Tuesday, August 25, 2020

Why do bad things happen to good people? Essay -- Essays Papers

For what reason do awful things happen to great individuals? There is one inquiry that everybody pose except to which nobody knows the appropriate response: For what reason do terrible things happen to great individuals? The incidents of good individuals raise issues for the individuals who endure, yet additionally for each and every individual who needs to put stock in an equitable and bearable world and in a reasonable and humane God. Rabbi Kushner, creator of For what reason Do Bad Things Happen To Good People, endeavors to carry light to this troublesome inquiry. In doing so he assesses past endeavors to clarify enduring, offers his own way to deal with the avocation of enduring in the present society, and causes proposals for how one to can manage enduring and proceed with their excursion into what's to come. This article will analyze these methods of reasoning and will close with an investigation on how Kushner handles the four fundamental hotspots for understanding the desire of God through sacred text, convention, history, and present day setting. Kushner assesses past endeavors to clarify enduring and talks about why they are not acceptable. One manner by which individuals endeavor to comprehend enduring is to accept that they merit what they get, and that by one way or another their hardships come as discipline for their wrongdoings. This thought depicts God as an honorable adjudicator who is all adoring, all-ground-breaking, in complete control, and gives individuals precisely what they merit. In any case, Kushner sees significant restrictions in this thought since it instructs individuals to reprimand themselves for their anguish and makes superfluous blame. Also, he contends that it might even dismiss individuals from God and cause them to abhor themselves. Survivors of disaster additionally attempt to reassure themselves by accepting that God has his purposes behind creation them endure, reasons that they are in no situation to... ...the sacred writings in the Bible. In addition, Kushner invalidates the conventional convictions of sacred writing by utilizing current thoughts of advancement to subvert the creation story, In a portrayal of Creation which is incredibly like the transformative procedure as researchers have come to unwind it. (pg 72). This announcement sabotages God's incomparability and advances Kushners thought of irregularity and absence of control. Ultimately, Kushner conflicts with custom and authentic acts of supplication when he demands that approaching God for help and requesting that God change things isn't right. Rather he proposes that individuals should change their comprehension of what is intends to supplicate and having one's petitions replied. All things considered, Kushner endeavors to address the issues of enduring with profound knowledge and depends intensely on current setting to assist individuals with understanding the excruciating occasions of this life.

Saturday, August 22, 2020

Microbiology Laboratory Safety and Basic Procedures free essay sample

Wellbeing in a microbiology research facility is significant in the anticipation of disease that may be brought about by the microorganisms being contemplated. This research center doesn't require the utilization of destructive human pathogens. Be that as it may, numerous kinds of microorganisms are conceivably pathogenic. This implies, despite the fact that they would not cause sickness in an ordinary sound host, they may potentially do as such if a huge enough amount of the organisms came into contact with an undermined have, for example, by wounds and cuts. Notwithstanding microorganisms, there are a few synthetic compounds utilized in this research center that are possibly hurtful. Numerous methods include crystal, open blazes, and sharp items that can cause harm whenever utilized inappropriately. The accompanying insurances ought to be taken to dodge the issues that might happen. 1. Sterile jackets are required. Wearing old apparel is likewise attractive, since numerous reagents can create lasting stains on garments. 2. Understudies may not wear shoes or open toed or canvas shoes due to the consistent risk of cuts and contaminations from broken glass found on the lab floors and the chance of substance spills. We will compose a custom paper test on Microbiology Laboratory Safety and Basic Procedures or on the other hand any comparable point explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page . Long hair must be attached back to limit fire risk or pollution of tests. Smoking, eating, and savoring the research facility are totally disallowed. 5. After entering the research center, coats, books, and other gear ought to be set in determined areas and never on seat tops (aside from lab manual). 6. Toward the start and end of every research center meeting, seat tops are to be cleaned with a disinfectant arrangement. 7. Watch severe individual cleanliness. Wash your hands with cleanser toward the beginning of the research facility meeting before playing out any systems and before leaving the lab toward the finish of the meeting. 8. All societies ought to be dealt with as being conceivably pathogenic and the accompanying precautionary measures ought to be seen consistently: a. Societies should consistently be conveyed in a test tube rack while moving around the research center. b. Societies must be kept in a test tube rack on the seat tops when not being used. c. Stock societies should never be pipetted by mouth. Continuously utilize an attractions help (never utilize your mouth) when filling a pipette or utilize a pipetter with a natural or concoction reagent. d. Spilled societies ought to be secured with paper towels and afterward immersed with disinfectant arrangement. Following 15 minutes of response time, the towels ought to be expelled and arranged. 9. Spills, cuts and different mishaps ought to be accounted for to the teacher. 10. Pressurized canned products ought to be maintained a strategic distance from by utilization of legitimate procedure for blazing the vaccinating circles and needles and by playing out any blending of societies and reagents so as to abstain from sprinkling. Evacuation of media, gear, and societies from the lab is denied except if coordinated. 12. During and toward the finish of every lab period, utilized pipettes ought to be disposed of into the assigned plate. Other utilized dish sets ought to regularly be put into dispose of plate situated in the rear of the lab. Plastic product, for example, Petri plates and pipetter tips ought to be disposed of in the stamped wastebasket. Utilized paper ought to be disposed of into wastebaskets toward the finish of the lab time frame. Broken china is disposed of into the container stamped â€Å"Broken Glassware†, not into wastebaskets.

Sunday, August 9, 2020

Dream President-Novelist Collaborations

Dream President-Novelist Collaborations News that James Patterson and former President Bill Clinton are teaming up to write a mystery novel got me imagining what books we couldve gotten if only other presidents wrote novels.  Yall we couldve had some awesome (if kind of weird) novels. Ive paired ten  presidents with ten  leading authors alive at the same time. The authors had to have written at least one work of fiction by the time the president left office. Oh, and I didnt pair anyone with Mark Twain because I just want every president in his lifetime to collaborate with Twain everyone from Lincoln to Roosevelt! Barack Obama and Ta-Nehisi Coates: I would 100% read a comic book co-authored by Obama and Coates. Especially after reading My President Was Black in  The Atlantic. I imagine that they would come up with an engrossing, woke af spin on the entire comic book genre. Obama never mentioned comic books in his lists of reads, but Id like to believe that hes read  Black Panther in the months since leaving office. Ronald Reagan and Joan Didion: If these two couldve spent more than 10 minutes in the same room together, I suspect they couldve come up with a pretty unique spin on the culture of celebrity and American life. Didions essay in In the Realm of the Fisher King (collected in  After Henry) nailed Reagans economic policies. Her writing on Hollywood, like  Play it as it Lays, suggests to me that she couldve done something subversive, popular, and brilliant in tense collaboration with  Reagan. Richard Nixon and Toni Morrison: Just hear me out on this one. During Nixons presidency, Morrison published both The Bluest Eye  and  Sula. Morrison was clearly interested in inferiority complexes, why the powerful refuse to relinquish power, and social order. Theres no doubt in my mind that a Nixon-Morrison writing partnership would be troubled and difficult, but I suspect that Morrison could work with the raw material of a man like Nixon (paranoid, ambitious, deceitful, and crass) to write an insightful novel. Lyndon B. Johnson and Robert Penn Warren: This is perhaps my dream novelist-president pairing. Ive written before  about my love for  everything Warren, so Im a little biased. However, I think that Warrens attention to the American south and his interest in Civil Rights, white liberalism, and a certain kind of good ol boy would make for a fascinating joint effort with the brash LBJ. I  know Willie Stark, central  character in  All the Kings Men, was based on  Huey Long. Still, that probably set up Warren to handle a man like Johnson. Dwight D. Eisenhower and J.D. Salinger: Salinger seems like the perfect voice to take on the Eisenhower, post-war cultural landscape (as indeed he did in  Catcher in the Rye). I can only imagine the conversations between Eisenhower, a war hero and president, and the author who railed against all the phonies. The two of them could have made something great together that celebrated and poked holes in the conformity of the 1950s. Woodrow Wilson and Margaret Mitchell: This pairing seems pretty likely, actually. Mitchells Gone with the Wind  is a deeply lets just say problematic at best, novel and we know that Wilsons legacy on race is less than stellar.  I dont want more racist literature in the world but, if Im being honest, I suspect theyd have written a book that wed read today as an example of a specific kind of progressive-but-racist, early 20th century art. So maybe it would still serve a cautionary purpose? Teddy Roosevelt and Jack London: I was surprised to learn that Roosevelt was pretty critical of authors like London, who he called nature fakers. That said, I do wonder if he doth protest too much. The  tension between these two couldve birthed an intense epic of masculine, wilderness tales suffused with wolves and manly men being men in the woods. Ulysses S. Grant and Herman Melville: Possibly unpopular opinion: Grant was a great president who doesnt get the credit he deserves. Grant and Melville were born just three years apart. The scope of both Melvilles  Moby Dick and Grants memoirs makes me think that these two couldve come up with an incredible novel about the American Civil War. Grant once said that, In every battle there comes a time when both sides consider themselves beaten, then he who continues the attack wins. If thats not something Ahab couldve understood, I dont know what is. Andrew Jackson and Edgar Allan Poe: Of course Poe, master of horror and author of the worlds first mystery novel, shouldve worked with Jackson. The presidents Indian removal policies certainly  suggest that Jackson was a man without conscience and capable of inflicting tremendous pain and suffering on others. My hope is that Poe wouldve produced something critical of Jacksons ideology but, honestly, wed probably just get a tour de force of a creepy, troubled, violent psyche. George Washington and Jupiter Hammon: This is perhaps the least likely pairing on a list of unlikely pairings. It strikes me almost silly to imagine that Washington wouldve wanted to work with Hammon, an African American and slave, and yet Hammons life as a slave in New York, where Washington fought the Revolution and the nations first capital, is a powerful rebuke to many of the Revolutions stated ideals. Hammon wrote poetry and religious texts, so hes the exception to the rule for this list of novelists, but I think that he couldve created a nuanced tale that involved the American origin story, republican theology, and liberty. What president do you want writing a novel with your favorite author?

Saturday, May 23, 2020

Assisted Suicide Act of Mercy or Murder - 1189 Words

Assisted Suicide: Act of Mercy or Murder? By Gorge Lopez 02/20/2011 Assisted suicide is also known as the right to die by a person’s choosing. The two main methods for assisted suicide is by lethal injection or by lethal pills .Most terminally ill patients chose to opt for assisted suicide, so that they no longer have to suffer. But more so it is not only terminally ill patients that are opting for an assisted suicide, it has reached out to the elderly as well. In some viewpoints, a person may believe that if a terminally ill person wants to end their life to end their suffering, it should be up to them. There is an opposing side saying that it is unmoral and against god. It is an ongoing discussion that won’t come to an end†¦show more content†¦The most common method to assisted suicides is by lethal pills, due to their veins not being as sturdy as when they were younger. When people become elderly and have either no family or family that lives really far away become depressed and lonely and they feel this is their only optio n. In either case terminally ill or elderly these people feel that they don’t want to die with a lack of dignity. So some people felt that doctors should let these people die with dignity, if that was of their choosing. I really don’t think this option should be given to the elderly just for the reason of note dying alone. That could change I think, if an elderly person was a recluse and had no social life, they could out more and make new friends and maybe best friends or later in life soul-mates and that could change the aspect of them living alone. I feel that it is an unjust reason to request assisted suicide. Another opposition I have towards assisted suicide is due to religious reasons. It is up to the person to make the decision, but I feel it is immoral, a sin, and not god’s will. Suicide whether it be assisted or not is a selfish act. People that are not in a terminally ill state don’t realize the hurt they do to their family in being selfish. G od wants us to trust, depend on and believe in him, so when you take your own life you are showing no faith in god. The way I see it is â€Å"Don’t tell God how bigShow MoreRelatedFree Euthanasia Essay580 Words   |  3 Pagesone of the most discussed topics in all of the United States Congress. US government agencies, legislators and leaders have attempted unsuccessfully to stop assisted suicide nationwide by barring the use of federally controlled substances at lethal levels intended for mercy killing. There are many issues surrounding the act of assisted suicide that are yet to be resolved in the United States. In the near future Congress should have a set law on this topic and that will end the confusion circulatingRead MoreEuthanasia: Not Morally Acceptable Essay1646 Words   |  7 Pagesnot morally acceptable because it always involves killing, and undermines intrinsic value of human being. The moral basis on which euthanasia defends its position is contradictory an d arbitrary in that its moral values represented in such terms as ‘mercy killing’, ‘dying with dignity’, ‘good death’ and ‘right for self-determination’ fail to justify taking one’s life. Introduction Among other moral issues, euthanasia emerged with modern medical advancement, which allows us ever more control overRead MoreShould Euthanasia Be Legalized?1490 Words   |  6 PagesEssay 1 November 2015 Word Count - 1488 Mercy or No Mercy Soul is immortal. But body is mortal. In life there could be multiple problems. Some problems could be life threatening. There are some stages in life where one has to make decisions. Imagine you are in a place where you lost all your vital abilities and you have to spend your entire life like that. Your family and friend are in pain too just like you are in pain. What would you do? Euthanasia is and act where a person assist the death of otherRead MoreShould Euthanasia Be Allowed?986 Words   |  4 Pagesgood death. It is commonly defined as the act of bringing about the death of a hopelessly ill and suffering person in a relatively quick and painless way for reasons of mercy (LeBaron). Assisted suicide is a form of euthanasia, when a person helps commit suicide or provides information of how to do so to another person. A person taking another persons life without his or her request in order for that person not to have ample suffering is a mercy killing. Both are methods of eu thanasia. WeRead MorePsysician Assicted Suicide1071 Words   |  4 Pagesshe basically cheated her way out of life. Yet, she did not want to commit this act fully herself out of fear. So, she contacted a doctor who at the time was involved with the subject of assisting others with illnesses in suicide to rid of suffering and pain, known as Dr. Kevorkian (later on known as Dr. Death). She believed that a total stranger could help kill herself but insisted it was not a legitimate suicide because she felt it was necessary; even though it clearly was not. He heard her desperateRead MoreArgumentative Essay On Euthanasia715 Words   |  3 PagesEuthanasia (Physician-Assisted Suicide) Euthanasia has been around for a long time. In 1990 every state had laws that made assisting suicide a felony. Assisted suicide been in the news since the 1990s. A supporter of euthanasia Dr. Jack Kevorkian played an important role in more than 100 suicides before he was charged with murder. In Oregon voters passed the death with dignity act in 1994, but a lawsuit blocked its enforcement until 1997, when it went into effect. The consideration of potentialRead MoreShould Euthanasia Be Legalized?1097 Words   |  5 PagesMeriam Webster defines Euthanasia as â€Å"the act or practice of killing or permitting the death of the hopelessly sick or injured individual (as persons or domestic animals) in a relatively painless way for reasons of mercy.† This mercy killing is often referred as an easy and painless death. Euthanasia can be done in two ways, either from a request of a dying patient or that person’s legal representative. Euthanasia is defined in different terms de pending on the permission of the patient. When thisRead MoreEuthanasia Essay : Euthanasia And Morality1627 Words   |  7 PagesDenise Maranhao Professor Joseph Anderson Ethics across the professions November 29, 2014 Euthanasia (Euthanasia and morality) Could you pull the plug? Is mercy killing considered murder and should it be illegal under each and every circumstance? There are many questions and even more controversies when it comes to euthanasia and assisted suicide. There are those who believe euthanasia is immoral regardless of the situation, it is illegal and therefore always wrong. But most people have never beenRead MorePAS: The Right of Each Patient1624 Words   |  7 Pages As a congressman from the state of Oregon that currently has a regulated physician assisted suicide program for the terminally ill, I am writing to you today, Mr. Blumenauer, to possibly convince you to draft a national law to legalize PAS for the United States specifically for the terminally ill. As you may know, the talk within this issue has been going around quite some time. Many americans fear that by legalizing PAS that it might create problematic issues that could lead to abuse as well asRead MoreEuthanasia, Mercy Killing, And Euthanasia1101 W ords   |  5 Pages Euthanasia, mercy killing, assisted suicide, no matter what you call it, the topic is very controversial. Personally, I would have to agree with the concept. I know that there are people who are completely against it, and there are those that would consider it in certain situations. By covering this topic maybe I can share some light on the pros of euthanasia for those against it. Euthanasia by definition is the act or practice of killing or permitting the death of hopelessly sick or injured individuals

Tuesday, May 12, 2020

Roosevelt a Liberal and Hoover a Conservative Essay

Roosevelt a Liberal and Hoover a Conservative Thesis: Because the Great Depression quickly changed Americas view of liberalism, Roosevelt can be considered a liberal and Hoover a conservative, despite occasionally supporting similar policies. Written for the Advanced Placement U.S. History Document Based Question from the A.P. test. Hoover The political shifts in American history during the last two centuries are often explained by Arthur Schlesingers cyclical explanation of eras of public purpose followed by private interest. What is considered liberal versus what is considered conservative shifts in a similar pattern. While laissez-faire policies are considered liberal in the Roaring 20s, the onset of the Great Depression in†¦show more content†¦This lack of complete dedication to private interest or public purpose is further displayed in Documents B and C where Hoover stresses the importance of the individual in ending the Depression while also assuring government support for job production if the situation required it. Hoovers speeches are remarkably similar to Roosevelts speech in Document E. Here, even during the Depression, Roosevelt stressed the importance of balancing the budget unless unemployment required the government to spend money stimulating the economy. Instead of Hoovers desire to continue re stricting government, Roosevelt wanted to balance the budget. The Depression created the need for government intervention and an unbalanced budget as shown in Document F. However, despite a few efforts by Hoover to create jobs, he still seemed much different than Roosevelt who insisted in 1936 that America must not go back to supporting Conservatives who protected private interest unjustly. (Document G) Hoover started creating jobs when the Depression caused Americans to demand public purpose reform, but the public still quickly characterized him as a conservative despite passing some, now considered, liberal legislation. At first Hoover stubbornly held to his belief that government could not and should not try to end the Depression as shown in Document B. In 1930, Hoover remained conservative. He rarely intervened in the economy andShow MoreRelatedLiberal Franklin D. Roosevelt vs. Conservative Herbert C. Hoover1534 Words   |  7 PagesPresident Franklin D. Roosevelt is commonly thought of as a liberal and President Herbert C. Hoover as a conservative. To what extent are these characterizations valid? President Franklin D. Roosevelt is commonly identified as a liberal and President Herbert C. Hoover as a conservative. The validity of these characterizations, however, is conditional upon the definition of these labels. If one adopts the most conventional contemporary definitions of the terms â€Å"liberal† and â€Å"conversative,† thenRead MoreEssay on APUSH DBQ- Hoover vs. Roosevelt774 Words   |  4 Pagesï » ¿DBQ #3 President Franklin D. Roosevelt, the thirty-second president of the United States, was a central figure for the United States in the 20th Century. While leading his country out of The Great Depression, he also led the nation through World War II. Herbert Hoover, the thirty-first President, led the country during the Great Depression and his policies enforced at that time eventually led to his downfall because of their inability to end the downward economic spiral. Both of these PresidentsRead MoreEssay about Roosevelt Vs. Hoover and the Great Depression1658 Words   |  7 PagesRoosevelt and Hoover The Great Depression drastically changed Americas definition of Liberalism. Prior to the onset of the depression, in the roaring twenties, policies of laissez-faire were considered liberal, radical, revolutionary, and even democratic. This was due to the fact that revolution was a horrifying notion and not until after the laissez-faire and the system of free market fails in the 1920s do people begin to look about for alternatives. The time when people starting to seek alternativesRead MoreEssay on Hoover vs. Roosevelt629 Words   |  3 PagesMatt Stefanko APUS – Period 7 8 April 2010 Hoover vs. Roosevelt Herbert Hoover and Franklin Roosevelt were both presidents during one of the most difficult times in American history, the Great Depression. To try and ease the hardships that many Americans were facing, each President developed many different programs. The different actions that each took to lessen the blow of the depression classified them as either a liberal or conservative. If their actions focused on helping the economyRead MoreEssay on Roosevelt and Hoover DBQ1428 Words   |  6 PagesRoosevelt and Hoover DBQ The Great Depression quickly altered Americas view of liberalism and therefore, Roosevelt can be considered a liberal and Hoover a conservative, despite the fact that they did occasionally support very similar policies. The United States experienced political shifts during the Great Depression, which are described by Arthur Schlesinger’s analysis of eras in which public objectives were placed before personal concerns. It seems that the public view of what constitutesRead MorePresident Franklin D. Roosevelt777 Words   |  4 PagesPresident Franklin D. Roosevelt is commonly thought of as a liberal and President Herbert C. Hoover as a conservative. To what extent are there characterizations valid? It is a commonly held belief that Roosevelt was liberal and Hoover, conservative. However, as their respective presidencies progressed, it was shown through their proactivity and reservations that they attained a versatility between the two. Both wanted to pull the economy away from the depression. It’s just that Hoover wanted less governmentRead MoreThe Great Depression : The Greatest Depression1257 Words   |  6 Pagesmillionaire businessman were reduced to selling apples and pencils on street corners. During the Depression, the 31st president of the Unites States, Herbert Hoover came up with the Hoover Administration to hopefully resolve these problems of the Depression. Although, it ended up proving to be ineffective in dealing with these problems. Hoover blamed the Depression on foreign economic collapse over which he had no control. The Bank of England no longer redeemed its paper money in gold bullion or coinRead MoreThe Constitutional Right Of Liberty Of Contract, B y Franklin D. Roosevelt And His New Deal1494 Words   |  6 Pagestheir hard work should reflect towards their economic life and freedom. On the other side of things are the beliefs of the Democrats, their views in favor equal opportunity for the working class. Through time Liberal President, Franklin D. Roosevelt and his â€Å"New Deal† as well as Conservative Republican Ronald Regan and his â€Å"Trickle Down Economics†, have both made the biggest economic impacts regarding the debate. The constitutional right of liberty of contract, mandated by the Supreme Court in theRead MoreThe Legacy Of The New Deal Essay1682 Words   |  7 Pagespresidential election took place. The Democrat Franklin Roosevelt, who spoke with the program the New Deal, came to presidency. It was a series of social liberal programs applied in the United States in 1933-1938 in response to the Great Depression. The New Deal was focused on three main principles: relief, recovery, and reform.[footnoteRef:1] They promised to bring the country to prosperity and economically stable future. However, the Conservatives criticized the New Deal during the whole period of theRead MoreSwitching Ideaologies during the Great Depression934 Words   |  4 Pagesunto the other side. They slid back and forth between being Liberal (or more Democratic) and being Conservative (or more Republican). The ideologies for each side bore a massive difference. The Democrats would favor help from the government while the Re publicans chose to go with the attitude of it’s up to the people to make a difference - hard work and no help. The two presidents of this era, Herbert Hoover and Franklin Delano Roosevelt, had different policies abiding to their different sides. While

Wednesday, May 6, 2020

Global Burden Of The Disease Health And Social Care Essay Free Essays

Cervical malignant neoplastic disease is a major public wellness issue ; it is the 2nd most common malignant neoplastic disease among adult females in the universe, and one of taking cause of decease by gynaecologic malignant tumor in developing states. ( I. Shahramian and co-workers 2011 ) Besides, cervical malignant neoplastic disease is one of the most preventable and curable malignant neoplastic disease when it is detected early, and this is due to its slow patterned advance, since it take several old ages to turn from a noticeable precursor lesion. We will write a custom essay sample on Global Burden Of The Disease Health And Social Care Essay or any similar topic only for you Order Now This cardinal characteristic provides a big window of about 10 old ages or more for effectual early sensing of the precancerous lesion, and forestalling its patterned advance to invasive malignant neoplastic disease. From this position, good organized bar attacks have been applied by high income states over the past 50 old ages, and have resulted in a singular diminution in morbidity and mortality from this invasive disease. The showing plan is a successful illustration for effectual bar from cervical malignant neoplastic disease, it has been used in the Nordic states ( Denmark, Finland, Iceland and Sweden ) ; this plan was examined by the International Agency for Research on Cancer ( IARC ) in 1960s and it was found that the mortality rate in these states fell by about three- 4th, The most drastic lessening was marked in Iceland by 84 % and this was due to the broad mark age scope for testing in this state. ( whomb people ) However, over the same period, developing states have failed through utilizing the same plan to cut down the load of the disease, and cervical malignant neoplastic disease continues to endanger the lives of 1000s of adult females, this may be due to the deficiency of an effectual bar scheme. We will seek in this paper to reexamine the determiners of cervical malignant neoplastic disease testing among Algerian adult females, to clarify the outstanding barriers sing showing and to foreground the chief factors act uponing the single wellness behavior, for this survey, we will utilize the Health Belief Model as a conceptual model, we will explicate the construction of the Health Belief Model ( Becker ) and how the different concepts of the theoretical account could foretell the adult females ‘s wellness behavior sing cervical tumor showing, eventually the application of this theoretical account as a guiding model to anchor behavioral intercessions and to better attitude of adult females sing malignant neoplastic disease showing will be discussed. Epidemiology of cervical cancer/ planetary load of the disease Global overview Worldwide, cervical malignant neoplastic disease is the 2nd most common cause of decease among adult females ( ACCP2004 ) with an estimation of 493,000 new instances, and 274,000 deceases happening every twelvemonth harmonizing to the statistics of the International Agency for Research on Cancer ( GLOBOCAN, 2002 ) In 2008, 530000 new instances were diagnosed, more than 85 % of the planetary load were registered in developing states ( where it remains the most common malignant neoplastic disease seen in adult females and it accounts for 13 % of all female malignant neoplastic diseases ) , In the same twelvemonth, the cervical malignant neoplastic disease was responsible for 275000 deceases, approximately 88 % of which occurred in developing states 53000 instances in Africa, 31700 in Latin America and the Caribbean, and 159000 instances in Asia. ( GLOBOCAN 2008 ) The figure below shows incidence of cervical malignant neoplastic disease by state, it should be noted that informations from developing states might be underestimated as the official statistics in these states are non dependable. hypertext transfer protocol: //globocan.iarc.fr/factsheets/cancers/cervix-bar.png Regional overview Algeria is a big North African state, extended from the Mediterranean Sea down to the Sahara, with about 37 million dwellers. Algeria has a population of 11,51millions of adult females whose ages are 15 old ages and older, ( WHO/ICO2010 ) which means that about the tierce of the Algerian population is at hazard of developing cervical malignant neoplastic disease. Cervical malignant neoplastic disease is the 2nd most common malignant neoplastic disease among Algerian adult females after the chest malignant neoplastic disease, â€Å" Current estimations indicate that every twelvemonth 1398 adult females are diagnosed with cervical malignant neoplastic disease and 797 dice from the disease † ( WHO/ICO2010 ) About 10, 5 % of Algerian adult females are estimated harbour cervical HPV, and about 77, 1 % of cervical malignant neoplastic diseases in Algeria are related to HPV 16 or 18. ( WHO/ICO 2010 ) But we should observe that even these statistics might be underestimated, The economic impact of cervical malignant neoplastic disease is significantly heavy for the province. The intervention of a individual patient returns to about 2.5 million dinars ( a‚ ¬ 20,000 ) , with this cost we we can accomplish 2000 vilifications ( smear trial cost 20 a‚ ¬ ) and vaccinate 30 adult females. Natural history of cervical malignant neoplastic disease Understanding the procedure of developing cervical malignant neoplastic disease is a important measure to plan an effectual plan of bar. More than 99 % instances of cervical malignant neoplastic disease are attributed to cervical HPV infection, which is a sexually transmitted disease ( STD ) , the virus is acquired by both work forces and adult females through sexual activity, the infection is normally symptomless and transient. HPV is the most common STD in the universe ; it affects â€Å" about 50 % to 80 % of sexually active adult females at least one time in their life-time † ( ACCP 2004 ) , they contract it in their adolescent, 20 or early 30s. There are more than 100 genotypes of HPV that have been identified, and which are numbered by order of their find, approximately 13 types can take to invasive cervical malignant neoplastic disease and they are known as high oncogenic hazard ( 16,18,31,33,35,39,45,51,52,56,58,59,66 ) ( WHO 2007 ) The two most common are 16 and 18 doing about 70 % of all invasive cervical carcinoma ( 60 % related to HPV 16 and 10 % to HPV 18 ) the whom people The others types of HPV are known as low hazard and they normally associated with venereal warts ( particularly 6 and 11 ) which can turn in the venereal portion in both work forces and adult females ( neck, anus, vulva, vagina, phallus, and scrotum ) and they cause a important morbidity. ( WHO2007 ) , They are really seldom associated with cervical malignant neoplastic disease, but can take to low class alterations in cervical cells which are really similar to those caused by high hazard types. These low lesions are symptomless and impermanent, nevertheless, in some fortunes can germinate and take to high lesion or invasive malignant neoplastic disease. Table: summarizes the different phases taking to cervical malignant neoplastic disease ( ACCP2004 ) HPV infection Low-grade lesions High-grade lesions Invasive malignant neoplastic disease HPV infection is highly common among adult females of generative age. The infection can prevail, take to cervical abnormalcies, or decide on its ain. Low-grade lesions are normally impermanent and vanish over clip. Some instances, nevertheless, advancement to top-quality lesions. High-grade lesions, the precursor to cervical malignant neoplastic disease, are significantly less common than low-grade lesions. High- grade lesions can develop from low-grade 1s or straight from relentless HPV infection. Invasive malignant neoplastic disease develops over the class of several old ages and is most common among adult females in their 50s and 60s. Beginning: Adapted from PATH 2000. HPV is a necessary cause but non sufficient to come on from HPV infection to invasive cervical malignant neoplastic disease, there are other lifestyle factors that increase the chance to develop the malignant neoplastic disease including high para, immature age at first bringing, being in polygamous matrimony, adult females with hubby ‘s adulterous sexual relationship ( D. Hammouda and co-workers 2004, 2011 ) , long term usage of unwritten contraceptive method, baccy smoke, certain dietetic lacks, hapless sanitation, multiple sex spouse, low socio economic position, and life in a rural environment. In add-on, co-infection with HIV, Chlamydia Trachomatis, and Herpes Simplex Virus type 2 ( HSV 2 ) . , ( whomb people ) HPV was incriminated in many other anogenital malignant neoplastic disease ( anus, vulva, vagina, and phallus ) and malignant neoplastic diseases of the caput and cervix. Understanding that HPV is the primary implicit in cause of cervical malignant neoplastic disease has focused attending on the potency of early sensing of the infection through the cervical showing. Screening for cervical malignant neoplastic disease is based on the usage of the Papanicolaou cytology technic ( Pap smear trial ) in which doctors or nurses expose the neck by speculum and take cells from the squamous epithelial tissue and transmutation zone to observe unnatural precancerous cells. The American College of Obstetrics and Gynaecology suggest that adult females should have the first testing trial 3 old ages after the first sexual intercourse They besides recommend that adult females should go on having cytology testing annually until the age of 30, from than they can have it every 3 old ages. Harmonizing to the same college, menopausal adult females have a lower opportunity to develop unnatural cervical cells ; nevertheless, there is no upper age bound to halt the showing. ( Whom people ) Primary bar have focused on hygiene and cut downing hazards factor by â€Å" cut downing the figure of sexual spouses and promoting the usage of barrier preventive particularly rubbers, † ( ACCP2004 ) Recently a new vaccinum which has the potency to protect against certain type of HPV infection ( 16 and 18 ) has been licensed to underpin the preventative plan against cervical malignant neoplastic disease. The vaccinum has been used in many developed states and shown great consequences in cut downing the load of the disease, but it has non been introduced in Algeria yet Pap smear as a cervical malignant neoplastic disease testing trial Algeria is one of the development states where cervical malignant neoplastic disease remains a major wellness public issue. although the application of testing plan, a big population remain under screened, the result are really modest and the incidence of cervical malignant neoplastic disease is ever high and this could be contributed to the deficiency of consciousness about testing trial among adult females and some specific cultural wellness beliefs barriers, non surprisingly that big proportion of the patients are diagnosed with advanced phase of the invasive cervical malignant neoplastic disease, interestingly, even most of the wellness attention suppliers have ne’er had a pap vilification. ( ref hazard factor ) . Surveies show that comprehensive cervical malignant neoplastic disease showing is modest in low resources states ; hence a low engagement in Pap vilification and a low follow up when it is done the first clip. It has been stated that testing plan in these states and even among minorities and Aboriginal adult females faced many obstructions ; deficiency of sufficient research lab substructure, high cost of wellness attention, unequal trained wellness attention suppliers, absence of supplier ‘s recommendation and a deficiency of appropriate educational plans in these states that indicate the hazard factors of this disease, the importance of testing at early phase, and the power of the Pap smear trial to observe the disease in its premalignant phase and so the possibility of full remedy and bar. ( S.T. Tavafian 2012 ) In add-on to these financess and human resources lacks that can hindrance an effectual and organised testing intercession, there is besides the deficiency of cognition from the patients sing preventable cervical malignant neoplastic disease every bit good as the socio-cultural position barriers, such as embarrassment from pelvic scrutiny that have been argued as one of taking obstruction to non having testing trial, ( S.T. Tavafian 2012 ) another factor is the fright of topic and the entrenched belief that malignant neoplastic disease can non be cured, the deficiency of optimum cognition about testing patterns ; this utmost fatalistic attitude about malignant neoplastic disease among different states lead adult females to see diagnosing as a â€Å" decease sentence † and so the turning away of the trial, ( V.Thomas and co-workers 2005 ) there is besides undertakings identified spiritual beliefs, the limited linguistic communication ability as another major perceived barrier, t he deficiency of societal support, the low socio economic position and the unequal functional wellness literacy. There is a survey that has been conducted in Spanish among low income Latinas, that found that adult females with unequal functional wellness literacy are 16 times less likely to have a Pap smear trial ( S.T. Tavafian 2012 ) It has been illustrated that Individual ‘s beliefs, cultural background, cognition about a peculiar unwellness are significantly interconnected with the health care seeking and wellness promotional behavior, Al-Neggar and his co-workers concluded that some misconceptions and incorrect beliefs may carry on to the hapless pattern of cervical malignant neoplastic disease testing among adult females, despite the equal cognition sing the hazard factors ( Al-Neggar and co-worker ( 2010 ) . One of theoretical theoretical accounts that could be used to place the determiner of malignant neoplastic disease showing and measure the influence of people ‘s beliefs on their determinations to take up malignant neoplastic disease showing is the wellness belief theoretical account. Harmonizing to the constructs of this theoretical account, persons are more likely to take up testing if they are motivated plenty about their wellness, and they regard themselves as susceptible to develop malignant neoplastic disease, believe that effectual intercession would be good to cut down the susceptibleness and the badness of the status. Health belief theoretical account as a theoretical model for foretelling behavior The wellness belief theoretical account is one of the theory the most normally used in wellness publicity and wellness instruction, ( chapter 4 ) it was developed in the early 1950s by a group of societal psychologists to explicate the widespread failure of people to follow the disease preventative plans suggested and testing trial recommended to observe and forestall the disease at its symptomless phase, Subsequently it was applied to analyze the response of patients to diagnosed disease and their conformity with prescribed medical regimens. ( Nancy and co-workers 1984 ) This theoretical account aims to explicate the patient ‘s ideas procedure behind his preventative attitude instead than his behavior after acquiring the unwellness. The underlying construct of the theoretical account is that wellness behavior and willingness of people to prosecute in a preventative plan or to take up a screening trial are determined by personal beliefs and perceptual experience of the disease in add-on to the different resources available to forestall its happening, ( chapter 4 ) The theoretical account provides guidelines to develop schemes for effectual intercession and execution by leting contrivers to understand the grounds for non conformity with the recommended suggested preventative systems. This theoretical account assumes that person ‘s wellness behavior is determined by five psychological factors: perceived susceptibleness, perceived earnestness, ref perceived benefits and perceived barriers to effectual conformity ; cues to set into action, late, there are others concepts that have been added to the theoretical account called modifying or actuating factors such as mass media enterprises, run, personal stuffs, societal support, wellness professional and self-efficacy. ( V.Thomas and collegues 2005 ) Copier le tableau Articulation of cervical malignant neoplastic disease testing behavior to the HBM model In this subdivision ; I will seek through the concepts of the Health Belief Model to explicate the relationship between adult females ‘s belief and wellness behavior in Algeria Perceived susceptibleness: personal hazard or susceptibleness is referred to the personal belief about the likeliness of undertaking a disease ( S.T. Tavafian 2012 ) , it is one of the most powerful factor that influence people to follow a healthy behavior, â€Å" the greater the perceived hazard, the greater the likeliness of prosecuting in behaviors to diminish the hazard ( chapter4 ) . For testing plan, adult female will be interested to take up a smear trial if she is cognizant plenty of the possibility to acquire cervical malignant neoplastic disease by undertaking HPV infection, and that she is exposed to this hazard every bit long as she is sexually active. The HBM predicts that adult females are more likely to follow with cervical malignant neoplastic disease testing recommendation if they believe that they have risk factor of cervical malignant neoplastic disease ( Glanz et and co-workers 2008 ) , and frailty versa, the belief of non being at hazard for cervical malignant neoplastic disease or HPV infection preclude ( deter, empeche ) adult females to prosecute in such plan, And this is why most virgin adult females in Algeria underestimate the necessity ( believe the futility ) of smear trial as they think they are protected from the hazard of HPV infection because they are non married. Or in other words, because there is no sexual intercourse, virgin adult female does non comprehend her exposure to cervical malignant neoplastic disease, although surveies show that HPV has been found in some female virgins, which means that the virus does non ever necessitate perforating sex to be transmitted, And that it may be spread through non pe rforating sexual contact ; and even within married adult females, the construct that HPV infection is related to multiple sex spouse make them believe they are safe from the hazard since they have one spouse, disregarding the hubby sexual behavior, as many work forces in Algeria have adulterous sexual relationship underground that the married woman unawares, and so she does n’t see herself as susceptible to the hazard. Another badgering factor is that youngest adult females consider malignant neoplastic disease to be an aged disease, while older adult females harmonizing to cervical showing age bound might believe that they are no longer at hazard ref ( V.Thomas 2005 ) , and so there is a incorrect perceive of susceptibleness. Perceived badness: refers to the earnestness of the disease as assessed by the patient, it is normally based on medical information or personal cognition from telecasting, wireless or cusps, or it may come from the belief of a individual about the effects that would make a peculiar disease whatever clinical such as decease, disablement, or societal like household life and societal dealingss ( chapter4 ) , ( S.T. Tavafian 2012 ) , For testing trial, if adult females believe that cervical tumor is a terrible disease that would take to serious troubles for her and her household, she will see bar as a precedence and so she is more likely to have a Pap smear trial. Besides holding knowledge about Pap smear trial and its importance to observe the invasive disease at early phase will actuate her to have one, because many adult females realise the badness of cervical malignant neoplastic disease but lack cognition of testing plan, and available service. Despite the acknowledgment that cervical malignant neoplastic disease is a serious issue, most of adult females in Algeria believe that there is no intervention, which make them see testing trial as futile and this possibly reflects the spiritual beliefs and the cultural background that may act upon their attitude, Algeria population as most of Muslims agree that unwellness, recovery and decease are all determined from God, so â€Å" The bulk believe that testing would non protract their lives and when the clip of decease comes no 1 can force it off † ( K, Salman2011 ) Another point is that the fright from possibility of designation unnatural cells would needfully take to other probes frequently influence the willingness of the adult females to go to, particularly when there is no 1 to watch the kids during the showing and the deficiency of important support. ( chapter4 ) In Algeria, as in many other Arabic states, â€Å" malignant neoplastic disease showing is normally recommended for diagnostic intents instead than being used as a tool for secondary bar † ( K, Salman2011 ) most of adult females consider the absence of seeable symptoms as a mark of good wellness hence they do non seek wellness attention unless the disease manifests itself and starts to disenable her day-to-day activities, and so the malignant neoplastic disease is frequently diagnosed at its advanced phase. Perceived benefits is about the individual ‘s sentiment on how much may new behaviour lessening the hazard of a peculiar disease, the HBM predicts that most people have tendency to follow new behavior which is seen as a healthy behavior when they believe the capableness of this new behavior to diminish their hazard of developing a disease ( Glanz and Colleagues 2008 ) Perceived benefits play a major function in the acceptance of secondary preventative intercessions such as showing, for illustration, if adult females believe that Pap smear is of import for early sensing of the precancerous lesions and bar of malignant neoplastic disease that will actuate them to take part in secondary bar pattern by seeking cheques up and periodic showing. Therefore adult females are non expected to prosecute in any screening plan unless they perceive that this plan is potentially good to cut down the hazard, and so wellness attention suppliers should explicate to the patient the ability of testing trial to observe alterations in neck before they develop to malignant neoplastic disease, which make intervention easier and bar effectual. Sensed barriers: relate to the person ‘s vision of the obstructions he will confront if he decides to follow a new behavior. In order to set about a recommended behavior, a individual needs to believe that the benefits expected from it outweigh the results of his old behavior ; this enables him to get the better of the sensed barriers and to follow the new behavior ( chapter4 ) For illustration, if adult female believes that benefits of undergoing a screening trial outweigh the obstructions that she may confront, she is more likely to obtain Pap trial. Previous surveies have showed that adult females who perceived the Pap smear testing as a painful and awkward procedure were less likely to obtain cervical malignant neoplastic disease showing, in the same surveies adult females reported many cause that deter them to take the action, such as a negative old experience, included hurting, hemorrhage, or being faced with inexperient practician who did n’t explicate the process to them during taking the sample, linguistic communication troubles was another barrier due the perceive that she will be unable to pass on decently with the wellness attention supplier, and to construct a trusting relationship. Even those who appreciated the necessity of the showing, the fright of the trial procedure was a great obstruction for them, as most of adult females find it uncomfortable, and perceive the metal speculum as a painful instrument. ( Abdullah 2009 ) Shyness is another major hinderance that may discourage testing procedure, and It is really common for adult females to decline to uncover her organic structure parts to undergo a physical test or a medical processs particularly when the wellness supplier is a adult male, and even the treatment about a sensitive wellness issue like matrimonial relationship, sexual activity and reproductively is regarded as really private, and should n’t be disclosed to other people, particularly work forces, and even hubby may sometimes non be involved in his married woman ‘s wellness issue if it is related to her generative variety meats. ( K, Salman2011 ) Cues to action: are the ensemble of events, things, people that motivate a individual to alter his behavior, and this can be aggregate media such as telecasting, wireless, advice from a household or friends, cusps, information booklet, runs, recommendation from wellness supplier, ( chapter4 ) Womans are more likely to take up a pap trial if she receives adequate information about the benefits of the trial from her GP or Gynaecologist, if she receives advice from another adult female who had the trial, if she is encouraged by a member of her household particularly the hubby or if she knows person in her cortege with a history of malignant neoplastic disease, all those factors are susceptible to cut down the sensed barriers to malignant neoplastic disease showing. Perceived self-efficacy: it refers to the belief of the individual in his ain ability to follow the behavior required, because people by and large do n’t prosecute in making something unless they believe they are able to accomplish it. ( Chapter 4 ) Modifying factors: in add-on to what it has been already said, There are other factors that seem to act upon the willingness of adult females to take up the trial such as unequal cognition about the showing, deficiency of swearing relationship with the wellness provide, deficiency of assurance in the importance of the trial, high cost of the trial, fright of the consequence of the trial and superstitious notion that speaking about malignant neoplastic disease would convey it, some stigmata imposed by the community and even sometimes the household that cervical malignant neoplastic disease is related to promiscuousness, Perception of the Pap vilification as a menace for the adult female ‘s virginity, some fatalistic attitude that unwellness, recovery and decease are associating to â€Å" god ‘s will † and that testing trial is futile, Low socioeconomic position, deficiency of societal support, poorness, deficiency of wellness insurance ( J.Hatcher and co-workers 201 1 ) , childhood sexual maltreatment, fleshiness, low degrees of instruction, kid attention, deficiency of transit. Cervical malignant neoplastic disease screening- publicity intercessions based on HBM Today, the HBM is used by many research workers to guideline the development of schemes for effectual wellness intercession, In this subdivision, I will seek to summarize some determination from the different intercessions based HBM that push me to propose this theoretical account to better adult females ‘s behavior in Algeria. The wellness belief theoretical account has been used by several survey, entirely or combined with other wellness publicity theoretical accounts to and to better belief and behavior among adult females sing the showing plan, an illustration of this survey, has been conducted in Iran, in 2010, this survey showed that the â€Å" HBM has formed the footing for an interventional plan to better behavior among Persian adult females † , ( S.Tavafian2012 ) , The survey was conducted with 70 volunteers- aged between 16 and 54 old ages, and they had ne’er received Pap trial, the participants were divided into many little groups, and each group underwent a session of 2 hr preparation. For the informations aggregation tool, a self-administered multi-choice questionnaire was developed based on the constructs of the HBM. The personal belief and wellness pattern of all the adult females were assessed pre intercession and four months subsequently, the findings reported that wellness in struction based on HBM concept was effectual, and could advance the participant ‘s cognition and better the different constituents of the theoretical account ( sensed susceptibleness, badness, benefits, and barriers ) .The developing plan that has been used enhanced the willingness of adult females to pattern the testing trial significantly. The survey concluded to the fact that instruction plan based on HBM concepts can alter adult females ‘s wellness beliefs, heighten their cognition about the cervical malignant neoplastic disease and the screening trial, and actuate them to follow a new behavior. ( S.Tavafian2012 ) Another survey in Somali was about an educational programme about the intent of the screening trial, to promote Somalis to set about the trial. The participants praised the enterprise and suggested that such information should be provided in a community scene, because it would assist adult females to comprehend the value of the trial, and to get the better of the different fatalistic barriers to testing. further, Participants suggested bettering the consciousness of testing among adult females via mass media: Television, wireless, picture, DVDs, CDs and audiotapes ( Abdullahi, 2009 ) , Health publicity ( ACCP 2004 ) ( reexamine the rubric ) There is a deficiency of information sing wellness publicity theoretical accounts that have been used to act upon wellness behavior among adult females in Algeria, and even there is no description how the intercession methods were selected, Alliance for Cervical Cancer Prevention ( ACCP ) consists of five international wellness organisations who portion all the same end to forestall cervical malignant neoplastic disease in limited-resource countries.it aims through its undertakings to implement an effectual bar schemes to understate the load of the cervical malignant neoplastic disease.unfortunately, Algeria has non been included in this enterprise, through my reappraisal of this manual, I would propose it as an attack to better adult females ‘s wellness is Algeria and to advance wellness service bringing. Many method of diagnostic, testing and intervention are presently used. And each of them has strengths and restrictions, this method should be reviewed to pick up the most appropriate for the patient, for the showing for illustration the Pap smear trial is the most normally used, this trial requires multiple and regular visit from the client, which can be a barrier for the adult female to go to it, The ACCP suggest some alternate attack with better sensitiveness and specificity such as Human papillomavirus ( HPV ) DNA proving, or ocular showing, a low cost method with an immediate consequence. As a wellness attention installation, they suggest to unite the intervention of precancerous lesions to the showing procedure, and suggest some effectual and safe methods that should be performed by doctor and non physician. These intervention methods allow remedy and histological confirmation at the same clip, it has been shown that this enterprise was praised by adult females and suppliers every bit good, and it has a great consequence to take down rate morbidity. The combination of both effectual showing attack and intervention would get the better of the restriction. Facility adult females ‘s entree to precancer intervention services, through choosing a plan to associate testing services to precancer intervention services. This would increase the effectivity and promote adult female to follow up. Achieving widespread testing coverage of the mark population by choice of well-organised bar attack. And this may include the policymakers and governments who should promote the investing in cervical malignant neoplastic disease bar Planing an effectual bar intercession: Planing a bar plan requires a coordination between a multidisciplinary direction squad, that include clinical, administrative, and preparation specializers. To accomplish the plan ‘s aim, the squad members should follow a participatory procedure which includes besides the position of laic people who are concerned by the result of this plan, and this will let accomplishing a high showing coverage with satisfactory consequence. Bettering wellness services and laboratory substructures: bringing services should be accessible, acceptable, low-cost, and dependable to fulfill the client and guarantee a high coverage of the population mark Training: Ensuring Performance to Standard Ensure to measure up a competent staff and wellness supplier, to pull client to utilize the installations available and this would go on by developing session that enable supplier to confidently offer dependable services Supplying Information and Counselling to Address Community and Client Needs Women mark group should be informed enough the benefits of showing and handiness of bar services to increase the effectivity of the plan, and this could go on by direct contact between adult female and wellness worker or through aggregate media and run, Social web intercessions, mailed invitation missive for showing and reminders, information booklet which are really popular to distribute information about wellness subjects. It has been stated that direct supplier contact is more effectual to increase the usage of bar services as the single guidance will turn to concerns and emotional demand and should be more convincing Overview of showing, intervention and Palliative Care services of cervical malignant neoplastic disease Cervical malignant neoplastic disease showing services, cervical malignant neoplastic disease intervention, and alleviative attention services should be continuously linked to guarantee the effectivity of the plan. Decision Plans should be planned strategically, be based on realistic appraisal of demands and capacities, and use the most recent grounds on showing and intervention attacks. ie hapless public presentation of cervical malignant neoplastic disease bar plans in some limited-resource scenes has most oi‚?en been the consequence of hapless planning and execution and deficiency of systems for ongoing monitoring and rating, irrespective of the screening trial or intervention methods used. Establishing mechanisms and procedures to back up and prolong each constituent of a plan will travel far to guaranting that services are effectual, accessible, and acceptable to adult females who need them. How to cite Global Burden Of The Disease Health And Social Care Essay, Essay examples

Saturday, May 2, 2020

Information Systems Management Original Purpose of Hacking

Question: Describe about hacking methods, social Engineering, implementation of defensive tools while using internet: Using firewall, antivirus and applying safe surfing practices? Answer: Introduction: Although the term hacking implies the technique of gaining unauthorized access , into ones computer, original purpose of hacking is finding weaknesses of a system (Sandiego.gov, 2015).Waguih (2013) opined that the task of gaining access into a system for stealing information can be considered as cracking. However according to Vacca (2013) techniques which are used for accessing information without authorization can be classified as black hat hacking technique. Analysison security systems indicates that the incidentsof stealing confidential information for personaluse are increasing rapidly. Although advanced tools are being developed todefend these unauthorized attacks, the existing defending systems are not sufficientfor ensuring security of confidential data. Apart from this hackers are using highly advanced techniques for gaining information and the use of known conventional hacking techniques isdecreasing. Changesin common hacking process are increasing difficulty for data storin g process. On other hand, although the conventional hacking processes are familiar to system operators, often security of data is affected by these techniques also. The current essay deals with analysis of hacking techniques which are currently being used by hackers. The essay also contains discussion on the available methods fordefending such attacks. Hacking methods: Hackers apply expert knowledge for developing hacking techniques. As a result, several hacking methods are available to gain unauthorized access intoa system. However, in current essay some of the most common hacking techniques arediscussed. Key Loggers: Password stealing can be considered as the most common way of hacking (Perkins, 2015). Baloch, (2014) opines that password stealing can be considered as the easiest methodfor gaining access into a system without any authorization. However, the task of password stealing can be done using Key loggers. Although key logger techniques can be applied by using both hardware and software, use of software key loggers ismore asthissoftware provide more flexibility to user (Perkins, 2015). Key logger programs are easilyavailable in market as a form of small software. Such programs are used to detect every stroke on the keyboard of a system. When the user of a computer, where key logger software is installed, tries to access any account by using user ID and password, the installed software detects every activity on keyboard and stores it in a log (Baloch,2014).However, the hacker can get information regarding user ID and password by simply opening the software log. This information on password a nd login ID can be used to access confidential data easily. Perkins (2015) opines that Key logger software runs at the backend of a system. According to Baloch (2014) as the key loggerdoes not appear at the front end if a system, it is difficult for the user toidentify presence of this software. Shea (2013), states that installation of key loggerdoes not require in depth knowledgeon software systems. As a result, it can be installed by anyone without knowing the purpose and it increases the chances of being tracked by this software. Thissoftware can be installed withinnegligibletime. Even the hardware loggers can also be installed by simply plugging it into USB port of a system (Seo et al., 2013). Kizza (2014) also stated that installation process of key logger can be completed within little time and this timeefficient nature also caused increasein use of such software.Hackers always prefer to use those methods which not increase the chances of being tracked while accessing secured data withoutpermission.Getting informationabout the hacker is impossibleif key logger method is used accessing a system. Torney, (2012) stated that difficulty in tracking unauthorized activities increased effectiveness of key logging techniques to hackers. Although key logging techniques can be implemented easily, in case of most hardware and software key loggers, the hackers need to access asystem physically(Baloch,2014).Tariq et al. (2012) states that the need of getting physical access to a system reduces efficiency of logging systems specially use of hardware loggers is limited by this feature. However hardware loggers can be used in any operating systems whereas use of software loggersdepend onthe nature of operating system of a computer(Andhare, 2012).Sun et al. (2014) states that computers which are using operating systems other than Linux , have less chances of being attacked by key logger software as most of these software are compatible with windows operating systems. However chances of being attacked of Unix or Linux computers does not reduces completely as hackers can use hardware key loggers forgetting confidential information from these machines (Kizza, 2014). Viruses and worms: Although most of the activities relatedwith hacking take place to fulfill the purpose of accessing secured information, often the hackers are found to gain access of a system for affecting its functionality(Baloch,2014).Viruses can effectively destroy the working capabilities of a system bygenerating unwanted dataflowwithin it.Shea and Liu (2013) statethat virus-attack in a computer can cause hugefinancial loss for a system.Financial loss can be large even if the security of data is not affected. On other hand, Shea (2013) states that viruses are more effective than other hacking techniques as this software does not require physicalaccess to acomputer forinfecting it. Viruses are also small pieces of software which have ability to replicate themselves(Sandiego.gov, 2015). When a virus program is installed into a system, it starts attaching itself withother programs (intosaiitaudit.org, 2015). According to Shakarian et al. (2013) once a virus attaches itself with a program, it gets mo re chancesfor regenerating itself.Whenever the use of computerruns the virus infected program, it is replicated and attached with other programs. Thus the while system becomes infectedand presence of infected programs interrupts is functioningprocess. Viruses are available in various forms (Seo et al., 2013). High availability if such software increases its use by hackers.However, among the availabletypes of computer software, viruses of three types are used in most cases.Perkins (2015) opines that all viruses do not have the ability of self-replication, but they can damage a system equally. Sometimes theviruses which have no ability of being replicated automatically are found to be more harmfulthan those which can be replicated (Sun et al.2014). Types of viruses: Trojan horse is a type of computer virus which does not have the ability of replication. But these programs can erase important data stored in hard disk while running. It indicates that attack of Trojan horse cancause significantlosses if the data cannot be retrieved. Worm can be considered as one of the traditional viruses which are used by hackers. Worms affects asystem through conventional working method of a virus.Worms are easy to be transferred into machines. However, once the worms are transferred into a system, the programs start finding other programs ofcomputer for being attached. Oncethe infected programs start running, the worms become able to attach them with otherprograms which are already present in computer (Sun et al.2014). According to a program which is infected byworm cannot be executedefficiently. If the infected programs run for multiple times, efficiency of all programs residing within the system reduces. Although most of the worms attachit with any program and causeinterruptionin program execution, the nature of damage dependson program written by its creator. Creeper, one of the primary models of worms, used to propagate through different nodesof a system using ARPANET (Kizza, 2014).Creeper caused interruption in program execution by displaying unnecessary messages. However, the worms are innovated largely and worms which are used currently by hackers are able to cause significant losses(Seo et al., 2013). Mydoom can be considered as one of the most discussed worm in modern times.It used e-mail services for being installed into a system. After being installed the worm replicates itself and these copies are sent to different address writtenin address book of email account. After that the worm copied itself for being connected with shared devices.Once Mydoom is installed in a computer, the hacker can access it any time and it increases the security risks several times (Palmer, 2015). The above analysis indicates that risks caused by worms increased significantlywith advancement oftechnologies. However, Grossman (2015) states that increased availability of internet enhanced the enhanced the power of malicious software.According to Periyasamy (2013) theincidents ofworm attack are increasing as these programs are being transferred using e-mails.Most of viruses are freeware. Palmer (2015) stated that use of virus and worm not only provide the hackers with opportunity of stealing information at low cost, but it also increases flexibility of modifying availablesoftware according to requirements. Although viruses are extensively used for hacking, high availability of antivirus software limits effectiveness of viruses (Saleh et al.2013). Denial of service: Denial of service (DoS) attacks preventsthe authorized usersfrom usinga system by generating flowof unimportantdata into a network (Vacca, 2013).Hacker often uses Trojan horses for generating huge traffic within a network. Min et al. (2013) states thatDoS attacks are not directlyinvolved withstealing data but theabilityof interrupting data access process of authorized users make these attacksequally risky as other data stealing methods. However, analysis of current hacking trends indicatesthat hackers are now showing preference to use DDoS (Distributed Denial of Service) attacks. As stated by Kumar and Surisetty (2012) DDoS attacks makes the process of data access almost impossible for being executed as inthis case, unwanted traffic comes from multiple computers to the target system.DoS attacks not only interrupts data access for a short time , but its impacts can harm system for long time also if the internet services are terminated due to presence of huge traffic in network (Palmer ,2015). Social Engineering: Social engineering is one of the most used hacking techniques. Implementation of hacking through social engineering can be done by using human based and computer based methods (Seo et al., 2013). In case of Human based social engineering techniques for hacking, one person can pretend as an important user of a network and can collect personal information from other users of the system (Kizza,2014).However, Held (2013) states that chances of successful hacking increases due to use of computer based social engineering techniques. Machinebased social engineering techniques which are used in most cases includephishing,baiting and online scams. Comparative analysis on all three techniquesindicates that chances of being victims of phishing and baiting canbe controlled by applying safe practices of e-mail handling while using internet. On other hand, one can be easily affected by baiting as baiting techniques can be implemented while downloading movie or music from internet(Sun et al.2014). Sniffing and spoofing: Sniffing and spoofing are two emerging techniques of hacking. However, both the techniques are highly advanced and the incidents of data security loss are increasing due to use of these techniques. The act of sniffing is not used for stealing data from a single computer, but this technique is capable of providing access to the data transmitted over the whole network to an unauthorized user. However, sniffing often is used by legitimate users for data monitoring. Although sniffing is used for monitoring data, it can be harmful when being used by black hat hackers and cracker as the data can be manipulated by them. Spoofing is another technique which uses e-mail services for getting unauthorized information. E-mails which are sent by hackers appear as the e-mails sent by legitimate senders. Whenever, a user tries to open or read such e-mail, important information regarding the user is accessed by hackers. As the victim does not identify the incidentsof information stealing, damages caused by such techniques increases (Saleh et al.2013). Analysis on defending systems: Although the incidentsof hacking are increasing rapidly, the chances of being victim of any such incidents can be reduced significantlyby applying several simple techniques while using a system. Grossman (2015) states that most of the attempts of hackers become successfulas thecommon users lack updated knowledge on internet use. However, themethods which can be used for preventing hackers include getting information on theoperating system (OS) of a computer, developingsafe habits of internet use, implementing defensive tools while using internet etc. one requires updating knowledge on internet to increases system security (Dondyk et al.2013). Importance of getting sufficientinformation on OS: Analysis on the hacking techniques indicates that the chances of being hacked depend on OS in a system. However all operating systems contain some features for increasing security of the machine. A user requires utilizing all these security measures provided by OS to prevent hacking.Coleman (2013) states that security techniques of OS can effectively prevent a system from being used byunauthorized people. Onother hand, Chung (2012) suggests that only utilization of OS features is not enough for enhancing security of data. As the number of on line hacking is increasing, system users also require to apply defensive tools for prevention of online scams (Vacca, 2013). Implementation of defensive tools while using internet: Using firewall, antivirus and applying safe surfing practices (Above Infranet, 2015) As most of the hacking techniques including socialengineering, sniffing, spoofingand so on are being applied using internet users requireunderstanding and implementing defensivetechniques to prevent hacking. According to Bosworth et al. (2014) use of firewalls is one of the basic techniques which increase network security. Although firewall prevents unauthorized users from accessing a system, using only firewall does not ensure system security (Vacca, 2013). Firewalls can be disabledeasily and once it is the system security reduces. Andhare (2012) stated that developmentof safe internetpractices is the most effective forpreventing hacking attacks. The activities like downloading filesfrom internet require to be controlled for increasing system security.As most of the internet hacking techniques areimplemented using e-mails by following some guidelines such as reading only those e-mails which are coming from known sources can keep the system secured (Kizza, 2014).However Al-Saleh et al.(2013) considers that lack of knowledge of e-mail users are responsible for increasing risk of a system. Baloch (2014) also suggests that prevention of hacking by applying safe surfing techniques is one of the most useful defensive techniques as one does not need technological knowledge for following these practices. After maintaining safe internet surfing guidelines properly, the chances of being hacked does not reduces completely as the hackers alwaysinnovate known techniques. Use of antivirus software makes the system secured even if any malicious software enters into machine (Fu-Hau Hsu et al. 2012).However the level of security provided by antivirus can vary according to design of the software. The current analysis on defending systems indicatesthat noneof theavailable techniques is sufficient for protecting asystemif it is used alone.Users require implementingdifferent technique together to increase security of a system. Conclusion: Discussion on hacking methods reflects that the number of hacking is increasing due to availability of internet. Current trend of hacking indicates that availability of internet enabled hackers to develop new ways of information stealing. However, the conventional methods of hacking are also being innovated and this increasing the risk of confidential dataloss. As the incidents of hacking are increasing, new tools for preventing unauthorized access are also being developed. However, level of security increases if these tools are used efficiently. References Above Infranet, (2015). Our Firewalls and Antivirus - Above Infranet. [Online] Available at: https://aboveinfranet.com/solutions/security-solutions/firewalls-anti-virus/#.VPllD_msWSo [Accessed 6 Mar. 2015]. Al-Saleh, M., Espinoza, A. and Crandall, J. (2013). Antivirus performance characterisation: system-wide view. IET Information Security, 7(2), pp.126-133. Andhare, M. (2012). Mitigating Denial-of-Service Attacks Using Genetic Approach. IOSRJEN, 02(03), pp.468-472. Baloch, R. (2014). Ethical Hacking and Penetration Testing Guide. Hoboken: Taylor and Francis. Bosworth, S., Kabay, M. and Whyne, E. (2014). Computer Security Handbook, Set. Hoboken: Wiley. Chung, Y. (2012). Distributed denial of service is a scalability problem. SIGCOMM Comput. Commun. Rev., 42(1), p.69. Coleman, E. (2013). Coding freedom. Princeton: Princeton University Press. Dondyk, E., Rivera, L. and Zou, C. (2013). Wi-Fi access denial of service attack to smartphones. International Journal of Security and Networks, 8(3), p.117. Fu-Hau Hsu, Min-Hao Wu, Chang-Kuo Tso, Chi-Hsien Hsu, and Chieh-Wen Chen, (2012). Antivirus Software Shield against Antivirus Terminators. IEEE Trans.Inform.Forensic Secure., 7(5), pp.1439-1447. Grossman, J. (2015). Cross-Site Scripting Worms Viruses the Impending Threat the Best Defense. [Online] www.whitehatsec.com. Available at: https://www.whitehatsec.com/assets/WP5CSS0607.pdf [Accessed 3 Mar. 2015]. Held, G. (2013). Windows networking tools. Boca Raton, FL: CRC Press. intosaiitaudit.org, (2015). The basics of protecting against computer hacking. [Online] Available at: https://intosaiitaudit.org/intoit_articles/19_03_Hacking.pdf [Accessed 3 Mar. 2015]. Kizza, J. (2014). Computer Network Security and Cyber Ethics. Jefferson N.C.: McFarland Company, Inc., Publishers. Kumar, S. and Surisetty, S. (2012). Microsoft vs. Apple: Resilience against Distributed Denial-of-Service Attacks. IEEE Security Privacy Magazine, 10(2), pp.60-64. Min, B., Varadharajan, V., Tupakula, U. and Hitchens, M. (2013). Antivirus security: naked during updates. Softw. Pract. Exper. 44(10), pp.1201-1222. Palmer, C. (2015). Ethical hacking. [Online] pdf.textfil.es. Available at: https://pdf.textfil.es/security/palmer.pdf [Accessed 3 Mar. 2015]. Periyasamy, (2013). A PROFICIENT TRACEBACK APPROACH USING PROVINCIAL LOCALITY ASPECTS TO ELIMINATE DENIAL OF SERVICE ATTACKS. Journal of Computer Science, 9(2), pp.271-276. Perkins, J. (2015). Access Control Policy. [Online] www.lse.ac.uk. Available at: https://www.lse.ac.uk/intranet/LSEServices/policies/pdfs/school/accConPol.pdf [Accessed 3 Mar. 2015]. Sandiego.gov, (2015). Hacking and Viruses | San Diego Public Library. [Online] Available at: https://www.sandiego.gov/public-library/services/specialresources/pctech/child/ethics/virus.shtml [Accessed 3 Mar. 2015]. Seo, D., Lee, H. and Perrig, A. (2013). APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks. Computers Security, 39, pp.366-385. Shakarian, P., Shakarian, J. and Ruef, A. (2013). Introduction to cyber-warfare. Amsterdam [Netherlands]: Morgan Kaufmann Publishers, an imprint of Elsevier. Shea, J. (2013). Combating computer viruses. New York: Gareth Stevens. Shea, R. and Liu, J. (2013). Performance of Virtual Machines under Networked Denial of Service Attacks: Experiments and Analysis. IEEE Systems Journal, 7(2), pp.335-345. Sun, S., Jiang, M., Ma, X., Li, C. and Liang, L. (2014). Hacking on decoy-state quantum key distribution system with partial phase randomization. Scientific Reports, 4. Tariq, U., Malik, Y. and Abdulrazak, B. (2012). Defense and Monitoring Model for Distributed Denial of Service Attacks. Procedia Computer Science, 10, pp.1052-1056. Torney, M. (2012). New Integrated Defence and traceback approach for Denial of service attacks. IOSRJEN, 2(1), pp.106-110. Vacca, J. (2013). Computer and information security handbook. Amsterdam: Morgan Kaufmann Publishers is an imprint of Elsevier. Waguih, H. (2013). A Data Mining Approach for the Detection of Denial of Service Attack. IAES International Journal of Artificial Intelligence (IJ-AI), 2(2).