Wednesday, May 6, 2020
Human Centred Security and Privacy Research â⬠MyAssignmenthelp.com
Question: Discuss about the Human Centred Security and Privacy Research. Answer: Introduction Every user, business unit and Government is associated with a lot of data and information in the present scenario of digitalization. There are numerous web-based and cloud computing applications that are being used by all of these entities for a variety of different purposes. As a result, there are many security risks and concerns that have emerged which are required to be managed, controlled and dealt with. Victorian Protective Data Security Framework abbreviated as VPDSF is a Victorian Government security initiative that has been brought forward to keep the public sector unit of Victoria safe from all the security occurrences. Public sector units carry out a lot many operations and activities which are open to many security risks. VPDSF has three major elements in terms of the security definition and protocols, assurance model in association with security and many supporting guides and references to move ahead in the direction of security. The report also covers many of the areas f or protection against the security events and threats. There are certain security risks and concerns that have a low likelihood or a low impact. In case of the VIC Government, the data security risks that may take place will have the potential to cause damage to the public and private information sects associated with the public sector unit of Victoria. There are two such security attacks that have a high exposure in association with the VIC Government. Insider threats may be carried out by the internal employees of the various organizations belonging to the public sector unit in Victoria. These internal entities will be aware of the data security policies and mechanisms being applied and may take advantage of the same to cause damage to the properties of the information sets. In addition to the same, there may also be attacks on the information availability with the execution of the flooding attacks (Cpdp, 2016). Risks with Medium Exposure The next category of the attacks is the risks with medium risk exposure. There may be cases of information and data breaches that may take place along with the occurrences which may lead to the leakage of the information in front of the unauthorized entities. The integrity of the information is one of the properties that may get violated with the integrity attacks such as message alteration, media alteration or changes in the properties of the data packets. The access points in the network may be utilized for this purpose which may impact the information present in the databases or the one under transmission as well. Some security risks may lead to the damage to the information properties of personal and sensitive information sets. There are tighter legal policies that are associated with these information sets and the security attack in turn may lead to the emergence of further risks in form of legal risks and regulatory obligations. There are initiatives that VIC Government has taken to provide additional protection to these sensitive data sets and therefore, the likelihood of the occurrence is not very high. Public sector units in VIC Government have many people deployed at various levels in the technical, operational and managerial departments. Due to the presence of so many activities and the need to execute so many different processes, there may be technical or operational errors that may be executed. These may lead to some permanent damage which may not be roll-backed. Such risks are therefore placed in this category (Dang-Pham, 2017). Data and information security attacks that are given shape by the attackers involve a lot many threat agents. There are also different motives and benefits that are involved with each of such occurrence. The case is same with VIC Government that may become victim to many of the information security attacks. These occurrences have been put in two categories on the basis of the motive of the attacker that is involved. These risks may be deliberately caused or may be caused by an accidental step. Deliberate Threats Accidental Threats In these forms of attacks on data and information security, the primary motive of the attack is to cause intentional damage to the contents and properties of the data sets. In these forms of attacks on data and information security, the primary motive of the attack is to not to cause intentional damage to the contents and properties of the data sets. These are cause by an accident. The damage and the outcomes of these attacks can be extremely severe in a negative manner. These attacks may have no or low impact or may also have a permanent damage with a severe impact The time of execution of these attacks is determined in advance and these are planned to be triggered at specific duration. The time of execution of these attacks is not known or planned as they are caused by accident. Flooding attacks such as denial of service and distributed denial of service and other availability attacks (Kaynar, 2016) Malware attacks such as the ones caused by triggering and launch of a virus or worm. Network based security attacks such as man in the middle attacks, eavesdropping attack etc. Information loss or leakage due to an operation error or a deviation from the regular path. Information breaching by an external entity due to exposure of private information. Attacks that are caused by the internal employees of the agencies and organizations can fall in any of these two threat categories. It is because of the reason that there may be certain insiders that may cause deliberate damage by giving shape to the information and data security risks. Insider attacks may also come in the category of the accidental risks and attacks. There may be certain insiders that may cause unintentional damage by giving shape to the information and data security risks due to an accident. Irrespective of the type of the security risk or an attack, it is necessary to control and prevent the same. The VIC Government has also carried out an analysis on the possible deliberate and accidental threats and has therefore, developed measures to prevent and detect these risks. There are also various other organizations and departments that have carried out successful steps and strategies to control these attacks. One such entity is the Department of Homeland security that has successfully controlled the various deliberate and accidental threats and attacks. There is a step by step procedure that was followed in this case. In the initial step, there was an analysis that was carried out to identify and classify the attacks in each of the two categories. In the next step, there were mitigation guidelines and strategies that were developed and identified to put a check on the security occurrences that were identified. It was concluded that the deliberate attacks were intentional and planned in advanced and therefore, they had the potential to cause damage that was severe in most cases as compared to the accidental attacks. There were many security gaps that were highlighted by the Department of Homeland Security in its analysis phase. The department as a result, implemented many automated solutions to resolve the gaps that were discovered. Training sessions were also conducted to improve the knowledge of the insiders. It is recommended for the VIC Government to follow a similar policy such that the security gaps are listed and identified and there are measures developed and implemented in accordance with the same (Korzhik, 2003). Security/Risk Management Execution Possible Challenges and Issues Management of the security risks can be done by adopting different methods and techniques. Some of these methods may include the resources that may be internal in nature while there are certain measures that be taken which may involve the use of external resources and entities. The aim in both the cases will be to put a stop on the security risks and occurrences. In case of the internal methodology, it will be decided to make use of the in-house development processes to give rise to the required security controls and protocols. The security infrastructure in the VIC Government will thereafter make use of all these controls developed. The resources in terms of tools, equipment, processes and human resources that will be used in this methodology will be entirely internal in nature. There are specific set of challenges that are associated with these methods. There may be insufficient skills and inadequate knowledge that may be witnessed which may lead to the compromise of security. The human resources that will be working on the development process will have additional information on the security framework which may be misused by them. There may be technical failures that may lead to breakdown. There may be operational errors that may cause permanent damage. The second methodology that has been recommended in association with the VIC Government is the use and application of the external methods and resources. In this case, the best possible method will be the use of outsourcing process. In this process, the third-parties will be contacted to develop and implement the necessary security protocols. The external method will cost more than the internal method and there may be a number of additional costs involved (Bertino, 2015). There may be deviations that may be observed in terms of the functional and non-functional requirements. The production data and information may be played with. The changes that will be introduced with the adaptation of any of these two processes will be common. These will give rise to a lot many migration challenges in terms of change planning and management of these changes. Comparison of Risks and Uncertainties Risk and uncertainty are the two terms that are often used inter-changeably. However, there is a vast difference between the two terms, their meaning and their results. Risk is a term that refers to the event or an occurrence that is predictable and can therefore be controlled as well. The impacts that a risk may have may be positive but are usually negative in nature. There are many of the data and information security risks that may be executed by the attackers in association with the VIC Government. These risks may have a varying degree of impact as the impact may be low or exactly opposite of it. There are two security attacks that have a high exposure in association with the VIC Government. Insider threats may be carried out by the internal employees of the various organizations belonging to the public sector unit in Victoria. In addition to the same, there may also be attacks on the information availability with the execution of the flooding attacks. There may be cases of information and data breaches that may take place along with the occurrences which may lead to the leakage of the information in front of the unauthorized entities. The integrity of the information is one of the properties that may get violated with the integrity attacks such as message alteration, media alteration or changes in the properties of the data packets. Some of the security events may lead to the emergence of legal and regulatory risks with medium-low impact. Due to the presence of so many activit ies and the need to execute so many different processes, there may be technical or operational errors that may be executed. These may lead to some permanent damage which may not be roll-backed. Such risks are therefore placed in this category of low-impact risks (Pernebekova, 2015). Uncertainties are referred to the occurrences and events that are not predictable and because of the same reason; it is difficult to put any control on these occurrences. One such event may be the changes in the rules defined by the Government in terms of the regulatory processes of legal policies that are set up. With changes in the terms and conditions of these policies, there will be direct impact on the agencies and organizations connected with the same. VIC Government is made up of hundreds of agencies and organizations that adapt these policies in their framework and have developed their security profile accordingly. With such uncertain events, there will be modifications that will become mandatory to be executed which may lead to the violation of security. Risk Control and Mitigation The first approach that has been suggested for VIC Government is the administrative approach that involves the use of advanced measures in the security administration. The overall security status and scenario is based upon the policies and plans that have been implemented in association with the data and information security. It is therefore necessary to have advanced administrative policies and measures in place. This approach suggests the use and implementation of the automated tools for security administration such as security audits, security reviews and inspections. These tools will provide the administrators with an automated process to carry out these activities. The VIC Government shall also make sure that the security administrators have a correct mix of skills and knowledge. The second approach that has been recommended to the VIC Government is the use of technical approach and methods (Joshi, 2017). There are a lot many technical tools that are automated in nature and are built using the latest technology. These tools shall be installed and implemented in the agencies and organizations that are governed by the VIC Government to detect, prevent and control the attacks on the information confidentiality, integrity and availability. These tools will also minimize the occurrence of the network based attacks as the network activities will be captured at a non-stop basis. Physical Security Approach for Risk Mitigation Data and information that is associated with the VIC Government is placed at the data centres, workstations of the employees, cloud databases, server rooms and various other physical and virtual environments (Shamala, 2013). The third approach that has been recommended for the security and risk mitigation is the physical security approach. It will make use of the physical entities at all the access and entry points to manage the access and identity. Out of the three approaches that have been suggested, the one that is recommended is the technical approach. This approach has been recommended as it will provide the VIC Government with the latest technology and tools to deal with the security risks and attacks. Also, there shall be an update on the administrative and physical security that shall also be done to strengthen the security framework (Renaud, 2017). Conclusion The data security risks that may take place in the VIC Government may impact three primary properties of information as confidentiality, availability and integrity. It is required to develop mechanisms to control all of these risks and the use of technical approach towards security will serve the purpose. It will include the latest set of security tools and equipment that will not only identify the security risks but will also lead to the control and prevention of the risks (Elci, 2015). References Bertino, E. (2015). Security and privacy of electronic health information systems. International Journal Of Information Security, 14(6), 485-486. https://dx.doi.org/10.1007/s10207-015-0303-z Cpdp. (2016). Victorian Protective Data Security Framework. Retrieved 28 August 2017, from https://www.cpdp.vic.gov.au/images/content/pdf/data_security/20160628%20VPDSF%20Framework%20June%202016%20v1.0.pdf Dang-Pham, D. (2017). Exploring behavioral information security networks in an organizational context: An empirical case study. Journal Of Information Security And Applications, 34, 46-62. https://dx.doi.org/10.1016/j.jisa.2016.06.002 Elci, A. (2015). Editorial: Special issue on security of information and networks. Journal Of Information Security And Applications, 22, 1-2. https://dx.doi.org/10.1016/j.jisa.2015.06.002 Joshi, C. (2017). Information security risks management framework A step towards mitigating security risks in university network. Journal Of Information Security And Applications, 35, 128-137. https://dx.doi.org/10.1016/j.jisa.2017.06.006 Kaynar, K. (2016). A taxonomy for attack graph generation and usage in network security. Journal Of Information Security And Applications, 29, 27-56. https://dx.doi.org/10.1016/j.jisa.2016.02.001 Korzhik, V. (2003). Hybrid authentication based on noisy channels. International Journal Of Information Security, 1(4), 203-210. https://dx.doi.org/10.1007/s10207-002-0017-x Pernebekova, A. (2015). Information Security and the Theory of Unfaithful Information. Journal Of Information Security, 06(04), 265-272. https://dx.doi.org/10.4236/jis.2015.64026 Renaud, K. (2017). Contemplating human-centred security privacy research: Suggesting future directions. Journal Of Information Security And Applications, 34, 76-81. https://dx.doi.org/10.1016/j.jisa.2017.05.006 Shamala, P. (2013). A conceptual framework of info structure for information security risk assessment (ISRA). Journal Of Information Security And Applications, 18(1), 45-52. https://dx.doi.org/10.1016/j.jisa.2013.07.002
Thursday, April 30, 2020
Intellectual Property Notes Essay Example
Intellectual Property Notes Essay One of the most valuable and neglected property of yours! OR You might be neglecting one of your most valuable properties! OR One of the most valuable properties of yours! If you ask someone walking down the street and ask him ââ¬Å"What is a property? â⬠Brandà is a name, design, symbol, or any other feature that identifies one sellers good or service as distinct from those of other sellers. What is a brand? * Brandà is a name, design, symbol, or any other feature that identifies one sellers good or service as distinct from those of other sellers.Example: Coca Colaà is a brand which is the intellectual property of The Coca-Cola Company. Apple is a brand which is the intellectual property of Apple Inc. * It is the most valuable fixed asset of any corporation. * Branding is a concept where consumers buy ââ¬Ëthe brandââ¬â¢ instead of the product. * Brand name, logo, design and any other attributes associated with it, are part of the brand and eventually part of intell ectual property. * Brand is a part of intellectual property. What is Intellectual Property (IP)? It is a legal concept, which refers to the creations of mind for which exclusive rights are recognized. * Creations of mind include: * inventions * literary and artistic works * formulas * symbols * names * images * designs used in commerce. * IP involves patents, copyright, trademarks, designs, brands etc. * It can also be defined as ââ¬Å"information with a commercial valueâ⬠. Types of intellectual property * Trademarks, including service marks * Copyright and related rights * Geographical indications * Industrial designs * Patents * Layout-designs (topographies) of integrated circuits Undisclosed information, including trade secrets Categories of Intellectual Property (IP) * IP is divided into two categories: 1. Industrial property: * inventions (patents) * trademarks * industrial designs * geographic indications of source 2. Copyrights Rights: a. Copyrights: i. literary works * novels * poems * plays * films * musical works ii. artistic works * drawings * paintings * photographs * sculptures * architectural designs b. Rights related to copyright: iii. performances of performing artists, iv. producers of phonograms in their recordings, . Broadcasters in their radio and television programs. Copyright à © * It is the ââ¬Å"right to copyâ⬠, a form of ââ¬Å"intellectual propertyâ⬠applicable to any expressible form of an idea or information that is distinct and applicable. * A legal concept in which a set of exclusive rights are granted to the creator/owner of an original work for a limited period of time to protect the originality of work piece. * They do not extend beyond the territory of a specific state unless that state is a party to the international agreement of ââ¬ËCopyrightââ¬â¢. It is moral and economic right of authors, writers, publishers, performers and producers of sound recordings (phonograms). * The duration of copyright pro tection is life time of the author plus 50 years thereafter. The Exclusive Rights of Copyright à © * Only the copyright holder is free to exercise exclusive rights while others are prohibited from using the work without the copyright holderââ¬â¢s permission. * Major exclusive rights include: * To produce copies or reproductions of the work and to sell those copies (including electronic copies) * To import or export the work To create derivative works (adaptation from original work) * To perform or display the work publicly * To sell or assign copyrights to others * To transmit or display by radio or video Categories of Copyright Work/Registration Intellectual Property Organization (IPO), Pakistan has categorized the Copyright work/registration into following: Part-I:à Literary works * Books, * Magazines, * Journals, * Lectures, * Sermons, * Dramas, * Novels, * Computer Programs and * Compilation of Data Part-II:à Artistic works * Paintings, * Photographs, * Maps, * Charts, C alligraphies, * Sculptures, * Architectural Works, * Drawings, * Label Designs, * Logos, * Monograms etc. Part-III:à Cinematographic works * Motion Pictures, * Video Cassettes, * VCDââ¬â¢s, * DVDââ¬â¢sà à etc. Part-IV:à Records Works * Audio Cassettes * CDs What is Copyright Infringement/Piracy? * It is the unauthorized and illegitimate use of materials held by copyright. * Infringing the copyright holderââ¬â¢s ââ¬Å"exclusive rightsâ⬠. * The copying of ââ¬Å"intellectual propertyâ⬠without written permission from the copyright holder. What are Intellectual Property Rights (IPR)? IPR are the rights given to persons over the creations of their minds. * They usually give the creator an exclusive right over the use of his/her creation for a certain period of time. * IPR are customarily divided into two main areas: c. Copyright and rights related to copyright: The rights of authors of literary and artistic works (such as books and other writings, musical co mpositions, paintings, sculpture, computer programs and films) are protected by copyright, for a minimum period of 50à years after the death of the author. . Industrial property: Industrial property can usefully be divided into two main areas: vi. Protection of distinctive signs, in particular trademarks and geographical indications to ensure fair competition and to protect consumers, by enabling them to make informed choices. vii. Other types of industrial property are protected primarily to stimulate innovation, design and the creation of technology such as inventions (protected by patents), industrial designs and trade secrets.The protection is usually given for a finite term (typically 20 years in the case of patents). What is WIPO? * WIPO was established in 1967 and stands for World Intellectual Property Organization. * In 1974, WIPO joined the system of United Nations, becoming one of 15 specialized UN agencies dedicated to the use of intellectual property to encourage innov ation and creativity. * WIPO has currently 185 member states, which accounts for more than 90 percent of the countries of the world. These member states determine the strategic direction and activities of the Organization by meeting in the assemblies, committees and working groups which are WIPO decision-making bodies. What does WIPO do? * WIPO is to promote innovation and creativity for the economic, social and cultural development of all countries, through a balanced and effective international intellectual property system through: * Services systems which make it easier to obtain protection internationally for patents, trademarks, designs and labels of origin; and to resolve IP related disputes. Laws helping in developing the international legal IP framework in line with societyââ¬â¢s evolving needs. * Infrastructure by building collaborative networks and technical platforms to share knowledge and simplify IP transactions, including free databases and tools for exchanging info rmation. * Development by building capacity in the use of IP to support economic development. How WIPO Works? * The WIPO Convention sets out terms governing WIPOââ¬â¢s mandate, functions, finances and procedures. * WIPO works with a wide spectrum of takeholders, including other inter-governmental organizations, non-governmental organizations, representatives of civil society and industry groups. * Some 250 NGOs and IGOs currently have official observer status at WIPO meetings. * WIPO has 185 member states which collectively determine the direction, budget and activities of the Organization through the decision-making bodies. WTO-WIPO cooperation agreement 1995 * The WTO and WIPO cooperation agreement was signed in 1995 and share a mutually supportive relationship.What is Geographic Indication (GI)? * According to the TRIPS Agreement, a GI identifies a good as originating in a particular territory where a given quality, reputation or other characteristic of the good is essentially attributable to its geographical origin (Article 22. 1). * GI does not only say where the product was made, it identifies the products special characteristics, which are the result of the productââ¬â¢s origins. * Well-known examples include ââ¬Å"Champagneâ⬠, ââ¬Å"Scotchâ⬠, ââ¬Å"Tequilaâ⬠, and ââ¬Å"Roquefortâ⬠cheese. Wine and spirits makers are particularly concerned about the use of place names to identify products, and the TRIPS Agreement contains special provisions for these products. But the issue is also important for other types of goods. * Using the place name when the product was made elsewhere or when it does not have the usual characteristics can mislead consumers, and it can lead to unfair competition. * The TRIPS Agreement says countries have to prevent this misuse of place names. Some exceptions are allowed, for example if the name is already protected as a trademark or if it has become a generic term. * For example, ââ¬Å"cheddarâ⬠now refers to a particular type of cheese not necessarily made in Cheddar, in the UK. But any country wanting to make an exception for these reasons must be willing to negotiate with the country which wants to protect the geographical indication in question. Trade-Related Aspects of Intellectual Property Rights (TRIPS) * WTO negotiated an agreement with WIPO by introducing intellectual property rules into the trading system, known as TRIPS. The policies to protect intellectual property include granting of patents, trademarks and copyrights. * TRIPS contains requirements that nations laws must meet for copyright rights, including the rights of performers, producers of sound recordings and broadcasting organizations; geographical indications, industrial designs; integrated circuit layout-designs; patents; monopolies for the developers of new plant varieties; trademarks; trade dress; and undisclosed or confidential information. TRIPS also specifies enforcement procedures, remedies, an d dispute resolution procedures. * It establishes minimum levels of protection that each government has to give to the intellectual property of fellow WTO members. * It strikes a balance between the long term benefits and possible short term costs to society. * Society benefits in the long term when intellectual property protection encourages creation and invention, especially when the period of protection expires and the creations and inventions enter the public domain. The TRIPS agreement covers five broad issues: * Application of basic principles of the trading system and other international intellectual property agreements. * Giving adequate protection to intellectual property rights. * Enforcement by countries of these rights adequately in their own territories * Procedure to settle disputes on intellectual property between members of the WTO * Special transitional arrangements during the period when the new system is being introduced. TRIPS requires member states to provide st rong protection for intellectual property rights. * Under TRIPS: * Copyright terms must extend at least 50 years, unless based on the life of the author. (Art. 12 and 14) * Copyright must be granted automatically. (Art. 9) * Computer programs must be regarded as literary works under copyright law and receive the same terms of protection. * Patents must be granted for inventions in all fields of technology provided they meet all other patentability requirements and must be enforceable for at least 20 years (Art 33). Exceptions to exclusive rights must be limited (Art. 13 Artà 30) * Legitimate interests of third parties have to be taken into account by patent rights (Artà 30). What is WTO? * WTO stands for World Trade Organization, which was established on 1st January, 1995 with its head-quarters located at Geneva, Switzerland. As on 24 August, 2012, WTO has 157 countries as members. What does WTO do? * WTO operates and deals with a system of trade rules between nations on a glob al or near-global level. * It is an organization for trade opening. It is a forum for governments to negotiate trade agreements, to settle trade disputes with aims for liberalizing trade. * It is a place where member governments try to sort out their trade problems with each other. Functions of WTO * Administering WTO trade agreements * Forum for trade negotiations * Handling trade disputes * Monitoring national trade policies * Technical assistance and training for developing countries * Cooperation with other international organizations WTO- Purpose * WTO settles trade related disputes among countries involving conflict of interests. WTO is all about negotiations and everything done by WTO is the result of negotiations, which are signed by the bulk of worldââ¬â¢s trading nations. * These documents provide the legal ground rules for international commerce and are essentially contracts, which bind governments to keep their trade policies within agreed limits. * The goal of such c ontractual bindings is to help producers of goods and services, exporters, and importers to conduct their business, while allowing governments to meet social and environmental objectives. WTO helps trade flow as freely as possible, as long as there are no undesirable side-effects. * It ensures that individuals, companies and governments know what the trade rules are around the world while giving them confidence that there will be no sudden changes of policy as the rules have to be ââ¬Å"transparentâ⬠and ââ¬Å"predictableâ⬠. WTO Trade Barriers * Trade liberalization or free trade involves the removal of trade restrictions or barriers on the free exchange of goods between nations. * Trade barriers include custom duties or tariffs and non-tariffs barriers, such as import bans or quotas restrictions. WTO negotiations have helped to liberalize trade by lowering these trade barriers especially for countries which have faced them and wanted them lowered. * However, WTO rules support maintaining trade barriers in some circumstances such as consumer protection, environment protection and disease prevention. WTO Agreements * WTO agreements cover principles of liberalization such as: * Transparent trade policies * Procedures in place for settling disputes * Lowering tariffs and barriers etc. * Any change in policies would have to be notified to WTO.WTO- Basic Trading Rules or Principles * Non-Discrimination: e. This rule has two major components which are incorporated in major WTO rules on goods, services and intellectual property. viii. The Most Favored Nation (MFN) Rule: A WTO member countries cannot discriminate between their trading partners e. g. if a country grants special favor to another country, the same will have to be granted to all other WTO members. ix. National Treatment Policy: Imported and locally-produced goods should be treated equally. * Freer Trade: f.To liberalize trade, lowering trade barriers including custom duties, tariffs, import bans or quotas restricting quantities selectively gradually through negotiations. g. It also discourage the use of quotas used to set limits on quantities of imports as it can lead to more accusations of unfair play or non-tariff barriers such as red tape, which involves agreements dealing with various bureaucratic or legal issues causing hindrances to trade such as import licensing, rules for the valuation of goods at customs, pre-shipment inspection involving further checks on imports, investment measures and rules of origin such as made in where? tc. * Predictability through binding transparency: h. WTOââ¬â¢s multilateral trading system is an attempt to make the business environment more stable and predictable while making countriesââ¬â¢ trade rules as clear and public (ââ¬Å"transparentâ⬠) as possible. * Promoting Fair Competition: WTO agreements support fair competition especially in agriculture, intellectual property, services, etc. Encouraging development and ec onomic reform: WTO system contributes to development by allowing countries to implement trade liberalization programs with flexibility of time. WTO Pakistan * Pakistan has been a WTO member since its inception and is one of the founder Members of the WTO since its inception. * Pakistan has been following an export led growth strategy since market access is of vital importance for its businesses.
Saturday, March 21, 2020
See The Attached Instructions Example
See The Attached Instructions Example See The Attached Instructions ââ¬â Coursework Example Measures to Minimize Environmental Causes of Asthma Measures to Minimize Environmental Causes of Asthma One measure that the globalcommunity can take to minimize environmental causes of asthma is house is free of fumes. In May 2012, the Presidentââ¬â¢s Task Force on Environmental Health Risks and Safety Risks to Children published an organized federal program to protect children from environmental causes of asthma. Two key measures from this program can be adopted to minimize the amount of causes of asthma in the global community. Burning wood, gas, and lighting kerosene stoves releases fumes within the house. Such burning equipment generates nitrogen dioxide, an odorless gas that irritates the nose, eyes, and throat. In effect, nitrogen dioxide causes asthma attacks (Presidentââ¬â¢s Task Force on Environmental Health Risks and Safety Risks, 2012). First, households residing in developing countries across the world and using these burning appliances and begin by ensuring that t heir stoves are ventilated appropriately to the outside. Users of gas stoves can utilize exhaust fans for ventilation while preparing food. Users of wood stoves can make sure their doors are secure to prevent any leaking fumes. Users of unventilated kerosene or gas space radiators can open windows or also utilize exhaust fans. The chimney corner should always be open before lighting it to enable fumes to dissipate through the chimney. Users of radiators should have their manufacturers clean and inspect it annually to find any likely linkages. Car owners should also avoid leaving their idle vehicles within closed garages to lower the risk of exhaust fumes entering their houses (Presidentââ¬â¢s Task Force on Environmental Health Risks and Safety Risks, 2012). Second, people can stand at least half a day inside the houses where there is an air-cooling system with an efficient purification system. Spending over 12 hours within such conditions should significantly lower indoor exposur e to environmental causes of asthma attacks such as pollen grains, outdoor molds, pet fur, horsehair, and dust. For this measure to be optimally efficient, the house or building should be reasonably and properly airtight. In addition, the house should have a constant central air dispensation system that sifts air constantly and not only when the radiator or cooler is on (Minnesota Department of Health, 2007). The above program recommends mandatory air household heater or air conditioners with constant fan operations as optional. For developing countries, there are affordable and efficient air filters without mandatory household radiators or coolers.ReferencesMinnesota Department of Health. (2007). Reducing Environmental Triggers of Asthma in Homes of Minnesota Children. United States Environmental Protection Agency, pp. 23.Presidentââ¬â¢s Task Force on Environmental Health Risks and Safety Risks. (2012). Asthma and the Environment: A Strategy to Protect Children. Presidentââ¬â ¢s Task Force on Environmental Health Risks and Safety Risks, pp. 20.
Thursday, March 5, 2020
Is Your Website Accessible
Is Your Website Accessible Build a platform! urge publishing gurus. Establish an online presence! You dutifully obey. Facebook? On it. Twitter? Rule it. Website? Of course, and it rocks! But did you know you might be restricting an entire group of users and customers from accessing your website and hence, from reaching you? This group consists of people with disabilities. The US Census Bureau states nearly 57 million people, thats 19 percent of civilians, have a disability. Youmay have a family member or friend, know a neighbour or student who is disabled. Imagine them trying to do a basic search online that you take for granted. These same people are also doing exactly what the rest of us are: working, enjoying food and drink, leisure and relaxation, sport and adventure. So why should they be prevented from utilising something as normal and taken-for-granted as a website? What is accessibility? Accessibility describes the degree to which a product, service, or environment is available to people. The more the number of people who can use it, the higher its accessibility. Correctly designed and developed websites empower everyone to have equal access to information and services. Examples of accessibility include: Providing text descriptions of images with meaningful links helps blind users using text-to-speech software or text-to-Braille hardware to read the content. Enabling text and images to enlarge helps users with poor eyesight.Ã Underlining and highlighting hyperlinks helps colour blind users notice them. Making action areas, like hyperlinks and buttons, large; and enabling keyboard navigation of menus helps users who cant control a mouse with precision or cant keep their hands steady. Captioning videos or providing sign language versions helps the deaf. Avoiding excessive flashing, flickering and special effects considers users prone to seizures. Writing content in plain language and illustrating with diagrams helps users with dyslexia and learning difficulties understand better. Is your website accessible enough? There are a number of options online to help you find out. A one-click website accessibility audit likehttp://wave.webaim.org/ is a system test that can identify accessibility problems and provide guidance on remedial steps. A list of other automated tools available to evaluate website features can be found here: w3.org/WAI/ER/tools/index.html. These tools dont test everything, but can provide a good idea of the extent of your websites accessibility. Must I make my website accessible? While accessibility is not required Your website is your showcase to the world, your online home. Youre proud of it and have invested time and resources in making it useful, relevant and dynamic. You want everybody whos anybody to visit it. Follow the four principles of accessibility explained in simple English athttp://devyaniborade.blogspot.com/p/principles-of-web-accessibility.html to make your website more accessible to all.
Monday, February 17, 2020
Trauma experience Assignment Example | Topics and Well Written Essays - 1500 words
Trauma experience - Assignment Example The bereaved adult will also have poor communication and social skills, especially when dealing with his peers. Moreover, the young adult may lack motivation for academic and occupational success. The loss of parental advice is not replaceable and there is a need for continuous guidance and counseling as well as encouragement from friends and the society in general. The loss of a parent, especially when this parent was a responsible breadwinner of the family may cascade into an increased burden especially on the elderly children. Such elderly bereaved young adults have a higher risk of diverse psychological problems such as depression and post-traumatic stress disorder. As a result, the elderly bereaved young adults may fail to handle such situations resulting in drug abuse and unhealthy behaviors. According to numerous researches on developmental psychology, the effects of family adversities and risks on the elderly bereaved young adults has grown beyond psychological problems perspective to include other consequences from broader indicators of adaptive strategies. They include the consequences of adversity for the achievement of developmental tasks in the education and career sectors, as well as policies in the improvement of interpersonal relationship. In my case, the loss of my father in an accident three months ago has affected my entire family. My mother and my sister cannot talk to anyone. This is because no one ever thought that our bread provider could suddenly leave us. Additionally, the bereavement has left me with a huge responsibility of taking care of my family. As a result of the complication, I ended up feeling very stressed all the time. I also felt that the society has not only neglected me, but also that careless driver should be awarded death penalty. As a result of the trauma, I decided to interview both my sister ad my mother in order to understand more on how to handle the bereavement and unite my family. Prior to conducting
Monday, February 3, 2020
What is the value of play to promoting children's all round learning Essay
What is the value of play to promoting children's all round learning and development - Essay Example Playing involves a great deal of things. It could be playing with fellow children, playing with toys, a child playing by themselves and or playing with adults like a parent or teacher. Playing is done a lot when a person is young and the games played go with stages i.e. as the child grows older the type of play changes with each stage that the child is growing, these stages of playing expose a child to new possibilities and experiences. Since Child play is a universal subject, many scholars have addressed the issue of play and have developed theories on the subject. Pioneers in childhood and also modern day scholars have also widely discussed the subject and reiterated on its importance in learning and development. Governments have also made sure that play has been incorporated in the school curriculum. It will also be important to look at how the international perspective on child play has influenced various legislations to be incorporated into the education curriculum. It will also be important to look at the very crucial role that adults play (Burton 2002). In recent years people have become busy and operating on tighter schedules. Children have not been spared and more academic expectations are being demanded from them. It is for this case that play has been included in the curriculum to provide children with an outlet. Play is an extra curricular activity that helps learners, especially young children, to release stress and anxiety that comes from a society that is currently demanding too much from them. Apart from this, play helps mostly in the development of a child both mentally and physically and also in many ways that help that child to learn. In development, play helps a child to become physically strong or fit, up until the child is able to crawl, playing ensures that the child develops a strong physique. It also acts as a form of much required exercises, games like running
Sunday, January 26, 2020
Human services Framework in USA Healthcare Organisations
Human services Framework in USA Healthcare Organisations Human services framework in the USA and related organizations The human services benefits in the US generally is considered as a consolidation of two significant open and private framework and dependably there is no any exceptional rationality in both of those assets. It mean identified with open wellbeing administrations and rules by the neighborhood, state and administrative level attempt to give astounding wellbeing administrations and private areas, therapeutic suppliers, clinics and facilities are dependably attempt to stay with higher models which executed by the legislative guides and rules. The real issue identified with this distinction is absence of coordination between therapeutic administrations and open wellbeing activities. This contrast bring an additional cost and part of disarray for the individuals to get the same administration with more level expense and perplexity.. Case in point, in 2009 the central government utilized more than three trillion dollars on change of open wellbeing framework and administrations for group parts in diverse divisions like Medicare, Medicaid, CHIPS, gold cards and free group forethought administrations. At the same time, shockingly more than ninety millions US people groups are experiencing nonattendance of protection or high medicinal expenses also (Bodenheimer, 1999). Numerous individuals are whined that they pay the doctors visit expenses more than a few times more than other western nations identified with open wellbeing administrations however the sentiment shows they are truly unsatisfied with their neighborhood open wellbeing administrations and nature of displaying of restorative or preventive projects. Low fulfillment and trouble to get to restorative or preventive administrations particularly for suburb populaces may be identified with absence of coordination between all official wellbeing offices in diverse levels. Obviously, for some individual the holding up time for going to by PCP or other medicinal administration suppliers is shorter contrast with different nations however numerous analysts reason that the nonattendance of protection and trouble to pay the hospital expense is the significant reason for evading doctors facilities or searching for exorbitant restorative administrations. At long last, because of intricacy of medicinal services frameworks in states and regions and distinction in translation of open laws then there is no reasonable and simple methodology to understanding of center capacities for the greater part of the Department of Health Services (DHS) business locales. Still, I have to specify that the US populaces use a lot of cash for therapeutic administrations and open wellbeing administrations and its connected extensions is truly go about as a most questionable allotment of everybody life to handle the complexities of health awareness business locales and its connected exhibitions. ROI and public health marketing ports Effect of ROI after five years investment for public health services ($9/person) America spends $2.7 trillion annually on health care which it is more than any other nations. Too often, the policy for current health care system is more enactive on therapeutic issues of disorders and incidences compare to preventive intervention. For example, related to stop smoking preventive plan, the US spent more than 100 billion dollars of tax payer to enforce cigarettes smoking in public areas and rehabilitation programs by community hospitals. Obesity control programs is another society issues which always associated by other chronic diseases like high blood pressure, stroke, diabetes and chronic joint diseases. In one report by the CDC, obesity control plans associated with more than 60 billion dollars costs for federal government as well. The major question is why the government spent billion dollars to treat the preventable diseases compare to other western countries? May be the reason why is that the public health official mostly focus on treatment than prevention. In addition, due to lack of efficient insurance could not participate in preventive programs likes check blood sugar, blood pressure or regular office visiting. I need to add that the rate of chronic diseases in American is very high like carcinoma, heart stroke, COPD and diabetes mellitus. In a recent report, the mortality rate among American due to chronic diseases are considered as 70% and cost of public health budget for above diseases are approximately more than 70 percent of public health budget. I believe, the current opinion regarding to treatment must be switched to preventive initiatives and need a pervasive approach to change of therapeutic culture to preventive methods. In other hand, by changing policy direction toward to prevention then the public health officials could easily recover a lot of cost to spend the money to build up a very strong infrastructure for nation public health. I am pretty sure that in recent changing the culture toward preventive medicine and educating plans could save a lot of budget and lives and divert to cover all community members by strong insurance plans and increasing health service standards. Key findings related to changing policy toward preventive initiative are: -A 2011 study published in Health Affairs found that increased spending by local public health departments can save lives currently lost to preventable illnesses.7 -Researchers mapped spending by local public health agencies from 1995 through 2005 with preventable mortality rates in each agencyââ¬â¢s respective jurisdiction. The study found that on average, local public health spending rose from $35 per person in year 1993 to $41per person for year2005 which it shows an increase of more than 19%. For each increase a dollar in local public health spending, there were significant decreases in infant mortality rate (7 percent drop), deaths from cardiovascular disease (3% drop), deaths from diabetes (1.5% drop), and deaths from neoplasms (1% drop). -The 5% decrease in cardiovascular disease mortality required for local health agencies to spend, on average, an additional $350000 each year. In contrast, achieving the same reduction in deaths from cardiovascular disease by focusing on treatment and other traditional health care approaches would require an additional 27 primary care physicians in the average metropolitan community. To put this comparison in perspective, the median salary for a single primary care physician was $200000 in 2010 ââ¬â as a result, 27 primary care physicians would cost nearly $6 million or more than 37 times the public health investment. -A follow-up to this study presented at the 2013 American Public Health Association Annual Meeting found that low-income communities experience the largest health and economic gains with respect to increases in local public health spending. Researchers again examined spending by local public health agencies to determine the specific types of communities that benefit most from additional public health investments. The study found that the health and economic effects of public health spending were 20-45% larger in low-income communities (bottom 20 percent) as compared to the average community. -Lower death rates and health care costs were seen especially in communities that allocated their public health funding across a broader mix of preventive services. -A 2011 Urban Institute study concluded that it is in the nationââ¬â¢s best interest from both a health and economic standpoint to maintain funding for evidence based public health programs that save lives and bring down costs. Researchers examined the financial costs and health ramifications of ignoring disease prevention. The American health awareness framework right now uses $238 billion for every year in abundance costs ââ¬â characterized as the distinction between the expenses of look after individuals with preventable incessant illness and those without ââ¬â to treat individuals with different types of diseases like diabetes, hypertension, coronary illness and stroke. More than a large portion of those expenses are financed through Medicare and Medicaid. Left unchecked, those overabundance costs would climb to $500 billion for every year by 2030, with about $300 billion financed by Medicare and Medicaid. By 2030, if flow patterns precede for constant illnesses among all peopleââ¬â¢s ages 55-65 years old, one-third will have hypertension, more than one quarter will have diabetes, more than 11 percent will have coronary illness, and almost two percent will have strokes. Comparable pervasiveness rate builds might be normal for peopleââ¬â¢s ages 65 years or more seasoned ââ¬â specifically, more than 50% of persons in this age gathering will have diabetes mellitus or hypertension. These builds will influence open segment plan as well as private segment expenses and intensity as well. Slowing the rate of development of these endless ailments will spare lives and cash. For occurrence, cutting the rate of unending infection development by even five percent would spare Medicare and Medicaid six billion dollars for every year by 2030; cutting the rate of constant malady development by 25 percent would spare $26.2 billion for every year; and cutting the rate of constant ailment development by 50 percent would spare $48.9 billion for every year. -Investments in essential anticipation projects wont just help abate the constant illness rate, yet have likewise been demonstrated to lower private protection fetches and move forward investment gainfulness while lessening laborer non-appearance. Truth be told, reserve funds accomplished through counteractive action projects can altogether and rapidly exceed beginning, forthright speculations. A 2011 study distributed in Health Affairs demonstrated that a consolidation of three systems ââ¬â growing wellbeing protection scope, conveying better preventive and incessant mind, and concentrating on group counteractive action is more viable at sparing lives and cash than executing any of these methodologies alone. Specialists tried each of the three procedures in an element recreation model of the United States wellbeing mind framework. The study found that while each of the three procedures recovery exists and enhance financial conditions, protection scope and therapeutic tend to perpetual conditions lead to expand in wellbeing expenses. Of the three, just those steps identified with aversion moderate the development in the predominance of infection and damage, reducing the interest on restricted essential forethought limit. -Adding group avoidance components, for example, lessening introduction to used smoke and offering more open doors for physical action to an extension of protection scope and therapeutic consideration could spare 90 percent more lives whats more decrease expenses by 20% inside 10 years; those figures ascent to 150% whats more 58%, individually, inside next 20 years. In 2008, Trust for Americas Health and the Robert Wood Johnson Foundation discharged a report demonstrating that a venture of $10 for every individual yearly in demonstrated, group based open wellbeing projects could spare the United States more than $15 billion inside five yearsââ¬âa 6 billion return for each $1 per capita contributed. The report mainly focused around a model created via specialists at the Urban Institute and an audit of studies led by the New York Academy of Medicine ââ¬â concentrated on group based ailment anticipation programs that dont oblige medicinal forethought. Extra findings included: 1- The $16 billion in funds would be spread through Medicare ($5 billion), Medicaid ($1.9 billion), and private payers ($9 billion). 2- Every state in the country would be suffering because of potential profit for venture inside that five-year period, going from a rate of 3.7 to 1 at the low end to 9.9 to 1 on the high end. What is the estimation of a solid open wellbeing framework? The responses are truly surrounding us: circulating everywhere we inhale, the water we drink, the sustenance we consume, and the spots where we live, learn, work and play. This current years main topic for ROI, Efficient Public Health is ROI: Save Lives, Save Money, highlights the quantifiable profit, or ROI, that open wellbeing projects and administrations convey in securing our wellbeing and decreasing therapeutic expenses from infections that could be anticipated. If we realize that putting $10 for every individual every year in group based with wellbeing exercises programs then could spare more than twenty billion dollars for next five years? That means it is simply returned more than six billion dollars for each dollar per person contributed by ROI program. Furthermore that is simply the outcome of an efficient ROI plan. In addition, routine kidsââ¬â¢ vaccinations save $10 million in immediate health preventive expenses, spare 33,000 lives and keep 14 million instances of sickness. However, with spare of each $1 per person to provide preventive resource budget like into the countrys drug abuse prevention then the public health officials could spares more than fifteen dollars in medicinal expenses and treatment and in the end gainful policy by local ROI, an aggregate of more than two billion dollars brings consistently. Another outcome with efficient ROI is related to preventive measure and AIDS diseases. During years 1995-2005, speculations regarding of HIV control by counteractive actions turned away more than 400,000 new infected individuals and spared more than hundred billion in therapeutic expenses. For smoking preventive measure then using of smart ROI which is fitted to the community size and culture, could be bring more than three dollars saving cost for each one dollar contributed to public health budget. And for illicit drug prevention treatment has an ROI of six dollars for every one dollar invested for preventive programs. References: Bodenheimer, T. (1999). The American health care systemthe movement for improved quality in health care. The New England Journal of Medicine, 340(6), 488-492.
Subscribe to:
Posts (Atom)