreRastafarian79520 Words   |  319 PagesJamaicans regard as their cultural contribution to the world. Later I will return to these issues and will demonstrate how they contribute to the routinization of Rastafari in Jamaica. The nature of this book dictates a heavy reliance on documentary analysis. My focus is interpretation not ethnography. Therefore, I have not sought to generate primary data on the movement but to analyze and re-analyze the growing body of scholarly and popular literature on the movement, including sociological and anthropologicalRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pagesof systematic study. Identify the major behavioral science disciplines that contribute to OB. Demonstrate why few absolutes apply to OB. Identify the challenges and opportunities managers have in applying OB concepts. Compare the three levels of analysis in this book’s OB model. MyManagementLab Access a host of interactive learning aids to help strengthen your understanding of the chapter concepts at www.mymanagementlab.com cott Nicholson sits alone in his parents’ house in suburban Boston

Saturday, December 14, 2019

Itt221 Week 1 Research Assignment Part 1 Free Essays

Research Assignment, Part One Brandon Kelly IT221 – E-2 Fall 2011 Instructor: Stephen Todd 12-17-2011 Question 1 – Why does Windows Server 2008 come in different versions? What is the significance of each version? Most editions of Windows Server 2008 are available in x86-64 and IA-32 versions. Windows Server 2008 for Itanium-based Systems supports IA-64 processors. Microsoft has optimized the IA-64 version for high-workload scenarios like database servers and Line of Business (LOB) applications. We will write a custom essay sample on Itt221 Week 1 Research Assignment Part 1 or any similar topic only for you Order Now As such it is not optimized for use as a file server or media server. Microsoft has announced that Windows Server 2008 is the last 32-bit Windows server operating system. Windows Server 2008 is available in the editions listed below, similar to Windows Server 2003. †¢ Windows Server 2008 Standard (IA-32 and x86-64) Windows Server 2008 Standard is one of Microsoft’s entry level server offerings (alongside Windows Web Server 2008) and is one of the least expensive of the various editions available. Both 32-bit and 64-bit versions are available, and in terms of hardware Standard Edition supports up to 4GB of RAM and 4 processors. Windows Server 2008 is primarily targeted and small and mid-sized businesses (SMBs) and is ideal for providing domain, web, DNS, remote access, print, file and application services. Support for clustering, however, is notably absent from this edition. An upgrade path to Windows Server 2008 Standard is available from Windows 2000 Server and Windows Server 2003 Standard Edition. †¢ Windows Server 2008 Enterprise (IA-32 and x86-64) Windows Server 2008 Enterprise Edition provides greater functionality and scalability than the Standard Edition. As with Standard Edition both 32-bit and 64-bit versions are available. Enhancements include support for as many as 8 processors and up to 64GB of RAM on 32-bit systems and 2TB of RAM on 64-bit systems. Additional features of the Enterprise edition include support for clusters of up to 8 nodes and Active Directory Federated Services (AD FS). Windows Server 2000, Windows 2000 Advanced Server, Windows Server 2003 Standard Edition and Windows Server 2003 Enterprise Edition may all be upgraded to Windows Server 2008 Enterprise Edition. †¢ Windows Server 2008 Datacenter (IA-32 and x86-64) The Datacenter edition represents the top end of the Windows Server 2008 product range and is targeted at mission critical enterprises requiring stability and high uptime levels. Windows Server 2008 Datacenter edition is tied closely to the underlying hardware through the implementation of custom Hardware Abstraction Layers (HAL). As such, it is currently only possible to obtain Datacenter edition as part of a hardware purchase. As with other versions, the Datacenter edition is available in 32-bit and 64-bit versions and supports 64GB of RAM on 32-bit systems and up to 2TB of RAM on 64-bit systems. In addition, this edition supports a minimum of 8 processors up to a maximum of 64. Upgrade paths to Windows Server 2008 Datacenter Edition are available from the Datacenter editions of Windows 2000 and 2003. †¢ Windows HPC Server 2008 (Codenamed â€Å"Socrates†) (replacing Windows Compute Cluster Server 2003) Windows HPC Server 2008 R2, the Microsoft third-generation HPC solution, provides a comprehensive and cost-effective solution for harnessing the power of high-performance computing. Out-of-the-box, world-class performance, and scalability enable organizations of all sizes to rapidly deploy solutions ranging from personal HPC workstations to large clusters spanning thousands of nodes. Customers can lower both their operating and capital costs. Windows HPC Server 2008 R2 integrates easily with existing IT infrastructure to enable end users to access HPC resources using familiar Windows-based technologies. With a tightly integrated set of dedicated cluster and parallel development tools, anchored around Visual Studio 2010, developers can build robust and scalable HPC applications easily and quickly. Windows HPC Server 2008 R2 is complemented by a rich ecosystem of SI, ISV, and OEM partners to ensure that customers have access to the applications of their choice and the resources required to successfully run them. †¢ Windows Web Server 2008 (IA-32 and x86-64) Windows Web Server 2008 is essentially a version of Windows Server 2008 designed primarily for the purpose of providing web services. It includes Internet Information Services (IIS) 7. 0 along with associated services such as Simple Mail Transfer Protocol (SMTP) and Telnet. It is available in 32-bit and 64-bit versions and supports up to 4 processors. RAM is limited to 4GB and 32GB on 32-bit and 64-bit systems respectively. Windows Web Server 2008 lacks many of the features present in other editions such as clustering, BitLocker drive encryption, multipath I/O, Windows Internet Naming Service (WINS), Removable Storage Management and SAN Management †¢ Windows Storage Server 2008 (Codenamed â€Å"Magni†) (IA-32 and x86-64) Minimal information found. †¢ Windows Small Business Server 2008 (Codenamed â€Å"Cougar†) (x86-64) for small businesses Minimal information found. Windows Server 2008 for Itanium-based Systems Windows Server 2008 R2 for Itanium-Based Systems delivers an enterprise-class platform for deploying business-critical applications. Scale database, line-of-business, and custom applications to meet growing business needs. Windows Server 2008 R2, SQL Server 2008 R2 and the current 2010 line-up of our Developer Tools, plus associated . NET frameworks, will be the last iterations in each product line t o support the Intel Itanium processor and associated OEM server platforms. Windows Server 2008 Foundation (Codenamed â€Å"Lima†) Windows Server 2008 R2 Foundation is a cost-effective, entry-level technology foundation targeted at small business owners and IT generalists supporting small businesses. Foundation is an inexpensive, easy-to-deploy, proven, and reliable technology that provides organizations with the foundation to run the most prevalent business applications as well as share information and resources. Server Core is available in the Web, Standard, Enterprise and Datacenter editions. It is not available in the Itanium edition. Server Core is simply an alternate installation option supported by some of the editions, and not a separate edition by itself. Each architecture has a separate installation DVD. The 32-bit version of Windows Server 2008 Standard Edition is available to verified students for free through Microsoft’s DreamSpark program. Question 2 – What are the new features or enhancements made to Windows Server 2008? How is Windows Server 2008 different from Windows Server 2003? Core OS improvements †¢ Fully multi-componentized operating system. †¢ Improved hot patching, a feature that allows non-kernel patches to occur without the need for a reboot. Support for being booted from Extensible Firmware Interface (EFI)-compliant firmware on x86-64 systems. †¢ Dynamic Hardware Partitioning o Support for the hot-addition or replacement of processors and memory, on capable hardware. Active Directory improvements †¢ Read-only domain controllers (RODCs) in Active Directory, intended for use in branch office or other scenarios where a domain controller may reside in a low physical security environment. The RODC holds a non-writeable copy of Active Directory, and redirects all write attempts to a Full Domain Controller. It replicates all accounts except sensitive ones. citation needed][clarification needed] In RODC mode, credentials are not cached by default. Moreover, only the replication partner of the RODC needs to run Windows Server 2008. [clarification needed] Also, local administrators can log on to the machine to perform maintenance tasks without requiring administrative rights on the domain. †¢ Restartable Active Directory allows ADDS to be stopped and restarted from the Management Console or the command-line without rebooting the domain controller. This reduces downtime for offline operations and reduces overall DC servicing requirements with Server Core. ADDS is implemented as a Domain Controller Service in Windows Server 2008. Policy related improvements †¢ All of the Group Policy improvements from Windows Vista are included. Group Policy Management Console (GPMC) is built-in. The Group Policy objects are indexed for search and can be commented on. †¢ Policy-based networking with Network Access Protection, improved branch management and enhanced end user collaboration. Policies can be created to ensure greater Quality of Service for certain applications or services that require prioritization of network bandwidth between client and server. Granular password settings within a single domain – ability to implement different password policies for administrative accounts on a â€Å"group† and â€Å"user† basis, instead of a single set of password settings to the whole domain. Disk management and file storage improvements †¢ The ability to resize hard disk partitions without stopping the server, even th e system partition. This applies only to simple and spanned volumes, not to striped volumes. †¢ Shadow Copy based block-level backup which supports optical media, network shares and Windows Recovery Environment. DFS enhancements – SYSVOL on DFS-R, Read-only Folder Replication Member. There is also support for domain-based DFS namespaces that exceed the previous size recommendation of 5,000 folders with targets in a namespace. †¢ Several improvements to Failover Clustering (High-availability clusters). †¢ Internet Storage Naming Server (iSNS) enables central registration, deregistration and queries for iSCSI hard drives. Protocol and cryptography improvements †¢ Support for 128- and 256-bit AES encryption for the Kerberos authentication protocol. New cryptography (CNG) API which supports elliptic curve cryptography and improved certificate management. †¢ Secure Socket Tunneling Protocol, a new Microsoft proprietary VPN protocol. †¢ AuthIP, a Micro soft proprietary extension of the IKE cryptographic protocol used in IPsec VPN networks. †¢ Server Message Block 2. 0 protocol in the new TCP/IP stack provides a number of communication enhancements, including greater performance when connecting to file shares over high-latency links and better security through the use of mutual authentication and message signing. Miscellaneous improvements Windows Deployment Services replacing Automated Deployment Services and Remote Installation Services. Windows Deployment Services (WDS) support an enhanced multicast feature when deploying operating system images. †¢ Internet Information Services 7 – Increased security, Robocopy deployment, improved diagnostic tools, delegated administration. †¢ Windows Internal Database, a variant of SQL Server Express 2005, which serves as a common storage back-end for several other components such as Windows System Resource Manager, Windows SharePoint Services and Windows Server Update Se rvices. It is not intended to be used by third-party applications. †¢ An optional â€Å"Desktop Experience† component provides the same Windows Aero user interface as Windows Vista, both for local users, as well as remote users connecting through Remote Desktop. Question 3 – Why is 64-bit architecture an advantage? Advantages of 64-bit hardware and software Memory addressability Physical memory A 32-bit system architecture can directly address only a 4-GB address space. A 64-bit system architecture that is running a 64-bit edition of Windows Server can support up to 1,024 GB of both physical and addressable memory. Virtual memory The 64-bit editions of Windows Server can address 16 terabytes of virtual memory by using a flat addressing model. Virtual memory is divided equally between virtual address space for applications and the operating system. Even 32-bit applications can benefit from increased virtual memory address space when they are running in a 64-bit environment. For example, although a 32-bit application is still restricted to 4 GB of virtual memory, it no longer has to share that memory space with the operating system. As a result, it receives an effective increase in available virtual memory. Continuous memory Poor performance in 32-bit systems is often not the result of a lack of available memory, but the unavailability of large enough blocks of continuous memory. In a typical Windows SharePoint Services 3. 0 deployment, Windows, Internet Information Services (IIS), common language runtime (CLR), ASP. NET, SharePoint Products and Technologies, SSPs, and MDACs can all claim a portion of a server’s available virtual memory and can leave a 32-bit address space quite fragmented. When the CLR or SharePoint services request new memory blocks, it can be difficult to find a 64-MB segment in the crowded 32-bit address space. A 64-bit system offers practically unlimited address space for user mode processes. Better parallel processing A server that is using 32-bit architecture is limited to 32 CPUs. Improvements in parallel processing and bus architectures enable 64-bit environments to support as many as 64 processors and provide almost linear scalability with each additional processor. Faster bus architecture A 64-bit architecture provides more and wider general-purpose registers, which contribute to greater overall application speed. When there are more registers, there is less need to write persistent data to memory and then have to read it back just a few instructions later. Function calls are also faster in a 64-bit environment because as many as four arguments at a time can be passed in registers to a function. More secure The 64-bit editions of Windows Server offer the following enhanced security features: Buffer overflow protection A buffer overflow occurs when a data buffer is congested with more data than it is designed to handle. In 64-bit editions of Windows Server, the first parameters of a procedure call are passed in registers. As a result, it is less likely that the buffer will overflow, because the correct values have to be set up in registers and the variables and addresses have to be aligned on the stack. Data execution protection The 64-bit processors made by AMD and Intel include hardware support for data execution prevention (DEP). Windows Server uses DEP to prevent malicious code from being able to execute, even when a buffer overrun occurs. Even without a processor that supports DEP, Windows Server can detect code that is running in memory locations where it should not be. Patch Guard Microsoft Patch Guard technology prevents non-Microsoft programs from patching the Windows kernel. This technology prevents kernel mode drivers from extending or replacing kernel services, including system service dispatch tables, the interrupt descriptor table (IDT), and the global descriptor table (GDT). Third-party software is also prevented from allocating kernel stacks or patching any part of the kernel. Better scalability In a 64-bit environment, not only can database servers gain nearly unlimited virtual memory address space, but they also gain support for more physical memory. It is possible for a 64-bit server that is running 64-bit editions of Windows Server and SQL Server to get very large working data sets entirely into RAM, thereby improving performance and scalability. In addition, the number of application servers that are required to support a given user base can be substantially reduced because a 64-bit environment does not require worker processes to cycle as often. This reduced cycling results in fewer lost connections, improved I/O handling, and a better user experience. Lower total cost of ownership All the benefits of 64-bit operation that are listed in the previous sections enable you to do more with less. A 64-bit environment allows you to manage more data, serve more users, and run more applications while using less hardware. By reducing hardware, you are also able to reduce license, operations, and infrastructure costs. It takes up less floor space in your data center and costs less to maintain. Finally, because a Windows SharePoint Services 3. 0 farm that uses 64-bit hardware and software provides more room for growth, you can spend less over time on equipment because the life cycle of your equipment is likely to be longer. Question 4 – Explain the new features of Windows Server 2008, such as Server Core, Virtualization, and PowerShell. What is the role of these features and how will they improve efficiency in administering Windows? Server Core Windows Server 2008 includes a variation of installation called Server Core. Server Core is a significantly scaled-back installation where no Windows Explorer shell is installed. All configuration and maintenance is done entirely through command line interface windows, or by connecting to the machine remotely using Microsoft Management Console. However, Notepad and some control panel applets, such as Regional Settings, are available. Server Core does not include the . NET Framework, Internet Explorer, Windows PowerShell or many other features not related to core server features. A Server Core machine can be configured for several basic roles: Domain controller/Active Directory Domain Services, ADLDS (ADAM), DNS Server, DHCP Server, file server, print server, Windows Media Server, IIS 7 Web server and Hyper-V virtual server. Server Core can also be used to create a cluster with high availability using failover clustering or network load balancing. Andrew Mason, a program manager on the Windows Server team, noted that a primary motivation for producing a Server Core variant of Windows Server 2008 was to reduce the attack surface of the operating system, and that about 70% of the security vulnerabilities in Microsoft Windows from the prior five years would not have affected Server Core. Hyper-V Hyper-V is hypervisor-based virtualization software, forming a core part of Microsoft’s virtualization strategy. It virtualizes servers on an operating system’s kernel layer. It can be thought of as partitioning a single physical server into multiple small computational partitions. Hyper-V includes the ability to act as a Xen virtualization hypervisor host allowing Xen-enabled guest operating systems to run virtualized. A beta version of Hyper-V shipped with certain x86-64 editions of Windows Server 2008, prior to Microsoft’s release of the final version of Hyper-V on 26 June 2008 as a free download. Also, a standalone version of Hyper-V exists; this version only supports the x86-64 architecture. While the IA-32 editions of Windows Server 2008 cannot run or install Hyper-V, they can run the MMC snap-in for managing Hyper-V. Server Manager Server Manager is a new roles-based management tool for Windows Server 2008. It is a combination of Manage Your Server and Security Configuration Wizard from Windows Server 2003. Server Manager is an improvement of the Configure my server dialog that launches by default on Windows Server 2003 machines. However, rather than serve only as a starting point to configuring new roles, Server Manager gathers together all of the operations users would want to conduct on the server, such as, getting a remote deployment method set up, adding more server roles etc. , and provides a consolidated, portal-like view about the status of each role. Windows Powershell Windows PowerShell is Microsoft’s task automation framework, consisting of a command-line shell and associated scripting language built on top of, and integrated with the . NET Framework. PowerShell provides full access to COM and WMI, enabling administrators to perform administrative tasks on both local and remote Windows systems. Question 5 – What is a Read Only Domain Controller (RODC) and what are its advantages? What are the security and administrative issues addressed by a RODC? A read-only domain controller (RODC) is a new type of domain controller in the Windows  Server  2008 operating system. With an RODC, organizations can easily deploy a domain controller in locations where physical security cannot be guaranteed. An RODC hosts read-only partitions of the Active  Directory  Domain  Services (AD  DS) database. Before the release of Windows Server  2008, if users had to authenticate with a domain controller over a wide area network (WAN), there was no real alternative. In many cases, this was not an efficient solution. Branch offices often cannot provide the adequate physical security that is required for a writable domain controller. Furthermore, branch offices often have poor network bandwidth when they are connected to a hub site. This can increase the amount of time that is required to log on. It can also hamper access to network resources. Beginning with Windows Server  2008, an organization can deploy an RODC to address these problems. As a result, users in this situation can receive the following benefits: †¢ Improved security †¢ Faster logon times †¢ More efficient access to resources on the network Inadequate physical security is the most common reason to consider deploying an RODC. An RODC provides a way to deploy a domain controller more securely in locations that require fast and reliable authentication services but cannot ensure physical security for a writable domain controller. However, your organization may also choose to deploy an RODC for special administrative requirements. For example, a line-of-business (LOB) application may run successfully only if it is installed on a domain controller. Or, the domain controller might be the only server in the branch office, and it may have to host server applications. In such cases, the LOB application owner must often log on to the domain controller interactively or use Terminal Services to configure and manage the application. This situation creates a security risk that may be unacceptable on a writable domain controller. An RODC provides a more secure mechanism for deploying a domain controller in this scenario. You can grant a non-administrative domain user the right to log on to an RODC while minimizing the security risk to the Active  Directory forest. You might also deploy an RODC in other scenarios where local storage of all domain user passwords is a primary threat, for example, in an extranet or application-facing role. References – Works Cited â€Å"AD DS: Read-Only Domain Controllers. † Microsoft TechNet: Resources for IT Professionals. Web. 7 Dec. 2011. â€Å"Windows Server 2008. † Wikipedia, the Free Encyclopedia. Web. 12 Dec. 2011. Ward10/08/2007, Keith. â€Å"Top 10 Overlooked Windows Server 2008 Features, Part 2 — Redmond Developer News. † Powering the Windows Software Revolution — Redmond Developer News. Web. 03 Jan. 2012 â€Å"Windows Server 2008 Editions and System Requirements – Techotopia. † Main Page – Techotopia. We b. 05 Jan. 2012. â€Å"Microsoft Windows Server 2008 R2 Editions. † Web. 03 Jan. 2012. â€Å"Windows PowerShell. † Wikipedia, the Free Encyclopedia. Web. 01 Jan. 2012. How to cite Itt221 Week 1 Research Assignment Part 1, Essays

Friday, December 6, 2019

Audit - Assurance and Compliance Client and Third Party

Question: Discuss abot theAudit, Assurance and Compliancefor Client and Third Party. Answer: Introduction The main aim of this assignment is develop deep insight about liability of auditor both towards client and the third party associated with it. Along with this, it also describes about auditors independence whether actual or perceived. Independence of auditor is fundamental to the conduct of quality and effective conduct. Moreover, the assignment also includes description about some cases related to auditors independence. Liability of Auditor towards Client and Third Party Auditors are primarily responsible for the preparation and presentation of financial statement and they are required to perform 100% check over all the items recorded on the account. Along with this, the main role of auditor is to develop qualified audit system containing effective control that protects company against all frauds and mistakes. It is also required by auditor to review financial statement of company in a systematic and appropriate manner informing the company about actual position of its financial statement. Moreover, it is the duty of auditor to inform companys management of any irregularities enclosed with financial report of the company (Plessis, et al., 2010). It is also the responsibility of auditor not to show negligence at the time of working for client and the third party linked to the client. Auditors are also liable to perform their duty with diligence and expertise. Furthermore, negligence is defined as wrongful or careless behaviour that cause breach of duty of care and contractual duty. In case of negligence, auditors can be held liable for the loss or damages suffered by third part associated with the client. As auditors owns a duty of care towards third party for damages or loss incurred as a result of negligent misstatement of the financial reports (Latimer, 2012). In the given case, audit firm King and Queen negligently conduct audit of Impulse Pity Ltd. The auditor gives error free report in 2012 without adequately reviewing the financial statement of the company. As a result of this negligent act, third part EFL provides loan to Impulse Pity Ltd by relying on the report provided by King and Queen (auditor). Therefore, in this case King and Queen are liable to reimburse loss suffered by EFL. As the auditor owned duty of care and he breached that duty and due to that breach loss or damages are suffered by the third party. Similar decision was given by court in case of Columbia Coffee Tea Pty Ltd v Churchill, in this case the Supreme Court of New South Wales held auditor liable towards third party in the condition where there is assumption of responsibility. The facts given in this case explain that an investor brought a case against auditor for the losses suffered by him due to relying on misstated financial report (Barker, 2015). In the given report the debts of the company are understated. Therefore, the court held auditor liable to reimburse losses incurred by investor and the auditor is not only liable towards audited company but also towards third party associated. According to laws of Australia and Auditing standards, the auditor is only liable towards the client and to the third parties associated with the client that takes decision on the basis of reported presented by the client. The auditor will be held liable if any damages of loss incurred to the third party because it is the responsibility of auditor to accurately review the companys records and as a result of auditors negligent act losses incurred to the third party. Moreover, an auditor is not held liable to reimburse the losses or any damage to the third party if there is absence of contractual binding relation between the third party and the client. Furthermore, if special relationship exists between the third party and the auditor then in case the auditor can legally protect its position from being liable to third party. In case of special relationship, if third party linked to the client takes auditors advice regarding overall performance of the company and even after taking advice, the third did not consider it in taking decision regarding the client (McLaughlin, 2015). Then in such a case the third party has no right to take legal action auditor for getting reimbursement of damages or losses. In the given case, if EFL had written to King Queen looking for advice that they intended to give loan to Impulse and were relying on the 2012 audited financial report to assist them in making their decision, then in such condition the auditor will be held liable. But, if the auditor inform the EFL about the real financial condition of the company and after that EFL take decision to grant loan to Impulse on the basis of presented financial report. Then in such condition EFL has no right to file case against the auditor for getting reimbursement of losses. Caparo Industries plc v Dickman, In this case the liability of auditor is limited to reimburse economic loss suffered by third, if that party takes decision by relying on the presented audited report. The facts given in the case explains that Caparo(investor) takes investing decision on the basis of facts presented in the companys financial statement (Monaghan, 2015). But the auditor was neither aware about the existence of Caparo nor the purpose for which the financial statements were used by the company. Then in such case, no duty of care was owned by auditor and therefore was not liable to reimburses third party for damages. Auditors Independence Independence can be defined as the foremost mean by which an auditor demonstrates that he/she can perform the respective work in an objective manner. The primary objective of an audit is to provide expert or independent opinion to the shareholders and to ensure that whether the companys annual account represents fair and true view of companys financial position. Along with this, it helps to identify that whether facts presented in financial statement are sufficient to be relied in order to take accurate investment decisions. Therefore, independent auditor can be defined as certified public accountant involved in examining the financial records and business transactions of a company (Richardson, 2012). The concept of independence of auditor is fundamental to the conduct of quality and effective audit. Along with this, high degree of auditors independence helps to enhance credibility of financial statement and independent audit report will be accepted and respected by all the companys stakeholders. The primary responsibility of an independent auditor is to provide clear picture of companys financial position to all its stakeholders. Therefore, the independent audited report present by auditor is important for all stakeholders in the organization (Needles, et al., 2013). It is important for companys management to identify the reasons of losses so that they can take effective measures to control it. Along with this, it is also important for lenders, investor and creditors to identify the true credibility and profitability position of the company. So they can effective make decision regarding granting loan and making investment in the company. Furthermore, perceived independence is also known as independence in appearance and it is achieved when auditor avoids specifics details and circumstances that are significant and reasonable to be informed to the third party that has understanding of all the significant details (Collings, 2011). Moreover, it is required to have independent v iew of auditor whether actual or perceived in order to increase trustworthiness of the audited report. As per section 140 of APES 110, it is the duty of an auditor to maintain the confidentiality of information of its clients, while conducting audit process. The standard states that there exist professional and business relationships between the auditor and client, which require that the auditor should not reveal any such information to third parties without taking approval of the client. Also, the auditor is also not allowed to use its clients information for seeking any personal benefit (Cameron O'Leary, 2015). However, Australian Accounting Standards permit the auditor to disclose his clients information if it is required by any relevant professional body or statutory body. It is the duty of an auditor to adhere to the applicable rules and regulations along with accounting standards in order to avoid unnecessary legal actions against him. In the presented case, Bob use the certain information of his client, Club Casino to use it in his university assignments. Since, Bob has used the information without taking permission of the client he has breached the duty of confidentiality. In order to properly discharge his duties, Bob must take prior approval of Club Casino to use its information for his personal advantage. According to the accounting standards of Australia, an auditor can be defined as independent identity that provides company with an accountants opinion but who is not an employee of that company or not otherwise associated with the company. It means that an auditor should not be a partner or any other manager or officer of the company for which he/she is doing auditing (Stewart Munro, 2010). In the given case, Wendy has been working as an engagement partner for a number of years. Due to the retirement of company secretary he becomes secretary of the company for that period of time. But in this case, Wendy has no legal authority to perform the audit function of that company as he is already in existing relation with company as an engagement partner. Along with this, as an person associated with the company he may not be able to give unbiased results.It is already stated that an independent auditor is a person who is not associated with company in any way. This means that he may neither be an employee or manger or any person having relation with the auditing client. In the present case, Leo is in relation with foreman of the factory in which he is required to perform the audit. Therefore, he is not able to conduct audit independently in Precision Machinery Limited. Along with this, Leo may not be able to provide valuable and accurate audit report as his opinions and views may be affected by his relationship with client for which audit is required to done (Beekes, et al., 2015). This in turn leads to ineffective and unfair presentation of financial position of company as the report may contain biased results. As per Australian accounting standards, a person holding any shares or security of the company is not allowed to carry out audit of that company. As he/ she is in some way associated with that company. In the present case, Chan Associates are auditors of Classic Reproductions Pty. Limited and in place of outstanding fees company gave him furniture for 50% of value of outstanding fees and 25% shareholding in an unrelated listed company. Therefore, in this case Chain and Associates is entitle to conduct audit in a legal way as he is holding shares in other company and not in the company in which he is performing the auditing functions. Conclusion On the basis of above explanations, it can be concluded that auditor has significant liability towards the client and third party associated with it. Therefore, third party is legally entitled to recover losses or damages as the auditor hold duty of care towards the third party. Moreover, it is also assessed that there is difference between actual and perceived independence of auditor. Therefore, the auditor must conduct audit with actual independence for effective and credible presentation of companys financial position. References Barker, K. (2015). Negligent Misstatement in Australia-Resolving the Uncertain Legacy of Esanda. Ch, 13, 319-344. Beekes, W., Brown, P. and Zhang, Q., (2015). Corporate governance and the informativeness of disclosures in Australia: a re?examination,Accounting Finance,55(4), 931-963. Cameron, R.A. and O'Leary, C., (2015). Improving ethical attitudes or simply teaching ethical codes? The reality of accounting ethics education.Accounting Education,24(4), pp.275-290. Collings, S. (2011). Interpretation and Application of International Standards on Auditing. Australia: John Wiley Sons. Latimer, P. (2012). Australian Business Law. Australia: CCH Australia Limited. Leung, P., Coram, P., and Cooper, B. (2012).Modern Auditing and Assurance Services. Australia: John Wiley Sons. McLaughlin, S. (2015). Unlocking Company Law. UK: Routledge. Monaghan, C. (2015). Beginning Business Law.UK: Routledge. Needles, B., Powers, M. and Crosson, S. (2013). Financial and Managerial Accounting. Australia: Cengage Learning. Plessis, J., Hargovan, A. and Bagaric, M. (2010). Principles of Contemporary Corporate Governance.UK: Cambridge University Press. Stewart, J. and Munro, L., (2010). The impact of audit committee existence and audit committee meeting frequency on the external audit: Perceptions of Australian auditors.International Journal of Auditing,11(1), 51-69.

Friday, November 29, 2019

Heart and Right Atrium free essay sample

The heart is a hollow muscular organ that pumps blood throughout the blood vessels to various parts of the body by repeated, rhythmic contractions. It is found in all animals with a circulatory system, which includes the vertebrates. The adjective cardiac means related to the heart and comes from the Greek , kardia, for heart. Cardiology is the medical speciality that deals with cardiac diseases and abnormalities. The vertebrate heart is principally composed of cardiac muscle and connective tissue. Cardiac muscle is an involuntary striated muscle tissue specific to the heart and is responsible for the hearts ability to pump blood. The average human heart, beating at 72 beats per minute, will beat approximately 2. 5 billion times during an average 66 year lifespan, and pumps approximately 4. 7-5. 7 litres of blood per minute. It weighs approximately in females and in males. Structure The structure of the heart can vary among the different animal species. Cephalopods have two gill hearts and one systemic heart. We will write a custom essay sample on Heart and Right Atrium or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page In vertebrates, the heart lies in the anterior part of the body cavity, dorsal to the gut. It is always surrounded by a pericardium, which is usually a distinct structure, but may be continuous with the peritoneum in jawless and cartilaginous fish. Hagfish, uniquely among vertebrates, also possess a second heart-like structure in the tail. It is located anterior to the vertebral column and posterior to the sternum. It is enclosed in a double-walled sac called the pericardium. The pericardiums outer wall is called the parietal pericardium and the inner one the visceral pericardium. Between them there is some pericardial fluid which functions to permit the inner and outer walls to slide easily over one another with the heart movements. Outside the parietal pericardium is a fibrous layer called the fibrous pericardium which is attached to the mediastinal fascia. This sac protects the heart and anchors it to the surrounding structures. The outer wall of the human heart is composed of three layers; the outer layer is called the epicardium, or visceral pericardium since it is also the inner wall of the pericardium. The middle layer is called the myocardium and is composed of contractile cardiac muscle. The inner layer is called the endocardium and is in contact with the blood that the heart pumps. Also, it merges with the inner lining of blood vessels and covers heart valves. The human heart has four chambers, two superior atria and two inferior ventricles. The atria are the receiving chambers and the ventricles are the discharging chambers. During each cardiac cycle, the atria contract first, forcing blood that has entered them into their respective ventricles, then the ventricles contract, forcing blood out of the heart. The pathway of the blood consists of a pulmonary circuit and a systemic circuit which function simultaneously. Deoxygenated blood from the body flows via the vena cava into the right atrium, which pumps it through the tricuspid valve into the right ventricle, whose subsequent contraction forces it out through the pulmonary valve into the pulmonary arteries leading to the lungs. Meanwhile, oxygenated blood returns from the lungs through the pulmonary veins into the left atrium, which pumps it through the mitral valve into the left ventricle, whose subsequent strong contraction forces it out through the aortic valve to the aorta leading to the systemic circulation. In fish Primitive fish have a four-chambered heart, but the chambers are arranged sequentially so that this primitive heart is quite unlike the four-chambered hearts of mammals and birds. The first chamber is the sinus venosus, which collects deoxygenated blood, from the body, through the hepatic and cardinal veins. From here, blood flows into the atrium and then to the powerful muscular ventricle where the main pumping action will take place. The fourth and final chamber is the conus arteriosus which contains several valves and sends blood to the ventral aorta. The ventral aorta delivers blood to the gills where it is oxygenated and flows, through the dorsal aorta, into the rest of the body. . thus, only in birds and mammals are the two streams of blood – those to the pulmonary and systemic circulations – permanently kept entirely separate by a physical barrier. In the human body, the heart is usually situated in the middle of the thorax with the largest part of the heart slightly offset to the left, although sometimes it is on the right, underneath the sternum. The heart is usually felt to be on the left side because the left heart is stronger . The left lung is smaller than the right lung because the heart occupies more of the left hemithorax. The heart is fed by the coronary circulation and is enclosed by a sac known as the pericardium; it is also surrounded by the lungs. The pericardium comprises two parts: the fibrous pericardium, made of dense fibrous connective tissue, and a double membrane structure containing a serous fluid to reduce friction during heart contractions. The heart is located in the mediastinum, which is the central sub-division of the thoracic cavity. The mediastinum also contains other structures, such as the esophagus and trachea, and is flanked on either side by the right and left pulmonary cavities; these cavities house the lungs. The apex is the blunt point situated in an inferior direction. A stethoscope can be placed directly over the apex so that the beats can be counted. It is located posterior to the 5th intercostal space just medial of the left mid-clavicular line. In normal adults, the mass of the heart is 250–350 grams, or about twice the size of a clenched fist, but an extremely diseased heart can be up to 1000 g in mass due to hypertrophy. It consists of four chambers, the two upper atria and the two lower ventricles. Functioning In mammals, the function of the right side of the heart is to collect de-oxygenated blood, in the right atrium, from the body and pump it, through the tricuspid valve, via the right ventricle, into the lungs so that carbon dioxide can be exchanged for oxygen. This happens through the passive process of diffusion. The left side collects oxygenated blood from the lungs into the left atrium. From the left atrium the blood moves to the left ventricle, through the bicuspid valve, which pumps it out to the body . On both sides, the lower ventricles are thicker and stronger than the upper atria. The muscle wall surrounding the left ventricle is thicker than the wall surrounding the right ventricle due to the higher force needed to pump the blood through the systemic circulation. Starting in the right atrium, the blood flows through the tricuspid valve to the right ventricle. Here, it is pumped out the pulmonary semilunar valve and travels through the pulmonary artery to the lungs. From there, oxygenated blood flows back through the pulmonary vein to the left atrium. It then travels through the mitral valve to the left ventricle, from where it is pumped through the aortic semilunar valve to the aorta. The aorta forks and the blood is divided between major arteries which supply the upper and lower body. The blood travels in the arteries to the smaller arterioles and then, finally, to the tiny capillaries which feed each cell. The deoxygenated blood then travels to the venules, which coalesce into veins, then to the inferior and superior venae cavae and finally back to the right atrium where the process began. The heart is effectively a syncytium, a meshwork of cardiac muscle cells interconnected by contiguous cytoplasmic bridges. This relates to electrical stimulation of one cell spreading to neighboring cells. Some cardiac cells are self-excitable, contracting without any signal from the nervous system, even if removed from the heart and placed in culture. Each of these cells have their own intrinsic contraction rhythm. A region of the human heart called the sinoatrial node, or pacemaker, sets the rate and timing at which all cardiac muscle cells contract. The SA node generates electrical impulses, much like those produced by nerve cells. Because cardiac muscle cells are electrically coupled by inter-calculated disks between adjacent cells, impulses from the SA node spread rapidly through the walls of the artria, causing both artria to contract in unison. The impulses also pass to another region of specialized cardiac muscle tissue, a relay point called the atrioventricular node, located in the wall between the right atrium and the right ventricle. Here, the impulses are delayed for about 0. 1s before spreading to the walls of the ventricle. The delay ensures that the artria empty completely before the ventricles contract. Specialized muscle fibers called Purkinje fibers then conduct the signals to the apex of the heart along and throughout the ventricular walls. The Purkinje fibres form conducting pathways called bundle branches. This entire cycle, a single heart beat, lasts about 0. 8 seconds. The impulses generated during the heart cycle produce electrical currents, which are conducted through body fluids to the skin, where they can be detected by electrodes and recorded as an electrocardiogram . The events related to the flow or blood pressure that occurs from the beginning of one heartbeat to the beginning of the next is called a cardiac cycle. The SA node is found in all amniotes but not in more primitive vertebrates. In these animals, the muscles of the heart are relatively continuous and the sinus venosus coordinates the beat which passes in a wave through the remaining chambers. Indeed, since the sinus venosus is incorporated into the right atrium in amniotes, it is likely homologous with the SA node. In teleosts, with their vestigial sinus venosus, the main centre of coordination is, instead, in the atrium. The rate of heartbeat varies enormously between different species, ranging from around 20 beats per minute in codfish to around 600 in hummingbirds. From splanchnopleuric mesoderm tissue, the cardiogenic plates develop cranially and laterally to the neural plates. In the cardiogenic plates, two separate angiogenic cell clusters form on either side of the embryo. The cell clusters coalesce to form an endocardial heart tube continuous with a dorsal aorta and a vitteloumbilical vein. As embryonic tissue continues to fold, the two endocardial tubes are pushed into the thoracic cavity, begin to fuse together, and complete the fusing process at approximately 22 days. The human embryonic heart begins beating at around 22 days after conception, or five weeks after the last normal menstrual period . The first day of the LMP is normally used to date the start of the gestation . The human heart begins beating at a rate near the mother’s, about 75–80 beats per minute . The embryonic heart rate then accelerates linearly by approximately 100 BPM during the first month to peak at 165–185 BPM during the early 7th week after conception, . This acceleration is approximately 3. 3 BPM per day, or about 10 BPM every three days, which is an increase of 100 BPM in the first month. The regression formula which describes this linear acceleration before the embryo reaches 25mm in crown-rump length, or 9. 2 LMP weeks, is: the Age in days EHR+6. After 9. 1 weeks after the LMP, it decelerates to about 152 BPM during the 15th week post LMP. After the 15th week, the deceleration slows to an average rate of about 145 BPM, at term. There is no difference in female and male heart rates before birth. History of discoveries The valves of the heart were discovered by a physician of the Hippocratean school around the 4th century BC, although their function was not fully understood. On dissection, arteries are typically empty of blood because blood pools in the veins after death. Ancient anatomists subsequently assumed they were filled with air and served to transport it around the body. Philosophers distinguished veins from arteries, but thought the pulse was a property of arteries themselves. Erasistratos observed that arteries cut during life bleed. He ascribed the fact to the phenomenon that air escaping from an artery is replaced with blood which entered by very small vessels between veins and arteries. Thus he apparently postulated capillaries, but with reversed flow of blood. The Greek physician Galen knew blood vessels carried blood and identified venous and arterial blood, each with distinct and separate functions. Growth and energy were derived from venous blood created in the liver from chyle, while arterial blood gave vitality by containing pneuma and originated in the heart. Blood flowed from both creating organs to all parts of the body, where it was consumed and there was no return of blood to the heart or liver. The heart did not pump blood around, the hearts motion sucked blood in during diastole and the blood moved by the pulsation of the arteries themselves. Galen believed the arterial blood was created by venous blood passing from the left ventricle to the right through pores in the interventricular septum, while air passed from the lungs via the pulmonary artery to the left side of the heart. As the arterial blood was created, sooty vapors were created and passed to the lungs, also via the pulmonary artery, to be exhaled.

Monday, November 25, 2019

Ethics and the Internet Essays

Ethics and the Internet Essays Ethics and the Internet Paper Ethics and the Internet Paper Essay Topic: A Very Old Man With Enormous Wings The Internet and social networking are offering a number of new clinical and ethical challenges for those who provide face-to-face mental health services. These challenges include extra-therapeutic contacts between therapists and their clients, questions about what distinguishes personal and professional activities online, and a lack of clearly developed policies related to our online behaviors and interactions. No form of client communication is 100 percent guaranteed to be private. Conversations can be overheard, e-mails can be sent to the wrong recipients and phone conversation can be listened to by others. But in todays age of e-mail, Facebook, Twitter and other social media, psychologists have to be more aware than ever of the ethical pitfalls they can fall into by using these types of communication. Its easy not to be fully mindful about the possibility of disclosure with these communications because we use these technologies so often in our social lives,   says Stephen Behnke, PhD, JD, director of APAs Ethics Office. Its something that we havent gotten into the habit of thinking about.   The Monitor sat down with Behnke to discuss the ethical aspects of the Internet for psychology practitioners and how to think about them. Does the APA Ethics Code guide practitioners on social media? Yes. The current Ethics Code was drafted between 1997 and 2002. While it doesnt use the terms social media,  Google or Facebook, the code is very clear that it applies to all psychologists professional activities and to electronic communication, which of course social media is. As we look at the Ethics Code, the sections that are particularly relevant to social media are on privacy and confidentiality, multiple relationships and the section on therapy. The Ethics Code does not prohibit all social relationships, but it does call on psychologists to ask, How does this particular relationship fit with the treatment relationship?   Is the APA Ethics Office seeing any particular problems in the use of social media? Everyone is communicating with these new technologies, but our ethical obligation is to be thoughtful about how the Ethics Code applies to these communications and how the laws and regulations apply. For example, if you are communicating with your client via e-mail or text messaging, those communications might be considered part of your clients record. Also, you want to consider who else might have access to the communication, something the client him- or herself may not be fully mindful of. When you communicate with clients, the communication may be kept on a server so anyone with access to that server may have access to your communications. Confidentiality should be front and center in your thinking. Also, consider the form of communication you are using, given the kind of treatment you are providing. For example, there are two very different scenarios from a clinical perspective: In one scenario, youve been working with a client face-to-face and you know the clients clinical issues. Then the client goes away on vacation and you have one or two phone sessions, or a session or two on Skype. A very different scenario is that the psychologist treats a client online, a client he or she has never met or seen. In this case, the psychologist has to be very mindful of the kind of treatment he or she can provide. What sorts of issues are appropriate to treat in that manner? How do the relevant jurisdictions laws and regulations apply to the work you are doing? Thats an example of how the technology is out in front of us. We have this wonderful new technology that allows us to offer services to folks who may never have had access to a psychologist. At the same time, the ethical, legal and regulatory infrastructure to support the technology is not yet in place. A good deal of thought and care must go into how we use the technology, given how it may affect our clients and what it means for our professional lives. APA needs to be involved in developing that ethical, legal and regulatory infrastructure and needs to be front and center on this. What do you want members to know about using Facebook? People are generally aware that what they put on their Facebook pages may be publicly accessible. Even with privacy settings, there are ways that people can get access to your information. My recommendation is to educate yourself about privacy settings and how you can make your page as private as you want it to be [see further reading box on page 34]. Also, educate yourself about how the technology works and be mindful of the information you make available about yourself. Historically, psychology has talked a lot about the clinical implications of self-disclosure, but this is several orders of magnitude greater, because now anyone sitting in their home or library with access to a terminal can find out an enormous amount of information about you. Facebook is a wonderful way to social network, to be part of a community. And of course psychologists are going to use this, as is every segment of the population. But psychologists have special ethical issues they need to think through to determine how this technology is going to affect their work. These days, students are inviting professors to see their Facebook pages and professors are now privy to more information on their students lives than ever before. Whats your advice on this trend? Psychologists should be mindful that whether teaching, conducting research, providing a clinical service or acting in an administrative capacity, they are in a professional role. Each role comes with its own unique expectations, and these expectations have ethical aspects. I would encourage a psychologist whos considering whether to friend a student to think through how the request fits into the professional relationship, and to weigh the potential benefits and harms that could come from adding that dimension to the teaching relationship. Of course, the professor should also be informed about the schools policy concerning interacting with students on social networking sites. How about Googling clientsshould you do this? In certain circumstances, there may be a good reason to do a search of a client. There may be an issue of safety, for example. In certain kinds of assessments, it might be a matter of confirming information. But again, we always need to think about how this fits into the professional relationship, and what type of informed consent weve obtained. Curiosity about a client is not a clinically appropriate reason to do an Internet search. Lets put it this way: If you know that your client plays in a soccer league, it would be a little odd if on Saturday afternoon you drove by the game to see how your client is doing. In the same way, if youre doing a search, thinking, What can I find out about this person  that raises questions about the psychologists motives? What about Twitter? Again, you first want to think about what are you disclosing and what is the potential impact the disclosure could have on the clinical work. Also, if you are receiving Tweets from a client, how does that fit in with the treatment? These questions are really interesting because they are pushing us to think clearly about the relationship between our professional and personal lives. We all have our own social communities and networks, but we also have to be aware about how we act and what we disclose in those domains, which are more accessible. Someone might say that this technology isnt raising new questions, its raising old questions in different ways. How about blogs? Be aware that when you author a blog, youre putting a lot of yourself into it. Thats why youre doing it. So again, you need to be mindful of the impact it will have on your clinical work. It also depends on what the blog is about. For example, if youre blogging about religion, politics or movies, in this day and age, some of your clients are going to read the material. If you are sharing your personal views on some important societal issue, be mindful of how that might affect the work you are doing. When is the next Ethics Code due out and will it more specifically address social media? The next revision hasnt been scheduled, but if I had to guess, probably in the next two to three years, APA will begin the process of drafting the next code. I can say with a very high degree of confidence that when APA does draft the next code, the drafters will be very mindful of many issues being raised by social media. Its important to think about ethics from a developmental perspective. As our field evolves, new issues emerge and develop. Not all the questions about social media have crystallized yet. We have to make sure that we have a pretty good sense of the right questions and the right issues before we start setting down the rules. Part of that process is exploring where the potential harms to our clients are. We are just defining the questions, issues, the risks of harm to the client and were going to have to let the process unfold. In the meantime, we have to be aware that these technologies are very powerful and far-reaching and bring with them wonderful benefits, but also potential harms. Stay tuned. As his patient lay unconscious in an emergency room from an overdose of sedatives, psychiatrist Damir Huremovic was faced with a moral dilemma: A friend of the patient had forwarded to Huremovic a suicidal e-mail from the patient that included a link to a Web site and blog he wrote. Should Huremovic go online and check it out, even without his patients consent? Huremovic decided yes; after all, the Web site was in the public domain and it might contain some potentially important information for treatment. When Huremovic clicked on the blog, he found quotations such as this: Death makes angels of us all and gives us wings. A final blog post read: I wish I didnt wake up. Yet as Huremovic continued scanning the patients personal photographs and writings, he began to feel uncomfortable, that perhaps hed crossed some line he shouldnt have. Across the country, therapists are facing similar situations and conflicted feelings. When Huremovic, director of psychosomatic medicine services at Nassau University Medical Center in New York, recounted his vignette last year at an American Psychiatric Association meeting and asked whether others would have read the suicidal mans blog, his audience responded with resounding calls of both yes! and no! One thing was clear: How and when a therapist should use the Internet and even whether he or she should are questions subject to vigorous debate. We are just beginning to understand what ethical issues the Internet is raising, says Stephen Behnke, ethics director for the American Psychological Association. To write rules that allow our field to grow and develop and yet prevent [patient] harm at the same time: Thats the challenge. In fact, the tremendous availability online of personal information threatens to alter what has been an almost sacred relationship between therapist and patient. Traditionally, therapists obtained information about a patient through face-to-face dialogue. If outside information was needed, the therapist would obtain the patients consent to speak with family members or a previous mental-health practitioner. At the same time, patients traditionally knew little about their therapists outside the consulting room. Now, with the click of a mouse, tech-savvy therapists and patients are challenging the old rules and raising serious questions about how much each should know about the other and where lines should be drawn. Among the questions under debate: Should a therapist review the Web site of a patient or conduct an online search without that patients consent? Is it appropriate for a therapist to put personal details about himself on a blog or Web-site or to join Facebook or other social networks? What are the risks of having patients and therapists interact online? Neither the American Psychiatric Association nor the American Psychological Association has rules specifically governing therapists online behavior, but ethics advisers with the psychiatric association maintain that online searches are not wrong as long as theyre done in the patients interest and not out of therapist curiosity. Many therapists contend its more important to discuss such questions than it is to dictate behavior. Its not whether a particular application is right or not, says Sheldon Benjamin, director of neuropsychiatry at the University of Massachusetts Medical School in Worcester. Its whether you do it mindfully whether you understand how it changes the doctor-patient relationship. To Google or Not to Google Benjamin, 53, swears by his iPhone and enthusiastically tells of sampling the Internet in its infancy. At the same time, Benjamin, who directs psychiatric training at UMass, advocates caution when it comes to mixing the Internet with therapy. He says he has never searched a patients name online and worries that doing so could dilute the therapeutic process by bringing in information from outside the patient-therapist discussion. When patients have asked Benjamin to read their blogs, he has agreed, with one caveat: that he do so during a regular counseling session. Even if you brought me a disability form, Id fill it out in the room with you, says Benjamin. I was taught to make the time with the patient the time when the work is done. Suena Massey takes a different approach. Massey, 35, an assistant professor of psychiatry at George Washington University Medical Center, considers Googling a patient a valuable professional tool. One of the duties of a psychiatrist is to corroborate what patients say, Massey explains. To that end, online searches can be helpful when traditional approaches obtaining the patients consent to contact his previous psychiatrist or family members are not available. One such case involved a patient who presented with symptoms of mania, a component of bipolar disorder. The man claimed to be well connected in Washington. After their meeting, Massey typed the patients name into a search engine. Up popped postings suggesting that the mans claims were accurate. In a subsequent session Massey told her patient she had Googled him, and he was okay with it. She ended up treating him for bipolar disorder; had his claims been false, she says, she would have considered his condition to be more severe. Massey says she will warn a patient about her possible use of Google searches if she thinks the patient might have a problem with it. You could almost make the argument that its negligent not to search online when there is public information available and it might help treat a patient, she says. If youre just looking things up out of personal interest, I think most doctors would feel uncomfortable with that. Public vs. Private But what happens when the circumstances are reversed? What happens when a patient seeks information about his therapist online or pursues a relationship with his therapist on Facebook, MySpace or via another social network? Most therapists are not alarmed by the idea of a Google search. I know my patients Google me, Massey says. I think its their right as consumers. Some providers anticipate such searches by maintaining Web sites detailing their professional qualifications. However, there can be problems when personal details are available. Take the case of a man who, after developing romantic and erotic feelings toward his therapist, typed her name into a search engine and found a Web site featuring personal photographs of the therapist, including a bathing-suit shot. The man quit treatment and reported the discovery to Behnkes office. He knew the image of his therapist in her bathing suit was going to be so present to him that he wouldnt be able to concentrate on his psychotherapy, Behnke explained in a telephone interview. There was material on the Internet that had an impact on this psychologists clinical work. Behnke cautions therapists to assume that most clients will conduct online searches, and he urges them to make sure they remain vigilant about what gets posted. Although most therapists say its inappropriate to have relationships with patients via social networks, there is little agreement on whether its okay for therapists to join such sites, and, if they do, just how private their information should remain. For Huremovic, 39, social network abstinence is safest. I have an understanding that if you choose to be a psychiatrist and a psychotherapist that you have to be very private in other parts of your social being, he says. But some therapists, especially younger ones for whom using the Internet is a way of life, dont share this view. For instance, psychologist Stephanie Smith, 35, has a Web site, and she has a presence on Twitter. Smith tweets to market her Colorado practice and to allow colleagues and other interested parties to monitor happenings in psychology. Typical posts provide tips for managing stress, announce a recent studys findings or refer followers to psychology blogs. Smith, who says Twitter has increased traffic to her professional Web site, admits to the rare tweet about her children or celebrity news. Its my style, but I know some people would not be comfortable with her disclosure of nonprofessional information, she says. Smith also has a Facebook account for her personal life. After teenage patients discovered that account and sent her friend requests, Smith enacted a policy forbidding past or current clients from engaging her online. She informs new clients of the policy and obligates them to comply. This is the type of problem that UMasss Benjamin wants to avoid. To me, its a much bigger issue than bumping into a patient in a restaurant, he says. Youre putting out there,Hey, these are my contacts. And someone then wants to enter your social circle. It puts you in a position where you must take a stand. Keely Kolmes, a California psychologist who writes and lectures on Internet ethics, recommends that therapists make clear distinctions between their professional and personal lives online. Younger clinicians get the Net but dont completely understand ethical and boundary issues that can come up, she says. A former computer consultant, Kolmes, who is in her early 40s, goes to great lengths to keep her lives separate. On her personal Facebook account, for instance, she does not use a photo of herself on her profile page and she doesnt make reference to her professional name. She also restricts her public tweets and blogs to news of a professional nature. Still, she recognizes that any online sighting of ones therapist changes the dynamic for a patient. A lot of patients really want to think about you as existing in just that one space [of the therapy room,] and suddenly theyre seeing you on Twitter and blogging, she says. They can see that youre online at night posting things. I realize my choice to do that suddenly shifts my relationship with them.

Thursday, November 21, 2019

Culture of the Nacirema Essay Example | Topics and Well Written Essays - 500 words

Culture of the Nacirema - Essay Example I personally have not read about any case studies of "primitive" people who are so economically-minded, and a well-developed market system like this is proof for me of how civilized the Nacirema are. A second positive aspect is how well-knit the families are. Every house has a shrine where they cleanse their bodies and everyone enters this room "in succession" (Miner, n.d). Parents openly discuss purification rites with the children (Miner, n.d) and see it of utmost importance to initiate their children. The entire family has a common pursuit, desire to purify the body, which keeps them connected to each other. A third positive aspect is the fact that they put a lot of emphasis in cleansing and purifying the body. They are obsessed with hygiene and appearance, and I find it interesting that they share the belief that most people in developed, modern societies have, that good appearance have an effect on "social relationships," (Miner, n.d). This makes sense since I myself would not b e attracted to people who are unclean and dirty. A fourth positive aspect of the Nacirema is how they have a "listener", who for me is the equivalent of a psychotherapist. The listener simply listens to what his clients tell him about their problems (Miner, n.d). Lastly, it's interesting to see how the entire Nacirema society is neatly distinguished into different social roles; there are medicine men, herbalists, mouth men for example, and they are all highly trained in their own professions. Â  One negative aspect of the Nacirema is that they are a greedy people; they desire gifts at every service rendered and people are not entered into the latipso shrines for treatment if they cannot afford a gift to the healers, no matter how ill they are (Miner, n.d).

Wednesday, November 20, 2019

Internal combustion engine Essay Example | Topics and Well Written Essays - 500 words

Internal combustion engine - Essay Example Since the ports remains open during up word stroke, the actual compression starts only after both inlet and exhaust ports have been closed. So actual compression ratio and the thermal efficiency of the two stroke cycle engine is less than that of four stroke engine of the same dimension. In two stroke cycle engines the number of power strokes per minutes are twice the power strokes of four stroke cycle engine. So the capacity of cooling system used must be higher. The cooling of the engine also presents difficulty as quantity of heat remover per minutes is large. The piston gets over heated due to firing in each revolution and oil cooling of the piston is necessary. In two stroke cycle engine some of the fresh charge is mixed with burnt fuel and exhaust through the exhaust port which causes high fuel consumption. So two stroke cycle engine is not widely used except in the case where size is compact for example light vehicles, scooters, out board motor, motor cycle etc .Large two stroke cycle engine are generally CI engines. Two stroke CI engines are better for slow and moderate speeds.

Monday, November 18, 2019

Discuss critically contemporary international approaches (e.g. World Essay

Discuss critically contemporary international approaches (e.g. World Bank, Financial Stability Board) to consumer credit regulat - Essay Example This reform has been accounted due to the growth in the consumer credits and rise in the numbers of consumer credit institutions1. Contextually, consumer credit is considered as a key driver of economic growth as it is used for the payment of services holding a major proportion of the industrial contribution obtained by any economy in the modern world2. In a general sense, consumer credit is that commodity, which is produced by the private sectors and then sold to the consumers. These regulations are fixed for the sale, available in a wide range of varieties. The most commonly observed regulations in the consumer credit are the price and the interest rates. The information and disclosure regulations are also persistent regarding the debt collection aspects in a particular country, also seemed to be an important aspect to the regulators and legislators as well3. In a recent affair, the European Commission (EC) has denoted the significant role of consumer credit in the growth of nation al economy and also the well being of the consumers and thus, it is seeking to adopt the credit regulation across the country4. The government has further planned to implement the policy of credit regulation across the country so as to regulate strong credit markets all over the nation along with the minimisation of the risk of debt. The strategic approach and aim of adopting the consumer credit regulation along with the objective further differs from one state to another. It can be well understood with the example of both Germany and France, which possess rates at a lower level ceiling along with lower legal maximums. Illustratively, the most stringently market based approach has been adopted by the UK with no rates of ceiling5. The government of the UK had introduced Consumer Credit Act 1974 in its constitution, which focuses on the protection of the consumers and control of traders along with taking due measures to implement the provisions of credit being regulated by the Directo r General of Fair Trading6. In this essay, the major concern has been drawn with the attention towards the critical evaluation of the contemporary international approaches to the consumer credit regulation. The essay has described the concept of consumer credit regulations in respect of the practical case study referrals of World Bank and Financial Stability Board. Defining Consumer Credit Regulation As per the subsidiary legislation of the UK in 2010, the ‘consumer credit regulation’ has been broken into words, viz. Customers and Credit, for drawing a clear understanding of the term. In accordance, consumer is a person who is responding to the trade or business under the regulations of the transaction7. On the other hand, the creditor is that person who has made a commitment to grant credits for performing trade and business. Thus, the consumer credit regulation implies the act that has been developed by the government body for the protection of the consumer and the cr editor performing a trade or business. One of the useful terms that are usually used in the definition of consumer credit regulation is the credit agreement. It is that contract between the consumer and

Saturday, November 16, 2019

Haiti Earthquake 2010: Effects and Cost

Haiti Earthquake 2010: Effects and Cost Haiti Earthquake Introduction Earthquakes happen in different parts of the world and they lead to negative consequences including death, destruction of buildings and huge losses in economy. Before studying one of the most important and hazardous natural disasters which took place seven years ago, we have to take into consideration the meaning of earthquakes. As a matter of fact, earthquake is a natural disaster according to which the layers of the earth move or tremble when the crust is ruptured or slipped. In addition, during such rupture across the fault line at which earthquakes happen, a kind of energy provided with elasticity is emitted from between rocks that could be pressured. While these amounts of energy could be stocked throughout years and emitted in less than a second, pressure existed between rocks as well as strain lead to the storage of more quantities of elastic energy causing the increase in the possibility of occurrence of earthquakes. On the other side, when this energy is released, a particul ar type of sound waves named seismic provided with low rates of frequency are spread and distributed across the surface of the earth or among its layers. Surprisingly, more than three million earthquakes happen every year. Nevertheless, people do not feel or notice them. On the contrary, earthquakes which surpass five degrees on the Richter scale are considered as one of the most terrifying and disastrous natural disasters that humans witness their occurrence on the surface of the earth and that could lead to destructive outcomes. (Earthquakes: introduction) Haiti earthquake One of the massive earthquakes that took place in the United States in 2010 was Haiti earthquake. It is worth mentioning that such earthquake occurred along Hispaniola which is a West Indian island. In spite of the fact that such island includes the two states of Dominican Republic and Haiti, the latter country was the most damaged one and the state that struggled more after the negative consequences of the earthquake. While the death toll which was released was not able to determine the numbers of casualties resulted from such chaos, the government of the country mentioned that more than three hundred thousand people were dead. Nevertheless, other resources stated that the real number was smaller than what was announced. In addition, a lot of Haitians were asked to evacuate the area and leave their homes. At 4:53 pm, there was a huge and strong hit by the earthquake. Such hit extended about more than twenty five kilometers along the coast of Port-au-Prince, the capital of Haiti. Bes ides, the magnitude of the first shock was about seven degrees. Then another two shocks happened whose degrees reached five point nine and five point five. Later, a lot of shocks took place such as the shock that happened on the twenty of January at a small town called Petit Goave which is fifty five kilometers away from Port-au-Prince. As a matter of fact, Haiti did not witness the occurrence of any earthquakes comparing to Haiti earthquake when talking about strength, enormity and degree. (Pallardy, 2016) On the other hand, such natural catastrophe contributed in the death of more than two thousand hundred persons as well as the injuries and homelessness of more than six hundred thousand persons who were struggling in order to survive and in order to search for the primary resources of living so that they could be able to maintain their lives. In addition, the earthquake managed to convert the situations in Haiti upside down on a local, political, economic and environmental scale. As a matter of fact, such earthquake has led to the breakdown of the government there whose ruling of the state was very weak and fragile. As a result of the inability and failure in managing and controlling situations during the occurrence of catastrophes and disasters, the government resorted to the dependence on aids and humanitarian relief from other countries in order to be able to provide people with the resources required for their survival. What the government managed to do is offering those survivor s tents and camps where they could live their transitional life till the occurrence of something new. (The Shockwave That Changed A Nation, 2010) Based on what was mentioned by the Humanitarian Action Plan for the Haitian state three years ago, more than one hundred and seventy two thousand persons were obliged by governmental orders to leave their houses in order to live in more than three hundred camps in 2013. Moreover, services offered to displaced persons such as health and WASH services have witnessed a quick decline comparing to the course of the displacement event of those survivors. On the other hand, there was a high risk, which more than sixteen thousand families who used to live in about fifty camps, had to face. Such risk is represented in the fact that these families could be forced to evacuate the area. In addition to the previous information and data, other eight thousand persons who used to live in camps were subjected to the risk of suffering from floods. According to what was indicated by OCHA in 2014, about one hundred and for thousand persons were remained in the state. Nevertheless, they were obliged to l ive in camps. Furthermore, there was no intention of any kind of relocation programs offered to more than seventy thousand IDPs. Finally, IOM has stated in 2014 that more than eighty thousand Haitians had the ability to survive and live their transitional life in more than one hundred camps in September. (Haiti: Earthquakes Jan 2010) Effect of Haiti earthquake According the statistics, the damage resulted from this Haitian earthquake was ranged between seven and half and eight and half billion American dollars. In addition, there was a decline in the gross domestic product of the state estimated by five point one percent. It is worth mentioning that such earthquake has led to the destruction of the basic airport in Haiti along with a large number of roads and finally the majority of ports. Moreover, the earthquake has resulted in the damage of more than one hundred thousand houses and homes based on what was mentioned by the studies and researches conducted by the Inter-American Development Bank. On the other side, the capital of Haiti named Port-au-Prince was unfortunately hit by the Haitian earthquake. As a result, the government remained paralyzed and did not succeed in eliminating chaos and returning order to the state along with the inability to take in charge of the situation. Besides, almost one of each four servants who used to liv e in Port-au-Prince was found dead. In addition to the previously mentioned information, the earthquake contributed in the damage of more than half of schools and almost sixty percent of the main constructions and establishments in the state. No one can deny the fact that one of the least countries regarding wealth, fortune and economic prosperity in the entire western hemisphere was Haiti. In fact, the majority of public there is considered ultra-poor according to the international statistics and measurements. Furthermore, more than half of them used to live in despicable circumstances of living. On the other hand, a huge percentage of Haitians there work as farmers in order to become the breadwinners of their families. Finally, the earthquake managed to cause a lot of damage since the resistance of the Haitian state against natural catastrophes is weak due to deforestation.   (Amadeo, 2016) Humanitarian relief after the occurrence of Haiti earthquake One of the main international organizations, which had the ability to offer humanitarian aid and relief to the state of Haiti after the occurrence of such destructive earthquake along with attracting the attention of the whole world to the importance of providing people there with assistance so that they could be able to survive, was the United Nations. Thanks to the donations received from certain countries around the globe as well as collaboration between various elements including people, organizations and governmental authorities, the United Nations succeeded in achieving development and improvement in the process of getting Haiti back to life especially after this devastating earthquake happened. Furthermore, the United Nations managed to cooperate with other communities that had the chance to offer donations in order to offer Haitian populations aid and relief on the long term. In addition, the foundation of United Nations contributed in the collection of donations estimated by four million American dollars to help those people to survive and live in normal conditions. As a matter of fact, such donations provided the United Nations with the ability to do the following: First: giving more than one hundred thousand American dollars to projects of solar light. Second: offering the needed resources for life such as fresh water, healthy food and health care as well as shelters due to the donation delivered to the UN which reached three million dollars in order to be able to control and manage risks and hazards in the future. Third: taking part in the process of recycling about twenty percent of the debris resulted from the earthquake. Fourth: offering Haitian people about three hundred thousand job opportunities. Fifth: offering more than two thousand Haitian workers training in the field of development and life recovery. Sixth: supplying the United Nations Population Fund with more than seven hundred thousand American dollars to get resources regarding maternal health along with offering street lights which depend on solar energy in order to provide Haitians especially women and young girl protection, safety and security. Seventh: giving more than two hundred thousand American dollars to the development program related to the UN since such program is considered as a trial in order to help people there get jobs and work so that they could be able to remove debris resulted from the earthquake. (HAITI EARTHQUAKE RESPONSE, 2013) Conclusion In a nutshell, natural disasters are considered as one of the most destructive events that could be faced by any country around the world. In addition, one of these catastrophes that could lead to the total destruction and demolishment of states is earthquakes. Earthquakes happen due to the slippage between layers of the earth. As a result, a lot of damages occur leading to the huge percentage of casualties, demolishment of houses and constructions along with the displacement of many people out of their homes. Thats why countries have to be well prepared for these events in order to prevent their negative consequences as well as protecting people there from any danger or hazard that might threaten their lives. References The Shockwave That Changed A Nation. (2010). Retrieved March 21, 2017, from Haiti earthquake 2010: http://haitiearthquake.web.unc.edu/ HAITI EARTHQUAKE RESPONSE. (2013). Retrieved March 21, 2017, from United Nations Foundation: http://www.unfoundation.org/who-we-are/impact/our-impact/health-data-disaster-relief/haiti-earthquake-response.html?referrer=https://www.google.com.eg/ Amadeo, K. (2016). Haiti Earthquake: Facts, Damage, Effects on Economy. Retrieved March 21, 2017, from The balance: https://www.thebalance.com/haiti-earthquake-facts-damage-effects-on-economy-3305660 Earthquakes: introduction. (n.d.). Retrieved March 21, 2017, from SMS Tsunami Warning: http://www.sms-tsunami-warning.com/pages/earthquakes-introduction Haiti: Earthquakes Jan 2010. (n.d.). Retrieved March 21, 2017, from relief web: http://reliefweb.int/disaster/eq-2010-000009-hti Pallardy, R. (2016). Haiti earthquake of 2010. Retrieved March 21, 2017, from Encyclopaedia Britannica: https://www.britannica.com/event/Haiti-earthquake-of-2010

Wednesday, November 13, 2019

Bamboo Growth (Dracaena sanderiana) Essay -- Environment, Lucky Bamboo

This research was conducted to investigate light intensity effects on lucky bamboo vegetative growth in Azad University, Abhar Branch during 2008. The experiment was arranged as a complete randomized block design with 5 treatments (0.75, 1.14, 1.89, 2.29 and 4.09 Â µmol∙m-2∙s-1) in 10 replication. Results showed that 1.89 Â µmol/m-2/s-1 had significant differences from others treatments. The higher level of root number, shoot length and total weight of plants were obtained in 1.89 Â µmol∙m-2∙s-1 reatment. Number of shoot, shoot length and number of leaf per shoot were differ in different nodes and were highest in upping nod. Seedlings characteristics are during the growth time as a crucial factor in determining the ultimate fate of the plants. Therefore should be tried always seedlings have to very good condition. Seedling growth and quality are under influenced by environmental factors including light intensity (Lavendar, 1984). If environmental factors such as light intensity changes, also are under affect other factors and final quality of seedlings (Chaar et al., 1997). Seedling producers with changing and optimizing the light intensity regulated the seedlings growth, development, and plant vegetative quality (Lavendar, 1984). Lucky Bamboo with the scientific name Dracaena sanderiana has owned to Dracaenaceae family. This variety of dracaena does not belong to real bamboos of the Poaceae family. This plant are popular because beautiful leaves and robustness to apartment conditions. This plant is among plants that allowed indirect and low light intensity. So they classified in plants group with low light need (Brown, 2008). Brown (2008) reported ... ...results of this experiment showed that Lucky Bamboo is including Plants that have required too little light intensity. High light intensity can be cause yellowing of leaves. If want of results these experiments have a general recommendation for keeping these plants in apartment thus can say Because the total amount of light produced by sodium lamps with 400 watts at 3 meters distance is equivalent to 19 Â µmol s-1m-2. So use of a sodium or fluorescent lamp with 40 watts can to provide power equal to 1 / 9 Â µmol s-1m-2 for the plant (Barzegar & Yadegari, 2010). As that observed of this experiment the best treatment of light intensity for the optimum growth in Lucky bamboo plant is equivalent energy to 1 / 89 Â µmol s-1m-2. Can also provided light intensity needed for this shade-friendly plant with use a 40-watt incandescent lamp at a three meters distance apartment.

Monday, November 11, 2019

Mental/Behavioral Case Study Essay

I am doing a case study for Jenny Stanson, who is a 20-year-old college student who that is currently living with her grandmother. Lately, she has been noticing that her grandmother seems to be confused at times, and often forgets things she has told her. She also informed me that her grandmother is often rather short-tempered. From what jenny says, this does not seem to be her usual manner and happens only infrequently, but Jenny is concerned. She stated that someone told her that her grandmother might be suffering from early stage of Alzheimer’s disease. Upon doing research on the disease I learned that Alzheimer’s disease is perhaps the most common form of dementia, although several others exist. Alzheimer’s disease is a progressive disease of the brain. In the early stages, people experience some memory loss which progresses to marked memory loss, then to a decrease in thinking ability such as decision making. Later the disease leads to the loss in the ability to perform activities of daily living or recognize loved ones. The changes in the brain that often mirror the decline in thinking are the development of plaques and tangles in the brain. These changes may begin in areas of the brain associated with memory, but later spread more widely throughout the brain. The plaques and tangles can lead to a gradual loss of connections between brain cells and eventually cell death. Based upon the information she shared with me, I’m placing her grandmother in the early stages of Alzheimer’s due to her age and the symptoms she’s currently presenting. Especially after learning that starting at age 65, the risk of developing the disease doubles every five years, and that by age 85 years and older, between 25 and 50 percent of people will exhibit signs of Alzheimer’s disease. I did inform Jenny though, that there are things she could do and practice and speak to her grandmother about as far as  prolonging the onset of Alzheimer’s. There are a number of studies that suggest behaviors that might lessen the risk of developing the disease. Among these are increasing physical activity, having a diet rich in fruits and vegetables, maintaining social engagement, and participating in intellectually stimulating activities. I informed her that the approved treatments for Alzheimer’s disease are designed to enhance the communication between nerve cells. In some individuals, this will lessen the symptoms. However, these treatments will not prevent the progression of the disease. When it comes to cultural issues pertaining to this issue, Alzheimer’s disease and dementia affect all racial and ethnic peoples. Communities of color and other historically underserved groups often encounter problems when accessing services or information about Alzheimer’s disease. Because of this, the local chapter is working to increase awareness of the disease and understanding about the obstacles to service for rural communities, ethnic groups, and communities of color. This though should not be a reason people do not step out on their own and seek help In conclusion, I informed Jenny that there is a lot of information on the Alzheimer’s disease on the internet, libraries, hospitals and other places one can go to seek treatment. I told her that she and her grandmother are not alone. If she wants some really good information and help, she should turn to The Alzheimer’s Association, which is the most trusted resource for reliable information, education, referral and support to millions of people affected by the disease. She can Call their 24/7 Helpline number at: 800.272.3900 or she can locate a chapter in her community, she can use their virtual library or even simply just go to the Alzheimer’s Navigator within the associations website to create customized action plans and connect with local support services. References http://www.alz.org/alzwa/in_my_community http://www.alz.org/alzheimers_disease_what_is_alzheimers.asp http://www.cdc.gov/mentalhealth/basics/mental-illness/dementia.htm