Thursday, October 31, 2019
Convince school to take specific measurements to improve students Essay
Convince school to take specific measurements to improve students health and fitness - Essay Example The school also needs to watch out for the impacts that the programs has on the students. If the student do not take to the program implemented, they are likely not to participate hence the inevitable failure of the program. Nutrition and physical fitness is important for students because it offers many great benefits such as improved self esteem and confidence, improved performance in class and a general improvement in the physical health of the students (Jackson 56). If the students are in good shape, it reflects in their general self esteem. For teenagers, what others think is more important to them that what they think about themselves. Kids can be cruel in high school as is well known by all. They are bound to make fun of a fellow kid if they were seen as unhealthy and unfit. If the students are physically fit, it instills some form of confidence in them and makes them feel like they are actually worthy. This is a decision made based on their mastery of skills and the aspects of the physical programs. This in turn makes the student more aggressive, have more self-control, be more independent and have more confidence. In addition, physical fitness among the students will reflect in other areas of the curriculum. The students are bound to perform better in class and this benefit them and the school as well. Every management wants the society to see them succeeding and therefore, good student performance reflects well on the managements performance (Jackson, 43). Physical exercise has always been known to be a way through which one can relieve stress. Engaging in physical exercise does not only improve the physical health of the students, but also can be a way for the children to rid themselves of any form of tension and anxiety that they may be experiencing. Consequently, this will improve the studentââ¬â¢s emotional stability and resilience. The programs set up for improved physical health can be an
Tuesday, October 29, 2019
Sports minded individuals Essay Example for Free
Sports minded individuals Essay High school days are usually regarded as the most memorable moment in a studentââ¬â¢s life. For the conscientious group, it is a preparation for college life and a time to ponder on oneââ¬â¢s interest and career choice. For the less serious and happy-go-lucky young students, it is a time to establish close friendship and romantic relationship. For the sports minded individuals, it is a time to gear up and grab the attention of various college and university officials who may hand them their athletic scholarships. Regardless of whether students are deemed hard-working, lazy, diligent, or carefree, there is a special event in their life that will remain unforgettable ââ¬â the prom night. The summer of 2005 was not only spent swimming and sunbathing in the beach with my family and friends. I took advantage of the school break to scout for a reasonably priced and elegant prom gown. I spent many hours browsing the web for a suitable gown as I was undecided on whether to settle for a halter, strapless, off-shoulder, or V-neck gown. There were many times when I attempted to design my own evening wear but ended up tearing the paper and throwing them in the garbage can. I never realized that preparing for the prom was so difficult for a young high school lady. It was not only the gown that females need to prepare. The matching shoes and bag, earrings and necklace, hairstyle and make-up must also be an important part of our wardrobe. ââ¬Å"Ahhhâ⬠¦. I wish that I am a male and all I need to wear is a tux, a white shirt, ribbon, black shoes and socks. No need to wear any make-up and jewelry. All that is needed is a good haircut and a well-shaved faceâ⬠, I told myself while dropping to the bed when I reached a point of desperation in finding the right attire for me. Two weeks of my summer break was spent on learning how to do my own facial make-over. I had to call my friend, Gale to help me out as she was the most glamorous looking person in class. Gale never left home without fixing her hair and applying make-up. ââ¬Å"Owwâ⬠¦that hurts! â⬠I yelled as Gale plucked a fine hair in my eyebrow using a pair of tweezers. ââ¬Å"Hahahaâ⬠¦Donââ¬â¢t be a sissy, Faye! â⬠Gale uttered as she giggled at my reaction. ââ¬Å"Canââ¬â¢t you just use a thread instead? â⬠I asked as I vigorously massaged my eyebrow. ââ¬Å"Iââ¬â¢m not a beauty expert silly. It will only take a while and your virgin eyebrow will get used to thisâ⬠, Gale said as she continued to pluck more strands of hair from my eyebrow. ââ¬Å"Owwâ⬠¦Gale! â⬠I yelled again and massaged my eyebrow that has turned pinkish due to skin irritation and pain. Gale did not give up on me and she learned to ignore my deafening shout of pain. I am glad that my parents and younger brother were not at home at that time. I could imagine how much my brother would make fun of me and would mimic every action and words that I uttered. Towards the end of the eyebrow plucking session, I felt the cold sweat on my body and the discomfort in my tummy. When I felt the need to run to the restroom, I stood up but it was too late to control the unexpected. ââ¬Å"Pooootttâ⬠¦. pooottttâ⬠, the sound of my fart strikes the air. ââ¬Å"Yucckkkâ⬠¦. Faye! That was gross! â⬠Gale yelled as she covered her nose and walk towards to the window. ââ¬Å"Sorry Gale! â⬠I responded as my face turned pale. To blow the foul odor away, I grabbed a towel and wave it vigorously against the air. Just when I was about to wipe my sweat, Gale noticed something on my chair. ââ¬Å"Fayeâ⬠¦. whatââ¬â¢s this on your chair? â⬠she asked while looking closely at the chair I sat on. ââ¬Å"Goshâ⬠¦you peed on your chair! â⬠she uttered in disbelief as her blue eyes widened. Suddenly, I looked at her, gazed at the chair, touched the front and back side of my shorts and realized that I must have peed while Gale was plucking my eyebrow. While Gale was giggling, I quickly ran to the bathroom to change my shorts and underwear. It was an embarrassing experience for me considering that this was the only time Gale witnessed someone lose control of her bladder as a result of an eyebrow make-over. When I returned to my room, my chair was already clean and dry. Gale cleaned the mess that I created and I felt that I wanted to hide my face under my pillows and bed covers. Sensing my uneasiness and shame due to my silence, Gale tried to divert my attention by discussing the things that I must prepare for the prom. She also gave me tips on how to choose the right gown for my physique and how to fix my hair for the evening occasion. In spite of the humiliating incident, Gale continued to drop by our home to prepare me for the event. There was also a time when we listened to some popular songs and music that may be played during our prom. Then, we pretended to be the King and Queen of the night and we danced to the music of our favorite love song while we were singing together. Before the end of our summer vacation, I was able to apply my make-up and fix my hair with ease. It took some time before I was able to pluck and shape my eyebrow independently. There were many times when I asked Gale to help me and in every session I became wary of my bladder. I learned to take a break each time I find it difficult to tolerate the pain. The prom was indeed a memorable event in my life. Everyone was impressed with the changes in my appearance when they saw me dressed in halter gown, wearing a 3-inch high heeled pair of shoes, a make-up and an attractive hairdo. Gale became the prom queen and I became the girlfriend of the prom king a month after he unintentionally stepped on the hem of my gown that led me to lose my balance on the dance floor and bumped on the waiter who was serving drinks. Well, that was another embarrassing moment. Gale became my best friend and from time to time we both laugh as we recall the summer of our pre-prom preparation days.
Sunday, October 27, 2019
Potential Bottlenecks in Implementing MCTS in Odisha.
Potential Bottlenecks in Implementing MCTS in Odisha. Introduction Mother and child tracking system (MCTS) is the online software used by the National Health Mission (NHM), formerly National Rural Health Mission (NRHM), for tele-monitoring Reproductive and Child Health (RCH) services delivered by the Government of India(1). It is an innovation of Health and Family Welfare (HFW) department supported by the National Health Mission(2). This software was conceived way back in 2008 to increase the coverage of RCH services. Left out and drop out beneficiaries for various services, including immunization, can be tracked name wise using this system. Using this software, beneficiary wise and even health unit wise relevant information can be retrieved from any location by any health or associated authority by logging on to the system using the username and password provided to him/her(3). It can greatly reduce the death rates of infant and mother and even reduce total fertility rates through an attempt to provide universal coverage of services. The origin of the concept is linked to the tracking of ââ¬Ëdueââ¬â¢ beneficiaries in immunization sessions using the tracking bag(4) at the sub-center. The tracking bag consists of 14 pockets, of which 12 are meant for 12 months in the year and two more meant for children with complete and incomplete immunization status respectively. Due beneficiaries for a particular month are tracked using counterfoils which would be kept in the pockets for the particular month. MCTS utilizes two formats for capturing data for new beneficiariesââ¬â Format I and Format II. The former one is meant for mothers and the latter is for children born of these mothers. Once a woman is detected to be pregnant, she is registered with the health system in the MCTS register so as to receive all the free health services and details are captured in the format I. The data are then sent every week, via the supervisors to the block level, for online data entry into the MCTS. The same is also done for all newborn babies using format II. Services received by the beneficiaries are supposed to be maintained in the Mother and Child Protection (MCP) card provided to the beneficiaries. Subsequently, every week sub-center wise work plan is generated from the MCTS and distributed through the supervisors to the sub-center Auxiliary Nurse Mid-Wife (ANM), for providing the services, updating the services received and tracking the beneficiaries who could not avail the services. Work plans are generated for various kinds of services like registration of pregnant woman, antenatal care services, delivery services, post-natal care services for mother and neonatal child, child health services including immunization, family planning services, etc(2). In short the system perfectly tries to track the left out and drop out case wise, and ensure universal delivery of services(2)(5). Presently MCTS is used throughout the state and lots of human resources have been deployed by NHM at block and district levels to enter, analyze and track the data for the mother and child services. As compared to the proportionate increase in the human resources and other investments, the service coverage has not increased substantially (for example immunization coverage). Even certain studies on mechanisms for tracking immunization in developing countries show similar results(6). There has been disparity during data validation exercises using health indicators from sources like Health Management and Information System (HMIS)(7) and MCTS. Even no assessment has been undertaken to review the bottlenecks of MCTS. Hence a study was planned to identify and provide suggestions for correcting the bottlenecks in the implementation of mother and child tracking services in the state of Odisha, if any existed. Objectives of the study To understand the process of implementation of Mother and Child Tracking Sytem in Odisha and identify the bottlenecks in the implementation process, if any. To identify feasible solutions and suggest recommendations for the identified bottlenecks. Method of study The study was qualitative in nature. It was conducted in three UNICEF supported districts (all tribal predominant) of Odisha state (having 30 districts) from August 2013 to November 2013. In-depth interview (IDI) was the key tool for data collection. Key program implementers involved in the process were listed down along with their assumed roles and responsibilities (Table 1). Judgmental sampling method(8) was then used and IDI was done with identified key informants involved in the implementation of MCTS (block and district level managers and supervisors). A total of 15-24 in-depth interviews (IDI) were planned for the study (regarded as the stage of thematic and theoretical saturation)(8). The end point planned was the point when no new qualitative information was received(9). Three blocks each of these districts were randomly selected and key informants were identified for IDIs. Consent was taken from the interviewers using WHOââ¬â¢s informed consent form for qualitative studies(10). Personal interviews were performed with a pre-determined and pre-tested tool with more often than not open ended and few close ended questions/ probes (Box 1). Along with that satisfaction level of the implementers was recorded using a continuous scale(11). Practically feasible solutions and suggestions as recommended by the informants were also noted along with bottlenecks. Data collection, cleaning and analysis was done simultaneously. Recorded data were transcribed independently by two researchers onto paper, translated to English and then manually analyzed. The qualitative content analysis method was employed(12)(13)(14) for analysis. Nine major heads were identified for the purpose- human resource issue, data generation issue, issues with skill, data entry issues, cov ering events, software issues, supervision, review and financial topics. All other findings were put under a tenth head. After data analysis, brainstorming sessions were carried with the RCH team of UNICEF Field office to put forth other recommendations for the issues noted. Results A total of 20 interviews were conducted in the study with six to seven interviews on an average from each district. Time for the interviews ranged from minimum of 25 minutes to a maximum of 40 minutes. Block level data managers and block program managers in charge of MCTS in the block were identified as the key informants at the block level. Lady health visitors (LHVs) and Health Supervisor (HS (M)) were likewise included in the process. Interviews were also conducted with District Data Managers (DDM) who was the supervisor of BDMs at the district level. Interviews with the stakeholders revealed that there has been a lot of improvement in certain service delivery components. Some of these include availability of a definite work plan (also called due list) for the ANM and Accredited Social Health Activist (ASHA) every week, validation of HMIS data, entering data and assessing reports from any place using provided username and password, validation of incentives provided to beneficiaries and to ASHA for various activities, improvement in service delivery for various national health programs, etc. ââ¬Å"We are able to review the sectors based upon the MCTS data.â⬠[LHV] ââ¬Å"Now, the health workers have realized the benefits and use of MCTS and are frequently asking for clarifications, when requiredâ⬠. [BPM] It was observed that the work plan and reports passed through all the stakeholders of MCTS, including the supervisors. But the involvement in terms of understanding of the process and providing mentoring support was poor, as cited by a few. The reports were collected at the end of the HWF, who would submit reports to their sector level supervisors. Details of the flow mechanism of reports are shown in Fig. 1. On an average satisfaction level regarding implementation of MCTS among block and district level stakeholders was found to be 7 out of 10 (range 4 to 9). Lack in the perfection of the implementation were many, some of which were analyzed and placed in Table 2. It was also noted that a BDM had to devote a great proportion of his time for data entry thus disturbing the equilibrium between personal and professional life. This was set up especially for those located in big blocks and universally for everyone roughly on an average 15 days (last week of a month and first week of the following month), at the time of report collection and entry. Verbatim of some of the important issues found during the interview are listed down under. ââ¬Å"Health workers collect their work plans on their own or in some indefinite process. But the collection of updated work plans from the workers is being done in sector meetings.â⬠[LHV] ââ¬Å"We are facing problem in covering the beneficiaries in outreach areas due to seasonal and migration issues.â⬠[LHV] ââ¬Å"The software needs to be improved.â⬠[BPM] ââ¬Å"HMIS software is better than MCTS with respect to report generation and review monitoring. The MCTS software is much slower than HMIS and needs high speed internet connectivity.â⬠[BPM] ââ¬Å"Due to network connectivity issues, we often ask the BDMs to come to the district NRHM Office and do the data entry here.â⬠[DDM] Discussion and Recommendations Tracking down beneficiaries to increase the coverage of services can definitely reduce the number of miss outs and drop outs for any services catered, and with stringent implementation as planned can definitely improve service delivery. Moreover the planning component of some of the health programs can be addressed in the process. But it was found that issues invariably did exist at all levels and all components of this naà ¯ve model. A single register needs to be maintained integrating components of mother register and child register, which will reduce the workload of the health workers. The simple availability of logistics like paper and cartridge for printing can be some of the minor issues, which if addressed can bring out successful results. Similarly, engaging the data entry operators in the tasks they are meant for can provide quality inputs to the tracking system, not only in terms of improving the data quality, but also an effective plan generation, follow up and tracking of miss out and drop out cases and health review. It will provide a working environment and boost the motivation of these DEOs. Review of MCTS entry, analysis and tracking of follow up of instances should be done block wise with team effort rather than having any single individual accountable. Supervisors should take on an important part in offering mentoring support for tracking, record keeping and updating. An effective model of intern al monitoring and/or mentoring system for underperforming sub-centers in MCTS implementation (eg. Using Lot Quality Assurance Sampling Method) is needed. Own server can be set up at the state to solve server speed issues. More data entry staff at the block level is needed so as to reduce data entry load in large blocks with huge data load. More number of ANMs or support in the form of additional ANMs is needed in sub-centers with more population. This solution has also been cited in other studies of the same author(15). Data Entry Operators (DEOs) for Rashtriya Swasthya Bima Yojana (RSBY)(16) can be engaged in data entry activities wherever the data entry load is high. A proper operational research can throw light on the mechanism to identify blocks needing more human resources along with other financial support. All services provided and recorded in MCP card should be fed into MCTS to make effective tracking possible. Customization of the software for integrating and validating data of other related programs like Home Based Newborn Care(17), Special Newborn Care Unit(18)(19), etc. can also be done. Adequate contingency provision in the NHM PIP should be made. Collaborating with mobile partners to develop SMS based portal for reporting details of a beneficiary can be done and this can also provide real time reporting. Similarly loading the data in a Geographic Information System (GIS) based maps can be used increase tracking mechanism one step further(20). Extra incentives for each additional work put to the BDMs, may be provided. Training pharmacists in ODMIS(21) can decrease the workload on BDM at the block level. Conclusion Mother and child tracking system is an innovative method of tracking down the beneficiaries name wise, with an objective to bring down the IMR, MMR and TFR. It can help the government to achieve universal coverage of services. Presently MCTS has helped the service providers to effectively manage miss outs and drop outs for various services like immunization, family planning, maternal and new-born care. Validation of HMIS and incentives (to beneficiaries and ASHA) is also being done using MCTS. In spite of all positive aspects, practical issues were found to exist and need to be sorted out. Review, in detail, can sort out many operational and financial issues. Needs of large blocks should be addressed specifically. Server issues need to be addressed along with a provision of SMS based reminders. Real time data entry can make things more convenient. Correct and complete entries in the MCP will help in appropriate utilisation of the software. Acknowledgement: The authors would like to thank program managers from National Health Mission and health staff of the state government for participating in the study and providing field realities. Dr. Ashish Kumar Sen, being supervisor of the team, had supported the study and provided relevant inputs is also acknowledged. Competing interest: This article was accepted and presented as a conference paper at the International Telemedicine Conference held at Jaipur in 2013. References 1. Achievements of MDG Commitments Made Under NRHM [Internet]. Press Information Bureau, Government of India. 2012 [cited 2014 Nov 25]. Available from: http://pib.nic.in/newsite/erelease.aspx?relid=82520 2. Operational Manual: Mother and Child Tracking System [Internet]. National Rural Health Mission; 2010 [cited 2014 Nov 17]. Available from: https://nrhm-mis.nic.in/Home MCH Tracking System/User manual for MCH Tracking by NIC PDF format.pdf 3. Ministry of Health and Family Welfare. Mother and Child Tracking System [Internet]. [cited 2014 Nov 17]. Available from: http://nrhm-mcts.nic.in/mch/ 4. Immunization Handbook for Medical Officers. Department of Health and Family Welfare, Government of India; 2008. 197 p. 5. Operational plan for Mother and Child Tracking System [Internet]. Ministry of Health and Family Welfare; [cited 2014 Nov 17]. Available from: http://mohfw.nic.in/showfile.php?lid=421 6. Leach-Kemon K, Graves CM, Johnson EK, Lavado RF, Hanlon M, Haakenstad A. Vaccine resource tracking systems. BMC Health Serv Res. 2014;14:421. 7. Ministry of Health and Family Welfare. NHM Health Management Information System Portal [Internet]. [cited 2014 Nov 29]. Available from: https://nrhm-mis.nic.in/SitePages/Home.aspx 8. Marshall MN. Sampling for qualitative research. Fam Pract. 1996 Jan 1;13(6):522ââ¬â6. 9. Baker SE, Edwards R. How many qualitative interviews is enough? [Internet]. National Center for Research Methods; [cited 2014 Nov 25]. Available from: http://eprints.ncrm.ac.uk/2273/4/how_many_interviews.pdf 10. WHO | Informed Consent Form Templates [Internet]. WHO. [cited 2014 Nov 25]. Available from: http://www.who.int/rpc/research_ethics/informed_consent/en/ 11. Whatââ¬â¢s the best satisfaction survey scale? [Internet]. being CustomerSure Proven advice from Business Rockstars. [cited 2014 Nov 25]. Available from: http://www.customersure.com/blog/best-satisfaction-survey-scale/ 12. Kohlbacher F. The Use of Qualitative Content Analysis in Case Study Research. Forum Qual Sozialforschung Forum Qual Soc Res [Internet]. 2006 Jan 31 [cited 2014 Nov 25];7(1). Available from: http://www.qualitative-research.net/index.php/fqs/article/view/75 13. Thorne S. Data analysis in qualitative research. Evid Based Nurs. 2000 Jul 1;3(3):68ââ¬â70. 14. Glà ¤ser J, Laudel G. Life With and Without Coding: Two Methods for Early-Stage Data Analysis in Qualitative Research Aiming at Causal Explanations. Forum Qual Sozialforschung Forum Qual Soc Res [Internet]. 2013 Mar 18 [cited 2014 Nov 25];14(2). Available from: http://www.qualitative-research.net/index.php/fqs/article/view/1886 15. Padhy G, Padhy R, Panigrahi S, Sarangi P, Das S. Bottlenecks identified in the Implementation of components of national health programmes at PHCs of Cuttack district of Odisha. Int J Med Public Health. 2013;3(4):271. 16. Ministry of Labor and Employment. Rashtriya Swasthya Bima Yojana [Internet]. [cited 2014 Dec 1]. Available from: http://www.rsby.gov.in/about_rsby.aspx 17. NHM Child Health Guidelines-Revised Home Based Newborn Care Operational Guidelines [Internet]. [cited 2014 Sep 30]. Available from: http://nrhm.gov.in/images/pdf/programmes/child-health/guidelines/Revised_Home_Based_New_Born_Care_Operational_Guidelines_2014.pdf 18. Neogi SB, Malhotra S, Zodpey S, Mohan P. Assessment of Special Care Newborn Units in India. J Health Popul Nutr. 2011 Oct;29(5):500ââ¬â9. 19. Neogi SB, Malhotra S, Zodpey S, Mohan P. Challenges in scaling up of special care newborn units-lessons from India. Indian Pediatr. 2011;48(12):931ââ¬â5. 20. Barau I, Zubairu M, Mwanza MN, Seaman VY. Improving polio vaccination coverage in Nigeria through the use of geographic information system technology. J Infect Dis. 2014 Nov 1;210 Suppl 1:S102ââ¬â10. 21. Odisha Drug Inventory Management System [Internet]. [cited 2014 Nov 29]. Available from: http://dims.nrhmodisha.in/
Friday, October 25, 2019
Albert Einstein Essays -- Essay s Papers
Albert Einstein Einstein was born on March 14, 1879, in Ulm Germany. He lived there with his parents, Herman and Pauline. After a year in Ulm, due to the failure of his father's electrical and engineering workshop, the Einstein family moved to Munich (the capital of Bavaria), where after a year in residence there, Einstein's mother had Maja, Einstein's sister. Despite the fact that he was Jewish, from age five until age ten, Einstein attended a Catholic School near his home. But, at age 10, Einstein was transferred to the "Luitpold Gymnasium," where Latin, Greek, History, and Geography were pounded into childrens' heads. His parents wanted him to finish school, get his diploma so he could go to a University, and then become an electrical engineer. But Einstein had other Ideas for his future. Einstein's father wanted him to attend a university but he could not because he did not have a diploma from the Gymnasium. But there was a solution to this problem over the Alps, in Zurich, there was The Swiss F ederal Institute of Technology which did not require a diploma to attend. The one thing it did require was the applicant to pass an entrance exam. But then yet another problem arose, most scholars were 18 when they entered the institute, and Einstein was only 16. Einstein took the risk, and in the autumn he was dispatched over the Alps. Einstein took the exam, but did not pass. The principal of the school was impressed with his abilities, so he was admitted to the cantontal scho... Albert Einstein Essays -- Essay s Papers Albert Einstein Einstein was born on March 14, 1879, in Ulm Germany. He lived there with his parents, Herman and Pauline. After a year in Ulm, due to the failure of his father's electrical and engineering workshop, the Einstein family moved to Munich (the capital of Bavaria), where after a year in residence there, Einstein's mother had Maja, Einstein's sister. Despite the fact that he was Jewish, from age five until age ten, Einstein attended a Catholic School near his home. But, at age 10, Einstein was transferred to the "Luitpold Gymnasium," where Latin, Greek, History, and Geography were pounded into childrens' heads. His parents wanted him to finish school, get his diploma so he could go to a University, and then become an electrical engineer. But Einstein had other Ideas for his future. Einstein's father wanted him to attend a university but he could not because he did not have a diploma from the Gymnasium. But there was a solution to this problem over the Alps, in Zurich, there was The Swiss F ederal Institute of Technology which did not require a diploma to attend. The one thing it did require was the applicant to pass an entrance exam. But then yet another problem arose, most scholars were 18 when they entered the institute, and Einstein was only 16. Einstein took the risk, and in the autumn he was dispatched over the Alps. Einstein took the exam, but did not pass. The principal of the school was impressed with his abilities, so he was admitted to the cantontal scho...
Thursday, October 24, 2019
Is Privacy In The 21st Century Possible? Essay
Privacy was once valued and protected. But now with so many new and convenient technological advancements, is privacy in the 21st century possible? To protect our privacy Congress created the Electronics Privacy Acts (ECPA) to protect us from government access to private information that is transmitted and stored on the Internet, such as emails, private photos, or corporate data. Congress has not updated the ECPA on technology since it was created, in 1986. When the ECPA was created there was no ââ¬Å"World Wide Webâ⬠, social networking was something in the future, and nothing was stored in what we call the ââ¬Å"cloud.â⬠With all the technological changes in todayââ¬â¢s society no one is protected. Privacy is defined as being free from the public eye. Yet we have so many people sharing personal information on social networking websites, and government agencies monitoring emails, and phone calls most of the time without our knowledge. There is no privacy in the 21st century, it is just a nostalgic feeling, and it is no longer practiced. Todayââ¬â¢s privacy laws arenââ¬â¢t up to date with todayââ¬â¢s technology. Things are rarely sent through the mail, and emails and text messages have replaced written communication. Online messaging and social networking was something of a novelty when lawmakers created the ECPA (Frolik, 2013). A recent article from the Dayton Daily news written by Cornelius Frolik on June 2013 he mentioned, ââ¬Å"The Government can easily access many personal communications and other private information without sufficient probable causeâ⬠. Instead of acquiring a warrant that requires more standards and procedures. Government agencies instead obtain subpoenaââ¬â¢s to obtain peopleââ¬â¢s emails, and telephone records (Frolik, 2013). Although, local authorities catch lots of dangerous criminals through information online like emails, photos, and social media sites like Facebook some critics still feel it is an invasion of privacy. Also as our technology advances by leaps, and bounds so does the way Government uses new high tech tools to surveillance law-abiding citizens. Though our Fourth Amendment states to protect the American people from unreasonable searches and seizures. Almost everything is done throughà technology in the 21st century. This meaning that government can seize any emails that are 180 days or that has been opened without a warrant; subpoenas have become the most used investigator tool for Government agencies. The reason why is because they can be easily written inside the prosecutors office without any further review from a judge. This means there is an exception to the Fourth Amendment of the United States Constitution, if it satisfies the requirements. The question we should be asking when it comes to Government and our privacy are â⬠Is to explain a clear understanding of the word privacyâ⬠? If the Government cannot clarify the term privacy then how can they protect our privacy? The lack of clarity makes it hard for lawmakers to create new policies that will keep our privacy out of harm (Libin, 2012). Two reasons why privacy can be considered threaten in todayââ¬â¢s society one being the Government powers are limitless, and two being we the American people expose ourselves digitally (Libin, 2012). The people of America should come together and declare for the Government to protect our privacy rather than participate in warrantless searches (Libin, 2012). The fact that the Government can argue that the Fourth Amendment does not apply because there is no exception to privacy when it comes to prot ecting national security, then that leave the American people in times of calamity, and crisis. Laws like the ECPA is a law that the Government has an obligation to respect (Libin, 2012). The ECPA protect the privacy of the electronic communications, but when law enforcement and prosecutors have to protect and enforce laws, personal information has to be collected to build a case (Libin, 2012). The solution is more complex than simply, and right now the Government is facing difficulties figuring out the best way to protect the American people (Libin, 2012). Given all the information privacy seems to be the problem. It can be portrayed in many ways, one as itââ¬â¢s protecting the public from terrorism, and local crime; and two being if you are innocent, what do you have to hide? In 2014 I find that most American people store their digital lives in what we call ââ¬Å"The Cloudâ⬠which included emails, calendar data, photos, and other sensitive information. The ECPA has become obsolete. Technology today leaves the ECPA outdated, the laws have not changed since it was originally createdà in 1986. The existing privacy laws only focus on the text-based personal records, and the issues that people face today with this outdated privacy law is gathering of digital multi-media files, and the way this unauthorized data is used (Lipton, 2010). Do you consider video surveillance systems out on the street personal data? Some may say yes and some may say no. According to a case study researched by Jacqueline D. Lipton, if the face of an individual is recognizable, than it is considered personal data. Some people feel protected with the video surveillance capturing their every moment. Then on the other hand some people feel they are being scrutinized being watched by video surveillance. The U.S. has a protection for free speech and for free of a press under the First Amendment. However there is no express constitutional right to privacy (Lipton, 2012). The question that American people should rigorously examine is whether or not Congress should repeal the ECPA and creates new privacy laws to replace it (Kerr, 2014). The ECPA should be considered top priority when it comes to being reformed. If Congress were to start fresh on what changes to make on the ECPA the technologic changes would have to be particularly considered. Being that the cost of stored information has changed it also changes how law enforcements surveillance people, it threatens privacy. In 1986 this all made sense because the internet was designed at this time to only hold limited storage, and wire-tapping was a threat more than stored information (Kerr, 2014). Overall access to stored record has become the greatest privacy threat. Technology has changed enormously, now everything is stored. With everything being stored now in what we call ââ¬Å"The Cloudâ⬠like mentioned before stored information begins to reveal the same level of details as real time surveillance or real-time access (Kerr, 2014). Stored information has become more revealing an invasive. (Kerr, 2014). References _Cohen, J. E. (2013). What is Privacy For._ Harvard Law Review Association_,_ 126_(7), 1904,29. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=5& sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=edsgbe&AN=edsgcl.333333595_ _Kerr, 0. S. (2014). The Next Generation Communications Privacy Act._ University of Pennsylvania Law Review_,_ 162_(2), 373-419. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/command/detail?vid=26&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=aph&AN=93917886_ _Libn, N. (2012). PRIVACY AND ACCOUNTABILITY IN THE 21ST CENTURY: Foreword._ Harvard Law and Policy Review_,_ 6_, 263. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=15&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=edslex&AN=edslex2F0EC940_ _Lipton, J. D. (2010). Digitlal Multi-Media and The Limits of Privacy Law._ Case Western Reserve Journal of International Law_,_ 42_(3), 551-571. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=24&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=bsh&AN=51909959_ _Sutanto, J., Palme, E., Chuan-Hoo, T., & Chee Wei, P. (2013). Addressing The Personalization-Privacy Paradox: An Empirical Assessment From a Field Experiment on Smartphone Users._ MIS Quarterly_,_ 37_(4), 1141-A5. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=29&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=bsh&AN=91906295_
Tuesday, October 22, 2019
Attachment File Example
Attachment File Example Attachment File ââ¬â Essay Example Essay In ââ¬Å"Five Myths about Who Gets into Collegeâ⬠the basic claim is that there is a big discrepancy in education between the poor and the rich. The highest percentage (74%) of students in selective colleges is from rich families with just a few from poor families. According to the article, admission policies of colleges favor rich student more. Further, there is a significant difference between SAT points for advantaged and disadvantage students attributed to race and socioeconomic factors. Also financial constraints make college dropout among poor students higher than their rich counterparts. The author uses data from previous researches, which makes his presentation more valid and authentic. In order to promote schooling of disadvantaged children, policies of selective colleges should be reviewed to promote equality in admission; studentsââ¬â¢ life context should be considered besides SAT points when admitting students and financial aid to poor students should be in creased.Darius Rejalis notion in ââ¬Å"Five Myths about Torture and Truthâ⬠is that torturing of innocent individuals can be more detrimental than beneficial. According to him, torture is ineffective way of extracting the truth from the innocent, but rather a way of intimidating people. Rejalis presents historic evidence that portrays torture as a failure in intelligence. Many torture incidences in the past were far from success with detainees leashing no information at all in some cases. The author appears to be informing the readers about the topic because he takes no position throughout his presentation. The authorââ¬â¢s presentation is so heart fetching that the readers can only see the animosity in torturing innocent people rather than the intention of the torturers. The author thus effectively communicates his idea that torture does more good than harm to its victims.
Monday, October 21, 2019
Free Essays on Hypercriminals
What is the "super predator"? He or she are young hyper-criminals who are committing acts of violence of unprecedented coldness and brutality. This newest phenomena in the world of crime is perhaps the most dangerous challenge facing society and law enforcement ever. While psychopaths are not new, this breed of super criminal exceeds the scope of psychopathic behavior. They are younger, more brutal, and completely unafraid of the law. While current research on the super predator is scarce, I will attempt to give an indication as to the reasons a child could become just such a monster. Violent teenage criminals are increasingly vicious. John DiIulio, Professor of Politics and Public Affairs at Princeton University, says that "The difference between the juvenile criminals of the 1950s and those of the 1970s and early 1980s was the difference between the Sharks and the Jets of West Side Story and the Bloods and the Crips. It is not inconceivable that the demographic surge of the next ten years will bring with it young criminals who make the Bloods and the Crips look tame." (10) They are what Professor DiIulio and others call urban "super predators"; young people, often from broken homes or so-called dysfunctional families, who commit murder, rape, robbery, kidnapping, and other violent acts. These emotionally damaged young people, often are the products of sexual or physical abuse. They live in an aimless and violent present; have no sense of the past and no hope for the future; they commit unspeakably brutal crimes against other people, often to gratify whatever urges or desires drive them at the moment and their utter lack of remorse is shocking.(9) Studies reveal that the major cause of violent crime is not poverty but family breakdown - specifically, the absence of a father in the household. Today, right now, one-fourth of all the children in the United States are living in father... Free Essays on Hypercriminals Free Essays on Hypercriminals What is the "super predator"? He or she are young hyper-criminals who are committing acts of violence of unprecedented coldness and brutality. This newest phenomena in the world of crime is perhaps the most dangerous challenge facing society and law enforcement ever. While psychopaths are not new, this breed of super criminal exceeds the scope of psychopathic behavior. They are younger, more brutal, and completely unafraid of the law. While current research on the super predator is scarce, I will attempt to give an indication as to the reasons a child could become just such a monster. Violent teenage criminals are increasingly vicious. John DiIulio, Professor of Politics and Public Affairs at Princeton University, says that "The difference between the juvenile criminals of the 1950s and those of the 1970s and early 1980s was the difference between the Sharks and the Jets of West Side Story and the Bloods and the Crips. It is not inconceivable that the demographic surge of the next ten years will bring with it young criminals who make the Bloods and the Crips look tame." (10) They are what Professor DiIulio and others call urban "super predators"; young people, often from broken homes or so-called dysfunctional families, who commit murder, rape, robbery, kidnapping, and other violent acts. These emotionally damaged young people, often are the products of sexual or physical abuse. They live in an aimless and violent present; have no sense of the past and no hope for the future; they commit unspeakably brutal crimes against other people, often to gratify whatever urges or desires drive them at the moment and their utter lack of remorse is shocking.(9) Studies reveal that the major cause of violent crime is not poverty but family breakdown - specifically, the absence of a father in the household. Today, right now, one-fourth of all the children in the United States are living in father...
Subscribe to:
Posts (Atom)