Monday, December 30, 2019

Nursing Philosophy - 637 Words

Philosophy of nursing is an occupation consisting of professional individuals that exhibit and express compassion, respect, dignity and integrity to their patients and fellow coworkers. Nursing is not just a career, it is intertwined in the way we think, make decisions and prioritize values. As a nurse, it is important to me to provide the highest quality nursing care possible to achieve excellence in patient outcomes, while simultaneously, providing a respectful healing environment and work with other members of the care team to achieve positive patient outcomes. Health. Wellness is not an absolute conception, but exists in the framework of the health obstacles of the human being (Kearney-Nunnery, 2012). Health, a dynamic process,†¦show more content†¦When patients are in our environment, it’s our obligation to provide safe quality care to promote safety being our top priority to our patients. We want our patients to feel safe at all times and have no fears while in our care. Nurses are responsible for knowing policies, procedures and protocols to ensure the safety of patients. We are also to maintain the privacy of our patients and to ensure Hippa regulations are not broken at any given time. It is our duty to provide safe adequate care at all times and to advocate for the patient. Nursing. Nursing is defined as treatment that is molded to the needs of the patient and delivered in a competent well organized and applicable way. Nursing refers to the operation of caring for the patient and assisting individuals in reaching their goals while also educating them the essentials of caring for themselves (Rebecca Lake, 2013). Nursing is about compassion and trying to understand human beings on all emotional, physical and scientific levels. We are the voice for our patient’s when unable to speak or unstable to make sound decisions. As nurses, we utilize therapeutic communication and intuition regarding the well-being of our patients. In conclusion nursing is just not a career, it is intertwined in the way we think, make decisions, and prioritize values. Nursing is a profession which uses evidence based practices yet displays a comprehensive understanding of human beings through health, person, environment, andShow MoreRelatedNursing Philosophy Of Nursing727 Words   |  3 PagesIntroduction As a nursing student in the BSN program at West Coast University, I have discovered my skills and knowledge to prepare myself on how to be an efficient nurse as well as a nurse that truly cares for the best quality of care given to a patient. I have found some good qualities and insight in the paradigms to a philosophy of caring as a nurse. In this paper I will discuss the four paradigms of nursing which includes: Health, Nursing, Client/Person, and Environment. As a nurse, one mustRead MoreNursing Philosophy : Nursing And Nursing Essay1660 Words   |  7 Pages Nursing Philosophy Nursing philosophy is defined as a nurse or students thought of what they believe to be true about the nature of the profession of nursing and to provide a base for nursing practice. (2016, para.1) The nursing field continues to develop into a professional scope of practice and nurses continue to work to develop a high standard for the profession. The values and skills that nurses’ learn as they care for patients continue to develop into rules and regulations for future nursesRead MoreNursing Philosophy784 Words   |  4 PagesNursing philosophy â€Å"identifies what is believed to be the basic or central phenomena of the discipline, relates nursing to a particular world view, and provides some information on how one may come to learn about the world†. (p. 13, Salsberry, 2008). My personal philosophy of nursing evolved over the years and includes my observations, beliefs, thoughts, and practices. The purpose of this paper is to discuss my personal philosophy of nursin g and the personal and professional experiences that haveRead MorePhilosophy of Nursing1024 Words   |  5 PagesPhilosophy of Nursing Alicia Hanford Elms College Philosophy of Nursing I remember at a young age telling my mother that I wanted to be a nurse just like her, she told me to choose a different path. Her response surprised me but did not stop me from pursuing my dream. I am passionate about being a nurse and what that role means. With recent frustrations with others in this profession I finally understood why my mother told me to choose a different path. I have always believed that beingRead MorePhilosophy of Nursing713 Words   |  3 PagesPhilosophy of Nursing The environment in which the patients are in plays a big role in their healing process. Florence Nightingale founded her nursing theory and philosophy on enhancing environmental factors to improve the patients overall health, healing and well-being. Nightingales attention to environment has added significance to the role environmental conditions play in human health status (Shaner, 2006). In Nightingale’s book, Notes of Nursing, she reflects on how air and water qualityRead MoreNursing Philosophy1056 Words   |  5 PagesT. Houston Philosophy of Nursing Toi Houston The University of Texas School of Nursing In partial fulfillment of the requirements of Professional Nursing A amp; B NURS 3645 Jeanean Boyd, MSN, RN June 6, 2011 Online RN-BSN Nursing is a profession that is very complicated and complex. It is exciting and has so many levels to it that one can actually never get bored with it. Most times when people think about nursing they only think about someone who adjustsRead MoreNursing Philosophy1798 Words   |  8 PagesMy Personal Nursing Philosophy Hope G. Slate Fresno Pacific University NURS/310 August 27, 2012 Brenda Laing, R.N., M.S.N., F.N.P. Abstract â€Å"Nursing theories are the creative products of nurses who seek (or sought) to thoughtfully describe the many aspects of nursing in ways that could be studied, evaluated, and used by other nurses. Theories provide structure and order for guiding and improving professional practice, teaching and learning activities, and research.† (Sitzman, 2011) Read MoreMy Philosophy Of Nursing Philosophy1481 Words   |  6 PagesMy philosophy of nursing My own nursing philosophy arises from my Knowledge as a nurse, personal beliefs and experiences, I have gathered throughout the years from my interactions with diverse patient population and other healthcare professionals, while working in different setting as a nursing in the health care. This also addresses nurse s ethics, goal and values as it relates to my nursing practice. My Nursing Philosophy is based on five components: nursing, Person, environment, holistic careRead MoreNursing Philosophy : My Personal Philosophy Of Nursing962 Words   |  4 Pages Philosophy of Nursing Brianna Daniels Florida Southwestern State College October 9th 2017 Professor Kruger As I interact with my patients, I can’t help but think to myself â€Å"this is why I became a nurse.† During critical moments of a patients life I am there holding their hand, listening to stories about the â€Å"olden† days and giving them the encouragement it takes to leave the hospital healthier than they arrived. Nursing is not just giving medications on time, educating the patientsRead MorePhilosophy Of Nursing : Why Nursing Essay1268 Words   |  6 PagesJoalexis Philosophy of Nursing Why Nursing? When I graduated high school, I wanted to have a career in the healthcare field, I enrolled at Valencia College to do a major in Chemistry, because I wanted to complete the pre-medicine requirements in order to attend medicine school. While in school I was working at Walmart, it was a decent job. However, my passion to work on the healthcare field, made me put my pre-medicine studies to a standby, and enrolled in an emergency medical technician program

Sunday, December 22, 2019

Spousal Rape Essay - 964 Words

Can a husband rape his wife? I find myself amazed by the number of people who believe that they can’t. It seems, the common mindset is that when a man and woman marry, the woman somehow become the man’s property, for him to do with what he wants, whenever he wants, regardless of her feelings. Well, I disagree completely and feel it is my duty as a past victim of spousal rape, to set the record straight that rape is rape, regardless of marital status just as murder is murder regardless of marital or relationship status. I will define the legal definition of spousal/marital rape, briefly discuss the history, point out the differences in requirements and punishments for rape vs. spousal rape, and finally describe the effects spousal rape†¦show more content†¦As a result of the women’s movement, on July 5, 1993, spousal rape became a crime in all 50 states, under at least one section of the sexual offenses code (crisisconnection.org). In 17 states and t he District of Columbia, there are no exemptions from rape prosecution given to husbands (crisisconnection.org). However, in 33 states there are still exemptions given to husbands from rape prosecution which demonstrates that rape in marriage is somehow still considered a lesser offense than other types of rape. Some examples of the differences in treatment of rape of a spouse from that of a non-spousal rape include: a shorter reporting period for spousal rape (depending on the state, 30 days, 90 days or 1 year, as opposed to at least 3 years for non-spousal rape), the previously mentioned requirement of the presence of force or injury, and in some states, the requirement that the victim must be living separate from the offender for it to qualify as a crime. Not surprisingly, the punishment for a spousal rape also differs from that of a non-spousal rape. For example, rape of a spouse by force or deadly weapon is considered a felony, and is punishable by two to ten years in jail. However, the same acts against a person who is not the spouse of the offender results in a sentence of ten to thirty-five years (ncvc.org). Just imagine if these double standards were placed on other crimes, such as murder, child molestation, assault, etc. It paints a pretty scaryShow MoreRelatedMarital Rape An d Spousal Rape1552 Words   |  7 PagesChilds Professor Sherene Jensen Sociology 100 16 November 2014 Marital Rape Marital rape, or spousal rape, had been an exceedingly controversial and touchy subject in the United States since the first feminist movement in the 1960s. In this paper, marital rape and spousal rape will be used interchangeably. One of the many challenges in addressing the topic of marital rape, is defining what behaviors should be considered rape. Rape is defined as the unlawful compelling of a person through physicalRead MoreMarital Rape And Sexual Rape1177 Words   |  5 PagesMarital rape is rape committed by the person to whom the victim is married. Many decades passed before there was ever a law against marital rape, even today India, along with other countries do not have a law against it. Some people will say marital rape is impossible and others will say it is totally possible and is considered an actual rape. Mandal says, if the legal category of rape implies sex without consent and the legal understanding of marriage entails compulsory sex, then the two will beRead MoreThe Sexual Rape Of The United States Through Legislation Regarding Marital Rape1484 Words   |  6 PagesUnited States Through Legislation Regarding Marital Rape Recently, the general topic of rape has been widely discussed through various media platforms. Rape is the act of sexual assault of another person without their consent. With this in mind a prevailing notion is that marital rape does not occur, however, numerous cases have proven otherwise. Initially, husbands were not commonly put on trial for spousal rape. Each state now identifies rape within a marriage as an illegal act, and nearly allRead MoreVictim Advocacy1496 Words   |  6 PagesAbstract Date rape is a serious offense and should be not taken lightly. The National Crime Victimization Survey and the Uniform Crime Reporting provides statistics on this offense. There are also strengths and weaknesses in both tools, but they are both valuable tools. To understand date rape, it is important to know the definition, and how date rape is distinguished between stranger rape, statutory rape, and spousal rape. It’s also important to understand the drugs that are used for date rape and howRead MoreIs Rape A Victim Of A Sexual Crime? Essay1253 Words   |  6 PagesTopic: Identifying how a perpetrator can utilize date rape drugs to make their victim more vulnerable and an easy target for rape. Purpose: To teach the audience why it is important to prosecute these type of cases. I. Introduction A. Rape is defined as, â€Å"the penetration no matter how slight, of the vagina or anus with any body part or object, or oral penetration by a sex organ of another person, without the consent of the victim.† (Editorial Board, 2016, P.21) B. It is important to know whatRead MoreThe Seriousness Of Rape And The Crime Itself1694 Words   |  7 Pages The Seriousness of Rape Keiser University Victimology Adriana Braxton 2/21/2017 In this paper I will be able to tell you about rape and the crime itself. I will explain who the victims of this crime are, how prevalent is this crime, what are the causes of this crime, in what ways do victims contribute to the crime, methods of prevention, resources available to assist victims of this crime, and my option of any needed changes in resources, laws, and sentencing related to this crime. â€Æ' ThereRead MoreMarital Rape Is A Serious Form Of Intimate Violence1013 Words   |  5 PagesMarital rape is a very serious form of intimate violence. According to the Oxford English Dictionary, the definition for marital rape is defined as, â€Å"sexual intercourse forced on a women by her husband, knowingly against her will.† (Oxford University Press). However, the legal definition varies from state to next; marital rape is commonly defined as unwanted penetration or intercourse (oral, anal, or vaginal) taken by force and/or threat of force when a wife does not give consent (Roberts and Roberts)Read MoreViolence Against Women Within The Family1252 Words   |  6 PagesViolence against women within the family is an ongoing issue. Marital rape is a very serious form of intimate violence. According to the Oxford English Dictionary, the definition for marital rape is defined as, â€Å"sexual intercourse forced on a women by her husband, knowingly against her will.† (Oxfo rd University Press). However, the legal definition varies from state to next; marital rape is commonly defined as unwanted penetration or intercourse (oral, anal, or vaginal) taken by force and/or threatRead MoreThe Women s Rights Movement Essay1561 Words   |  7 Pagesthe United Nations has continuously been committed towards the elimination of violence against women under the United Nations Crime Prevention and Justice Program. As it pertains to Canada, Lakeman (2006) affords that The Vancouver Rape Relief Center shelters over 100 rape domestic abuse victims each year. However, in spite of the great, motivating, and inspiring strides that have over the years been made towards the realization of gender parity and women’s empowerment (Human Rights Watch, 2006), aRead MoreA Controversial Policy For Combat Marital Rape2146 Words   |  9 PagesA Proposed Policy to Combat Marital Rape Marital rape, a rape in which the perpetrator is the victim’s spouse, is an underestimated, underreported reality that effects 10-14% of all women in the U.S (Basile, 2011). Although the U.S. government has made strides in sexual violence laws in the past few years, marital rape policies still have a long way to go. The instance of marital rape should be combatted by the U.S. Federal Government with a multifaceted plan. First, the U.S. federal government should

Saturday, December 14, 2019

Parental Corporal Punishment Free Essays

In different households across the nation many parents spank, whip, swat, or paddle children in order to punish them for doing wrong or to act as a buffer against unacceptable behavior. These types of actions are acts of corporal punishment. Researchers Abraham Andero and Allen Stewart of Alabama State University define corporal punishment as â€Å"a discipline method in which a supervising adult deliberately inflicts pain upon a child in response to a child’s unacceptable behavior† ( Andero and Stewart 90). We will write a custom essay sample on Parental Corporal Punishment or any similar topic only for you Order Now Proponents of corporal punishment argue there is no harm in using corporal punishment in order to correct a child’s behavior. Corporal punishment is a controversial subject among parents, teachers, and the medical community. It is agreed among researchers that children should be disciplined for their improper behavior; however, corporal punishment is an unacceptable disciplining tool because it teaches children to use violence, causes physical and psychological damage, and there are other ways to discipline a child besides corporal punishment. Corporal punishment teaches children to use acts of violence against their peers or other members of society. Douglas Fry, a well- known anthropologist, noted that â€Å"Psychological research shows that parents or adults that use physical punishment, there is a tendency for recipient child to imitate the adult and act aggressively† (Fry 53). Fry conducted an observation on children ages three to eight years from two different communities: La Paz and San Andres. Fry recorded data on the children’s fighting and play fighting behavior. The results of his study concluded that the children of La Paz had lower levels of serious aggression and play aggression than the children of San Andres. The reason the children of La Paz had lower levels of aggression was because their parents used nonviolent techniques to discipline them (Fry 51-54). The conclusion of this particular study coincides with the social learning theory. Researchers Jennifer Lansford and Kenneth Dodge, in a similar study of cultures concluded that â€Å" the more frequently a society employs corporal punishment of its children, the more prevalent adult violence is at a societal level and the more adults endorse the use of violence† (Landsford and Dodge 265). Children are committing more and more violent crimes every day and some studies have shown a link between children that are physically disciplined and children who use violence against each other. Lansford and Dodge also noted that â€Å"an individual could become violent later on in life if their parents condone violence† (265). Parents need to be especially mindful of their behavior because children tend to model their parent’s behavior. Parent’s attitudes concerning corporal punishment can affect how their children behave. A phone interview was given to 134 parent child dyads. The children that were interviewed ranged in ages from 10 to 13. The parents were asked questions in reference to their parenting style, their mental health, and questions in relation to their over all relationship with their children. The children were asked questions about being bullied and being involved in fights and how well they interact with their parents. The findings of this surveyed revealed forty percent of parents interviewed admitted that they would tell their child to defend themselves if they were hit or pushed. Two out of three children reported that they would fight another student if they became angry enough. The survey also revealed that children whose parents physically punished them had higher instances of fighting and bullying within their last school term (â€Å"Parents† 3-4). Parents are wise to tell their children what their expectations are regarding violence and children need to be taught how to handle conflict in a nonviolent manner. Advocates of corporal punishment rarely seem to take into account the physical and psychological damage incurred to children who have been physically punished. The most obvious damage done is that which can be seen by the eye. Often times, when a parent administers corporal punishment, they are angry and allow his or her emotions to get the best of them. Some parents do not know when to stop hitting their child. Elizabeth Gershoff, a researcher from Columbia University, notes in one of her studies that â€Å"if corporal punishment is administered too frequently or severely it can lead to child abuse† (Gershoff 542). Unfortunately the child suffers the most from being hit out of anger and frustration. Lacerations, cuts, welts, and discoloration of skin can be visual effects of corporal punishment. While more attention maybe given to the physical effects of corporal punishment, in no way should we not be cognizant of the psychological effects of corporal punishment. The psychological effects are not as visible and noticeable as the physical effects of corporal punishment. Although there is no definite clear cause and effect evidence, many psychologists find correlations strong enough to find that corporal punishment causes lasting harm such as low-self esteem, depression, and even suicide. Researchers at Old Dominion University conducted a study of 274 undergraduate students that concluded â€Å"respondents who experienced the highest level of physical punishment in their families of origin reported higher family conflict†¦greater family worries†¦more depressive symptoms†¦and more negative social relationships† (Leary, et al. 1). Similar research has also shown that children who have been physically punished can also show signs of stress. Researchers from the University of New Hampshire concluded that â€Å"receiving physical punishment from a parent is likely to be stressful† (Mulvaney and Merbert 390). The stress incurred to children can lead to â€Å"mental health disorders†¦including decreased emotion processing† (Mulvaney and Merbert 390). The stress can be overwhelming to a child and the affects of the stress can have a negative impact leading into adulthood. There are alternative methods to discipline a child besides corporal punishment. These methods will not cause physical harm and can be quite effective. One way to discipline a child is to â€Å"tolerate or ignore the behavior† with the hopes that the child will change his or her unwarranted behavior (Fry 23). Dr. Waterston, a pediatrician, recommends timeout which means â€Å"to withdraw attention for a period of time† and is â€Å"effective in increasing compliance† (Waterston 261). This method of discipline usually works well with younger children. The effectiveness of timeout depends on if it is used â€Å"consistently†¦for an appropriate duration†¦not excessively† (American† 725). A type of punishment that is more appropriate for older children is to remove privileges or deny them the right to participate in their favorite activity. In order for this type of discipline to be effective it is recommended that â€Å"a valued privilege or reinforcer is removed† (â€Å"American† 725). For example, instead of lashing Little Johnny with a belt because he talked back to his teacher, a parent could instead deny Little Johnny the right to attend the movies with his friends on Friday night. Denying Little Johnny the right to attend the movies with his friends will probably hurt him more than the lash of a belt. Parents can also use verbal reprimands as a form of discipline. Parents need to be especially careful of how they verbally reprimand their children, or this form of discipline can lose its effectiveness. The American Academy of Pediatrics explains that â€Å"verbal reprimands should reference the undesirable behavior and should not slander the child’s character† (â€Å"American† 725). It is best that parents are not fueled by anger when employing this type of discipline. The subject of corporal punishment will continue to be a debated topic. There are parents, doctors, and teachers that see no harm in parents using corporal punishment to discipline their children. Physically punishing a child teaches them to use violence as children tend to learn by example. Physical punishment affects children physically and psychologically which could causes problems as they enter adulthood. Clearly, there are other methods to discipline children which can be effective and will not cause harm to children. Ultimately, it is the parent’s choice whether or not they want to use corporal punishment as a disciplining tool. As more research is conducted on the effects of corporal punishment, hopefully parents will learn through education and awareness that corporal punishment is an unacceptable discipline tool. How to cite Parental Corporal Punishment, Essay examples

Friday, December 6, 2019

Information Security for Computer Security Breach -myassignmenthelp

Question: Discuss about theInformation Security for Computer Security Breach. Answer: Computer Security Breach in Brooks Brothers In May 2017, Brooks Brothers informed that a data breach has been happened to the organization and the customers information related to their payment card may have been affected by these breach. This threat was for the customers who had made purchase at Brooks Brothers retailers and Brooks Brothers outlet, located at Puerto Rico and U.S. between the date April 2016 and March 2017 (Brooks Brothers, 2017). Brooks Brothers confessed that no sensitive personal information were in danger except payment cards. They also reported that personal identifying information and Social Security Numbers were safe and not affected in this incident. The company is taking precautions after this breach affected it. These steps could have been taken earlier to stop such intrusion as well-known proverb Precaution is better than cure. What was the Problem? Based on forensic investigation, Brooks Brothers reported that an unauthorized user was somehow able to gain access to the payment processing system and installed malicious software in that system at their outlet and retail locations. Brooks Brothers have also provided a list at their website of the outlet and retails where this unwanted problem occurred. These lists was provided on the website to aware the customers about this threat and apply necessary precautions they can do to keep themselves safe, like password change, new payment card issuing and others (Brooks Brothers, 2017). Brooks Brothers also informed that any of the online customers were not affected nor the payments made at the airport locations were affected. After the investigation, it was noticed that not all the customers were affected. Only affected customers were the one who used payment card at the retailers or outlet between April 2016 and March 2017. These breach affected all the payment card data including nam e, account number, payment card number, carve verification code and card expiration date. These were sensitive information related to the account of customers that are enough to steal money from their account (Trautman, 2016). With the list, Brooks Brothers also provided additional information how a customer can take steps in order to protect themselves from any unwanted accidents and assuring them that the issue has been solved and transaction system is free from any cyber-attack and personal information of a customer are safe with the company (Biener, Eling Wirfs, 2015). Who were affected? Brooks Brothers is a mens clothing retailer, which has around 400 or more stores spread in the whole world among which more than 200 stores were affected by this breach (Brooks Brothers). This breach was on the run for more than a year and the customers who had purchased the goods from certain stores using card as the mode of payment were the victims of this attack. One-year on-going breach made this vast data breach and led to affect a large population of the customers at Puerto and U.S. This led to the theft of payment and account information of the individuals who made the purchase at Puerto and U.S. outlets and retails. This also affected the reputation of Brooks Brothers, as it makes the customers personal information unsafe. Exposing such personal and sensitive information to unauthorized user may lead to certain privacy and security risk to the customers of Brooks Brothers (Sgouras, Birda Labridis, 2014). How the attack was carried out? Forensic investigators involved in this case reported that an outsider-unauthorized individual was somehow able to access the details involving in payment transaction system. People generally use their credit card and debit cards to make the payment for the shopping done at any store, as this is the easiest way to make payment (Shackelford, 2012). Hackers may have gain access through injecting malicious malware, which is still in shadows that how it get started. According to Specialists and experienced IT the company had not carried out professional penetration tests on regular basis, thus they were not able to detect this breach for that much long time (more than a year). Brooks Brothers had extreme casual attitude towards the data cyber-security of the customers who were purchasing goods from the stores. What could have been done to prevent the Attack If the security of the personal information were the first priority of Brooks Brothers then this mass data breach would have never happened. Brooks Brothers should have taken serious precautions earlier, before implementing payment mode by cards. The system had not any alarming system, which could have notified about this breach earlier. Casualties would be very low, if there was proper alarming or notification system programmed earlier (Anderson et al., 2013). There should be proper audit on regular basis to take care of any intrusion that might have affected the system and the information saved in those systems. This long duration confirms that there was not any reviewing or auditing process in the whole payment system,which is why it took one year to discover the intrusion. There should be a strong vendor default password because it gives the easiest entry for the hackers to enter the system. Limiting the number of people accessing the POS system may have also stopped such unwante d event. Data should not be stored about the payment related information of the customers and if it is necessary, then proper tokenization and encryption technologies should be used in order to make the data and information safe by protecting the data end to end (Sinhger Friedman, 2014). These measures could have stopped this incident from harming such sensitive information of an individual. WannaCry Ransomware Cyber Attack This was one of the biggest cyber-attacks, which affected more than 230,000 computers at the global level between the duration 12th may to 15th may. This cyber attack was named WannaCry Ransomware attack because hacklers used a malicious malware that connects to the computer through network encrypting all the files saved in the storage system, and asks money in the form of Bit Coin Currency for the decryption (Kuner et al., 2017). This cyber attack was started at London when a European opened a zip file that injected that malicious virus into the system and uses network as a path to spread into other systems. What was the problem? The hackers had used an unknown malicious malware that used internet as a path to spread and cause damages to the files of the organization saved in the storage system of the computers. In technical terms, the virus used to encrypt all the files so that a user cannot open any file without decryption, which can only be offered by the hackers who had invented this virus. IT researches found the way to slow down the attack but regular updates were being uploaded to the systems, which wastes all the attempts made by the researchers. This virus was attacking all the operating systems including, window XP, Server 2003, Windows 7, and Windows 8. However, it was reported that Windows XP and Server 2003 were in the list of least affected systems but Windows 7 and Windows 8 were in the list of most affected systems (Renaud, 2017). As most of the organization nowadays are using Windows 7 and Windows 8 as their operating systems. It was also noted that this virus also affected software that were installed from black market mostly. This made China in the top list of affected countries as 70 % of the Chinese use un-authenticated software from black market. Who were affected and how? This cyber-attack damages several organizations in the worldwide, very few of them were able to protect their systems and decrypt those files but most of them became prey of this cyber-attack and had to pay ransom for the decryption. Hospitals, multinational companies, governments and federal all were suffered from this attack. Automobile companies like Renault and Nissan had also to suffer this misery. Many police headquarter systems file was encrypted like Chinese police and Indian Police had to shut down there stations in order to stop spreading this virus (Mohurle Patil, 2017). Electronic companies and Courier Companies like Hitachi and Fed Ex reported the intrusion and exposed about the loss the organization and the customers had to suffer due to this cyber-attack. UK and U.S. hospitals had to cancel the appointments and delay the surgery, which causes serious damage to the patients, and the management of the hospitals as there was not any file accessing related to the patients and doctors. Courier companies reported delay in the deliveries due to the ransomware cyber-attack (Ehrenfeld, 2017). Nissan was less affected than Renault was, as when the virus started they set there all the systems to go offline, which resulted in saving rest of the systems. Russia and India were also in the list of affected victims by this cyber-attack. How was the attack carried out? According to the IT researchers and the developers, attack was initiated at London on 12th may 2017 using a host computer in which the virus was injected after a European opened a zip file. There were several commands in that zip files, which was automatically operating the system and giving command to it. After several hours, it was found by the researchers that the virus is giving command to the system to connect to the network to an unknown server, which in real does not exist (Martin, Kinros Hankin, 2017). This was done for distracting the researchers in manner to gather more time to spread over the network and access to files saved in the storage of those systems. The encryption was too good that no one would be able to decrypt those files. This all happened because of the software installed from the black market and stolen from the U.S. Agency. That software was EternalBlue, which was the only software that could have give access to the hackers to the files saved in the system . This decryption could only be done by software named DoublePulsar, which was available to the hackers only, and they used to install this software on the affected systems if they pay the asked ransom money. What could have been done to prevent the attack? There are a lot of measures and precautions that could have been done to prevent this attack Firstly, the software made by the U.S. Agency should be kept highly secure and should not expose to the internet or black market and if this software was exposed U.S. should inform to the world, which could have helped in taking preventive measures earlier. The files that were being saved in the system should be tokenized and encrypted by using proper techniques (Collier, 2017). Using original and updated versions of the operating system could have also stopped this attack from being such a big mess. Security patches that were provided by the Microsoft should have been made available for the users. Installed better and original anti-virus could have also stopped this attack from being spread in such a large area (Swenson, 2017). References Anderson, R., Barton, C., Bhme, R., Clayton, R., Van Eeten, M. J., Levi, M., ... Savage, S. (2013). Measuring the cost of cybercrime. InThe economics of information security and privacy(pp. 265-300). Springer Berlin Heidelberg. Biener, C., Eling, M., Wirfs, J. H. (2015). Insurability of cyber risk: An empirical analysis.The Geneva Papers on Risk and Insurance Issues and Practice,40(1), 131-158. Brooks Brothers (2017). Retrieved 23 August 2017, from https://oag.ca.gov/system/files/Sample%20Notice_9.pdf Collier, R. (2017). NHS ransomware attack spreads worldwide. Ehrenfeld, J. M. (2017). WannaCry, Cybersecurity and Health Information Technology: A Time to Act.Journal of Medical Systems,41(7), 104. Kuner, C., Svantesson, D. J. B., H Cate, F., Lynskey, O., Millard, C. (2017).The rise of cybersecurity and its impact on data protection.International Data Privacy Law, 7(2), 73-75. Martin, G., Kinross, J., Hankin, C. (2017). Effective cybersecurity is fundamental to patient safety. Mohurle, S., Patil, M. (2017). A brief study of Wannacry Threat: Ransomware Attack 2017.International Journal,8(5). Renaud, K. (2017). It makes you Wanna Cry. Sgouras, K. I., Birda, A. D., Labridis, D. P. (2014, February). Cyber attack impact on critical Smart Grid infrastructures. InInnovative Smart Grid Technologies Conference (ISGT), 2014 IEEE PES(pp. 1-5). IEEE. Shackelford, S. J. (2012). Should your firm invest in cyber risk insurance?.Business Horizons,55(4), 349-356. Singer, P. W., Friedman, A. (2014).Cybersecurity: What Everyone Needs to Know. Oxford University Press. Swenson, G. (2017). Bolstering Government Cybersecurity Lessons Learned from WannaCry. Trautman, L. J. (2016). E-Commerce, Cyber, and Electronic Payment System Risks: Lessons from PayPal.

Thursday, November 28, 2019

Why Zebras Dont Get Ulcers Essay Example For Students

Why Zebras Dont Get Ulcers Essay Why Zebras Don’t Get Ulcers August 6, 2009 Abstract Why Zebras Don’t Get Ulcers by Robert M. Sapolsky, gives a description of the inner workings of the human, and animal, stress response. He talks about what physiologically happens to people when they remain in a state of stress of a long period of time. The immune response, depression, aging and death, and sexual reproduction are just some of the topics Sapolsky discusses and how stress affects each of these. Why Zebras Don’t Get Ulcers I chose Why Zebras Don’t Get Ulcers (1994) because I was intrigued by the similarities between humans and animals in regards to their responses to acute and chronic stress. As a medical professional, I feel that I have a strong background in human physiology and therefore could relate to this book. It did not disappoint. This book is written by Robert M. Sapolsky, a professor of biological sciences, as well as neurology and neurological sciences at Stanford University. As a neuroendocrinologist, he has done extensive research in the area of hormonal response to stress and their effects on the body. We will write a custom essay on Why Zebras Dont Get Ulcers specifically for you for only $16.38 $13.9/page Order now As a research associate for the National Museums of Kenya, he spends time studying baboons in their natural habitat and the stressors that they endure along with stress related illnesses that their environment may bring about. In Why Zebras Don’t Get Ulcers, Sapolsky examines the adverse effects of long-term stress and the associated physical and mental damage it can cause. During the first five chapters, Sapolsky goes into great detail, engrained with humor, about the physiological changes that happen in our bodies during periods of stress. He explains the principles of the â€Å"fight or flight† response brought on by the body’s sympathetic nervous system, which is responsible for preparing our bodies for exertion through the release of glucocorticoids. These hormones raise our heart rate in order to increase the flow of oxygenated blood to the working muscles; gut motility decreases as blood is shunted to the vital organs; pupils dilate to increase light perception; and our airway passages dilate allowing us to increase respiration in order to bring in more oxygen which is much needed for the exertion our body is under. All of these changes occur in just fractions of a second; however it takes longer for these effects to leave the body once the threat or stressor is removed. Sapolsky goes on to explain to the reader why other changes or responses happen during activation of the sympathetic nervous system. He humorously details why we sometimes experience loss of urinary bladder or bowel control during a stressful encounter. If we were to get up off of our couch, walk outside the front door and come face to face with a hungry lion, then our sympathetic nervous systems will take over, secrete the stress hormones, and put our bodies through the changes I described above. In addition to preparing our bodies for fight, it will also temporarily stop the digestive process, in order to expend the body’s energy where it is needed the most. By stopping this process, the small intestines stop their contractions; however the large intestines continue their peristalsis movement in order to rid the body of excess â€Å"baggage†, or fecal matter. It’s much easier to move quickly for humans and animals alike, whether running from a shooting down the street, or running from a hungry lion across the grasslands, when you’re not carrying a couple of extra pounds of feces. The portions of this book that were of great interest to me were when the author talks about repeated stimulations of the sympathetic nervous system and its potential harmful effects on the body over time. These stimulations don’t always have to be at the level of being face to face with the hungry lion. In our everyday modern lives, we have stressors thrust upon us, and even sometimes without our knowledge. .u224f085bc66415a7a8db1e45b26425be , .u224f085bc66415a7a8db1e45b26425be .postImageUrl , .u224f085bc66415a7a8db1e45b26425be .centered-text-area { min-height: 80px; position: relative; } .u224f085bc66415a7a8db1e45b26425be , .u224f085bc66415a7a8db1e45b26425be:hover , .u224f085bc66415a7a8db1e45b26425be:visited , .u224f085bc66415a7a8db1e45b26425be:active { border:0!important; } .u224f085bc66415a7a8db1e45b26425be .clearfix:after { content: ""; display: table; clear: both; } .u224f085bc66415a7a8db1e45b26425be { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u224f085bc66415a7a8db1e45b26425be:active , .u224f085bc66415a7a8db1e45b26425be:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u224f085bc66415a7a8db1e45b26425be .centered-text-area { width: 100%; position: relative ; } .u224f085bc66415a7a8db1e45b26425be .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u224f085bc66415a7a8db1e45b26425be .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u224f085bc66415a7a8db1e45b26425be .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u224f085bc66415a7a8db1e45b26425be:hover .ctaButton { background-color: #34495E!important; } .u224f085bc66415a7a8db1e45b26425be .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u224f085bc66415a7a8db1e45b26425be .u224f085bc66415a7a8db1e45b26425be-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u224f085bc66415a7a8db1e45b26425be:after { content: ""; display: block; clear: both; } READ: Hackers EssayOur reactions to the smaller stressors in life, such as driving in traffic, arguments with spouses, raising children, stress with work for example, can cause cardiac and cardiovascular damage without us even knowing about it. Our bodies secrete stress hormones whenever we experience one of these stressful encounters, large or small. This repeated activation can, over the long term, cause irreversible damage causing the formation of atherosclerosis, which is the chronic inflammatory response in arterial walls, eventually causing blockage and reducing blood flow. This is a particularly serious condition when it occurs in the arterial walls of the small coronary arteries which feed oxygen to the heart muscle. In a typical fight or flight response, these coronary arteries will dilate in order to increase their capacity for delivering oxygen-rich blood to the heart, which is now beating faster to provide blood to the muscles. Sapolsky tells us that continued stress responses will decrease the vessel’s ability to dilate and may in fact constrict, therefore reducing oxygenated blood to reach the cardiac tissue when it needs it the most. The chest pain that these people feel during stressful times unfortunately may be the first and only indicator of cardiac disease. This damage is not just limited to the cardiovascular system. With enough stress, humans are at a higher risk for developing adult-onset diabetes. This is due to the body releasing glucose and fatty acids into the bloodstream during stress, again in order to feed the exerting muscles. At the same time, the body tends to block insulin production, and we remember from basic physiology that insulin is the key hormone that allows glucose to enter the cells. Without insulin there to make this happen, excess glucose remains in the blood if it’s not used by the muscles. Continued stress responses over time can eventually cause the uptake of glucose into the cells to be hindered, thereby creating a diabetic condition. Sapolsky goes on to explain how stress in our lives can also lead to loss of libido and reproduction. During periods of stress, males can see a decrease in circulating testosterone due to a release of specific hormones in the brain which basically shut down the activity of the testes, which are responsible for testosterone release. On the female side, the author tells us that studies have shown how stress suppresses estrogen production, which in turn disrupts sexual behavior in women. (Sapolsky, 1994. p. 124) Another interesting part of this book, talks about the decreased immune response during times of stress. Hans Selye, one of the godfathers of stress physiology, discovered the first evidence of stress-induced immunosuppression back in the 1930s. Selye learned that the same glucocorticoids that are responsible for sympathetic response, was also a large contributor in immune system suppression. Glucocorticoids stop the formation of lymphocytes as well as inhibit the release of interleukins and interferons which make already circulating lymphocytes less responsive to infections. Sapolsky hypothesized why evolution would create this process from happening. He wanted to know why the immune system is disabled during periods of stress. As he states in this book, it appears that no one knows just yet why this makes sense. In the later chapters, Sapolsky talks about the effects of stress on aged organisms. Compared to younger generations, the elderly function just the same as long as they are not stressed. Once a stressor is introduced, the elderly may have numerous problems coping with that stress. There may be a lack of a stress response, or a decreased sympathetic response because the heart itself and the blood vessels have lost their elasticity which allow them to dilate and constrict, and therefore may not be able to respond appropriately to physiological changes. Another problem may be that they have too much of a stress response. .u7537394dea455aec2b933ce4ea61fe2e , .u7537394dea455aec2b933ce4ea61fe2e .postImageUrl , .u7537394dea455aec2b933ce4ea61fe2e .centered-text-area { min-height: 80px; position: relative; } .u7537394dea455aec2b933ce4ea61fe2e , .u7537394dea455aec2b933ce4ea61fe2e:hover , .u7537394dea455aec2b933ce4ea61fe2e:visited , .u7537394dea455aec2b933ce4ea61fe2e:active { border:0!important; } .u7537394dea455aec2b933ce4ea61fe2e .clearfix:after { content: ""; display: table; clear: both; } .u7537394dea455aec2b933ce4ea61fe2e { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u7537394dea455aec2b933ce4ea61fe2e:active , .u7537394dea455aec2b933ce4ea61fe2e:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u7537394dea455aec2b933ce4ea61fe2e .centered-text-area { width: 100%; position: relative ; } .u7537394dea455aec2b933ce4ea61fe2e .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u7537394dea455aec2b933ce4ea61fe2e .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u7537394dea455aec2b933ce4ea61fe2e .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u7537394dea455aec2b933ce4ea61fe2e:hover .ctaButton { background-color: #34495E!important; } .u7537394dea455aec2b933ce4ea61fe2e .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u7537394dea455aec2b933ce4ea61fe2e .u7537394dea455aec2b933ce4ea61fe2e-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u7537394dea455aec2b933ce4ea61fe2e:after { content: ""; display: block; clear: both; } READ: Shintoism In Japan EssayIt will take longer for hormone levels to return to their pre-stress levels and return to baseline. The author concludes this section by revealing that in more than a dozen species, excess glucocorticoid levels is the cause of death during aging. (Sapolsky, 1994, p. 237) Overall I was very pleased with this book. I was very surprised at the immense detail Sapolsky went into in describing the hormonal response during stress. His background and experience as a neuroendocrinologist was very apparent in his writing. For someone without formal knowledge of human physiology, I could see this being a difficult read. He does however take the time to explain these processes with his humorous tone, and this makes it a much more enjoyable read. As a result of reading this book, I am committing myself to the following changes. I always understood the adverse effects that stress had on the body, but I received somewhat of a wake-up call when I read about how the continued release of stress hormones over the years can have such a damaging effect on the heart. I will do my best to avoid being upset by the little things in life and take the stress relief measures that I have learned and apply them to my own life so that I can prevent cardiac problems, diabetes and other stress-induced diseases. I may not be under the threat of being gored by an elephant or sized up by a hungry lion each day, but I can still take Sapolsky’s lessons and use that knowledge to better my life by improving how I perceive the stressors I encounter. References Sapolsky, R. (1994). Why Zebras Don’t Get Ulcers. New York, New York. W. H. Freeman and Company

Monday, November 25, 2019

Free Essays on Attitude

Synopsis The degree of individual attitudinal change dealing with racial terms among individuals when exposed to different persuasion group size and tactics was studied. Forty student from the University of Southern California received one of the twelve different conditions, which consisted of one of the three group sizes matched with one of the four persuasion types. Significant differences were found. The participants in larger groups had slightly larger degrees of attitude change than the smaller groups. In comparing the type of persuasion tactics used, rationale had the overall highest degrees of attitude change. The results of this study suggest persuading group size does play a significant role in attitude change, with a positive correlation between, and the rationale tactic is the most effective of the persuasion tactics. Future research should study these variables in context of sexually offensive language, or use other tactics as they are discovered. Attitude Change The art of persuasion is a topic that has been carefully researched for many decades. These days, persuasion or the ability to influence is something that is used in almost every aspect of life, work, and social communication. There are numerous methods and theories that have been developed over the years that are for the use of persuasion (Smith, 1982). The ways of investigating the concepts have been pursued frequently in recent history. These effects of the use of racial language have also been explored, as well as the sources and motivation of the language use (Schaefer, 1996). A topic that has been researched and written about is the area of morality and moral development (Hemming, 1991; Kohlberg, 1964; Rest, Narvaez, & Thoma, 2000). All three of these topics have been studied separately and sometimes together, but as far as can be established, the impact of persuasion on moral attitudes on... Free Essays on Attitude Free Essays on Attitude Synopsis The degree of individual attitudinal change dealing with racial terms among individuals when exposed to different persuasion group size and tactics was studied. Forty student from the University of Southern California received one of the twelve different conditions, which consisted of one of the three group sizes matched with one of the four persuasion types. Significant differences were found. The participants in larger groups had slightly larger degrees of attitude change than the smaller groups. In comparing the type of persuasion tactics used, rationale had the overall highest degrees of attitude change. The results of this study suggest persuading group size does play a significant role in attitude change, with a positive correlation between, and the rationale tactic is the most effective of the persuasion tactics. Future research should study these variables in context of sexually offensive language, or use other tactics as they are discovered. Attitude Change The art of persuasion is a topic that has been carefully researched for many decades. These days, persuasion or the ability to influence is something that is used in almost every aspect of life, work, and social communication. There are numerous methods and theories that have been developed over the years that are for the use of persuasion (Smith, 1982). The ways of investigating the concepts have been pursued frequently in recent history. These effects of the use of racial language have also been explored, as well as the sources and motivation of the language use (Schaefer, 1996). A topic that has been researched and written about is the area of morality and moral development (Hemming, 1991; Kohlberg, 1964; Rest, Narvaez, & Thoma, 2000). All three of these topics have been studied separately and sometimes together, but as far as can be established, the impact of persuasion on moral attitudes on...

Thursday, November 21, 2019

Mental Illness and Incarceration Essay Example | Topics and Well Written Essays - 750 words

Mental Illness and Incarceration - Essay Example The case of Bennie Anthony demonstrates how releasing mentally ill criminals back into society failed to protect the public. In the Anthony case less than one month after being released Anthony set fire to his girlfriend's home. This was not an isolated case and the welfare of the criminal himself needs to be considered. For example, as seen in Reid (2006) Tylor attempted to hang himself while in prison and another inmate attempted suicide seventeen times. Had they not been incarcerated at that time and were, instead, free on the streets, there is a high likelihood that their suicide attempts would have been successful. While some people would argue that mentally ill inmates should not be housed with general population criminals, often within the prison system the two classes of criminals are segregated. The narrator of the New Asylums video stated "In Ohio, mentally ill inmates are separated from the prison's general population and housed in mental health units where they can be treated." Since they are separated they are not interacting with the criminals on a regular or daily basis. This segregation of mentally ill inmates, in effect, ensures the protection of both society and the mentally ill inmates while also treating their illnesses. Additionally, the mentally ill who commit crimes do not have mens rea even though they have actually committed a crime. Incarcerating them may not be the most logical or rational decision but our society has by consensus accepted this practice. One reason could be because society feels it is best for us all to have them locked away and provides for the safety of the inmate himself. As Reid states "the primary job of prison administrators is to administer justice, not treatment" (2006 page number), this is accomplished by locking up the mentally ill. Reid further states "Some people commit crimes while they are not thinking rationally" (2006 page number). These people get punished even when they are not thinking in a rational manner. Although this may be a temporary state of mind, it can be compared to the status of mentally ill criminals and confirms the precedent for incarceration of criminals who are mentally ill or not in a rational state of mind at the time of the offence. Many people feel that our criminal justice system has failed to rehabilitate criminals, whether mentally ill or not. However, Fogel as quoted in Reid states that "the purpose of the prison is to confine for a specified period of time, not to rehabilitate the criminal" (2006 page number). The author feels that this inability or unwillingness to rehabilitate criminals becomes more pronounced and evident when the criminals are mentally ill. Not only is there no rehabilitation but often mental health care is inadequate or non existent. Mental Health Administrator, Bridget Benetis admits that keeping the inmates locked up is not going to do any good for them, but she also sees it as necessary. At the facility they have medication, available psychiatrists, and nurses 24 hours a day. She asserts that they are not going to find that level of care at any other place. Another area of concern is that within the prison system there is a possibility that a person who is not mentally ill can develop mental illnesses while incarcerated due to conditions within the prison

Wednesday, November 20, 2019

Criminology Annotated Bibliography Example | Topics and Well Written Essays - 1000 words

Criminology - Annotated Bibliography Example This document is part of the FBI’s UCRs (Uniform Crime Reports), whose aim is to provide data on the crimes taking place throughout the United States on an annual basis. The UCRs are produced every year and provides information at both the local and national levels. They track the occurrences of eight specific criminal activities together with the frequencies and locations of each crime. The FBI then gathers the data that is provided from the law enforcement agencies of each state across the nation. This information is crucial to students studying criminology as it provides them with the necessary data for their research. This document provides all the information about records that are in the possession of the FBI, including how to access records that have already been released. It also gives information on how one can request the records that have not been released through the FOIA (Freedom of Information Act) and the Privacy Act. One can also get other information that can assist in understanding the records and how the FBI works. This information can be of great help to students studying criminology as it provides them with the necessary data for their research and help them to know how the FBI works in case they plan to join the agency. This article explores women’s fear of sexual assault and rape that has been empirically and theoretically linked to their fear of other crime types. The author explores in detail this fear, particularly paying attention to female college students who are mostly at risk of such crimes. This article performs some research on the issue and forms a conclusion that the fear of rape and sexual assault by women has some impact on their fear of other crimes that are not related to sex. This article will definitely be useful to university students studying criminology as well as the female students wishing to prevent rape. This article

Monday, November 18, 2019

History Essay Example | Topics and Well Written Essays - 500 words - 55

History - Essay Example They were also against the reforms that were legislated by the state because they had a preference for individual freedom by choice. They majorly favored agricultural farms and independence in the rural areas and the right to ownership of slaves. Their agenda at this time was rapid expansion in territories whether by purchase or war. Their main focus was to progress by external growth. On the other hand during the 1840s period was the Whigs. They too had their political interests. Contrary to the democrats, the Whigs were a party of modernization. They looked into the needs of the future. Their main interest was the hope of the people of America. They strategized the use of federal state governments to spear head the growth of the nation especially the transport and banking sector. (Holt, 30) writes that they facilitated reforms in public schools, prisons and temperance. As opposed to the democrats, they favored free labor, industrial and urban growth. They were opposed to war and favored gradual expansion of territories as opposed to the democrats who favored rapid expansion of territories through conquering and purchase. The candidate that was chosen to run for 1844 elections was called James Birney. He only managed to win 2% of the total votes but managed to get most of the votes from the northern part which was majorly Whig dominated. On the other hand of the opposing party, were the non-abolitionists who opposed the expansion territorial conquering. This party won in 1848 with 10% of the popular vote. Martin Van Buren was the party candidate. However in 1852 they lost half percentage of their support because their candidate had rejected the compromise made in 1850. In 1860, the democrats’ party split when they were defeated in a defending platform concerning slavery. The convention was held in Charleston, South Carolina. (Holt, 34) points out

Saturday, November 16, 2019

Functional Requirements of Airline Reservation System

Functional Requirements of Airline Reservation System This project deals with the development of a Software Requirements Specification (SRS) document that specifies what an airline reservation system should and should not do. The SRS document is divided into five sections namely System Objectives This section lists all the goals and objectives of the system categorized based on the viewpoint of the airline company and the customer (passenger). These are higher-level goals which are somewhat broad in nature. They help in a top-down development of the SRS. System Context This section clearly depicts the environment and boundaries of the ARS and the entities with which it interacts. It helps us see how the system fits into the existing scheme of things. What the system will do by itself and what it expects other entities to do is clearly delineated. Functional Requirements This section is the bulk of the document and precisely states the functions of the system what it should do and what it should not. This section is split into subsections modeled after the real world activities like reserving tickets, rescheduling tickets etc. Freedom from ambiguity and navigability were kept in mind while documentation. A consistent terminology has been followed throughout and the terms are explained in the appendix. The subsections follow a logical sequence that reflects the real world. For example, a customer cannot reschedule a ticket unless he has bought one earlier and cannot buy one unless he has checked its availability. Non-functional Requirements These are quality requirements that stipulate the performance levels required of the system for various kinds of activities. Numerical lower and upper limits set conditions on the response times, access times etc of the system. Sometimes, tradeoffs are necessary among various non-functional requirements. Future Requirements These are the specifications which are not provided for now in the current version of ARS but which could be incorporated into future versions. Some of these need advanced technologies and interfaces with other systems. The ARS could be designed in future to enhance the existing capabilities or add entirely new ones. The assumptions and limitations of the ARS have been interspersed in the SRS to present the same in their proper context. 1. System Objectives 1.1 The Airline Reservation System (ARS) is a software application to assist an airline with transactions related to making ticket reservations, which includes blocking, reserving, canceling and rescheduling tickets. 1.2 From the viewpoint of the airline 1.2.1 Minimize repetitive work done by the system administrator and reservation clerks. 1.2.2 Maintain consistency among different access modes, e.g. by phone, by web, at the information desk and across different physical locations. The users should be basically taken through the same steps by the system as they go through in conventional desk-reservation systems. 1.2.3 Maintain customer information in case of emergency, e.g. flight cancellation due to inclement weather. The profile can also be used by the airline company to track user preferences and travel patterns to serve them better, plan routes, for better marketing and efficient scheduling of flights. 1.2.4 Maximize the revenue of the airline company by various means: 1.2.4.1 Increase awareness among frequent travelers about various special offers and discounts. 1.2.4.2 Minimize the number of vacant seats on a flight and maximize flight capacity utilization. 1.2.4.3 Maintain the capability to adopt a flexible pricing policy. The price of the tickets should be dynamically determined based on how early, before the date of departure, the customer buys the ticket. 1.3 A survey conducted by airline companies shows that users of an existing reservation system would respond favorably to an ARS that satisfied or helped them satisfy the following objectives: 1.3.1 Reduce effort and frustration for travelers in scheduling a trip, especially by reducing the search effort for the flight they need to take. 1.3.2 Show all possible combinations and itineraries available for a pair of origin-destination cities. 1.3.3 Reduce redundancy in the information required from the customers in order for them to buy tickets, create user accounts etc. 1.3.4 Check the validity of input data and give a feedback to the user in case of errors or inconsistency. 1.3.5 Provide flexible access modes to users internet, telephone, PDA. 1.3.6 Protect customers privacy concerns. 1.3.7 Make it easy for travelers to check the ticket status or make changes to their trip. 2. System Context 2.1 The ARS will provide the following types of easy-to-use, interactive, and intuitive graphical and telephonic interfaces. 2.1.1 The ARS will provide an easy-to-use, intuitive Graphical User Interface (GUI) as part of the Clerk/Administrators working desktop environment. 2.1.2 The ARS will also provide an interactive GUI, on the World Wide Web for the general customers. The above two ARS interfaces shall help provide the following functionalities to the users access to the ARS to check the flight schedule, availability of seats, ticket price and to block, reserve, cancel, and reschedule tickets. The ARS will also provide an easy-to-use, simple telephonic user interface, which can be accessed by the customers through telephone or cell phone from anywhere. This interface shall provide access, only to the following functionalities, namely, check flight schedule and check ticket status including any change in the flight timings. The functionality available through this telephonic interface is limited because of security constraints. 2.2 The system and its environment and the interactions between them are depicted in the diagram below. DB-Reservations Flight Schedule Database Customer Via Web DB-User DB-Schedule I N T E R F A C E CW DB-Geography ARS software INTERFACE Cp Customer Via Phone INTERFACE A Administrator The closed boundary above clearly delineates the system and the environment. The diagram shows the interactions between the ARS software and the databases inside the system. There are three databases internal to the system and which the system maintains. DB-user is the database containing all the personal information of the registered users of the ARS. This can be updated by the user by logging in to the system. Information from this database is used during transactions like charging the credit card etc. DB-schedule is a copy of the flight schedule database. The latter exists independently and is updated by a flight scheduler system which is out of scope of the ARS. DB-schedule is updated with the latest status of the flight schedule database whenever there is any change in the latter. For example, if a flight has been added to the schedule between two cities on Tuesdays, DB-schedule gets updated with this change through a process with which we are not concerned. It is external to th e system and is out of the scope of this SRS. DB-schedule also contains the base prices of tickets for various flight numbers. DB-reservations are a database containing information regarding the number of seats available on each class on different flights. It has provision for marking how many of the reserved seats have been blocked but not yet bought. DB-reservations should update itself using DB-schedule, for example, if a new flight is added. DB-geography is a database, which contains information about the cities and towns serviced by the airline. The distance between all cities and towns is contained in a matrix form. There are three interfaces, one for the administrator, one for the customer via web and another for the customer via phone. The administrator can update DB-schedule with any changes in the base prices of flight tickets. The system uses a pricing algorithm and dynamically determines the actual price from this base price depending on the date of reservation vis-Ã  - vis date of departure. The customer interfaces (web and phone) enable multiple functions which are described in the following section section 3. 3. Functional Requirements 3.1 User Accounts 3.1.1 The passenger, who will henceforth be called the user, will be presented with 3 choices by the reservation system, as the first step in the interaction between them. A user can choose one of these and his choice would be governed by whether he is a guest or a registered user and whether he wants to check the availability of tickets or also block/buy them. The terms registered user and guest are described below. 3.1.1.1 A user who has traveled by the airline earlier would have been given a user id and a password. He would have his personal information stored in the database referred to earlier in section 2 as DB-user. This personal information would be henceforth referred to as profile. Such a user with a profile in DB-user shall be called a registered user. A registered user will be able to check the availability of tickets as well as block/buy a ticket by logging into the system. 3.1.1.2 A new user, on the other hand, would either have to register himself with the system by providing personal information or log into the system as a guest. In case of a, the new user becomes a registered user. In case of b, the new user would remain a guest. A guest can only check the availability of tickets and cannot block or buy tickets. But a registered user can also act as a guest if he only wants to check the availability of tickets. Availability of tickets always refers to viewing the flight schedule for given days, the price of tickets and any discount offers. The system shall present the user with an option to exit from the system at any time during the following processes. 3.2 Registration and creation of user profile The system shall require a user to register, in order to carry out any transactions with it except for checking the availability of tickets. It will ask the user for the following information at the least a user id, a password, first name, last name, address, phone number, email address, sex, age, preferred credit card number. The system will automatically create a sky miles field and initialize it to zero in the users profile. 3.3 Checking Availability 3.3.1 After logging in a user (either a registered user or a guest), the system shall request him to enter the following details origin city and destination city. City is a generic term and refers to a city or town as the case may be. The origin and destination cities would be entered as text. The system shall now refer to the flight schedule database, referred to as DB-geography in section 2, and check if there is any ambiguity with the names of the cities. In case there are more than two cities with same name as entered by the user, the system shall list all of them (with more qualifications) and ask the user to select one of them. In case, either the origin or destination cities are not listed in DB-geography as being directly serviced by the airline, the system shall suggest the nearest city to which service is available, including the distance of the destination city from this nearest city. After the origin and destination cities are ascertained, the system shall now access the flight schedule database, referred to as DB-schedule in section 2, and checks if there is a direct operational service between the two cities. If not, the system shall suggest possible routes and transfer points using a route selection algorithm. The user shall now be presented with a choice of either selecting one of the routes. In case he selects a route, the system shall fill in the intermediate stop over points and create a multiple trip itinerary for the user. 3.3.4 The system shall now ask the user to enter the following details class, one-way or round trip, departure date and the number of adult passengers, children and senior citizens. Class refers to business class/first class/club class/smoking/non smoking. This choice shall be made by the user through a drop down menu indicating all the possible combinations of choices. One-way/round trip shall be either a drop down menu or a check box selection. Departure date refers to either a single date or a range of dates, entered through a calendar-like menu. This menu shall not show dates in the past or those dates that are too ahead in the future(as determined by the airline policy). In case, the trip is a round trip, the system shall also ask the user to enter the departure date on the return trip. Having taken all the above input from the user, the system checks for any false entries like the departure date on the return trip being earlier than the departure date on the onward trip. In case of incompatibility, the system shall display a suitable error message and prompt the user to enter the information correctly. Having taken all of the information as laid out above in 3.3.1 and 3.3.4, the system shall now access the flight schedule database DB-schedule and queries it using the input provided by the user. The system queries the reservation database DB-reservations to check which of the flights on the schedule have seats available. The system displays the results in a suitable form (a tabular form) with the following information depicted for each flight number the flight number, departure time in origin city, arrival time in destination city, the duration of the flight (taking into account the possibility of a change of time zone) and the number of seats available on that flight. There can be several flights between two cities and all of them will be listed for the particular date that the user wants to depart from the Origin City. In case, the user has entered a range of dates, the system shall display all the flights for all those dates in the range. If the user has requested a round trip, the system shall display two tables one for the onward trip and one for the return trip. There will be a check box in front of each line in the table representing a flight with available seats. The user is now asked to check one of the boxes reflecting a choice of a flight number and time. In case of a round trip, the user is asked to check one box each in the two tables. The system shall now display the price of the ticket for the trip. This will be the sum of the prices for all the members of the travel party being represented by the user. The system shall also list any rules regarding the cancellation of tickets what percentage of the price will be refunded within what date ranges. This will be displayed as a table. Making Reservations/Blocking/Confirmation 3.4.1 After having taken the user through the step 3.3, Checking Availability, The system will now ask the user if he wishes to block/buy the ticket. If yes, and if the user has been a guest, he will have to first register and become a registered user and then log onto the system. If the user is already a registered user, and if he has logged on already, he can block/buy the ticket, but if he has been acting as a guest, he will have to log on. Having ensured that the user is logged on validly according to 3.4.1, the system compares the departure date with the system date. If the departure date falls within 2 weeks of the system date, the system informs the user that he has no option to block the ticket and asks him if he would like to buy it. If the difference between the departure date and system date is more than 2 weeks, the system asks the user if he would like to block or buy the ticket. The system informs the user that he can block the ticket at no cost now. It also informs him that if he chooses to block the ticket, he should make a final decision before 2 weeks of the departure date. The system shall send an email to the user, 3 weeks before the departure date as a reminder, in case he decides to block the ticket now. Having taken the input from the user in 3.4.2, the system shall now proceed to update the reservation database DB-reservation. It will decrement the number of available seats on the particular flight for the particular class by the number of travelers being represented by the user. In case of a blocking, the system makes a note of it in the database to be used if the user doesnt turn up before 2 weeks of the departure date. It generates a blocking number and displays it for the user to note down. In case the user buys the ticket, the system accesses his profile and charges the price of the ticket to his credit card number. It simultaneously generates a confirmation number and displays it to the user for him to note down. The ticket has been reserved. It adds the mileage of the trip (accounting for the number of travelers) to the skymiles in his profile. 3.5 Confirm Ticket 3.5.1 A user who has earlier blocked a ticket after going through the steps 3.2 through 3.4, is required to either confirm the ticket before two weeks of the departure date or the ticket stands cancelled. To let the user confirm a ticket, the system shall first log him on and ask for his blocking number. Then it accesses DB-reservation and removes the check mark, which so far represented a blocked seat. The seat is now confirmed and reserved for the user. The system accesses DB-user and charges the price of the ticket to the credit card number of the user. It simultaneously generates a confirmation number and displays it for the user to note down. The ticket has been reserved. It adds the mileage of the trip (accounting for the number of travelers) to the skymiles in his profile. 3.6 Reschedule Ticket The system shall present the user with an option to re-schedule his travel partys trip. In order to do this, the system first logs on the user and requests his confirmation number. It will not allow a user to reschedule a blocked ticket but only a confirmed ticket. Using this, it queries DB-reservation and presents the details of the trip to the user, including but not limited to origin city, destination city, date of departure and date of arrival (in case the trip is a round trip). The system shall now ask the user to select new dates from the calendar-menu. It now goes through step 3.3. In case, there are no available tickets for the dates entered, it displays a suitable message informing him that rescheduling to that date is not possible. In case there are tickets available, the system asks the user to select the flight number for the trip (another for the return trip if the trip is a round trip) and proceeds to update the database. The system accesses DB-reservation and decrements the number of available seats on the flight(s) by the number of members in the users travel party. It then increments the entry for the previous flight by the same number to reflect an increase in the available seats on it as a result of the rescheduling. The system now checks if there is any difference in the prices of the tickets. If so, it accesses DB-user and charges or credits the credit card as the case may be. The system generates a new confirmation number and displays it to the user. 3.7 Cancellation The system shall also give the user an option to cancel a confirmed ticket or a blocked ticket. The latter case is simpler and will be dealt with first the system shall first log on the user and request the blocking number. Then it accesses DB-reservation and updates it by incrementing the number of available seats by the number of people in the users travel party. In the former case, i.e., for a confirmed ticket, it asks for the confirmation number and accesses DB-reservation and presents the details of the trip as in step 3.6.1. It then lists the applicable rules for cancellation of tickets and depending on the system date and the departure date, it displays the % of the amount that would be refunded if the user cancels the ticket. After the user cancels the ticket, the system generates a cancellation number and displays it for the user to note down. It accesses DB-reservation and updates it by incrementing the number of available seats on that flight by the number of travelers in the users party. It accesses DB-user and credits the refund amount to his credit card number. The system then deducts the mileage of the trip (taking into account the number of travelers in his party) from the sky miles in his profile. 3.8 Update Profile The system shall enable the user to update his profile at any time. Changes can be made in fields including but not limited to address, phone number and preferred credit card number. 3.9 View Ticket Status The system shall allow a user to view all information about his trip. After logging him on, it asks for his blocking number or his confirmation number. It accesses DB-reservation and retrieves the details of the trip and presents them to the user in a convenient format, including any last minute changes to the flight timings etc. Such changes will be highlighted. 3.10 Query Flight Details The system shall allow any user (registered or non registered) to access the details about the arrival and departure times of a flight by requesting the user to input the flight number and date. The system accesses DB-schedule and presents the time of arrival and departure. Telephone access The system shall be accessible through a touch-tone telephone. The telephonic interface shall, at the least, provide the customer with the facility to check availability of tickets and query flight details. The system shall walk the customer exactly through steps 3.3 and 3.9 respectively but through a telephonic interface. Non-functional Requirements 4.1 Performance 4.1.1 Response time of the Airline Reservation System should be less than 2 second most of the time. Response time refers to the waiting time while the system accesses, queries and retrieves the information from the databases (DB-user, DB-schedule etc) (A local copy of flight schedule database is maintained as DB-schedule to reduce this access time) ARS shall be able to handle at least 1000 transactions/inquiries per second. ARS shall show no visible deterioration in response time as the number of users or flight schedule data increases 4.2 Reliability ARS shall be available 24 hours a day, 7 days a week ARS shall always provide real time information about flight availability information. ARS shall be robust enough to have a high degree of fault tolerance. For example, if the user enters a negative number of passengers or a value too large, the system should not crash and shall identify the invalid input and produce a suitable error message. 4.2.4 ARS shall be able to recover from hardware failures, power failures and other natural catastrophes and rollback the databases to their most recent valid state. 4.3 Usability ARS shall provide a easy-to-use graphical interface similar to other existing reservation system so that the users do not have to learn a new style of interaction. 4.3.2 The web interface should be intuitive and easily navigable Users should be able to understand the menu and options provided by ARS. 4.3.3 Any notification or error messages generated by ARS shall be clear, succinct, polite and free of jargon. Integrity 4.4.1 Only system administer has the right to change system parameters, such as pricing policy etc. The system should be secure and must use encryption to protect the databases. 4.4.2 Users need to be authenticated before having access to any personal data. 4.5 Interoperability ARS shall minimize the effort required to couple it to another system, such as flight schedule database system. 5 Future Requirements 5.1 Support for waiting list functionality 5.1.1. ARS shall be made more flexible in ticket reservation handling, and shall accept waiting list for reservation. 5.1.2 The waiting list handling capability of ARS shall be made more advanced, by enabling it to send requests to the Flight Scheduler to schedule extra flights, depending on the demand in a particular corridor, and providing the wait listed passengers with a new flight. 5.2 The telephonic interface of the ARS shall be improved to support more functionality like allowing the customers to cancel a ticket etc., by incorporating security measures. 5.3 ARS shall be made more dynamic and helpful to the users by enabling it to send instant messages to the passengers, of a cancelled or rescheduled flight, through email, phone, fax etc., informing them about the change, and providing them with other feasible alternatives. 5.4 Information about the kind of meals served in a flight and the type of entertainment offered on a flight should be incorporated into the system. Provide service integration with auto rental agencies and hotel chains. Interface for the travel agents shall be provided in the future versions with additional features like informing them of any availability of seats on a flight which was earlier booked to capacity. Choices like aisle or window seats shall be provided to the users. The ARS shall be able to handle the situation where flight services are available to multiple airports in a single city.

Wednesday, November 13, 2019

Web Advertising :: essays research papers

These days, you can’t sell a product or service without marketing it to the masses. And there’s no better place to start than on the web. Internet advertising is a gold mine with virtually every company in America represented. But with so many online competitors, advertisers must use special techniques and technologies to get the word out. The key to beating your competitors is by maximizing cost efficiency. The way to achieve this is by utilizing all the web has to offer for little or no money before spending on expensive technology. The first, probably the least expensive and most effective way to market your company online is by setting up enormous amounts of links to your site. For example, the Prairie State Bank in Marengo, Illinois is it’s local park district, the chamber of commerce, the state of Illinois, as well as weather sites, map sites, and online auto dealerships. So a man interested in buying a car online could click on the link to the bank to figure out the finances. (Dysart) Second, you must get listed on search engines. Many web surfers use Yahoo, Alta Vista and Excite every day to find specific information quickly. Because these engines have the incredible power to direct thousands of surfers, online companies are paying an arm and a leg to have their link be among the first links listed by the search engines. (Dysart) Third, you have to market kids who will eventually be potential customers. Many online companies directed toward adults offer children’s games and other services. The First National Bank of Milton, Illinois offers kids a homework helper and has links to toy stores and video game sites. (Dysart) Fourth, you can easily assure your credibility to prospective customers by creating a newsletter. In most cases the reader would sign up for a monthly e-mail from the company about any new business. This makes the reader feel like they’re important customers and boosts sales. (Dysart) Fifth, you must offer coupons. This technique works just as well off the net as it does on and should not be overlooked. They can be given to the customer via e-mail and printed out from their home or office computers. This makes the customer more likely to go to your site before checking out the competition. (Dysart) Sixth, nothing is more valuable than word-of-mouth. Your company’s web site isn’t complete without a â€Å"recommend this site to a friend† button.