Cyber crime

 

 

Name:

Course:

Instructor:

Date:

School:  

 

Cyber crime is the most exceedingly problem in the world. The generalized definition of cyber crime may be unlawful act where computer is used as the tool in various crime activities such as financial crimes, pornography, sales of prohibited articles, online gambling, cyber defamation, email snoofing, selling of property crime and cyber stalking among others(Roderic, 2005). There are reasons why computer is used as a tool in cyber crime. These include: the fact that computer has unique characteristics that store data in small space. The information may be removed much easier when the criminal does not want to be recognized. Computer is complex and its operating system is composed of countless codes. Human mind on the other hand, is fallible and there is likelihood of it not lapsing information at any given time (Reyes, 2007). For this fact, cyber criminals take advantage thus penetrating into computer system. Computer has no evidence that the crime took place. Loss of evidence is a common problem where criminals destroy all data and further collection of data may not exist in crime investigation. Cyber criminals are in different categories. The first category is of Children and adolescents that are between the age of six and eighteen years.  The reason for their involvement in this behavior may occur when explores things, proving to be most outstanding among other children or a time may be psychological. The second category consists of discontented employees who include the sacked and the employees that are not satisfied by their employees. They may hack the system of their employees. Cyber crime may therefore be classified in three groups that include crime against individuals, against organization and against individual property (Reyes, 2007).

 

 

 

 

Discuss whether or not the breach of the U.S. classified network warrants the extradition and trial of Wikileaks’ founder Julian Assange in the United States.

The legal and political forces that worked against Wikileaks scored two major financial blows that were in opposition to whistleblower site. According to associated press, her visa suspended on Tuesday morning and in Monday evening US classified network attempted to block his payments arguing that US rule prohibited individuals in engaging into any illegal action. Visa along with MasterCard’s represented the most severe financial problem in the trial of Wikileaks in that it was announced in freezing Assange accounts. This resulted to both PayPal along with post finances facing problems as a result of their decision on cybercrime. Payback had taken credit on floods for junk web traffic that was temporally taken down to both Swiss banks website along with PayPal’s blog ((Reyes, 2007).

Wikileaks continued to get donation from Swiss credit card through processing firm data cell by means of credit card payment. His site accepted bank transfers to two accounts. When financial net around Wikileaks got closed, he was arrested to face financial trial charges on visa and MasterCard. Despite of the crime he was faced with, the U.S. classified network warrants never revealed their political pressure behind their move to cut off Wikileaks offences on visa or MasterCard. The two firms without doubt felt the pressure from the approach of the political aisle which the Attorney General (Eric Holder) had promised to investigate all legal options against Wikileaks. In early 2011, the two credit cards may have experienced challenges from their banking partners given that Assange had assured to disclose ten thousands documents from US bank. British judges denied Wikileaks who told the London Court that he intended to fight sex crime allegations. The hearing took place after which he was arrested on Swedish warrant over sexual assault even though Assange denied the allegations (Star, 2002)

The U.S. classified network warrants was not justice in that it was a political stunt where he would face espionage charges. According to cross, 2008 United State has an extradition treaty that has taken place since 1963, but never covers the crime spying. All generations should be given their rights to impose ideas that may be beneficial in future. Wikileaks charges on sex obligation was not fair in that all U.S federal government staff was been blocked from viewing Wikileaks along with banning Wikileaks on government computers tampered with his work that was to expose oppressive regimes within Asia, Sub Saharan Africa, the former Soviet in additional to middle east. This would not be successful without support from all regions that wished to reveal unethical behavior in their corporations and government (Cross, 2008).

E-government comes at a cost. Is there a trade-off that occurs between the security of federal systems and the cost savings from reduced paperwork?

Yes there is in that, one requirement of Federal Information Security Management act is to implement agency-wide information so as to ensure that an information system of agency is secured.  Security of federal systems ensures that information on security policies together with its procedures is being place in order so as to reduce risk in paper work. In Early 2005, E government surveyed in about seventy federal systems information and found that, only forty percent of them saved the cost savings (Congress, 2001).

With full information technology securities, the E government has created significant inducement for protection of information along with information systems that is within Federal agency. In addition, “Natural institute of Standard and Technology Computer security” can result to be graded on the essence of serious security breaches in any of their systems (Subhash, 2004). A major benefit of system is that it enables measurement of service levels in paper work

 

References

Congress R, (2001) Congressional Record. New York: Government Printing Office publisher

Cross M (2008) Scene of the Cybercrime. New York: Syngress publisher

Reyes A, (2007) Cyber crime investigations: bridging the gaps between security professionals, law enforcement, and prosecutors. New York: Syngress publishers.

Roderic G, (2005) Cyber-crime: the challenge in Asia. China: Hong Kong University Press

Subhash C, (2004) E-government: from vision to implementation: a practical guide with case studies. New York: Sage publisher

S tar A, (2002) Open Secrets: Wikileaks, War and American Diplomacy. New York: New York Times publisher

 

 

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

Current issues in Business law

Name

Course

Instructor

Date   

Current issues in Business law

            A business law is a set of legal guidelines and rules that governs the people starting or running a business. It monitors the duties and rights of creditors, employees, shareholders and directors represented in the company. Business law ensures there is an appointed director within a private company or within public sector. The name of the company is an aspect they ensure in making sure the name is not used by another registered company. There are current issues in business laws in news and publications among others. This paper aims at outlining each one of them.

The current issue of the taxation of corporate foreign investment in United State is a major concern.  Early this year, there have been emphasizes of paying taxes on the basis of citizenship along with source of income. If a foreign individual receives income from the United States, that income is subject to the American because of its sources. In contrast, if an American receives income from the foreign source, it’s subject to the tax of United States due to citizenship of the recipient.  An American citizen is thus taxed on his world wide income. There is concern of the United States corporations getting income from foreign sources. On the other hand, a United States citizen corporation receiving profits from the foreign source that has been subjected to taxation. For instance, an American business working in a branch that is within Illinois and in France is subject to income tax within the profits of the French branch like the way it is subjected to taxation in the branch of Illinois. Having being said, questions have been asked on whether foreign income should be taxed or not. Individuals in the American nation have argued that, the country income tax do not treat dollar differently from one business to another (Cannon et al, pp1). This implies that, the dollar that is earned in producing airplanes, atomic plants, steel is usually taxed equally at the same rate with the dollar that is earned in a manufacturing plant or in selling clothes. From their arguments, the dollar that should be taxed is of risky business along with relatively safe industries.

Early last year, Issue of understanding the influence of national culture influence on the developmental of trust aroused in the entire world. Due to inter firm relationships, credit trust has lowered transactions costs in certain environments of business set ups, in so doing providing firms with a competitive advantage. Trust also has facilitated long term relationships between individuals in company’s which is an important aspect in the success of planned alliance. In an organization, trust contributes to effective implementation of managerial coordination and effective team work that enhance the business to grow. An emergent interest in trust has lead to increasingly diverse along with multicultural work force. A major trend within increased globalization has happened in the business world during the last decade (Cannon et al, pp1). Various firms have viewed the world as their market in hiring employees, establishing alliances, introducing new markets together with the sources supplies. The importance of trust emerging globally and in the work place, has highlighted why it is of use to understand how it develops and different ways national culture impacts the process of trust building. Although many argue it may be generated in variety ways, it is established upon values that used to guide people and its establishment depends on the societal norms. For the reason that culture programming results within various norms along with values, the processes trustors have decided to act on the societal culture. One of the greatest collisions of culture is on how information is utilized in making decisions. Researchers from various businesses set ups, are finding out how trust lower the costs transaction, help in relationships of inter organizational together with how it enhances relationship within manager-subordinate (Cannon et al, pp10). There research is supported by the fact that, there is a growing trend toward globalization which establishes alliances, supervising and hiring employees in the current world. These trends tend to give a need of viewing the model of trust in the aspect of national culture.

In the current world, there has been an increase concept of value within discourse in the reform of public sector. The increased attention has been argued to be, the result of the adoption values that have been taken from economics and business. These include value of creation, the value added, its competence, the acceptance of correlation together with the market language. Different studies have also suggested some other aspects that may have been the reason for the outcome (Cannon et al, pp15). They have pointed that, it has occurred due to lack of attention in the non-tangible or else non-economic, moral, political, in additional to ethical aspects. Hence, there are two adversary values that are being set and which modify unite in a non-conceived accord on the focus of values. The basic value dichotomy may give explanations as to why the struggle to construct sufficient result indicators as well as measures of public sector act never ends. Additionally, the reason may have been caused by their different values and incompatibilities.

There have been matters concerning ethics in advertising and promotion. Recently, in Kenya the advertisement of tobacco that advertised as promoting health was banned. If an advertiser fails to tell the truth concerning the harm that tobacco causes, he offends morality and. considering the reality of today’s issues on my space staff in Kenyan has brought legal issues. The layoffs have been said to affect social networking in the world in a negative point of view. With various user engagements have been known to promote sex matters through downloading pornography in the site. Even though it has been known as the most effective way of business networking it has promoted immorality. For this reason, ever individual within the country has been warned over downloading pornography failure to which the individual is considered to break the law. The advocate of the high court in Kenya has currently introduced legal practices that are concern in ensuring the business transactions sounds legally and unlikely to lead to unnecessary disputes. This consideration has been advocated due to the fact that, human beings are more likely to enter into contractually binding commitments without honoring any agreed obligation. This implies that, when the decision of starting a business is made, the kind of legal structure to adopt is, the primary legal thought that arises from frequently resolves without much thought. Different options existing in Kenyan law is the choice of every individual who inspire to become an entrepreneur. For instance, Legal Officer in developmental jobs at faulu Kenyan has provided legal advices on all legal along with statutory matters with a predisposition to civil law. The main task will be, to work on credit administration and offer securities to the company. Through operating with external lawyers, guarantee the company is properly represented in the legal matters in addition to court cases.

In the American nation, some states have recently enacted laws to create financial inducements to motivate firms to adopt sustainable construction practices that relate construction or else renovation of the commercial building. The financial inducements include tax credits, grants of loans, permitting processes of the streamlined government and relaxations of zoning restriction (Eckes, pp 50).

Globally, in 2010, legal issues that are based on starting and owning a small business. For example, an issue of the state requirements of many types of businesses is required. While business license differ from country to country it plays the same role. A business is the main document that is required for tax purposes along with conducting businesses functions. This has been a legal document that is required for all businesses operating within the state. This has led to many countries establishing assistance in small business agencies to assist in complying with the state requirement. Some states have required the license on products being sold. For instance, in the current news, most states require a special license to sell gasoline, fire arms, liquor or lottery tickets just to name a few. If the area to which an individual is operating has a state income tax, one is required to register and acquire the number of employer identification from his state Treasury department. In cases when the person wants to engage in retail sales, a requirement for sales tax licenses is required by law. This signifies that, all businesses require the country license. The individuals are therefore privileged to legally operate their business within the country jurisdiction. Currently, the entire world has lowered fees thus easy to obtain (Eckes, pp 70).

News concerning the current world has shown that, many businesses do not need a permit of federal license. However, if an individual engaged in the following activities, it is vital to contact federal in determining the requirements needed in doing the business. These activities include manufacturing of drug, broadcasting, advises on investment, the preparation for meat products, selling of alcohol, tobacco or else fire arms and transportation of ground products. In the United States, there has been assessing of Federal registration on intellectual property that includes trademarks, patents, and copyright. This has provided the business owners with use of intellectual property. A legal issue on the community responsibility on animal ethical issue is currently relevant in the entire world. The law has ensured veterinarian contributes to the welfare of the animals and these opportunities lead to development of animal business ethical issues. Contrary to this, in April 2010, the United States estimated that, there are three hundred thousands people that no longer pay taxes and they stay in their embassies. The country promised to act on implementing the law so as to ensure all individuals that are working have to pay taxes (Eckes, pp 45)

There is an upcoming event of legal project management highlighting maturity of discipline. In Washington on 11th January 2011, practicing law institute with Hildebrandt Baker Robbins made an announcement that they were presenting a project management meant for lawyers. On January 19th they experienced practitioners and consultants contributing on their experiences executing the legal of project management. They later organized training on legal project management. According to Raridon (pp30), the legal industry is experiencing a period of change due to the fact, both laws departments and law firms are under extreme pressure to become efficient and deliver a legal service at lower cost. On the other hand, the Hildebrand baker robins on economic index in Washington D.C raised some aspects on 8th January 2011. There were signs in demand growth for more than two years and the legal market had shown the ups and downs for the overall economy in a low performance. For the past two years, the legal market has continued the gradual upward trend but still having a major headwind. In addition, expenses that have helped in supporting profitability, has began to decline. Businesses have started to step up their hiring of new associates though; many firms began to switch from resistance to offence as the economy improved. The main key to the success of the firm will be to manage strategies on the cost control and effective rate for a highly competitive rate (Hildebrandt, pp 1).

In 2002, Germany received a corrupting deal within the shadow of the law. This was because; corruption was hidden from the public transaction of cost arising in different type than that of legal exchange. Besides this, a present risk of mutual denunciation partners of corrupt agreement is primary arranged by middlemen as a by product of legal exchange. This has concluded that, corruption has had a little aspect on free competition. It has been seen important looking for methods of destabilizing corruption rather than dealing with an individual moral attitude or else penalties.

Various countries have introduced laws that deal with drug trafficking. The recent research has shown that, many countries are ensuring these set laws are being tightened so as to ensure proper governing of the country

 

In conclusion

Having discussed the current issues in Business law, it is evident that, these set of laws are guidelines that rules and governs people in the state in starting or running a business. It helps in monitoring duties and rights of employees, creditors, shareholders and directors represented in the company. Ignorance of law is not an excuse to anyone. A law is needed for a smoothly life in the society. Different governments have their set of laws but one thing is common to all. All of them do have laws in certain matters but they differ on the regulations entailed. When cases of business are held in questions, the business laws help in such situation. It has played a major role in protecting the right of business enterprises together with consumers, employees and the staff represented in the business. A business law covers a lot of business aspects in the world. It helps in regulating transactions of business; it helps in covering insurances, entails the rules of carriage and defines the bill of exchange and partnership. Aside from this, it is taught in school to produce the effective future business lawyers along with specialist intellectual property attorney (Cannon, pp100).

 

References

Cannon J, Doney P, Understanding the influence of culture on the developmental of Trust.  New York publishers. PP 1- 100, 1998. Print

Eckes, A. Opening an American market US foreign trade policy. Carolina Press. 1999. Pp 1- 98. Print

Hildebrandt R, A Legal market flat for 2010 as a whole. Retrieved on 25th February 2011  from

 

 

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

Name

Institution

 

 

Many Health care organizations have been using information systems in medical informatics to improve work performance in hospitals. Health care professional requires an individual to have health informatics and emerging technologies to enhance quality of professional practice.  Therefore, healthy informatics and emerging technologies are necessities for improving productivity in medical field. With an increasing number of critical cases in the hospital, technical support has become an essential service required in exploring the skills and knowledge suited in health care organizations. Concerning this, it is an ultimate objective for every health care professional to generate the suitable medication required to treat different health problems. Being the most attribute to essential services, it has improving patient behavior in many hospitals. This paper is therefore aimed at examining the importance of health Informatics and Emerging Technologies in health care organizations.

In order to obtain excellent outcomes, health care organizations need to use health informatics as well as modern technology. However, many hospitals have not embraced these fundamental aspects. Consequences of not effectively using health informatics with advanced technology have led to waste of resources, inability of producing quality measurements, compromising decisions in work performance in addition, causing harm to patients. Health informatics generates accurate data that assist in areas of treatment, paying bills, and produce quality measurement of suitable treatment used in health care institutions. According to Friede etal (1995) 60 % of all hospitals in the United States have strongly affirmed on the use of advanced technology because it helps in ensuring that all records are kept well. This concludes that, it is essential for health care organizations to use technology during health care. However, many hospitals have ignored the fundamental aspect it has on medical field. This implies that, if nothing is done to ensure hospital use advanced technology, may end up causing harm to patients and affecting the overall work performance.

According to Rigby, Forsstrom and Wyatt (2001) health informatics is best explained as information science, health care and computer science required in health care organization. Joseph and Tan  argues that, health informatics tools include use of computers, clinical guidelines, medical terminologies, its information and communication system mostly applied in areas of clinical care, nursing, pharmacy, dentistry, public health, biomedical research and on occupational therapy. Studies have shown that, health informatics was officially recognized in 1992by American nurses association (Eysenbach & Diepgen, 2001).   Their main objective was to improve the health care professional along with expanding knowledge in medical field. Borne in mind that medical field is a health care professional that deals with lives of human beings, there was a need of establishing some health information systems to develop quality professional in skill and knowledge (Rigby, etal2001).

Research indicates that, health care informative assist in management process of health care practice (Ball, 2000). Ball argues that, nurses that uses computerized software, easily identifies complications of patients conditions which helps in choosing the appropriate action of evaluating patient condition. The plan choice might include an aerobic exercise regimen, support social groups, special diets. These activities improve the patient health in psychological, social issues and physical. Health care team ensures uses alternative treatment as tools to improve patient conditions.

A survey done in New York by Hopkins (2000) shows that, health care professionals had seen the significant outcome of health Informatics and technologies when used in health care institutions. By identifying the activities that improved the patient conditions, many employees confessed that it had caused higher productivity in work performance, happier employees, along with improving the conditions of patients. The positive outcome shows that, by improving patients’ conditions it generates satisfaction among health care employees. As a result, this motivates them to do their work effectively thus improving work productivity.

Some studies have shown that, health informatics and technology helps the medical field to come up with ideas that develops patient satisfaction (Hopkins, 2000).  For instance, access of computers enables many patients to access treatment and appointments online. This makes many patients to access suitable treatment without going to hospitals. In addition, Gerdian argues that, many victims have acquired knowledge on the symptoms, causes, prevention and treatment of various health problems. The use of online information enables many to prevent severe cases that would have been obtained if no knowledge were obtained. This implies that, online knowledge has been an effective tool in curing various diseases thus enhancing patient satisfaction (Ball, 2000).

Additionally, computer access has increased speed of bills payments in health care institutions. Ball has assed that, computer assist in keeping all records required in every health problem. For instance, if a patient is suffering from Cancer, all information about that healthy problem is usually recorded in database to assist in various aspects such as payments. It takes a shorter time accessing the details required in payment thus; patients do not have to queue in carrying out payment transactions that develops patient satisfaction.

Health informatics helps health care organizations to get feedbacks from patients. Different researches have shown that, many patients’ gives feedback via email or else from health care websites (Ball, 2000). The comments help health care institution to know whether they are offering good services in addition, to knowing some of the employees who may not be enhancing suitable treatment to patient. This has been affirmed by Berg (2004) who argues that, patients feedback enhance effective work performance together with ensuring that, health care professional is done by specialist additionally, provides high degree of medical skill when treating patients.

According to medical expertise, emerging technology aims at treating patients with suitable treatment and prevention of various health problems. Majority of doctors and physicians are more effective when using technology in performing their day-to-day activities within health care organizations. The paramount significant fact is enabling health care professionals to be aware of what they are treating in addition, giving appropriate treatment that align with that disorder. As a result, health care specialists end up spending less time identifying a health problem.  In addition, research shows that, when doctors spend less time treating one patient, it increases work performance because less time is required in treating one patient. This has a way of attributing to patient satisfaction because he will know his health problem and offer help in giving best treatment.

Other aspects of health informatics include been used in emergence room. Medical expertise have outlined that, emergency rooms tend to deal with severe conditions on a daily basis. Therefore, medical experts should be able to make decisions that treat wide range of injuries. In addition, Stead & lorenzi (1999) argues that, health informatics helps nurses to obtain quick information when treating patients in emergency room, which eventually helps in saving lives that would have been lost.  A research survey has shown that, health care informatics provides a high degree of knowledge in making hasty decisions required in emergency rooms (Stead & lorenzi, 1999). This provides urgent care of injuries along with discerning patient need in improving her or his condition. The use of emerging technology generates a positive role of improving patient condition.

Despite of the benefits that health informatics and advanced technology have on health care organizations, many institutions have not embraced it. In analyzing this, I did my own research, which supported the fact that, many hospitals have neglected the use of health informatics. In analyzing this, I visited Mountain View hospital whereby I conducted my research for two days. I divided my target population into four groups with ten members from each group. The target populations groups included higher management that comprised of Doctors, Physicians, Gynecologists and surgeon. Middle management group included nurses and administrations. The Lower management groups were Subordinates, clerks, receptionist, cleaners and cooks. The final groups were the patients present on that day.

I grouped my questions in two categories. The staff group of Mountain View hospital and patient group. The staff questions consisted of the following.

  • The number of times doctors used health informatics and advanced technology in treating patients.
  • Whether they were aware of using emerging technologies
  • If there were access of the advanced technologies
  • How many computers were used in keeping patient data
  • How they detected patient problem
  • If information on computer data were accurate

Patient’s questions were as follow

  • How often doctors used health informatics with advanced technologies in treatment.
  • How their health problems were been detected
  • How health informatics improved their health conditions if used.

The results from doctors showed that, they never had access of modern technology to treat patients. They mostly used their knowledge in observing patients symptoms and giving the recommended treatment for such health issue. This was a fundamental fact as to why many death cases had occurred in that hospital. Though they knew how to use advanced technology, it was not recognized in that hospital. This was their main challenge in that they used files to keep their data.

The results from patients showed that, doctors had never used health informatics with modern technology during treatment. From their opinion, better outcomes would have been obtained if health informatics and technology were used in detecting their health problem. Mostly, they were asked to describe their symptoms and later the doctors would give the recommended treatment. Based on their argument, death cases had increased drastically because doctors could not detect what the patient was suffering from.

These findings showed how many hospitals are not using health informatics in their work performance. This implies that, if health informatics were embraced in every health care set up, would improve conditions of patients in addition, saving lives of many patients. For instance, cancer patient may not experience severe symptoms during early stages. The common signs include nods, which if not early detected by use of advanced technology may lead to severe cases that result to death.  Rather than discharging patients, health care experts would obtain excellent skills in advanced technology, which would improve the patient condition.

The government should ensure that every health care organizations uses health informatics along with technology to ensure effective work performance. All hospitals should have access of computers that keeps the patient information. In return, many patients would not end up taking long duration in accessing their information.

Conclusion

Health informatics and advanced technologies are vital in enhancing work productivity in health care organizations. As discussed in this paper, it helps medical field to come up with ideas that develops patient satisfaction. This is achieved through accessing treatment and appointments online. As a result, many patients have acquired knowledge on their health problems such as knowing the symptoms, causes, prevention and treatment of their health problems. Health informatics assists doctors in identifying treatment for various health complications, which is also effective in emergency room. When advanced technology is used in hospitals, increases occupational competence since its implication will expand knowledge on suitable treatment used in various health problems.

We have also outlined that, it saves time for doctors in knowing what to treat. In extent, the doctor will not use a lot of time as to that of interviewing patient to know the symptoms. When doctors use technology, it will increase their work performance in that they would less time in choosing the applicable treatment. Health informatics has also helped health care organizations to get feedbacks from patients. These comments have been used in accessing whether hospitals are offering quality services in addition, establishing some conditions that may not be pleasing to patients

On the contrary, despite the benefits that health informatics have, many hospitals have neglected its use. Researches have shown that, only 30% of hospitals mostly use emerging technology (Ball, 2000). Many doctors assume patient condition when giving treatment thus giving wrong treatment and increasing death cases. With death cases increasing, there is a need for all hospitals to embrace the use of health informatics along with the modern technology to ensure that the patient health is detected first before giving treatment. If this is done, it will consequently cure diseases that would not have been cured if there were no earlier detections. However, if this is not embraced, many patients will not get suitable treatments that later may have side effects on their health. As discussed in this paper, patients from Mountain View hospital have agreed on the fact that, if better systems were used during treatment, better outcomes would have been obtained.

Health Informatics and Emerging Technologies are essential aspect that attributes to essential services. This research paper has been essential in showing how these systems have been neglected by many health care institutions. In ensuring all hospitals uses technology, there is a need of government intervention. This paper has therefore, examined the importance of health Informatics and Emerging Technologies in health care organizations.

 

 

References

Ball, M. J. (2000). Nursing informatics: where caring and technology meet. New York :     Springer

Eysenbach G, Diepgen T L (2001). The Role of e-Health and Consumer Health Informatics for     Evidence-Based Patient Choice in the 21st Century. Rating health information on the            internet: navigating to knowledge . Vol 2(1)

Friede, A, Blum, H.L, & McDonald, M. (1995). Public Health Informatics: How Information-      Age Technology Can Strengthen Public Health. Annual Review of Public Health.      Vol 16(239)

Hopkins, J (2000). Consumer health informatics. The Internet as a forum for public debate about healthcare. Vol 329 (7251)

Rigby. M, Forsstrom J, Wyatt, J(2001). Verifying quality and safety in health informatics             services. Information in practice. Vol 323 (7312)

Stead, W. & lorenzi N,M (1999). Health Informatics Linking Investment to Value. Journal of       informatics in health and biomedicine. Vol 6(5)

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

A History of Modern Psychology

A History of Modern Psychology

 

Many women have been known to have contributed to major roles in the history of psychology. These women were known to be pioneers, counselors and theorists. All these women contributed in various ways in psychology. Even though many women made significant contribution in the history of psychology between the years 1850 and 1950, one woman made the greatest achievement. Anna Freud demand attention for having the greatest significant contribution to the history of psychology. This paper aims at looking at her background, theoretical point of view and contribution she had in the field of psychology.

Ann Freud was born on December 3 in 1885 and died in 1982. In 1885, her father published a book in psychology known as Studies on Hysteria. She had five siblings and was the youngest daughter of Martha and Sigmund Freud. Her life seemed to be the liveliest and mischievous of all the other siblings. Anna had a very close relationship with the father compared to that of her a mother along with her siblings. She began her education in 1912 at the college of Cottage Lyceum in Vienna. She attended a private school although she never thought she learned a lot of things in school. According to her opinion, most of her education came from her colleagues along with father’s friends (Rowell, 1998).

Anna became a basic school teacher and interpreted some of her father’s work that was in Germany. This increased her interest in psychoanalysis as well as child psychology. During the World War she taught in her old school. She increasingly became her father’s assistance as well as Secretary. In 1918, Anna attended the first meeting of society Vienna Psychoanalytical and later became absorbed with interest in psychoanalysis. In 1922, she gave out her first paper to Vienna psychoanalytical and the society accepted her as a member.

Her first patients were adults but later began treating children. Studies have shown that her work as a teacher previously made her emerged in her life’s work (Peter, 1985). In 1923, her father was diagnosed with cancer and Anna became his caretaker. In that year she established her personal private sector. In 1925, she began a private analytical oriented nursery school and also set up what is regarded as first modem day care centre known for the infants that are less privileged. Throughout her profession, she continued to point that, child care along with analysis can never replace with early parental attachments that form personality development.

The efforts she made in defining the usual child growth led her to develop on her father’s ego hypothesis that was published in 1936. Her work contained to be the most significant up to date on how to view the structure along with unity of human personality.

Anna Freud without fail sought to apply the hypothesis of psychoanalysis to practical problems children. These children included the blind, handicapped as well as those that had minor problems. Her interpretation convinced her of the significance of parental bond to both normal along with abnormal childhood growth. In the early 1960, she began collaboration with Yale Child Study centre that had a great contribution to seminars of family and child placement of conflicts.

 

            Conclusion

In conclusion, although Anna Freud never attained academic degree, her accomplishments were widely recognized that later made her to be rewarded. She embraced the assumption of child development creating a logical therapeutic technique. Her impact will for ever be felt.

 

References

 

Rowell, (1998), Anna biography. New York: New York publishers.

Peter, (1985). A life dedicated to children. New York. General learning Press.

 

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

Rehabilitation counseling

Rehabilitation counseling

A rehabilitation counselor helps individuals to deal with personal and social problems. They also deal with profession effects of disability. According to Kenneth, (2004) the disabilities may result from birth, illness, accidents or stress. Rehabilitation counseling helps to evaluate limitation that helps in dealing with consequences of drug abuse. The rehabilitation counselor deals with many problems that an individual may have. Drugs and alcohol been one of this problem cannot be left behind. Studies have shown that, drugs and alcohol can be a problem in an individual that happened in the past and this problem does not stop immediately (Marlette, 1985). The individuals may want to discuss their behavior of using drugs or related problems associated with drugs. For this reason, rehabilitation counseling in drugs and alcohol is significant. This paper aims in looking at the issues and techniques that pertain this counseling.

According to the Journal rehabilitation of Research and development, Alston, (1990) suggested that, the rate pertaining drug abuse and alcohol among rehabilitation clients may be high as 40%.  Other evidences suggested that a person that has social problem and stress is more likely to abuse these substances (News in Mental Nursing, 93). In response to this report, several authors have emphasized the importance of developing services that treat the person that have disabilities as a result of abusing these drugs ( Frieden, 1990; Perez & Pilsecker, 1989). Based on their argument, they argued that, it is important in rehabilitation counseling to understand the psychological and sociological aspects that makes an individual to abuse drugs and alcohol (p.62). In counseling, it is vital to consider the social conditions of an individual that lead to drug abuse. These factors include poverty, stress, and idleness among others. According to Addictive behavior journal article Peter, (1974) focused on the importance of understanding the social factor and environmental factors that may make an individual abuse alcohol and drugs. In his research, Peter argued that when a counselor knows the root of the problem that makes an individual abuse drugs and alcohol it will be easier to offer preventions interventions to an individual.

There are number of issues pertaining rehabilitation to counseling in drugs and alcohol. A major part is in which a counselor help those affected in drugs see the consequences along with effects the drug has on their life and society. In discussing these, the counselor topics should include long-term and medical effects that result from drug use and abuse. For instance, liver damage, mental health disorders, cancers, stroke and heart attacks. There are however a number of techniques used in drug and alcohol rehabilitation counseling.

Training in Issues and techniques pertaining drug addiction is one of the techniques used. This approach focuses on psychotherapeutic that enhance and maintain patient motivation for change. This technique emphasizes on developing a good working environment with the client. In this approach patient participation in self-help is normally encouraged but not mandated. The main objective of this technique is to train the client on how to break addiction cycle and establish total abstinence from drugs and alcohol. The method is useful in rehabilitation in that, it teaches an individual addicted to cope with problems that may occur in the body. These include liver problem, mental health disorders among others. Solutions are also offered to maintain abstinences over a long period of time. This approach has been known to promote development of strong positive therapeutically bonding between counselor and client. As a result, it ensures accountability where by the client receives therapy from the counselor (Mark, 2006).

Treatment therapy is the second technique used. This involves treatment that is a combination of group therapy that occurs regularly in a week. This may include a testing of urine along with breathalyzer at least twice in a week. Many clients agree to do the testing when there is a positive relationship between an individual and counselor. This technique aims in improving the success of supporting the abuser through friendship to take control of addiction. Patients dealing with hard drugs that include heroin and morphine are given medical detoxification. Later this technique concentrates on dealing with emotional as well as mental thoughts that may lead to addiction in addition to offering treatment. In a survey treatment carried in separation institutions shows that, treatment provide responses to treating patients that have abused drugs in the past. In 1981, 41% of patients were found to respond to treatment therapy (National Association and drug abuse counseling, 1970)

Thirdly, Counseling Technique. This approach guide and educate the client on all phases of drugs addiction. Aspect of motivation is used. The counselor emphasizes on the client strength rather than dealing with the weaknesses. In this approach, a counselor is advised to avoid aggressive confrontation to the client struggles but instead emphasizes on personal responsibility for change. The client is usually given time to change instead of being controlled. The foremost goal of this technique is to be friendly to enhance positive interaction. This helps the client to examine and willingly change to his or her drug usage behavior. Recommendation supervision is important in sharpening clinical skills. Born in mind that counselor’s job is demanding, studies have shown that all counselors receive one hour of group supervision and one hour of individual supervision in a week. In addition to this, there is a daily case conference and seminars been attended by all counselors to help in discussing special problem that occur in the field for instance, lack of attention to client.

Therapeutic Alliance is one of the most techniques used in clients that actively use alcohol and other drugs. The approach treats all types of chemical addiction. Research has shown that this technique is used in both adults and adolescent (Marlette, 1985) However, the groups are treated separately according to the age. According to article on Maintenance Strategies in the Treatment of Addictive Behaviors, Marlette, (1985) argues that, in building a relationship under this approach require a great deal on clinically aspect on the part on the rehabilitation counselor who should compliment the client for showing up at the session in facing reality of situation. In doing this it will build high self esteem and a chance to change.

Assessment technique is also one of the approaches used in counseling. This approach usually begins by asking the client to fill an extensive self assessment questionnaire. The questionnaire assessment motivates the client to engage in therapeutically interactions. It involves identifying with clients internal as well as external factors to this behavior. These factors include family history, Vocational history along with treatment history that an individual may have undergone. This technique helps the client to identify his or her need for change.

Support group technique is one of the rehabilitation program used to attempt in teaching the patient through people who have undergone the same problem and have overcome. In particularly, patients get encouraged more and a desire to change is more(Alan,2006).

Conclusion

In conclusion, drug rehabilitation counseling enables the patient to stop abusing the drug. The consequences of drug abuse may be psychological; legal that may end the patient in jail, financial problem due to money spent on drugs, social problems and physical consequences that maybe a result of extreme abuse. As discussed in this paper there are a number of issues and techniques pertaining to Rehabilitation Counseling in drugs and alcohol. These include Training in Issues and techniques pertaining drug addiction, treatment therapy, counseling technique, therapeutic Alliance, assessment technique and support group technique. Drugs and alcohol been a major problem in the society, cannot be ignored due to the consequences effects it has. The effects include liver damage, mental disorder, social problem and physical problems. To avoid the continuity of the problem these technique are important in tackling the problem in rehabilitation counseling.

 

 

 

 

            References

Alan M, (2006) Drugs and alcohol abuse. A clinical guide to diagnosis and treatment. New York. Birkhaeser publishers.

Alston, M. (1990). National Association and drug abuse counseling journal article, vol55, pp893 896.

Alan M, (2006) Drugs and alcohol abuse. A clinical guide to diagnosis and treatment. New York. Birkhaeser publishers.

Frieden, (1990); Perez & Pilsecker, (1989). News in Mental nursing article, vol9, pp62-63.

Kenneth R (2004) Counseling theories and techniques for rehabilitation health professionals. New York: Springer Publishing Company.

Marlette,L (1985 Maintenance Strategies in the Treatment of Addictive Behaviors article,234-254

Peter, (1974) Addictive behavior journal. Netherlands: New York publishers.

 

 

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

Recent technology that has influenced our lives

 

Technology

Name

Institution

 

Recent technology that has influenced our lives

            Tan (2002) argue that, the internet has been considered the most important sytem, which has influenced our lives in various ways. First, it has given us a system to communicate effectively, which as a result, has improved our communication skills across the world. Internet has enabled many people to communicate with each other in long distance for instance via email. Internet has been documented to be the fastest in that it only takes seconds. Interestingly, it has become so powerful to the extent it has improved our social skills in that, people have made friends with strangers via face book, which many as a result have ended up in marriage and strong friendship. Some years ago, people used to go to libraries to get information and knowledge. Nowadays, internet has every information an individual may need thus being effective means of acquiring knowledge. Despite of its benefits, it has negatively influenced people to spend most of their time and as a result, many have ended up wasting time, which in human context is precious.

According to Michie (2007), internet has enabled money transfer easier. Nowadays, internet is being used in banking as well in reservation purposes. It has made transaction easier in the sense that, one can transfer money from one account, view balance report without necessary standing in queues in banks. In addition, it has improved vigorous lifestyle in that, shopping is done online. As a result, many have preferred online shopping to the usual shopping in that, it saves time and money which otherwise would be used in transport. One is only required to open the site, click and order what he or she requires. The most advantageous thing with online shopping is that, with online shopping an individual can compare product features and prices to make better decision with less effort. In addition, online shopping enables consumers to browse products in the entire world with no geographical boundaries. Subsequently, with online shopping it saves time used in travelling to retail replacing it with other tasks and hobbies. In facts, consumers exchange information effectively through discussion forums and chatting, which as a result, assist in making wise consumer decisions (Sheppard, 2009).

Internet has been a vital tool for expanding business through use of marketing via websites. As a result, one can target wide range of consumers around the world through using website. Eventually, it has made many businesses to flourish as a result of effective sales and marketing. Internet has also been an effective tool in promoting education in that, it offers online studies which as a result, many have preferred online studies to usual studies. Due to popularity of the internet, there have been explosion of online content creating opportunities of freelance writing. This has benefited people that love to write have gotten a tremendous opportunity in making money online. In this context, Gough (2005), many have invested in freelance writing.

Technology innovation that will profoundly influence our lives

            From my opinion, internet will be innovated more in the next decades from now, such that, it will enable people to communicate face to face via internet through Skype. Although Skype has been innovated, some countries do not have its access. With this in mind, it will be made available to people in the entire world.  Currently, people are just writing short messages while communicating. Skype will be innovated in such a way that, people will be communicating while seeing each other. In facts, this will have a great influence in our lives (Gough, 2005).

First, innovation of Skype will make communication friendlier to the users across the world. In facts, there will be no hassles or difficulties instead; users will call other people on computer, mobile phones or else via email being close to them. This will positively affect people to communicate with their loved ones in a close contact. This implies that, users will have an opportunity of seeing the other person while communicating. It is with no doubt; this will be a vital tool for business people who will be unable to attend certain events like meetings. Secondly, through innovation of Skype, there will be opportunities for chatting along with attending meetings while still doing some other businesses. Thirdly, users of Skype will be in a better position to share files with each other. In this regard, it will create opportunities for Skype users to relocate files without difficulty from their account to their relatives or friends account. This will be done in such a way that, there will be relative security. Nevertheless, it will prevent people from communicating in times when computers are off or when it’s not working effectively (Kirsh, 2009).

References

Sheppard, A. (2009). Skype Hacks. London: O’Reilly Media, Inc. Publisher

Kirsh,S.J. (2009). Media and youth: a developmental perspective. New York: John Wiley and       Sons

Michie, J. (2007). Street smart internet marketing: tips, tools, tactics & techniques to market your   product, service, business or ideas online. London: Street Smart Internet Market

Tan, F. B. (2002). Advanced topics in global information management, Volume 1. London: Idea   Group Inc (IGI)

Gough, M. (2005). Skype me!: from single user to small enterprise and beyond. London:    Syngress

 

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

QUALITATIVE REVIEW

QUALITATIVE REVIEW

By Name

 

Course

Tutor’s Name

Institution

Date

 

Qualitative Review

Introduction

Manthorpe, Goodman, Harari, Swift, and Iliffe’s article Smarter Working in Social and Health Care: Professional Perspectives on a New Technology for Risk Appraisal with Older People focuses on a report by Smarter Working in Social care and Health (SWISH). The report was a feedback on how an information technology system for assessment of old people in the society can be improved. The report suggested that it would be more appropriate to use feedback information obtained from the old people themselves to develop health and social programs for them. The research involved two qualitative studies done in different regions within London that aimed at developing a method that would enable assessment of the information regarding old people to determine those who were at risk. Additionally, the study intended to investigate the applicability of such a method in enriching public sector information and empower the local communities report cases of old people at risk. This paper is a qualitative analysis of Smarter Working in Social and Health Care: Professional Perspectives on a New Technology for Risk Appraisal with Older People. The paper will critically discuss how the research was undertaken (methodology) and what the research found out (findings). Additionally, the paper will include a critical review or appraisal that will systematically and logically give a balanced assessment on strengths, weaknesses, and limitations and give an informed opinion on the methods and findings.

The study involved several approaches and entailed obtaining data from focus groups as well as interview in which old people and professional dealing with the old people were interviewed. Manthorpe, Goodman, Harari, Swift, and Illife (2009. Pp. 1839-1843) found out that the existing health risk assessments are comprehensive particularly in identifying the risks facing the old but burdensome. However, they found out that social workers as well as the managers are unaware of how they can make use of data on the local population to meet the information needs of the old people. The study also aimed at exploring practicality of HRAO technology in determining the needs of the old people and informing social care and health commissioners of such need for effective planning. This would ensure the needs are addressed. The study was credible because it has been peer reviewed which validates the truthfulness of the data presented. Additionally, the study was based on a report prepared by Smarter Working in Social and Health Care

The article met the conditions of a good research article sine it had an abstract or summary of the methods and findings, background to the study in terms of aims/objectives and justification or rationale for the study. Additionally, he article included a literature review stating what is already known about the topic and gaps in knowledge. Another aspect that distinguished the study as dependable was the explanation on how the research was undertaken in the methodology section. The findings of the study were explained in the findings or results. A section on discussion of the findings that also linked them to existing literature was available. The article made the conclusion and at the same time highlighted the limitations and recommendations of the study together with a way forward for future research. Finally, the authors acknowledged the works of other researchers used in the article, which was done using a reference list.

The abstract gave an overview of the paper. It summarized the method used in the study, the study results, and the findings. This provided an insight on the significance of the study. The literature review was evident throughout the paper. The article kept referring to previous studies done on perspectives regarding use of technology in risk appraisal with older people. The methods used enhanced coverage of different perspectives. The study findings were consistent and addressed the research question. Another aspect that made the study credible was its objectivity. The analysis was done qualitatively and the study involved a large number of participants. Additionally, the research questions enhanced objectivity. The participants volunteered to participate and answered the question they wanted to without being forced.

The study was significant since it addressed an issue that has been under discussion for quite some time. In England, there has been ongoing discussion on how the health and social well-being of the old can be improved. Organizations such as National service Framework for Older People have been searching for a policy that would enhance social care for the old. This study was thus crucial in that it provided some foundation on how a platform that addresses the needs of the old people can be initiated. Additionally, the issue on how independent living amongst the old can be enhanced has been seriously debated in UK (Law, et al., 1998, 284-286).

The study, recommended use of Health Risk Appraisal for Older people (HRAO), which makes use of questionnaires as the tools to assess the health need of the old people. The study was extensive and different research methodologies were used. The participants included focus, groups, individual interviews that were conducted on old people as well as professions (Hannes, 2011). Qualitative analysis was the most applicable since it enable wide coverage. By collecting data extensively, the precision of the study was increased. The extensive nature of data could not have allowed quantitative analysis. Additionally, it enabled assessment of aspects such as the history of the use of information technology amongst the old (Mitchell, et al., 2012, 1-7). Qualitative analysis enabled subjectivity since it reflected the views of the majority. The issues of factors affecting the health of the old people in the society is quite complex. Use of qualitative analysis was appropriate since it enabled interpretation of the data using different (Sharland, 2006).

The study was conducted at two local authorities, which were NHS Primary Care Trusts (PCTs), and Smarter Working in Social and Health Care 1833. It entailed use of technology development approach to establish the modifications that required to be done on the existing programs. The sampling was done in a way that ensured that the participatory group was representative of the old people. This is because it involved use of purposive approach where 52, older person selected from the two areas under study were selected. Additionally, 78 professional dealing with the older people were interviewed. This was insightful since it ensured that the study provided informed findings since professional would understand the health and social well-being of the old. Using the local authorities, NHS, and focus groups to aid in identifying the older people in the society made the study findings more effective (Rabinowitz, 2012, Web).

Several reasons made the research methodology effective. One such reason was that the participants were allowed to choose whether to use face-to-face interview, over the phone, or through their focus groups. This ensured that they gave the information freely and voluntarily since they were not forced. The individual interviews were organized beforehand and the research questions were clear and addressed the research question. Additionally, the interviewees were allowed to pursue topics that were not directly related to the study. Use of group interviews in addition to the individual ones was advantageous since it enabled the participants to stimulate each other’s thinking (Rabinowitz, 2012, Web; (Shaw & Gould, 2002, 4-10).

To conduct the study, permission was obtained from the local authorities. This ensured that the research was ethical since it was in line with the requirements of the authorities. For participating employees, the heads of the organizations were involved in the study. The study question was on the views of the participants on the value, usability, and appropriateness of HRAO in assessing the need of the older. The participants were requires to rate the benefit of such data and how the local authorities applied such information in planning the interventions (Illife, et al., 2000, 4-6).

The data was analyzed qualitatively to enable consideration of multiple perspectives from the different unrelated groups of participants. This enabled the researchers to analyze view as well as experiences from varying groups and individuals. The analysis was descriptive and three members of the research team were involved in the analysis of the data. Use of discussion amongst the analyzers ensured that different perspectives were included. The study ensured that the data was correct by further analysis of the results by the other members of the research team (Manthorpe, et al., 2009). The analysis was extensive since the researchers aimed at reaching a point of saturation whereby, they would have analyzed all the data and further analysis produced no new results (Manthorpe, et al., 2009, 1829-1834). The findings were presented appropriately and in a manner that could be easily understood (McLaughlin, 2012, 1-7). The researchers found out that technologies such as HRAO enabled the older people to participate in the society welfare since they could access information. Additionally, HRAO enabled reporting of social factors determining health of the older persons. Some of the factors mentioned were bereavement, retirement, injuries, accidents, and divorce.

The article had some limitations. One of the limitations is its failure to address the shortcomings of the existing programs. Though it mentioned that the existing programs do not state how leaders in the society should deal with reported information on the problems face by the old at risk, it failed to provide evidence on this. Additionally, the methods used in conducting the study have not been clearly explained. Another limitation of the study is on the analysis (Becker , et al., 2012, 7-12). Though a brief description on how the data was analyzed has been given, the analysis is not properly presented.

Conclusion

Manthorpe, Goodman, Harari, Swift, and Iliffe article was extensive and addressed the objectives of the study. The data reflected the situation for the target population since it entailed interviewing individual as well as groups. The sample was large and thus meaningful inferences on the target population were obtained. The article was organized and easy to understand. It covered all the features of a research article.

The article was present in a clear and interesting way. The objective and the findings were clearly explained. However, the research methodologies as well as the data analysis sections were not very clear. The study was consistent and addressed the research question. The findings were useful to social workers since they addressed the issue of health and social factors affecting the old, a subject that has been debated in the field of social studies. The information flowed appositely and was continuous. The article was timely since it came at a time when the government of the UK was seeking for a way to address the health and social matters affecting the older people. His also makes the article worthwhile since it will enable the social workers address the issues affecting the old effectively. There are no serious omissions and the research question was addressed appropriately. It provided new insight on issues affecting the older people. It contributed to the existing knowledge by pointing out at the issues that needed to be addressed to make HRAO more incorporative. The study contributed to existing knowledge by providing measures that can be taken to refine HRAO method and improve access of information and services by the old people. Additionally, it provided ways of identifying older people at risk, and examined the potential of HRAO in enriching public sector.

 

Works Cited

Becker , S., Bryman Alan & Ferguson , H., 2012. Understanding research for social policy and social work. New York: The Policy Press.

Hannes K. Chapter 4: Critical appraisal of qualitative research. In: Noyes J, Booth A, Hannes K, Harden a, Harris J, Lewin S, Lockwood C (editors), Supplementary Guidance for Inclusion of Qualitative Research in Cochrane Systematic Reviews of Interventions. Version 1 (updated August 2011). Cochrane Collaboration Qualitative Methods Group, 2011. Available from URL http://cqrmg.cochrane.org/supplemental-handbook-guidance

Illife, S. et al., 2000. Smarter Working in Social and Health care (SWISH). Quality in Ageing and Older Adults, 6(4), pp. 4-11.

Law, M. et al., 1998. Guidelines for Critical Review of Qualitative Studies. Qualitative Studies, pp. 357-362.

Manthorpe, J. et al., 2009. Smarter Working in Social and Health Care: Professional Perspectives on a New Technology for Risk Appraisal with Older People. Oxford Journals, Vol 40(Issue 6), pp. 1829-1846.

McLaughlin, H., 2012. Understanding Social Work Research. 2nd Edition ed. New York: SAGE Publications Ltd .

Mitchell, W., Baxter, K. & Glendinning, C., 2012. UPDATED REVIEW OF RESEARCH on the Risk and Adult Social Care in England. JRF Programme Paper, pp. 1-45.

Rabinowitz, P., 2012. Qualitative Methods to Assess Community Issues. The Community Tool Box, p. http://ctb.ku.edu/en/tablecontents/sub_section_main_1050.aspx.

Sharland, E., 2006. Young People, Risk Taking and Risk Making: Some Thoughts for Social Work. Open Journal Systems, Vol 7(No 1), pp. Art. 23, http://nbn-resolving.de/urn:nbn:de:0114-fqs0601230..

Shaw, I. & Gould, N., 2002. Qualitative Research in Social Work. New York: SAGE.

 

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

                                                                                         

 

Name

Course

Instructor

Date   

                In Psychology, abnormal behavior is defined as a rare or dysfunctional behavior in the human being. Abnormal behavior is influenced by biological factors that result to the problem in brain processes and Psychological factors which involve emotional turmoil along with social factors. Social scientists and psychologists have defined abnormal behavior as psychological adequacy that causes social discomfort to the victim. Women are more likely to behave abnormally for the reason that, they are discriminated in the society and have unequal social position (David, 2007).  On the other hand, normal behavior is the opposite of abnormal behaviors. Therefore, an individual is regarded normal if he or she is free from mental disorders. David argues that, intelligence is considered normal while below average is viewed as abnormal. It is vital knowing that, Abnormality depends on the understanding point of view towards normality (Sue, ed al 2008). Moreover, normality tends to define norms of behavior instead of prescribing the definition of healthy or adaptive behavior. As a result of abnormal functioning in the current world, several therapies are used in explaining and treating psychological disorders. These include Biological Therapy and psychotherapy.

Biological therapy is a treatment that is used to reduce or eradicate symptoms of physical disorders (Sue, ed al 2008). The biomedical therapy is commonly used to treat anxiety disorders, schizophrenia and mood disorders. These drugs are required to reduce tension and improve social behavior. In additional, Psychosurgery therapy and Electroconvulsive are two methods used as final resorts. Psychotherapies are classified into four techniques that include Cognitive, behavioral, humanistic and psychodynamic. Psychologists use these therapies with the goal of self awareness and encouraging sight. The psychodynamic therapies bring in the importance of the unconscious mind and the role of childhood experiences. In the psychoanalysis, individual’s thoughts are analyzed which determines the behavior content. For example, therapists believe that mental challenges are caused by unresolved conflicts such as issues involving sexual harassment or any harassment in early childhood. These therapies are effective in treating the Depressive disorders in individuals (Sue, ed al 2008).

Depressive disorders are illnesses that involve thoughts, body and mood which interferes with normal functioning and daily life thus causing pain for the victim with disorder and the people that care about him or her. The depressive disorders include Major Depression, Dysthymic disorder and Bipolar disorders. Dysthymic disorders include psychotic depression, seasonal disorder and postpartum depression. Major depression is characterized by symptoms that interfere with an individual ability to sleep, eat, study or enjoy any pleasurable activity thus preventing an individual to function normally. Dsythmic disorders are characterized by long term severe symptoms that may prevent the person from functioning normally. Psychotic depression happens when an individual is accompanied by psychosis such as delusions and hallucination. Postpartum depression is the depression that women experience after giving birth. Finally, seasonal disorder is characterized by depressive illness during winter months. Bipolar disorder involves cycling mood from extreme high to extreme low.

Individuals with depressive disorders have different symptoms depending on individual illness. Some of the common symptoms include the following. Loss of appetite or overeating, excessive sleeping or lack of sleep, persistent headaches or digestive problems, loss of memory and difficulties in concentrating, fatigue and anxiety, feelings of guilty and hopelessness. Lack of interest in various activities such as sex among others, suicidal attempts and thoughts of suicidal. Depression is often related to other severe illnesses that include cancer, heart diseases, diabetes and stroke. Due to depression, alcohol and other drugs are often abused. Research has shown that, Alcohol and drugs have been commonly abused in United State due to co-existence of depression disorders (Herrman, ed al 2009). There are no causes of depression rather it results from psychological factors, environmental factors, biochemical and genetic factors. Depressive illness can occur as a result of disorders in the brain. The part of the brain that regulates mood, sleep, reason and behavior appear to function abnormally. Herrman has argued that, brains of people that suffer from depression look different from normal people and the brain cells for communication are usually in active. Some types of depression are genetic while in some cases is due to bereavement, relationship problems, trauma or stress.

It is unfortunate that most people that suffer from depression are not aware that they are sick thus not considering medical help. Successful depression treatment requires a biological therapy, social measures and psychotherapy in improvement of the patient suffering from depression. Effectiveness of depression treatment is determined by sufficiency of therapeutic intervention and clinical presentation. Biological treatment includes pharmacological therapy where by drugs are used for treatment and improving some conditions that include, sleep deprivation, electroconvulsive therapy, dietetic therapy, phototherapy among others. During pharmacotherapy, there is the use of other medications that develop metabolism of brain cells and influences the immune system which include, vitamins, tranquilizer, hormones and neuroleptics. The Treatment of depression symptoms can also be conducted by the help of psychotherapy. To get rid of depression victims, this form of psychological and medical aid is recommended. It is vital knowing that, many depressed patients suffer from functional disorders of internal organs hence sensitive to side effects on biological treatment (Mitchell, ed al 2003).     Psychotherapy enables patients to get used to real life. This therapy improves on the effectiveness of medical treatment along with family relationships and professional status of the patient. Frequent depression after trauma leads to persistent of its origin. The circumstances give the patient a need for psychological help. Doctors refer the psychotherapy of depression treatment as a primary aid in doing away of depression symptoms such as anxiety; attempt to commit suicide, hopelessness and doubt among others. It is assumed that, psychotherapy is limited in severe cases of depression. In human therapy, patients are encouraged to have self awareness and personal development. Patients are encouraged to understand themselves and take full responsibility of their feelings. Cognitive therapists focus on changing the patient’s thoughts so as to change his or her belief system in considering self efficacy as the key to successful therapy. Studies have shown that cognitive therapy is effective in depression treatment (Mitchell, ed al 2003).

In conclusion, human therapy gives in consideration that the victim is part of the society and enhances to treat the patient equally within the context of other individuals. Other treatment includes community mental health along with cultural perspectives.

 

 

References

David H, (2007). Clinical Handbook for Psychological Disorders.  New York. Guilford Press

Herrman H, Maj M, Sartorius, (2009). Depressive disorders. New York. John Wiley and Sons Publishers

Sue D, Sue W, Sue S, (2008). Understanding Abnormal Behavior. New York:  Cengage Learning Publishers.

Mitchell D, John F, (2003). Behavioral Medicine in Primary Care. New York. McGraw-Hill Professional publisher

 

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

Request for Proposal structure for ABC

Request for Proposal structure for ABC

Name

Institution

 

 

Request for proposal For Videoconferencing

Date issued:

Date Due:

1.0  Company information

ABC Company has been in existence since 1969. The company is located in USA with many branches all over the country best known in distribution of communication telephone systems. Over the past 40 years, the company has aimed to operate in excellence through partnering with many multinational companies to set up branches globally (Atkinson, 2005).The company has over 10,000 branches globally with more than 50,000 staffs in each location.ABC Company is seeking a videoconferencing with an aim of increasing the company productivity, improving the overall communication system, reducing travel expenses in addition, allowing militia-point assemblies across international boundaries and time zones. By integrating the video conferencing system it is with no doubt; it will create employee satisfaction in that, a time meeting with customers has innate risks particularly when traveling across the country. Additionally, going to other countries create health hazards. With video conferencing, employees will have an advantage of conducting businesses without any safety and health risks.

2.0  Purpose of the Request for Proposal

In essence, ABC Company intends to conduct assessment that will allow to

  • Create an environment that is concerned with employees’ safety and time consumed in travelling.
  • Strengthen bonds with customers and remote colleagues between telephone calls and personal visits.
  • Stay ahead of competitors through increasing the company productivity.
  • Creating the ability to share information more easily.
  • Find out if the existing wireless network is configured firmly.

3.0  Administrative

Any question that direct statement of work or technical specification, contractual terms, programming and editing should be directed to the following people

Title Name Address Emails
Technician Williston Alfred +97-238723310 willsonfred@yahoo.com
Contractual Nancy Fred +97-549231786 nanacyfred@abccomapny.co.au
Computer engineer Luios Robert +98-653459870 robertluious@gmail.com
Video programmer Jane Eliud +97-237691062 eliudjane@abccomapny.co.us

  4.0  Timeline

Event Date
Distribution of RFP to vendors 5/06/2009
Questions by vendors concerning the scope and approach due 7/07/2009
Responses from vendors concerning the scope or the approach due 8/09/2009
Proposal due date 11/10/2009
Target date for evaluation of proposal 12/12/2010
Final vendor selection 1/1/2011
Anticipated decision with selection of vendor

 

5/3/2011
Anticipated commencing date of work 6/4/2011

 

The written confirmation of the vendor intent of responding to this RFP is required by 7/6/2011 and due by 3pm on 8/6/2011

5.0Scope of work and standards

Project phases Objectives Date
External network susceptibility measurement To come up with the number of IP addresses 8/7/2011
Internal network susceptibility measurement To come up with the number of network devices 9/8/2011
Videoconferencing application assessment Privilege levels of each videoconferencing application 10/9/2011
Application code review To come up with number of lines code to be applicable 11/10/2011

 

 

6.0Design requirements

ABC Company requires various programmers to work in different locations in addition, participate in editing, testing programs and debugging. In addition, there are various components required in videoconferencing system such as Audio input, audio output, Video Input, Computer, desktop systems, web cam, microphones and speakers to be used while listening to the conversationalist (Bragg, 2009).

7.0Budget

The company budget for video conferencing is $19,000 that includes all hardware and software required. It is important noting that, the reason for budgeting for hardware and software is because they are essential in making video conferencing successful. With this regard, the budget is outline as below.

Software/hardware Role in the network Resources
Video camera/webcam
  • Transferring the image to computer network
  • Security surveillance along with computer vision via spyware
$3,000
Computer monitor
  • Play a fundamental role in marinating data linkage through the network
  • Processing unit which ties together other components used in Video conferencing

 

 

$3,000
Audio outlet
  • This is the software that assists in translating the communication into the printed word.

 

$2,000
Loudspeakers
  • Making the voice clear while communication
$3,000
Digital telephone
  • The use of digital electronics within provision of digital telephone that helps in transferring the data speedily over the telephone lines in video conferencing.
$4,000
Desktop
  • Adds level of convenience in building the access of system.
  • Adding security that video conferencing offers in the sense that, it has the ability of locking the user account thus, users cannot change computer information or even access it.
$4,000

 

8.0 Contract terms and conditions

The written confirmation of the vendor intent of responding to this RFP is required by 7/6/2011. With this regard, all proposals should be due by 3pm on 8/6/2011 with any proposal received later considered non-responsive and late. Late proposals will not be evaluated for the award. In this regard, financial arrangements should be made before 9/8/2011.

9.0 Evaluation and Award Process

What will influence the final selection decision is the negations with various vendors in concerned with the project which as a result, will assist in coming up with the final decision. This will be evaluated in the aspect of findings of detailed technical vulnerability, positive security aspects identified as well as the detailed technical remediation steps. These will assist to come up final decisions (Wilcox, 2000).

 

 

 

References

Atkinson, P.R. (2005). Strategies for winning contracts. California: Aspen Publishers Online

Bragg,S.M. ( 2009). Running a Public Company: From IPO to SEC Reporting. New York: John Wiley and Sons

Wilcox,J.R. (2000). Videoconferencing & interactive multimedia: the whole picture. California:     Focal Press

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

Abstract

Name:

Course:

Instructor:

Date:

Abstract

Security has been a fundamental aspect in many campuses in the sense that, it enhances protection thus, creating a favorable learning environment. In ensuring there is effective security in campuses; universities have paid safeguards to protect properties, assets and people. Security guards maintains high visibility that deter inappropriate and illegal actions in universities through watching alarms, patrols or video cameras for signs of illegal actions then reporting the incidents to the school administration. In facts, security creates a favorable environment for students, staff members and visitors. In this regard, many campuses have established the need for embracing security to progress safety. This implies that, without security then; no safety environment.

Campus Security in Universities

1.0 Introduction

It is a well-documented fact; security is the degree of protection against crime, loss and damage. Security is the form of protection that provides security thus, progress a safe environment. With no doubt; the safety of students and staff has become a core issue in many campuses. With this in mind, some have taken measures to install video surveillance or metal detectors to aid security response. Studies outline that, the most security issues faced by many campuses include vandalism, gangs, bomb threats and bullying (Bailey & Saulny 1). For many universities, security aids a favorable learning environment. For instance, for many years, Tulsa University has embraced security with an aim to enhance security measures. The security officers of Tulsa University are certified whose purpose is to deterrence crime and safety for all students, staff members and visitors. In facts, Tulsa security department provides escorts on request during hours of darkness or during normal operation hours. In conjunction with this, the security offers vehicle assistance where possible to students, staff and faculty. Despite some campuses embracing security issue; there have emerging issues where security has not been emphasized. In many cases, security officers have ignored students safety, and instead; concentrate more on school safety. With no doubt; when illegal actions has increased randomly in many campuses; it becomes obvious that there is a need for having effective measures that aid security without sideling any area. With this regard, this proposal seeks to discuss campus securities. In examining this, this paper will discuss the advantages and disadvantages of campuses security.

 

 

2.0 Background of the study

In essence, an overwhelming majority for campuses safeguards officers believe that, many universities are exposed to terrorist attack because of inadequate preparations to respond to illegal attacks in universities. In facts, university safeguards officers have acquired minimum training and support from the state regarding preparations for illegal attacks in universities. A survey done in 2007 by National school safety and security services outline that, inadequate

Preparations of security in universities institutions have led to Islamic terrorists to target American Schools thus, imposing the need for comprehending security measures. With no doubts; the majority of many universities are left behind in regard to security preparedness. Nevertheless, institutions with adequate preparations have received good results of safe environment.

3.0 Statement of the problem

Over the years, issues concerning campus security have been sidelined. It is borne in mind; campus security enhances protection through providing the high degree of the public safety thus, assuring a suitable learning environment (Lashley 197). There have been several deep rooted issues concerning Tulsa campus security in the sense that, the security department has so much focused on giving parking tickets and towing cars as they ought to provide safety for students. Lack of providing security safety for students have attributed to their properties stolen thus, creating unfavorable environment for many students. Lack of safety for students has epitomized many students to the extent, in some campuses it causes shooting everywhere (Astin 650).  In this regard, studies outline that, the Northern Illinois University has experience lack of safety security for their students in that, in the year 2008, there were grief and questioning of the deadly shootings in the university ( Finder & Rimer 1). Finder and Rimer argue that, the former student at Northern Illinois University opened fire in the lecturer hall that killed five students. With no doubt; investigation indicated that, the reason for such tragedy was due that, there were no fences or gates in the university thus, there was an open access for advancing crime (Fitzpatrick 10).

It is borne in mind; when security is sidelined in many universities illegal actions create emotional insecurity in the sense that, many students end up suffering emotionally for crime increase, which to some extent many  lose their properties. Additionally, lack of security causes poor performance due to emotional disturbances, which creates unfavorable learning environment. With this in mind, education experts argue that, security officers should be aware and prepared through preparing, planning and equipped with measures that enhances security concern (Bailey &  Saulny 1).

Nevertheless, campus security has been emphasized in some universities. For instance, despite Tulsa security department concentrating much on giving parking tickets and towing cars as ought to providing students security; the escorts’ security has an emphasis on providing escorts upon request particularly at night or after the normal operation hours. As a result, this has eradicated security problems for students that leave the institution at late hours. Additionally, the core purpose for security officers has been to deterrence crime thus, with such an objective it has encouraged the Tulsa security department to enhance safety for all students, staff members and employees thus creating a safe environment for the Tulsa University.

On the contrary, in the article Gaps likely to persist in campus security 2008, Finder and Rimer argue that, no matter how many universities safeguards officers are prepared; there are limits to how safe they could keep students. Under this context, Finder and Rimer (1) argue that, at Virginia University, the vice president with the chief operating officer acclaimed that, it is essential for safeguards officers to carry out patrons occasionally to detect crime and to outline students in distress. According to Finder and Rimer, the kind of security installed in federal courthouses and airports are not installed in campuses thus; imposing how security has been sidelined to some extent.

4.0 Research questions

  1. 1.      What account has campus security emphasized?
  2. 2.      What actions are necessary to achieve effective security measures?
  3. 3.      Is there are connection between the quality security measures as the key aspect to eliminate crime and illegal actions in campuses?
  4. 4.      Effects of lack of campus security?

5.0 Hypothesis

Security has not been emphasized in many campuses in the sense that, there have been many emerging issues concerning the lack of safety for students to the extent; many have lost their properties and murdered.

6.0 Research objectives

  1. 1.      Examine how campus security has been emphasized.
  2. 2.      Identify various actions that can enhance effective campus security
  3. 3.      Establish the relationship between quality security measures and illegal actions in campuses.
  4. 4.      Identify consequences of lack of campus security.

7.0 Significance of study

This research is significant in the sense that, the outcome will enhance that campus security is enhanced through coming up with effective measures. Additionally, the study will evaluate the advantages and disadvantages of campus security, which as a result, will create the need for increasing security measures.

8.0 Literature review

For many years, security has been associated with safety. Various studies outline that, security tend to protect properties and people through creating the visibility presence to deter illegal actions along with inappropriate actions (Rimer & Finder 1). Watching alarms and video alarms have been outline to be effective measures that deter signs of crime then, reporting any crime incidents. To some extent, this has not been the case for many campuses in the sense that, many do not have adequate tools to deter signs of crime. In this regard, Fitzpatrick ( 9 ) argue that, many cases have emerged for instance in Tulsa University where safeguards officers have focus more on giving tickets and towing cars more than providing security to students. As a result, many students have lost their properties, and as a result, it has created unfavorable learning environment. In this regard, Lashley (198) argue that, as the society is shielded with crime; there is utmost efficiency for states and institutions to provide adequate tools to deter signs of crime.

In the article national school safety and security services 2002 outline that, many security guards are inadequate prepared in responding to illegal actions brought by lack of intelligence tools that deter crime, which s a result, becomes difficult to deter crime. This is proved by Finder and Rimer who in the article Gaps likely to persist in campus security 2008 argue that, the high level security is sidelined in many campuses thus; open to illegal actions and crime.

Typically, it is frustrating noting that, many universities have suffered from insecurity. For instance, a report done by Bailey and Saulny (1) outline the grief shooting that occurred in the University of Northern Illinois to have imposed the need for having adequate security measures that enhances students’ safety. In this regard, Bailey and Saulny outline how frustration the incidence to the extent of killing five students. From their argument, the Northern Illinois incidence imposed awareness on how universities have not emphasized on security measures that prevents illegal actions, which in this case was shooting. With this in mind, in the article Gaps likely to persist in campus security Rimer and Finder argue that, parents should be cautious when selecting universities it is essential to consider the university that enhance protection because failure to this can cause murder, illegal actions and poor performance among others.

Subsequently, Rimer and Finder argue that, inadequate campus security causes mental disturbances like in the cases of Virginia Tech whereby, thirty two students were shot. It is at this point, the American campuses stepped in, and addressed on the importance of having effective tools that deter signs of crime. With no doubts; many universities have understood the need for having effective measures that deter crime. For instance, at Kentucky University Rimer and Finder (1) outline that, the university administration has introduced surveillance cameras and alarms systems that have been effective in reporting emergency signs of crime. As a result, many security guards officers have worked effectively in prevention and deterring crime. Additionally, security officers have been mandated to go through training in crime investigation. Fitzpatrick (10) argue that, because of elevated threats of illegal actions;  at California, safeguards are mandated to have a police certification to effectively carry out security crisis. As a result, there have been increases in safety through detecting and reporting any illegal actions.

With this regard, in Tulsa University, Fitzpatrick (10) argue that, regular patrolling has been emphasized, which as a result, has predicted illegal actions as well as, monitoring the learning environment. Nevertheless, students’ safeties have not been emphasized in that, many students have reported on lost of properties. With this in mind, to enhance safety; safety guards should confront illegal actions in all areas.

In this regard, many developed countries have gain access of security concerns to the extent, many uses video cameras and watching alarm to detect signs of crime. Since middle Ages; watchmen were commonly paid to enhance security. Recently, things have changed in the sense that, security guards have been replaced with night-watchman to fulfill security function of campuses. Studies outline that, many universities have improved security conditions for instance, University of New Hampshire that has installed detectors and alarms to notify crime (Bailey &Saulny 1). In conjunction with this, at Harvard, there have been preparations regarding the bullhorns to the emergency situations through using text messaging systems, e-mail and cell phone to communicate any insecurity notifications.

9.0 Research Methodology

            In order to achieve my results, my research plan will be collected by the primary and secondary data. In facts, the primary data will be done directly in the field through learning institutions. Additionally, the research will gather additional information on any other relevant materials regarding campus security through internet information, newspapers and textbooks.

 

10.0 Methods of Data collection

Methods of data collection will include interview schedule and questionnaires. In essence, interviews will be carried out in Illinois University. In addition, questionnaires will be imposed to victims that have suffered because of lack of campus security. The investigation questions will include:

  • How active has your security department been?
  • How often, does security provides escorts at night?
  • What are major causes of crime in campuses?
  • What are effective measures to enhance campuses security?
  • In your view, has security been emphasized in your campus and what answers account for this?
  • Would you agree on the fact that campus security has been sidelined and why?

The respondents will be required to give their opinions and additionally, secondary data will be collected in order to augment facts.

10.1 Timescale   

In essence, the research will take one month period in addition; the respondents percentage foe each question will be analyzed through statistic computer package.

11.0 The findings

After evaluation, the findings indicated that, 40% of students outlined their safeguards not being active, and as a result, this has increased illegal cases and crime in the institution. In addition, 50 % outlined that, security guards have often offered escorts at night but; acclaimed the need for having effective tools that deter signs of crime. When many were asked on the causes of campus insecurity, 80% argued that, the campus safeguards lack adequate tools to deter crime and lack of effective training causes the safeguard officers to be inadequate in responding to campus attacks. In this regard, many outlined that, inadequate security has caused emotional disturbances, poor performance and high rate of crime. With no doubt; 70 % outline campus security to be sidelined approved by past incidents that have occurred due to negligence in security giving their school (Northern Illinois University) like the best example. A small number agreed on the fact that, to some extent, campus security has been emphasized but, outlined the need for having effective tools to deter crime thus, create a safe learning environment.

11.1 Results explanations

From the findings, the paper has achieved its objective in the sense that, it has outlined how many campuses have not considered high-level of security. In facts, the research has imposed various effects that emerge for lack of security. These include high rate of crime, emotional disturbances and poor performance among others. As discussed in the paper, there is a need for many universities to introduce advanced tools to deter signs of crime. Despite many universities embracing security aspect; there is a need of participating effectively to fight crime in campuses

 

 

 

Conclusion

      Security is vital tools in enhancing a safe learning environment in many universities. As discussed in the paper, lacks of security have severe effects such as shooting and emotional disturbances that eventually lead to poor performance. In enhancing there are effective measures that support security; there should be adequate training and tools that aid to deter crime. When this is done, it will create a safe learning environment thus eradication cases of lost properties, murder and poor performance. With this in mind, this paper has examined campus securities through examining its advantages and disadvantages. 

 

Work cited

 

Astin,Alexander. “How Good is your institution retention rate.” Research in high education. 38. 6 (1997): 647-658. Print

Bailey,Jeff &  Saulny, Susaz. “Grief and questions after deadly shootings.” The New York Times             16 February 2008: LZOI. Print

Finder, Alan & Rimer, Sara. “Gaps Likely to Persist in Campus Security.” The New York Times   16 February 2008: LZO1. Print

Fitzpatrick, K. “Preparation for and response to celebratory violence a community based   approach.” Campus law enforcement. 35.5 (2005) 9-14. Print

Lashley, Edwin. “Library Safety and Security Campus Community Police Collaboration.”            Library & Archival Security. 21. 2 (2008): 195-201. Print

 

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]