Tuesday, December 24, 2019

The Media Affects On Police - 2002 Words

Media Affects On Police Josh Erwin Georgia Gwinnett College There are multiple issues the criminal justice system faces on a daily basis. One of the most recent issues the system faces is the outlook the public has on police officers. As you could imagine police and public relations are very important due to the fact that the police in all actuality work for the people. The police must preserve the rights of all individuals good and bad and without community relations it fosters mistrust, hostility, and ultimately produces anarchy. Unfortunately, in today’s world a police officer is not allowed to make any mistake and is expected to make the right decision in a split second life and death situation. Society views police officers as a†¦show more content†¦The use of less lethal alternatives are not always an option in all situations, and people who have no experience in law enforcement are sometimes unable understand why this is. The relationship between fear of crime, punitive attitudes, and perceived police effectiveness is discussed in the Journal of Criminal Justice and Popular Culture. The article states the public knowledge of crime and justice is largely derived from the media. This statement could not be more true (Dowler, 2003). Society only knows what it is told and very few people actually do their own research other than watching the nightly local news. People watch movies and TV shows and assume what police do which can cause some major issues. The relationship between coverage of violent crime and a general fear amongst the population is studied as well. The study showed that the crime and violence portrayed on TV is actually much higher than the actual statistical data of crimes committed (Dowler, 2003). The researchers determined that the viewer internalizes the information seen on TV and truly believe that the crime portrayed is real. The effect of local news is shown to be higher for residen ts in high crime areas and those who have actually experienced victimization. The local news tells the viewers daily what is going on and the majority of the episode is violence because that is what brings viewers. If the viewers are watching the news

Sunday, December 15, 2019

Post Sigmoid Coletomy Care Free Essays

string(227) " The recovery nurse would also inform me which medications he has had, information regarding IV fluids, how long they should run for and whether more are needed when it finishes and check they are written up on the drug chart\." This paper will critically examine the care needs and management of Mr Braun. An appropriate framework will be used, namely the ABCDE. Alternative treatment will be analysed using the 5 WHs critical decision making too (Jasper, 2006)l. We will write a custom essay sample on Post Sigmoid Coletomy Care or any similar topic only for you Order Now His care will be based upon the nursing process ensuring that patient outcomes are agreed, implemented and evaluated. The assessment framework to be used is this assessment is the ABCDE assessment framework. The ABCDE framework looks at Airway, Breathing, Circulation, Disability, and Exposure/Elimination. The reason for choosing this framework is that it uses a systematic method of assessing, it aids with elimination of post op complications. In addition, it is a commonly accepted framework which is widely used and can be used in critical care situations, pre post-operative care and emergency situations. Furthermore, it allows the nurse to use her skills in accessing the patient’s needs. The disadvantages of the framework are that it is a medical model in the sense that it looks specifically at the biological aspects of care and lumps emotional/psychological/cultural/social care under the exposure/elimination catergory. Therefore it does not promote exploring these issues in great detail (Younker, 2008 Hargan 2012) Cancer Physiology Bowel cancer normally starts in the rectum or sigmoid colon. It starts as adematous polyps and then progresses to adematous carcinomas. It spreads by direct extension via the bowel circumference, submucousa and outer bowel wall layers. It can also spread to other areas by direct extension, for example, to the liver, pancreas and spleen. Metastasis is normally by way of the surround lymphnodes. Primary cancerous cells can also travel into the lymphatic and circulatory system causing secondary cancer in other organs such as liver and pancreas (LeMone Burke, 2003). Mr Braun is undergoing an operation for his sigmoid colon cancer. One route to take would be the traditional method. This consists of open bowel surgery. This entails making a large opening. A bowel prep is given prior to surgery, there is a longer starvation process, which can cause dehydration and electrolyte imbalance. Furthermore, it causes stress on the body, insulin resistance in the body is longer and the recovery period is longer. In addition it causes longer paralytic ileus (Siddiqui et al. , 2012). The alternative treatment to the traditional method would be the laparoscopic method. Mr Braun would have a smaller incision, therefore making a quicker recovery. He would be in less pain and would be able to mobilise quicker. He would have a quicker return of GI function and a lesser period of paralytic ileus. He would be able to deep breath better as he would not be experiencing a lot of pain, therefore he would be at less risk of contracting a chest infection. This would all work towards him having an earlier discharge, for example, 3-5 days post op compared to anywhere between 8-12 days on the traditional method. Research has also shown that community rehabilitation is much quicker, 2-3 weeks rather than 6-8 weeks on the traditional method (Jenson 2011). Further research shows that patients undergoing laparoscopic surgery have fewer complications post discharge (Hargan 2012). It appears then the laparoscopic route has better outcomes for the patient and in addition, the NHS. Being able to discharge a patient between 3-5 days who experience fewer complications post operatively not only frees up beds but costs less to treat the patient. Therefore, after weighing up the pros and the cons of both the traditional and the laparscopic it would seem that Mr Braun would be better off having the laparoscopic route. It appears from research that the lapascopic route is the route which is used in almost 90% of colorectal surgery. However, the route that is taken ultimately depends on the surgeon’s choice. Prior to collecting the patient from the recovery room Before collecting Mr Braun from the recovery room I will need to check the bed area. This includes checking that the oxygen is working. I will need to ensure that there is a nasal tube and a venturi mask. I will also need to check the suction is working and ensure that a new tube is present by the bedside. I will also need to make there is a yonker. I will put a dynamap beside the bed which will allow me to take Mr Braun’s clinical observations on return to the ward. I will also ensure that a drip stand is next to the bed as he may be on fluids or have a PCA on his return to the ward (Nicol et al. 2012). Collecting the patient from the recovery room On collecting the patient from recovery, I will take with me a kidney bowel in case the patient needs to be sick on his return journey, a pair of gloves, a oropharyngeal (geudel) airway in case his airway becomes compromised in anyway and a pocket mask for mouth to mouth. My first priority is to ensure that Mr Braun is safe to return to the ward. I will check his level of consciousness using the AVPU tool. This tool looks at whether he is Alert, whether he responds to Voice or whether he only responds to Pain and whether he is Unconscious. I will then take a handover from the recovery nurse. This should include informing me of the procedure Mr Braun has had, how well he has responded to the surgery and his current responsiveness/consciousness level. I would need to check with the recovery nurse whether his vital signs are within the normal range. This is for patient safety which is paramount and is at the centre of nursing care. This would need to be checked against the Early Warning Score (EWS) system which includes level of consciousness, the physiological parameters, for example, temperature, blood pressure, Oxygen saturation (SATS), respiratory rate, pulse and urine output. The EWS gives an overall score which informs me whether or not it is safe to take Mr Braun back to the ward. The recovery nurse would also inform me which medications he has had, information regarding IV fluids, how long they should run for and whether more are needed when it finishes and check they are written up on the drug chart. You read "Post Sigmoid Coletomy Care" in category "Essay examples" In addition, I would need to see the wound bed. This would help with later assessment on the ward where I would be able to compare whether there has been any further bleeding or leakage. I would need to see the stoma site. The recovery nurse would inform me whether Mr Braun had a urinary catheter and whether there had been any urine output. After handover I would say hello to the patient and manually take his pulse so that I can get an indication of his heart rate (Nicol et al. 2012). On the ward On returning to the ward I will orientate the patient. I will inform him of every procedure that I do so that I can gain informed consent (NMC 2012). I will immediately carry out a set of clinical observations. This is so I can make a comparison with his perioperative baseline. Although doing the clinical observations with the dynamap, I will manually take his pulse as it is vital that I know whether it is regular/irregular, strong or weak. ABCDE Assessment Airway The best way to check the airway is to speak to ask the patient and get him to respond to you. If he is able to talk in normally, this will be indicative of his airway being patent. I would need to listen to whether there are any sounds, like barking or gurgling as this could indicate that there is partial obstruction. I would also need to check whether Mr Braun is experiencing any nausea or vomiting. If Mr Braun is experiencing this I would need to immediately administer an anti-emetic as per drug chart instruction. This would help prevent the risk of pulmonary aspiration. I would also need to check whether Mr Braun has any allergies. I would ensure that he is wearing two red wrist bands with the allergies clearly written on them so that other staff members are aware. His allergies would be documented in his nursing notes and on his drug chart with information on what sort of reaction he experiences. Assessing whether Mr Braun has any allergies is extremely important as allergic reactions can cause swelling of the tongue and in the throat which would compromise his airway and leave him with difficulties breathing (Resuscitation Council UK, 2012). Breathing I would now assess breathing by checking Mr Braun’s respiratory rate (RR). The normal range is between 12-20 breaths per minute. In PAC, his RR was slightly raised. This could have been due to anxiety but was more than likely due to his anaemia (this will be looked at further under circulation). I will be able to gain a comparison and start looking for a trend. It is important that the RR is counted for a full minute. His breathing may be irregular and therefore not counting the full minute would give an inaccurate measurement. I would also check Mr Braun’s SATS. The normal range should be 95%. Checking his SATS will inform me whether he is getting enough oxygen and whether his tissues are being perfused adequately. Lack of oxygen can cause hypoxia which if not managed will lead to multiple organ dysfunction and ultimately death. I will also therefor check for cyanosis as this will also inform me whether he is lacking oxygen. It is important to look at how Mr Braun is breathing. For example, is he struggling to breath, is he breathing deeply or is it shallow. Does he have to use his accessory muscles to help him breath. I would check whether his chest is rising equally on both sides. I would also speak as him a question to ascertain whether he is able to speak in full sentences because someone who is struggling to breathe is unable to speak in full sentences. I would look at whether he is breathing fast or slow. Furthermore, I would look at how he is sitting, for example, is he leaning to one side. Also when you are assessing breathing it is important to listen for any wheeze or stridor. RR is one of the first things to alter when a patient is deteriorating. It is vital that if Mr Braun is experiencing any of the above, the nurse responds quickly. The first thing would be to check whether he is written up for any more oxygen and if so to increase it. The nurse would then have to check in RR and SATS again after 15 minutes to ascertain whether there was any improvement or further deterioration even. If the patient was deteriorating further the nurse would need to involve the doctor who would be able to review Mr Braun immediately and give further instructions on his care (Queen Mary University City University, 2006). Circulation An assessment of Mr Braun’s pulse needs to be undertaken. This will allow the nurse to ascertain his heart rate. In addition, it would allow me to feel whether his pulse is strong or weak and whether it is regular or irregular. The normal resting pulse should be between 60-80 beats per minute (bpm). In the PAC, Mr Braun was slightly tachycardic, which could be due to anxiety of his diagnosis, hearing about the treatment he would receive or his prognosis. By taking his pulse it will allow for a baseline, pre-operative and peri-operative comparison. His blood pressure (BP) would also be assessed. The normal ranges are 90/60-140/90. Mr Braun’s BP in PAC was 135/80. Although this is still within the normal range, it is slightly high. However, this would be an appropriate BP given his age. It is vital that clinical observations are carried out every 15 minutes for the first two hours post-op as there is a higher risk of complications occurring and clinical signs are the physiological parameters which tell you whether a patient is deteriorating or improving. For example, if a patient is tachycardic and hypotensive this could be indicative of hypovolaemic shock which would need to be managed immediately as this can lead to potential death. It is vital when taking clinical observations that the nurse is aware that she should not only rely on the measurements. This is because a patient can be in hypovolaemic shock and still have a normal BP. This is because in hypovolaemic shock, the compensatory mechanisms take over and the body will do everything it can to keep the BP at normal level. Therefore, it is vital that the nurse also observes what the patient looks like, for example, does he look palor, he is sweaty or clammy. These are all important factors when carry out clinical observations. When a patient undergoes surgery he has enforced reduced mobility. Mr Braun will be in bed for a while and due to these factors is therefore at risk of Deep Vein Thrombosis (DVT), which is one of the highest cause of PE leading to hospital deaths. The nurse should check whether he still has his TED stockings on and check that they are not rolled down or creased as this may prevent them from achieving good prophylaxis. Furthermore it could compromise his skin integrity. Mr Braun will probably also be prescribed oral or subcutaneous anticoagulants as a further prevention of DVT. Mr Braun’s Hb levels should be checked to ensure that his anaemia is improving. If Mr Braun was assessed in PAC as having met the criteria, which is expected to make a good recovery, for the ERP, his anaemia would have been dealt with prior to him being admitted. He would have been assessed for any co-morbidities and his GP would have been involved to treat his anaemia. If his anaemia had not been treated, prior to his admission, it is likely that Mr Braun would have undergone a blood transfusion during surgery. This would mean that he would have a cannula in situ which would need to be assessed to check for phlebitis. This would need to be documented on the VIP chart (Hargan 2012). The cannula needs to be checked to ascertain whether it is patent. The date of insertion should also be noted on the VIP chart as it is not allowed to stay in for longer than 72 hours. Mr Braun will also have a catheter in situ. Therefore it is important to check for urine output. Mr Braun should have a urine output of 0. 5ml/kg/hr, in other words half his body weight per hour. Therefore if Mr Braun weighs 80kg, he should have a urine output of 40mls per hour. If going through the traditional method, Mr Braun would have to have a low residue diet approx. 2 days prior to the operation. He would only be allowed clear fluids approximately 12-18 hours before surgery and would then be starved from the midnight before the day of surgery to prevent aspiration. Research has shown that prolonged starvation causes dehydration and electrolyte imbalance. It causes the body to experience insulin resistance for longer and cause the body more stress (Burch Slater 2012). In contrast, he would have been given carbohydrate loading prior to surgery in the form of iso-osmolarity which 90% passes through the stomach within 90 minutes therefore he would have been able to have it one and a half hours prior to surgery. This would cause less insulin resistance and put his body through less stress. He would be able to come off any IV fluids as he would be encourage to eat and drink at will post operatively. How to cite Post Sigmoid Coletomy Care, Essay examples

Saturday, December 7, 2019

Cyber security

Question: Discuss about Cyber Security ? Answer : Introduction In the term of information security, social engineering refers to the psychological manipulation of people in divulging the confidential information of them or performance of their actions. It is considered as the art of manipulating people so that they give away their confidential information. In todays era many people become victim of the internet attacks where the attacker does a theft of the victims useful data. This assignment consists the overview of social engineering with the description of social engineering strategies, which are used to engage the targeted victim. It consists a detailed analysis of the environment in which the attack is done on the victim. The strategies, which can be implemented to prevent those attacks, are mentioned. First of all a brief description of social engineering is provided followed by the terms of attack and rescue. Social Engineering The attack is based totally on the interaction of human and it indulges humans in breaking down the security measures. The act of social engineering can also be said as the con game. The techniques involved in the procedure are appeal to vanity, appeal to legal greed and appeal to authority. Social attacks are done effectively only when the victim is willingly helpful to the attacker. The attacker pretends to be a co-worker or a friend of the victim and performs the theft (Krombholz et al. 2015). Social engineering strategies There are many strategies, which the attacker adopts in order to manipulate peoples to get any type of confidential information. The information, which is given by the people willingly to the attacker is used for various illegal purposes. The data which the persons (criminals) doing these attacks are looking for may be different in each and every case. Whenever any person in particular is at target by the Social Engineering Criminals, then these criminals usually try to manipulate them into giving the passwords or the bank account details. The attackers even try to get an access to their computer so that they could install any software, which will thereafter run on the victims computer and store the passwords and the bank account details and also these software gains control over the victims computer (Bulle et al. 2015). There are various processes to do social engineering attacks, some of them are mentioned below : Phishing This is the most common attack process. In this attack, the attacker copies the whole look of your website and sends you a request to login or even give you a password reset form, which contains old password and new password thus the attacker getting your original password, which is what they were looking for (Heartfield and Loukas 2016). Vishing In this process a attacker calls a victim with some pre-recorded clip, simulating that they are calling from his company or from the companys bank. After doing this they will tell the victim to call on a number, and when the victim calls, attacker will ask all the details about the debit or credit card, registered number, pin, first four or last four or even full digits of the victims social security number and all other important details (Greitzer et al. 2014). After enquiring about these things the attacker will tell the victim about some transactions, which would be fake but the victim, will think them as real and the attacker will promise to cancel all the transaction so that the victim has hiss full faith upon the attacker and thereafter the attacker will use the debit or credit card. Botnet It is a group of conciliated computers, which are designated as zombies. They are corrupted by some malware, which gives the attacker an access to have a control over the peoples data (Heartfield and Loukas 2016). The Botnet is mainly used to send fake mails, which are spam in general or even used to transfer any malicious software or any virus and also used in many types of cybercrimes. Tailgating It is also knows as piggybacking. In this type of attack, the attacker dresses up like a delivery person and they wait outside of the companys building. When any employee passes through the security, the attacker follows the employee to skip to security or when then employee opens a security door, the attacker requests the employee to hold on to the door so that they can get the delivery boxes through them (Mouton et al. 2014). Rootkit It is fraudulent computer software or a simple program. It is created to give continuous authorized access to a particular computer and at the same time this program hides the existence of the computer (Tetri and Vuorinen 2013). Social networks Social networks are in trend these days. Almost everybody uses Websites like LinkedIn, Twitter and Facebook today and their users are increasing day by day. These offer a great source to the users to remain in touch with each other. The dark side of social media is that the attackers or the spammers to get close to the victim use it. The social networks help the scammer to send fraudent mails to the victim. The attacker may ask the victim to click on a video or image which contain the malicious software (Krombholz et al. 2013). Analysis of the environment The First step taken by the attackers in the process of social engineering is creating an environment suitable for the theft. The social engineers to get the passwords and the data use a wide variety of ways. First of all, the attacker starts looking for the information which ca be used to penetrate the organization. The attacker approaches the employee who is supposed to have all the information related to the company. The attacker takes the form of a technician or a co-worker who can be easily trusted by the victim employee. There are certain other environments created by the attackers in order to get in touch with the victim. The ways are trawling the parking lot for goodies as the vehicles may contain security badges, smartphones, and confidential paperworks (Watson, Mason and Ackroyd 2014). The other method used is spending time with the victim in order to create a friendly relation and implementing the theft. Sometimes, it takes large amount if time to get familiar with the vic tim and get the information. If the attacker is impatient enough, he/she gets in acquaintance with the bar or public place which is visited most frequently by the victim. There, the attacker gets in touch with the victim and becomes familiar to him/her. The other technique used is visiting the company building often, thus becoming a familiar face, which can be trusted by the employees, and then implementing the theft (Kearney and Kruger 2014). The attacker can also create a hostile environment with the attacker and thus taking advantage of the employees trust. Hypotheses/approaches for addressing security threats There are many ways by which the social engineering attack can be recognized and prevented. Hackers use clever method to fool the employees and individuals (Beckers, Krautsevich and Yautsiukhin 2015). These attack mainly involve some type of psychological manipulation and fooling the employees. The tips to prevent attacks are- The confidential information of the employee must never be provided to anyone. The employee must never give their personal data credentials such as phone number or email address. These must be provided especially with unknown persons and suspicious sources. If the employee receives an email which has the link of an unknown site, the mail must be avoided by the employee. The person must look at the Uniform Resource Locator (URL) and check whether it is suspicious. At times, the mail may seem to come from a known contact but still the employee must check the link for any phishing process involved in the mail. Before clicking on the mail, the misspells must b e checked such as @ signs and suspicious sub domains (Algarni et al. 2013). While clicking on the links, the person must take care of the uninitiated automated downloads as it can be malware piggybacking on the individuals system (Algarni and Xu 2013). Such activities must be reported immediately to the security manager of the organization. The USB devices must be blocked in order to reduce the risk of Baiting. The process of Baiting is the digital equivalent of a real-world Trojan horse where the attempt is done by the attacker in order to temp the user with found or free physical media. The attacker relies on the curiosity of the greed of victim (Applegate 2013. If the victim plugs in the USB to the system, the victim is hacked that particular moment. The organization must run a ATE-AWARENESS, TRAINING and EDUCATION security concept for all the employees. The C-level employees of the organization are most prone of becoming the victim and thus they must be made aware about all the situations and the methods to deal with them. 2-factor authentication must be used by the organization in order to ensure the safety of data in the organization. Full care must be taken to protect the data as the theft of data can pose great harm to the organization. Conclusion From the above discussion, it can be concluded that social engineering attacks are increasing day by day in todays era. The attack is based totally on the interaction of human and it indulges humans in breaking down the security measures. The act of social engineering can also be said as the con game. The techniques involved in the procedure are appeal to vanity, appeal to legal greed and appeal to authority. There are many strategies, which the attacker adopts in order to manipulate peoples to get any type of confidential information. The information, which is given by the people willingly to the attacker is used for various illegal purposes. The data which the persons (criminals) doing these attacks are looking for may be different in each and every case. Whenever any person in particular is at target by the Social Engineering Criminals, then these criminals usually try to manipulate them into giving the passwords or the bank account details. The First step taken by the attackers i n the process of social engineering is creating an environment suitable for the theft. A wide variety of ways are used by the social engineers to get the passwords and the data. First of all, the attacker starts looking for the information which ca be used to penetrate the organization. The attacker approaches the employee who is supposed to have all the information related to the company. Proper care must be taken by the organization in order to save its data and remain secure from the attacks. References Algarni, A. and Xu, Y., 2013. Social engineering in social networking sites: Phase-based and source-based models.International Journal of e-Education, e-Business, e-Management and e-Learning,3(6), p.456. Algarni, A., Xu, Y., Chan, T. and Tian, Y.C., 2013, December. Social engineering in social networking sites: Affect-based model. InInternet Technology and Secured Transactions (ICITST), 2013 8th International Conference for(pp. 508-515). IEEE. Applegate, S.D., 2013. Social engineering: hacking the wetware!.Information Security Journal: A Global Perspective,18(1), pp.40-46. Beckers, K., Krautsevich, L. and Yautsiukhin, A., 2015. Analysis of social engineering threats with attack graphs. InData privacy management, autonomous spontaneous security, and security assurance(pp. 216-232). Springer International Publishing. Bierschenk, T., 2014. From the anthropology of development to the anthropology of global social engineering.Zeitschrift fr Ethnologie, pp.73-97. Bulle, J.W.H., Montoya, L., Pieters, W., Junger, M. and Hartel, P.H., 2015. The persuasion and security awareness experiment: reducing the success of social engineering attacks.Journal of experimental criminology,11(1), pp.97-115. Greitzer, F.L., Strozer, J.R., Cohen, S., Moore, A.P., Mundie, D. and Cowley, J., 2014, May. Analysis of unintentional insider threats deriving from social engineering exploits. InSecurity and Privacy Workshops (SPW), 2014 IEEE(pp. 236-250). IEEE. Heartfield, R. and Loukas, G., 2016. A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks.ACM Computing Surveys (CSUR),48(3), p.37. Kearney, W.D. and Kruger, H.A., 2014, August. Considering the influence of human trust in practical social engineering exercises. InInformation Security for South Africa (ISSA), 2014(pp. 1-6). IEEE. Krombholz, K., Hobel, H., Huber, M. and Weippl, E., 2013, November. Social engineering attacks on the knowledge worker. InProceedings of the 6th International Conference on Security of Information and Networks(pp. 28-35). ACM. Krombholz, K., Hobel, H., Huber, M. and Weippl, E., 2015. Advanced social engineering attacks.Journal of Information Security and applications,22, pp.113-122. Mouton, F., Malan, M.M., Leenen, L. and Venter, H.S., 2014, August. Social engineering attack framework. InInformation Security for South Africa (ISSA), 2014(pp. 1-9). IEEE. Tetri, P. and Vuorinen, J., 2013. Dissecting social engineering.Behaviour Information Technology,32(10), pp.1014-1023. Watson, G., Mason, A. and Ackroyd, R., 2014.Social engineering penetration testing: executing social engineering pen tests, assessments and defense. Syngress.