Tuesday, August 25, 2020

The poor in the UK

The poor in the UK Examine whether the poor in the UK are to be faulted for their neediness and social prohibition? The reason for this paper is to examine the topic of whether the poor in the UK are at fault for their neediness and social avoidance. So as to do this, an assortment of points of view will be broke down, specifically taking a gander at political and financial viewpoints. We will likewise consider Levitas approaches in the region of social prohibition, taking a gander at the three models of social talk, and furthermore a basic assessment of Murrays theory concerning the underclass. Meanings of destitution have generally been isolated inside two subcategories, total neediness or relative neediness. Every definition depends on various encounters of neediness. Supreme destitution sees there is an essential requirement for endurance and this is estimated dispassionately and comes in types of insights. This is basically utilized in government measurements. Relative neediness is distinctive in that it depends on an assessment of individuals in the public arena. Relative neediness utilizes what society or a culture sees as the standard. The most punctual endeavor to investigate neediness was by Rowntree, who directed an examination in York, in 1899. Rowntree received the estimation of total destitution in 1901 dependent on a base week after week pay which was believed to be expected to endure. Consequently, a meaning of total neediness is; Supreme destitution happens when individuals neglect to get adequate assets to help at least physical wellbeing and effectiveness (2006 word reference of humanism) p304 This total measure was not famous with the legislature as estimating destitution dependent on falling underneath a specific advantage level. At the point when the advantages level expanded so did the measure of individuals living in destitution. This issue was illuminated when the 1985 moderate government rejected the Family Low Income Statistics for the Household beneath Average Income (HBAI). This saw the decline of destitution as far as figures on account of the adjustment in the manner neediness was estimated. The term neediness isn't referenced in any of these official government terms, in this way shows destitution isn't recognize as an issue to the legislature. The women's activist contention on utilizing this sort of estimation is that it utilizes insights taken from the family unit with a male provider. Females seem undetectable in these insights and particularly infers that ladies are needy upon men. Be that as it may, there is no proposal that the male provider similarly shares his salary with the family unit. Scott (1994) examines the qualities and shortcomings of total destitution. Right off the bat the qualities, the estimation of outright neediness can be utilized generally across societies and social orders. It tends to be utilized to draw up examinations so Policy producers can utilize this to evaluate and disseminate the pay that is expected to wipe out destitution. These arrangements would then be able to be taken on by analysts to take a gander at if what is being done and on the off chance that it is assisting with lessening neediness. A Weakness of this estimation is that it is extraordinary. In todays society it is ruled by utilization and a buyer way of life. A few societies consider it important to have the option to participate in the customer society. The products that can be purchased regularly have a few uses other than just to make due, for instance a TV isn't a thing of endurance, anyway to work in the public arena the TV has a significant influence and a feeling of solidarity is framed in neighborhoods if individuals can identify with and talk about things highlighted on TV. The total measure disregards this social procedure as it can't be logically estimated as it includes some type of conclusion. Neediness estimations need significantly more than simply depending on saying how much cash is expected to live. Relative neediness can be characterized as, far reaching, ought to rely however much as could be expected upon autonomous or outer models of assessment, ought to include the requesting of a mass of verifiable information normal, efficient and instructive design, and should confine, through not cover, the part played by the worth judgment (Townsend 1979:33) This implies it very well may be estimated factually; anyway incorporate some type of judgment. This relative estimation would incorporate something other than salary and take a gander at buyer society and culture. Townsends, who states people, families and gatherings in the populace can be supposed to be in neediness when they come up short on the assets to get the sort of diet, investment in the exercises and they have the day to day environments and the conveniences which are standard, or if nothing else broadly empowered or endorsed in the social orders to which they have a place. (Townsend, 1979, p.31) This definition covers enough the connection among destitution and social rejection. Townsends examination of relative destitution directed in 1968-9 could think about individuals dependent on the national normal. A significant outcome to come out of this exploration was the hardship file which expressed the 12 things basic for individuals in the public eye, for instance dress, diet, fuel wellbeing and training. In 1985 additional things were incorporated, for example, a people taste, way of life, and monetary social variables. Utilizing the estimation of relative neediness accompanies qualities and shortcomings. It recognizes emotionally and are straightforward in that some type of assessment is required. Information on people groups culture can be investigated as far as what their way of life is. It investigates the sorts of feeling a few people have that they might be denied more than others. Shortcomings of this relative estimation is that if neglects to recognize those individuals who decided to abandon the things expressed in the hardship file. It doesn't address the issues of genuine destitution in that those living in supreme neediness don't having enough to endure. Correlations with different nations are troublesome as others despite everything utilize the outright estimation and use measurements as opposed to suppositions. Piachaud audits Townsends hardship file as a decent estimation as it included individuals that settle on the way of life decisions, for example, being a vegan. He asserts that not having an ice chest for example is more huge than not having meat. In any case, this recommends Townsends record isn't as logical as it claims. (Piachaud 1981) There isn't just a single sort of destitute individuals however numerous that are or could fall into neediness anytime in their life. The underclass is a term used to slander individuals and was utilized during the 1980s mid 1990s. Charles Murray took a shot at the idea of the underclass and portrayed them by three things; wrongness, brutal wrongdoing, and drop out from the work advertise by youngsters (Murray 1990) Murray wrote in 1990 that Britain has a developing populace of working-matured, sound individuals who live in an alternate world from different Britons, who are bringing up their kids to live in it, and whose qualities are currently tainting the life of whole neighborhoods. (Murray, 1990, p.6) Murray talked about the individuals who decided not to work, and rather to depend on benefits as a methods for endurance, instead of joining the work advertise. In Murrays see, this dependence on benefits was considered as a predominant alternative, not if all else fails. An announcement by Murray to depict the underclass utilizing a basic and trashing definition by underclass, I don't mean individuals who are just poor, yet individuals at the edges of society, unsocialised and frequently fierce. (Murray 2001). The term Underclass is a method of trashing a gathering and that Margaret Thatcher denied there being outright destitution as there was no official government definition. Hardship flighty underclass. John Moore secretary condition of government managed savings relative destitution was just another term for disparity he guaranteed that neediness had vanished from Britain by and large. (John Moore 1989) Traditionalist government at the time utilized the term underclass to classify and deny there was outright destitution in Britain. This perspective on the underclass backings that the poor are at fault for their destitution and imbalance than those auxiliary disparities at that point. With this negative idea the preservationists were set to cut government assistance if the underclass didn't alter their way of life. This enlarged the neediness hole and the traditionalists were believed to be flighty and didnt address the issue of destitution in the public eye Instead of considering disparity to be conceivably harming to the social texture, the Thatcher governments considered it to be a motor of big business, giving motivations to those at the base just as those at the top. (Walker 1997:5) This wonder of the underclass attempts to address them as and genuine class in the public eye being at the opposite finish of the scale, for example, the privileged. In any case, to be contrasted and as a class it would recommend there are shared qualities that are novel to the underclass, there are no proof of this and ought not be a class. (Bagguley and Mann 1992). This underclass point of view distracts from the real reason for destitution and attempts to set the thought that this class is natural when there is no proof. Field 1989 saw the underclass from a structuralist see and upheld the view that the underclass didn't come from the individual, however from the philosophies that kept up and molded disparity. These basic causes were expressed as; record post war joblessness, extending class distinction, avoidance of quick enlarging expectations for everyday comforts and open mentalities falling in Thatcher Britain. Direct analysis of Murrays underclass is that it neglects to be demonstrated by logical techniques and depends on assessments. The underclass can't be estimated precisely as the gathering is some of the time made to look tremendous or little relying upon the result required. The underclass point of view can be deluding and not address the genuine issue that neediness is causing to Britain. (Walker 1990:49) In any case, numerous authors were reproachful of this view, including MacDonald, who declares that both youngsters and grown-ups needed work. They would come up short without a hitch the test Murray sets to demonstrate the underclasss existenc

Saturday, August 22, 2020

Persuasive writing Essay Example | Topics and Well Written Essays - 500 words - 1

Enticing composition - Essay Example This would give the casualty the option to carry on with an existence of nobility and the opportunity (End the absolute premature birth boycott in Nicaragua, 2010; Feldman, 1998). Assault leaves an enduring effect on the brain of ladies because of the horrifying physical and mental unrest that she experiences during the occasion. She requires a solid help and the correct guiding to assist her with coming out of the circumstance. Aside from the advising it is very basic to check the ladies medicinally for veneral malady and pregnancy. On the off chance that there is no origination the ladies should be given reasonable drug to forestall preparation. Be that as it may, in the event of a pregnancy the ladies ought to be given an ethical option to choose whether she wishes to proceed with the pregnancy. Specialists have recommended numerous explanations behind supporting this privilege, for example, assault is an infringement of the women’s right and pride, it is implemented on the ladies and not marital, and the ladies can't be considered liable for the demonstration. In spite of the general accord that it is ethically wrong to slaughter blameless individua ls and that an embryo is honest which has not carried out any wrongdoing, numerous individuals accept that fetus removal is totally a private issue which ought to be left to the attentiveness of the mother. In instances of pregnancy because of assault this privilege of the mother is additionally advocated. This is on the grounds that ladies of any age could be exposed to assault. In a large portion of the cases, little youngsters are focused on and when they become pregnant later on it is practically incomprehensible for them to manage and bolster the kid at that youthful age (De Bruyn, 2002). What's more there are a few wellbeing related inconveniences related with pregnancy at such a youthful age both for the mother and the youngster. The youngster could be brought into the world with a low-weight and the mother could experience the ill effects of different inconveniences during the conveyance. Notwithstanding the disturbance because of the assault, conveying the offspring of a man who perpetrated the ruthless wrongdoing

Saturday, August 8, 2020

Can Psychologists Prescribe Medications

Can Psychologists Prescribe Medications Psychotherapy Print Can Psychologists Prescribe Medications? By Kendra Cherry facebook twitter Kendra Cherry, MS, is an author, educational consultant, and speaker focused on helping students learn about psychology. Learn about our editorial policy Kendra Cherry Updated on February 15, 2020 Hero Images / Getty Images More in Psychotherapy Online Therapy In the vast majority of cases, psychologists cannot prescribe medications to their patients. However, there has been a recent push in several states to grant psychologists prescribing privileges and there are actually already a few places where psychologists do have prescribing privileges. Where Can Psychologists Prescribe Medications? Psychologists are able to prescribe medications in the military and the Indian Health Service as well as in Louisiana, New Mexico and Illinois. Professional psychologists gained prescribing privileges in New Mexico in 2002 and in Louisiana in 2004. In 2014, Illinois became the third state to grant prescribing powers to psychologists who hold appropriate training. In such cases, psychologists are required to receive proper training and are permitted to prescribe certain medicines used in the treatment of mental disorders. What Training Do Prescribing Psychologists Have? What kind of training is needed? In Louisiana, for example, psychologists who want to gain prescribing powers must complete a post-doctoral masters degree in clinical psychopharmacology, pass a board-recognized national exam, and hold a certificate of responsibility from the Louisiana State Board of Examiners of Psychologists. In Louisiana: Psychologists must first complete a post-doctoral masters degree in clinical psychopharmacology before they can prescribe medications.In New Mexico: Psychologists must complete 450 hours of didactic training and 400 hours of supervised practice in psychopharmacology.In Illinois: Psychologists must receive specialized training in psychopharmacology. In addition to this training, they must complete a supervised clinical rotation that lasts 14 months and covers a variety of settings including hospitals, prisons, and mental health clinics. Psychologists are not the only non-physicians who have been granted prescribing rights. Advanced psychiatric nurses also have limited prescribing powers in at least 40 different states. Arguments for Prescribing Privileges Supporters of prescribing rights for psychologists include the National Alliance of Professional Psychology Providers. Advocates suggest that psychologists should be allowed to write prescriptions for a number of different reasons. Today, physicians prescribe approximately 70 percent of psychiatric medications even though they often have limited training and experience with mental illness.?? Proponents suggest that many people would be better served by a psychologist who can also utilize other treatment strategies outside of pharmacological interventions. Some other reasons cited by supporters include: Increase accessibility to mental health careAllow patients faster access to treatmentsHelp rural patients access treatments more readilyDecrease wait time for treatments; many states face a shortage of psychiatrists, making it difficult for clients to access mental health care in a timely manner.?? Arguments Against Prescribing Privileges Organizations against offering prescribing rights to psychologists include the American Medical Association, the American Psychiatric Association, and the National Alliance on Mental Illness. Opponents cite a number of reasons why psychologists should not be able to write prescriptions, including: Insufficient training in medicine and pharmacology.??Risks of side effects of medications.Danger of overlooking medical disorders that might be mistaken for mental disorders.Approximately half of all patients prescribed psychotropic medications also have one or more co-existing medical conditions.Physicians and psychiatrists are better trained to determine when and if medications are needed.

Saturday, May 23, 2020

Lady Macbeth Essay - 1334 Words

Shakespeare portrays Lady Macbeth differently throughout the play. Before the murder of Duncan, she is more naà ¯ve and pure compared to after the murder of King Duncan, where she starts the road to insanity and nervousness. At the very start of the play during Act 1 Scene 5, Lady Macbeth and Macbeth have a very close relationship and they would tell each other anything. At the start of the scene, Lady Macbeth is reading a letter from her husband, Macbeth. Within the letter Macbeth tells her a lot of sensitive information such as the fact that he came across three witches who prophesised that he would become king, this sort of information could get him – or both of them into serious trouble, since back in Shakespearian times kings were†¦show more content†¦Back in Shakespearian times, women were considered second best, where as men were the dominant sex. Throughout the start of the play, Lady Macbeth is presented as brave and not being frightened by anything, as thou gh even God could not stand in her way. She says, â€Å"Come, you spirits That tend on mortal thoughts, unsex me here, And fill me from the crown to the toe top-full Of direst cruelty!† The fact that she asks to be â€Å"unsexed† suggests that she is fully aware of the power boundaries between men and women and wishes to destroy them, as, again men were seen as the dominant sex. Now, in the 21st Century, the phrase â€Å"unsex me† does not mean as much to us as men and women are seen as equals. The fact that she is calling upon spirits for help suggests that she is not afraid of who or what she is meddling with. Where as, even the bravest and strongest of men would not mess with the supernatural, as back in Shakespearean times, which craft and the supernatural was taken as seriously as anything we do today, such as, eating lunch. As brave as she was portrayed at the start, towards the end of the play, the guilt becomes to overwhelm her. As strong as Lady Macbeth is portrayed, she is shown as having a guilty and soft side. She originally was supposed to be killing Kind Duncan, however when she tried it she couldn’t go through with it, she said to Macbeth, â€Å"Had he not resembled my father as he slept, I had done’t†, thisShow MoreRelatedLady Macbeth940 Words   |  4 PagesLady Macbeth Shakespeare, who was a writer born in Stratford-upon-Avon created many different plays, in which he always portrayed the woman as the â€Å"bad guy.† He was born in 1564 and he was a writer, actor and a dramatist. He wrote many plays, mostly revolving around tragedy such as: Romeo and Juliet, Hamlet and Macbeth. Shakespeare was a respected poet, and writer who received recognition after he passed away, April 23rd. 1616. One of Shakespeare’s well-known tragic plays ``Macbeth`` describes howRead MoreLady Macbeth1003 Words   |  5 PagesLady Macbeth Lady Macbeth is the most interesting and complex character in the play. She is, in fact, the point on which the action pivots: without her there is no play. Macbeth s most interesting and complex character is most certainly, as the question states, Lady Macbeth. The purpose of this essay is to describe Lady Macbeth s role in the play and discuss why this makes her the most fascinating character. Her evil doings are the main reasons why she dominates the plot so greatly.Read MoreLady Macbeth960 Words   |  4 Pagesof time of fast decisions and unsure actions is going to expose them to danger or injury. In the play Lady Macbeth proves this to be true. The emotional mistakes shredded the journey Lady Macbeth puts down throughout this play and eventually ends in her death. She feels overpowered by everything that is happening in two ways, both mentally and physically and decides to end her own life. Play Macbeth by William Shakespeare shows two proper ordinary nobles whose lives twisted together in a whirlwindRead MoreThe Relationship Between Macbeth and Lady Macbeth Essay3134 Words   |  13 PagesThe Relationship Between Macbeth and Lad y Macbeth Macbeth and Lady Macbeth face an extraordinary situation involving a strong supernatural theme and murder and treason of the highest kind. However Shakespeare still cleverly manages to make Lady Macbeth and Macbeth relate to audiences of all eras and to convey a strong moral message within his play. The relationship between Macbeth and Lady Macbeth is fascinating to study. Shakespeare constantly changes their attitudeRead MoreLady Macbeth1937 Words   |  8 PagesLady Macbeth Essay I am going to do an essay on a play called Macbeth, written by William Shakespeare. The play is a tragedy, believed to have been written in 1611-12. The play is about a man named Macbeth whom, at first is a kind, tender man who later gets tempted by three foul witches to commit a murder in order to become king. Macbeth’s wife, Lady Macbeth is thrilled by the prophecies given by the witches and is eager for Macbeth to commit the murder. Macbeth disagrees with his wife greatlyRead MoreThe Death Of Lady Macbeth1177 Words   |  5 Pagesbegin with one of Shakespeare’s most beloved and tragic plays, Macbeth. Set in 11th century Scotland there is more than one logical way to interpret the signs, symbols and themes of this intriguing story. There is more than one mystery and obscurity in this play that seems to be left open to the interpretation and imagination of the reader. One compelling occasion in particular is that of the death and supposed suicide of Lady Macbeth. Many critics, readers and other interpreters have discussed theRead MoreLady Macbeth vs. Serena Essay836 Words   |  4 Pages Comparing Serena and Lady Macbeth It is no secret that Ron Rash’s Serena is a very similar character in comparison to Shakespeare’s Lady Macbeth. These two women are very much alike and only slightly different. Though Rash does not claim to base his work off of Macbeth, the two characters resemble each other in a couple different ways. Serena and Lady Macbeth are alike in the fact that they are both ambitious, malicious, and cold-blooded women who are driven by their love for their husbands.Read MoreEssay on Lady Macbeth1109 Words   |  5 PagesThroughout the tragedy of Macbeth we observe two people on their attempt to gain power and glory through various foul actions. It can be argued that Lady Macbeth is the one responsible for triggering a slippage into this inevitable situation that led to their descent. From the moment Macbeth became aware of his â€Å"fate† Lady Macbeth started forming her own imaginary world in which her evil plans seemed likely to be effective. The thought of she and her husband being royalty makes her dismiss rationalityRead MoreThe Downfall of Lady Macbeth1371 Words   |  6 PagesIn Shakespeare’s Macbeth, Lady Macbeth’s desire and ambition leads to her eventual downfall. When Lady Macbeth hears of Macbeth’s prophecy she dreams of the glory and high-standing that awaits being queen. She cannot withhold her ambitions and she is willing to manipulate fate to bring about Macbeth’s prophecy. She invokes evil spirits to be filled from head to toe with cruelty to do the evil actions necessary to make Macbeth king and to remove all remorse and pity for her action from her heart.Read More Lady Macbeth Essay1275 Words   |  6 Pages Term Paper On Lady Macbeth William Shakespeare created a dynamic character called lady Macbeth; she was the total opposite of what women of the Shakespearian era were supposed to be. Despite qualities women were supposed to have in Shakespeare’s time, Lady Macbeth defied the way most women of her time acted. Lady Macbeth defied the ways of women of her time by being manipulative, ambitious, and ruthless. Women’s lifestyles back in Shakespeare’s time period was very different from the modern day

Tuesday, May 12, 2020

Harry S. Trumans Decision to Drop the Atomic Bomb

President Harry S. Truman was confronted with a difficult decision on August 3, 1945 that would drastically change the history of the United States. President Truman decided to drop two atomic bombs on the Japanese cities of Hiroshima and Nagasaki in order to end World War II and the U.S. would soon meet another formidable enemy with the beginnings of The Cold War. The Cold War developed anti- and pro-Communist views, shifting the United States’ focus towards defeating Communism and its supporters. The tensions from the Cold War developed into great animosity spurring from the clashing beliefs of Democracy and Communism. 20 years later, U.S. intervention combats Communism’s spread in The Vietnam War. Although the U.S. thought it was necessary to intervene the My Lai Massacre along with other horrific incidents of violence, Communism’s spread and the major disapproval of the war effort characterized the Vietnam War as a failed attempt by the United States to avert unification by Communist nationalist forces in order to preserve and instill Democracy in Vietnam’s government. The Vietnam War’s initial purpose seemed to be clear: to destroy and prevent the spread of Communism to Vietnam and neighboring nations. This notion was backed by the belief that Communism’s spread was similar to falling of dominoes. The belief was named the â€Å"Domino Theory†, as Communism spread to one country; each neighboring country would fall to the clutches of Communism, one by one like topplingShow MoreRelatedTruman and Atomic Bombs649 Words   |  3 Pagesare to take a side and then write an editorial on Harry S Truman’s decision to order the dropping of the atom bomb. HARRY S TRUMAN amp; THE DECISION TO ORDER THE DROPPING OF THE ATOMIC BOMB Boom! Boom! Seventy thousands Japanese citizens were perished instantly after the first atomic bomb was dropped in Hiroshima on August 6, 1945. Japanese still refused to surrender to Allied forces. On August 9, 1945, with the dropping of the second atomic bomb in Nagasaki, where eighty thousands people wereRead MoreEssay Pres, Truman Atomic Bomb Decision1421 Words   |  6 PagesPresident Trumans Decision to drop the Atomic Bomb on Hiroshima and Nagasaki During World War II the war in Europe ended after the unconditional German surrender at General Eisenhowers Headquarters in Reims, France, May 7, 1945. After the unconditional German surrender in Europe the war shifted to Asia and the Pacific. As the war continued against Japan the Allied forces captured islands such as Iwo Jima and Okinaawa close to Japan brought the Japanese homeland within range of naval and airRead MoreThe Atomic Bombs On Hiroshima And Nagasaki982 Words   |  4 Pagesreviewing Ronald Takai’s Hiroshima, it only makes me wonder what was going through the mind of President Harry Truman when he gave the â€Å"green light† to drop the atomic bomb on Hiroshima and Nagasaki. It has been more than 70 years since that happened and the conclusion of World War II, and yet the legacy remains in our modern day history books and class lectures. But was deploying the atomic bombs on Japan really necessary? What was Truman thinking? And did the end really justify the means? Truly, uponRead MoreHarry S. Trum President Of The United States After The Cold War1025 Words   |  5 PagesHarry S. Truman became commander in chief of the United States after the death of Franklin D. Roosevelt on April 12, 1945. In the course of Truman’s eight years in office he came across with massive challenges in both foreign and domestic affairs. Truman’s approaches toward the Soviet Union in the Cold War, and overseas became a major way of leading foreign policy in America for generations. At home, Truman protected and reinforced the New Deal reforms of his predecessor, guided the American economyRead More The Decision To Drop The Atomic Bomb Essay897 Words   |  4 PagesPresident Trumans decision to drop the atomic bomb on the cities of Hiroshima and Nagasaki were the direct cause for the end of World War II in the Pacific. The United States felt it was necessary to drop the atomic bombs on these two cities or it would suffer more casualties. Not only could the lives of many soldiers have been taken, but possibly the lives of many innocent Americans. The United States will always try to avoid the loss of American civilians at all costs, even if that means takingRead MoreAtomic Bombing of Hiroshima and Nagasaki Essay879 Words   |  4 PagesPresident Trumans decision to drop the atomic bomb on the cities of Hiroshima and Nagasaki were the direct cause for the end of World War II in the Pacific. The United States felt it was necessary to drop the atomic bombs on these two cities or it would suffer more casualties. Not only could the lives of many soldiers have been taken, but possibly the lives of many innocent Americans. The United States will always try to avoid the loss of American civilians at all costs, even if that means takingRead MoreThe Atomic Bombs : The Justification1038 Words   |  5 PagesThe Atomic Bombs; The Justification One of the most controversial and heavily scrutinized issue of the twentieth century was President Harry S. Truman’s decision to unleash atomic bombs on Hiroshima and Nagasaki in 1945. The motives behind Truman’s actions are shrouded in controversy as top military officials publicly denounced the use of such a disastrous weapon. There is overwhelming evidence supporting both sides of the decision, as historians are split in opinion. The United States had beenRead MoreHarry S. Trumans Accomplishments: Dessegregation and Hiroshima1731 Words   |  7 PagesThe actions and decisions made by the United States President, leader of the free world, are subject to be analyzed, scrutinized, and debated for the rest of eternity. These decisions are how that man will be judged. Out of the 44 men to hold this honored position, one man, Harry S. Truman, made several proclamations such as the institution of Desegregation in the US Military, the dropping the atomic bombs, and the d eclaration of the Martial Law, which forever changed our society and the worldRead MoreJustified or Unjustified: America Builds the First Nuclear Weapon883 Words   |  4 PagesOn August 2, 1938, in the heat of World War II, Albert Einstein, a physicist born in Germany, sent a letter to Franklin Delano Roosevelt, the 32nd president of the United States. The letter suggested America to build an atomic bomb before the Nazi Germany does. However, it took more than two months for the letter to reach Roosevelt. On October 19, 1938, Roosevelt agreed, replying, â€Å"I found this data of such import that I have convened a Board †¦ to thoroughly investigate the possibilities of yourRead MorePresident Truman And The Dropping Of The Atomic Bomb1280 Words   |  6 PagesThroughout history there have been many important decisions made by our presidents that have affected our country for the better and for the worse. Even though people claim that they could have made better judgement cal ls than what have been decided, no one knows exactly what circumstances the president is under when the decisions have to be made. In the case of President Harry Truman and the dropping of the atomic bomb, many speculators say that it was a great way to resolve the war with Japan while

Wednesday, May 6, 2020

Reflective Essay Free Essays

Reflective essay Research is work carried out to increase knowledge. It is done so we have a better understanding of how things work, behave etc. it can be used to confirm facts, theories, solve problems and expansion on past work. We will write a custom essay sample on Reflective Essay or any similar topic only for you Order Now A question is posed, research is done to find the answer and an answer is given. The purpose of research is to learn something new. There are three types of research pure, original and secondary. Pure research is done by examining something. It is used to find out something in general. A person can come to a conclusion based on what they find. Original research is looking for information that has not been found before. This requires background information on the topic and a method to find out what you want. For this, you need to do secondary research. Secondary research is finding out what is known and coming to your own conclusion. It looks at the different viewpoints of a topic. It gives an understanding of what the information mean. There are four different types of research, exploratory, constructive, descriptive and empirical. Exploratory research helps define and identify a problem. Constructive research test possible solutions to a problem. Descriptive research is about giving information about a social issue. There is no hypothesis but one can emerge after gathering information. Empirical research tests if the solution is likely to happen. This happens when the researcher tries to find out about something. It provides information needed for explanatory and or descriptive research. There are several types of research. They are scientific, humanities, artistic etc. Scientific research gives information and theories explaining nature and properties in the world. Humanities research involves exploring the issues to answer a question. The context of the issue is important. This can mean social, historical political, cultural or ethnic. There are two major types of research, qualitative and quantitative. Researchers choose the method according to the type of research they do. Qualitative research is asking a broad question and collecting information in the form of images, videos etc. This is done when trying to find out why we behave in a particular way. It’s used as a basis for quantitative research. Quantitative research is collecting numerical data to find information about something, for example, statistics and graphs. Research can be undertaken in various ways. It can be done in surveys, focus groups, case studies, delphi method, content analysis etc. surveys can be conducted to obtain information about an issue that arises for example. They can be partial as it can ask leading questions, be biased in a way, questions are not clear and participants are influenced by the person conducting it. These can be done by polls, questionnaires etc. focus groups gather information from experts. Advantages of using this method include, getting opinions on a specific topic. Feedback or questions can be given and key issues are identified. Disadvantages are that a person’s viewpoint can dominate the discussion and not all questions can be answered. Case studies look at the information already available. The researcher can come up with a qualitative conclusion. Delphi method looks at the opinion of expert panellists. Research is done in three rounds. The informati0oon is collected, developed and given to the panel. In the first round the surveyors develop questions for the panel. In the second round, the information is examined by the panel. In the last round, the panel gives their judgement. Content analysis studies trends or occurrences of information. This method is used in television to measure amount of violence. The key elements are that it is systematic, objective and quantitative. Research needs to be validated. This is done by examining the data collected. The researcher needs to verify how the information is collected. They also need to consider how the information was collected. Also, they need to check that the data collected was legal and ethical. They need to be consistent with the results by re-examining the data again years down the track. The new findings need to be recorded. Also, when the research is done again, a different researcher should be used. Bibliography http://en. wikipedia. org/wiki/Research http://sociology. about. com/od/Research/a/Purposes-Of-Research. htm http://public. wsu. edu/~taflinge/research. html http://uva. ulb. ac. be/cit_courseware/research/chapter6. htm http://www. rci. rutgers. edu/~judithjf/kinds%20of%20research. htm http://www. ehow. com/how_7598463_cross-validate-qualitative-research-results. html#ixzz2Md7NUjcl How to cite Reflective Essay, Essays Reflective Essay Free Essays A REFLECTIVE ESSAY This is a reflective essay based on a event which took place in a hospital setting. The aim of this essay is to explore how members of the Multidisciplinary Team (MDT) worked together and communicate with each other to achieve the best patients outcome. Reflection is an everyday process and is very personal matter. We will write a custom essay sample on Reflective Essay or any similar topic only for you Order Now Jasper (2003) suggests that reflection is one of the key ways in which we can learn from our experiences. Reflective practice can be defined as process of making sense of events, situations and actions that occur in the workplace (Oelofsen, 2012). There are a different models of reflection. One of them is Johns (1994) model of reflection, this model is based on five cue questions: description, reflection, influencing factors, alternative strategies and learning. That enable practitioner to break down his/her experience. Gibbs (1988) is another common model of reflection which consists of six stages: description, feelings, evaluation, analysis, conclusion and action plan. The structure allows the reflection to be written in a clear way. In accordance with the NMC (2008) code of professional conduct, confidentiality should be maintain and all names will be anonymous. Ii this essay I will use Gibbs (1988) model as a guide for my reflection. The first stage of Gibbs (1988) model of reflection requires a description of event. On the beginning of one of my shifts, my mentor informed me that I can participate in Multidisciplinary Team meeting. A Multidisciplinary Team meeting is a meeting of the group of professions from one or more clinical disciplines who together make decision regarding recommended treatment of individual patients (NHS 2012). I work on the ward on which these meetings are held every day. On that day the meeting was attended by medical doctors, deputy sister, physiotherapist, occupational therapist, discharge coordinator, social worker and community nurse. Order of the meeting was as follows: at the outset a brief description of the patient was given by deputy sister. Then one of the doctors presented the patient current medical situation. At the end the other members of the team have time to take voice. They discussed medical and social situation of each individual patient. The team focused on planning and reviewing patients’ goals, they also made a joint decision about discharge plans and destinations. I was given the opportunity to observe multidisciplinary team members working together and participated in the discussion about patients whom I took care of. The second stage of Gibbs (1988) model of reflection is a discussion about my thoughts and feelings. My feelings at the time were mixed. I felt welcome and accepted within the MDT meeting. Many of the professionals who took part in the meeting,I knew from my daily work, and this made me feel comfortable. The MDT listened to my opinion and asked further questions. I always thought of myself as a confident person. However, when I stood and spoke in front of more qualified people then myself, my confidence vanished. I had no experience in speaking in front of large group and I was very nervous. For this reason my speech was not always consistent. In such a case, my mentor supported me and helped me by asking additional question that lead me to the right way. I found it very interesting to see how MDT cooperate and communicate well with each other . I am going to enter the third stage of Gibbs (1988) model of reflection which is evaluation. There are many positive aspects of the MDT meeting. One of them is that the health professionals of different specialities are working as a team to achieve the same goals. The team members have different skills and knowledge. Their roles and responsibilities vary and are based on their professional experience. Thurgood et al. (2011) suggests that this skill mix is one of the most important benefits of working in MDT. Works in a team allows to collect informations from all its members which ensures that no important information about the patient will be ignored or missed. Another big advantage of these meetings is that they are carried out every day. According to Whyte et al. ((2007) the most frequently team members meet face to face and have the chance to discuss issues and work together, the better communication will be. However, if effective communication among the team is not achieved, errors may occur. It is the major disadvantages of the MDT. The National Patient Safety Agency (2007) communication difficulties identified as a main factor influencing patient outcomes. Stage four of Gibbs(1988) model is an analysis of the event. Communication is defined as a process that involves a meaningful exchange between at least two people to convey facts, needs, opinions, thoughts, feelings or other information through both verbal and non-verbal means, including face to face exchanges and the written word (DH 2010). For the MDT is important to effectively communicate with each other and overcome all communication barriers that may arise because poor communication among health professionals can negatively impact patient care. Atmosphere during the meeting was friendly and thank to this that all team members knew each other from daily meetings effective communication was easily achieved. However, there was a few problems. A noticeable issue was that medical abbreviation used by the doctor were not understood by others members of the team. This led to interruption of his speech to find out about their mining. This is mainly related to the fact that different health care workers have different training and education. Another factor who had significant influence on the MDT meeting and extended it was partially not updated handover from previous shift. The team had to correct the informations contained in it. In this case the handover missed its intended purpose because it was originally designed to transfer information concerning an individual patient with outstanding task from the outgoing to the incoming teams (Farhan et al. 2012). I think that I did well by participating in this meeting. As a student but also as a front line worker I could learn a lot from other professionals and I was able to inform the members of the team about the patients, whom I looked after, progress. This is important because as a front line worker I interact more with patients during their hospital stay then any other health professional in the MDT ( Hamilton, Martin, 2007). If I had not given my opinion on the patients care, they could not benefit from the MDT as much as they did. Conclusion is the fifth stage of Gibbs (1988) cycle. The MDT give me the opportunity to work closely with other health professionals and better understanding their roles. I could clearly see that effective communication encourages collaboration, help prevent errors and can influence the success or failure of the patient care and treatment. This experience helped me to learn the importance of sharing of skills and professional experience with others for the benefit of patient outcomes. This will help me to work effectively with others team members in the future. This situation showed me straights and weaknesses in my communication skills. As communication is a key building the relationship with others I need to continuously develop this knowledge. I also realized that speaking in front of large group of people is hard for me and this is the area which I have to improve. The final stage of Gibbs(1988) model of reflection is action plan. If I find myself in this type of situation again I would be more confident in discussing about the patients and their needs. Communication is a skill that can be learned and continually improver (Webb, 2011). For this purpose I created an action plan that will help me to improved my this skills and gain self-confidence. The first objective in my action plan is to meet my mentor in order to discuses the whole situation and obtain feedback. The next point is to research further the appropriate literature to gain new informations and develop my knowledge. I also want to attend a conflict resolution study day to learn how to resolve conflicts. Communication with others can be challenging (Webb, 2011) and conflicts may arise at any time, not only between team members but also between health professionals and patients or their families. Summarizing, reflection on this experience allowed me to identify gaps in my knowledge and establish my own learning needs. Gibbs (1988) model of reflection given me the chance to explore my thoughts and feelings, analyse the situation and draw conclusion for the future. This essay also enabled me to connect theory and practice. How to cite Reflective Essay, Essay examples Reflective essay Free Essays I have been pursuing English as a subject consequently learning the importance of brainstorming, aspects of organizing prior to writing, revising and collaborating in writing. The subject has provided a gateway through which I have learnt the art of expressing myself, literature, grammar as well as the language Itself. However, this did not come without its challenges. We will write a custom essay sample on Reflective essay or any similar topic only for you Order Now English being my second language, it took me a while to learn the ropes and comprehend the language as well as writing it. The English subject has endowed me with organization skills in the art of essay writing through imparting the use of thesis statements, topic sentences, Introduction and conclusion paragraphs; as well as coherence techniques. Thesis statements are Introductory statements at the beginning of the essay with the information aimed at guiding the reader on what the essay is on and the scope it aims to cover. A topic sentence is found at the beginning of a paragraph and encompasses points to be covered In the entire body of the paragraph. I learnt the Important of coherence techniques In organizing as It ranges ideas into a logical and systematic order for example through the use of transitional terms as in the statement: The English language firstly teaches organization skills, secondly, grammar and finally sentence structure. In this case, transitional terms firstly, ‘secondly ‘and ‘finally’ have been used for coherence. I was also able to learn how to use the introductory and conclusion sentences in writing; where I learnt that introduction sentences are used to introduce the stem ideas in an essay while a conclusion statement is used for providing a summary of all the ideas hat have been explained in the essay. Development skills were also Impacted whereby the use of specific details and use of explanation In stones as evidence to support the statements was learnt. The details and the evidence together with the examples provide a basis for the development of an idea with the evidence being clearly Introduced and Its source being indicated. It may be followed up by an explanation or evaluative statement to further support the argument. As I participated in this class, I got a chance to sharpen my skills in the MALL citation quince that comprises in-text citation and bibliography. An example of in-text citation: Achilles is described as â€Å"wolf, a violator of every law of gods and men,† (Mallow, 58) with the work cited as Mallow. David. Ransom. Knops: Random House, 2009. Print. The use of quotations which are similar to the initial source of the statement can also be applied but should be attributed to the author though paraphrasing which can also be used involves putting a statement extract in your own words. The provision of credentials of experts cited Is also a necessity in the citations. Learning the subject gave me an opportunity to explore into other areas of research such as the internet. The website can be used as a source of current and up to date information. Use of website references ought to also be stated in the references Including the complete address for the site. The use local databases have also been helpful In providing access to reliable and verified scholarly articles and journals. As I look back on my graded essays, I realized that sentence grammar and 1 OFF The errors mostly appeared as sentence structures major comprising of run-on ententes. A run-on is a sentence comprising several main clauses that can stand as their own independent clauses but are strung together with improper punctuation appearing as a single sentence. An example: The student understood the presentation well (independent clause) the teacher was impressed (independent clause). The two can form a run-on statement: The student understood the presentation well the teacher was impressed. This can be corrected through the use of appropriate punctuation as: The student understood the presentation well. The teacher was impressed. I am impressed that throughout my semester I have shown progressive improvement in eliminating the errors. I look forward to Joining the English IA class and I feel that I am ready to be successful in the class as it aims to enable students communicate effectively by emphasizing the importance of analytical reading and writing. I also believe that this class will enable me obtain different skills of writing from pre-writing, organizing, writing, revising and editing; all of which I have been introduced to in this class thus providing a solid foundation to learning English. How to cite Reflective essay, Essays Reflective Essay Free Essays Hour w hen I first arrived Into the walls of Northwestern High School as a freshman, It was a new experience for me. Adapting to a new atmosphere was a big change In my life. From being use to Elementary, and Junior High Schools standards I had to critique my whole lifestyle. We will write a custom essay sample on Reflective Essay or any similar topic only for you Order Now In doing this, I had to change the way I thought, my morals, values, timing, academics, and most of all my behavior. I can actually sit back and remember my first day of school like it was yesterday. Like trying to find my classes, finding a place to sit in the lunch room, wondering if I’m going to make any friends and the list goes on and on. This thing called â€Å"High School† was a new and major beginning in my life. After being adapted to the customs of this new school: like homework, essays, reports, and exams. My only stress relief was from extracurricular activities. I always look towards It being Like my little balm In Gilead. By growing up in a house of athletes, I always was Involved in some type of sport. Whether It be tennis, baseball, oddball, or even a game of amateur soccer, I was Just so grateful to be away from school work. As I still wander the halls of Northwestern, I often reflect back on my life, and how far I’ve come to this point that I’m at today. I can say that my work ethic never caught up until my junior year. That’s when â€Å"life† really dawned on me. Over the past four years throughout High School I’ve learned that you shouldn’t ask what the future holds because, you define it. You can control your destiny by the decisions you make, the manner in how you conduct yourself, and how you treat others. But, I can see the growth that I’ve achieved over the years. Not just my growth in school but as an individual. I no longer have the same goals as I once did; my standards and expectations are higher. In such a huge school where almost everyone knows everyone and their cousin, I can say that Eve made so many friends. Like my friends since the 9th Grade Ms. Allan Williams a. K. A â€Å"Lana Pooh†, Chanted Fletcher, Kevin Chisholm, and Shannon Grant are Just a few whom Eve known almost the past four years. I can also that I’ve made quite a few enemies here and there to be honest. I rule can say that when you’re trying to do your best, some people just get jealous which is saddens me but, I have to keep on rolling. My friends and I have gone through a lot of things emotionally, physically, and spiritually. But, we didn’t let those things stop our determination to get through school. I can say Northwestern High School has provided me with leadership principles that I couldn’t get anywhere else. From the social aspects of life, communication, mentoring, and guidance, these have put me in a position to where I can go into college with a ready and stable mind. I went from being Just â€Å"Anthony’ to â€Å"Mr.. Anthony N. Houston† In Northwestern. I can’t receive this type of recognition without thanking God first. I also have grown spiritually stronger while maturing In high school. Overall NEWS has equip and provided an ambiance which allowed me to transform from a boy Into a young man. Things that will be used in college but, most importantly in my future. Some things I might not come across in my following years nevertheless, I can say that Eve enjoyed every minute in high school. As a student, I have some regrets but, I let those be me a membranes, and my testimony. These few and short years have taught me a lot about myself, and the world around me. I know that these â€Å"once in a lifetime† experiences will never be forgotten and it will serve as a path to success in my near and great future. As for my fellow class mates, I wish you all the very best in the future. I hate to say goodbye on graduation day, so it’ll Just be a simple â€Å"See you later† to keep us encouraged. I hope that their experiences will make them better and most of all wealthy in their future. How to cite Reflective Essay, Essays Reflective Essay Free Essays During the lessons taught in the past weeks, the most attention-grabbing topic covered to me was the four lenses temperament lesson. Taking the four color lenses test has made me see what type of temperament person I am and why I have been making some of the decisions I have. As my primary color being green, I now see that I am more abstract, independent, and research-oriented person. We will write a custom essay sample on Reflective Essay or any similar topic only for you Order Now As I look at my other classmates, I also see how they act based on their lenses color. Knowing and realizing he different lenses colors, also gives me a basis on how to motivate the different temperaments. When dealing with an orange temperament I should expect to be challenged or debated. In which case I need to be flexible and adaptable so that tasked assigned can be accomplished. I think I can take this to my work center and understand why some of my subordinates act the way they do. Being mainly a green temperament, I am an independent thinker and don’t accept things at face value which find me in a constant state of analysis to figure out how things work. Although being this type of temperament Is not a bad thing, I have also discover that I have a blind spot. Being that blue temperament is my blind spot, it makes me a little sightless to a person whose temperament are blue. These individuals are more sympathetic, sensitive, and compassionate. Recognizing and understanding what type of color lenses my subordinates fall under will give me a better comprehension on how to motivate the different temperaments and overall allow me makes the work environment more productive. How to cite Reflective Essay, Essays Reflective Essay Free Essays THE PROFESSIONAL ROLE OF A NURSE, THE CORE VALUES AND THE ETHICAL HEALTH AND SOCIAL CARE PRACTICE. The outline of this essay will be in six parts, (1) an introduction, (2) the main body which will explore the role of a nurse, (3) conduct and the requirements for the effective delivery of care, (4) responsibilities and work of a nurse , (5) ethical, moral and social care dilemmas, and, (6) the important of team work including working under supervision. According to the NMC code of conduct, (2008) a Nurse must be able to deliver high quality and professional care to patients and clients. We will write a custom essay sample on Reflective Essay or any similar topic only for you Order Now Nursing qualities must include the following: good listening skills, good communication, and implementation plan of care, evaluating, and a good advocate. A nurse must be non judgemental, none discriminating, be patient and, ability to work as a good team worker. A Nurse’s role is to promote healing and be able to comfort the patient and family members. Good listening and communication skills are required in this role. These should include the ability to effectively communicate with other professionals in the carer environment and outside agencies. They must be passionate about the delivery of carer to the patient. They should be concerned with the overall health and wellbeing of patients both physically and emotionally. NMC code of conduct also states that as a health care professional, you must be accountable for your practice, respect the patient’s privacy and treat them as individuals; therefore you must act to safeguard and promote the interest of clients. A healthcare professional must cultivate a friendly and a helpful relationship at all times in the practice environment. Assertiveness and the use of positive body language are part of the core values underpinning good practice of a health care professional. They must have high self esteem and must be non judgemental. The work of the nurse has seen significant changes over the years. The professional role of a nurse has a higher status in today’s world as more of the duties that doctors used to perform have now been delegated to the nurse. The training of the modern nurse thus reflects the additional responsibility placed on them in the way they deliver care. The role of a nurse must recognise and take into account the Ethical, social and cultural background of patients when delivering care. Most nurses have to deal with ethical and moral issues on a daily basis and have to provide care for all patients regardless of their own values and beliefs. They must also have self-awareness. A professional nurse must also be sensitive to the aged, and respecting their privacy and individuality in the care provision. In conclusion, this essay has looked at the role of the Nurse, core values and principles underpinning ethical health and social care practice REFRENCES; How to cite Reflective Essay, Essays Reflective Essay Free Essays By ensuring that we have a clear understanding of what we ant to achieve and how we will measure the success of the change† (â€Å"Implementation,† 2011, p. 1). The steps for implementing a policy. We will write a custom essay sample on Reflective Essay or any similar topic only for you Order Now Plan Planning involves detailed research about what the policy is to accomplish and achieve. This happens on both the legislative side by creating a law that has beneficial and desired outcomes and on the organizational side by planning the responses the organization will make that are directly related to the policy. Having a solid understanding and a good plan in place is the first step for implementing a policy. Do The ‘Do’ step of PADS involves design a plan to implement the policy into action. One key point is addressing the behaviors of the people who are likely to hold back or move away from the new policy and address them directly. There are always transformation, transition, and development stages to work through as part of the ‘Do’ stage. Study In the study phase the results of the ‘Do’ stage will be analyzed and measured for surprises, failures, successes, and consequences. In the study phase it is good to review the results and compare them to the predicted outcomes and establish modifications that will make the policy better from what was learned. Act In the ‘Act† stage you will take the information and data collected from the first three stages and make the appropriate changes. The policy may just need to be adapted with slight modifications. The policy may need to be adopted and changes made within the organization. The policy may need to be abandoned, completely changes and the PADS cycle started again. Role of major stakeholders in the process. The role of stakeholders is to participate in discussion that prioritize and describe the policy and how it is intended to be implemented. What can cause a policy to fail? A committee assignment can cause a policy to fail. If the committee has a Chair that does not support the policy then it is likely to fail because it will not be put near the top of the agenda. How to cite Reflective Essay, Essays Reflective Essay Free Essays Katrina Wright Reflective Paper February 27, 2010 PDC-111 â€Å"Discovering Yourself† The topic â€Å"Discovering Yourself† was about the many different learning styles. This topic also was about how different individuals use various learning styles. My favorite assignments that I completed when this topic was covered are the Discovery Wheel and the Learning Style Inventory. We will write a custom essay sample on Reflective Essay or any similar topic only for you Order Now The Discovery Wheel weighed strengthens and weaknesses of self- discovery, career planning, time, reading, notes, and tests. The Learning Style Inventory measured the importance of things From â€Å"Discovering Yourself† I gained knowledge about how to become a better learner and utilize the skills in school and in the workplace. I also feel this topic was beneficial because it taught me things I never knew about myself. I never realized that I needed to practice time management skills. I learned that I am a good career planner and a good note taker. I also learned that I must practice managing time and taking tests. I discovered that some people learn better by hearing, others by seeing, and others by doing. Additionally, I learned I am a visual learner. This topic means a lot to me because it helped me find myself. Discovering Yourself† has helped me be successful in college by showing me skills I need to practice. I can apply the knowledge I gained from the assignments completed on this topic to school and at work. I can apply what I learned from this chapter in school by acknowledging that I am a visual learner. For example, if something is said durin g a class lecture instead of relying on memory, I will write it down to better understand. I can apply practicing time management to the work field. For instance, if my boss says there is a meeting on the second Friday of every month, I would write it in a planner to help me better manage my time. Tests† The topic â€Å"Tests† was about how to become a better test taker and what to do before and during a test. This chapter covered memory techniques for taking test. Additionally, this topic was about why you should not cheat on tests. My favorite assignments that I completed in this chapter were journal entries16 and 18. In journal entry 16, I was instructed to look back on a time I had difficulties taking a test. In journal entry 18, I was instructed to make a list of excuses I make to avoid taking a test. From the chapter â€Å"Tests† I gained knowledge about how to become a better test taker. This topic was beneficial because I feel it entailed valuable information that is important for now and in the future. I learned that the key to mastering a test is study, study, study. I also was taught that if you are relaxed you retain text quickly and remember it more accurately. Furthermore, I learned to use mnemonic devices to remember things. This topic means a lot to me because it is important in everyday life. In my opinion, â€Å"Tests† will help me in college because it has taught me how to do well on test, which will improve my grades. I can apply the knowledge I gained from this chapter’s assignments to work and school. I can apply what I learned about being relaxed to work. For example, if I were given an assessment at work about what was covered at training; I would know to be calm so I could recall events the events at training. I can also apply mnemonic devices to work. For instance, if I was a grade school teacher I could use the mnemonic device Roy G. Biv to help children learn their colors. I can utilize mnemonic devices in school while taking a math test. I would use PEMDAS. (Please Excuse My Dear Aunt Sally) to remember the order of operations. â€Å"Time† The topic â€Å"Time† is about how to stop procrastination, organizing time, and managing time. It is also about how to use a long-term planner. My favorite assignments that I completed in this chapter were journal entry 8 and critical thinking exercise 14. Journal entry 8 instructed me to think about a time I waited until the last minute to complete an assignment and the repercussions of procrastination. Critical thinking 14 directed me to complete a planner for a whole week’s activity. From the chapter â€Å"Time† I gained knowledge on how to spend time productively. This chapter taught me not to procrastinate and to plan for future. This chapter was beneficial to me it had important information about how to use time. Time† means a lot to me because it taught me not to let life pass me by. I feel this chapter will help me succeed in college because it showed me the importance of planning, which will make planning to complete assignments easier. I can apply the knowledge I gained from this chapter’s assignments to work and school. I can apply not pro crastination to school. For example, if I were given an assignment two weeks before it was due I would do it in advance to ensure quality. I can also apply not procrastinating to work. For instance, if I wanted to become a police officer I would start getting in shape now to do well on the physical health test. How to cite Reflective Essay, Essays Reflective Essay Free Essays Reflective Essay English Composition – Eng 115 Informative Essay LaTosha Dale ENG 115 Professor Polk March 10, 2010 The pre-writing strategy that I used for my informative essay is listing. I found this strategy effective because it allowed me to list my task from the begging to the end of my shift. By using this strategy it ensured I would not leave any of my tasks out of my paper. We will write a custom essay sample on Reflective Essay or any similar topic only for you Order Now One thing I would do differently is give a brief description of the type of clients I worked with. I would also give a history on the program I worked for. My purpose for writing this essay was to inform my audience about the position of a second shift Residential Counselor. My audience is my class mates and Professor. I fulfilled my responsibility by giving a detail description of my task from the begging till the end of shift. The main point of my essay was to give a detail description of a typical day as a Residential Counselor. After reading my paper I would like for my audience to understand the day to day task of a Residential Counselor. I looked for a consistent flow in the essay I peered reviewed. What I learned about my peer during the process is that she was unclear on the assignment. What I learned about myself is that I value feedback from my peers on my writing. After the peer review process I felt as though I had a strong paper. I did not decide to make any major revisions. One of the comments that my peer made was that it was unclear that the school and residence were two separate places, so I made that clear in the beginning of my essay. I think after I made that revision based on my peer comments that it was clear that the school and residence are in two separate locations. The strongest aspect of my paper is the details I included pertaining to my shift. According to the feedback I received regarding my paper, my weakest aspect of my paper is grammatical errors. The issue that I had with this essay is not allowing enough time to properly proof read my essay. The next essay assignment I write will be in present tense. What I learned about myself during this writing assignment is that I like to get others opinions of my writing. I also learned that everyone has a personal writing preference. How to cite Reflective Essay, Essays Reflective Essay Free Essays If I were to ask my subordinates what type of leader I am, they would probably say that I am a very task-oriented, down to business, pursue what I set out to do. Additionally, you would probably get some remarks about how I’m not afraid of the manual work and that I am always the first in and last out during the duty day. If you were to ask my supervisor about how I am as a follower, he would undoubtedly say that I’m dependable, goal oriented. We will write a custom essay sample on Reflective Essay or any similar topic only for you Order Now He would say I’m a hard-worker and see through all tasks that I’m assigned, some of which may take some outside-the-box thinking. The leadership style I use is a mix of authoritarian and participative leadership. This is an effective style due to the nature of my work. If something has to be done quickly and without thought of others, I tend to be very authoritarian so they are able to focus on what actually needs to be done and not get caught up in trying to decide what the best course of action is. On the contrary, if there is time for decisions to be made, and, especially if the decision is one that will affect more than myself, I try and get input from everyone to get their thoughts. This this is the best way to get people to take a bit of ownership with it. I consider myself to be a good NCO. I am entrusted supervising and developing my subordinates. Although I consider myself a good NCO it does not mean I still don’t have room for improvement. My supervisor can depend on me to do what needs to be done effectively. I ensure that the Job gets done in a timely and productive manner. I consider my task-oriented leadership a strength because it focuses me on the task at hand. It ensures that deadlines are met and jobs are completed. As far as my essence I see myself as being open minded, someone who wants to see the end result on any task. I always try to put 100 percent to everything I do. How to cite Reflective Essay, Essays

Friday, May 1, 2020

Fundamental Security Rules

Question: Describe about Fundamental security rules, Qualitative risk assessment and Risk perception and communication? Answer: Fundamental security rules In the book Inside the Security Mind, the author Day has described eight security rules that can helps an organization to take any security related decision in different circumstances. (Day, 2003) But the main factors to remember is, these rules are to be implemented correctly and collectively within an organization. That is, one should follow all of the eight rules, otherwise there is no use of following one or two or seven of those. The author has said, Each security rule exists in a symbiotic relationship with the other rules to stress on the fact that these rules are dependent of each other hence, need to be implemented altogether. For example, if we consider, the rule of Preventative Action Reactive policies and processes, it will help in taking preventive actions so that an attack cannot happen in an environment. Hence the organization need to consider the security issues before they turn into some attack and happen to the organization. But what will happen, if there is some attack? What will happen afterward? Because total security prevention is an ideal thing. This does not exist in real and especially in the context of information security. Thus, the organization also needs some corrective approach or response plan to the attack. Here, comes the need to implementation of the Rule of Immediate and Proper Response. In this way one rule is not sufficient to cover every aspect of risks and information security for an organization. Thus it needs to implement all rules and the rules are inter-related with one another to cover the whole picture. In the book Inside the Security Mind, the author Day, has told some process to decide whether to install a patch for some vulnerability of some software or not.(Day, 2003) It is true that sometimes installation of some patch hampers the functionality of a system. But on the other hand it is true that not installing the patch keeps the system exposed to the threat of vulnerability exploitation. In this case there is a risk of data loss and security attack. According to the author, one should look for the trade of in terms of cost for the installation of the patch that may affect the functionality of the system and not installing and considering the risk of exploitation. Then go for the better one between this two. This process is alright if the patch is for some minor issue and the cost of exploitation is not significant. But, what if the trade of is very close, that is there is almost 50-50 chance of both? Then deciding that suitable choice according to the authors process is problematic and not very realistic. An approach can be taken is, finding some countermeasure that can neutralize the vulnerability threat and not affect the system performance. This is applicable, if some patch affects the functionality of the system badly. For example, installation of some antivirus or some other security technique can help in covering up the exploitation threat. Practicing security As said in the report, when people use some unencrypted network to send and receive messages, then that is analogous to shouting loud and expecting people will not hear. The sender and receiver are not responsible here to make their conversation secure and private, so anyone can intercept. But the matter it, the intercept may be accidental and not intentional. But what Google did, is not acceptable. They intercept to the data transmissions and used the cameras of the cars etc. for their own project and benefits. Thus it is not supported. When they are deliberately exploiting some vulnerability of the Wi Fi networks, then that is similar to an attack. An unintentional overhear of the data transmissions will not store, process the data from un-protected Wi Fi network. They have just exploited the vulnerability of the unprotected Wi Fi networks. For secure and private communication Google mail raises some questions. If we consider security issues like hackers etc. Then no doubt Google mail is safe from those attacks more than other options. But information security is more than some hacking attacks or data loss. One of the fundamental principle of information security is confidentiality. Google Mail breaks that in the following ways. Their rigorous security check, checks and scans the content of the mail. Whether there is something offensive or not. This gives protection from several attacks. But what about the privacy and confidentiality of the legitimate users? They makes duplicates of the mails in their data center. This increases the chances of recoverability. But what is the point of confidentiality? Why a confidential mail will be duplicated and stored by some third party who is not either sender or receiver? From this point of view Google Mail fails to provide a confidential and secure email platform. I agree with the statement by the author Day, When an organization makes decisions using a developed security mind, it separates itself from the struggles and costs commonly associated with information security. Business and technology have become complementary to one another today. One cannot sustain without other. On the contrary people have learned to use technology but in most of the cases they dont understand those deeply. They dont understand the core concepts behind technologies. This becomes a serious issue when it comes to the question of information security. Businesses and people use and deploy information security measurement to save themselves and their data from the consequences of some information security attacks. For example, people use antivirus software to make their information protected from virus attacks. But they keeps downloading data from malicious sites, keeps using infected media etc. The reason is they dont understand the concept of virus, how this can effect, and what the best practices of getting rid of those. Installing a mere antivirus will not help until people practices to follow up security best practices in their daily lives. Then it will cut down the risk significantly. As in our example, if people become aware and practices policies like avoiding download from malicious sites, sharing and using removable storage devices safely, not using those in some unknown system, avoiding public and non-protected networks like public Wi Fi etc. Then they will not be exposed to the high sources of virus. Though it does not ensure total protection from viruses but surely cuts down the chances of virus attacks. Foundations of Risk Management 1 Cloud computing is a relatively new and very promising information technology that is currently taking its shape in industries. Uncertainty is a serious issue with cloud computing and this is due to the very inherent components of cloud computing infrastructure. The security risks are difficult to comprehend and predict. As virtualization is an integral part of cloud computing infrastructures so the actual storage of data in the pool of storage is unknown to the user. User can understand the potential security issues. But cannot take any security measurements by themselves. They have to depend on the owner of the storage where their data is stored. The security issues are hard to comprehend because, user will not have any idea about the environment where their data is actually stored. May be there is a good security infrastructure or there may not be. Other than that, based on any of this option and the degree of security present there, the risks of information security both physical and digital, will vary. Compared to the COIN dynamics, it is harder to predict cloud computing. Because of the following factors, The geographical location of a storage is not known in advance. It may be beyond the boundaries of country and continent. In that case, the environments will change drastically. The policies and practices will also change and the user of the data will have no control on these. Even if the storage location in known to the user, he/she have to depend on the information security implementations done by the vendors. It is now their own system, so again they have limited control over it. In most of the cases, public network like Internet will be used. So there are associated information security risks while transmitting data over the Internet. There are lots of factors to consider. They may have enormous interdependencies. Putting down than in a compressive matter is very difficult in this case. The field of information security risks are evolving and changing day by day. Capturing this dynamic nature of the field is another difficult task. The advice is mainly a quantitative guideline for managing risks. Because the process firsts tries to predict the risks and its chances though use of probability and statistical measurements. Information technology and the risk management in this domain is a very complex process. There are no one and most suitable approach to follow here in terms of risk management. So, this is not very suitable for IT risk management. No, security is not always the main threat to availability of information. And the concept of availability varies in the actual scenario. For example, if we consider Google mail service. According to the service level agreement it will be available 99.9% time per month. The rest of the time may be taken for server and data center management and may be the service will be unavailable. Thus there may not be any security reason, for what the service is unavailable. Consider another scenario. Where, Google main is used by some business. The information technology infrastructure of the business has some security issues and as a result the users are unable to access their Google Mail account. From users standing point. The service is unavailable to them. And that may be beyond the time mentioned in the service level agreement. Thus for businesses, down time is not tolerable at all. It will eat up their revenues. So availability of systems and services is more important to then than security. It can be explained in another way. There may be some bug in the system and for that the Googles service for email may go down for quiet sometime. Now, for Google this is important because their service centers are in risk and that is their business. But it may so happen that some another business who is a consumer of Googles service has lost significant amount of revenue from this downtime and that is beyond the cost of the impact of the reason for the downtime to them. Foundations of Risk Management 2 A diligence based information security review is a process that helps in determining several options for improving the information security infrastructure of an organization. In this case, the review process is very important and is needed to be comprehensive. This is because of the nature of the risks and threats. In the context of information security the opponent or the attacker is unknown and intelligent and additionally the system is vulnerable. These vulnerabilities are also much unknown. Thus the degree of uncertainty is quite higher. The review helps to uncover these uncertainties. (Parker, 2008) There are compliances for meeting or exceeding the standards, regulations, laws and the requirements to follow up these. All these are constrained within the budget of the organization. Management and stakeholders should support the diligent based review process. From the experience of the author, he has concluded that the process can extend the security by reducing adversities. Thus is gives net saving and profits. There may be some residual information security risks. Those are also uncertain and unknown. But have little chance to occur. The success and quality of the review process is pretty much dependent on the quality, experience and the professionalism of the team that carries out the process. The process needs co-operation from all stakeholders and consent for the assets. It is true that the threat of going to jail compels the employees to follow up the compliances more than they do the same without the threat. Standards like PCI DSS does not imposes any requirement to implement any standardization for online payment on the organization. It says that organizations are requested to implement the same in their business to ensure protection and security to some level more than average. But in reality people dont believe or give importance to such requests as information security risks are different than the physical security risks and the consequences cannot be understood without getting effected by it. Organization and people, dont understand until they are affected. But then it is too late to ignore the consequences. To avoid this scenario, sometimes, similar standards are imposed on organization and employees by saying that they may go to jail if there is some fatal information security consequences from their action that are without any policy or standards. It does not say that everyone who are not obeying the same will go to the jail. It warns that there are chances of the same. No, there is not any good analogy of the risks of malware and the cost for implementation of countermeasures to prevent the attacks. Compared to the given graph, the total annual cost and expected annual damage follows almost the same curve. That is, when the expected damage range is higher the cost is also higher, then the range is lowered the cost is also lowered. (Lund, 2008) But in case of information security risks and the cost associated with implementation of the measurement for those follows different curve. Here, the graph may follow the following pattern, Here the cost goes high and the risks go low but that is to some extent. After going beyond the optimal level the risks remains in the same level even the cost is kept increasing. The intersecting point and the discretionary area under the point gives optimization under real scenarios. Predicting the recurrence interval is difficult for information security risks. Especially for worms and virus attack it is hard to predict. There are counter measurement and also there are also chances that the attacking process will be stronger due to the advanced technologies. In general the intervals goes shorter with time. And he frequency of attacks goes more. But the countermeasures can be used to prevent the attacks. Quantitative risk assessment Scenario-based Exercise The ALE is the product of the ARO and SLE. Here ARO stands for Annual Rate of Occurrence and SLE is the Single Loss Expectancy. In the given scenario, The value of the asset is = $2 million. SLE = $2 million x 70% = $2,000,000.00 x 70% = $1,400,000.00 ARO = 1/10 = 0.1 Thus, ALE is (1,400,000.00 x 0.1) = $140000.00 Qualitative risk assessment Qualitative Cost Benefit Analysis Qualitative cost benefit analysis does not focus on accurate measurements of the cost factors related to the assets and impacts of the security risks. On the other hand cost benefit analysis is the process of comparing the cost factors in terms of investments and benefits. This process can be used with quantitative risk assessment and with qualitative risk assessment. Some steps are common to both case but there are some different in the process of carrying out cost benefit analysis in both cases. In case of qualitative cost benefit analysis the process is, Providing description of the cost and benefits. It needs identification of both. Then it analyses the contribution of the different interventions that helps in achieving the outcomes that have been observed. This is called as attributing process. Then the cost and benefits are compared with one another. The relationships between these two factors are analyzed. In case of qualitative cost benefit analysis, the evidences of costs and benefits are observed over a range of the values and those are not considered in monetary terms. Thus there is no ration of cost to benefits. Rather the relationships between these two factors are observed and analyzed in this process. (RMIT University, 2004) CRAMM CRAMM stands for CCTA Risk Analysis and Management Method. CRAMM is a security risk assessment and management process or tool. This is an automated process. Any type of organization can use CRAM for qualitative risk assessment. The tool helps in justifying some contingency or security investment for the information technology infrastructure including networks, information systems of an organization. The countermeasures are quantifiable. (Yazar, 2002) FRAP FRAP stands for Facilitated Risk Assessment Process. There is a consideration of one system and application in a line of business. There will be a team for FRAP assessment. The team will provide technical, managerial support. The team will brainstorms for finding out the threats, potential hazards, vulnerabilities and the consequences. Then all identified risks are prioritized. Again the team prepares a control and action plan for risk management. The advantages of FRAP are, The process is fast. All documentation are done quickly. The team exercises the security risks. Risk Analysis Risk analysis is the process of identifying the risks in advance and measuring the impact of those risk in some given context. The result of this analysis is further used in preparing strategies for risk management. Risk analysis needs identification of risks at the very first place. There are various strategies and techniques for risk identification. A common and widely used one is Risk register. This is a matrix that lists several risks associated to some project. The chances of the risks to occur, the impact and possible countermeasures. There are two types of risk analysis. Qualitative and quantitative. Quantitative risk analysis processes focuses on finding out the monetary factors related to the risks and the qualitative analysis focuses on the relations and reasons behind the risks. How those can be controlled etc. Risk analysis is helpful to understand risks in advance and taking some preventive or corrective approach. It also helps to identify the risks that cant be avoided. Most of the insurance solutions offer the following is similar context, Detailed gap analysis for insurance. Survey in network security for assessing the vulnerabilities. Scanning for network vulnerability. Review and development of security policy Internet connectivity vulnerability. Scanning for system and database for vulnerabilities. An insurance for information technology of an organization secures the computing and networking resources of the organization. Insurance According to various studies and researches, the mostly happened security breaches to the databases and stealing of data are the following, (Imperva, 2014) Improper and excessive use of access control privileges, unused privileges Abuse of privileges SQL injection or Input injection Weaker audit trail Malware DoS or Denial of Service Exposure of storage media Sensitive and unmanaged data Misconfiguration of databases Vulnerability exploitation A database can have different types of users. They will have different type of user controls. Giving excessive access control to some users or giving excessive number of access control to a database and data brings more risks. There are chances of data breach by misuse of those access control. There are two types of injection in some database. One is SQL injection and another is a more revised one called input injection. The second one is more related to big data and data sets. Absence or lack of audit trail and recording of all sensitive transactions of the database imposes several information security risks to an organization. There are chances of malware attack and data stealing. DoS may not steal data but may damage data by making the services available to the users. Some organization lack management and storage of sensitive information in a secure and protective way. Also, a system or database may have several kind of vulnerabilities. Exploitation of such vulnerabilities will re sult into data breaches. Insurance is useful in the context of data loss due to information security risks, covers some aspect of the issue. But it cannot give protection from all kind of information security risks to some data set. An information security insurance is a specially designed insurance policy for mitigation of cyber risks. There are various kinds of information security risks are comes under the roof of information security insurance. Other than data breaches, it saves from network damages and interruption to the business process. These insurances follows some risk mitigation policies. Those mitigation policies include, Through promotion of several preventive techniques in the context of information security risks. It helps to reduce the chances of risks to happen and returns more coverage. Through encouraging implementation of different counter measurements and best practices. It is usually done based on the premiums from the insured and the self-protection level of the insured. However, there are several confusions in this field. Sometimes organizations fail to understand the policies and how they work. They are sometimes not sure whether the risks will happen in future or not. This increases the uncertainty of their action and also increases chances of happening the risks. For example, insurance can save from sudden disasters like fire. Suppose, an organization is paying premium of $50000 per year for protection of their data. But the chance of occurrence of fire may be once in ten years and taking further precautions may have reduced the chance more. Then in some cases the organization become confused whether it is beneficial to invest this much money for this purpose or not, where the risks is very unlike to happen. Risk perception and communication The risks identified in the digital wildfires (as presented in the Fig. 11 of WEF report) (World Economic Forum, 2013), are, Critical system failure Cyber attacks Massive incident of data fraud/ theft Major systematic financial failure Backlash against globalization Global governance failure Failure of diplomatic conflict resolution Massive digital information Rising religious fanaticism Terrorism Some of this risks are technical and rest are subjective. So, there may not be any solid solution for some risks other than following some policies and best practices. For example, cyber-attacks cab be dealt by using several countermeasures of information security depending on the type of attack and the context. There may be use of hardware, software, access control limitation etc. Same is true for risks like data theft. But there are some risks that are hard to mitigate. For example, terrorism, failure of diplomatic conflict resolution, massive digital information, rising religious fanaticism. With the emergence of social media, wide spread use of it by different classes of users and the power of social media have posed such information and security risks. Even if there is some policy or governance, it is hard or almost impossible to monitor it and checking whether that is being followed or not. For example, in all social media, there is restriction on sharing offensive or abusive comments, false information, porn etc. But in reality there are thousands of example, where these are not followed. But what is the result? Creation of some policy or governance will not help. This risks are harder to overcome. With each passing day the risks will become more alarming. The impact of these risks will be fatal for mankind. The impact ranges from breaching of privacy of some individual to some terrorist attack, even war between different races and religious believers. The consequences are really serious. A cyber security threat is possible to deal to some extent, but in the other case, even if we can understand the risk, try to make people aware, still cant be sure that it will work in reality. Information spread through social media real fast. Consider a situation, when some abusive or religious information have been shared through the social media. Most of the people will believe it at the very first place. Even the logical thinkers. Rather than checking the truth of the information people will keep spreading it. Until it is noticed, it will create damage by then. It is also very hard to taking down some information from social media even if its lifetime is very less. Security metrics Metrics are useful for accurate and reliable measurements. Without proper measurement it is hard to manage anything and for businesses this is more applicable. A standard way of measuring information security metric is somewhat diverged. There are some stakeholders who are interested to know the matter from deep down and on the other hand there may be stakeholders who are more interested in surface information. However, experiences show, understanding a matter from bottom level will help to understand the thing better. Like any other case, there are good, useful metrics and useless security metrics. The metrics should focus on the useful things that really matters to the businesses. Then only the stakeholders will be interested. The metrics should help the business to take some proactive approach in dealing with the issues. (Montville, 2012) In terms of information security risks, metric help the businesses to understand their standing point. What is the security level achieved by the in the business. But in the same context, it is very hard to build and implement proper and accurate metrics for measurement of affectivity or applicability or importance of metrics. As the topic of MetricCon 7, the question is, is information security metric a real and helpful thing or just creates more confusions. Businesses are more interested in revenues than complexity of information security. Businesses in other domain than software or IT, even have very little understanding of Information security, its application, importance etc. As a consequence, business stakeholders are supposed to be more interested in business advantages, revenues etc. than security metrics. The presentations on information security metrics, given by a professional information security practitioner and a business man explains the scenario far better way. For example, both of them have discussed information security metrics and its applicability to business. But the presentation given by the business man is more lucid and easy to understand by any common person, who have knowledge about business and wants to have some idea about information security metrics and its application in the business. On the other hand, the presentation given by the security professional is on the same topic. But is gives more complex and technical details. This is not very easy to understand without proper explanation. And it may give lesser information to the business stakeholders. They might not be interested in too much details. So the bottom line is delivering only the information that is understandable to the targeted audience and will give an important but outlined details. The presentation by the businessman explains the basics like what are the metric, KPI etc. rather than jumping into the details. For stakeholders of any business, the presentation by the businessman will be more meaningful. Relational Assessment The relational model is combination of both of the quantitative and qualitative risk analysis processes. It is applicable to any size of organization. However the implementation details may vary. The model follows a patent pending method. There are integrated and automated products as a part of the model. An example is Relational Security Audit Manager or RSAM. It is needed for implementation of the model in medium and larger organization. (Day, 2003) The original model is a complex one. The author of the book has described a simpler version. The simpler model is focused on defining a series of values those have some meaning in the given context. Then those values are assigned to various objects. Hence the risks are calculated. Based on this risk calculation, some policy will be created for dealing with the risks. Many of the concerns from the challenges in traditional quantitative and Qualitative risk assessment models have been addressed and removed in the relational model. For example, it consider both aspect. It calculates the cost factors as well as the qualitative factors, the interrelations of the risks are considered. The relational model is nearer to the quantitative model. As from the given example, we can see, the model considers different scenarios of information systems in different departments of an organization, then calculates the cost of employee down time. Then while comparing these three, all calculations are done in a same platform. It helps in understanding the cost of some risk more accurately. But the core process of risk analysis is quantitative analysis. The model will be useful to the management and auditors. Studies and researches have shown that in most of the cases organizations avoid risk analysis due to the complexity of the risk analysis process, and lack of some suitable model for their business. Quantitative risk analysis gives a clear understanding of the risks in terms of the cost factor associated to the risks. But, one challenge here, that there are several other qualitative aspects of an asset or a type of asses. It also plays crucial role. From that perspective, relational model is a clear as it gives risk analysis from both of the processes. With traditional risk analysis process there were certain challenges. The relational model overcome those challenges and is quite suitable to apply in enterprise computing environment. Management will have a clear idea of the risks, its impact etc. On the other hand, auditors will be able to carry out auditing as the soft factors are clear with the risks in this model. Also the refined cost factors will give better understanding of the scenario and generalization of the assets in the business. The model is also free from bias and human factors in the opinions taken from the employees. This is helpful for qualitative risk assessment. Where the qualities or characteristics of the systems have been checked. References Day, K. (2003). Inside the Security Mind. Prentice Hall. Imperva. (2014). Top Ten Database Threats. Imperva. Lund, J. R. (2008). A Risk Analysis of Risk Analysis. Journal of Contemporary Water Research Educ ation, 53-60. Montville, A. (2012, August 9). To Navigate Your Security Program, Measure Well. Retrieved from Tripwire: https://www.tripwire.com/state-of-security/security-data-protection/to-navigate-your-security-program-measure-well/ Parker, D. B. (2008). A Diligence-Based Idealized Security Review. The Global Voice of Information Security, 35-40. RMIT University. (2004). Qualitative Cost Benefit Analysis . RMIT University Circle. World Economic Forum. (2013). Digital Wildfires in a Hyperconnected World. Retrieved from World Economic Forum: https://reports.weforum.org/global-risks-2013/risk-case-1/digital-wildfires-in-a-hyperconnected-world/ Yazar, Z. (2002). A Qualitative Risk Analysis and Management Tool - CRAMM . SANS Institute InfoSec Reading Room.