Tuesday, August 6, 2019
Multi-disciplinary Care Management in Orthopaedic Ward
Multi-disciplinary Care Management in Orthopaedic Ward The purpose of this assignment is to explore, discuss, and analyse multi-disciplinary care management of a patient admitted to an orthopaedic ward. It will look at how collaboration with other agencies and disciplines takes place. In addition, their role in the rehabilitation and discharge planning. It will conclude if the special needs of the patient were met which will be discussed throughout the assignment. This assignment will contain reference to Gibbs (1988) reflective cycle along with Webb (1992) who agrees it is appropriate and acceptable to write in the first person, when giving a personal opinion. The patient cared for in this assignment was a woman admitted to an orthopaedic ward after falling over in her home, with a possible fractured neck of femur. Fractured neck of femur is the most common traumatic condition requiring admission to orthopaedic wards. It is currently approaching epidemic proportions among older people, especially women (Audit Commission 1995). The names of the staff and hospital will remain anonymous to maintain confidentiality. This is in conjunction with clause 5.1 of the Nursing and Midwifery Councils Code of Professional Conduct (NMC 2002). In addition, a pseudonym of Mrs. H will be used to name the patient. Mrs. H is a fifty-seven year old woman, who has Type II diabetes controlled by tablets and diet. Since she was a child, she was diagnosed as having learning difficulties. A learning difficulty/disability is a significantly reduced ability to understand new or complex information (DOH 2001). Due to social issues, Mrs. H was labelled as a complex discharge from admission. Smith supports this and states discharge planning starts on admission (Smith 2002). Mrs. H was admitted to the ward after an assessment was carried out in the Accident and Emergency Department. Mrs. Hs fracture was confirmed by an x-ray, which identified an extracapsular fracture. The surgical house officer decided to book her for emergency surgery with dynamic hip screws (DHS), which are used to internally fix the fracture. DHS are designed so that the shoulder of the screw presses against the edge of the screw hole and applies pressure at the fracture site (Dandy Edwards 1998). After surgery, Mrs H was transferred onto an elective orthopaedic joint replacement ward where I was placed. The ward follows Ropers model of nursing as well as a care pathway for total hip and knee replacements. These pathways have been defined as a multidisciplinary outline of anticipated care, placed in an appropriate time frame, to help a patient with a specific condition or set of symptoms moving progressively through a clinical experience to a positive outcome (Roberts Reeves 2003). Ropers model of nursing is the most commonly used in the UK, particularly in adult nursing (Kenworthy et al 2002). This model focuses on twelve activities that people engage in to live(Roper et al 1995). It focuses on the client as an individual engaged in the living throughout his or her lifespan, moving from dependence to independence, according to different circumstances. The concepts underlying the model are the progression of a patient along a lifespan, dependence, and independence continuum, the activities of daily living and influencing factors, and lastly individuality (Roper et al 1995). However, the goals of orthopaedic nursing is to return the patient to mobilise fully and weight bear independently, hence, self-caring. Therefore, Kenworthy et al (2002) suggests that when working with patients with learning difficulties, nursing models may need adapting to cater for long-term problems. Kenworthy et al (2002) also suggest that Orems (1985) model of nursing is integrated with Ropers (1995), which is widely used in the fields of rehabilitation and community care. Despite this, this ward adheres only to Ropers (1995) model. When Mrs H initially arrived on the ward, her patterns of activities were assessed, evaluated, and documented by the nurse. The problems identified were used to formulate a plan of care. This involves referrals to other agencies and disciplines. A multidisciplinary approach to rehabilitation and discharge planning is fundamental and includes the following: A named nurse, health care assistant, physiotherapist, radiographer, catering staff, social worker, occupational therapist, dietician, and psycho geriatrician. Other health team members involved in her care were community based health professionals such as her general practitioner who would be involved after discharge. The adult nurse could facilitate health promotion for people with learning difficulties. This could involve a member of the community learning disabilities team, a learning disabilities nurse. The role of the learning disabilities nurse is to liase with hospital administration staff to plan clients care needs on admission and discharge (Simpson 2002). However, there is shortage of learning disabilities nurse in the UK (UFI limited 2000). Nevertheless, the nurse could adhere to the protocol for admission to hospital for adults with learning disabilities, which is being piloted in some hospitals at present (Robson 2000). Therefore, by using Mrs. H as an example of a learning disabilities patient, requiring specialist nursing. The ward could devise its own protocol. Similarly, by looking at the governments white paper for Learning Disabilities (LD) published in March 2001, its aims are to challenge discrimination and improve access to health and a better quality of life for people with LD (DOH 2001). The idea that nurses could discriminate against disabled patients may seem preposterous (Scullion 1996). However, some may play a part in what Miller (1995) calls hospital induced dependency. Biley (1994) suggests that far from being user-friendly, hospitals may be particularly hostile to disabled people. Hannon supports this and points out people with learning disabilities are vulnerable and frightened on admission to hospital (2003). The nurse carried out most nursing interventions, including measurement of blood pressure, pulse, respiration, and temperature. This procedure was carried out every half hour for two hours until Mrs. Hs cardiovascular observations were stable. This was increased to four hourly intervals (NHS Trust 2002). The nurse also monitored her pain score, sedation score, and pain site. She checked all intravenous drips for leakage. Wound dressings were observed for strike through. Mrs. H arrived back on the ward with a patient controlled Analgesia (PCA) pump. It is a method of pain relief, which allows patients to control their own pain by using an electronically operated pump (NHS Trust 1998). By using a pain assessment tool, nurses play a major role in assessing and managing pain (Watt-Watson et al 2001). The administration of prescribed analgesia was offered, and local policies regarding pain relief were implemented (Alexander et al 2000). However, Watt-Watson et al (2002) states many nurses distrust patients self-reporting of their pain, which suggest that they have their own benchmark of what is an accepted level before analgesic is necessary. McCaffrey disputes this and notes pain is what the patient says it is and exists when he or she says it does (McCaffrey Beebee 1989). The nurse would ask Mrs. H if she would like any pain relief and on most occasions, she replied Yes. The Nursing Midwifery Council (NMC) guidelines for mental health and learning di sabilities (MH LD 2002) state it is important to devote as much time as it is necessary to explain issues to clients (nmc.org.uk 2002). This suggests that the nurse should ask if they have any pain and explain it is not always necessary to agree to accept pain relief. The NMC guidelines for MH LD also state people with learning disabilities have a fluctuating state of competence (nmc.org.uk 2002). Due to poor mobility and being a diabetic, Mrs H was at risk of developing pressure sores. Using the hip replacement care pathway as a tool, the nurse and health care assistant turned her every two hours using an immoturn. This is a metal frame to help move the patient, it elevates pressure, ensuring no discomfort or soreness is experienced (NHS 2002). Because older patients are at risk of a deep vein thrombosis following surgery, the use of an anti-coagulant clexane was used (Collins 1999), the nurse encouraged leg and circulatory exercises to be commenced post operatively. Due to a previous low blood haemoglobin, a full blood count was taken, along with urea and electrolytes and liver function tests (Collins 1999). Blood glucose monitoring was carried out and documented at appropriate times. Mrs. Hs consent was not always sought to carry out the blood glucose monitoring procedure. The NMC MH LD guidelines (nmc.org.uk 2002) suggest that certain environments force the learning disab ilities client to feel forced to make certain decisions. They go on to suggest if a person has been appointed as guardian of the client, matters of consent should be discussed with that person (nmc.org.uk 2002). The diabetic nurse was not involved as the nurses on the ward were managing Mrs Hs diabetes through tablets and monitoring of her diet. Using the wards care plan as a tool to reassess Mrs Hs problems, it was evident that by the third day post operatively her dietary intake was poor. Due to this, and the fact Mrs H was a diabetic, a referral to the dietician was made. The dietician advised both the catering staff and the nursing staff what type of diet was appropriate. The nurse would sit with Mrs. H and talk through what was available on the food menu. Mrs. H would deny that she had chosen the meal when it arrived. The NMC MH LD guidelines outline learning disabilities clients may be highly suggestive, thus most likely to agree to choices from those in positions of authority (nmc.org.uk 2002). They also suggest an advocate would promote the clients right to choose and decide for themselves (nmc.org.uk 2002). On the third day after Mrs. H operation, the physiotherapist came to teach her how to use a walking frame, which should progress to walking with two sticks. The physiotherapists play an important part in the patients rehabilitation process by encouraging limb movement (Cuthbertson et al 1999). After mobilising on the stairs with the physiotherapist, a referral to the occupational therapist was made. The role of the occupational therapist was to assess the patient and decide if any aids are needed to help the patient manage safely and independently at home. Both the physiotherapist and occupational therapist agreed that Mrs. H was fit enough to go home. The multidisciplinary team (MDT) recognised the benefit of family centred care and involved Mrs Hs family (Wright Leahey 1994). This resulted in the family expressing concern over the squalid conditions of her home. Mrs. Hs home had not been cleaned for some time; she chose to leave left over food all over the house. This resulted in an infestation of maggots and bluebottles. In addition, the house was poorly maintained, with no heating and hot running water. The main concern expressed by the MDT was hundreds of rubbish bags, which surrounded most of the house, causing blockage of the stairs and doorways. Due to Mrs. Hs learning disability, a cognitive assessment was requested, and carried out by a psycho geriatrician. The nursing admission form contradicts this decision, in which Mrs. H states that she knew why she was in hospital and what her treatment was. However, as mentioned earlier, people with learning disabilities have a fluctuating state of competence (nmc.org.uk 2002). The psycho geriatrician confirmed that Mrs. H did have the capacity to decide where she lived. Nevertheless, Mrs Hs social worker was very concerned about home circumstances. Based on these facts, the ward nurse contacted the community liaison nurse to arrange a case conference. Unfortunately, this was delayed by two weeks due to the social worker taking annual leave. The nursing staff was told that there was no other social worker available to take over this case. T his may be explained by the fact that there is currently a shortage of qualified social workers nationwide (Simpson 2002). Most days, Mrs. H would spend time sitting in her chair and would only mobilise when going to and from the toilet. Over the weekend, Mrs H did not receive any visitors. She then became tired mobilising back from the toilet. She began to shout loudly and insisted she was in pain. As it was visiting time, all the visitors stopped to stare at her. The nurses responded to this by transporting her back to her bed in a wheelchair. This behaviour continued for a couple of days. This prompted an x-ray referral, which confirmed no change. This was recorded on the care pathway as a variance. Any variance from the anticipated care pathway is recorded outlining what occurred differently, why and what was done instead (Onslow 2003). Mrs. H was encouraged to mobilise as much as she could but she would still shout in pain. The NMC guidelines for MH LD (nmc.org.uk 2002), however, suggest a lack of individual stimulation could be the reason and exacerbate the problems associated with some challenging behaviours. Eventually a case conference was arranged. The issues highlighted were although Mrs. H has the help of daily home carers visiting twice a day and belongs to a lunch club, she had a history of falls. Mrs. H was mobilising around the home with a zimmer frame, due to a right fractured neck of femur in 1999. The MDT reached a decision and the aim is to get Mrs. H to agree to a home visit. After careful negotiations with Mrs H and members of the MDT, a home visit took place. The outcome of the home visit was sheltered accommodation would be safer. Pritchard Pritchard (1994) suggests each member of the team demonstrates a clear understanding of his or own functions and recognises a common interest. This common interest was the well being of the patient. Mrs. H was asked to visit the sheltered housing available and asked to make a decision. Mrs. H decided she wanted to go home. The occupational therapist made a list of recommendations, such as rails on her front door, additional help to tend to the coal fire or alternate heating and an electrician to come and fix the light in Mrs. Hs bathroom. Unfortunately, the social worker involved with Mrs. Hs case went on annual leave for a further two weeks. Mrs. H is now still in hospital awaiting her social workers instructions on her discharge. According to the Guardian newspaper, every day across England, about 5,000 people of all ages are unnecessarily stuck in acute hospital beds because no follow up care is available in the community (Waters 2003). This is still happening in spite of in 2003, the government introduced the community care (Delayed Discharges Act). This act, effective from January 2004, stipulates social services departments will be fineable and will have to pay the NHS up to à £120 per day to cover the cost of a blocked bed (Batty 2003). On reflection, (Gibbs 1988) I felt there was evidence of good multi-disciplinary team collaboration. Mrs. H was given good care and emphasis was placed on her rehabilitation and discharge planning. However, on further analysis, utilisation of other agencies/disciplines could have been made. Due to staff shortages, and no alternative social worker being available to be Mrs. Hs advocate, then the community learning disabilities could have been involved. As this was not possible, the nurse as a health facilitator could have made herself and the multidisciplinary team aware of the government white paper, learning disabilities a strategy for the 21st century (DOH 2001). Conversely, one member of the nursing staff could have offered to participate in training courses for the care management of people with learning disabilities (NHS Careers 2000). Overall, the nursing staff implemented good care. Nevertheless, the nursing staff by using Mrs. H as an example of a complex discharge can learn from this. They could put in place policies to deal with other learning disabilities patients. Finally, the NMC (2002) clause 2.4, stipulates that as a registered nurse, you must promote the interests of your clients. This includes helping individuals and groups, including the multidisciplinary team, to gain access to health and social care. More importantly, you must respect the interests of patients irrespective of their ability (NMC 2002) clause 2.2.
Monday, August 5, 2019
Information Security Using Cryptography Information Technology Essay
Information Security Using Cryptography Information Technology Essay This paper aims to provide a total review of Information security and cryptography, Information security means protecting information and information systems from unauthorized access (PROXY SERVERS), use, disclosure, disruption, modification, or destruction. Governments, military, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement. SECURITY in this contemporary scenarios has become a more sensible issue either it may be in the REAL WORLD or in the CYBER WORLD. In the real world as opposed to the cyber world an attack is often preceded by information gathering. This is also true in the cyber world. Here the bad guys are referred to as intruders, hackers, hijackers, etc. The intruders would first have a panoramic view of the victims network and then start digging the holes. One of the method for protecting information from hackers is Cryptography Cryptography defined as the science and study of secret writing, concerns the ways in which communications and data can be encoded to prevent disclosure of their contents through message interception, using codes ciphers and other methods, so that only certain people can see the real message. Encryption transforms original information, called plaintext, into transformed information, called cipher text, code text or simply cipher, which usually has the appearance of random, unintelligible data. Encryption provides confidentiality, integrity and authenticity of the information transferred from A to B. INTRODUCTION: The objective of this paper is to provide the reader with an insight into recent developments in the field of cryptography. Cryptography was used as a tool to protect national secrets and strategies. The proliferation of computers and communications systems in the 1960s brought with it a demand from the private sector for means to protect information in digital form and to provide security services. DES, the Data Encryption Standard, is the most well-known cryptographic mechanism. It remains the standard means for securing electronic commerce for many financial institutions around the world. The most striking development in the history of cryptography came in 1976 when Diffie and Hellmann published New Directions in Cryptography. The word cryptography comes from a Greek word which means hidden or secret. It is considered as a miraculous boon that will solve all the computer security problems. It is also referred to as science of secret writing. The objective is to provide security to the appropriate layer among the seven layers of networking infrastructure. This topic can be dealt mathematically also. But our focus is on cyber applications and its vitality. While cryptographers work on inventing clever secret codes, cryptanalysts attempt to break these codes. Cryptology encompasses both the subjects. Symantec is launching Norton 360 in India, an online digital security solutions service that could be paid for on basis of actual usage. The company which has various products to provide information security and retrieval of secured information, is also now into providing a regulatory compliances services. This is a sentence published in the famous newspaper The HINDU .This is an excellent evidence to support the sentence Network security is extremely essential. Two entities A and B wish to work over a secure network .but an intruder interrupts and shares their secrets without their knowledge. Now cryptography has the ability to send information between entities in a way that prevents others from reading it. For instance: If the original message was GIVE TWO MILLION he would have encoded the message with SHIFT BY 3 and so the message would now be JLYHWZRPLOORQ which is obviously in an unreadable format unless you know the method of deciphering. BASIC PRINCIPLES: Key concepts For over twenty years information security has held that confidentiality, integrity and availability (known as the CIA Triad) are the core principles of information security. CIA TRAID Confidentiality Confidentiality is a requisite for maintaining the privacy of the people whose personal information the organization holds. Information that is considered to be confidential in nature must only be accessed, used, copied, or disclosed by persons who have been authorized to access, use, copy, or disclose the information, and then only when there is a genuine need to access, use, copy or disclose the information. A breach of confidentiality occurs when information that is considered to be confidential in nature has been, or may have been, accessed, used, copied, or disclosed to, or by, someone who was not authorized to have access to the information. Integrity In information security, integrity means that data can not be created, changed, or deleted without authorization. A loss of integrity occurs when an employee accidentally, or with malicious intent, deletes important data files. A loss of integrity can occur if a computer virus is released onto the computer. A loss of integrity can occur when an on-line shopper is able to change the price of the product they are purchasing. Availability The concept of availability means that the information, the computing systems used to process the information, and the security controls used to protect the information are all available and functioning correctly when the information is needed. Defense in depth During its life time, information may pass through many different parts of information processing systems. There are many different ways the information and information systems can be threatened. To fully protect the information during its lifetime, each component of the information processing system must have its own protection mechanisms. The building up, layering on and overlapping of security measures is called defense in depth. Additional insight into defense in depth can be gained by thinking of it as forming the layers of an onion, with data at the core of the onion, people as the outer layer of the onion, and network security, host-based security and applications security forming the inner layers of the onion CRYPTOGRAPHY: OVERVIEW: Security Concerns Security Attacks: Interruption Interception Modification Fabrication Methods of defense: Encryption Software Controls Hardware Controls Physical Controls Encryption Cryptography Cryptanalysis Encryption algorithm types: Asymmetric Symmetric Cryptographic Algorithms: Secret key Public key Hash functions History-Caesar cipher A simple substitution cipher Polyalphabetic substitution example Uses of encryption Applications of cryptography Security Concerns: Unauthorized access to resources. Masquerade as authorized user or end system. E-mail forgery. Malicious attacks. Monitoring and capture of network traffic. Exploitation of software bugs Contributing Factors: Increased Internet use: Home broadband, Greater coverage (wired and wireless): More ubiquitous on-line use: Education, Business, Games, Shoppingà ¢Ã¢â ¬Ã ¦ Lack of awareness of threats and risks. Wide-open network policies. Unencrypted network traffic. Complexity of security measurements and administration. Software bugs. Availability of cracking tools. Security Attacks: Interruption: This is an attack on Availability. Interception: This is an attack on confidentiality. Modification: This is an attack on integrity. Fabrication: This is an attack on authenticity. Methods of defense: Encryption: Encryption is key enabling technology to implement computer security. Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called encryption. Information that has been encrypted (rendered unusable) can be transformed back into its original usable form by an authorized user, who possesses the cryptographic key, through the process of decryption. Cryptography is used in information security to protect information from unauthorized or accidental discloser while the information is in transit (either electronically or physically) and while information is in storage Cryptography can introduce security problems when it is not implemented correctly. The length and strength of the encryption key is also an important consideration. A key that is weak or too short will produce weak encryption. The keys used for encryption and decryption must be protected with the same degree of rigor as any other confidential information. What is cryptography? Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Cryptology embraces both cryptography and cryptanalysis. Strong cryptography: There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. Cryptographic strength is measured in the time and resources it would require to recover the plaintext. The result of strong cryptography is cipher text that is very difficult to decipher without possession of the appropriate decoding tool. How does cryptography work? A cryptographic algorithm, or cipher, is a mathematical function used in the encryption and decryption process. A cryptographic algorithm works in combination with a key-a word, number, or phrase-to encrypt the plaintext. The same plaintext encrypts to different cipher text with different keys. The security of encrypted data is entirely dependent on two things: the strength of the cryptographic algorithm and the secrecy of the key. A cryptographic algorithm, plus all possible keys and all the protocols that make it work comprise a cryptosystem. Conventional cryptography: In conventional cryptography, also called secret-key or symmetric-key encryption, one key is used both for encryption and decryption. Encryption and decryption: Data that can be read and understood without any special measures is called plaintext or clear text. The method of disguising plaintext in such a way as to hide its substance is called encryption. Encrypting plaintext results in unreadable gibberish called cipher text. You use encryption to ensure that information is hidden from anyone for whom it is not intended, even those who can see the encrypted data. The process of reverting cipher text to its original plaintext is called decryption. This could be illustrated using the following diagram: 001010010111001 100101001011001 001011100100101 Encryption and decryption Why Cryptography? Concerned with developing algorithms which may be used to: Conceal the context of some message from all except the sender and recipient (privacy or secrecy), and/or Verify the correctness of a message to the recipient (authentication) Forms the basis of many technological solutions to computer and communications security problems Elements of cryptography: In cryptographic terminology, the message is called plaintext or clear text. Encoding the contents of the message in such a way that hides its contents from outsiders is called encryption. A method of encryption and decryption is called a cipher The name cipher originates from the Hebrew word Saphar, meaning to number. The encrypted message is called the cipher text. The process of retrieving the plaintext from the cipher text is called decryption. Encryption and decryption usually make use of a key, and the coding method is such that decryption can be performed only by knowing the proper key. Cryptanalysis: The study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key is called Cryptanalysis. Also called code breaking sometimes. Whereas people who do cryptography are cryptographers and practitioners of cryptanalysis are cryptanalysts. Cryptology Cryptology is the branch of mathematics that studies the mathematical foundations of cryptographic methods. Cryptology comes from the Greek words Krypton, meaning hidden, and Graphen, meaning to write. Cryptology is actually the study of codes and ciphers. Cryptology = both cryptography and cryptanalysis. The Key: All modern algorithms use a key to control encryption and decryption; a message can be decrypted only if the key matches the encryption key. The key used for decryption can be different from the encryption key, but for most algorithms they are the same. Encryption Algorithm Types: There are two classes of key-based algorithms: Symmetric (or secret-key) Asymmetric (or public-key) algorithms The difference is that symmetric algorithms use the same key for encryption and decryption (or the decryption key is easily derived from the encryption key), whereas asymmetric algorithms use a different key for encryption and decryption, and the decryption key cannot be derived from the encryption key. Asymmetric Algorithms: public key Public key cryptography is an asymmetric scheme that uses a pair of keys for encryption: a public key, which encrypts data, and a corresponding private, or secret key for decryption. You publish your public key to the world while keeping your private key secret. Anyone with a copy of your public key can then encrypt information that only you can read. Even people you have never met. It is computationally infeasible to deduce the private key from the public key. Any one who has a public key can encrypt the information but cannot decrypt it. Only the person who has the corresponding private key can decrypt the information. The primary benefit of public key cryptography is that it allows people who have no preexisting security arrangement to exchange messages securely. The need for sender and receiver to share secret keys via some secure channel is eliminated; all communications involve only public keys, and no private key is ever transmitted or shared. Public key algorithm: Symmetric Algorithms Symmetric algorithms can be divided into two categories: (1) stream ciphers and (2) block ciphers. Stream ciphers can encrypt a single bit/byte of plaintext at a time, whereas à ¢Ã¢â ¬Ã ¦ Block ciphers take a number of bits (typically 64 bits in modern ciphers), and encrypt them as a single unit. Secret key and Public key: Hash functions: An improvement on the above scheme is the addition of a one-way hash function in the process. A one-way hash function takes variable-length input-in this case, a message of any length, even thousands or millions of bits-and produces a fixed-length output; say, 160-bits. The hash function ensures that, if the information is changed in any way-even by just one bit-an entirely different output value is produced. As long as a secure hash function is used, there is no way to take someones signature from one document and attach it to another, or to alter a signed message in any way. The slightest change in a signed document will cause the digital signature verification process to fail. Hash Functions History Caesar Cipher: Julius Caesar used a simple alphabet (letter) substitution, offset by 3 letters. Taking the word cipher you would move ahead in the alphabet 3 letters to get FLSKHU. c =3 à ® 3+3 = 6 à ® F i =9 à ® 9+3 = 12 à ® L p =16 à ® 16+3 = 19 à ® S h =8 à ® 8+3 = 11 à ® K e =5 à ® 5+3 = 8 à ® H r =18 à ® 18+3 = 21 à ® U This worked for a while, until more people learned to read and studied his secret cipher. A Simple Substitution Cipher Plaintext: abcdefghijklmnopqrstuvwxyz QIAYMWFUBKPDGJZSOCVLXNETRH Cipher text: Polyalphabetic Substitution Example: Suppose that a polyalphabetic cipher of period 3 is being used, with the three monoalphabetic ciphers M1, M2, M3 as defined below. To encrypt a message, the first 3 letters of the plaintext are enciphered according to ciphers M1, M2, M3 respectively, with the process being repeated for each subsequent block of 3 plaintext letters. a b c d e f g h i j k l m n o p q r s t u v w x y z M1: K D N H P A W X C Z I M Q J B Y E T U G V R F O S L M2: P A G U K H J B Y D S O E M Q N W F Z I T C V L X R M3: J M F Z R N L D O W G I A K E S U C Q V H Y X T P B Plaintext Now is the time for every good man Ciphertext JCQ CZ VXK VCER AQC PCRTX LBQZ QPK Note: The two os in good have been enciphered as different letters. Also the three letters X in the cipher text represent different letters in the plaintext Uses of Encryption: Protecting data from prying eyes is not the only security issue in networking. One can imagine at least four security services: Protecting data from being read by unauthorized persons Verifying the sender of each message (authentication) Preventing unauthorized persons from inserting or deleting messages Making it possible for users to send signed documents electronically Applications of cryptography: Digital signatures have many applications in information security, including authentication, data integrity, and non-repudiation. One of the most significant applications of digital signatures is the certification of public keys in large networks. Certification is a means for a trusted third party (TTP) to bind the identity of a user to a public key, so that at some later time, other entities can authenticate a public key without assistance from a trusted third party There is a lot of information that we dont want other people to see. This can be achieved by cryptography such as Credit card information Private correspondence Social security numbers Personal details Sensitive company information CONCLUSION: Thus Information security measures are needed to protect data from hackers, when it is transmitted between terminal user and computer and between computer and computer and it is also necessary to protect the computer system when there is an attack of virus. The capability of security enabled components still lags behind the claims. Everyone has a different idea of what security is, and what levels of risk are acceptable. Its important to build systems and networks in such a way that the user is not constantly reminded of the security system around him. As and when new security methods are developed, breaking of these methods has increased. So measures have to be taken to fill the loopholes, of which cryptography has and is playing a major role. Cryptography is evergreen and developments in this area are a better option. Basic security challenges in the corporate realm are not yet completely addressed. Nevertheless the cumbersome combats devised against each of the security fissures, yet the cyber MAVERICKS all around the world are succeeding in their ways of perdition. This was quite evident from the E-attacks on BARC server post-September11th cyber attacks on FBI sites where even sophisticated surveillance systems couldnt come to their rescue. A case in point is that, E-ATTACKS are becoming notoriously peerless as compared with the traditional nuke-wars. Consequently, in the quench of thirst for more and more secured systems BIOMETRICS SYSTEM, QUANTUM CRYPTOGRAPHY and many more are innovatively being implemented at a cumulative pace.
Sunday, August 4, 2019
Can there be a grand unified theory of Psychology? Discuss. :: essays research papers
Can there be a Grand Unified Theory of Personality? Bradley Templeton Scobie No single theory of personality can adequately explain the full function of human behaviour. Psychodynamic approaches often come under a lot of criticism as they fail to be explicit about the underlying bases of the theory. Cognitive theories are not very comfortable with explaining emotions and behavioural theories have difficulty explaining the mechanisms of improvements. It has become quite clear in the field of Psychology, and to some Psychologists like Windy Dryden (Individual Therapy) explicitly clear that there is a missing linkand that somewhere amongst the mass of theories on personality, the answer is staring them in the face. These Psychologists often practice a form of Psychology called Eclectism, which takes a little out of each theory and unites it during therapy with a client. You canââ¬â¢t use this sort of therapy as a theory however because all the Eclectic Psychologist is doing is ignoring the fundamental ideological underpinnings of the particular theories he is using and taking the parts relevant to their client in therapy This essay will explore one of the possible combinations of theories on personality and explain how it can be applied in practical therapy. Eysenkes theory of biological bases in behaviour is the base of this essays approach. It provides the rules within which the other two personality theories (Kellys Personal Construct Theory and Maslows Hierarchy of Human needs) can function. Using Eysenkes theory on extravert and introvert behaviour it is possible to determine from birth, very general traits about which a person is willing to work within (aggression, anxiety tolerance and sociability etc) which is where this essay believes Kelly slightly misunderstands this concept and defines it as his Range Corrollary. Really the person is experiencing a fundamental shift from Extravert behaviour or thinking to Introvert or vice versa which causes slight unease and can account for things like shyness etc. One of the major criticisms of Kellys Personal Construct Theory is that he finds it hard to explain why constructs are laid down in the first place and why one would rigourously defend the threat to a core construct. What kick starts the Construct system into defending itself when motivation is clearly and explicitly lacking in his theory? Eyesenkes theory provides an amicable solution. If we could assume that this information was genetically coded in to the cells at birth then this no longer becomes an issue and we can explain howââ¬â¢s and why the constructs are laid down to a loose genetic template i.
Saturday, August 3, 2019
College Education vs. Technical Training Essay -- Argumentative Persua
College Education vs. Technical Training A few years ago, the DeVry technical institute released a commercial that compared two brothers in their educational pursuits. The younger brother started school at DeVry and graduated in two years. The older brother had chosen college and was still stuck in his dorm room studying history while his younger brother worked on the future. The question this commercial presented was obvious, why waste all that time in a university learning trivial facts which donââ¬â¢t apply to the real world when you can bypass it and still learn an important skill. That is an interesting question to consider, especially in such a hi-tech world. But is job training all one needs to know to be successful? What are the advantages of a college degree versus a technical degree? I would like to consider some advantages a college graduate might have in the areas of employment, family and community. For this paper, I would like to define a university education as that which enables students to expand their communication skills, evaluate problems using critical thinking, a general broadening of cultural awareness and a knowledge of history in relation to how their surrounding world came to be. A university education also provides students with a chance to appreciate and understand the arts, ponder philosophical questions and discuss the significance of works of literature. Students learn the relationship of science to the body, the Earth, the universe and role mathematics plays in all of this. Every student that obtains a university degree should be able to lay claim to a little knowledge in all of these areas. The definition of a technical education as given by DeVry reads, ââ¬Å"To provide high-quality career-oriente... ...he United States, including the fundamental relationships of the federal system. Courses in economics study contemporary economic problems such as inflation, unemployment, poverty, and pollution. These courses help students better understand their place in the community and how to change their situation. They are less likely to feel helpless about their problems they facing Americans. College gives students the means to teach themselves long after their formal education is complete. At best a college education teaches us to think outside of the box. It gives us an appreciation of others differences, instead of a fear of it. College graduates should be able to digest the information around them and formulate their own opinion. Students should come away from their education with the ability to instigate change in themselves, their family, and their community.
Friday, August 2, 2019
Should Euthanasia be Legalised Essay -- Papers
Should Euthanasia be Legalised This essay will explore several different and varied opinions about whether or not euthanasia should be legalised. Euthanasia is the Greek word for easy death, but is often referred to as mercy killing. There are two main forms of euthanasia. Voluntary euthanasia is when a terminally ill patient expresses the wish to be euthenised. Active euthanasia is when a Doctor decides that it is in the best interest of the patient to be euthenised. All forms of euthanasia are illegal in Great Britain; however in Holland, Switzerland, Oregon in the U.S and the northern territories of Australia, voluntary and assisted euthanasia has been legalised in recent years. Firstly most Religious groups are opposed to euthanasia, because it is seen as murder. Christians and Jews in particularly are against euthanasia because in 'the ten commandments' it is written that 'you must not kill'. In the Torah and the Bible it also reads that humans are created in the image of God and in the Bible it also reads that Jesus died to save us. Christians and Jews base their views on euthanasia on these things in particular because they believe that only God has the right to decide when to end a life. On the other hand the Roman Catholic Church is of the Christian faith but they do have a slightly different opinion. Although they are very pro-life, they do not believe in pro-longing life by treatment which will prolong suffering. However the government is concerned that if euthanasia were legalised then the amount of suicides in our country will rise considerably. This has not been entirely proven in the few countries that have ... ... of himself administering a lethal injection to a terminally ill man who wished to die. In conclusion I believe that voluntary euthanasia should be legalised because if you have a very poor quality of life then you should be able to have the right to end it. I agree with the Roman Catholic opinion that there is no need to prolong life by treatment which will only prolong the suffering. I also think that only Doctors should be allowed to assist with euthanasia, otherwise euthanasia may be used lightly when it is not necessarily the only option. Until euthanasia is legalised there will continue to be unnecessary arrests of people who thought that they were helping, by euthenising terminally ill people who had little or no chance of ever recovering from their illness, and may have had to suffer for a great deal longer.
Thursday, August 1, 2019
The health issues of obesity which is defined as an eating disorder and an associated serious health concern
With in this assignment I will discuss the health issues of obesity which is defined as an eating disorder and an associated serious health concern that is defined by excess weight Colditz & Dietz, (1999) I will also discuss the holist issues that may impact on an individual healthy lifestyle. I will identify one government policy that has been put in place to help alleviate the problem of obesity, and explore the nurse's role in relation to the policy. Using relevant evidence such as literature reviews and researched articles I will support my findings, and conclude by giving an overall summary of the main point of this essay. BMI is widely used to define obesity (WHO, 1998). And is calculated as BMI = Weight (kg)/Height2 (m). A person that is obesity has a larger amount of extra body fat and is more prone to the risks of serious health problems such as Heart disease, stroke, High blood pressure and Diabetes. (Cynthia Haines 2005). Obesity can be hereditary, but only develops from overeating, irregular meals and having a lack of daily physical activity Arne Astrup (2005) The Holism impact involves looking at every aspect of a person's life and wellbeing and trying to understand the reasons why they have developed theses holistic issues. This may involve there physical, physiological, social and spiritual impacts of there lifes. Kolcabu,R. ,1997 defines holism as the belief that a whole person can consist of these compartments and suggest that these compartments are intimately connected with a persons physical body. The psychological impact of obesity may consist of low self-image and lack of confidence, social stigma, reduced mobility and a poorer quality of life, obese children and adolescents face stigmatisation and discrimination in many areas of their lives. It has been assumed that their psychological well-being will be compromised both as a direct consequence of this social adversity, and indirectly through negative ââ¬Ëreflected self-appraisal'. Wardle J. (2005) The holist social impact on obesity can result from an underlying pathological condition, e. . hypothyroidism which is a condition in which the body lacks sufficient thyroid hormone, the current trends lie with an increasingly sedentary lifestyle and poor dietary habits, which are particularly seen in the lower socio-economic groups. (National statistics 2001) Research has also suggested that the main problem is the continual reduction in the amount of exercise people take and argued that many overweight children have overweig ht parent which is often a matter of a family's lifestyle. Dr Rob Hicks 2006). The spiritual issues of obesity may involve the lack of meaning and purpose of how they perceives there out look on life, It has been suggested that psychological classes and therapies sessions may provide individuals the opportunity to develop some insight into there old patterns of life and develop healthier skills which can in turn help and deal with there issues of obesity that can then increase there likelihood of restoring a healthier life style. Physical activity are also a major aspect on a person's life in the relation of body composition, it is suggested that weight gain is associated with periods of a lack of activity and argue that by increasing physical activity body fat can be reduced. Behnke, A. , (1974). The Royal College of GPs (2004) have stated that exercise needs to be made more affordable and accessible to people living in the UK as the Lack of physical activity is found to be the most significant factor to the contribution to childhood obesity and is contributed to inactivity's, such as watching television or sitting playing computer games. Ref I suggest that the over all spectrum of society must work to together to tackle the effects of obesity and may involves marketing less fast food outlets and giving people on low incomes free gym membership, I suggest with theses alteration in place the financial and health impacts on obesity would decrease considerably as according to The Health Select Committee has estimated that the costs of obesity is around i3. ââ¬â i3. 7 billion per year and suggest if there were less obese people in this country 15,000 fewer people would develop conditions such as coronary heart disease, 34,000 fewer people would developing type 2 diabetes, and 99,000 fewer people would develop high blood pressure. (Department of health 2007) However measures have already been put in place to try and tackle theses health implication. The new NICE guidelines (2006) a government policy have clinical guideline on the prevention, identification, assessment and management of overweight and obesity in adults and children and covers how G. P's and hospitals asses whether people are overweight or obese as well as ways of helping people lose weight and stay healthy. However it is still considered that peolel in our socieit can sometimes find it very difficult talk about their weight issues as There is still a lot of stigma and shame connected to obesity Professor Thomas (2004) I suggest that the nurse role explored in this government policy is to help individuals try accept there obesity as a condition, establish family history and there views around there condition of obesity and consider some of the possible health reasons why weight loss is considered necessary for them, this may include changing there eating patterns and increasing levels of physical activities. NICE 2006) other Interventions may include encouraging the increase of fresh fruit and vegetables (five portions a day) a Government recommendation (Department of health2003). Confectionery firms have also been told to shelve some of their king size chocolate bars in a bid to tackle obesity however Z Linnell, Bucks, UK argues that It isn't the size of the chocolate bar that is to bla me for obesity but the frequency in which people eat it. The Department However there are May barriers that may discourage healthy eating such as cultural barriers ethnic minority populations wear them view obesity as a more positive with neutral value Kumanyika, s. K 1994. Other barriers may include the lack of knowledge, attitudes, motivation and skills that involve the buying, preparing and eating health foods. . of Health said the NHS already allowed GPs to refer patients to gyms for a subsidised membership I conclude that this may suggest that all the holistic issues of an individual can be an important aspect for long-term weight and body fat regulation and Good health and effective learning go hand in hand as a healthy body leads to a healthy mind. and agreement with the that by taking the ââ¬ËSmall Changes of obesity such as promoting physical activity across the board can make Big Difference to people's long-term health (Caroline Flint 2006)
Oil Boom in Nigeria: What are the Socio-Economic Implications for Society from 1999-2014?
Chapter 1: Introduction Nigeria is one of the leading oil producing countries in the world. Nigeriaââ¬â¢s economy was largely characterised by agricultural production alongside other consumer goods up to the 1980ââ¬â¢s, when oil wealth took over the majority of the countryââ¬â¢s economy. For more than three decades, Nigeria has exploited her oil resources for export. The emergence of oil as Nigeriaââ¬â¢s main source of revenue has generated a number of questions regarding the significance of the oil wealth to the socio-economic development of Nigeria society. It has been commonly assumed that Nigeriaââ¬â¢s large oil deposits would spur socio-economic growth and put the country among the worldââ¬â¢s elite nations in terms of economic growth and social prosperity (Ian and Terry, 2003). Since independence from Great Britain in 1960, Nigerians have experienced a number of problems ranging from ethno-religious and sectarian conflicts to corruption. According to Gboyega (1996) the post-independe nt Nigeria is one that has bore the brunt of leadership-induced poverty instigated by corruption scandals, religious charlatanism, war, restiveness, political instability, series of dictatorial regimes, and failure to build basic amenities among other issues. Ironically, these challenges have intensified during the period when Nigeria experienced what is commonly referred to as the ââ¬Ëoil boomââ¬â¢ (Gboyega, 1996, p.39). Julius-Adeoye (2010) believes that Nigeriaââ¬â¢s severe socio-economic crisis started immediately after independence, when the countryââ¬â¢s leaders plundered the nationââ¬â¢s resources with massive corruption allegations at the expense of citizensââ¬â¢ wellbeing; excuses that military generals used to mount coups from the civilian rulers. Whilst it was expected that the beginning of Nigeriaââ¬â¢s democratically elected government in 1999 under the leadership of President Olesegun Obasanjo would see sudden change of fortunes for Nigerians, the country has not realised much progress in terms of social progress despite the much hyped economic growth (Salawu, 2010). Data indicate that Nigeriaââ¬â¢s oil revenue hit US$ 300 billion in the last two decades alone (Balouga, 2009). But it is the rise in revenue (over USD$112 billion between 2004 and 2007 alone) during Obasanjoââ¬â¢s reign that has raised questions about the countryââ¬â¢s priorities and socio-economic development plans. One question one would ask is; where did Nigeria got it wrong in terms of socio-economic developmentTo answer this question, there is need to understand how defining regimes of General Ibrahim Babangida and later Olesegun Obasanjo have contributed to the socio-economic slump of the resource-rich Nigeria. 1.1 Aim and Objectives This study aims to establish the implication of two leaders of Nigeria, General Ibrahim Babangida (1985-1993) and President Olusegun Obasanjo (1999-2007) on Nigeriaââ¬â¢s oil and gas resource management and the socio-economic impact with General Babangida setting the pace in the years of misrule and mismanagement of national resources, he set a precedent that would later haunt the economic and social fabric of Nigeria and its people for later years. Sadly, the trend of inequality did not seem to end with military rule but extended with the civilian rule of the democratically elected government (Odebode, 2004).Research objectivesTo establish the role of General Babangidaââ¬â¢s regime on the oil resource management and socio-economic development of Nigeria To identify the implication of President Obasanjoââ¬â¢s reign as a democratically elected leader on the oil resource management and socio-economic development of Nigeria To identify ways in which leadership can be used to ba lance Nigeriaââ¬â¢s socio-economic development and improve oil resource management 1.2 Research Questions What is the significance of Babangida and Obasanjoââ¬â¢s regimes in the socio-economic development of Nigeria? What is the significance of oil wealth to the socio-economic development of Nigeriaââ¬â¢s socio-economic development? What implications do the oil resources have on the local communitiesââ¬â¢ social integration and economic wellbeing? To what extent has the reigns of these leaders captured in the literature about Nigeriaââ¬â¢s developmental agenda? Chapter 2: Literature Review There is a significant body of literature on Nigeriaââ¬â¢s development framework. It has been described as having components of corruption, consumerism, failed socio-economic and political policies, and many other issues (Balouga, 2009; Odebode, 2004; Ian and Terry, 2003).Odebode (2004) observes that Nigeriaââ¬â¢s socio-economic climate in the past four decades has neither promoted any kind of social and economic welfare that can insulate families from harsh market realities nor help them ââ¬Å"benefit from market developmentsâ⬠(Odebode, 2004, p.12). This is despite massive revenue from oil production. Corruption has been at the core of Nigeriaââ¬â¢s political and social developments independence, saddling between military and civilian regimes, which have regrettably institutionalised corruption in almost all government agencies. When General Ibrahim Babangida toppled General Muhammadu Buhariââ¬â¢s regime of less than two years in a bloodless in-house coup on 27th August 1985, the country saw thirteen years of corruption in Nigeria. It is generally agreed that during General Babangidaââ¬â¢sregime corruption not only reached alarming high level rate but also became instutionalised. For instance, leaders who were found guilty by tribunals in the previous regimes of Murtala Mohammed and Mohammadu Buharu would later find their way back into the public life; recovering their seized properties allegedly acquired through corrupt means. Maduagwu (cited i n Gboyega, 1996, p.5) observes that that not only did Babangida regime entrench corruption when he pardoned corrupt government officials convicted in the previous regimes and allowed them to reclaim their seized properties, but also ââ¬Å"officially sanctioned corruption in the country, making it difficult to apply the only potent measures, long prison terms and seizure of illegally acquired wealthâ⬠for fighting corruption in Nigeria in the future. The successive regimes after Babangida did little to stop corruption (Balouga, 2009). General Sani Abacha in just less than 4 months had ousted the interim government furthering the corruption menace and stagnating the socio-economic growth. The Abacha regime saw corruption reached its peak with plunder of national resources. The International Centre for Asset Recovery (2009) estimated that the Abacha family alone took up to US$ 4 billion from the public coffers. Salawu (2010) observes that the countryââ¬â¢s populace is still ma rred with abject poverty, to the extent that it is not only being categorised amongst the worldââ¬â¢s poorest nations but also graces the worldââ¬â¢s most unequal countries list. Studies have estimated that about 70 percent of Nigeriaââ¬â¢s population lives below poverty line, largely due to inequitable distribution of the national resources such as oil revenue limited access to basic amenities and social services such as healthcare (Salawu, 2010). Chapter 3: Research methodology and design The researcher proposes to use qualitative research method to increase the understanding of the attitudes, motivation and other non-numerical information. The study will seek to investigate these phenomena using structured and semi-structured questionnaires, interviews and observation. According to Panneerselvam (2004), qualitative approach to research is the most appropriate research method when studying issues that require in-depth understanding of issues. Panneerselvam (2004) advises that researchers intending to study societal issues such as corruption and governance should immerse themselves into the culture of the society and experience what is in the system. Qualitative research allows the researcher to practice the needed flexibility, thus the ability to amend the emerging sub-questions as they become more familiar with the people, culture and system construct (Panneerselvam, 2004, p.158). Qualitative research methods help researchers to collect non-numerical responses from r espondents using less-structured research instruments such as interviews, observation and ethnography. Ethnography uses fieldwork to provide a descriptive study of human society and presents the results as an organized whole that is greater than the sum of its parts. It is founded on the principle that a systemââ¬â¢s individual properties cannot always be accurately understood independent of each other. Qualitative research is thus based on relatively small sample sizes and may evoke inherent challenges when larger sample sizes are needed. In-depth Case study This research will also adopt a case study as a research methodology. The case studies will focus on General Babangidaââ¬â¢s regime and Obasanjoââ¬â¢s reign and draw any comparison and similarities in terms of socio-economic development. Case study as a research method is popular due to its ability to draw inspiration from the empirical curiosity and practicality (Stake, 1998). Although the researcher maybe interested in a wider question of socio-economic development of Nigeria, the case study will allow the researcher to specifically focus on issues of oil resource management, corruption, and leadership ideals. Case study is an important research method because it is able to combine other research strategies, hence the reason why it is often referred to as a meta-method (Stake, 1998). Gillham (2001) argues that a case study should not be viewed as more important than other research methodologies but should be seen as more suited for practice-oriented fields. That is, the abili ty of the researcher to act within a professional practice is dependent on the knowledge of a repertoire of cases. 3.1 Scope of the study This research will focus on oil resource management and its impact on socio-economic development in Nigeria. The focus will draw similarities and contrast between General Babangidaââ¬â¢s regime (1985-1993) and Olusegun Obasanjo (1999-2007). References Balouga, J. (2009). The Niger Delta: Defusing the Time Bomb. International Association for Energy Economies 1 (3), 8-11. Gboyega, A. (1996). Corruption and Democratization in Nigeria. Ibadan: Agba Areo Publishers. International Centre for Asset Recovery. (2009, September). Sani Abacha. Retrieved on 25 August, 2014 from http://www.assetrecovery.org/ Gillham, B. (2001). Case Study Research Methods. London, New York: Continuum. Ian, G. and Terry, L. (2003). Bottom of the Barrel: Africaââ¬â¢s Oil Boom and the Poor. Stanford: Catholic Relief Services. Julius-Adeoye, R.J. Nigerian Playwrights and Official Corruption: a study of selected plays. In Oshionebo, B.,Mbachaga, J.D., eds. (2010). Literary Perspectives on Corruption in Africa 1. Markudi: Bookmakers, 2 (1), 5-17. Odebode, S. (2004). Husbands are Crowns: Livelihood Pathways of Low-Income Urban Yoruba Wwomen in Ibadan, Nigeria. The Hague: ISS, 11-12. Panneerselvam, R. (2004). Research Methodology. NY: PHI Learning Pvt. Salawu, B. ( 2010). Ethno-Religious Conflicts in Nigeria: Causal Analysis and Proposals for New Management Strategies. European Journal of Social Sciences 13(3), 345-353. Stake, R. (1998). ââ¬Å"Case Studiesâ⬠in: Norman Denzin & Yvonna Lincoln. (eds.): Strategies of Qualitative Inquiry. Thousand Oaks, London, New Delhi: Sage.
Subscribe to:
Posts (Atom)