Wednesday, December 18, 2019

Schizophreni The Common Psychotic Disorder - 1697 Words

Schizophrenia is globally the most common psychotic disorder (Holder Wayhs, 2014, p.1). There is no discreet definition of schizophrenia as a disease with a single underlying cause rather it is a set of symptoms diagnosed by clinical observations and the experiences of the patient (Gaebel, 2011). One has to exhibit a number of symptoms for not less than a month to get a Schizophrenia diagnosis. Angelo’s behavior, appearance and conversation suggest that he suffers from the disorder. It is important to manage schizophrenia suffers in a sensitive and appropriate manner to reduce the risk of an episode and improve outcomes for the patient. The odds of inheriting schizophrenia are exceptionally low, around 60% of infected people have had†¦show more content†¦Some risk factors come out as a result of intelligence, geographic factors, famine and malnutrition and socioeconomic factors (Lehman Lieberman, 2004). There are no Laboratory tests for schizophrenia and one is usually diagnosed by having a number of symptoms over a period of over one month. According to ICD clinical symptoms of schizophrenia are defined from the point of the presence and expression of primary and/or secondary symptoms (Andreasen, N. C., Flaum, M. 1991). The symptoms are divided in two classes, that is, negative and positive. Positive symptoms are, Delusions. - This is basically a misconception that one takes to be the truth and cannot be swayed in their opinion no matter how impractical the belief might be. Hallucinations. – This is a sensory perception of things that are actually not there. They could be auditory, visual or even tactile. Agitation/aggression, Disordered thinking, Disordered movement. Angelo seems distracted while in the middle of the conversation and says he heard bad comments and he needs to be careful. This is a direct evidence of hallucination. It is important to find out if the voices are just commenting on the patient and his behavior or commanding them to do something as voices that command has a potential to influence the individual to injure themselves or others.

Tuesday, December 10, 2019

Ageing Population in Asia Samples for Students †MyAssignmenthelp.com

Question: Discuss about the Ageing Population in Asia. Answer: Introduction The collective efforts for improvement in demographic indicators such as adecline in total fertility rate, increase in longevity and decreasing mortality rate has shown great results so much so that, on the flip side, ageing population is becoming a serious concern in the countries of Asia (Heller 2006). The elderly population of Asian economies is increasing rapidly from 57.6 million, 4.1% of Asias population in 1950, to projected 922.7 million, 17.5% of the Asian population by 2050 (Menon Melendez-Nakamura, 2009).This demographic shift towards becoming the oldest region of the world is adversely affecting the economic performance of Asian countries owing to the shrinking labour force, declining rate of saving and investment, and increased financial burden of pension and healthcare costs. This essay takes the example of China and Japan to discuss three phenomena which are resulting in theageing population in Asia, and its consequential changes and impact on healthcare services. It further discusses the policy and cultural aspects of theageing population. The Demographic Changes The sudden increase in the birth rate, and hence the world population, in the aftermath of the 2nd World War for next two decades, was the outcome of avigorousincrease in economic activities and consequent increase in prosperity of developed and then emerging Asian economies. Such higher incomes and education level allowed people to give birth to higher numbers of babies between 1946 to 1964 resulting into Baby Boom (Roy, 2014). China, one of the rapidly developing economies in the world, also witnessed similar baby boom during the '50s and 60s of the20th century which resulted in apopulation explosion in the country. This called for strict policy interference and China was subject to One Child Policythat helped China to bring its total fertility rate below 2. Recent uplifting of one child policy is again resulting in a minor baby boom in China (Hvistendahl, 2010).Japan also had a similar fate post-war, which witnessed a simial baby boom between 1947 and 1949 at the crude birth rate of 30 with annual birth numbers above 2.6 million for the same period (Tachi Okazaki, 1969).As against the perceived notion of war-related delays in marriages and births as a reason for thebaby boom, it was identified that lack of modern birth control measures was theactual reason for the baby boom. Post baby boom years in Japan witnessed a sharp decline in the birth and death rate. The fertility rate is understood as the replacement of the parent couple by younger ones. The fertility rate of 2 implies stagnant population as 2 younger ones are left behind when 2 older ones die.The fertility rate above 2 leads to a growth in population while rate under 2 leads to a shrinking population. Chinas famous One Child Policy (OCP) was the front runner measure for the hasty decline in the fertility of China which was at 2.8 prior to the OCP and sunk to 1.5 in 2010 (Retherford et al., 2005). Although Anders (2014) argues that the policy was cruel and unnecessary as the fertility rate would have gradually decreased below 2 without resulting in ageing problems and skewed gender ratio (Anders, 2014). Japan witnessed a decline in fertility in the 1970s and the increase in educational levels of the women is attributed as the major reason for the decline. Access to higher education among Japanese women kept them unmarried in their twenties and this delay in the age of marriage led to the decline in the overall birth rate which reached at 1.39 by 1997(Shirahase, 2000). The mortality rate is defined as the number of deaths per 1000 population, and adeclinein mortality is understood as the decrease in such deaths due to avariety of factors including environmental, biological, physiological etc.Mortality is further understood in the form of infant mortality rate, under-5 mortality rate, crude death rate, maternal mortality ratio, and life expectancy. The decline in mortality is one of the reasons for ageing population as the ratio of elderly population increases with respect to total population. China has recorded, globally, one of the most rapid increases in life expectancyat birth from 37 years in 1950 to 66 years in 1980. This duration witnessed the dramatic reduction of around 60% in infant mortality rate and under-five mortality, owing to the educational and public health campaigns (Babiarz et al., 2015).The birth rate gradually declined in Japan and reached at 2.0 in 1975, which continued to decline gradually to reach all time low at 1.26 in 2005. Post-2005, TFR started to rise again and reached 1.41 in 2012, yet the country continues to grey due to higher death rate than birth rate and hence population continues to shrink (Durden, 2013). The later half of the 20th century has witnessed a surge in healthcare services in developed countries, followed by public health missions and campaign in developing countries. Malaria control program, greater emphasis on institutional deliveries with the help of acadre of trained midwives, and aggressive immunisationcampaigns for infants have been the major actions taken collectively at global as well as regional levels. Asia also went through such healthcare programs and upgraded their medical services under the aegis of global and regional institutions like World Bank, World Health Organisation, International Monetary Fund, and Asian Development Bank among others. Aggressive healthcare measures adopted in last five decades has resulted in a paradigm shift in development and demographic indicators in Asian countries, though at a varying speed. Key indicators like mortality rate, fertility rate, life expectancy, has improved drastically. Better health facilitieshave also impacted the educational levels with anincrease in literacy rate and reduced drop-out rate. Better health and education indicators, in turn, improved theoverall quality of life and helped reduce poverty levels to acertain extent. Notwithstanding the differences in China and Japan in terms of size, scale, resources, and economics progression, both the country has made remarkable progress vis--vis their previous state of development in last 50 years. The Policies The rate of ageing is uneven across the countries of Asia due to variation in their economic advancement, healthcare facilities demographic indicators, baby boom generation etc. Concerns related to ageing is acknowledged and rather accommodated in policies and legislations, looking forward to addressing the challenges and leverage opportunities related to elderly population. As per the review of 26 Asian countries by HelpAge (2017), 18 countries have anational policy, legislation or action plan for addressing age-related challenges, with other two are in process to have asimilar policy (HelpAge, 2017). Major components of policies related to ageing population include guidelines on healthy ageing, universal equal access to health care, social protection, housing and living environment, images of ageing in society, and care support for caregivers. Moreover, these policies mention rights and age discrimination, abuse, violence, neglect; and training for health care workers. Those pol icies which are not specific to the problem of ageing also includes some policy measures explicitly addressing elder people. In order to address the challenges of ageing in China, the government has recently relaxed the norm of One Child Policy and ayounger couple is now allowed for having thesecond baby. Other policy measures include mandating or incentivizing the individuals to ensure savings for later years. Social insurance policies dictating intergenerational transfers from working age population to retired people is a similar measure. Increasing the retirement age, owing to the longevity, so as to keep people engaged with labour force for alonger period is another way to secure the future of elderlies. Moreover, Government support inthe domain of healthcare is increasing the capacity of older people to continue serving in the labour force and cushion the monetary burden of medical care borne by them. Another policy measure to check the rise in elderly dependency rate is to encourage the higher rate of fertility and immigration to other countries. The Vienna Plan ofAction provides broader guidelines and general principles on how government, institutions, and society at large can meet the needs of theelderly population and tackle the challenges of ageing of society across the globe (United Nations, 1983). The Madrid International Plan of Action on Ageing, 2002 is second policy instrument adopted by countries across the world. MIPAA, for the first time,recognised elders as contributors to the development of society instead of being aburden on it.The policy also called for governments to incorporate the concerns of older people in all economic and social development policies so as to meet the millennium development goal. The policy measures are adopted by 159 countries on a voluntary implementation basis (United Nations, 2002). The Culture Culturally, the Chinese are very sensitive towards taking care of their parents. This care and sensitivity towards elders are deeply rooted in the Confucian principle of filial piety. Filial Piety is the fundamental value which suggests that one must take care of ones parents, and younger members should take it as a fundamental duty to take care of their ageing parents (Huffington Post, 2014). Abandoning ones parent in China is considered highly disrespectful and treated secluded by the society. With the advent of globalisation and cultural fusion with westernisation, the cultural fabric of China is breaking down in some cities and communities where people are no more concerned with their parents old age. Chinas one-child policy also triggered this lack of affection towards elderly as people started to live in nuclear family structure. Japan is one of the most favourable places in the world for elderly people. The Japanese culture values older people as care for grandparents is engrained in children and families. Till date, many generations of a family live in the same house making the culture of thejoint family a respectable value for the Japanese. The pro-elderly culture in Japan is further attested by the fact that older people in Japan live more than the same in any other country (Campbell Ikegami, 2000). The happiness and longevity among Japanese elderlies are because of strong community bonds, family and healthy living. Japanese are particular about regular physical exercise and healthy food, especially for senior citizens Across civilisations, the healthcare services derive themselves from religious beliefs (Patel et al., 2002). In ancient China and Japan, diseases were thought of as something supernatural and accordingly remedy was sought from the quack doctors. These quack doctors used to relate the occurrence of symptoms with the local culture and belief. These practices have changed over the period of time. New research studies, policy measures taken by the government have resulted in people becoming more aware today and they now rely on scientific means of disease diagnosis and treatment. This remarkable shift identifies itself with changing cultural practices. Cultural beliefs and practices are reflected in the behaviour of individuals. The lifestyle of citizens is primarily driven by their belief system. A government policy is a guiding tool available with the government to deploy its resources to tackle any issue. In the case of healthcare, the conventional wisdom available with the masses to deal with their health concerns is derived from local cultural practices. A huge no. of citizens relies on the government to extend health services to them. Hence it is imperative for a government policy to be culturally sensitive, failure of which will result in a waste of resources, forcing the citizens to resort to old practices and depriving them of modern scientific healthcare services. The Madrid International Plan of Action on Ageing, 2002, recognises elders as contributors in the development process and defies the old convention of being dependent and burden on the society. This view encourages and guides the government policies to consider the welfare of elderlies. A thorough analysis of demographics shall enable the policy makers to come up with policy prescriptions that shall enable the to design such policies that empower the elders so that they may better engage themselves in constructive developmental activities. Efforts should be laid to restore the conventional culture of the joint families so that elders may enjoy psychological comfort and add value to building family institutions. Conclusion Demographic pattern in any society is an outcome of local cultural practices and government policies. Every country in its lifecycle attains a peak where its maximum population is young. This situation is known as a demographic dividend. Constructive policies may help in reaping out the benefits of this dividend. The next phase of the demographiccycle has a bulk of the population in the elderly age group. Elders used to be seen as a burden, but recent policy stances by several governments have changed this viewpoint. Elders are now considered as contributors in developmental activities. Governments are designing better social security schemes, healthcare policies for the elders. Research studies in recent times have shown that these policies should systemicallyaccommodate local culture and practices to deliver best results. References Anders, C. (2014).Did China's one-child policy actually reduce population growth?.Io9. Retrieved 29 January 2014, from https://io9.gizmodo.com/did-chinas-one-child-policy-actually-reduce-population-1511784972 Babiarz, K. S., Eggleston, K., Miller, G., Zhang, Q. (2015). An exploration of China's mortality decline under Mao: A provincial analysis, 195080.Population studies,69(1), 39-56. Campbell, J. C., Ikegami, N. (2000). Long-term care insurance comes to Japan.Health Affairs,19(3), 26-39. Durden, T. (2013).Japanese Birth Rate Plunges To Record Low As Death-Rate Hits Record High.Zero Hedge. Retrieved 7 June 2013, from https://www.zerohedge.com/news/2013-06-07/japanese-birth-rate-plunges-record-low-death-rate-hits-record-high Heller, M. P. S. (2006).Is Asia prepared for an aging population?(No. 6-272). International Monetary Fund. HelpAge. (2017).Mapping of ageing policies.HelpAge. Retrieved 18 May 2017, from https://ageingasia.org/mapping-of-ageing-policies/ Huffington Post. (2014). 7 Cultures That Celebrate Aging And Respect Their Elders.Huffington Post. Retrieved from https://www.huffingtonpost.com/2014/02/25/what-other-cultures-can-teach_n_4834228.html Hvistendahl, M. (2010). Has China outgrown the one-child policy?.Science,329(5998), 1458-1461. Menon, J. Melendez-Nakamura, A. (2009).Aging in Asia: Trends, Impacts and Responses(No.25). Asian Development Bank. Patel, S. S., Shah, V. S., Peterson, R. A., Kimmel, P. L. (2002). Psychosocial variables, quality of life, and religious beliefs in ESRD patients treated with hemodialysis.American Journal of Kidney Diseases,40(5), 1013-1022. Retherford, R. D., Choe, M. K., Chen, J., Xiru, L., Hongyan, C. (2005). How far has fertility in China really declined?.Population and Development Review,31(1), 57-84. Roy, S. (2014). Baby Boom Generation in Singapore and its Impact on Ageing.International Science Index 8 (3). Shirahase, S. (2000). Women's increased higher education and the declining fertility rate in Japan.Review of population and social policy,9, 47-63. Tachi, M., Okazaki, Y. (1969). Japan's postwar population and labor force.The Developing Economies,7(2), 170-179. United Nations.(1983).VIENNA INTERNATIONAL PLAN OF ACTION ON AGING. New York: United Nations Press. Retrieved from https://www.un.org/es/globalissues/ageing/docs/vipaa.pdf United Nations. (2002).Political Declaration and Madrid International Plan of Action on Ageing. New York: United Nations Press. Retrieved from https://www.un.org/en/events/pastevents/pdfs/Madrid_plan.pdf

Tuesday, December 3, 2019

Network Securities Management

Nowadays there has been a great advancement in information technology. This has resulted in many people incorporating information technology in their businesses and organizations. The advancement of information technology has enabled the learning institutions, hospitals, businesses as well as government agencies to employ information technology in their day-to-day activities.Advertising We will write a custom term paper sample on Network Securities Management specifically for you for only $16.05 $11/page Learn More This has resulted to increased performance in these institutions. Information Technology has boosted the expansion of many businesses by enabling them to expand their operations across borders by adapting e-business. The adaption of e-business has helped businesses to augment their market niche as well as improve their communications within the companies as well as with other stakeholders such as their suppliers and shareholders. A computer ne twork is a system that comprise of interconnected computers that communicate with each other. For instance, computers may be connected through the physical hardwires such as the use of wires and networking cards or wirelessly. The networking of computers allows the computers within the network to communicate with each other, share files as well as share some other resources such as the printer. The networking process enables computers to be linked with the internet which increases the usability of a computer network (EcommercePrgrgram.com, 2007). Network Security entails the requirements that are required in an organization to assist in protecting the computer systems, network as well as the resources that are accessible through the network. Network security involves preventing unauthorized access, malicious damages of files, monitoring continuous and consistency of traffic flow as well as effectiveness of the computer network. Network security is a common concern for every company that has a computer network. It is very important for a system administrator to ensure that he/she puts effective security measures to ensure that the network is secure from unauthorized access.Advertising Looking for term paper on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More A compromised network security gives hackers or competitive rivals an opportunity to enter into the network and damage sensitive files as well as interfere with the system and completely crush it down. The loss of important data as well as alteration of some sensitive data can result to very serious repercussions to the company affected. The term information security is taken to refer to security of computer system from within an organization, while network security refers to security of the network from outside intruders. The security of any network starts from authentication of a user who logs into the network. Authentication of such type is referr ed as one factor authentication, while a two factor authentication occurs when one uses an Automated Machine or a mobile phone. Three factor authentications happen in biometrics, where body parts such as the eye retina or finger prints are used to verify the user. The authentication procedure is followed by firewalls that leverage the programs or services that will be accessed by authorized users. Firewalls are effective in preventing unauthorized access of sensitive information, but they fail to prevent entry of worms into the network which are transmitted across network. To overcome the entry of viruses as well as worms inside the network, the system network administrator should make sure that he/she installs appropriate firewall as well as IPS settings. The evolvement of information technology has resulted to advancement of the network security systems. The introduction of e-businesses has resulted to the need to modify the computer security systems from keeping the unwanted user s away, but enabling the targeted people to access the network. The cotemporary network should allow customers, remote employees as well as other relevant stakeholders to access the network. Thus the use of firewall and antivirus is not sufficient to guarantee the required security. The security system employed should ensure that it is able to keep the information of the clients private and secure. Through this process the customers will be able to trust the organization network since it cannot expose their information to unwanted people (Curtin, 1997).Advertising We will write a custom term paper sample on Network Securities Management specifically for you for only $16.05 $11/page Learn More There are various techniques that hackers employ to access computer networks illegally. One of the processes they use is an attack of the Internet Protocol. Basically, an IP does not do any authentication of any form. This means that the computer network allows tra nsmission of a packet within the network without finding out whether the address that it assumes to originate from is part of the network. Therefore to control transmission of unwanted packets, the system administrator ensures that the network is able to offer authentication at the application layer. Some of the strategies that hackers employ to access computer networks illegally are IP session hijacking. This process involves instances where unauthorized user takes over a user’s session. For instance, if a user is using an email, the intruder attacks the session and impersonates to be the real user. To control IP snooping, system administrators should make sure that they install their network system with encryption programs. Subsequently, the computer users should therefore make sure that they encrypt their packets before transmission. Use of encryption mechanism has been noted to be a very effective strategy of overcoming IP snooping. The encryption of packets makes sure th at even if the hacker takes over a user’s session, he/she is not in a position to decrypt the transmitted packets in order to understand the kind of information being relayed since they do not have the required cryptographic key. The system manager should advise the management accordingly on the right software and hardware to include in their systems in order to enhance the security of their computer networks. The computer system manager who works on a company that uses mostly telnet should advice the company management to use encrypted versions of telnet, instead of standard telnet that are highly prone to IP snooping. Denial of service attack is a network attack whereby a network attacker sends a lot of request to a host computer which it cannot be able to manage. Most ‘DoS attacks like the Ping of Death’ and ‘Teardrop’ attacks take the advantage of the limitation of the TCP or IP protocols.Advertising Looking for term paper on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More For example ,it is noted that for all DoS attacks, there are some software that have been designed to prevent these attacks, therefore system administrators should ensure that their computer networks are installed with appropriate software in order to control network attacks through denial of services. A network attacker executes a denial of service attack by sending a lot of request to a system than it can handle. The attacker uses some tools to make it easier to run a program that request the host to send numerous messages. Through this process the attacker makes a connection by faking the packets header information that contains the information of where the packet is originating from and then drops the connecting (Raggo, 2003).). Unauthorized Access is another form of network insecurity. Unauthorized access means an authorized user accessing some resources that ought not to come across. In a computer network, different workstations are given diverse rights on accessing various re sources within the network. This limitation is employed for security issues. For instance, in a situation where a host is a web server, it is programmed in a manner to give anyone with the rights to access the requested web pages. Nevertheless, that host should not offer command shell access before verifying that the request is originating from the right location such as from a local administrator. For example, the system administrator should not allow un-trusted person to execute any command from the server. There exist two categories of this situation. They include the normal access user and administrator access. A normal user is given the right to execute a number of things over the network system. A normal user should be in a position to mail files as well as read those files that are shared over the network. Similarly, the user is given the mandate to mail such files to other people. These rights are only limited to those authorized network users. Unauthorized users are not in a position to execute the aforementioned activities since they have not been given the access rights. Conversely, normal users are not given the permission to make configuration changes to a host. Configuration alterations may involve changing the IP address as well as installing a start-up script that makes a system to shut down every time it boots up. It is only the system administrator that is given the right to execute the configuration changes such as changing the IP addresses or putting start-up scrip. For the normal user to access such privileges, he/she will seek permissions from the system administrator (Curtin, 1997). The connection of an organization to the internet allows the movement of traffic in two ways. This jeopardizes the security of an organization since some proprieties information is freely accessible within a corporate intranet. To overcome this system administrators are using firewalls to create a separation between a company’s intranet and the interne t. A firewall is some components that are used to act as a barrier between two networks. There exist three kinds of firewalls namely; the Application Gateways which comprises of bastions hosts that run some software that behave like proxy server. Application Gateways operates at the application layer of the ISO/OSI Reference Model. It requires for the clients behind the firewall to be proxitized in order to employ Internet services. The use of Application Gateway is not considered as the most preferred option since it is a very slow process. It is slow because it requires a number of subsequent processes to be initiated in order to have a request serviced. The other type of firewall that can be used to separate the company’s intranet with the internet is Packet Filtering. In this method, routers are fitted with Access Control Lists. Thus, through this process, routers are only allowed to transmit only specific packets that they receive. The use of ACLs helps a company to leve rage the information that they avail to the public and the information it considers private. This firewall takes place at the transport layer or the session layer. Packet filtering firewalls are faster than Application gateways firewalls. Conversely, Packet filtering is not considered as a very effective security strategy since the TCP/IP that are associated with Packet Filtering do not have the ability to verify that the source address is really what it assumes to be. In order to enhance the security of computer network while using packet filtering firewalls, the system administrator should use two packets of filtering in order to guarantee whether the packet originates from the internet or intranet. The most effective and efficient firewall is the Hybrid System. This firewall combines the concepts of both the application gateway and packet filtering mechanism in order to boost the performance of firewalls. The system requires authentication and approval at the application layer. A fter the authentication and approval the packet is passed on to the session layer where the packet filtering ensures that it is only those packets that should be accessed by the public are passing on. The coming of e-business has resulted to greater insecurity issues. Many businesses as well as people have lost a lot of their money due to existence of ineffective security measures within their network. Companies that sell their products online should make sure that they have secured their systems accordingly in order to avoid exposing the credit codes of their customers to hackers. Expose of the credit numbers of their clients can result to hackers using these credit cards to make unwarranted purchases. The Sony Entertainment American is an example of a recent victim of hacking that resulted to expose of credit cards of many of their customers (Curtin, 1997). In order to have very effective and efficient security systems, the system administrator should ensure that he/she updates th e network accordingly. The security infrastructure should be able to provide authentication for the users that access the network. Being able to identify the users that visit the network is very paramount in establishing a successful network security. The network should be able to authenticate its customers accurately and efficiently in order to create satisfying experiences with its customers and partners. After the authentication, the system should authorize the users appropriately. The system should give various accesses to diverse users depending on their level of authorization. The system should in addition offer the protection of assets. The network asset entails the information that is transmitted or stored in the network. The computer network should make sure that it keeps information that is stored or transmitted in the network safe and confidential. Similarly, the network should be installed with programs that help in accountability processes. These programs should help th e system administrator to know who are logged in, and what they are doing. The system administrator should advise the management accordingly in order to ensure that they adapt appropriate security policies that will enhance the security of the system. Appropriate administration procedures will greatly boost the security of a network. The security measures adapted should offer assurance that they are effective in meeting their objective. One sure method to verify their effectiveness is by the proactive detection of viruses as well as intrusions. Reference List Curtin, M. (1997).Introduction to Network Security. Web. EcommercePrgrgram.com. E-business – Privacy and Security. Web. Raggo, M. (2003). Hacking and Network Defense. Web. This term paper on Network Securities Management was written and submitted by user Helen Lamb to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.