Thursday, January 9, 2020

Qualitative Research Critique II 2 - 843 Words

QUALITATIVE RESEARCH CRITIQUE II 1 Qualitative Research Critique II Vanda McCray Liberty University Qualitative Research Critique II 2 The authors of this article method of data collection was based on a five-focus group and three individual interviews on the clients that participated in the MBSR training. They analyzed and constantly compared methods to develop a grounded theory (Schellenkens Jansen, 2015, pg. 1813). They determined that their focus group involved participants that were open for†¦show more content†¦If the client participated in MBSR for breast cancer only, they were invited for a focus group interview one week after completion of the training. If the participant participated with their partners in MBSR, they were invited for an individual interview after completion of their training (Schellenkens Jansen, 2015, pg. 1814). Qualitative Research Critique II 3 The data were analyzed with the constant comparative method to develop a grounded theory. The two authors, M. Schellenkens E. Jansen, coded their transcripts individually. After they completed the three focus groups, they then compared their codes and discussed them until a consensus was reached. They continued with several more focus groups before coming to conclusion of grouping all codes together. This is where their hypotheses data was formed. The results from this study formed three themes which included anticipatory fear for suffering of others, feeling unconnected or connected, and learning from others. (Schellenkens Jansen, 2015, pg. 1815-1818). What was discovered was that the participants went through a stage where they feared facing other clients dealing with the same disease before the study began. Througho ut the study, the participants felt more connected with and supported by other which resulted in learning from each otherShow MoreRelatedQualitative Critique Of A Qualitative Study1207 Words   |  5 Pages Qualitative Critique Paper: Critique of a Qualitative Study Grace Fahham Shenandoah University What was the purpose of the study? The purpose of this qualitative study was to describe how occupational therapists’ involved client-centred activities in daily living (CADL) in their practice. This was done by reviewing the therapist’s experiences and reflections about their interaction with clients that suffered from a stroke. The study involved coding of three categoriesRead MoreClinical Thinking and Critical Judgement Essay1100 Words   |  5 PagesQualitative Article Critique Critical thinking and clinical judgment are important skills that professional nurses use in every day clinical setting. In 2012, a mix method qualitative study by Dr. Jeanne Mann was done to evaluate the effectiveness of educational strategy to develop clinical judgment skills in nursing students. In this study, the population was identified as volunteered Level II baccalaureate nursing students from a Midwest nursing program. The variables identified in this articleRead MoreEssay on Nu310 Unit 8 Assignment1623 Words   |  7 PagesNursing Research Critique Assignment Kaplan University Nursing Research Critique Assignment I will be critiquing two different articles. Both studies are nursing studies that evaluate outcomes. I will be following specific key points for a quantitative perspective and a qualitative perspective. There is a guideline that I will be following for each article that includes identifying and examining the data collection and data analysis methodologies used in each study. The names of the articlesRead MoreHuman And Its Impact On Organizational Performance Essay1655 Words   |  7 Pagesthe goal, better the organisation perform towards its goals and aims (Tabassi and Abu-Bakar, 2009). According to Slotte et al. (2004) human resources perform many functions related to the organisational development, training, career development and research development; thus people working in an organisation makeup its human resources and their performance impacts the organisation significantly. Productivity of an organisation is strongly correlated with the strategies it uses for its human res ources;Read MoreThe Effect Of Integrating The Social Network Site Facebook And Peer Reviews From Class Instruction On English Writing1023 Words   |  5 Pagescan utilize Facebook to enhance their learning through online social interaction. This way of communication can facilitate discussions and provide students an opportunity to apply their knowledge learned in class in a supportive environment. This research is conducted to explore the effect of a blended approach to teaching by using Facebook, peer assessment, and class instruction. (c) Methods/Materials: The study was conducted on 23 first-year English majors at a technological university in TaiwanRead MoreQuantitative and Qualitative Critiques3025 Words   |  13 PagesCritique 1 Edwal et al study (2007): This study was conducted within the primary care in Sweden. The research question is designed to get better understanding of the lived experience of type 2 diabetes patients, during regular check-ups with the diabetes nurse specialists. Research Methods This research is a qualitative study using the phenomenological-hermenetic method. Parahoo (2006) states that qualitative research explores the individual’s beliefs and life experiences in order to gain anRead MoreConceptual Model For Professional Practice1409 Words   |  6 Pagessame clinical incident. Benner evaluated this application by surveying and observing experienced nurse clinicians, new graduate nurses, and nursing students. (use reverse side of this page if you need additional space) 2.) Describe/explain the components of the model. (2 points) Level I, or Novice, describes a beginner nurse, either a graduate nurse or a senior level nursing student, who commonly hones in on common â€Å"attributes† to nursing care such as vital signs, intake and output, weightRead MorePSY 326 Research Methods2141 Words   |  9 PagesDOWNLOAD PSY 326 Research Methods Week Two Discussion. 1. Research Design    You have been approached by a pharmaceutical company that has developed a new drug that is supposed to be effective in the treatment of schizophrenia. Before mass producing the drug they want to be sure that it is more effective than the drug they are currently producing. They have hired you to design a research study to determine the effectiveness of the new drug compared with the old one. Discuss what research you wouldRead MoreExploring The Potential For Addiction1543 Words   |  7 Pagesfor the social interactions involved in reality. Therefore, the importance of studying MMORPG’s potential for addiction, and research regarding possible pathology, is even more relevant. Hussain and Griffiths explored two hypotheses: (1) assess the impact of online gaming on the lives of gamers, the independent variable being online gaming, the dependent, gamers’ lives; (2) establish whether excessive online gaming leads to psychological and behavioral dependencies, where the independent variableRead MoreCritique Of A Research Study2122 Words   |  9 Pages Critique of a Research Study Stacy Shaffer PSY326 Instructor Nowlin April 27, 2015 Critique of a Research Study I. Introduction The purpose of this article is to critique the article â€Å"Factors Involved in Recovery from Schizophrenia: A Qualitative Study of Thai Mental Health Nurses†, (Kaewprom, Curtis Deane, 2011). Through qualitative research, the authors of this article aimed to answer the question of what factors are present in the recovery from schizophrenia. In recent years, Thailand

Wednesday, January 1, 2020

Al Qaeda And The Islamic World Essay - 1642 Words

Islam is one of the world’s oldest religion with over one billion followers. There are many groups of people that classify as followers of Islam (Esposito p. 222). One group that does this is called Al Qaeda. Al Qaeda is a jihad group, which is an armed struggle in defense of the Muslim community or often called terrorists (Esposito, p. 243). This jihad group was created in the late twentieth century. â€Å"Al-Qaeda began as a logistical network to support Muslims fighting against the Soviet Union during the Afghan War; members were recruited throughout the Islamic world† (Al-Qaeda 2016). Al Qaeda was not always bad as one can see that they were not created as a terrorists group but to fight against the Soviet in the nineties. After the war ended they turned into a group of Muslim that started to kill innocent people (Esposito p. 222). â€Å"When the Soviets withdrew from Afghanistan in 1989, the organization dispersed but continued to oppose what its leaders considere d corrupt Islamic regimes and foreign (i.e., U.S.) presence in Islamic lands† (Al-Qaeda 2016). The leader of Al Qaeda, Osama bin Laden, moved the group to target countries that were going against the sharia (Esposito, p. 232, Class discussion, 11/2). These attacks toward other countries will start a war against terror that would take many lives. Those who are not part of Al Qaeda would say that they are not classify as an Islamic group. However, members of Al Qaeda would say they are an Islamic group. â€Å"TheseShow MoreRelatedThe Politics And Tactics Of Isil And Al Qaeda1226 Words   |  5 Pagesand tactics of ISIL and al-Qaeda. Islamist group is known to be having the highest degree of terrorist attack, especially among the Sunni orientated groups. Islamic terrorism is described as the post-cold war phenomena, particularly after the 911 attack, there is on average an attack every day around the world. Introduction ISIL Islamic State in Iraq and the Levant (ISIL), which controls territory mainly in Iraq and Syria, was formed in April 2013, it was grown out of al Qaeda. The main ideology behindRead MoreThe Islamic State : An Accident Of History1579 Words   |  7 PagesIntroduction: The Islamic State is an accident of history, emerging from multiple political, economic, and social tensions in the Middle East. It has challenged the territorial divisions forced in the region following the fall of the Ottoman Empire by shaping out for itself a large area of territory. But ultimately, its consequence will flow as much from its challenge to settled concepts of government, national sovereignty, and national identity. The Islamic State is most well-known for the violenceRead MoreWar on Terror: Al-Qaeda in Siria911 Words   |  4 PagesAl-Qaida made by Islamic military group for purpose of Jihad and also it is fundamental Sunni Muslim movement .so this group was leading by Osama bin Laden and there was to made Islamic group like Muslim brotherhood. However Al-Qaida wants to reconstruct the Islamic government and state and religion .but Al-Qaida structure is small and it has small affections on the organization. So this group is international group so this group establ ished since 1988 in fact this group train may fighter to andRead MoreTerrorism And The Al Qaeda Terrorist Groups1727 Words   |  7 Pagesladen leader of the Al Qaeda terrorist group became one of the most powerful, fearful and well known terrorist group in the world, to this day Citation. The Al Qaeda terrorist group is one of the wealthiest terrorist groups to date giving thousands of trained and motivated fighter’s access to deadly weapons Citation. Many of these Solders carried out vicious acts contributing in the killings of thousands. The research shown below will help explore the reasoning behind the Al Qaeda terrorist group, specificallyRead MoreIsis : The United States1429 Words   |  6 Pagesdesignated the entity a foreign terrorist organization (US Department of State 2014). The group is very different than the Islamic extremists that the United States has dealt with over the years. Instead of hiding in remote compounds and living secret lives amongst the genera l population, ISIS has conquered vast regions of Iraq and Syria. However, ISIS does share similarities with other Islamic terrorist organizations. Several of these terror groups have attacked the United States in the past. Some attemptsRead Moresusan b anthony954 Words   |  4 Pages         Al  Qaeda     01†16†2014   Al   Qaeda   the   global   militant   Islamist   organization   founded   by   Osama   Bin  Laden,  has  attacked  civilian  and  military  targets  in  various  countries   including   the   September   11   attack.   Al   Qaeda   has   two   major   strategic   objectives   which   are   to   get   control   of   a   nation†state   and   to   get   the   control  of  weapons  of  mass  destruction.   Al  Qaeda  or  Al  Qaida  is  an  Islamic  jihadist  organization  which  calls  itself   as  an  Islamic  resistance  movement  around  the  worldRead MoreSeptember 11 Attacks and Nationalist Terrorist Groups Essay1414 Words   |  6 PagesTerrorism Paper 11/16/09 There are several terrorist groups throughout the world today. All the terrorist groups have one common goal and that is to rid the world of Americans and western influence from the Muslim world. There is one organization that has ties to most of all the terrorist groups in the world and is the most infamous group in the world today and that is the group called Al-Qaeda The word Al-Qaeda means â€Å"the base† in Muslim. As an international terrorist organization led by OsamaRead MoreIs The Threat Of International Security?1141 Words   |  5 Pagesslaughter innocent people, villages and cities. ISIS sees itself as the Islamic Caliphate and controls lots of land in western Iraq and eastern Syria. They also pledge allegiance from different radical Islamic groups around the world. ISIS started from U.S. invasion of Iraq in 2003. Saddam Hussein fighters were left without a job, and they were furious. Al Qaeda chose to capitalize on their anger and established al Qaeda in Iraq, t o wage an insurgency against U.S. troops in Iraq (Saddam was secularRead MoreAn International Terrorist Organization ( Al Qaeda1303 Words   |  6 PagesInvestigate an international terrorist organization (al-Qaeda) Al-Qaeda is an international terrorist organization that was founded in the late 1980’s by Osama bin Ladin and Abdullah Azzam. The organization is still currently active today, even though it has become largely decentralized with the deaths of many of its leaders following their attack on the twin towers in New York City, on September 11th, 2001. Al-Qaeda was founded towards the end of the Soviet Union’s attempted expansion into AfghanistanRead MoreAl Qaed A Worldwide Terrorist System Established By Usama Receptacle Loaded1527 Words   |  7 PagesAl-Qaeda is a worldwide terrorist system established by Usama receptacle Loaded [the Osama spelling is deplored, on the grounds that there is no letter O in Arabic). Supported counterterrorism weight subsequent to 2008 - including the slaughtering of al-Qaida pioneers Usama container Ladin, Atiyah Abel al Rahman, and lIyas Kashmiri in 2011 - decreased the Pakistan-based center al-Qaida s union and capacities, including its c apacity to mount modern, complex assaults in the West like the 2006

Tuesday, December 24, 2019

Child Abuse and Neglect - 1653 Words

Child Abuse and Neglect Child abuse, or child maltreatment, is an act by a parent or caretaker that results in or allows the child to be subjected to death, physical injury, sexual assault, or emotional harm. Emotional abuse, neglect, physical abuse, and sexual abuse are all different forms of child abuse. Child abuse is more than bruises and broken bones. While physical abuse might be the most visible, other types of abuse, such as emotional abuse and neglect, also leave deep, lasting scars. All types of child abuse and neglect leave these scars. Some of these scars might be physical, but emotional scarring has long lasting effects throughout life, damaging a child’s sense of self, ability to have healthy relationships, and†¦show more content†¦Fact: While it s easy to say that only bad people abuse their children, it s not always so black and white. Not all abusers are intentionally harming their children. Many have been victims of abuse themselves, and don’t know any other way to parent. Others may be struggling with mental health issues or a substance abuse problem. MYTH #3: Child abuse doesn t happen in â€Å"good† families. Fact: Child abuse doesn t only happen in poor families or bad neighborhoods. It crosses all racial, economic, and cultural lines. Sometimes, families who seem to have it all from the outside are hiding a different story behind closed doors. MYTH #4: Most child abusers are strangers. Fact: While abuse by strangers does happen, most abusers are family members or others close to the family. MYTH #5: Abused children always grow up to be abusers. Fact: It is true that abused children are more likely to repeat the cycle as adults, unconsciously repeating what they experienced as children. On the other hand, many adult survivors of child abuse have a strong motivation to protect their children against what they went through and become excellent parents. There are many warning signs for child abuse. Of course, just because you see a warning sign doesn’t automatically mean a child is being abused. It’s important to dig deeper, looking for a pattern of abusive behavior and warning signs, if you notice something off. WarningShow MoreRelatedChild Abuse And Neglect704 Words   |  3 Pagesexperience this feeling, not just for a second, but throughout their childhood. Neglect is child abuse, as well as physical abuse, sexual abuse, and emotional abuse. Child abuse is awful because it causes the child to feel worthless, to lose trust, and to have serious psychological problems early on in life. Neglect is the most common form of child abuse. The parent or caregiver fails to provide basic needs for the child. Neglected children are constantly being told that they are worthless orRead MoreChild Neglect : Neglect As A Form Of Child Abuse2216 Words   |  9 PagesChild Abuse: Neglect Has The Community Done Enough To Reduce Cases Of Neglect As A Form Of Child Abuse? Thesis statement: most scholars and practitioners have elaborated adverse impacts of child abuse, especially child neglect, but the research focuses on the positive side of the discourse; it concentrates on the community contribution and the steps that have helped to reduce and stop the act in many nations. The term child abuse got used in a very broad array of situation that it has become hardRead MoreChild Abuse and Neglect2475 Words   |  10 Pages This paper will discuss child abuse and neglect and the lasting effects left on a child. The main types of abuse and neglect explained are emotional abuse, psychological abuse, physical abuse, sexual abuse, medical neglect, educational neglect, emotional neglect, and physical neglect. Included are some warning signs of these different types of abuse and neglect and the legal definitions of each. It is important to understand that all of these forms of abuse and neglect are different and containRead MoreChild Abuse and Neglect922 Words   |  4 PagesASSIGNMENT 1: SOCIAL ISSUE- CHILD ABUSE AND NEGLECT KIM CARTER SOCIOLOGY PROFESSOR PATRICIA HENNINGTON JANRUARY 29, 2012 Child abuse and neglect The issue of child abuse and neglect is serious, controversial, and is escalating in today’s society. Many people are not aware, but child abuse is rampant in our society. Many child abuse and neglect cases go unreported because a person may not know the signs and symptoms of child abuse and neglect or perhaps the person or person may feel that thisRead MoreChild Abuse and Neglect1678 Words   |  7 Pagestopic of child abuse is one of the hardest topics to write about. It is imperative to have a profound understanding of this topic and its consequences specially when working in the field of human services. Professionally and personally, I have encountered situations where child abuse is present. This reality has touched my life in many ways and these experiences continue shaping me as a human being and as social service provider. I will try to cover in this paper the subject of child abuse, its definitionsRead MoreChild Abuse And Neglect Of A Child817 Words   |  4 PagesC hild Abuse and Neglect The meaning of child abuse is the mistreatment of a child in the form of injury, sexual abuse, neglect or exploitation. The signs of possible child abuse include, but are not limited to sudden behavior change, untreated medical issues, difficulties in school, lack of adult attention, the child makes excuses to stay away from home. Parents can also show signs such as showing little interest in the child, blaming the child for the child’s problems. The parent could ask theRead More Child Abuse and Neglect814 Words   |  4 Pages Child Abuse Child abuse and neglect is frightfully high. As a country this is unacceptable. We need to come up with better ways to fight this â€Å"disease† before we destroy our children, our future. An estimated 903,000 children across the country were victims of abuse or neglect in 2001, according to national data released by the Department of Health and Human Services. The statistics indicate that about 12.4 out of every 1,000 children were victims of abuse or neglect, a rate comparable to the previousRead More Child Abuse and Neglect1102 Words   |  5 Pageswhat effects abuse can have on a child? The effects abuse can have on a child is very serious. Children can obtain serious problems from child abuse. They can develop social problems, depression, and anxiety. There are four types of abuse: physical abuse, sexual abuse, emotional abuse, and neglect. Physical abuse can injure a child severely. Domestic Violence is a worldwide problem and affects the health and well-being of those open to it. Children that are exposed to physical abuse are at riskRead MoreChild Abuse and Neglect2110 Words   |  9 Pagesevent, including the abuse and neglect of a child, also known as child maltreatment, (Schwartz Perry, 1994). In 2005, 3.3 million referrals were made that year to child protective agencies for suspected child maltreatment, (Bentley Widom, 2009). The Centers for Disease Control and Prevention defines child maltreatment as â€Å"any act or series of acts of commission or omission by a parent or other caregiver that results in harm, potential for harm, or threat of harm to a child,† (Leeb, Paulozzi, MelansonRead MoreChild Abuse and Neglect3425 Words   |  14 PagesRunning Head: CHILD ABUSE AND NEGLECT The Causes of Child Abuse and Neglect and the Long Term Effects on Human Development from Infancy to Adulthood Sheila Y. Boone Liberty University December 10, 2008 Abstract Child abuse and neglect is a prevalent issue in the United States. Every year approximately one million infants, children and adolescents are victims of child abuse and neglect. Research has linked childhood experiences of abuse and neglect with some serious life-long developmental

Monday, December 16, 2019

Abortion Is a Form of Murder Free Essays

Each year, two out of every one hundred women aged fifteen to forty-four have an abortion, 48 % of them have had at least one previous abortion and 61% percent have had a previous birth. This means that these women understand the joy of a baby being born, and still choose to take away their privilege to live. They’ve carried these children before and know the happiness of seeing their own healthy child in their arms for the first time. We will write a custom essay sample on Abortion Is a Form of Murder or any similar topic only for you Order Now Why then, when they know they are creating a new life inside of them, do they choose to deprive their child the right to live and experience everything life has to offer? They willingly decide to kill that child and decide to have an abortion. Hence, abortion should be illegal because one is committing an inhumane act by killing an innocent child inside the mother’s womb. The reasons included are abortion is a form of murder, causes many psychological issues, other means of contraceptives are available, legal view against abortion, is very costly, and abortion can cause medical complications. â€Å"Abortion is a form of murder and demeans the value of human life. When a mother is carrying a child, she does not say â€Å"oh, the fetus kicked† or â€Å"oh, the mass of cells that hasn’t become a person kicked†, the mother says â€Å"the baby kicked† (Balanced Politics). After contraception the baby is considered alive and a human. According to â€Å"The Official Senate report on Senate Bill 158†, the â€Å"Human Life Bill†, says that conception marks the beginning of the human life of a human being- a being that is alive and a member of the human species. The life of the baby begins right away; one cannot take that away and kill the baby. Everything that determines the individuality and originality of a person is established at conception. The first single cell contains the entire genetic blueprint of the human being. Abortion ends the innocent life of a baby. From conception, the new human conceived deserves the full protection of the law just as any other person does. Abortion causes many psychological issues not only to the mother, but also to the family. Many women who have an abortion in their younger years end up living the rest of their lives in permanent guilt. Even if the mother is fine with aborting the child, the father may not be. The father might want to keep the baby, but he thinks he has no legal alternative if the mother chooses abortion. Why should he suffer for the decision the mother makes? Abortion causes damage to everyone. In a study of post-abortion patients only 8 weeks after their abortion, researchers found that 44% complained of nervous disorders, 36% had experienced sleep disturbances, 31% had regrets about their decision, and 11% had been prescribed psychotropic medicine by their family doctor. Since many post-aborted women use repression as a coping mechanism, there may be a long period of denial before a woman seeks psychiatric care (Major Psychological Sequelae of Abortion). These repressed feelings may cause illnesses and psychiatric or behavioral issues in other areas of the mother’s life. As a result, some counselors report that unacknowledged post-abortion distress is the main factor in many of their female patients, even though their patients have come to them seeking therapy for seemingly unrelated problems. Also, women may experience abortion as a traumatic event. Many are forced into unwanted abortions by husbands, boyfriends, parents, or others. If the woman has repeatedly been a victim of domineering abuse, such an unwanted abortion may be perceived as the ultimate violation in a life characterized by abuse. Other women, no matter how compelling the reasons they have for seeking an abortion, may still perceive the termination of their pregnancy as the violent killing of their own child. The fear, anxiety, pain, and guilt associated with abortion all cause damage to the motherand anyone who is associated with the baby being aborted (Major Psychological Sequelae of Abortion). Women have the right to treat their bodies however they want, but there are other means of birth control that are much more suitable; abortion should be a last resort option and even then only if it is absolutely necessary. If a woman does not want to become pregnant, she should avoid this with some sort of contraception or abstinence. There are many ways that a woman can prevent pregnancy, the most common of which being a birth control pill that generally must be taken once a day. If a woman accidentally becomes pregnant she can choose to put the child up for adoption, take the morning after pill, which is generally a stronger dose of a birth control pill, or use a copper intrauterine device, which must be inserted within five days of conception in order to work properly. If they find out too late to use either the morning after pill or to use a CID, they should make the right choice and put the child up for adoption. A big mistake that most people think is that the morning after pill is the same thing has having an abortion because you are killing the baby, but the pill kills the sperm before it conceives the egg and is not actually killing the baby. About 1. 5 million American families want to adopt children, and women have up to nine months to decide where and who they want to raise their child. It is a win-win situation for the mother because she does not have to kill her baby if she does not want the child; instead she is doing a good thing by giving up the child for adoption. Rape and incest victims should take the morning after pill to prevent a pregnancy if they do not want it to occur, or put the child up for adoption. It is understandable for the mother to not want to go through with the birth because she wants to forget about the incident, but it is a much better alternative to abortion and a much safer one. The only situation where abortion is understandable is when the mother is in danger of dying because of giving birth to the baby. This happens in ectopic pregnancies, where the fetus begins developing outside of the womb. In this situation the mother can resort to abortion, because her life is in danger. The baby has a zero change of living also (Balanced Politics). There are many legal arguments that support not having an abortion. A good example of a case is of Roe v. Wade, which allows abortion seven months into pregnancy. It violates the standard of legal reasoning. The Supreme Court made a decision on not to decide when life began. It overturned state laws that protected the unborn and has resulted in over 30 million abortions (roughly the population of Canada) in the United States. The Supreme Court clearly stated that it does not know when life begins and then violated the very spirit of this legal principle by acting as if it just proved that no life existed in the womb. A crucial role of government is to protect life. Government cannot remove a segment of the human population from its protection without adequate justification. For example,† A hunter who hears rustling in the bushes shouldn’t fire until he knows what is in the bushes. Likewise, a Court which doesn’t know when life begins should not declare open season on the unborn. † (Arguments Against Abortion). Abortion is extremely expensive and tax money should not support this horrible act. The First trimester procedures run about $500-1000. Second trimester procedures cost $600-10,000. People have the right to see where their tax money is going. Abortion is a medical procedure that must be performed by a doctor. The government contributes to many health care institutions such as Healthcare for the Homeless, Planned Parenthood, free clinics, etc. Planned Parenthood, through promoting abortion, has killed far more people than the Third Reich did. It is the most efficient mass-murder machine ever devised, and is funded by our federal tax dollars. It may not use our tax money to abort babies but our taxes buy and maintain the office, hire the personnel, and pay for the counseling that leads to the abortion. Everyone who pays taxes has the right to prevent their money from going to these institutions that commit murder by killing an innocent child (Abortion And Your Taxes). Abortion also causes various medical complications to the mother. Some complications include blocked fallopian tubes, weakened cervix, uterine scarring, and damage to the mother’s reproductive system, which may make her unable to conceive in the future. Women may also face the increase in the probability of tubal babies, hysterectomies, miscarriages, still births, and premature deaths. Abortion increases the chance of breast, uterine, and cervical cancer. â€Å"During a women’s pregnancy a surge of hormone, estrogen, causes the breast cells to divide, become more mature and secrete milk† (Anti-Abortion Arguments). During this process of cell division they are more susceptible to cancer causing agents. If the woman has an abortion, the natural process is interrupted and her breast cells will remain immature. Also, not all abortions are 100% hygienically clean, which may create a leeway for hundreds of types of infections for the mother. For example, if the mother cannot afford a proper abortion, and has an abortion in a dangerous location or environment it can be harmful because the proper tools are not being used and they might not be properly sanitized (Anti-Abortion Arguments). In conclusion, abortion should be illegal due to the specific reasons mentioned in the above paragraphs. Abortion is a very harmful process which could in the end harm not only the mother, but the father too. Killing a human is never what someone should decide on doing; instead they should consider giving the baby up for adoption. The mother carrying the child should realize that there are a lot of other options available for her and she does not have to kill a human if she does not want the baby. If a woman has been raped, she should take the morning after pill and it will help her have a less of a chance of being pregnant. In the end the guilt of killing a human will never leave the mother. Why live with that guilt feeling when one knows there are many other options out there instead of killing an innocent baby? How to cite Abortion Is a Form of Murder, Papers

Saturday, December 7, 2019

My future free essay sample

College. An experience almost every adolescent looks forward to. From the classes, your education, the school activities, to the fraternities, the parties, and the new people. The freedom: you’re finally an adult. Ive always wanted to attend college. But, in my case I didnt have the choice. Coming from a long line of educators, I was raised to go to school, graduate, and make a life for myself. From the beginning, my parents instilled in me that education is top priority. You could always improve you’re grades and you could always do better. With determination and hard work you could accomplish almost anything. Without an education I wouldn’t be able to pursue a career. I also wouldn’t be able to become a nurse or own my own business. My dad went to college under difficult circumstances. He didn’t grow up from much and didn’t have much money. What if I pick the wrong one? So I think and think and think until my head’s dizzy and my eye’s hurt. After all this thinking, and worrying, and stressing, and anxiousness, Ive finally figured out the best solution. Think about the distant future to prevent the stress and thoughts. Let your life make its own path. Be happy. And although high school students worry about homework, exams, AP tests, scholarships, significant others, sports, extra curricular activities, the list goes on and on, we all should live a stress free life. Everything will work out in the end. Afterall, â€Å"Tomorrow the birds will sing† Charlie Chaplin

Saturday, November 30, 2019

Joshua Wegner Essays - German Idealism, Kantianism,

Joshua Wegner Philosophy 101 12/07/00 Trentacoste Immanuel Kant vs. Joshua Wegner THE RIGHT TO PUNISH: RETRIBUTIVISM As a society we all accept the fact that if you do something wrong you must be held responsible for your actions and pay the consequences. We all accept the concept of punishment, even though we are aware that we, ourselves, could one day be subjected to answer for our actions. While we may all be in favor of punishment in general, it is often debated upon how or why we punish a criminal. According to Immanuel Kant's Retributivism argument, "the punishment must be in exact proportion to the severity of the wrongdoing..." (Kant, 585) Kant believes that crime causes the scale of justice to be imbalanced, and claims that punishment restores that balance. While I agree that Kant's motives for punishment are reasonable, I find his solution to be weak in some areas, and/or absurd. Before one can refute or defend a philosophical argument, he must first understand it. Kant's concept of Retributivism is a simple one; the punishment must equal the crime. It is important to note that Kant defines crimes as "Any transgression of the public law which makes him who commits it incapable of being a citizen" (Kant 586). "While criminals do not actually will their own punishment, their rational selves will the system of laws that involves the punishment they deserve." It is equally important to note that it is only the right of the sovereign as the supreme power to punish. His argument accuses all other standards as being "wavering and uncertain..." "...On account of other considerations involved in them, they contain no principal conformable to the sentence of pure and strict justice." (Kant 587) Everyone has their own ideas on why a criminal should be punished. Maybe it gives us a sense of security. Perhaps it offers us a piece of mind. In some situations, punishment may be thought of as ?help' for the criminal, rehabilitation, or possibly revenge. Along with the vast majority, Kant agrees on the importance of punishment; however, his theory is a little different. Equilibrium. In order for society to be balanced according to Kant, the punishment must equal or ?cancel out' the crime. While I don't disagree with his motives, I feel that there are many that he ignores. Shouldn't we take them all into account? The concept of punishment in itself is rarely questioned; however, the question of how we punish the convicted is still widely debated. According to Kant's theory, the answer is fairly simple: the punishment must fit the crime. Immanuel Kant is definitely one of those "eye for an eye, tooth for a tooth", guys. He looks at society as a scale. Crime is placed on one end, making the scale unbalanced. In order to balance that scale, an equal amount of punishment must go on the other end. The problem occurs when we try to compare crime with punishment. There is no definite amount or degree of punishment that equals a certain amount of crime. It's like comparing a quantity of ?x' with a quantity of ?y'. Without a specific value assigned to both ?x' and ?y', the only way to compare the two is with speculation. Speculation leads to an imprecise resolution, thus resulting in an unbalanced scale (whether it be ever so slight). If there is no definite way to ?balance the scale', Kant's argument proves to be uncertain or fallible. On top of that uncertainty, there are several situations that make Kant's argument more questionable. To help clarify these uncertainties, Kant suggests that, "the undeserved evil which any one commits on another, is to be regarded as perpetrated on himself (Kant, 587)."While his argument provides solutions to many questionable situations, his answers are still a little shaky. Let's take theft, for example. According to Kant, he who steals makes the property of others insecure. Therefore, he robs himself of all property and security. Though he has the will to live, he cannot have or acquire anything. The problem with Kant's argument on theft is that there are varying degrees of theft. Suppose a person robs a bank, while another steals a piece of candy. Should the two suffer the same consequence? According to Kant, they

Tuesday, November 26, 2019

buy custom Secure Systems essay

buy custom Secure Systems essay Computer security refers to the measures undertaken to protect computer information and property against theft, natural disasters and malicious intentions such as corruption of information. The security system adopted is meant to ensure that only eligible users access the information and computer rooms. Organizations all over the globe adopt various computer security systems that, they deem provide maximum security. Therefore, numerous computer security systems could be chosen. For instance, use of passwords, encryption of data, use of firewalls, locking computer rooms after use, installation of alarms in computer rooms, physical protection by use of security guards.. All these measures would ensure that computer information and properties are secure. There is a growing threat of computer security, which systems are the most secure? According to research, computers security could be ensured by use of passwords. These are the secret codes and numbers that are developed to secure computers against unauthorized individuals. Passwords would ensure that only eligible persons log in to retrieve the desired information. Research asserts that passwords could be actual words or any other desirable character. Lehtinen, Russell, Gangemi (2006) intimate that in order to ensure that computer security is achieved through passwords, the organization should develop unique codes for each department. In addition, passwords should not be leaked to outsiders or unauthorized individuals in the organization as this would lead interference with the information. Each computer and information should be assigned a password that is easy to memorize. Passwords should not be saved in the computers because they could be easily discovered and used for the retrieval of confidential information. Research asserts that individuals must consider the strength of the password before resolving to use it before resolving to adopt it. Attackers through guessing could easily crack weak passwords; therefore, accessing the hidden information. Password effectiveness would also be enhanced by taking care of computer viruses. According to Stallings Brown (2008) an antivirus should be installed in the computer, to ensure that passwords are not affected leading to the ultimate loss of vital information. In cases where passwords have been leaked out, the organization should act faster to change them. Changes would ensure that the original password does not log into the information. This will promote a high degree of protection to organizational details intended for competitive advantage and other vital gains. Data intended for transmission should be encrypted to enhance its security. Data encryption refers to the process by which the information being transmitted is transformed into a read only form using a decryption key. According to research, the decryption key ensures that information being transmitted through the network is safe because one cannot access it without the key used. Information would be safer in case the secret key is only shared among the communicators. This means the intended recipient thus averting any interference or loss of information would only access the information. Gollmann (2011) asserts that the protocols in the database will be protected through encryption thus, ensuring that the principles governing communication are observed to the latter. Encryption would be suitable where the information is shared via the internet, there are many users with different characters and some would want to read and alter the information. Computer users should ensure that they regularly update the encryption to enhance its efficiency. Straub, Goodman, Baskerville (2008) observe that lack of regular updating would lead to loss of vital information or the exposure of the encryption key to unauthorized individuals. Research asserts that encryption is one of the vital computer protection mechanisms because it includes many technicalities especially in the access to information. Under this system, all the information in the database would be safe as it is transmitted. Firewalls are used to enhance computer security. These filters allow communications only under certain circumstances. Research asserts that they are helpful because they eliminate unauthorized network users from accessing the information. According to Newman (2009), firewalls work under rules where they only allow the authorized individuals to access the required information. The rules governing the functioning of firewalls are vital because they determine and weigh clients before allowing for connection. They only connect the authorized networks and eliminate those deemed unauthorized and corruptive to the system information. The clients host name is compare to the existing rules and validity determined. Firewalls provide the owner with numerous warnings in cases where unauthorized attempts to access the information has been made. This would provide for a room, to take corrective measures and ensure enhanced protection. Drab (2011) intimates that in order to ensure firewalls work pr operly, the server should continuously update them. They should not be allowed to run out time. According to research, the secrecy of the computer system would be enhanced by strategically placing the firewall betwee the public network and the organizations intranet. This will make sure that information is filtered before getting into the public domain. The information would not be in a position, to be interfered with because of the control measures existing between these two networks. The closure of computer rooms after use boosts computer security. This is a protective mechanism that ensures computer rooms with valuable information are kept under lock and the keys safely kept. According to research, the organization should not allow its employees to carry the keys to computer rooms freely. Delloite (2011) asserts that keys should be kept at designated places within the organization. In cases where computer rooms are left open, thieves could get in and take away the machines leading to loss of vital information. They could easily take computers perceived to be carrying the organizations strategic decisions; this will retard everything and could lead to negative publicity if the information is altered for personal interest. Unlocked doors could also motivate unauthorized individuals to get into the computer rooms and read the organizations secrets. All this would lead to loss of vital information to outsiders and competitors. Wilshusen (2009) observes that computer rooms should also be closed when vital information is being processed. The system should ensure that the real individuals working on the information access the room. In cases where the keys to the rooms are lost, faster action should be taken to ensure that new padlocks and keys are bought. This is to ensure that lost keys are not used to access the rooms. This security measure would be enhanced by making sure that well made doors and windows are used. Metallic doors are more preferable because they cannot be brought down and in cases of theft, it would be easy to tell. Research asserts that the locking of computer room doors would reinforce other measures put in place because there is no entrance into the place making sure that no passwords are lost. Installation of alarms in computer rooms would promote computer security. Organizations have embraced alarms to boost computer security. These devices warn the concerned individuals of any unauthorized interferences. According to Pooch, Fisch, White, Gregory (1996) alarms should be strategically placed in computer rooms and should be able to detect unauthorized access. Alarms are supposed to work perfectly by raising a concern in advance. Organizations use alarms especially in the prevention of crimes relating to computer loss. The alarm system of protection is effective especially when the computer operator is far away from the computers. Alarms would ensure that they gets to the rooms in time and prevent any form of crime. Research asserts that alarms would be effective if set at secret points where no one can access them. Alarms are vital due to their automatic nature of operation; they are not supposed to be controlled but automatically detect unauthorized individuals and raise a call. The alarm should be regularly checked to ensure it functions to the maximum. Pooch, Fisch, White, Gregory (1996), intimate that any deviations in its working should be sense and corrective measures taken to increase its efficiency. The alarm system of protection would be vital in large organizations where operations are dispersed. This is because of the large distance covered by the alarms warning. A central control system should be set up to oversee the operations of alarms and make sure they are not interfered with. They should always be modified to achieve the desired quality and continued efficiency. Human security is a vital security measure. This is a physical protection measure for computers. This is a system where guards are employed and assigned the different sections in the computer areas. They would be there to ensure that only authorized individuals get access to the computer rooms. Individuals are supposed to identify themselves before getting into information processing rooms. Guards ensure that computers are safe from thieves. According to research, they provide maximum security, which would ensure not all computer system is interfered with. Lehtinen, Russell, Gangemi (2006) observe that human security is vital in computer protection because it provides a more physical sense of protection as guards are able to look at the vents as they occur. Strict guards would ensure all the computers are safe by ensuring that everyone getting into the rooms is frisked and ordered to give the purpose for the visit to computer rooms. This kind of system would provide an automatic bar rier to malicious individuals especially if the guards are not subject to being changed through bribes. Under this security measure, organizations should consider it necessary to move or change the guards if there are any signs of conflict of interest. This would make sure that quality protection is achieved thus, putting off any fears of computer losses. Research asserts that human security would be vital especially in large organizations to complement other security measures. Human beings would provide security to both the computer information and machine theft. The security provided by guards is trustworthy because of its physical nature. Guards should also be fairly paid to ensure quuality work is done. The adoption of wireless transmission ensures computer security. Wireless transmissions would be vital in keeping off hackers. This is because they mostly depend on physical means to access data transmitted over the networks. This security measure would ensure that data transferred across the networks is as intact as possible. Hackers and other unauthorized individuals are not able to access the information and alter it because they are unaware of the source and contents. This vital security measure would ensure the organization is in a better position, to communicate and exchange information over long distance without fear of loss of confidentiality. Wilshusen (2009) points out that a stronger wireless transmission is adopted to boost the protective quality of the information. The transmitted information would thus be received in the desired format. Research asserts that the use of wireless transmission would ensure that the information is transported at a faster rate through the ne twork hence leaving no possibility for interference with the information. Wireless transmission ensures that the intended persons only open the information sent or received. It is a security measure that adopts basic technology leading to reduced costs. Cloud computing is being used as a security system. This method ensures several individuals share information transmission channels. According to research, it is ensures that computers are protected because it helps in the storage of user accounts in a remote database. This will ensure that no unauthorized individual accesses them to change and cause any other kind of harm to the documents. Cyberspace Policy Review (2011) asserts that cloud computing acts as a hindrance for unauthorized individuals willing to access the computer at any point because of the rules and procedures required. It demands numerous authentication details before allowing one to access the information. Stallings Brown (2008) asserts that this security measure works well when managed in an efficient manner. Steps should be taken to ensure that cloud computing is effective. It should not be interfered with because it could lead to the unexpected exposure of secret information. Employees should not be allowed to abuse cloud computing because it would be inefficient in its further operations. According to research, cloud computing should be updated every moment to make sure it is in line with the existing trends. Cloud computing is also used to reinforce other security measure such as passwords due to its demand for such codes before access is allowed. In addition, it protects the initial details of all the information that is sent. There are many computer security systems. All of these methods are vital because they complement each other in ensuring the safety of computers. They are all vital techniques of ensuring there is a maximum security to the computers. According to research, all the computer protection systems have positive and negative sides. For instance, passwords could be easily forgotten leaving to the loss of vital information. Firewalls are negative because they could easily malfunction and lead to the loss of data. Computer threats are on an increase, but it is difficult for one to determine the best to use among the large collection. According to research, no method is better than the other is. This is because all computer protection systems carry both positive and negative impacts. Cyberspace Policy Review (2011) asserts that there is no protection system superior to the rest because they mainly complement each other in their operation. Research indicates that, for the success of an organizati on, all these methods need to be unified for maximum security, to be achieved. None of the methods is self-reliant. This is enough to prove that there is no instant of superiority among all the methods. They should be incorporated and complemented to achieve the best for the organization. In conclusion, computer security refers to the undertaking of steps to protect computer information and machines against losses. There are numerous computer security systems. Passwords are helpful in ensuring that unauthorized individuals do not access secret information. They supposed to be regularly altered in cases of discovery. Firewalls are security measures that are used to filter information and respective users. It ensures that the information is only available to legal users. Alarms provide an efficient form of security especially in machine theft. They cover large distances and are suitable for computer theft prevention in large companies. Human security is a form of physical security that could be adopted to protect computers. They protect both data details and machines from losses. Guards could be regularly changed and rotated to ensure that they work and deliver efficiently. Organizations are using cloud computing as a security technique. Under cloud computing, one is no t able to access details as they are stored in the remote database. Wireless transmissions are vital security measures that deny hackers an opportunity to alter information. Computer protection methods are numerous, and there is none that is superior compared to others because they continuously depend on each other for success. Buy custom Secure Systems essay