Sunday, December 29, 2019
Bodybuilding And The Subculture Of Bodybuilding - 929 Words
Introduction Bodybuilding is the process that involves development of muscle fibers which is facilitated through special exercises, increased diet (calorie) as well as having the recommended amount of rest. I believe that in the current century bodybuilders have formed subcultures that are very unique in the sense that they have their own values, beliefs as well as traditions that are enshrined within their cultural provisions. Description of the Subculture This paper is basically going to look into the subculture of bodybuilding. The field site will be the local gym where those who are involved in bodybuilding do train. In most cases, I do interact with the trainees at the local gym and therefore this is indeed a strategic fit for my research as the environment presumably is friendly. Consequently, these are people who I have interacted with before and as such they are very friendly. This would really provide me with an ample time so that I could undertake my research in the best possible way. It is important for us to understand the subculture that we are to cover. By bodybuilding, I mean the drive that individuals have so as to maintain the perfect physique as well as ensuring that they have low fat levels in their bodies. It is true that all that is involved in bodybuilding is hardcore. Most people often enroll for the bodybuilding so that they could have an appealing physical outlook. Bodybuilding make s the muscles to expand and as such those involved with theShow MoreRelatedBodybuilding Subculture : The Bodybuilding Culture927 Words à |à 4 PagesMarisa McGinnis Bodybuilding Subculture 1. Which group did you choose? Why did you pick that group? The group I chose was the bodybuilding culture. I chose that group because some of my family were bodybuilders when they were young, and also because it is an interesting topic to me. As a member of the throws squad in the UC Irvine Track and Field program, we do a lot of lifting and we stay conscious of what we eat. From what Iââ¬â¢ve seen in bodybuilding it take that to a larger scale. 2. WhatRead MoreA Bodybuilding Subculture Essay2078 Words à |à 9 PagesEng. 1400 Dr. DuBose The History and Evolution of a Huge Subculture Many subcultures have derived since the beginning of time. They could be classified through religion, culture, style, outlook on life and many other aspects. The one subculture that has grown tremendously through out time is a very hard one to notice as a subculture opposed to a sport. Its said that bodybuilding started way back in the times of great philosophers like Plato who believed that a man should strive for aRead MoreBodybuilding : Strongest Man On Earth1232 Words à |à 5 Pages145HB 20 October 2015 Bodybuilding: Strongest Man on Earth Bodybuilding began to be practiced by the ancient Greek and Egyptian societies in order to gain strength and was seen as a measure of power; Greeks celebrated the human body by building and strengthening their muscles. These societies began building their bodies by moving and carrying different size and weight stones to reach their intended body transformation. Oxford Advanced Learnerââ¬â¢s Dictionary defines bodybuilding as: ââ¬Å"A sport involvingRead MoreDeviance Essay1597 Words à |à 7 Pageshealthy lifestyle is exercise. Working out helps control body fat and can prevent certain health conditions and diseases. As people are captivated by the goal of having a healthy and muscular body, this obsession can lead to the deviant behavior of bodybuilding. A deviant behavior is an act that departs from the usual or accepted social standards. Questions that many ask are, ââ¬Å"Why do bodybuilders want to have a body that is so abnormal? As well as, why do they exercise so often?à ¢â¬ Bodybuilders workoutRead MoreBodybuilding Research Paper1958 Words à |à 8 PagesBodybuilding is a process of developing muscle fibers through special muscle training exercises, increased calorie diet, and sufficient amount of rest. The sport is called Competitive Bodybuilding, where bodybuilders display their physical body to judges and receive points for their musculature appearance (Wikipedia, Bodybuilding). Many people believe that in the end of 20th and 21st century bodybuilders have formed a unique subculture with their own set of values, beliefs, traditions, etc. Now,Read MoreBodybuilding : The Qualities Of Bodybuilding, Backgrounds, And Their Underlying Attitude Toward The Sport1387 Words à |à 6 PagesBy using ruthless advance study methods, I was able to ask direct questions about the characteristics of bodybuilding, backgrounds, and their underlying attitude toward the sport (Roberts and Zweig). Bodybuilding is not only about eating high-calorie meals, lifting , and strength. It is about motivation, hard work, and perseverance. Bodybuilding is about delivering that message to number of different audiences at different times and in different places (Beebe). We as humans send and receive messagesRead MoreFactors in Choosing Leisure Activities2041 Words à |à 8 PagesLeisure activities are done by the individual because of set of group of sociocultural factors, which in my case, I divided them into personal factors, which are factors that are closely related to specific individual in the society, like goals, subculture, individualââ¬â¢s situations in that moment, and institutional role of the individual in that moment, age, sex, and gender of the individual; social capital factors, like living in a capitalism society, individualism, and sociability; and social class
Saturday, December 21, 2019
Organ Donation Is An Act - 1161 Words
Organ donation is an act regarded as selfless, it is the willing relinquish of oneââ¬â¢s organs, who upon death, are transplanted into another individual. Under normal circumstances the donating individual has no vote in who is to receive their organs. They do not get to decide if the one in need has ethically or morally suitable character to be deserving of an extension of life. There are organizations in place that determine at what level of sickness a person can be offered a necessary organ and what specific criteria this person has to meet. It is this act that creates ethical concerns. Seven Pounds is the story of one manââ¬â¢s determination to give back the opportunity of a full life to seven strangers by donating all he felt he had left to offer in the form of his time, home, and even bodily organs. After a car accident killing seven people including his wife Tim Thomas, impersonating his brother Ben Thomas as an IRS agent, looks for individuals who are deserving of the gifts he has to offer (Smith, Black, Tisch, Lassiter Muccino, 2008). Throughout the film, different characterââ¬â¢s ethical lenses became evident as described by their values, morals, and behaviors presented. It is these different ethical lenses that help viewers to understand Tim Thomasââ¬â¢s actions in life and death. Prior to the car accident Tim fell into the Rights Lens because of the way he lived his life. He was concerned only of worldly possessions, not realizing how fragile and precious life is or whatShow MoreRelatedDutch and Belgium Organ Donation Acts775 Words à |à 4 PagesAssignment III-B: Dutch and Belgium Organ Donation Acts. In Belgium there is a different post mortem organ donation law than in The Netherlands, although they both have the same main purpose: they seek to increase the supply of donors. In Belgium it is presumed that each citizen has consented to the harvest of organs following death unless an objection to such a harvest was recorded, an opt-out system. Belgium combines presumed consent with a practice of inquiring into the wishes of the nextRead More Dutch and Belgium Organ Donation Acts Essay example772 Words à |à 4 Pages Assignment III-B: Dutch and Belgium Organ Donation Acts. In Belgium there is a different post mortem organ donation law than in The Netherlands, although they both have the same main purpose: they seek to increase the supply of donors. In Belgium it is presumed that each citizen has consented to the harvest of organs following death unless an objection to such a harvest was recorded, an opt-out system. Belgium combines presumed consent with a practice of inquiring into the wishes of the nextRead MoreOrgan Donation And Organ Organs Essay1308 Words à |à 6 PagesOrgan donations have encountered organ donor and organ supply rejections. Organ donation challenges and demands increase as the organ shortages increase over the years. Organ donationââ¬â¢s mission is to save many terminally ill recipients at the end stages of their lives. The significance of the organ donation is to give back to restore oneââ¬â¢s quality of life. The ongoing issues may present an idealistic portrait of how these issues may be resolved. As a result, the mission of organ donations are toRead MoreOrgan Donation : Organ Donations Essay1323 Words à |à 6 PagesPreviously organ donation has encountered organ donors and organ supply rej ections. Organ donation challenges and demands decreased as the organ shortages increase over the years. Organ donation mission is to save many terminally ill recipients at the end stages of their lives, the significance of the organ donation is to give back to restore oneââ¬â¢s quality of life. The ongoing issues may present an idealistic portrait of how these issues may be resolved. As a result organ donation mission is toRead MoreOrgan Trafficking Is The Illegal Trade Of Human Organs For Transplantation1198 Words à |à 5 PagesOrgan Trafficking, also known as transplant tourism is the illegal trade of human organs for transplantation. (UNOFC,2016). On the other hand, organ donation is the act of transplanting healthy organs and tissues from one person to another (Medline Plus,2015). It is no secret that organ supply cannot meet the rising demand, and because of that a global organ transplant black market has grown and flourished(Glaser,2005). Although there has been some e ffort to establish a global organ transplant resolutionRead MoreThe Organ Trafficking Epidemic Essay1111 Words à |à 5 Pagesindividuals partake in organ trafficking which shows that organ trafficking is a valid issue that must be handled. As of now, U.S. citizens are not prohibited to buy organs outside of the United States by NOTA (National Organ Transplant Act of 1984). In ââ¬Å"Can The Government Ban Organ Sale? Recent Court Challenges And The Future Of US Law On Selling Human Organs And Other Tissueâ⬠, Glenn I. Cohen states that ââ¬Å". . . if a US citizen travels abroad to buy a kidney or other organ his act is not prohibited byRead MoreAltruism Over Incentives For Organ Donation Essay1521 Words à |à 7 PagesAltruism Over Incentives for Organ Donation Over the years, organ donation challenges and demands increased inversely in proportion to the organ shortages. The primary mission of donorââ¬â¢s organizations is to save as many terminally ill recipients at the end stages of their lives as possible with an end goal of giving these recipients a normal a life span. The significance of organ donation is to restore an ailing personââ¬â¢s quality of life. The ongoing issue of organ shortages may be a symptom ofRead MoreAltruism Over Incentives For Organ Donation Essay1535 Words à |à 7 PagesAltruism over Incentives for Organ Donation Organ donations have encountered organ donor, and as a result, organ supply decreases. Over the years, organ donation challenges and demands increase inversely in proportion to the organ shortages. The primary mission of donorââ¬â¢s organizations is to save as many terminally ill recipients at the end stages of their lives as possible with an end goal of giving these recipients a normal a life span. The significance of organ donation is to restore an ailing personââ¬â¢sRead MoreThe Ultimate Gift: The Gift of life-Organ Donation1075 Words à |à 5 Pagestakes you being an organ donor. Organ donation has negative connotation tied to its back. even though many people in todays society believe that no wrong can happen in their life but in reality we are not invincible and accidents do happen and your time will come to end sometime. The act of organ donation is a compassionate and the humane choice for a person to make. Transplantation is a modern medical marven. Despite continui ng advances in medicine and technology, the need for organs and tissue is vastlyRead MoreAltruism Is Good Or Good?1165 Words à |à 5 Pageslikely that if our society had more acts of altruism, our world would be a better place to live than if there were no altruism at all. With that being said, the two doubts about altruism being a good thing should be explained. First of all, altruistic acts are not always morally good. Imagine the organ donor being racist and this person wishes to donate or sell their organs, but only to a recipient of their own ethnicity. This person is doing an altruistic act but not a truly moral one. Certainly
Friday, December 13, 2019
Early Detection Of Perinatal Asphyxia Health And Social Care Essay Free Essays
Meconium staining amnionic fluid ( MSAF ) is associated with tonss of inauspicious result and has long been considered to be a bad forecaster of foetal result. Meconium aspiration syndrome ( MAS ) is often associated with foetal hypoxia which promotes meconium discharge in amnionic fluid, panting and aspiration of MSAF, and besides alterations in the vascular muscular media of pneumonic arterias of the foetus. About 30 to 50 % of MAS required mechanical airing or uninterrupted positive air passage force per unit area ( CPAP ) . We will write a custom essay sample on Early Detection Of Perinatal Asphyxia Health And Social Care Essay or any similar topic only for you Order Now Aim: ââ¬â This retrospective survey was undertaken to happen out immediate foetal result in meconium stained spirits in relation to perinatal asphyxia. MATERIAL AND METHOD: ââ¬â It was a retrospective survey. We reviewed the medical records of all Neonates admitted to neonatal intensive attention unit ( NICU ) between 1st September 2011 to 31st July 2012 at NICU of Manipal Teaching Hospital, Nepal. Gestational age of babes lt ; 37weeks are coded as preterm, gt ; 42weeks as station term and 37 to 42 hebdomads as term. Chi square trial and Binary logistic arrested development were used for the analysis. We calculated odds ratios ( OR ) and their 95 % assurance intervals ( 95 % CI ) . P-value Consequence: ââ¬â Out of 399 entire admittances in NICU, male ( 62.4 % ) showed preponderance as compared to female ( 37.6 % ) , among which 6.8 % were instances of MAS, doing female ( 10.7 % ) more prone compared to male ( 4.4 % ) while perinatal asphyxia came out to be 11.5 % , doing male ( 12 % ) more prone to female ( 10.7 % ) . Post term [ odds ratio=3.50 ( CI: 0.39, 31.42 ) ] and term [ odds ratio=2.58 ( CI: 1.16, 5.75 ) ] babes were holding more hazard of developing MAS compared to preterm ( P lt ; 0.01 ) . Post term [ odds ratio=9.15 ( CI: 1.91, 43.75 ) ] and term [ odds ratio=2.67 ( CI: 1.41, 5.08 ) ] babes were holding more hazard of developing perinatal asphyxia compared to preterm ( P lt ; 0.01 ) . MAS babe is holding 6.62 ( CI: 2.85, 15.38 ) times hazard of developing perinatal asphyxia ( p lt ; 0.01 ) . Decision: ââ¬â MAS is a perinatal job which requires a full co-operation and coordination of Obstetrician and Pediatrician if it is to be avoided. Prompt and efficient bringing room direction can minimise the sequeale of aspirated meconium and diminish the opportunity of perinatal asphyxia. KEYWORDS: ââ¬â Meconium aspiration syndrome ( MAS ) , Perinatal asphyxia, NICU, Paediatric Background: ââ¬â In the early 2000, the prevalence of MAS ranged from 0.20 % to 0.54 % in the general population [ 2-4 ] and from 1.0 % to 6.8 % in babies born through MSAF [ 1, 2-4 ] . A reappraisal of 10 studies published from 1990 to 1998 showed a combined incidence of 13.1 % for MSAF, 0.52 % of MAS, 4.2 % of MAS among MSAF, and 49.7 % of MAS necessitating ventilatory support with a 4.6 % mortality rate [ 3 ] . However, big population-based surveies were scarce and suggested a lower incidence of MAS: the national US birth cohort survey conducted on the footing of singleton term non-Hispanic white unrecorded births ( 1995-2001 ) showed that the rate of MAS markedly increased with gestational age ( GA ) , that is, from 0.10 % at 37 hebdomads gestation ( WG ) to 0.22 and 0.31 % at 40 and 41 WG, severally [ 5 ] . The prevalence of MAS could be extrapolated to 0.18 % in this population of term babies. In Australia, the rate of MAS necessitating mechanical airing in flat III units ranged between 0.024 to 0.046 % at 36-40 WG and so increased to 0.080 % at 41 WG and 0.14 % at 42 WG [ 6 ] . In France, the prevalence of automatically ventilated MAS was estimated to 0.043 % by a retrospective national study among newborns born in 2000-2001 [ 7 ] . Meconium-stained amnionic fluid occurs in about 13 % of unrecorded births. Meconium aspiration syndrome ( MAS ) occurs in 5 to 10 % of babies born through meconium-stained amnionic fluid. When MAS occurs, there is an addition in neonatal mortality and morbidity. Great advancement has been made in the betterment of endurance of babies with MAS. Great advancement in direction has been made since first description of the pathophysiology and hapless result of babies with MAS in 1975. [ 8 ] These include improved intrapartum and post-delivery direction of MAS. Although there is a important lessening in the happening of MAS and associated mortality in developed states MAS remains a major job in developing states. Meconium, the faecal stuff that accumulates in the fetal colon throughout gestation, is a term derived from the Greek mekoni, intending poppy juice or opium. It is a unfertile, thick, black-green, odourless stuff foremost observed in the foetal bowel during the 3rd month of gestation. Meconium consequences from the accretion of dust, including desquamated cells from the bowel and tegument, GI mucin, lanugo hair, fatty stuff from the vernix caseosa, amnionic fluid and enteric secernments. The black-green colour consequences from bile pigments. [ 9, 10 ] Most babies have their first intestine motion after birth ( within the first 24 to 48 hour after birth ) . Occasionally a foetus can go through meconium in uteri. Aspiration of meconium and amnionic fluid can go on during any point of the labour and bringing. The foetus could draw out this mixture of fluids while they are still in the womb, coming through the birth canal, or when they take their first breathe after birth. This is refer red to as Meconium Aspiration Syndrome ( MAS ) . MAS is an of import cause of respiratory hurt in the term neonate, is a serious status with high morbidity and mortality. [ 11,12 ] The pathophysiology is complex and non good defined, including airway obstructor, pneumonic high blood pressure, epithelial hurt, surfactant inactivation, and redness. [ 11,13 ] Fetal asphyxia [ 14 ] and infection are suggested to be chief causative agents. [ 15,16 ] Meconium produces inflammatory responses in both carnal theoretical accounts and neonates with MAS. [ 17 ] After intratracheal instillment of meconium in animate beings, there is an intense pneumonic inflammatory reaction with inflow of polymorphonuclear leucocytes, monocytes/macrophages, and T cells within a few hours. The production of proinflammatory cytokines further propagates parenchymal lung cell hurt, [ 18,19 ] and apoptotic epithelial cells are present in meconium containing lungs. [ 20,21 ] MAS is a disease of the term and near-term baby that is associated with considerable respiratory morbidity. The disease is characterized by early oncoming of respiratory hurt in a meconium-stained baby, with hapless lung conformity and hypoxemia clinically and patchy opacification and hyperinflation radiographically. [ 22, 23 ] At least one tierce of babies with MAS require cannulation and mechanical airing, [ 24, 25 ] and newer neonatal therapies, such as high-frequency airing ( HFV ) , inhaled azotic oxide ( iNO ) , and surfactant disposal are frequently brought into drama. [ 26, 27 ] In the past few decennaries, there seems to hold been a decrease in the incidence of MAS in many centres, at least in the developed universe. [ 25, 28, 29 ] The evident decrease in the hazard of MAS has been attributed to better obstetric patterns, in peculiar, turning away of postmaturity and expeditious bringing where fetal hurt has been noted. [ 28 ] Aim: This retrospective survey was undertaken to happen out immediate foetal result in meconium stained spirits in relation to perinatal asphyxia. MATERIALS AND METHODS: ââ¬â Study design and the participants: It was a infirmary based retrospective experimental survey conducted in the Department of Paediatrics, Manipal College of Medical Sciences ( MCOMS ) , Kathmandu University. Manipal learning infirmary ( MTH ) is a third attention infirmary in pokhara metropolis of Nepal and it is a good facilitated and equipped infirmary for patients with neonatal intensive attention unit ( NICU ) . It was chosen for the survey because Manipal learning infirmary is a third attention 825 bedded infirmary and it was expected that most of the patients will come to this infirmary from Western Nepal. DATA COLLECTION: ââ¬â This survey was carried out from 1ST SEPTEMBER 2011to 31st JULY, 2012. The survey population included patients admitted in Pediatrics NICU from different parts of Pokhara, Nepal. After obtaining the permission from the caput of the section, information was collected from the medical record section of the patient from NICU. The variable collected were Age, sex, weight, manner of bringing and gestational age. Sum of 399 instances were included in the survey holding both meconium aspiration syndrome, perinatal asphyxia and other neonatal infections. INCLUSION CRITERIA: Gestational age of babes lt ; 37weeks are coded as preterm, gt ; 42weeks as station term and 37 to 42 hebdomads as term. SAMPLE SIZE CALCULATION: To be added subsequently Result Variables: To happen out immediate foetal result in meconium stained spirits in relation to perinatal asphyxia. Explanatory Variables: Factors at single degree are gestational age and sex. ETHICAL COMMITTEE APPROVAL: Predating the survey, blessing for the survey was obtained from the institutional research ethical commission. DATA MANAGEMENT AND STATISTICAL ANALYSIS: Analysis was done utilizing descriptive statistics and proving of hypothesis. The information was analyzed utilizing Excel 2003, R 2.8.0, Statistical Package for the Social Sciences ( SPSS ) for Windows Version 16.0 ( SPSS Inc ; Chicago, IL, USA ) and the EPI Info 3.5.1 Windows Version. A p-value of lt ; 0.05 ( two-tailed ) was used to set up statistical significance. [ 30, 31 ] Consequence: ââ¬â Table 1: Cross tabular matter between Socio demographic factors and meconium aspiration syndrome: Variables MECONIUM ASPIRATION SYNDROME p-VALUE Yes NO Entire Sexual activity Male 11 ( 4.4 % ) 238 ( 95.6 % ) 249 0.016 Female 16 ( 10.7 % ) 134 ( 89.3 % ) 150 Gestational age 1 ( lt ; 37 hebdomads ) 12 ( 4.5 % ) 252 ( 95.5 % ) 264 0.001 2 ( 37-42 hebdomads ) 14 ( 10.9 % ) 114 ( 89.1 % ) 128 3 ( lt ; 42 hebdomads ) 1 ( 14.3 % ) 6 ( 85.7 % ) 7 Table 1depicts: female ( 10.7 % ) more prone compared to male ( 4.4 % ) . Post term [ odds ratio=3.50 ( CI: 0.39, 31.42 ) ] and term [ odds ratio=2.58 ( CI: 1.16, 5.75 ) ] babes were holding more hazard of developing MAS compared to preterm ( P lt ; 0.01 ) . from the above statistics it ââ¬Ës really clear the female in our survey are doing an dominant portion as compared to do in meconium aspiration syndrome. Along with this, we can do out that station and term newborns are holding larger hazard of developing meconium aspiration syndrome. Table 2: shows relationship of perinatal asphyxia with Socio demographic factors and meconium aspiration syndrome: Variables PERINATAL ASPHYXIA p-VALUE Yes NO Sum Sexual activity Male 30 ( 12.0 % ) 219 ( 88.0 % ) 249 0.676 Female 16 ( 10.7 % ) 134 ( 89.3 % ) 150 Gestational age 1 ( lt ; 37 hebdomads ) 20 ( 7.6 % ) 244 ( 92.4 % ) 264 0.001 2 ( 37-42 hebdomads ) 23 ( 18.0 % ) 105 ( 82.0 % ) 128 3 ( gt ; 42 hebdomads ) 3 ( 42.9 % ) 4 ( 57.1 % ) 7 Meconium aspiration syndrome Yes 11 ( 40.7 % ) 16 ( 59.3 % ) 27 0.0001 NO 35 ( 9.4 % ) 337 ( 90.6 % ) 372 Table 2: shows Perinatal asphyxia came out to be 11.5 % , doing male ( 12 % ) more prone to female ( 10.7 % ) . Post term [ odds ratio=9.15 ( CI: 1.91, 43.75 ) ] and term [ odds ratio=2.67 ( CI: 1.41, 5.08 ) ] babes were holding more hazard of developing perinatal asphyxia compared to preterm ( P lt ; 0.01 ) . MAS babe is holding 6.62 ( CI: 2.85, 15.38 ) times hazard of developing perinatal asphyxia ( p lt ; 0.01 ) . From the tabular array we formulated that male are holding more hazard of developing perinatal asphyxia as compared to females.post term babes and term are holding greater hazard holding asphyxia. Therefore from the above consequence we can do out that there is strong relationship between MAS and perinatal asphyxia i.e, meconium aspiration newborns are prone for developing perinatal asphyxia. Discussion: The increased hazard for pneumonic morbidity and mortality among babies born through meconium stained amnionic fluid is good recognized. Though many studies have noted a clinical spectrum of pneumonic disfunction such as mild tachypnea and terrible pneumonic inadequacy, this survey confirms that meconium stained amnionic fluid is associated with an increased hazard for pneumonic disfunction. The hazard for pneumonic disease, nevertheless, is non manifested every bit in all babies with meconium staining. As it was shown by several old surveies, the greatest hazard for pneumonic disease occurred among babies with associated marks of possible intrapartum foetal via media. Despite airway direction following recommended guidelines, these babies continued to attest a high rate of pneumonic morbidity [ 32-35 ] . The recommendation by the American Academy of Pediatrics in 1983 did non propose that all babies born through thick meconium stained amnionic fluid needfully necessitate tracheal suction. The 2nd edition of these Guidelines noted the absence of extra surveies to back up or rebut the pattern of tracheal suction for meconium stained amnionic fluid and recommended that ââ¬Å" in the presence of midst or particulate meconium, the voice box should be visualized, and if meconium is present, the clinician should cannulate the windpipe and use suction â⬠. The most recent edition of the Guidelines published in 1992, is downwind dogmatic. It is recommended that down babies with meconium in the hypopharynx have tracheal suction. However, it is further noted that cord visual image and tracheal suction in the vigorous baby with thick meconium may non be necessary. None of the Guidelines have recommended tracheal suction of babies born through thin meconium stained amnionic fluid [ 32, 33 ] . MECONIUM ASPIRATION SYNDROME WITH GESTATIONAL AGE: The overall incidence of MAS and terrible MAS additions with GA as reported in recent population-based surveies [ 36, 37 ] . The overall rates of MAS in the USA [ 36 ] and Burgundy are similar: 1.0 versus 1.1 per 1000 unrecorded births ( aÃâ à ° ) at 37 hebdomads ; 1.1 versus 1.0aÃâ à ° at 38weeks ; 1.5 versus 1.1aÃâ à ° at 39weeks ; 2.2 versus 2.4aÃâ à ° at 40 hebdomads, and 3.1 versus 2.6aÃâ à ° at 41weeks. Furthermore the incidence of terrible MAS recorded in Australia [ 37 ] at 41weeks ( 0.80aÃâ à ° ) is close to the 0.67aÃâ à ° observed at 39-41weeks in our series. Some surveies suggested that bar of post term gestation prevents terrible MAS [ 38 ] .Our retrospective observational survey showed that station term [ odds ratio=3.50 ( CI: 0.39, 31.42 ) ] and term [ odds ratio=2.58 ( CI: 1.16, 5.75 ) ] babes were holding more hazard of developing MAS compared to preterm ( P lt ; 0.01 ) . MECONIUM ASPIRATION SYNDROME WITH SEX: In our survey, male ( 62.4 % ) showed preponderance as compared to female ( 37.6 % ) , among which ( 6.8 % ) were instances of MAS, doing female ( 10.7 % ) more prone compared to male ( 4.4 % ) . PERINATAL ASPHYXIA WITH GESTATIONAL AGE: For more than two decennaries, post term gestation has been defined as a gestation that persists beyond 294 yearss or 42 hebdomads of gestation [ 39 ] . The most common ground to name it is inaccurate gestation dating. Last catamenial period with regular catamenial rhythm is the best physiological landmark to measure the gestational age in gestation. However, a few adult females are certain of their day of the months and frequently cause anxiousness when they come with postdates [ 40 ] . The cause of post-term gestation is unknown. A Post term gestations are associated with higher hazard of perinatal mortality and morbidity including meconium aspiration syndrome, A asphyxia neonatrum respiratory hurt syndrome, icterus neonatrum, sepsis neonatorum, oligohydramnios, macrosomia, foetal birth hurt, foetal hurt and increased rate of cesarean subdivision [ 41 ] . Our survey showed that station term [ odds ratio=9.15 ( CI: 1.91, 43.75 ) ] and term [ odds ratio=2.67 ( CI: 1.41, 5.08 ) ] babe s were holding more hazard of developing perinatal asphyxia compared to preterm ( P lt ; 0.01 ) . PERINATAL ASPHYXIA WITH SEX: In legion surveies, asphyxia was more prevailing in male than female [ 42, 43, 44 ] . In our survey, male preponderance is seen. Out of 399 instances perinatal asphyxia came out to be 11.5 % , doing male ( 12 % ) more prone to female ( 10.7 % ) . Decision: The present survey showed a good correlativity of prevalence of meconium aspiration syndrome and perinatal asphyxia both in term and post term babes doing perinatal asphyxia more common in meconium aspiration syndrome. There is demand of a big randomized controlled test to analyze the functions of intrapartum nasopharyngeal and immediate postpartum tracheal suctioning in newborns born through MSAF in developing state scene. Conflict OF INTERESTS: The writers do non hold any struggle of involvement originating from the survey. Recognitions Dr. K.S RAO, Professor and Head of Department, Pediatrics, Manipal College of Medical Sciences, Pokhara ( Nepal ) for allowing the writers to utilize the infirmary paperss during the survey. What this survey adds: By agencies of this survey we can turn out that perinatal asphyxia is more prevailing in meconium aspiration syndrome. How to cite Early Detection Of Perinatal Asphyxia Health And Social Care Essay, Essay examples
Thursday, December 5, 2019
Demonstrated Business Computer Science
Question: Describe about the Computer Science for Demonstrated Business. Answer: 1: Describe a situation in which you were able to use persuasion to successfully convince someone to see things your way. This reminds me of an incident back during my schooling days. I had been given responsibility to raise funds for an event of charity organized by Sisters of St. Joseph of Cluny. Convincing people to contribute for charity is not easy, it requires persuasion skills. I sent mails to my other friends at school, relatives as well as neighbors, asking them to sign up for a cause by providing their signatures on a donation form. They were reluctant at first but I gave a presentation on how the funds that would be raised, will be donated to one of the sister organizations of the Sisters of St. Joseph of Cluny, and how it would aid in the health and well being of socially deprived children. I demonstrated them on how their contribution will help educating these children and encouraged them to contribute towards a positive cause. 2: Describe a time when you were faced with a stressful situation that demonstrated your coping skills. In my previous place of employment, I had to complete a project within a specified deadline within a short notice. I had to deliver products to the clients, within a specified time. Since the project was on such a short notice, I had to rearrange the schedule with regard to the time and the dates of delivery, negotiate with the clients and prioritize the delivery according to the urgency of the clients. 3: Give me a specific example of a time when you used good judgement and logic in solving a problem The need to do the right thing requires judgment and understanding of the different aspects of a situation. A similar case had occurred where there was a project which had to be completed within a specified time, yet it was evident that the time period provided was not sufficient enough for the project at hand. I had to face pressure from the client as well as my team members to whom the task was allocated, to make a decision pertaining to the missing of deadline. I escalated the issue to the manager, because I felt it was the right decision to be taken at that moment of crisis. After consulting my manager I learnt about previously informing the client requesting him to extend the deadline. This ensured to sustain a strong relation with the client and also to maintain the reputation. 4: Give me an example of a time when you set a goal and were able to meet or achieve it. I was given the responsibility for the promotion and marketing for an influential event within a time period of three months, which was a pretty difficult task. The requirement of my task was basically to build relation with the various international sports and broadcasting companies to promote advertising of the product. Building contacts had significant contacts with the international sports media attracted the interest of the people. Additionally I also promoted the product by the distribution of flyers and posters, this also allured the people towards the event. At the time of the event, there were increased number of viewers than expected and it proved to be a successful event. 5: Tell me about a time when you had to use your presentation skills to influence someone's opinion. During a project at my school I was asked to demonstrate the importance of audio visual education in schools along with the textual education to a sister school which facilitated education for deprived children. I portrayed the different aspects of human reception to audio and visual advertising and also mentioned the advantages related to the educational tool. This proved to be quite influential and this proposal was accepted by the institution. 6: Give me a specific example of a time when you had to conform to a policy with which you did not agree. There was a time I had to disagree with my team lead regarding the processing a request of a customer which I thought was too demanding. I ended up processing the request, yet it was beneficial in the long run, since it helped in maintaining the reputation of the organization and sustaining good relations with the customer. 7: Please discuss an important written document you were required to complete. I was asked to write a report on an event, highlight the effects of the event on national and international level and the amount of awareness created within the general population and media. I coordinated with the event management as well as interacted with all the local important people, VIPs, and also the local media and made a note of their opinion on the importance of conducting the event. 8 : Tell me about a time when you had to go above and beyond the call of duty in order to get a job done. In a socio-cultural event organized for the deprived people, I had to ensure that the people attending were properly entertained and their needs were taken care of. In such an instance, there was an elderly disabled person who required assistance. I not only he was well taken care of but also made arrangements for a cab service to drop him home safely. 9: Tell me about a time when you had too many things to do and you were required to prioritize your tasks. While working for a goods delivery company, I had to assign deadlines for delivering the goods to the clients. The deadlines were decided by negotiating with the clients, and the urgent requirement of the goods which needs to be delivered. In such a situation, where there is a postal strike, it was obvious that the goods will not be delivered within time. In this case I had to prioritize the requirements of the client and reschedule the dates of delivery according to the urgency of the service. 10: Give me an example of a time when you had to make a split second decision I was the organizer of a cultural event. On the day of the event, there was an electricity issue in the venue where the event was to be held. So it rested on me whether to cancel the event or search for an alternative solution to the problem. I decided to look for other locations available at that point of time, instead of cancelling or postponing the event. 11. What is your typical way of dealing with conflict? Give me an example. People from different backgrounds working in a team or members of different teams working in a particular project is bound to have conflicts sometime or the other. This is caused due to differences in ideologies and assessing skills. I t is necessary for a person to have an open mind to view all the aspects of the situation before concluding to a decision. There are many instances where there was a conflict between team members in determining the area of service for a particular customer. I have interacted with the service centers at the respective locations and then determined the area of service, even though it took a few days to make a decision. It ensured that the customer was not harassed. 12: Tell me about a time you were able to successfully deal with another person even when that individual may not have personally liked you (or vice versa). It happens many a time that we have to interact with people whom we do not like as a person. Though I do not personally like my manager, I am answerable and I report to him. Also I am strictly professional while interacting with him. 13: Tell me about a difficult decision you've made in the last year. During the process of recruitment I was given the responsibility to interview people and select them for the final screening. I had interviewed quite a number of people, one of them was a senior candidate, which my manager did not approve of, since he believed that a team should be of a particular range of age. It was a difficult decision to relieve him even I did not want to since he seemed very efficient for the job role. 14: Give me an example of a time when something you tried to accomplish and failed. I had always wanted to start my own education consultancy, thinking I could be a better entrepreneur. I was passionate in my approach, and performed extensive market research and study, to come to a conclusion that there is a requirement for the service in the market. However, the business resulted in a failure since I lacked management skills. 15: Give me an example of when you showed initiative and took the lead. I was once given an opportunity to organize a sales team in a previous company where I was employed. I first outlined the methods in which the team would function, and also assessed the possible outcomes. I provided the opportunity to every team member to voice their opinions and listened to their perspective patiently. I also helped to reduce the fear of failure by allowing team members to take every failure as a lesson. 16: Tell me about a recent situation in which you had to deal with a very upset customer or coworker. Serving the role of a customer representative, in my previous employment, I had to interact with customers on a daily basis. There were certain instances where the customer was extremely dissatisfied with the service of the company. It was my responsibility to understand the reason for his dissatisfaction, empathize and provide proper service which is beneficial for him. This ensures the reputation of the company is maintained. 17: Give me an example of a time when you motivated others. I had been in charge of the sales in an information technology company. I always set a positive example for others to increase sales by educating the customers and encouraging them to buy the products of the company. Also I provided new offers and benefits for the customers, who would purchase a bulk of products at a time. This increased the financial gains of the company. 18: Tell me about a time when you delegated a project effectively. I delegated a project effectively at the time of assisting a project, which includes business research. The project was focusing on institutions in U.S. specializing in technology, communications and media. The work was to speak with west and east coast universities of U.S. while collaborating with marketing and management individuals. 19: Give me an example of a time when you used your fact-finding skills to solve a problem. I used my fact-finding skills to solve a problem at the time, when I worked within a publicity and press environment. I was accountable for creating media coverage to make awareness of events in between the main stakeholders. Before launching any plan, it is necessary to do the research. Therefore, under guidance of senior staffs, through press liaison, I did research of stories for dissemination and distribution to local media. 20: Tell me about a time when you missed an obvious solution to a problem. I missed an obvious solution to a problem when I participated in a class project that needed interpreting and gathering of a generous amount of data related to human behavior. Our goal was to build a predictive response model, which will focus on the cope up of the stress of people. The data did not occur to confirm our hypothesis, and we had lost the confidence. 21: Describe a time when you anticipated potential problems and developed preventive measures. I anticipated potential problems and developed preventive measures at my early days, when I was a Project assistant. I observed that I was going through a tough time in data collection and completion of the tasks within due time. Therefore, I asked for a team meeting, where I discussed about the problem and took the guidance from the other team members. 22: Tell me about a time when you were forced to make an unpopular decision. I was forced to make an unpopular decision when I was a team leader in my college. The student budget committee wanted to utilize the excess funds to arrange a Spring Party, but I didnt allow. I told them that the fund is meant for knowledge not for amusement. So, I saved that excess amount to be utilized in the future. 23: Please tell me about a time you had to fire a friend. Being a member of recreation club, I was provided the responsibility of organizing a cultural event for the fund raising of people who are socially deprived, it also encompassed the promotion of a new FMCG company, who promised to provide free supplies to such deprived population. So a friend of mine had volunteered for the cause, so I had asked him to take care of the promotions of the FMCG Company by making posters and flyers. Since he was employed as an insurance agent he had to meet his clients so could not manage his time with both the jobs at hand. So I had to ask him to leave, since he was not able to complete the job on time and the event would lose its purpose. 24: Describe a time when you set your sights too high (or too low) While setting up my own business I was expecting a lot from it, based on the market researches that I had conducted it seemed there was a lot of demand for the handicraft goods. Yet things turned out to be very ugly, when I tried to sell the products. Since it did not seem cost effective, and it turned out that people are more interested in purchasing manufactured and finished products.
Thursday, November 28, 2019
Election Campaign Financing Essays - , Term Papers
Election Campaign Financing Chris AlibaruhoBA 243 Topic Report When researching for this paper, I found that the general consensus showedthat special interest financing is a growing influence on the outcomes of elections inrespect to election campaign financing. As you will see I have identified the problemsand then proceed to discuss possible reforms with use of a ?pro and con? method. The first of the main problems in the issue of campaign financing are theindependent expenditures. According to the Federal Election Committee (FEC), anindependent expenditure is ?an expenditure of money for communications expresslyadvocating the election or defeat of a clearly identified federal candidate which is notmade with the cooperation or consent of, or at the request or suggestion of, anycandidate or any of his or her agents or authorized committees.?In other words, they are political expenditures or expenditures frequently made to payfor television and radio advertisements, press conferences, political rallies byindivi duals, groups, or parties seeking to promote a specific message about issues orcandidates during an election season. These expenditures have the potential to affectthe outcome of the race because they imply which candidate is the best withoutdirectly telling voters which candidate to choose. Although they are independentbecause they are produced without consulting the candidate or his campaign, peoplecriticize them for having the same negative impact as direct contributions. This is whyindependent expenditures can be seen as a problem. The second area that needs to be tackled in the issue of campaign financing issoft money. Also referred to as ?nonfederal funds? or ?sewer money?, soft moneyrefers to campaign money raised and/or spent outside the limitations and prohibitionsof the Federal Election Campaign Act (FECA). According to the FEC, soft moneyoften includes corporate and treasury funds as well as individual contributions inexcess of federal limits. These cannot be legally used in connection with federalelections (elections for the US Senate, US House of Representatives, presidency andvice presidency.) The first assumption of today's campaign finance laws is thatpeople, not organizations, are vulnerable to the potentially corrosive influence ofpolitical money. The second assumption is that state and local political parties andtheir grass roots activities are valuable features of our civil culture that the federalgovernment should not interfere with. This explains why most federal election lawsdo not cover contributions that support state and local ?nonfederal? parties. Private money is raised by national parties to support state party organizationsand does not benefit specific people running for federal offices. Therefore, it is neitheruncommon or illegal for parties to raise as much as $1,000,000 from individuals andorganizations, some of which are banned from contributing directly to candidates.This is one of the many loopholes found in campaign financi ng. For example, thefederal government is permitted only to regulate the way in which campaigns forfederal offices are financed. It is left up to the individual states and municipalities todetermine how campaigns for the state legislature, governor, and local public officesare to be financed and how state and local political parties are to be regulated. Here isthe loophole; national political parties can establish ?nonfederal accounts? to supportstate and local political activities. These accounts are not regulated by federalcampaign finance laws because technically they have nothing to do with federalelections. Many soft money critics point out that candidates, contributors and otherspecial interests can technically obey the ?letter of the law?, but by using soft moneyto get around the contribution and spending limits, they violate the ?spirit? of thesame law. The last of the issues I shall be dealing with in my essay are the issues ofout-of-district distributions and out-of-state distributions. An out-of-state orout-of-district distribution is one of those terms that tries to capture a lot ofinformation in as few words as possible therefore omitting the important details aboutthe whole concept. After some research, it became apparent that out-of-districtcontributions refer to money donated to the House of Representatives and PAC'sresiding outside the district in which the candidate is running. There are 435 Housedistricts in the United States, therefore an out-of-district contribution refers to anycontribution made to a House candidate by a person living in any of the other 434districts. An out-of-state contribution refers to money donated to a candidate for theUnited States Senate by individuals and PAC's residing outside the state in which thecandidate is running. Of course there
Sunday, November 24, 2019
The Many Facets of Happiness
The Many Facets of Happiness "Happiness" is a word with many diverse meanings. The Webster's Deluxe Unabridged Dictionary and Bartlett's Roget's Thesaurus gave definitions and synonyms and various resources discussed "happiness" in very different ways. The Home Book of Shakespeare Quotations described how "happiness" would look if it were personified. An article in the "Washington Post" and The Columbia Granger's World of Poetry inferred that "happiness" is a temporary frame of mind, yet The Oxford Dictionary of Phrase, Saying, and Quotation inferred that "happiness" could possibly last a lifetime. After researching the word "happiness," I have concluded that "happiness" is a frame of mind to which there are many facets.To begin my research, I looked in an unabridged dictionary and looked up the word "happiness." The definition according to the Webster's Deluxe Unabridged Dictionary is "the enjoyment of pleasure without pain; felicity; blessedness satisfaction (825). The Icelandic people used words such has, "ha pp, good luck, chance, and hap" (825).English: George Bernard Shaw, Nobel laureate in Li...These forms of the word later evolved into the word "happiness." The Unabridged Dictionary provided me with a consistent usage and etymology of the word "happiness."I continued my research by looking up the word "happiness" in Bartlett's Roget's Thesaurus. Roget's supplied me with an abundance of synonyms. The words included "pleasure, joy, satisfaction, rejoicing, welfare, and prosperity" (1012). All of these words are positive words and all fit together. One thing I noticed about these words is that all the synonyms are a state of mind or a state of being. Everyone's idea of "happiness" may be different. What one person thinks "satisfaction" is may be different to someone else's idea of "satisfaction." It is the same with "pleasure, joy, prosperity, etc." These synonyms showed me that everyone's idea of "happiness" might be different.The Home Book of Shakespeare Quotations was my third...
Thursday, November 21, 2019
Film analysis Movie Review Example | Topics and Well Written Essays - 750 words
Film analysis - Movie Review Example Only a few religious groups and NGOs in the world lifted a finger to end the violent deaths. This fact alone made Hotel Rwanda a significant movie (Gillespie, 2004). Discussion The origin of the 1994 conflict was the assassination of Rwandaââ¬â¢s Hutu president; Juvenal Habyarimana. The Hutus claimed that it was the Tutsi who shot the presidentââ¬â¢s jet from the sky. Immediately, the militia and the Hutu army systematically started butchering the minority Tutsi. Following the Hutu extremists massacring the Tutsi population, Paul Rusesabagina, a hotel manager, who was also a Hutu helped save the lives of his family and friends and those of over a thousand refugees. Paul gathered his neighbors and family into their cars and took off to the hotel. He put his own life at risk for the next hundred days by protecting not only his children and wife but also other refugees who were of the Tutsi descents and a genocide mark. Throughout this period, Paul bribed several senior Hutu army functionaries with gifts and money, bluffed and blackmailed them in order to have his hotel protected (Gillespie, 2004). According to this movie, outsiders did not mediate, just because Rwandans were Africans. Racism contributed to outsiderââ¬â¢s hesitance to become involved. ... The message is that never again shall this be allowed to take place in Rwanda or any other part of the world. As much as no one would want to experience such an ordeal for a second time, it would be utter naivety to assume that such barbarity is not likely to happen again somewhere in the world (Gillespie, 2004). Hotel Rwanda goes further to show that even in the middle of this crisis and brutality, some people have a heart, and they still care. This is another significant part of this film. Paul Rusesabagina was one of the few people who indeed cared. Paul was the manager of a four-star establishment in Kigali, The Hotel Des Milles Collines (Gillespie, 2004). The man struggled to save peopleââ¬â¢s lives, and he took too many risks. Paul Rusesabagina is the filmââ¬â¢s hero and a favorite character for many viewers. The relationship between Paul and his wife kept the movie grounded. In the beginning of the film, Paulââ¬â¢s intentions were far from selfless. He was more concer ned with grooming favor with the powerful people than helping his fellow man. However, when the massacring began, he did not blink to offer his help. He used his associations with the people in power to protect Hutu and Tutsi refugees. Paul eventually sheltered approximately 1,286 refugees in his hotel. This was such an extraordinary feat by Paul. He made it possible mainly because of his wit, bravery influence, and intelligence (Gillespie, 2004) The envenomed UN colonel was another heroic figure in this movie. His duty was to watch the massacre without intervening. Other heroic figures were a Red Cross worker who was forced to watch the children she was trying to rescue being put to death, a lot of anonymous Catholic nuns and priests, and a young news
Wednesday, November 20, 2019
Use of Gender Stereotypes in Advertising Essay Example | Topics and Well Written Essays - 2250 words
Use of Gender Stereotypes in Advertising - Essay Example Gender stereotyping in the advertisements has become one of the major problems seen. For many it is a wrong and unacceptable way since it gives a wrong sense of value to the people for selfish reasons. On the other hand, the groups of people who use gender stereotyping argue that it is to reach the targeted audience and not to immorally harm the society. The issues arise often and the debate goes on. It is important to note that advertisements rely on stereotypes, and despite what the society presents, gender stereotypes play the concrete role. The modern society has been shaped according to the media that surrounds us. The main purpose why advertisers use stereotypes is to make their message stronger and reach the targeted audience. They also think this secures the stereotypes in the society and portrays their position in the society. However, it also causes an inverse effect according to many psychologists. They say these advertisements represent the genders in the society as they exist stereotypically, and also cause these groups to be influenced to stay packed within their stereotyped molds. The advertisement of Weight Watchers is an example of how gender stereotypes are commonly used in advertisements. They have the perspective of looking at men and women so differently that they have used two separate advertisements in order to target them. The advertisement for women launched the ââ¬ËWeight Watchers 360ââ¬â¢ programme and the advertisement for men launched the ââ¬ËLose like a Manââ¬â¢ programme. The programme for women was very stereotypical as it focused on the ability of the user to, at times, eat what they wanted, such as chocolates. For men the programme used the approach giving them the ability to sometimes eat some of their favourites and still lose weight, such as pizza, burgers etc. The advertisement could not have gotten more stereotypical where it positioned different tactics for both genders, placed the genders in their stereotyped roles and influenced the society to follow them. The relationship between the media and the society is not understandable. It is observed that women face excessive stereotypical pressure, but usually men suffer the same. Gender stereotyping in advertisements is commonly discouraged because it enforces negative and false assumptions in the society through portraying audiences on television, social media or billboards. For selfish reasons advertisers use these groups and create wrong values in the minds of people in the society. Psychological reasons are the most important ones because of which stereotyping in advertisements are immoral and harmful. The advertisement may remind the targeted audience of any incidents that they went through, and influence to think of them as normal. Advertisers sell their products through targeting the psychology where the audience starts to feel they actually lack those so-called attributes (Browne, 2011, p. 33). Advertisements affect people every day in a way that they do not realise. These advertisements portray an idealistic reality which most people are not aware of. The goals and objectives attained by the advertisers cause severe negative circumstances in the society. Psychologists say that women are reminded of the negative stereotypes before they perform any exercise or activity. The stereotyped advertisements create an exaggerated version of a specific group or gender and they present it as normal. This affects the psychology of people who are being targeted and they are not only convinced to buy the product but also start believing themselves to be normally unusual.
Monday, November 18, 2019
Primary Nursing Essay Example | Topics and Well Written Essays - 2000 words - 1
Primary Nursing - Essay Example Thompson ET all introduces the concept of primary nursing right from the beginning of its start in the 60ââ¬â¢s. The sprouting of this particular type of healthcare all through the globe and its major influence to patient care is critically discussed. In this article, the author mainly insists on the influence of technology on this field and how hard it was for nurses back when everything was manual. Since the nurse has to work for 24 hours taking care of her patients, this field is thought provoking and in the early days of its invention, most of the primary nurses took care of fewer patients due to the nature of the work that was involved in the monitoring of the patients. The nurse had to manually move to each patient, take care of them and move to the next one. This was tedious and in most cases, the patients never got that right kind of care that they needed. However, due to technological changes in the medical industry, primary nursing has been on the increase and most insti tutions of higher learning have included the field in part of their study.Bowman ET all has similar opinions and insists that there has been improvements in primary nursing ever since its invention. The author compares the current situation of nursing and how it was in its early days and some of the changes that have been seen in the area. Comparing the way primary nursing was in the 60ââ¬â¢s and now, it is pretty obvious that the field has undergone a lot of changes. First is the various means that nurses use to monitor patients.
Friday, November 15, 2019
Three Major Categories Of Software
Three Major Categories Of Software Software can be divided into three major categories according to popularity: application software, system software, and web applications. Within each category there are dozens, if not hundreds, of specialized software types, but for the purpose of this study, we will concentrate on the most popular software type of each category. Software applications refer to programs on a client machine which are written to perform specific tasks. Nowadays, there is a wide range of software applications being developed including word processing programs, database management tools, photo editing software, etc. But during the last decade the web has become the new deployment environment for software applications. Software applications that were previously built for specific operating systems and devices are now being designed specifically for the web (web-enabled). Because of this new movement, and as the web becomes increasingly a universal interface for software development, the software industry is experiencing a major evolution toward web-related software applications (Festa 2001). For example, the recent release of Googles Chrome web browser which was specifically designed to enable the execution of web applications and services in the web browser confirms this trend. As the web evolves, the surrounding and supporting technologies are becoming more complex. This is especially relevant in web-enabled applications such as web browsers, email/news clients, VoIP and chat clients which allow the interaction with the web from the client side. Web browsers specifically have become the doorway to the Internet and are currently the most widely used applications and the standard tool for consuming Internet services. This evolution toward web-related applications had a direct impact on the security of such applications. For instance, vulnerabilities and attacks against web browsers became more popular as such attacks compromise the security and privacy and have serious implications for web users. Once a web-related software is infected, the users web interaction can be fully exposed to the attacker. For instance, an infected web browser can expose the victims web addresses, data typed into forms, user sessions and cookies. Moreover, vulnerability risks in a web browser can have a serious implication for intranets (Anupam and Mayer 1998). Most users use the same browser to access information on the intranet as well as the Internet. A user who has been attacked through vulnerable web browser has compromised his or her firewall for the duration of the browsing session (c). Examples of such vulnerability risks against web browsers include key loggers. Key loggers are a form of spyware which can be installed through vulnerability in a web browser and then logs all pressed keys whenever a user visits a certain online banking web site. The increase in vulnerability risks in web-related software is related to the exponential growth of the Internet. As we enter through the second decade of the 21st century, the rapid adoption of the Internet market along its ubiquitous presence will continue to make Internet technologies such as web-related applications a prime target for attackers as they constitute the largest mass of victims. Hypothesis 1a: Vulnerability type will be highly positively related to web-related software applications Hypothesis 1b: Frequency of vulnerability will be highly positively related to web-related software applications Hypothesis 1c: Severity of vulnerability will be highly positively related to web-related software applications System Software: System software refers to the set of computer programs which are required to support the execution of application programs and maintain system hardware. Operating systems, utilities, drivers and compilers are among the major components of system software. Such components are the enablers and service providers to software applications. Among these components, the operating system is the most popular and important one. The operating system market for client PCs has evolved along the lines predicted by theories of increasing returns and network externalities (Shapiro and Varian 1999). But with this increase in network externality, there has been a dramatic increase in vulnerabilities (cite xxx). For instance, between 2007 and 2009, the number of operating system vulnerabilities almost doubled from 220 to 420 vulnerabilities (CVE 2010). Such increase in vulnerabilities can be caused by several reasons. First, network externality implies larger user base which makes operating systems an a ttractive target for hackers. In addition to that, viruses and worms can spread more rapidly because of the large installed user base and network effect. Second, the architecture of some operating systems like Windows allows vulnerabilities to gain a direct access to the operating system files through external scripts; meaning that if malicious scripts are sophisticated enough, they can exploit system files through software applications or through system software directly. And last, the fame factor for discovering vulnerabilities in systems with significant installed user base make them potentially significant target for hackers. Lately, new technologies such as web-based cloud computing, virtualization and Just enough Operating System (JeOS) have been gradually diminishing the importance of the traditional operating system (Geer 2009). With cloud computing technologies, users can access web applications through their web browser; meaning that an OS like Google Chrome will only be needed to run the web-browser. Moreover, with virtualization technology a personal computer or a server is capable of running multiple operating systems or multiple sessions of a single OS at anytime without having the user rely on a single OS. Similarly, Just enough Operating System (JeOS) focuses on running applications which require minimal OS. As these technologies are gaining popularity and becoming more adopted by users, the role of an OS is starting to decrease so does its network externality. With this is mind, we hypothesize that attackers interests and vulnerability risks will gradually shift to other technologies as they become more popular. Hypothesis 1d: Vulnerability type will be positively related to system software Hypothesis 1e: Frequency of vulnerability will be positively related to system software Hypothesis 1f: Severity of vulnerability will be positively related to system software Web Applications: The remarkable reach of web applications into all areas of the Internet makes this field among the largest and most important parts of the software industry. As of today, the Internet consists of hundreds of thousands of small and large-scale web applications ranging from e-Commerce applications to social networking sites to online gaming. This popularity has attracted large user base which made web applications lucrative targets for attackers to exploit vulnerabilities. Web applications are currently subject to a plenty of vulnerabilities and attacks, such as cross-site scripting (XSS), session riding (CSRF) and browser hijacking (Mansfield-Devine 2008). Hence, the landscape of vulnerabilities has changed significantly during the first decade of the 21st century. Previously, buffer overflow and format string vulnerabilities accounted for a large fraction of all vulnerabilities during the 1990s, but as web applications became more popular, new vulnerabilities and attacks such as SQL injections and XSS attacks exceeded earlier vulnerabilities. According to CVE surveys, security issues in web applications are the most commonly reported vulnerabilities nowadays. In response, web application vendors dedicated more resources towards securing their products as they tend to receive more attention as potential targets because of their large pool of possible victims (Mercuri 2003). The problem of web application vulnerabilities is becoming more complicated with the recent movement towards Web 2.0 technologies. The landscape of Web 2.0 enables new avenue of vulnerabilities by using sophisticated scripts on the client side. Moreover, Web 2.0 websites are becoming riskier than traditional websites because they use more scripting capabilities to allow users to upload content, share information and gain more control. Despite the growth of web applications and Web 2.0, these technologies are still limited by the available resources such as network bandwidth, latency, memory and processing power. More specifically, its argued that web applications are constrained by the capabilities of the web browser they are running in. With this drawback, web application users will ultimately have to rely on their own resources to accomplish magnitudes of tasks. Compared to system and software applications, we hypothesize that web applications will continue to experience vulnerability risks but at a lower rate than other popular software. Hypothesis 1g: Vulnerability type will be least positively related to web applications Hypothesis 1h: Frequency of vulnerability will be least positively related to web applications Hypothesis 1i: Severity of vulnerability will be least positively related to web applications Targeted Operating System Software producers often create applications to run on a single or a combination of operating systems (OS). From a software viewpoint, maintaining security is the obligation of both the OS and the software program. But since computer hardware such as the CPU, memory and input/output channels are accessible to a software programs only by making calls to the OS, therefore, the OS bears a tremendous burden in achieving system security by allocating, controlling and supervising all system resources. For the most part, each of todays streamlines OSs has a main weakness. For instance, earlier OSs such as Windows NT, UNIX and Macintosh had a weakness in their access control policies (Krsul 1998). Such OSs didnt specify access control policies very clearly which meant that applications that ran by users inherited all the privileges that the access control mechanisms of the OS provided to those users (Wurster 2010). An access control policy requires an OS to give a program or a user the minimum set of access rights necessary to perform a task. In his work, Denning (1983) illustrated the working of an access control policy which typically consists of three entities namely, subjects, objects and access rights matrix. Subjects refer to users or domains whereas objects are files, services, or other resources and access rights matrix specifies different kinds of privileges including read, write and execute which are assigned to subjects over objects. A configuration of the access matrix d escribes what subjects are authorized to do. Vulnerabilities in OSs tend to rely on weaknesses in configuration of access control matrices to gain access to software applications and system software. This creates a serious problem since vulnerabilities can exploit software applications through the OS gain access and ultimately take over the system. An example of an access control policy failure is Java virtual application. The Java virtual machine was among the applications which defined, and enforced its own access control matrix. Its sandbox was compromised of a number of OS components which ensured that a malicious application cannot gain access to system resources. But once the access control mechanism of the virtual machine fails, a malicious applet can be given access beyond the sandbox (McGraw and Felten 1997). Meaning that the OS can allow a malicious applet full access to the users files because to the OS there is no difference between the virtual machine and the applet. Moreover, even with an access control policy in place, consideration must be given to system design. The OSs which are in use today have different architectures and are designed with different kernels without considering security and controlled accessibility as significant design criteria. For instance, a large portion of UNIX and Linux vulnerabilities result from boundary condition errors which are commonly known as buffer overflow (cite xxx). These boundary conditions result from a failure to properly check the bound sizes of buffers, arrays, strings. Attackers tend to exploit this weakness in UNIX and Linux OSs to gain access to system software and software applications. On the other hand, vulnerabilities in Windows OS tend to be evenly divided among exceptional conditions, boundary conditions and access control validations (cite xxx). With these types of vulnerabilities root break-in and execution of arbitrary code are common types of attacks. When it comes to writing software for different platforms, programmers must acknowledge the potential vulnerabilities and threats targeting their software. Since different OSs have different vulnerabilities, the task of designing a secure application tend to become much difficult since they have to consider vulnerability risks of each OS. Therefore we hypothesize that: Hypothesis 5a: Vulnerability type will be positively related to software which target more operating systems Hypothesis 5b: Frequency of vulnerability will be positively related to software which target more operating systems Hypothesis 5c: Severity of vulnerability will be positively related to software which target more operating systems Software Free Trial Free trial strategy is used by many vendors to promote and sell their goods. This strategy is especially popular and found to be effective to promote and sell digital goods such as software and music. Unlike physical goods, the intangibility of digital products prevents consumers from assessing the products before the consumption and adoption (Heiman and Muller 1996). Such uncertainty of product functionality reduces consumers motivation to adopt the product and is considered a source of market failure. Nowadays, offering software free trial at a low marginal production cost has resulted in the prevalence of free trials strategy. For the software market, there are two strategies of free trial, namely a fully functional free version with limited trial period (time locked version) and a limited functional version (demo version). Each of these strategies has its own advantages and disadvantages. For instance a demo version has an advantage of capturing the network effect from both trial users and the buyers. In contrast, some consumers may find it adequate to use only the limited functionalities provided in the demo version rather than purchasing the full version software. Similarly, offering time locked software version can negatively affect the software vendor as consumers with limited usage can utilize this short-term to fully take advantage of the free trial without buying the full software product. Based on these trial strategies, there have been numerous studies regarding the effect of free trial on software learning curve (Heiman and Muller 1996), software piracy (Chellappa and Shivendu 2005) and software performance (Lee and Tan 2007). For this study, we are interested in measuring the effect of free trial strategies on software vulnerabilities. Although software vendors often release demo or time locked versions, such versions can still contain good source of information for the attackers. Attackers typically misuse the trial versions to look for, find and exploit vulnerabilities. Furthermore, attackers can reverse engineer the limited code and find vulnerabilities (Sutherland et al. 2006). This technique has become particularly important as the attacker can apply vulnerabilities found in free trial versions to exploit full version software. Moreover, there are many hacker groups on the internet who specialize in cracking free trial and full versions software and releasing them on the internet under what is known as warez. Such groups usually compete with one another to be the first to crack and release the new software. These cracked versions (warez) can also serve as potential targets for attackers looking for vulnerabilities. Hence, while providing free trial versions of software by software vendors is a marketing strategy, vendors should also expect such free versions can become targets for vulnerabilities and early exploits. Hypothesis 6a: Vulnerability type will be positively related to software which offer trial versions Hypothesis 6b: Frequency of vulnerability will be positively to software which offer trial versions Hypothesis 6c: Severity of vulnerability will be positively to software which offer trial versions Software License The diversity of the software business model drives the need for different types of software licenses. A software license is a legal agreement forming a binding contract (relationship) between the vendor and the user of a software product and its considered an essential part in the evolution of the software to a market product. Software license is regarded as one of the fundamentals of OSS as there are currently close to 73 different licenses (Perens 2009). Most OSS licenses are classified based on the restrictions they impose on any derivative work (Lerner and Tirole, 2005). Examples of OSS licenses include GPL, LGPL and BSD. General Public License (GPL) is currently the most popular OSS license which states that any derived work from other GPL software has to be distributed under the same licensing terms. The Lesser GPL (LGPL) and the Berkeley Software Distribution (BSD) are other popular alternatives to GPL with similar characteristics. OSS projects rely heavily on code reuse as shown by DrDobbs (2009). In their work, 1311 OSS projects were analyzed and 365000 instances were found of code reuse among those projects. In principle, most of the OSS licenses allow programmers to modify and reuse existing code. This degree of code inheritance can have positive and negative effects on the security of the software. In their work, Brown and Booch (2002) discussed how reuse of OSS code can inherent insecurities and talked about the concerns which companies have regarding OSS code and how it was developed and in particular the origins and the reuse of its code. Indeed an analysis study by Pham et al. (2010) suggested that one of the key causes of vulnerabilities is due to software reuse in code, algorithms/standards, or shared libraries/APIs. They proposed the use of new model which uses algorithm to map similar vulnerable code across different systems, and use the model to trace and report vulnerabilities to software vendors . Reuse of OSS software has caused concerns as developers might inherent vulnerabilities from existing code but regardless of the open source community or software vendors positions on this debate, the possibility of security issues by reusing OSS code has been sufficient to the point where some vendors stopped reusing OSS code in their software. From a security perspective and when it comes to reusing OSS, vendors tend to follow one of the following approaches. Abandon OSS software; only reuse code which has been extensively reviewed; or maintain a relationship with the OSS community and get involved with the development process (Brown and Booch 2002). Its our belief that licenses which allow developers to reuse source code will be more susceptible to vulnerabilities than closed source proprietary licenses. Meaning that software licenses which allow code reuse are more likely to inherit or contaminate derivate work. In contrast, commercial licenses which dont share or allow code reuse are less susceptible to inherit or contaminate vulnerabilities. Hypothesis 4a: Vulnerability type will be positively related to open source software licenses Hypothesis 4b: Frequency of vulnerability will be positively related to open source licenses Hypothesis 4c: Severity of vulnerability will be positively related to open source licenses Source Code Availability Security of open source software (OSS) and closed source software has been a hot topic with many arguments repeatedly presented. Advocates of OSS argue that more reviewers strengthen the security of the software as it eases the process of finding bugs and speeds it up given enough eyeballs, all bugs are shallow (Raymond and Young 2000). Opponents of this idea disagree and claim that not all code reviewers and testers have enough skills and experience compared to code reviewers at companies who are more skilled at finding flaws. The argument is that oftentimes code reviewers and testers need to have further skills other than programming such as cryptography, stenography and networking. Moreover, proponents of closed source software claim that security by obscurity is the main strength of closed source software since its harder to find vulnerabilities when the code is not accessible. However, proponents of OSS argue that its possible to gain access to closed source code through publicl y available patches and disassembling software (Tevis 2005). Its important to note that the impact of the availability of source code on security depends on the open source development model. For instance, the open source cathedral model allows everyone to view the source code, detect flaws/bugs/vulnerabilities and open reports; but they are not permitted to release patches unless they are approved by project owners. OSS projects are typically regulated by project administrators who require some time to review and approve patches. Attackers can take advantage of the availability of source code and published vulnerability reports to exploit them (Payne 2002). However, proponents of OSS argue that vulnerabilities in OSS projects can be fixed faster than those in closed source software because the OSS community is not dependent on a companys schedule to release a patch. Despite the continuous debate on OSS security, advocates from both sides agree that having access to the source code makes it easier to find vulnerabilities but they differ about the impact of vulnerabilities on software security. First of all, keeping the source code open provides attackers with easy access to information that may be helpful to successfully launch an attack. Publically available source code gives attackers the ability to search for vulnerabilities and flaws and thus increase the exposure of the system. Second, making the source code publicly available doesnt guarantee that a qualified person will look at the source and evaluate it. In the bazaar style environment, malicious code such as backdoors may be sneaked into the source by attackers posing as trustful contributors. For instance, in 2003 Linux kernel developers discovered an attempt to include a backdoor in the kernel code (Poulsen 2003). Finally, for many OSS projects there is no a priori selection of program mers based on their skills; project owners tend to accept any help without checking for qualifications or coding skills. Given the issues surrounding source code availability in OSS, we hypothesize that making source code publically available will induce attackers and increase vulnerability risks. Hypothesis 1a: Vulnerability type will be positively related to source code availability Hypothesis 1b: Frequency of vulnerability will be positively related to source code availability Hypothesis 1c: Severity of vulnerability will be positively related to source code availability Software Programming Language Selecting a suitable programming language is one of the most important decisions which have to be made during software planning and design. A chosen programming language has direct effect on how software ought to be created and what means must be used to guarantee that the software functions properly and securely. Software programs which are written using an insecure language may cause system dependent errors which are known to be difficult to find and fix (Hoare 1973). For example, buffer overflows vulnerabilities and other low-level errors are well known issues in C and C++ languages (Cowan 1999). As of today, there exist numerous programming languages but the topic of security in programming languages has been widely disregarded as its believed that programming errors and flaws should be eliminated by the programmers themselves. Current approaches to this issue are essentially ad hoc where best programming practices and secure programming techniques are implemented during or after the design stage. Although this approach helps in preventing coding errors and flaws by relying on programmers skills and experience, it is difficult to say with any certainty what vulnerabilities are prevented and to what extent. More importantly, the ad hoc approach doesnt protect against new and evolving vulnerabilities as it only handles known vulnerabilities and specific coding flaws. In his paper, Hoare (1974) stated that a programming language is secure only if the compiler and run time support are capable of detecting flaws and violations of the language rules. The main issue with this statement is that current compilers and debugging tools are not reliable since they parse code differently; therefore, its impossible to guarantee the same results for programs. Additionally, such tools dont help the programmer in finding vulnerabilities or flaws as they only report syntax errors. Typically, compilers and debugging tools dont allow for security checks on debugging runs, therefore no trust can be put in the results. An evolving trend in secure programming has been the use of formal language semantics. Formal language semantics try to reason with and prove security properties of the code. For example, in their paper, Leroy and Rouaix (1998) developed a formal technique to validate a typed functional language to ensure that memory locations always contain appropriate values to avoid buffer overflow vulnerabilities. Although the use of formal language semantics has been advocated (Dean et al. 1996, Meseguer and Talcott 1997, Volpano 1997), it wasnt widely adopted among programmers. When it comes to software languages, security is essentially dependent on numerous factors such as language developers, programmers and debugging tools. With so many factors, we believe that correlating software language with vulnerability risks will be insignificant. Hypothesis 2a: Vulnerability type will be insignificantly correlated with software language Hypothesis 2b: Frequency of vulnerability will be insignificantly correlated with software language Hypothesis 2c: Severity of vulnerability will be insignificantly correlated with software language Targeted Software Users There are many different types of computer users with a wide range of background, skills, and learning habits. Computer users are typically classified into two distinct groups, namely sophisticated and novice (unsophisticated) users. Sophisticated users have an advanced understanding of computer and Internet technologies; they tend to be more security-aware. Novice users refer to non-technical personnel who are not experienced with computers and the Internet; they rely on computers for simple tasks such as word-processing, spreadsheets, and occasional web surfing. Such users are more prone to security issues due to their inexperience. For instance ignoring software updates and security patches, failing to run essential protection utilities such as an anti-virus or firewall applications are typical security issues with novice users. Because of differences in experience level between both groups, some argue that vulnerabilities affect novice users more than sophisticated ones. Although this might be true for viruses and worms and old vulnerabilities, but when it comes to dealing with zero-day vulnerabilities everyone becomes a victim regardless of their sophistication level. Zero day vulnerabilities refer to unreported exploitable vulnerabilities for which a patch is not available from software vendors (cite xxx). Moreover, when it comes to attackers and potential targets, eventually everyone is a target. Despite the type of computer users, the objective of vulnerability attacks is to hack as many computers as possible with the least amount of effort (Spitzer 2002). Attackers tend to focus on a single vulnerability and use automated scanning tools to search for as many systems as possible for that vulnerability. Such automated tools are often called autorooters and can be designed to scan a specific network for vulnerable machines or scan a range of IP addresses until a victim is found. Its important to note that these tools dont distinguish between software user s as they look for any vulnerable target in sight. Hypothesis 8a: Vulnerability type will be insignificantly correlated with to targeted software users Hypothesis 8b: Frequency of vulnerability will be insignificantly correlated with to targeted software users Hypothesis 8c: Severity of vulnerability will be insignificantly correlated with to targeted software users Software Price Software price plays an important role in modifying the individuals attitude toward the software in many ways. For example, research studies which looked at software piracy found that software price to be a significant factor (incentive) which influenced the intention to pirate (Gopal and Sanders 2000). In their work, Peace et al. (2003) conducted a survey of 201 respondents and found that software price was among the major reasons for illegally copying software. Following the same analogy, studies have shown that attackers attitudes and hackers motivations for finding vulnerabilities are associated with several factors such as: peer approval, self esteem, politics, publicity, financial gains, curiosity and sabotage (Shaw et al. 1999). Within the hackers community, hacking achievements typically help individuals gain higher and more respectable status as it refers to the persons skills and mastery level. Reaching a higher status is oftentimes associated with noteworthy achievements such as hacking popular software. For those hackers who seek publicity or peer approval, they tend to target software with large user base due to their significant reach. So despite software price, hackers look for vulnerabilities in open source and proprietary software as long as there is a significant user base. Similarly, infamous social networking sites such as Facebook and Myspace are constant vulnerability targets regardless of their service cost. Outside the hackers community, hackers incentives tend to vary among political reasons (example: Google-China Hacking 2010), financial gains (example: ransom money attacks), self esteem and sabotage. Again, by analyzing each incentive, we find that software price doesnt play any role in v ulnerability risks. We therefore hypothesize that: Hypothesis 7a: Vulnerability type will be insignificantly correlated with to software price Hypothesis 7b: Frequency of vulnerability will be insignificantly correlated with to software price Hypothesis 7c: Severity of vulnerability will be insignificantly correlated with to software price
Wednesday, November 13, 2019
Influence of Stereotypes in To Kill a Mockingbird by Harper Lee Essay e
Introduction Section One: Harper Leeââ¬â¢s Life Section Two: Time Period Influences on Leeââ¬â¢s Writing Section Three: Influence of Stereotypes Section Four: To Kill a Mockingbird Reviews Conclusion Works Cited Introduction Which doll is better? In the 1950s, psychologists Kenneth and Mamie Clark asked black children between three and seven to answer this simple, yet revealing question. The kids were shown four dolls that were exactly the same except for their skin colors. Almost three quarters of the children chose the white doll as being superior and attributed positive characteristics to it. When asked why they picked it, they replied with, ââ¬Å"Because itââ¬â¢s whiteâ⬠(Abagond). Almost half a century later, in 2005, Kiri Davis repeated the test to see if psychology has changed in any way. Results show 71% of the children preferring the white doll (Edne). These tests demonstrate the incredible stereotypical beliefs still present today. The belief that there is only one acceptable perception to anything is ingrained into societyââ¬â¢s minds, and limits individuals from thinking for themselves. Author Harper Lee explores this topic as she displays to readers prevalent stereotypes and thei r effects in her novel To Kill a Mockingbird. Section One: Harper Leeââ¬â¢s Life Harper Lee was born April 28th, 1926 in Monroeville, Alabama. Leeââ¬â¢s father, Amasa Coleman (A.C.) Lee, was a former newspaper editor who served as a state senator and lawyer. Due to his occupations, A.C. had a tremendous influence on her writing. Not only is A.C. a writer just like Lee; but, the main character in Leeââ¬â¢s novel, Scout Finchesââ¬â¢, father, Atticus, also practices law. Atticus defends a black man accused of raping a white woman who is found guilty and murdered. Simil... ...ompany, 1960. McLeod, Saul. "Asch Experiment." SimplyPsychology. N.p., 2008. Web. 04 Feb. 2014. . Pauli, Michelle. "Harper Lee Tops Librarians' Must-read List." Theguardian.com. Guardian News and Media, 02 Mar. 2006. Web. 05 Feb. 2014. "POLL FINDS WHITES USE STEREOTYPES." The New York Times. The New York Times, 10 Jan. 1991. Web. 09 Feb. 2014. . "The Scottsboro Case | The Nation." The Scottsboro Case | The Nation. N.p., 31 Aug. 2010. Web. 09 Feb. 2014. . Shmoop Editorial Team. "Harper Lee: Childhood." Shmoop.com. Shmoop University, Inc., 11 Nov. 2008. Web. 08 Feb. 2014. . Teen Help Blog." Teen Help Blog. N.p., 28 Dec. 2011. Web. 19 Feb. 2014.
Subscribe to:
Comments (Atom)