Monday, December 30, 2019

1984 Essay examples - 1091 Words

The book 1984 tells a story of a world that is undergoing a totalitarian rule, whereby the freedom of human beings is removed and there is injustice present to all by the loss of privacy. It is a world where information can be changed and influenced in order to favour the Great Powers, I believe that this world of 1984 is possible for its looming signs are present worldwide. I believe that the chances of such a situation occurring depends on the societies capacity to do it, or in other words if the technology to bring about such a situation is available then the chance of this occurring is equally likely. Of course we see in our present day world that technology has taken a huge upheaval. Our technology in terms of privacy is now far†¦show more content†¦The manipulation of information in 1984 is a significant factor of its continual submission of its citizens to the Great Power. Changing information may also lead to the power of changing the past. This is obvious and an intention of Big Brother, his continual success is bleakly based upon his power to lie. There are scenarios we see today that perfectly incorporate to 1984. `The children overboard crisis. This is a situation where asylum seekers coming into Australia were refused aid when their boats were sinking. The media had covered the footage of this incident occurring, although there were twists in the story that were in favour of the government or there was incredibly strong bias in the circumstances. Nationwide the people saw refugee children being thrown overboard by their parents; the media headlined this as being a desperate attempt of the adults to get the attention of the Australian Government to receive aid. But the reason why such an action was undergone was solely intended for the governments sheer willingness to receive the citizens trust and remain in lead and control. So how is this situation different from the similar actions shown in 1984? The answer is that it is not. The governments have undergone the same actions of changing the truth in order to remain in control just like Big Brothers attempts to change his malevolent past thro ugh to morally remain in power. But in 1984 there is aShow MoreRelatedThe Presidential Election Of 19841339 Words   |  6 Pages The United States presidential election of 1984 was the 50th quadrennial presidential election. It was held on Tuesday, November 6, 1984. The presidential race was between the incumbent Republican candidate, President Ronald Reagan, and former Vice President Democratic candidate, Walter Mondale. Reagan was helped in the election by a strong economic recovery from the deep recession of 1981–1982. Reagan carried 49 of the 50 states, becoming only the second presidential candidate to do so after RichardRead MoreAnalysis Of George Orwell s 19841450 Words   |  6 PagesThose familiar with George Orwell’s â€Å"1984† will recall that â€Å"Newspeak was designed not to extend but to diminish the range of thought.† I recently felt the weight of this Orwellian ethos when many of my students sent emails to inform me, and perhaps warn me, that my name appears on the Professor Watchlist, a new website created by a conservative youth group known as Turning Point USA. I could sense the gravity in those email messages, a sense of relaying what is to come. The Professor Watchlist’sRead MoreThe Case of Malcolm Farley1275 Words   |  5 Pagesapprehending a criminal they were after for a long time. The role of paint analysis in this case was enormous and to date it is one of the cases people refer to when discussing the relationship between forensic science and crime (Smith, 2005). In 1984, Bedfordshire and Buckinghamshire residents suffered sleepless nights with fear and terror in their homes. Armed burglaries, rape as well as indecent and uncouth sexual assaults became the order of the day. The residents barred their windows, the policeRead MoreThe 1984 Anti-Sikh Riots in India1175 Words   |  5 PagesThe 1984 Anti-Sikh Riots in India The Anti-Sikh riots in the 1984 year of riots had been anything in particular. People are aggrieved when they hear of the incident and narrate stories of how runaway crime could have increased on Sikhs during the time. The main reason for the advent of the riots was the shooting down of Mrs. Indira Gandhi in morning of 31 October 1984. The riots had started off in the evening just after her morning death. The information of the riots was already taken by GiyaniRead MoreComparison Of 1984 And 19841089 Words   |  5 Pagesâ€Å"It really is as if he got hold of an early copy of the novel and used it as a blueprint.† The novel, 1984 by George Orwell, is a dystopian novel published in 1949. This novel is based in London, Oceania. This was Orwell’s prediction of what future societies would be like. North Korea is a country located in East Asia that is ruled by Kim Jong-Un. Kim Il-Sung set up the government they have now, around the same time as Orwell wrote his novel. Many similarities and differences are present betweenRead More1984817 Words   |  4 PagesGeorge Orwell s 1984 is an exemplary work of dystopia. Although written in 1940s, 1984 is a vivid depiction of China during the Cultural Revolution and Soviet Union during the Elimination of Counterrevolutionaries. Dystopia came into being after the World War â… ¡, when the world was at a loss about its future. Although the world was purged of fascism, personality cult and communist dictatorship arose to take its place.Dystopia is characterized by an authoritarian and totalitarian regime that oppressesRead MoreAnalysis Of 1984 s 1984 1317 Words   |  6 PagesLiterature and Composition Summer Project 1984 Ms. Shaw 1. 1984 The title 1984 is significant to the some of the themes throughout the novel which are developing technology, propaganda, and the ability to manipulate the truth. Developing technology is shown throughout the novel when telescreens and bombs become commonly used within society; these are examples of the technology modernizing throughout this time period. A second theme significant to the novel 1984 is propaganda led by using an exampleRead MoreSimilarities Between 1984 And 1984963 Words   |  4 Pages1984 Essay Although modern society may not be a totalitarian society, 1984 reflects many of modern society’s circumstances. Such as psychological understanding, surveillance technology, and wealth distribution. As a result of this, the society of 1984 may not be as far off from today as would seem, from 1984 societys wealth to standard of living, both places share many similarities. Both 1984 and modern society has developed a deep psychological understanding. 1984 expressed this understandingRead MoreThe Themes Of 1984 And George Orwells 19841237 Words   |  5 Pagestopics in his book, 1984. In 1984, George Orwell illustrates what a totalitarian society would be like. At the time that he wrote this book, many citizens of England were afraid of their government having too much power over them. Orwell wrote 1984 to warn the public of what a powerful government can lead to. Even currently, 1984 can be related to different places or events in our world. The purpose of this paper will be to show how the past and present connect to George Orwell’s 1984. The misuse of powerRead More1984 Research Paper On 1984 Essay1026 Words   |  5 PagesOllie Pearson Mr Funk English 2 HN 2 October 2017 1984 Research Paper Thomas Jefferson once said that â€Å"Everyone has the unalienable rights of life, liberty, and the pursuit of happiness.† If the government spied on its citizens, the citizens would carry the burden of having the government constantly watch every move being made, interfering with citizens pursuit of happiness. With that being said, if a citizen’s privacy was invaded then their pursuit of happiness would be demolished. The government

Sunday, December 22, 2019

Analysis Of The Poem Indian Summer - 1391 Words

III. Second Body Paragraph Parker uses voice to demonstrate her feelings about how she refuses to conform society’s expectations. For example, her poem â€Å"Indian Summer† she uses a confident and powerful voice to compliment her theme of the poem. She writes, â€Å"And if you do not like me so/To hell, my love, with you!†(lines 7-8). Parker describes how she has changed as a woman. Parker learned that being herself is more important than what her relationships expected from her.Critic Breese writes, â€Å" â€Å"It is her style, her art, her many-sided humor, her irony, her sarcasm, her tenderness, her pathos that readers pay attention to . . . . Parker s attitude toward human folly was satiric; her poems mock and undermine as they unfold through repetitions that underscore and heighten her satirical intent† (Breese). Breese is explaining that Parker used satire and sarcasm to show her feelings about people who do not accept her for who she is. Parker knew she defied most standards and she did not care what others thought about her. Her attitude proves she does not care about being judged for using her intellect and being independent. Parker uses voice to emphasize her attitude of people who do not agree with the feminist views. For example, in her poem â€Å"Iseult of Brittany† A bitterness to me! (line 8). Parker ends her romantically written poem with a blunt line at the end. This represents Parker’s sass and confidence of being independent and free. She does not care about pleasing aShow MoreRelatedSarojini Naidu1131 Words   |  5 PagesThe Indian English poetry that flourished in the late nineteenth and early twentieth centuries was largely an imitation of the English Romantic poetry both in its form and matter. No attempt was made to project the essence and nuances of the rich culture and tradition of India. The Westerners inturn wished for a glmpse of Indian life and customs through the literature of the t ime. As Edmund Gosse says in his introduction to Sarojini Naidu’s The Bird of Time (1912) : What we wished to receive wasRead MoreA Literary Analysis On The Shall I Compare Thee? Essay784 Words   |  4 PagesLiterary Analysis on the â€Å"Shall I Compare Thee?† (Sonnet XVIII) by William Shakespeare and the â€Å"To his Coy Mistress† Poem by Andrew Marvell This article compares the poems â€Å"Shall I Compare Thee?† (Sonnet XVIII) with â€Å"To his Coy Mistress† and examines the purposes of the poems and their implemented poetry techniques to convey their poets ideas. On first look it seems both poems are sharing the common ideas of â€Å"Love† but by analyzing the poems, it becomes clear that the purposes of the two poems are notRead MoreThe Lotus by Toru Dutt1493 Words   |  6 Pages THE LOTUS A poem by Toru Dutt Love came to Flora asking for a flower That would of flowers be undisputed queen, The lily and the rose, long, long had been Rivals for that high honour. Bards of power Had sung their claims. The rose can never tower Like the pale lily with her Juno mien-- But is the lily lovelier? Thus between Flower-factions rang the strife in Psyches bower. Give me a flower delicious as the rose And stately as the lily inRead MoreNostalgia in the Poems by Kamaladas3364 Words   |  14 PagesPen name | Madhavikkutty | Occupation | Poet, short story writer | Nationality | Indian | Genres | Poetry, Short story | Notable award(s) | Ezhuthachchan Puraskaram, Vayalar Award, Sahitya Akademi Award, Asan World Prize, Asian Poetry Prize, Kent Award | Spouse(s) | Madhava Das | Kamala Suraiyya (b. Kamala Madhavikutty) (Malayalam à ´â€¢Ã  ´ ®Ã  ´ ²Ã  ´ ¾ à ´ ¸Ã  µ Ã  ´ °Ã  ´ ¯Ã  µ Ã  ´ ¯ / à ´ ®Ã  ´ ¾Ã  ´ §Ã  ´ µÃ  ´ ¿Ã  ´â€¢Ã  µ Ã  ´â€¢Ã  µ Ã  ´Å¸Ã  µ Ã  ´Å¸Ã  ´ ¿) (31 March 1934 – 31 May 2009) was a major Indian English poet and literateur and at the same time a leading Malayalam author. Her popularityRead MoreConfessional Mode in Poetry of Kamala Das3267 Words   |  14 Pagesof writing has its virtual origin in the mid50s in America. It is hybrid mode of poetry which means objective, analytical or even clinical observation of incidents from one’s own life. Confessional poems are intensely personal and highly subjective. There is no ‘persona’ in the poems. ‘I’ in the poems is the poet and nobody else. The themes are nakedly embarrassing and focus too exclusively upon the pain, anguish and ugliness of life at the expense of its pleasure and beauty. Confessional poets didRead MoreHenry David Thoreau4404 Words   |  18 PagesThoreau, advising the young man and introducing him to a circle of local writers and thinkers, including Ellery Channing, Margaret Fuller, Bronson Alcott, and Nathaniel Hawthorne and his son Julian Hawthorne, who was a boy at the time. The best analysis of Thoreaus character was Emersons funeral elegy for him. Emerson was well aware of Thoreaus devotion to his principles and said that he had a perfect probity. Emerson also realized, perhaps better than anyone else, that Thoreau gave an edgeRead MoreThe Role of Nature4799 Words   |  20 Pagesthe way it can and should be perceived is not the same. I would like to argue that Coleridge considers a sort of intuitive faculty, whereas Pope thinks that a reasonable examination of Nature unveils the divine order of the universe. The present analysis will spotlight Popes Essay On Man and Coleridges Rime of an Ancient Mariner. First, I want to show that Coleridge and Pope advocate a pantheistic and a deistic conception of Nature, respectively. This should be the general framework through whichRead MoreWhat Aspects Of Human Life Remain The Same Across All Three Groups2974 Words   |  12 Pagespatriarchy in early Indian societies. What is the Lawbook of Manu and how does it relate to gender roles? Men may cook or weave or dress dolls or hunt. 4. What are the Vedas and the Upanishads? What do they teach us about early Indian societies?The Vedas are the most ancient known texts of Hinduism.The Upanishads are philosophical texts that came after the Vedas. 5. Trace the origins of the caste system, making sure to include a discussion of varna and jati. How do early Indian religious texts seemRead MorePoems: City Planners15330 Words   |  62 PagesThe Poems analysed are: The City Planners, Margaret Atwood and The Planners, Boey Kim Cheng. These are taken from the IGCSE Cambridge Poetry Anthology, but may be interesting for unseen poetry too. Question Set How do these poets use language and structure to get across their theme? I wrote this in about half an hour. Both poems are very similar, and have the same topic - City Planning - as shown in their titles. Structurally, they are different though, and the tone differs in places. IveRead MoreImpacts of Historical Globalization.6706 Words   |  27 Pagesthis? What might be the results of this policy? Think about these questions as you complete the activities below. 1. Read the quotation by Duncan Campbell Scott, Deputy Superintendent of Indian Affairs from 1913-1932 on page181 of your text Perspectives on Globalization. What was his point of view about â€Å"Indians†? (Use a people’s own name for themselves if you know it or the term First Nations is preferable when referring to all First Nations people in Canada?) Why do you think he had this viewpoint

Saturday, December 14, 2019

Hiv Prevention Strategy In Nigeria Health And Social Care Essay Free Essays

string(63) " high degree of cognition about HIV / AIDS bar among teachers\." Nigeria ‘s population of 140 million is the largest in Africa with 1 in 6 Africans being Nigerian. The information from the 2005 HIV study indicates that approximately 4.4 % of Nigerians are infected with HIV. We will write a custom essay sample on Hiv Prevention Strategy In Nigeria Health And Social Care Essay or any similar topic only for you Order Now The prevalence exhibits province broad disparity of between 1.6 % in Ekiti province ( south West ) and 10 % in Benue province ( north cardinal ) . ( Figure 1 ; NACA, 2007 ) While the infection rate is slower than some other African states, issues about HIV are still high on the docket because of the states high population. ( Figure 2 ; Jennifer Kates, Alyssa Wilson Leggoe, 2005 ) The Antenatal information shows that immature grownups appear most affected with 3.6 % amongst pregnant 15-19 twelvemonth olds and 4.7 % amongst 20-24 twelvemonth olds ( Figure 3 ; Technical Report National HIV/Syphilis Sero-Prevalence Sentinel Survey, 2005 ) This fact highlights the demand for a good co-ordinated National HIV/AIDS bar plan to farther decelerate down the infection rate and cut down incidence. ( NACA, 2007 ) Figure 1: HIV Prevalence by State ( 2005 ) www.naca.gov.ng Figure2 a ) Percentage of Adults estimated to be populating with HIV/AIDS and B ) Number of People estimated to be populating with HIV/AIDS. Beginning: HIV/AIDS Fact sheet, 2005 Figure 3: HIV Prevalence by Age group ( Old ages ) 2005 www.naca.gov.ng Drivers of the HIV Epidemic in Nigeria Informal Transactional Sexual activity: While commercial sex workers ( CSWs ) have long been identified as critical in impacting the spread of the HIV/AIDS epidemic rubber usage among them is high. A cardinal driver nevertheless is informal commercial sex among the general population ( J. Robinson, 2008 ; NACA, 2007 ) Low Risk Percept: 67 % of Nigerians perceive themselves to be at no hazard of undertaking HIV while 29 % perceive themselves to be at low hazard and merely 2 % rated their opportunities of infection high ( NARHS, 2005 ; NACA, 2007 ) Multiple Partnerships: In Nigeria, spiritual beliefs tend to back up the publicity of common fidelity ; NDHS ( 2003 ) nevertheless proved that multiple sexual partnerships are common particularly amongst sexually active work forces. About 30 % and 24 % single and married work forces severally reported holding more than one sexual spouse in the past twelvemonth ( NDHS 2003, NACA 2007 ) . While work forces with multiple spouses have a 60 % increased hazard, adult females are 10 % higher than work forces. ( NARHS, 2005 ) Lack of established STD Programming for Most at Risk Population ( MARP ) : Package of services provided to MARPs is limited. Linkages to HIV guidance and testing, STD direction and intervention are weak and have relied chiefly on referrals. Continuing Risky Behaviour of males in General Population: Hazardous behavior in the general population is more prevailing among work forces than adult females. 26 % of work forces report holding more than one sex spouse in the last twelvemonth as against 2 % in adult females. ( NARHS, 2005 ) Gender Inequalities: Underliing causes and effects of HIV/AIDS infections in work forces and adult females varies reflecting differences in biological science, sexual behavior, societal attitudes, economic power, exposure, and cultural attitudes that discourages safe sex dialogue. ( NACA, 2007 ) Economic Drivers: HIV impoverishes persons and communities through losingss of human resources. Poverty brings about low degrees of instruction associated with illiteracy and by and large hapless wellness position. These conditions result in hapless acceptance of behavior alteration which exposes the population to HIV infection. ( NACA, 2007 ) Equally shortly as an epidemic of HIV/AIDS was noticed in the state, Nigeria mounted a national response, which was expanded in 2000 with the constitution of the Presidential Council on AIDS ( PCA ) and the National Agency for the control of AIDS ( NACA ) . This allowed for a co-ordinated attempt to supply bar, intervention, attention and support services through policy preparation, development of programs and execution. NACA ‘s authorization provinces that: -A A 1.A A A Coordinate and prolong protagonism by all sectors and at all degrees for HIV/AIDS/STD expanded responses in Nigeria.A 2.A A A Develop the model for coaction and support from all stakeholders for a multi-sector and multi-disciplinary response to HIV/AIDS in Nigeria. 3.A A A Develop and present to the PCA, all programs on HIV/AIDS in Nigeria for policy determinations. 4.A A A Develop and joint a strategic program for an Expanded National Response to HIV/AIDS in Nigeria.A 5.A A A Coordinate, proctor and measure the execution of the Strategic National Plan for the control of HIV/AIDS/STDs in Nigeria and all other approved policies.A 6.A A A Coordinate and ease the mobilisation of resources for an effectual and sustainable response to HIV/AIDS/STDs in Nigeria.A 7.A A A Undertake any other responsibilities as assigned by the PCA from clip to clip. ( NACA, 2007 ) The National HIV/AIDS Strategic Framework for Action ( 2005-2009 ) provides a strong and comprehensive model for bar attempts including a balanced â€Å" ABC † attack. In this model, in-school young persons were marked as a mark population group. Sexual activity instruction is a major constituent of bar and one of the tools in minimal bundle required for HIV bar. Political issues environing it include Resistance to arouse instruction and rubber publicity by Faith Based Organizations ( FBO ) , Religious leaders and other stakeholders Inadequate accomplishments on rubber usage and dialogue Misconception about sex instruction and low credence Availability, handiness and affordability Lack of policy environing sexual instruction in secondary schools ( NACA, 2007 ) A survey done in Nigeria analyzing the sexual behavior of secondary school striplings showed that the average age at first intercourse was 12 old ages with a scope of 6-19 old ages ; many of the participants had multiple sexual spouses and a hapless perceptual experience of the hazard of STD including HIV. It was recommended that a structured sexual instruction course of study be instituted for all schools get downing at an early age. ( A.T. Owolabi, A.A. Onayade et Al, 2005 ) Other surveies have examined how instructors feel about go throughing their cognition on HIV / AIDS bar steps to their pupils in the context of their cultural and societal norms that restrict unfastened treatment of sex.A The consequences showed a high degree of cognition about HIV / AIDS bar among teachers. You read "Hiv Prevention Strategy In Nigeria Health And Social Care Essay" in category "Essay examples"A Nevertheless, instructors do non go through on this cognition because of cultural and societal taboos.A In add-on, instructors do non have proper preparation and motive on information, instruction and communicating on HIV / AIDS and sex instruction. ( Daniel C. Oshi et Al, 2005 ) It is hence necessary to increase handiness of sexual wellness services, create societal support for sex instruction in schools and build capacity on appropriate sex instruction. Previous efforts at supplying sex instruction were interfered by spiritual and cultural resistance. In 2000 a new course of study was introduced for comprehensive sex instruction for 10-18 twelvemonth olds which concentrated on bettering pupil ‘s cognition and attitudes to sexual wellness and cut downing hazardous sexual behavior. However the execution of the undertaking was a entire failure and has since been abandoned. ( Avert, 2010 ) In a state where issues such as confidentiality around HIV proving is non covered by statute law, where no action is taken when human rights are broken in relation to HIV infection and stigmatisation. It seems the destiny of the immature people are in their custodies, owing to the absence of generative wellness ( RH ) institutes and deficiency of separate Torahs or statute law for immature people in relation to HIV bar. ( United Nations Global Coalition on Women and AIDS, 2004 ) POLICY AGENDA Setting To accomplish this wellness policy, one must see the histrions that would be involved and analyze all stakeholders- so as to understand their behavior, purposes, inter-relations and involvements: and to measure the influence and resources they bring to bear on decision-making or execution procedure. ( Varvasovszky Z. , Brugha R. 2000 ) Stakeholder/ Actor analysis will place the type of people to interview, utilizing sweet sand verbena techniques, reappraisal questionnaires etc. It is of import to plan a semi-structured/ condense interview inquiries. Interviews will let comparison across cultural groups and faith ; and yet be sensitive to specific contexts. Stake holder ‘s position has to be transformed into one that utilizes indexs to exemplify the extent of the job. They need to be informed of graduated table, tendencies and likely future class of HIV epidemic in their part or territory and within specific subgroups of the population. Table 1: Stakeholders Analysis Stakeholders Engagement in the issue Interest in the issue Influence/ Power Position Impact of issue on histrion Parents Participate in Child Sexual Education and can act upon their kids ‘s determination Medium Low Non-mobilized High Media Industry Promote stakeholder ‘s positions and can act upon determination shapers by supplying dependable information High High Supportive Low Ministry of Health Promote healthy generative picks, direction of STIs and HIV related unwellnesss High Medium Supportive High Presidential Council on AIDS Survey policy proposals and do determinations on them Medium High Non-mobilized Medium School Administration Participate in policy Execution High Medium Opposed High Ministry of Education Ensure sex instruction is integrated in national course of study and implemented Training of staff Policy Implementation and Evaluation High High Supportive High Bilateral Organizations Provide support and proficient support High High Supportive High Religious Leaderships Influence the population through spiritual, moral and cultural beliefs High High Opposed Medium Importers, Manufacturers and Sellers of the merchandise e.g. rubbers, text editions Provide low-cost and high quality merchandise Engagement in distribution High Low Supportive High NACA Develop and present to PCA all programs on HIV/AIDS in Nigeria for policy determinations High High Supportive High Documentary/ Content analysis would be undertaken to place the grade of consistence between the present policies in the state. It would besides cover how far policy shapers draw on research findings in addresss during policy preparation and execution phases. The information beginnings would include research publications and studies, statute law, administrative/executive ordinances or orders, reimbursement agreements, guidelines and advice, meeting studies and proceedingss, policy statements, addresss, and articles. An economic rating will be considered to measure and construe the value of this wellness intercession. This will mensurate the results in pecuniary footings every bit good as in wellness units. For this policy a cost effectivity analysis ( CEA ) will be more good in order to besiege the quandary of puting pecuniary value on human lives. It will compare the value of resources spent on the intercession to the measure of wellness gained as a consequence. ( David Wonderling et Al, 2005 ) A thorough apprehension of consistence of old policies with research findings, the grade of influence of research on policy docket scene, preparation and execution would be needed to guarantee a high degree of wellness research use in the determination devising of this wellness policy. CLARITY OF MESSAGE HIV bar, peculiarly sex instruction demands strong grounds in order to be recommended for consideration and broad spread execution. Hall ‘s theoretical account of docket puting claims that the strength of this grounds depends on the issue ‘s Legitimacy, Feasibility and Support. ( Kent Buse, 2005 ) The issue at manus is legitimate as the HIV epidemic continues to harry the state, heterosexual sex being the most reported signifier of transmittal and high rate among immature people. It is executable since the policy will be implemented logistically through already bing systems, cost and resources will hence be reduced. Support can be generated through act uponing the population with the usage of media, raising consciousness and advancing rubber usage, affecting FBOs in policy execution. There is besides no grounds that sex instruction or rubber handiness in schools will increase promiscuousness or cut down the age of first sexual intercourse of in school young person, hence this policy has no potency for inauspicious consequence. This policy ‘s acceptableness might be of concern, as there will be resistance from spiritual leaders and other involvement groups. This policy besides has other societal and wellness benefits, as the usage of rubbers will besides cut down other STIs, cut down unwanted gestations and the complications from illegal abortions, thereby cut downing maternal mortality. Previous work in Nigeria has shown that equal instruction works in HIV bar and this is soon being used to advance abstention and be faithful intercession plans. Kingdom ‘s Model proposes that there are 3 watercourses of policy procedure and they need to cross for policies to be considered. ( Kent Buse, 2005 ) Problem watercourse: High prevalence of HIV among in school young person, with the highest signifier of transmittal being heterosexual sex Politicss watercourse: The National HIV bar work program promotes condom scheduling and there have been ongoing arguments around this issue. In 2000, sex instruction was integrated into National course of study but was ne’er implemented. Meanwhile the prevalence amongst in school young person since so has increased. Policy watercourse: Following the 2005 National HIV/Syphilis Sero prevalence lookout study for pregnant adult females go toing Ante-natal clinics in Nigeria. NACA has mounted more response to HIV bar. More support for HIV bar is being provided by bilateral organisations and NACA has become unfastened to execution of policies through FBOs and CSOs. Interventions are now being chosen and funded based on scientific grounds research. POLICY FORMULATION AND IMPLEMENTATION Legislators are influenced by media and runs, cultural beliefs, lobbyists, political parts and support every bit good as grounds based research. It is hence of import to guarantee they have adequate information from researches, prevalence of HIV and alternate solutions. The function of the media and other organisations can non be over emphatic. This policy proposes the debut of structured sex instruction with condom publicity in secondary schools across Nigeria It aims to cut down the prevalence of HIV/AIDS among in-school young persons Aims To better the cognition about HIV/AIDS amongst young person To raise the age of first sexual brush amongst in-school young person by 5 old ages in 10 old ages To promote rubber usage among in-school young person To increase the figure of in school young person seeking intervention and attention for other STIs by 20 % in 5 old ages To cut down teenage gestations by half in 5 old ages Resistance to this policy ‘s credence could be limited by ab initio influencing policy alteration in southern urban parts where it will be more acceptable and if successful, scaled up to other less urban countries utilizing traditional and spiritual leaders to act upon credence. A broad web and model of HIV/AIDS bar is soon on land in Nigeria, a assorted scanning attack will be ideal. A rational attack for explicating policies and go throughing the measure, which will be instantly diffused through the Ministry of Health to all schools An incremental attack by ab initio increasing the cognition of in-school young person on HIV/AIDS by presenting sex instruction into the school course of study, presenting text editions and stuffs that educate pupils on HIV/AIDS and subsequently up-scaling to include RH clinics to turn to early intervention and bar of STIs. Formation of in-school HIV nines and groups will supply a forum for pupils to aerate their positions on abstention, sexual exposure and bar patterns and eventually condom handiness and distribution. Cost will be reduced by utilizing bing resources and adult male power. Increased cognition of HIV/AIDS in the population with capacity edifice for instructors and in school young person will let for easy execution. A elaborate and careful pilot testing could be done in the relevant mark group to let for appropriate rating and alteration before broad spread execution. A underside up attack should besides be used to let for more engagement by implementers and uninterrupted rating and redefining of aims or schemes. Evaluation HIV bar intercessions are complex. There are legion intercessions and schemes to take from. The content and quality of intercessions may differ well from one another and intercessions may be implemented in different ways by different people. Specific intercessions may be interactive or even counter and yet most programmes will unite several intercession schemes, doing rating of the effects of specific intercessions or constituents within the programme bundle hard or impossible to extricate. ( UNAIDS, 2008 ) In measuring the effectivity of the policy, elaborate grounds on the existent procedure of bringing of the intercession that establishes the extent and quality of bringing will be gathered. Facility audit is besides of import to supply information on adequateness of substructure, equipment, proficient and operational guidelines. The success of the policy execution will besides be evaluated utilizing the five key United Nations General Assembly Special Session ( UNGASS ) ends. ( WHO Technical study series, 2006 ) Provide appropriate information to immature people and grounds of betterments in their resulting cognition Provide appropriate accomplishments developing to immature people and grounds of their ability to show these accomplishments, and utilize these accomplishments to diminish their hazard of going infected Supply appropriate skills-based preparation, equipment and supplies to implementers and grounds of this ensuing in increased bringing of effectual, high quality wellness services to immature people. Provide grounds of reduced exposure of HIV among immature people, such as alterations in the attitudes and behaviors of immature people Provide grounds of a decrease in HIV prevalence among immature people that can be attributed to the intercession Donabedian ‘s model for measuring health care conceptualizes â€Å" Inputs, Process and Outcome † . ( Kent Buse et Al, 2005 ) Table 2: Policy Implementation and Evaluation Undertaking IMPLEMENTATION Undertaking EVALUATION INPUT/RESOURCES ACTIVITIES/INTERVENTION SERVICE End product OUTCOME/IMPACT MEASUREMENT METHOD/INDICATORS Staff Monitoring and rating preparation for plan directors and implementers Training of school nurses and instructors Training of spouses and stakeholders on young person and HIV Media preparation on Sexual activity instruction and Condom publicity Capacity edifice for implementers Change in supplier behavior in relation to school young person Change in supplier behavior in relation to describing systems Improvement in administrative and describing systems Experimental surveies Number of instructors and school nurses trained in supplying sexual instruction and wellness services to school young person Number of stakeholders trained on HIV and the young person Quality appraisal of describing systems Media support Awareness creative activity for rubber publicity to interrupt barriers Commission and air jangles on the impact of sex instruction on school young person. Media run aiming socio cultural issues disaggregated by age, sex and location. Media run on inter-generational sex Harmonization of stuff development, distribution and usage Increase consciousness on sex instruction and rubber rebranding Sexual activity instruction and sex literacy as a societal norm Condom usage as a societal norm Behavioural surveillance study Condom handiness and handiness Stigmatization around sex instruction and rubber usage Number of jangles aired on sex instruction and rubber usage among school young person Education Production and distribution of IEC Materials Production of text editions integrated with cognition of STI and HIV Development and version of course of study on sex instruction Sexual instruction Sessionss in schools Condom dialogue accomplishments developing for school young person Improve school young persons consciousness on HIV/AIDS Improve rubber negociating accomplishments among school young person Improve rubber usage among school young person Reduce STI incidence Reduce HIV morbidity and mortality Reduce teenage gestations and it ‘s complications Reduce maternal mortality associated with teenage gestations Annual National HI/AIDS sero-prevalence lookouts study among in school young person Prevalence of STI and HIV among school young person Number of teenage gestations and maternal deceases related to them No of rubber distributed No of school young person who used rubbers in their last sexual brush Facilities Handiness of friendly accessible service Centres for school young person within and outside the school Build effectual linkage/referral systems for STI direction in communities Establish regional offices through the Ministry of Education to supervise disposal and M A ; E Increase entree to RH services Promote dealingss among assorted organisations involved Allow easy monitoring and rating of execution School young person will be able to entree RH services without stigmatisation Provide utile information on execution procedure and success Behavioural surveillance study No of young person accessing RH services before and after intercession No of RH services available to youth No of young person referred through linkage systems Research Population based study on Sexual activity instruction, rubber usage and publicity in school young person Increase cognition base on sex instruction and rubber scheduling Increase cognition on the young person ‘s sexual hazard behavior Making future sex instruction programming policies based on grounds based scientific research Experimental surveies Number of research proposals and surveies carried out on sex instruction, hazard behaviors, rubber scheduling and usage among school young person Community Mobilization Battle of FBOs, CSOs, community and spiritual groups and parents on HIV/AIDS cognition Skills and services community mobilisation for HIV Sensitization of community leaders against stigmatising or opposing sexual instruction among school young person Increase consciousness of FBOs, NGOs and parents on HIV and the young person Promote rubbers as a double method Rebrand rubber usage as a positive thing Engagement of policy execution at grass root degree Improve community consciousness and integrity in the battle against HIV/AIDS Enable societal and cultural credence about sex instruction Constitution of young person groups Experimental surveies Number of young person groups on HIV/AIDS advancing sex literacy and rubber usage Number of community stakeholders involved in young person groups Number of outreach events advancing sex instruction Advocacy/policy Recommending for policy reforms on socio-cultural and economic issues that promote HIV transmittal, stigma and favoritism among young person Increase consciousness of stakeholders on HIV and young person HIV and youth issues get on the policy docket Laws on HIV and young person, stigma and favoritism enacted Experimental surveies Nature and type of issues incorporated into the National Youth policy No of public hearings on the bill of exchange measure and Young person policy Decision The immature can non talk for themselves in doing lawful determinations that impact their ain lives. Their determinations are influenced by parents, the community, equal force per unit area, and their personal cognition. It is hence of import that the cognition they have is sufficient and diverse to enable them do informed determinations refering their sexual wellness. Surveies done have shown adequate grounds that sexual instruction addition in-school young person ‘s consciousness of HIV/AIDS and can act upon their attitude or do behaviour alteration. Health system research findings in the Nigeria will stay impotent unless translated into public wellness action through effectual public policy-making. ( Shamsuzzoha B Syed et al.,2008 ) Policy docket scene, preparation, execution and rating are all necessary phases in achieving policy alteration. In world, they all happen at the same time and can be revisited and changed while the procedure is ongoing. Stakeholder ‘s influence is really important in policy devising and acceptance. The media is a really powerful tool which should be used suitably. Policy execution should be done carefully without rigidness utilizing bottom up attacks. Evaluation is necessary in order to mensurate the success of the plan and larn more for future policy executions. Reducing HIV/AIDS prevalence amongst in-school young person goes a long manner in cut downing prevalence in the general population and promises a healthier brighter hereafter, free from HIV/AIDS. How to cite Hiv Prevention Strategy In Nigeria Health And Social Care Essay, Essay examples

Thursday, December 5, 2019

Security Incidents and Hackb Case

Questions: 1.What Was the Problem? 2.How and Why It Occurred? Answers: Security Incidents In the present-day information age, the rules of value have changed and moved from the physical to the intangible. In today's inter-connected and always online world, data is the most important thing any organisation can own (Singh, 2015). Data not only serves as a fertile ground to be tilled for competitive advantage, but some data also come with the responsibility of protecting it. For example, if a company handles credit card details of its users, it is the company's responsibility to ensure the protection of such data, both from outsiders and insiders. It follows that data should be the thing that is stolen most often. Indeed, criminals are now after the data of an organisation. Various attackers like novice and skilled programmers, organised crime groups, activists, terrorists, and governments are interested in compromising an organisation for their goals. The world of information security is wide, and there are many nuances to the methods in which information may be compromised . This report looks into two real-life examples of information security incident. The first portion of the report discusses a breach, while the second one discusses an attack. Breach A breach is an inadvertent exposure of confidential information ("Security Breach", n.d.). In a breach, the parties acting to expose the information are insiders of an organisation. However, there is no malicious intent. Still, any data which is once made public can never recover its private status. This report will discuss a breach which happened from September to December 2015. The public data was searched, and one incident was selected for the purpose of this report. Any decent sized business will have access to personal details of many users. Even if the number of users does not run into millions (as we will see the later portion of this report), thousands of users may have given their personal data to the company. Web sites often request details like full name, phone number, postal address, and email address. The companies want to promote their business, and emails are much cheaper and quicker than postal mail. Thus, every company prefers to send electronic newsletters via email. Beyond a small number of recipients, it is often efficient to use software for the purpose of sending mass emails. The software can take care of sending the emails, handling unsubscribe requests, and work error-free. Now, this software can be developed in-house or bought off-the-shelf and then hosted on company's infrastructure, or subscribed to a third-party using Software as a Service (SaaS). The breach which is being discussed in this report concerns retailer WHSmith (England, 2015). WHSmith specialises in selling books, stationery, magazines, newspapers and entertainment products. Like any business worth its salt, it too has a Contact Us page, which understandably asks for personal details and email address also. On 2nd September 2015, the systems of WHSmith began emailing the contents of the Contact Us page to the entire mailing list of the company (Temperton, 2015). 1. Users have faith in the companies with which they are interacting. An online platform for a company with which a person interacts in the offline world also is often trustworthy. What happened in the case study being discussed, is that instead of routing the contents of the Contact Us page to the company officials, it was being routed instantly to the entire mailing list of the enterprise. The Contact Us form had fields for personal information. Now, the problem was that the form had been by the user under the impression that it will be visible to the eyes of the company officials only. Thus, the user's wording and tone of language may have been biased by that. Secondly, in addition to the message, the personal contact details were broadcast to all the subscribers. Not only was this a breach of privileged information, but also annoying. Twitter was lit up with the discussions of this data breach with a hashtag created to tag the tweets- #whsmithfail (Day, 2015) . 2. WHSmith contracts its email services to a third-party company I-subscribe. The company provides forms which are then embedded into the web pages. The data submitted via the form goes to I-subscribe, which then handles it on behalf of their customer, in this case, WHSmith. What was happening was that the software code at I-subscribe responsible for routing the email messages had a bug, which wrongly routed the Contact Us form submissions. To be clear, a software bug is the mistake of the developer or the company creating the software. As soon as WHSmith was made aware of the issue, they contacted their contractor I-subscribe, and the latter took down the form and started working on fixing the bug. The exact details of why the software bug was present and what conditions triggered it are neither in public domain (as their software is proprietary) nor relevant to the discussion at hand. We know that a software bug caused this data breach. Possible Solutions for Preventing the Breach in Future As far as the retailer WHSmith is concerned, the authors of this paper find it clean. They, after all, hired another company to manage its subscription and forms services, and the contracted company, I-subscribe business function is managing email subscriptions. Thus, we have suggestions for both the client as well as the contractor. The client should get a written Service Level Agreement (SLA) and responsibility in case of a data breach. The contractor should test their software before using it on production servers with live client data. Hack A hack is deliberate attempt to compromise a computer system ("hack", n.d.), and is characterised by malicious intent. The acting parties in a hack are outsiders. The goals of attackers in a hacking attack range from entertainment to undermining the interests of an enemy or nation or opposition organisation (Spivak, 2012). Thus, hacking is performed not only by criminals, programmers, and activists but also nation states using Internet and information systems as a new platform of war against enemy nations. For this report, public information on hacks between 2012 to 2016 was researched, and one was chosen for elaboration. Social networking on the World Wide Web (WWW) is a big business (Tran, 2016). The attack being discussed in this report is a professional social networking site - LinkedIn. LinkedIn is a network where anyone with an email address can join, create his public facing rsum, become friends with other profiles on the site. Additional tools include sending private messages, posting articles using LinkedIn's publishing tools, and other standard facilities which users have come to expect from any social networking site. LinkedIn is a big company, and users who join this site expect their privacy and the data to be protected. In 2012, attackers invaded LinkedIn's systems and stole login credentials (email and password) about 6.5 million users (Schroeder, 2012). Problem Users trust public companies like LinkedIn with their data. Email addresses of active users is a prize in the email spam business, and leaked databases are one of the best sources (Hoffman, 2014). Also, most business owners would like to pry on the online activities of their employees (Ballman, 2013) (Gee, 2017). Thus, professional networking and job search sites have an extra responsibility to keep the data of their users secure. As an illustration, policies of some companies may forbid employees from looking for a new job till they are working in that company. Such a user may begin his search in a private mode. The attack which is being discussed in this report was done by criminals for financial gains (Association, 2016). However, the possibility has been proven that such data is not secure. The problem is that some people were able to overrun all the security procedures of LinkedIn and get away with private data. Later on, in 2016, it turned out that the 2012 revelation was tip o f the iceberg. Within the same attack about 100 million users' details were stolen (Association, 2016), thus raising the total count to about 117 million users (Griffin, 2016). Affected by the Hack and How In this attack, users of LinkedIn who were in the pool of the around 6.5 million database records stolen were affected. The data stolen was put on sale in the black market on the Internet (Rogers, 2016). Now, the aftermath of the attack could have left the millions of users exposed, not only by the criminals but potentially also by prying employers. Nothing would have been off the table since the data was out on the Internet. However, in a professional handling of the incident, LinkedIn came forward and publicly accepted the attack (Silveira, 2012), provided live updates on the Twitter feed, published best-practices articles. Most importantly, LinkedIn promptly deactivated the passwords of all the users whose data was stolen. Follow-up emails were sent to the affected users alerting and advising them on next steps. The act of deactivating the passwords was a prudent one. It significantly reduced the value of the loot for the criminals. They still have access to emails of the people, but still, they cannot access the LinkedIn accounts per se. Some industry experts believe that the haul of the valid email addresses of working professionals may be grabbed by the spam industry (Rogers, 2016). They believe so since the price of the data set is relatively lower. In any case, successful sale of such data will only encourage the attackers to carry on their activities (Zilberman, 2017) (Westervelt, 2014). Attack Carried Out The details of this attack are incomplete. The true picture has not emerged more so since two nations - America and Russia - are in a tug-of-war about the alleged hacker. Still, the public records indicate that the hacker sends a malware to a company employee's computer. Later on, that malware was used to crawl the network and gain deeper access to LinkedIn's systems and finally to the database (RadioLiberty, 2016). Showing responsibility, LinkedIn reset the passwords for the 100 million newly surfaced accounts as soon as it got this new information (Reuters, 2016). Measures Which Can Prevent Such Attacks From what information is available, it appears that the launching pad for this attack was malware. How the hacker was able to install the malware on a computer of the company is not known. It could be a deceptive email, some random website which a LinkedIn employee visited, or any other of the many ways possible to infect any computer connected to the Internet. Also, that malware had the capability to bypass internal security checkpoints, as well send data back to the hacker. Considering these points, it is recommended that stricter rules be put in place to kill any malware suspected incoming data. This malware could be via email, infected web page, or even a flash drive (also known as a pen drive or USB drive). Also, no outside storage media should be allowed in the office premises. Also, firewalls should be updated so as to track outgoing data also. A review of the internal security of an organisation's network is recommended so that any malware is identified. Intrusion Detection S ystem (IDS) and anomaly detection techniques may be helpful in this regard. Conclusion This report looked into publicly available data on breaches and hacks. A data breach concerning the heads of states, and an attack stealing the email addresses and passwords of a popular social networking site were discussed. While the data breach was a case of human error and negligence, the attack was an example of fine programming skill put to illegal use. For both the case studies, the report explored the problem, the affected parties, ways by which the incident happened, and recommendations for preventing such incidents in future. References Association, P. (2016). Hacker advertises details of 117 million LinkedIn users on darknet. The Guardian. Retrieved 1 April 2017, from https://www.theguardian.com/technology/2016/may/18/hacker-advertises-details-of-117-million-linkedin-users-on-darknet Ballman, D. (2013). 10 New (And Legal) Ways Your Employer Is Spying On You. AOL.com. Retrieved 1 April 2017, from https://www.aol.com/article/2013/09/29/new-ways-employer-spy/20699464/ Council, B. (2016). Brisbane's 2014 G20 Leaders' Summit | Brisbane City Council. Brisbane.qld.gov.au. Retrieved 31 March 2017, from https://www.brisbane.qld.gov.au/about-council/governance-strategy/economic-development/brisbanes-2014-g20-leaders-summit Farrell, P. (2015). Personal details of world leaders accidentally revealed by G20 organisers. The Guardian. Retrieved 31 March 2017, from https://www.theguardian.com/world/2015/mar/30/personal-details-of-world-leaders-accidentally-revealed-by-g20-organisers Gee, K. (2017). The Not-So-Creepy Reason More Bosses Are Tracking Employees. WSJ. Retrieved 1 April 2017, from https://www.wsj.com/articles/the-not-so-creepy-reason-more-bosses-are-tracking-employees-1490101200 Griffin, A. (2016). Hacker advertises details of 117 million LinkedIn users on darknet. The Guardian. Retrieved 1 April 2017, from https://www.theguardian.com/technology/2016/may/18/hacker-advertises-details-of-117-million-linkedin-users-on-darknet hack. Dictionary.com. Retrieved from https://www.dictionary.com/browse/hack Hoffman, C. (2014). How Do Spammers Get Your Email Address?. Howtogeek.com. Retrieved 1 April 2017, from https://www.howtogeek.com/180477/htg-explains-how-do-spammers-get-your-email-address/ Day, K. (2015). Ke Day on Twitter. Twitter.com. Retrieved 1 April 2017, from https://twitter.com/KenDay/status/638999331350151168?ref_src=twsrc%5Etfwref_url=http%3A%2F%2Fwww.businessinsider.com%2Fwhsmith-customer-emails-data-privacy-2015-9 England, L. (2015). People are freaking out because WHSmith is accidentally emailing customer contact details to other customers. Business Insider. Retrieved 1 April 2017, from https://www.businessinsider.in/People-are-freaking-out-because-WHSmith-is-accidentally-emailing-customer-contact-details-to-other-customers/articleshow/48772997.cms RadioLiberty, R. (2016). U.S. Charges Russian Hacker With Stealing LinkedIn Data. RadioFreeEurope/RadioLiberty. Retrieved 1 April 2017, from https://www.rferl.org/a/us-charges-russian-hacker-nikulin-stealing-date-linkedin-san-francisco-dropbox-formspring-/28068596.html Reuters, T. (2016). LinkedIn to wipe out passwords for 100 million hacked accounts - Business Insurance. Business Insurance. Retrieved 1 April 2017, from https://www.businessinsurance.com/article/20160518/NEWS06/160519773/LinkedIn-data-breach-hack-2012-100-million-accounts-passwords Rogers, J. (2016). Hacker looks to sell 117M LinkedIn passwords from 2012 data breach. Fox News. Retrieved 1 April 2017, from https://www.foxnews.com/tech/2016/05/19/hacker-looks-to-sell-117m-linkedin-passwords-from-2012-data-breach.html Schroeder, S. (2012). 6.5 Million Encrypted LinkedIn Passwords Leaked Online [REPORT]. Mashable. Retrieved 1 April 2017, from https://mashable.com/2012/06/06/6-5-million-linkedin-passwords/#0qSP.pTP0GqT Security Breach. Techopedia. Retrieved from https://www.techopedia.com/definition/29060/security-breach Silveira, V. (2012). An Update on LinkedIn Member Passwords Compromised. Blog.linkedin.com. Retrieved 1 April 2017, from https://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised Singh, A. (2015). Is Big Data the New Black Gold?. WIRED. Retrieved 31 March 2017, from https://www.wired.com/insights/2013/02/is-big-data-the-new-black-gold/ Spivak, W. (2012). Hacking (1st ed., p. 13). Lulu.com. Temperton, J. (2015). WHSmith data breach spams confidential customer details. WIRED UK. Retrieved 1 April 2017, from https://www.wired.co.uk/article/whsmith-data-breach-customer-emails Tran, T. (2016). What is the valuation of a social network company?. Quora. Retrieved 1 April 2017, from https://www.quora.com/What-is-the-valuation-of-a-social-network-company/answer/Tony-Tran-75 Westervelt, R. (2014). What Is That Stolen Data Worth? 11 Most Lucrative Hacking Targets, Services. CRN. Retrieved 1 April 2017, from https://www.crn.com/slide-shows/security/300075162/what-is-that-stolen-data-worth-11-most-lucrative-hacking-targets-services.htm Zilberman, B. (2017). How Lucrative is Confidential Data? Prime Bounty for Hackers, Top Concern for Businesses. Radware Blog. Retrieved 1 April 2017, from https://blog.radware.com/security/2017/01/lucrative-confidential-data/