Saturday, January 18, 2020

The Background Of Metabolic Syndrome Health And Social Care Essay

Harmonizing to recent worldwide estimations, 1.7 billion people are classified as either corpulence or corpulent, more than 1 billion have high blood pressure, and more than 500 million have either diabetes or the pre-diabetes position, impaired glucose tolerance ( IGT ) [ Hossain et Al. 2007 ] . Metabolic syndrome ( MetS ) A is a complex and multivariate disease thought to be when a figure ofA coincident metabolicA abnormalcies occur in the same person with a frequence higher than it could be expected by opportunity, foremost coined â€Å" syndrome Ten † in 1988 by ( Reaven 1998 ) . The first formal definition of the MetS was put away in 1998 by the World Health Organization ( WHO ) . The International Diabetes Federation ( IDF ) described a syndrome as â€Å" a recognizable composite of symptoms and physical or biochemical findings for which a direct cause is non understoodaˆÂ ¦the constituents coexist more often than would be expected by opportunity entirely. When causal mechanisms are identified, the syndrome becomes a disease. † MetS is so a composite of complecting hazard factors for cardiovascular disease ( CVD ) , diabetes and shot. The bunch of hazard factors encompasses dysglycemia ( unnatural glucose degrees ) , raised blood force per unit area ( high blood pressure ) , hyperglycemia, elevated triglyceride degrees, low high-density lipoprotein cholesterin degrees, and cardinal adiposeness tissue degrees ( fleshiness ) . Metabolic syndrome has been assigned its ain ICD-9 diagnostic codification: 277.7, but there is ongoing contention about whether metabolic syndrome is a homogenous upset or disease, and whether it merits acknowledgment as a syndrome ( Huang 2009 ) . MetS has many factors involved ; most surveies agree that the underlying pathology of abnormalcies seems to be related to insulin opposition ( IR ) and fleshiness. The job and confusion comes from the differences in standards for the diagnosing of MetS by the ( WHO, 1998 ) , the European Group for survey on insulin Resistance ( EGIR ) in 1999, the National Cholesterol Education Program Adult Treatment Panel III ( NCEP-ATP III ) in 2001, the American Heart Association/National Heart, Lung and Blood Institute and the ( IDF ) 2005. Regardless of which standard is used for diagnosing, all major bureaus agree to an extent that the cardinal factors include fleshiness and waist perimeter ( WC ) , insulin opposition, dyslipidemia, and high blood pressure ( Alberti et al 2006 ) Multiple diagnostic standards from several beginnings have given rise to confusion and incompatibilities. Because of the different threshold degrees and how they they are combined to name, there may be fluctuations within in the same population at analysis of informations, taking to skewed hazard schemes and the prioritization of patients and their preventative intervention. One individual may be diagnosed and intervention on the footing of one set of standards, but so be ineligible utilizing another. The purpose of this instance survey is to place and foregrounding the most relevant and up to day of the month facets of the epidemiology, pathophysiology, experimental theoretical accounts, and related clinical and population informations in relation to MetS. The World Health Organization ( WHO ) estimates that more than 1 billion people are overweight globally, and if the current tendency continues, that figure will increase to 1.5 billion by 20154. It is estimated that over 1.7 billion individuals worldwide are fleshy, more than 300 million of whom are clinically corpulent. This addition is a multifactor with deficiency of exercising, aging, familial sensitivity and hormonal alterations being cited. This addition in fleshiness and fleshy people is associated with the addition in prevalence of Mets and diabetes ( Wild et al 2011 ) . Abdominal fleshiness is linked with the opposition effects of insulin on peripheral glucose and fatty acid metamorphosis, which can consequences in type 2 diabetes mellitus. With fleshiness comes Insulin opposition and that can take to hyperinsulinemia, hyperglycaemia, and increased adipocyte cytokines that contribute to endothelial disfunction, altered lipid profile, high blood pressure, and systemic redness. This procedure of harm can advance the development of atherosclerotic cardiovascular disease ( CVD ) . Therefore Mets has several possible aetiologic classs, upsets of adipose tissue ; insulin opposition ; and the grouping of independent factors of hepatic, vascular, and immunologic beginning involved in different constituents of the MetS. When the single constituents of Mets cluster together and this is associated with both the addition hazard of Diabetes and CVD ( Wild et al 2011 ) With many hazard factors for CVD included within the MetS assorted definition and standard ‘s, the purpose is provide utile early diagnosing of MetS that in bend identifies persons with cardinal fleshiness and cardio-metabolic hazard factors. ( Wild et Al 2011 ) . These persons are at increased hazard of type 2 diabetes, CVD, non-alcoholic fatso liver disease ( NAFLD ) and sleep apnoeas. These hazard factors like abdominal fat degrees can frequently be left untreated as separately they do non justify intercession. Not all fleshy people are at high hazard degrees of vascular disease, type 2 diabetes and NADFL. The Mets definition is aimed at placing the subgroups of these fleshy and corpulent persons that are at a high hazard of the effects of inordinate abdominal fat and Insulin Resistance ( IR ) . As mentioned above, several organisations have established their ain diagnostic standards for MetS, NCEP ATP III, AHA/ NHLBI, WHO, IDF, EGIR, and ACE. With In there diagnostic standards of the MetS, different combinations of predating pathological factors are required, including: Iridium, dysglycemia, low HDL-C, hypertriglyceridemia, fleshiness or increased waist perimeter, high blood pressure, impaired glucose tolerance ( IGT ) or DM, microalbuminuria and hyperinsulinemia. ( See Table 1 ) . The prevalence of the MetS is increasing throughout the universe ( who ) the many different estimations are nevertheless dependent on the definition used and the topic ( e.g. , sex, age, race, and ethnicity ) . The WHO and NCEP: ATPIII definitions are similar for fleshiness, high blood pressure, and dyslipidemia. The inclusion of requirements, IR, IGT, and type 2 diabetes of the WHO definition are more tapered. The estimations reached by the assorted definitions in a individual population are frequently really similar across surveies ; the rates are variable in subpopulations with MetS and besides between cultural groups. Therefore the planetary prevalence estimations of MetS vary and are unsure. Statistically, the incidence of metabolic syndrome is reported from assorted beginnings over the decennary is variable between the populations. It was estimated that 20-30 % European population is affected ( Vosatkova et al 2012 ) . The consequences of a wide-spread epidemiological survey carried out among the US population show metabolic syndrome prevalence of 23.9 % as defined by the standards of the National Cholesterol Education Program Adult Treatment Panel III and 25.1 % harmonizing to WHO standards ( Ford and Giles, 2003 ) . Most surveies used the NCEP-ATP III definition and showed an elevated prevalence of MS in different parts of the universe. Harmonizing to ( NHANES ) 2003-2006, about 34 % of people studied met the NCEP: ATPIII revised standards for MetS. ( Appendix Table 2 ) A reappraisal of current prevalence tendencies and statistics was carried out in by ( Marjani 2012 ) identified the following planetary incidence and epidemiological findings from assorted equal reviewed beginnings: The undermentioned information is taken from ( Marjani 2012 ) : The prevalence of MetS was found to increase with age with 20 % of males and 16 % of females under 40 old ages of age, 41 % of males and 37 % of females between 40-59 old ages, and 52 % of males and 54 % of females 60 old ages and over by and large. Incidence of metabolic syndrome additions as age progresses. In a survey in Turkey, the prevalence of the metabolic syndrome was 15.3 % , 23.1 % , 28.0 % , 26.0 % , and 20.5 % among people aged from 30 to 39, 40 to 49, 50 to 59, 60 to 69, 70 to 79 and a†°? 80 old ages old, severally. Study of Ford showed that the prevalence in the US was16.5 % and 46.4 % for males aged 20 to 60, and 19.1 % to 56.0 % , for females with additions in MetS prevalence with increased age [ 19 ] . World Health organisation predicts the prevalence of fleshiness to be 4.8 % in developed states, 17.1 % in developing and 20 % in less developed. Cardiovascular disease is one of the chief grounds of decease among adult females in the universe. .women aged more than 55 have a higher incidence of cardiovascular disease than younger adult females. In several surveies, the incidences of metabolic syndrome among postmenopausal adult females were found to be increased in the universe. The prevalence of metabolic syndrome ( utilizing the WHO definition ) in Ireland was 21 % . The prevalence was higher in males ( 24.6 % ) than in females ( 17.8 % ) . The Botnia survey † ( utilizing the WHO definition ) found the prevalence in Finland was 84 % and 78 % in male and female topics with type-2 diabetes, severally. In the United States, the prevalence of metabolic syndrome was 21.8 % utilizing the ATP III definition. Mexican Americans had the highest prevalence of metabolic syndrome ( 31.9 % ) . The prevalence was similar for male ( 24.0 % ) and female ( 23.4 % ) subjects. The prevalence in Isfahan ( Iran ) was 65.0 % with higher rate in females than males ( 71.7 % female and 55.8 % male ) . The prevalence in Karachi ( Pakistan ) was 79.7 % in type 2 diabetics, ( 45.5 % females and 34.3 % males ) . The overall prevalence of metabolic syndrome in type 2 diabetics in Japan was 168 ( 26.37 % ) out of 637 type 2 diabetic patients. The prevalence was higher in males ( 45.9 % ) than females ( 28.0 % ) . A survey done in Korean estimates the overall prevalence was 32.6 % . The prevalence was found to be 46.9 % and 65.1 % among males and females severally. The overall prevalence among Saudis with type 2 diabetes was 22.64 % ( 19.49 % male, 25.17 % female ) . The prevalence of metabolic syndrome in type 2 diabetic patients is higher in females ( 53.27 % ) than males ( 48.71 % ) , and that the prevalence of metabolic syndrome in Gorgan is appreciably higher compared with that in some other states. One of the latest and up to day of the month documents by ( Craig and Turner 2012 ) made a systematic reappraisal of 85 surveies. They found the average prevalence of MetS in whole populations was 3.3 % , in fleshy kids was 11.9 % , and in corpulent populations was 29.2 % . Although prevalence rates are varied throughout the universe it is clear that metabolic syndrome has developed into epidemic degrees and farther research is needed as the mechanisms of MetS are non to the full known ( Cornier et al 2008 ) . As described above, the general hypothesis to depict the pathophysiology of MetS is insulin opposition and abdominal fleshiness ( Cornier et al 2008 ) . Visceral fleshiness is the chief cause of the metabolic syndrome, and is associated with development of high blood pressure in the metabolic syndrome via a assortment of pathwaysA ( Figure1 ) . Metabolic Syndrome and its related upsets Insulin opposition Cardinal fleshiness Glucose intolerance Dyslipidemia with elevated triglycerides Low HDL-cholesterol Microalbuminuria Predominance of little heavy LDL-cholesterol atoms High blood pressure Endothelial disfunction Oxidative emphasis Inflammation Related upsets of polycystic ovarian syndrome, fatty liver disease ( NASH ) , and urarthritis A major subscriber is an surfeit of go arounding fatty acids, released from an expanded abdominal adipose tissue. Free Fatty Acids ( FFA ) cut down insulin sensitiveness in musculus by suppressing insulin-mediated glucose consumption. Increased degree of go arounding glucose additions pancreatic insulin secernment ensuing in hyperinsulinemia. In the liver, FFA increase the production of glucose, triglycerides and secernment of really low denseness lipoproteins ( VLDL ) . The effect is the decrease in glucose transmutation to glycogen and increased lipid accretion in triglyceride ( TG ) . Insulin is an of import antilipolytic endocrine. In the instance of insulin opposition, the increased sum of lipolysis of stored triacylglycerol molecules in adipose tissue produces more fatty acids, which could farther suppress the antilipolytic consequence of insulin, making extra lipolysis and more FFA. This build up of FFA from increased the volume of adipocytes lead to IR through the look of assorted proinflammatory cytokines. These cytokines, tumour mortification factor ( TNF ) -I ± , interleukin ( IL ) -1 and IL-6 are increased in adipose tissue but the production of anti-inflammatory adipokine adiponectin is reduced, this look is linked to systemic redness. The instability of pro- and anti-inflammatory adipokines, induces insulin opposition by impairing the insulin signalling procedure. ( acquire ref ) . This addition in cytokines promote lipolysis and increase Free fatty acids ( FFAs ) so causes endothelial disfunction and increased coronary artery disease hazard ( Wieser et al 2013 ) See ( Appendix Figure 2 ) Inflammatory cytokines have been reported in the development of high blood pressure. ( Grundy 2003 ) suggests a important association among redness, high blood pressure, and the metabolic syndrome. TNF-I ± stimulates the production of endothelin-1 and angiotensinogen. interleukin-6 ( IL-6 ) is a multifunctional cytokine which mediates inflammatory responses and stimulates the cardinal nervous system and sympathetic nervous system. This mediates an addition in plasma angiotensinogen and angiotonin II, and hence high blood pressure. ( Sarafidis and Bakris 2007 ) show that IR increases leptin and NEFA degrees thereby augmenting sympathetic nervous activation. The survey besides showed NEFA to raise blood force per unit area, bosom rate, and I ±1-adrenoceptor vasoreactivity, while cut downing baroreflex sensitiveness, endothelium-dependent vasodilatation, and vascular conformity. Insulin has anti-natriuretic and stimulates nephritic Na re-absorption. Insulin opposition and the ensuing hyperinsulinemia induce blood force per unit area lift by the activation of sympathetic nervous system and renin-angiotensin-aldosterone system ( RAAS ) causes sodium keeping and volume enlargement, endothelial disfunction and change in nephritic map. The subsequent hyperinsulinemia promotes the addition in sodium soaking up by the kidneys, which can impair force per unit area natriuresis, thereby doing high blood pressure in salt-sensitive persons. Hyperinsulinemia increases the sympathetic activity, taking to arterial high blood pressure. 1475-2891-7-10-1 ( 1 ) .jpg ( Figure 2 ) IR proposed tracts. YanaiA et al.A Nutrition JournalA 2008A 7:10 doi:10.1186/1475-2891-7-10 Insulin opposition is characterized by pathway-specific damage in phosphatidylinositol 3-kinase signalling. In the endothelium, this may do an instability between the production of azotic oxide and secernment of endothelin-1, taking to decreased blood flow. The accretion of splanchnic fat elevates the activity in the renin-angiotensin system, due to an increased production of angiotensinogen, which accordingly favours arterial high blood pressure. FFAs contribute to endothelial disfunction by a combination of lessened PI3K-Akt signalling, increased oxidative emphasis. And increased ET-1 production. Insulin opposition and splanchnic fleshiness are associated with atherogenic dyslipidemia ( Semenkovich, 2006 ) . Atherogenic dyslipidemia can develop from increased ( FFAs ) . They are known to assist the production of the lipoprotein ( apoB ) within ( VLDL ) atoms, ensuing in more VLDL production. Insulin usually breaks down apoB through PI3K-dependent tracts, therefore insulin opposition additions VLDL production. Hypertriglyceridemia in insulin opposition is the consequence of both an addition in VLDL production and a lessening in VLDL clearance. VLDL is metabolized to remnant lipoproteins and little dense LDL, both of which can advance atheroma formation. Insulin opposition besides causes endothelial disfunction by diminishing Akt kinase activity, ensuing in lessened eNOS phosphorylation and activity. Phosphorylation of eNOS is required for the hemodynamic actions of insulin, this consequences in lessened blood flow to skeletal musculus and endothelial disfunction that so worsens insulin opposition. The metabolic consequences of drawn-out insulin opposition produce Glucose intolerance. AS mentioned earlier, glucose consumption in adipocytes and skeletal musculus cells is decreased and can no longer be absorbed by the cells but remains in the blood, but hepatic glucose production is increased. Therefore an overrun insulin by beta cells to keep plasma glucose homeostasis. Once the pancreas is no longer able to bring forth adequate insulin to get the better of the insulin opposition, impaired glucose tolerance ( IGT ) develops. Harmonizing to the World Health Organization, IGT is a pre diabetic status in which serum glucose concentrations range between 140 and 200A mg/dL 2 H after a 75A g glucose burden ( WHO ) Persons with IGT have extended loss of first stage insulin secernment and a decreased 2nd stage, and persons with type 2 diabetes have small first stage insulin release at all. ( Mackie and Zafari 2006 ) Postprandial hyperglycaemia appears to bring forth oxidative emphasis, addition protein glycation, addition hypercoagulability, and damage endothelial cells, all of which promote coronary artery disease. Hyperglycemia is a well-known hazard factor for micro and macrovascular disease ( HutchesonA andA Rocic 2012 ) and is associated with increased morbidity and mortality via means an increased hazard of CVD and type 2 diabetes among others. Metabolic syndrome is associated with increased oxidative emphasis. Recent documents suggest that some of the implicit in pathologies contribute more entire oxidative emphasis than others ( HutchesonA andA Rocic 2012 ) ( huge grounds to see, more research needed ) Adipose tissue has been shown to lend to the production of reactive O species and proinflammatory cytokines, including TNF-I ± , IL-6, and IL-18. Previous surveies showing that fleshiness and MetS are independently associated with increased oxidative emphasis and inflammatory load. The presence of MetS exacerbates oxidative and inflammatory emphasis in corpulent grownups with higher systemic markers of oxidative emphasis and low-grade chronic redness in corpulent grownups with MetS compared with corpulent grownups free of MetS ( Guilder 2006 ) . Cross-sectional informations from 2,002 non-diabetic topics of the community-based Framingham Offspring Study has shown that systemic oxidative emphasis is associated with insulin opposition ( Meigs 2007 ) . There are besides negative effects of inordinate and deficient slumber on metabolic syndrome prevalence are described in ( Vosatkova et al 2012 ) . Despite a familial background of the upset, its outgrowth and development are strongly influenced by life manner. Therefore, intervention metabolic syndromeA by and large focuses onA diet and exercising. regularA physical activityA and a diet with aA restricted Calories intake, that is high inA whole grains, A monounsaturated fatsA and works nutrients ( such as theA Mediterranean diet ( Kastorini 2011 ) . The medical direction of metabolic syndrome includes CVD hazard, Blood force per unit area control WITH ( angiotension-converting enzyme ( ACE ) A inhibitors AND ORA angiotension receptor blockersA ( ARBs ) , drug therapy for Cholesterol withA lipid-lowering medicines ) , preventive Diabetes intervention and Exercise rehabilitation plans to help loss and mobility, In decision prevalence of metabolic syndrome is increasing steadily across assorted populations increasing hazards CVD and Diabetes related co-morbidities. Metabolic syndrome includes insulin opposition, splanchnic adiposeness, atherogenic dyslipidemia and endothelial disfunction and their ain related effects. The pathophysiological mechanisms of Mets are all interconnected. With changing planetary statistics and multiple universe definitions and standards a comprehensive cosmopolitan definition of the metabolic syndrome is needed for elucidation. The NCEP ATP III definition uses straightforward standards that are measured readily AND easiest to use clinically and epidemiologically. Metabolic syndrome and its different definitions do place the pathophysiological mechanisms that underline the procedure Insulin opposition and cardinal fleshiness are clearly cardinal constituents of the disease as they both cause glucose intolerance and dysplycemia. Metabolic syndrome is complex and there is new research on traveling. The best signifier of bar seem to be an easy hole for most MetS persons, lifestyle alterations and weightless.

Friday, January 10, 2020

Who is Concerned About Custom Research Paper Writing Service and Why You Should be Listening to Them

Who is Concerned About Custom Research Paper Writing Service and Why You Should be Listening to Them The Argument About Custom Research Paper Writing Service It is not overly technical if you understand how to highlight text and click a mouse, you may use Medium. You will get a top quality paper that's totally free from all punctuation, grammar and spelling errors in addition to being 100% plagiarism free. If you have many studying to finish, you can leave all them to our writers. For instance, the writer can finish part of your paper and send it to you. Our writers understand how to do your paper in the proper way. In reality, our experienced writers will create a paper that will force you to grow to be a standard bearer in your class. Custom Research Paper Writing Service and Custom Research Paper Writing Service - The Perfect Combination All you need to perform is to compose the original paper from outline which you've finished. A fast read of all of the popular researc h papers in your domain would give a good idea of how abstract needs to be structured. There are lots of reasons why it is better to pay for research papers. Hearsay, Deception and Custom Research Paper Writing Service High school students who require university admissions custom to choose their applications. Students are interested in a best spot to order training. Although they know our course as Library Science, what we teach involves a lot more than just the library. If they have to write the college paper, it is significant to offer the balanced outlook of what they have discovered. Custom Research Paper Writing Service - Is it a Scam? The introduction is the upcoming important sector of the Spanish custom made research papers. Custom written essays are just a few clicks away from you! Customized essays and custom research papers have gotten imperative. The Custom Research Paper Writing Service Cover Up In truth, it's one of my favourite methods to help me conquer life. Since research work demands a lot of hard work which everyone can't devote so people would rather deal with us. Getting hopeless with assigned research task, take help of competent professionals that are well acquainted with writing specifics to acquire the maximum mark. Give us the opportunity to offer you the ideal research paper help and you'll forget about your writing problems. The 5-Minute Rule for Custom Research Paper Writing Service Research paper writing is a process which comprises a great deal of necessary actions to take. The effect of research follow vary. When you would like to purchase research paperwork from Essays-Writing-For-Me. However you are feeling about writing research papers, there's always something you'll be able to learn how to produce the process more efficient. Custom Research Paper Writing Service Explained Moreover, if you get a poorly written paper that you're unhappy about, we'll gladly process a complete refund. When you use our c ustomized research paper writing service you receive your paper written how you want it. Several of the pieces of paper is presented across the most appropriate moment. Every one of the pieces of paper is inspected before the supply. The Secret to Custom Research Paper Writing Service Writing a synopsis may sound simple, but it's in fact the opposite. Writing a dissertation is an intimidating endeavor for anybody. You ought to choose a dependable service of assignment writing to finish your thesis paper. Writing a research paper is a stressful endeavor and the writer to take care of a good deal of tensions. Lies You've Been Told About Custom Research Paper Writing Service Deciding upon a proper agency holding relevant experience helps a great deal. Our homework help service is made to fulfill your demands, regardless of what the challenge. What is hard to find is a business that could supply you with quality work. One of the chief problems plaguing the research writing in dustry is that it's flooded by very low excellent providers, and we're attempting to rectify that age-old issue. If you struggle with writing your research paper and search for sites where you are able to buy high-quality model essays and term papers, there isn't any need to appear further because at our customized paper support, you can get all you need to develop into a thriving student which gets high grades at college and has a lot of spare time for hobbies and other crucial commitments. In pretty much every semester, young individuals will need to take writing their scholastic newspaper. Nevertheless you've got to demonstrate your idea of the prevailing booklets, you have to policy judiciously. It's very convenient, as our service is utilized by students from other nations and in different time zones. Our custom writing service team is keeps current with the latest curriculum to be certain. Get precisely what you needed! The Tried and True Method for Custom Research Pa per Writing Service in Step by Step Detail A number of the top custom dissertation writing companies will also offer you lucrative discounts to their customers. Fortunately, modern technologies allow every student get affordable expert help online and seek the services of a seasoned writer on a dependable customized research paper writing service. If you have chosen to acquire your research accomplished by essayclerk, you're guaranteed of receiving the quickest and highest rated online writing service. You will receive not just the fastest possible aid, but the research also. If you're not sure of where to obtain a research paper from, I'll counsel you to look at the websites of review websites that offer unbiased criticism of the services they give. Make certain you check the research paper for plagiarism utilizing special software or internet websites. It is possible to purchase custom research papers at discounted prices without needing to be concerned about confidentiali ty or originality. Our customized research papers for sale includes every particular information that's required and will be done dependent on your instructions.

Thursday, January 2, 2020

The Convention On International Trade Of Endangered...

Introduction to the international agreement. †¨ The Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) was put in place on July 1, 1975 to address the need to protect species on a global level by controlling international trade. The aim of CITES is to protect species that are considered endangered (Couzens, 2013). CITES uses three Appendices to evaluate which level the endangered species should be put in. Appendix I includes species that are threatened by extinction due to trading (Couzens, 2013). It bans any trading of these species related to commercial purposes and any trading that could be harmful to their survival (Wiersema, 2013; CITES). Furthermore, any export, re-export and import permit must be needed for any accepted import, export or re-exported purposes (CITES). Appendix II includes species that may not be perceived near extinction, but regulations regarding trade are put in place to control and regulate it to prevent any endangerment (Wiersema, 2013; Couzens, 2013; CITES). Additionally, any live animal or plant must be cared for with minimal risk to injury, health and treatment during the trading process (CITES). Any export, re-export and import permit must be needed for trading purposes (CITES) . Lastly, Appendix III according to CITES is controlling trading of species to prevent and/or diminish any likelihood of exploitation (Couzens, 2013; CITES). Any export, re-export and import permits are needed relating to tradingShow MoreRelatedAnnotated Bibliography On Kenya Trafficking Legislation2330 Words   |  10 PagesKenya Trafficking Legislation 1. Introduction and CITES: Convention in International Trade in Endangered Species In 1975, the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) came into force. Today, there are 179 countries who are â€Å"member parties† to the Convention. Each â€Å"member party† has some form of domestic legislation that implements CITES, thereby enumerating what is considered illegal trafficking in wildlife in that country and indicating what prosecutorialRead MoreIllegal Animal Trade Essay890 Words   |  4 Pagesprofit. In the past 400 years, 350 species of animals have gone extinct (Ryder, 214). Illegal trade generates billions of dollars and is therefore highly popular. There have been many regulations placed upon this trading. Some have been successful and others have not. Governments across the world have placed regulations on this illegal trade and treatment of animals, but it is still an issue. To what extent have governments been successful in stemming illegal animal trade? People smuggle animals for manyRead MoreUnited States On International Trade1223 Words   |  5 PagesThe CITES is an international agreement that entered in force the 1st of July 1975. It is designed to prevent any threat, caused by international trade, towards the survival of specimens of wild animals and plants. The global scale of the trading network nowadays imposes this convention to have an international scope, thus to include 181 parties protecting more than 35,000 species This treaty has 2 main purposes: it aims to improve the working of the Convention, also, ensure that CITES policy developmentsRead MoreEssay on Biodiversity7414 Words   |  30 Pagesnot only the ecosystem level, but for specific species and genetic material as well. Research has shown the importance of every organism and their role in the global ecosystem, and legislation has gradually matured to protect not only species which may become endangered, but the habitats they need to survive as well. Growing consciousness surrounding environmental issues has enabled these protections to be implemented through various international agreements as well as through the adoption intoRead MoreEssay on Protecting Biological Diversity6352 Words   |  26 PagesBiological Diversity Biodiversity is a major concern in international and national politics. How can we manage our environment and preserve what we have before all is lost and exhausted? `This question is a main concern for present and future generations. In its simplest terms, biological diversity is the variety of life and its processes, and it includes the variety of living organisms, the genetic differences among them, and the communities and ecosystems in which they occurRead MoreThe United Nations Environment Assembly1325 Words   |  6 PagesAssembly The topics before the United Nations Environment Assembly (UNEA) are: Combating Illegal Trade in Wildlife; Implementation of the Paris Agreement; and Sustainable Use of the Oceans, Seas, and Marine Resources. The United States of America advocates for responsible stewardship of the environment and will prioritize the protection of clean air and water at the upcoming conference. I. Combating Illegal Trade in Wildlife Studies suggest that fewer than 30,000 rhinoceros now reside in Africa and AsiaRead MoreZoos And Animal Purposes Of Zoos1727 Words   |  7 PagesZoos and similar facilities that publicly exhibit wild animals have existed throughout history, beginning as far back as Ancient Egypt. In the past, animals were kept in small cages and used by rulers to display their wealth and satisfy the curiosity and fascination surrounding wild creatures. Society’s views about zoos have changed. No longer are people willing to view animals pacing nervously back and forth behind bars. Instead, the public has begun to express concern for the welfare of the animalsRead MoreThe Whaling Of Whaling Nations1462 Words   |  6 Pages1. What is the IWC? In 1946, whaling nations established the International Convention for the Regulation of Whaling in order to prohibit the killing of certain endangered whale species, set quotas and minimum size for whales caught commercially and regulate the whaling sea sons. This convention was not an environmental agreement, but a club of whaling nations to regulate the practice of catching whales. The International Whaling Commission, (IWC), was the decision making body in charge of the regimeRead MoreShark Finning Should Stop The Sharks1754 Words   |  8 Pagespopulations may never recover from the damage we have already inflicted.†-Seashepherd.org (no specific author). This is a huge problem. As I said, they are important to the ocean’s environments, which will as I said cause a lot of damage to other species of marine life. Since we have already killed well over 100 million, and because of how long it takes to reproduce, it will take them somewhere over 100 years to gain at least  ¼ of their past population. That is how much of a dent we have made inRead MoreWorld Organization For Animal Health Organizations828 Words   |  4 PagesForeign animal disease, or transboundary animal diseases, has become a concern worldwide as i nternational trades increase and foreign investment restrictions loosen in the recent decades. Transboundary animal diseases, defined as â€Å"those that are of significant economic, trade and/or food security importance for a considerable number of countries; which can easily spread to other countries and reach epidemic proportions; and where control/management, including exclusion, requires cooperation between

Tuesday, December 24, 2019

The Bechdel Test And The Duvernay Test, White Men And...

As evidenced by the poignancy of the Bechdel Test and the DuVernay Test, white men and their stories dominate film. The problem, of course, that arises from such a whitewashed male perspective is that the valid and worthwhile stories of other groups of people are pushed aside, often as a means of plot progression for white male protagonists. Add mental illness to the mix. On top of the silenced forced upon marginalized groups simply for not being the most privileged, the people in these groups, when afflicted by mental illness, fall victim to harsh stereotypes that further eliminate the uniqueness of their stories. Of these groups, women are of particular interest because they are not left out of cinema completely, just enough to be exemplars of a group whose voice muted by stereotypes such as that of the crazy girlfriend, the fragile wallflower, and, most importantly for the purposes of this paper, the beautiful tragedy. It is a common plotline in the mental ill woman-concerned medi a to start with a female character noted for her beauty, and often her innocence but not always, who nose dives into mental illness. Most importantly and, more often than not, most differently from mentally ill characters that are white and male, the craze becomes so overwhelming that the female character has to be forcibly silenced in the end, either by death or by being locked away. The same is true for other characters of alternate minority groups, such as Anthony in Dead Presidents, but

Monday, December 16, 2019

An Introduction to the Im Profession and Ethics Paper Free Essays

string(39) " take control of an affected computer\." De La Salle University – Manila An Introduction to the IM Profession and Ethics Paper Presented to The Faculty of the College of Computer Studies De La University – Manila In Partial Fulfillment Of the Requirements for the Degree of Bachelor of Science of Information Systems By: Changcoco, Amos Dimla, Ysabel Nicole Ramchand, Pavan Tanchuling, Bianca Denise Tibayan, Jan Michael 1. 0 COMPUTER AND INTERNET CRIME 1. 1 Types of Exploits 1. We will write a custom essay sample on An Introduction to the Im Profession and Ethics Paper or any similar topic only for you Order Now 1. 1Virus It is a malicious code that is attached to a file or executable program that can hack the files of the victim’s computer and reformat, delete or modify the files. The virus is executed only when the file that contains the virus is opened or if the program with the virus is executed as well. It leaves infections as it travels from one computer to another. The spread of the virus relies on the users whenever users would use removable media devices, download or through e-mails. An example of a computer virus would be the Pikachu virus which was the first computer virus directed to children. It was said that the virus started on June 28, 2000 from Asia or the Pacific Ocean region. The virus was an email titled, â€Å"Pikachu Pokemon† with the message, â€Å"Pikachu is your friend. † The email contained the image of the cartoon character, ‘Pikachu’ from the TV series Pokemon, with the message, â€Å"Between millions of people around the world I found you. Don’t forget to remember this day every time MY FRIEND. † The Pikachu virus infected only a few companies in the United States through Microsoft Outlook email attachments or through Microsoft’s Internet Explorer browser. The reason why only a few companies were harmed and why the virus was not as viral is that the virus was not coded properly and would ask the user if the virus can delete the files in the user. 1. 1. 2Worm A worm is a malicious code that is used for bringing down the computer system. A worm does not infect files, however, it monopolies the computer’s CPU and operating system and is capable of deleting data and programs. It infects a computer by finding vulnerability in an application or operating system. A worm is self-replicating and uses a network to replicate itself to other computer. It does not rely on human interaction for spreading to other computers. An example would be the Morris Worm or also known as the Great Worm. Created by a Cornell University student named Robert Tappan Morris in the year 1968, the Morris Worm consisted of 99 lines of code. Robert Morris wanted to know how big the Internet was and made the worm to find the answer. It is noted that the creator did not have malicious intent in making this worm; however, the worm infected immense amounts of stability problems that made many systems unusable. The damage was over 6,000 infected UNIX machines which cost between $10,000,000 and $100,000,000. This example is an ethical dilemma because the creator did not have evil intentions in making the worm but did have bad effects on most people in America. This dilemma would be ethical based on the psychological egoism theory because Robert Morris acted on his selfish motive whether he should or not, which made him moral. Based on the hedonism theory, it was ethical of Morris because he was only doing his duty without knowing that his actions would bring upon negative effects. 1. 1. 3Trojan Horse Named after the Trojan horse from Troy which was used to infiltrate the enemy’s territory through a disguise, the Trojan horse is disguised as something else (such as a program or file) but is actually a malicious code or may contain malicious code. Similar to viruses, a Trojan horse is executed when the file with the virus is opened or the program with the malicious code is executed also. A Trojan horse can do from light damages such as changing the desktop and the like, to threatening damage, such as deleting files, stealing data, or activating and spreading other malware, to the victim’s software. Trojan horses are also used to create a ‘back door’ in the operating system so that the hackers can access the system. However, the Trojan horse cannot duplicate itself nor it can self-replicate. It would need the user to spread to other computers. An example of a Trojan horse would be from the pirated version of Apple’s suite of software, iWork. iServices was the Trojan horse part of the pirated version of iWork, which would signal the hackers that the Mac is infected and the hacker has access to the system. This is an ethical dilemma because the people who buy pirated software such as the iWork do not know that there is a Trojan horse in the software. It was unethical of the sellers to place a Trojan horse in the software without the consent of their customers’ because deontology theory states that it was not the duty of the vendors to hack into the systems of their customers in the first place. Another reason why it was unethical because of the theory of altruism because the interest of others was not thought about since many people will suffer due to the actions of the vendors. This is another reason why it is unethical, because of the utilitarianism, which is consequences-based. Lastly, the social contract theory states that the actions of the vendors were unethical because it is against the law to hack and infiltrate private property. Logic bomb is a type of Trojan horse that is triggered only by a series of specific events such as a specific sequence of keystrokes or a change in a file. 1. 1. 4Botnets A botnet is a network of infected computers that are controlled by bots. Named after the word ‘robot’, a bot is a type of malware that allows an attacker to take control of an affected computer. You read "An Introduction to the Im Profession and Ethics Paper" in category "Essay examples" Criminal can take over the controlled computer such as sending out spam, spread viruses, attack computer and can even cause crime and fraud, without the owner knowing it. Bots are also called computer zombie because the computer has no control over its actions since hackers are in charge of its actions. 1. 1. 5Distributed Denial-Of-Service Attacks (DDoS Attacks) A Distributed Denial-of-Service Attack is when a malicious hacker controls computers through the Internet. It is an attempt in preventing the computer owner to use network resource or machine. It is composed of one or more people trying to disenable a certain host from being connected to the Internet. 1. 1. 6Rootkits The name rootkit comes from the two words ‘root’, which pertains to the point it attacks, which would be the administrator or the source or the root, and ‘kit’ because of the set of programs. A rootkit is a set of programs that enables its user to gain administrator level access to a computer without the user’s consent or knowledge. The owner of the rootkit is capable of executing files and changing system configurations on the target machine, as well as accessing log files or monitoring activity to covertly spy on the user’s computer usage. It is hard to detect if a computer system has a rootkit malware. 1. 1. 7Spam E-mail spam is when e-mail systems send unsolicited e-mail to large numbers of people. Spam mostly comes off as cheap advertisements of strange products such as pornography, ‘get-rich-quick’ schemes and the like. Spam can also be used to deliver harmful worms or other malware. . 1. 8Phishing Phishing is an attempt to steal personal identity data by tricking users into entering information on a counterfeit Web site. 1. 2Types of Perpetrators 1. 2. 1Hackers and Crackers Hackers are people who test the limits of the system, find the â€Å"holes†, and check which data they could access. The knowledge that they get is actually obtainable in various media, usually the internet. They are not usually considered bad; but due to many of them who used such knowledge to cause harm to systems, the term became negative. A more appropriate term for these kinds of people is actually called crackers. 1. 2. 2 Malicious Insiders Malicious insiders are people who obtain goods, services, or property through deception or trickery, also known as fraud. In other words they lie to gain. 1. 2. 3 Industrial Spies Industrial spies are people who illegally obtain information from competitors for the benefit of their sponsor. The act is called industrial espionage and the opposite which is to obtain information legally is called competitive intelligence. In 1993, Opel accused the rival Volkswagen of industrial espionage after the former’s chief of production and seven executives moved to the latter company due to missing documents. (Julian, 2011) 1. 2. 4 Cybercriminals These perpetrators hack to the company’s system and will do anything with the information just to gain money. One of the most famous hackers of the world is Albert Gonzalez, who used hacking to steal and resell millions of card and ATM numbers in a span of three years. He did this by attacking many systems which would eventually give him the information needed to steal the card numbers. Verini, 2010) Albert Gonzalez is in ethical dilemma because he used his skills to steal the information for money. Based on the deontological theory, it’s unethical because it is not the duty of hackers to steal information. Based on hedonism under the utilitarian theory, it is ethical because he found pleasure from the act. Social contract theory, however, makes th is act unethical, and so does virtue theory. 1. 2. 5 Hacktivists and Cyberterrorists Hacktivists, combining the words â€Å"hacking† and â€Å"activist†, are people who hack to promote political ideology. Cyberterrorists attack to get the attention of the government as part of their political objectives. Anonymous is one of the most famous hacktivist groups due to their appearance on various media in which members appear wearing the Guy Fawkes mask. Their advocacy is to oppose the Internet censorship and surveillance, government corruption and homophobia. This is why they attacked several government sites. (Katich, 2013) The ethical dilemma the group faces is that they use hacking skills to infiltrate the systems yet they belong to the side of the people as their objective is to make the government hear their voice. This is ethical based on deontology because it is their duty to make the government listen to them their voice. This is also ethical based on the altruistic approach as more will benefit from their act. However, social contract theory states that it is unethical since this act has violated the law. 1. 3Laws for Prosecuting Computer Attacks 1. 3. 1Electronic Commerce Act of 2000 (RA 8792) 1. 3. 1. 1E-Commerce in Society The process of buying and selling goods electronically by consumers and from company to company through computerized business transactions. This act has the purpose of protecting those who pursue business in electronic means through multiple communication networks through the Internet. 1. 3. 1. 2 Elements in the Law Electronic data messages – these are generally the information that is in every transaction of the business. Electronic document – these are the type of information specified with text, symbols, or other modes of written expression yet similar in nature with the electronic data messages. Electronic Signature – these are any distinctive marks that approve a transaction which are done by a person or an entity using electronic means. . 3. 1. 3Relation to other Laws Such laws that are affected with this are the Intellectual Property Rights, Copyrights Protection. These laws give protection to the parties involved in any business activities through electronic means. Fraud is also related as the government can charge you when you make accept payment illegally by disguising your site as a reliab le option for payment. 1. 3. 1. 4 CASE in E-Commerce Censorship is very an essential tool to distinguish the moralities of websites and the cooperation of companies to acknowledge said moralities. In China, Google’s operations created a storm of criticism when the company agreed to comply with the government’s wishes and censor pro-democracy and other websites. In 2010, Google relocated its Chinese operations to Hong Kong, putting it outside China’s censorship regime. Supporters of the decision say Google shouldn’t cooperate with China’s repressive policies, while critics say Google’s withdrawal cut off millions of Chinese citizens from the company’s services and weakens its presence in one of the world’s largest markets. This case has very evident ethical issues including the move of Google to relocate its operations to Hong Kong. This made the jurisdiction of China’s censorship policy not reachable so that they can use their assets more freely. These however made the citizens of China that is inside the jurisdiction of the censorship policy long for their beneficial search engine. If seen in Google’s benefits this is a rather good trade for them to maximize the use of their services in a commercial area such as Hong Kong yet they could’ve served the citizens so they can keep up their reputation of improving life in the world and be consistent of the famous line â€Å"Don’t be evil†. I generally disagree with their decision to relocate as they could’ve followed the updated utilitarianism and give their services to those who would need them the most. Still they acted the ethical egoism to censor pro – democracy sites which are morally good to their perspective. 1. 3. 1. 5Another Example Including Google Google gathers incredible amounts of data on people who use its search engine. As of 2011, the company’s website states that although it stores records of your searches as a tool to improve corporate efficiency, it renders them anonymous after nine months and deletes cookies used to track visitors after two years. Governments could use Google’s information to investigate individuals visiting particular websites, however, and Google Earth’s photo collection also has raised privacy questions: In 2008, a couple sued on the grounds the online photos of their home violated their privacy, but a judge threw out the lawsuit the next year. This case is provides insight to how Google can be of every use to our society as they can help the government catch fugitives, suspects and criminals with their records of the searches of the every person using their search engines yet this leaves them to violate certain privacy issues when they abuse that kind of power. The lawsuit of the couple may be dismissed by a judge but their lawsuit are supported by ethical theories namely the rights – based theories which states that there are social contracts that should be acknowledged and that includes their right for privacy. They may be legal to store records such as the photo from their Google Earth but they should have to limit their power to exercise their duty as they are also supported by the duty – based theories due to their daily or continual task of improving corporate efficiency as well as giving us access to unlimited knowledge. 1. 3. 2 Cybercrime Prevention Act of 2012 (RA 10175) 1. . 3. 1 Preliminary Provisions 1. 3. 3. 2. 1. 1 Brief History of RA 10175 Cybercrime Prevention Act of 2012 or also known as Republic Act No. 10175 was approved on September 12, 2012. This is first law in the Philippines which specifically criminalizes computer-related crimes. The Cybercrime Prevention Act in its current form is the product of House Bill No. 5808, authored by Representative Susan Tap-Sulit of the second district of Tarlac and 36 other co-authors. The final version of the Act was later signed into law by President Benigno Aquino III on September 12, 2012. 1. 3. 2. 1. 1 Declaration of Policy The main objective of this Act is to protect the people from cybercrimes and also from the harmful effects associated with it. The state also aims to recognize the vital roles of information and communications industries in the country. The state also recognizes the need to protect and safeguard the citizens of the state, and also to protect the integrity of computers and its users. The state also wants to recognize the importance of providing an environment conducive to the development acceleration, and rational application and exploitation of information and communications technology. . 3. 3. 2. 1 General Provisions 1. 3. 3. 2. 2. 2. 1 Punishable Acts In this Act, there are 10 punishable acts indicated in the bill, and those punishable acts each have penalties that are associated. In the next sentences, the punishable acts will be discussed briefly. Offenses against the confidentiality, integrity, and availability of computer data and systems: A. Illegal Access – accessing a computer or a part of a computer without any right B. Illegal Interception – the interception made by the use of any technical device without any right of non-public transmission of datum to or from any computer system including electromagnetic emissions from a computer system carrying such data C. Data Interference – the intentional or any reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without any right including the transmission or transferring viruses into a system. One example is the ILOVEYOU message transmitted through electronic mail way back in the year 2000. D. System Interference – the intentional or any reckless hindering or interference with a functioning computer system, or a computer network by inputting, transmitting, damaging, deleting, deteriorating, altering, or supressing computer data or computer program without any right or authority in doing so. E. Misuse of Devices – the use of any material without any right of it. Acts like producing, manufacturing, selling, and distribution. F. Cyber-squatting – the simplest way is identity theft, using another individual’s identity to gain profit or scam other people in the internet. G. Computer-related Forgery – the illegal use of a computer into copying one’s work, and gaining illegal access to a computer to copy the content of a system or database. H. Computer-related Fraud – the unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system. I. Computer-related Identity Theft – the intentional acquisition, use, transfer, or possession of any identifying information belonging to another person, whether natural of juridical. Under these are Cybersex and Child Pornography. J. Libel –    defined as a public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any acts, omission, condition, status or circumstance tending to discredit or cause the dishonour or contempt of a natural or juridical person committed through a computer system or any other similar means which may be devised in the future. The above stated are the punishable acts by the law enforced and written in the bill, and these acts have corresponding penalties if have been proven to the court. The penalties include: imprisonment or a fine of at least two hundred thousand pesos (Php. 00,000. 00) up to a maximum amount commensurate to the damage incurred or both. Prison mayor is equivalent to imprisonment from 6 years and one day to twelve years. 1. 3. 3 Ethical/ Moral Dilemmas 1. 3. 4. 2 Situation A 16-year old male named â€Å"Josh Evans† was registered on the account used for bullying messages to a girl named Megan Mier. Lori Drew, the mother of Sarah, a former friend Mier, later admitted creating the MySpace account. She was aided by Sarah and Ashley Grills, an 18-year-old employee of the elder Drew. The senior Drew and several others ran the fake account, with an aim to get information about Megan and use that information against her and also for her to be humiliated. This caused spreading gossips about Megan, and thus creating a traumatic experience not only for her but also to her family. 1. 3. 4. 3 Analysing using the Four Major Ethical Theories A. Duty-based Theory According to the Duty-based theory, an act is considered ethical if it has good intentions. Given the situation, I can clearly state that it is not an ethical thing to do. Creating or spreading false rumours is not even close to be called as a good intention. Also, gathering information about a certain person is not ethical if it will be used against or be held against to a person. Using the Duty-Based Theory, I can clearly state that the situation of gathering information of Megan is not ethical because it does not serve a good intention. B. Utilitarianism According to the Utilitarianism Theory an act is only to be considered ethical if it produces desirable consequences or outcomes. The outcome of the situation stated earlier is that the experience Megan was traumatic not only for herself, but it also affected her family. Just by looking at this outcome, we can say that it is not also considered ethical in this theory, because of the outcomes that the actions of the group had caused not only their target but also the relationship of other people to Megan. C. Social Contract Theory According to the social contract theory an act is considered ethical if the act does not violate any rules or laws; according to the Civil Code of the Philippines: Persons and Family Relations, under Chapter 2 which is Human Relations the Articles 19, 20 and 21 discusses the different rights a person possesses and how a person should exercise his or her rights. Chapter 2 Article 19 presents the basic principles that are to be observed for the rightful relationship between human beings and the stability of the social order. Chapter 2 Article 20 presents that you are liable for any damage that you have caused to another person, whether wilfully or negligently. Chapter 2 Article 26 presents that right must never abused, the moment that it is abused, the moment rights are abused they ceased to right. D. Virtue According to the Virtue theory, the action that is considered to be ethical is when the action is came from a good moral principle. Looking to the situation, it is not an ethical thing to do because it does only harm the person involved but also the moral principles of the suspect is to be questioned. 1. 3 Trustworthy Computing 1. 4. 1 Microsoft’s 4 Pillars of trustworthy Computing The 4 Pillars of trustworthy computing help identify the key elements in computing especially in an organization with numerous employees to manage. Guidance is a key to help implement a good and stable system such as how the pillars guide not just Microsoft employees but users alike. 1. 4. . 1 Security Creation of a trust worthy environment for a safe computing environment 1. 4. 2. 2 Privacy The protection and confidentiality of design, development and testing in any organization is essential as to be part of the competitive market today. 1. 4. 2. 3 Reliability Working as expected or promised by the developers and their entity 1. 4. 2. 4 Business Integrity Being responsible and transparent in you duties and expectation as part o f a work force that strives to be excellent a mistake is bound to happen. Admitting a mistake is the 1st step to a growing process of learning new things to come. 1. 4. 2 Risk Assessment It is the process of assessing security related risks to an organization’s computers and networks from both internal and external (Reynolds, 2011) A risk assessment is a process to identify potential hazards and analyse what could happen if a hazard occurs. (Federal Emergency Management Agency, 2013) The assessment would assure the IT security team that they will be ready when an attack comes because of the determined risk assessment they perform. 1. 4. 1 General Security Risk Assessment Process Step 1: Identify IT assets and prioritize ones that are of most importance Step 2: Identify the threats/risks that could occur Step 3: Assess the likelihood of threats Step 4: Determine the impact of each threat, how large to small is the impact if affected Step 5: Determine how each threat can be prevented/blocked Step 6: Which is the most effective prevention method Step 7: Perform cost benefit analysis before taking any action Step 8: Make the decision to implement or not to implement the decided risk prevention found through thorough research and development 1. 4. 3 Establishing a security policy Defines an organization’s security requirements, as well as controls and sanctions needed to meet those requirements. (Reynolds, 2011) A good security policy can possibly improve and provide a smooth flow of operations within an organization. NIST (National Institute of Standards and Technology) is a non-regulatory federal agency within the US department of commerce. The computer security division creates security standards for organizations to implement in their own system. 1. 4. 4 Educating the Employees, Contractor and Part-Time Workers Surveys show that most security problems come from negligence and unawareness of the security policies. Teaching good security practices like not giving out your passwords, making sure you do not meddle in different departments. Knowing the Dos and DONTs of everyday computing will help guide any workplace and direct them to the good ways of being a good user. 1. 4. 5 Threat Prevention The key to a threat prevention system are layers of security systems that challenge the perpetrator to hack into the system. Firewall – stands guard between an organization’s internal network and the internet Intrusion Prevention Systems – prevents an attack by blocking viruses, malformed packets and other threats from getting into a protected network. Antivirus software – should be installed on each user’s personal computer to scan a computer’s disk drives and memory regularly for viruses. User accounts that remain active after employees leave cause an uncertain threat to the company, IT staff must promptly delete and make sure to wipe out all the privileges of the former employee. The US-CERT (United States Computer Emergency Network Team) and SANS(SysAdmin, Audit, Network,System) Institute – regularly update a summary of the most frequent and high impact threats to a computer system specifically viruses and worms. . 4. 6 Security Audit An important prevention tool that evaluates whether an organization has a good security policy and if it is being followed. An example would be a requirement to change passwords every week or month with this in place a security for companies are much more protected compared to others without this requirement. Basically to test, check and review the system’s secur ity and look for loop holes and easy targets. 1. 4. 7 Detection The preventive measures made for a computer system is not always enough to protect important data. Intrusion detection system – is a software/hardware that monitors system and network resources, notifies a system admin when an intrusion occurs Knowledge based intrusion system – contains information about attacks and system vulnerabilities, then trigger an alarm (ex. Repeated login, repeated data events) Behaviour based intrusion system – compares users system behaviour with an admin created model that detects when a user is not following the required model, this would trigger an alarm. (Example: Unusual activity with an account in the HR department accessing the IT department’s data. 1. 4. 8 Response An organization should be prepared for the worst, like a system attack that stops all operations and steals data from the company. The top priority during an attack is not to catch the perpetrator but to regain control and save what is left. Who needs to be informed? And who not to notify? Reputation and credibility is at stake in any security breach. A company should document all details of a security breach and be able to review it after to assess and further study. Eradication of the damaged/breached information is essential but before everything a log is required to keep track 1. . 9 Ethical Moral Dilemmas You are a member of a large IT security support group of a large manufacturing company. You have been awakened late at night and informed that someone has defaced your organization’s website and also attempted to gain access to computer files containing a new product under development. What are your next steps? How much time would you spend tracking down the hacker? -Deo ntological 1. 5 References * (1999, 10). Electronic Commerce. StudyMode. com. Retrieved 10, 1999, from http://www. studymode. com/essays/Electronic-Commerce-731. tml * THE ELECTRONIC COMMERCE ACT (R. A. 8792) AN OVERVIEW OF IT? S (INFORMATION TECHNOLOGY) IMPACT ON THE PHILIPPINE LEGAL SYSTEM(2005 006). ‘www. ustlawreview. com/pdf/vol. L/Articles/The_Electronic_Commerce_Act_RA_8792. pdf * What Is the Difference: Viruses, Worms, Trojans, and Bots? – Cisco Systems. (n. d. ). Cisco Systems, Inc. Retrieved from http://www. cisco. com/web/about/security/intelligence/virus-worm-diffs. html * What Is A Rootkit? (n. d. ). Internet / Network Security – Tips, Advice and Tutorials About Internet Security and Network Security. Retrieved from http://netsecurity. about. com/od/frequentlyaskedquestions/f/faq_rootkit. htm * Julian. (2011). 10 Most Notorious Acts of Corporate Espionage. Retrieved from http://www. businesspundit. com/10-most-notorious-acts-of-corporate-espionage/ * Katich, A. (2013). Anonymous (Annie Katich). Retrieved from http://socialactive. wordpress. com/2013/02/25/anonymous-annie-katich/ * Verini, J. (2010). The Great Cyberheist. Retrieved from http://www. nytimes. com/2010/11/14/magazine/14Hacker-t. html/ How to cite An Introduction to the Im Profession and Ethics Paper, Essay examples

Sunday, December 8, 2019

Comparing and Contrasting Greece and Rome free essay sample

The Roman and Greek societies were both very influential and innovative. Furthermore, the two civilizations lasted for many centuries and expanded greatly. Thus, the Roman and Greek societies had various differences and similarities along the lines of religion, government and intellectual achievements. Religion-wise, Rome had borrowed Greek’s polytheistic religion, only altering deities’ names. On the government front, Rome combined the governments of several Greek city-states and made a republic. Lastly, Rome achieved many architectural feats, especially its aqueducts, due to Grecian intellectual innovation in development of arches. The Greek Roman civilizations both had strong roots in religion. Greece, being the predecessor of the Roman society, undoubtedly influenced Roman religion. In fact, the Ancient Roman religion was nearly identical to Greece’s polytheistic religion, except the names of the deities were different. For example, Zeus, the Grecian god of sky and thunder, was the equivalent of the Roman god Jupiter. We will write a custom essay sample on Comparing and Contrasting Greece and Rome or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The Roman Empire’s tireless expansion, however, lead to the introduction of new religions through cultural diffusion. Conquering Judea revealed the religion of Judaism to the Romans, and later, through a chain of events, the religion of Christianity was established within the Empire. Christianity was a monotheistic religion and it challenged Rome’s polytheistic religion and Rome’s government, since numerous deities were symbols of state. It is evident that Rome, in the beginning, used Greece’s religion, but through the passage of time, had three different religions, two of which still prosper today. In the aspect of government, Rome combined the most relevant features of the monarchy, aristocracy and democracy to form a new form of government: the republic. In Ancient Greece, city-states implemented the aforementioned forms of government, but not at once. For example, Athens was a democracy while Sparta was an oligarchy, and Mycenae was a monarchy. So, Rome, influenced by Greece’s forms of government, managed to create what Greece never had: one unified, single form of government. Albeit Greece’s mountainous, separated terrain was the reason for the divided government, Rome’s accomplishment stands nevertheless. Nearing Rome’s collapse, on the other hand, infighting arose amongst commandants due to soldiers pledging allegiance to their commandant and not their state. Therefore, it is noted that a unified, central government is not the key to a unified, central state. Like in the case of religion, Rome, due cultural diffusion, used the Grecian city-state’s form of government to make the republic. In the realm of intellectual achievements, Roman innovations were especially grand in the area of architecture. Adhering to the Grecian architectural standards of strict dimensions and proportions, Romans created building feats, notably the Pantheon and the Colosseum and aqueducts. They did this through improvising the arch and the dome, and began using concrete in the 1st century BCE. Where Greece developed the ziggurat, columns and ramps, Romans aggrandized and combined those designs to create such buildings like the Pantheon. Also, the usage of concrete helped reinforce Pax Romana, for the substantial durability of the roads allowed for easy transportation. Roman aqueducts were architectural marvels as well, bringing water into the city and to the farms. In Greece, the wheel, the sail and the plow were developed, in addition to astronomical and mathematical discoveries like Earth’s diameter and the 360 degrees of a circle. The development of the plow was especially crucial to Rome, for it was an agricultural society. Rome, in the topic of religion, faced a growing religion called Christianity within its empire, something which Greece didn’t have. Government-wise, Rome was a republic while Greece, as a whole, was mostly focused on democratic principles. Finally, Grecians developed the 360 degrees in a circle, something that was crucial to development of the arch and essentially, much of Roman architecture. To conclude, an influential, relational analogy can be established between the similarities of Greece and its predecessor Sumer, and between Rome and its predecessor Greece. All three of those civilizations were unique, aspired to conquer, trade and negotiate with neighboring lands and ultimately, still affect the present life through the actions they did, millennia ago, like Constantine’s decision to end the persecution of Christians.

Sunday, December 1, 2019

Oracle Bone free essay sample

Religion in Shang Dynasty Religious practice has always been an essential part of Chinese Culture. Even in the period of the Three Augusts and Five Kings, religious practices occurred. However, it is not until the Shang Dynasty when actually records of spiritual communication were founded. Oracle Bones were recorded of communication between human and spirits. The ritual of cracking oracle bones told what ancient Chinese concerned the most the relationship between spirits and nature. The intricate Oracle Bones not only reveal the religious aspect of the Shang Dynasty, but also relate the cultural and olitical system in ancient China. During the Shang Dynasty, Kings were granted the power to communicate with spirits. Mostly importantly, spirits informed kings about the unknowns. When Shang kings have questions regarding the future and their relationship with spirits, they assigned priests and shamans to become medium between human and spirits. When shamans were asked to foretell for the king, they drill hollows in shells and apply red- hot poker to these shells. We will write a custom essay sample on Oracle Bone or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page They believed this ritual would attract spirits who were nearby to answer kings questions asked by shamans. Shamans main task was to nterpret spirits respond through the different cracks on shells. These kinds of predictions were said to be legitimate the kings were the ultimate representative of the spirit. Most of the time, kings requested to perform oracle bones divination to learn from spirits regarding the success of harvest, outcomes of battles, and schedule of sacrifices to spirits. For example, the King asked: Will Di order rain sufficient for harvest? (Eno 46). During earlier years of Shang Dynasty, the outcomes of harvests were more important to the people. Nevertheless, by the end of the Shang Dynasty, a large portion of divinations were performed to know the schedule and proper scarifications to spirits and ancestors. There were scarifications everyday for different ancestors and spirits according the results of divinations accumulated overtime. After oracle bone divinations were performed, kings would perform sacrifice to the assigned spirit at a specify time with appropriate goods. When an oracle divination indicated a negative answer from spirits, for instance defeat in battles, kings would then sacrifice to spirits hoping for spirits help to change the result. Shamans would slaughter animals and/or humans according to spirits preference. The result of appeasing spirits could lead spirits to provide extra helps for the people. On the other hand, if the king sacrifice the perfect quality and quantity of goods to a specify spirit but the king did not get his preference; kings could temporarily stop sacrificing to this spirit until the effect of previous scarifications were shown. Therefore, human scarification and spirits effectiveness created an economy between human and heaven. This economy applied more on the loyal level than the family level. During Shang Dynasty, family could only sacrifice to their own linage of ancestry. It was a crime to sacrifice to other linage of ancestries because only the king had this power. Family often sacrificed to hope ancestors would bless the family to have male children which can extend the family-tree. Thus, only the royal family had the Shang king can communicate and sacrifice to all linage of ancestries, which include Shen (natural deities), royal ancestors, and cultural heros. People in Shang Dynasty worship the greatest spirit Di (Tian). Yet Di do not receive any sacrifice ompare to other spirits. Tian, which is said to be equivalent to Di, was so powerful that other spirits could never match their power with D. Di was a significant factor of Shang peoples religious believe that was indicated in the oracle bones but Tian was not indicted in any evidences at all. On the other hand, Shang people viewed Shen as the power of nature, including power of earth, river, mountains, rain, thunder, and the power of directions, etc. in the early stage of Shang Dynasty, oracle bones divinations were directly performed to communicate with Shen to foretell harvest esults. Shen, unlike Di, did take sacrifice in order approve kings requests. For example, king asked, Shall we call upon Que to sacrifice a hound by fire to Cloud? (Eno 48). Thus, Shen was the second highly respected power after D. Shang kings also sacrifice to spirits of their royal ancestors, including parents, grandparents, forebears of ruling king, relatives. These spirits were located inside the royal familys palace, and their tablets were put together with other ancestors of the same family. Kings worshiped his linage of ancestors to hope they would bring fortune to the royal amily and the countries. When the current king died, he became part of his linage. Oracle bones divinations were use to communicate with royal ancestor spirits: Should we protect the kings eyes against Grandmother Ji? (Eno 49). Current kings Other families only sacrifice to their own linage as well. This ancestor worship ritual was established during the Shang Dynasty and is still performing in modern Chinese culture. Finally, kings also sacrificed to ancient cultural heroes, yet they were the less prominent group of spirits. Thus, religion practices in Shang Dynasty were an essential part of Chinese ultural before and in todays society. The use of oracle bones to predict future allowed reader to date the first actual evidence of Chinese religion. The written records left by Shang Dynasty created a clear picture of the cultural and politic aspects of ancient China as well. The relationship between human and spirits remains to be a significant part of Chinese peoples religious belief. I grew up practicing ancestor worship. Work Cited Eno, Robert. Deities and Ancestors in Early Oracle Inscriptions. Religions Of China In Practice. Donald S. Lopez Jr. New Jersey: Princeton University press. 41-51