Thursday, October 31, 2019

Principles of Economics Gross Domestic Product Essay

Principles of Economics Gross Domestic Product - Essay Example During the base year nominal and real GDP are equal. Therefore real GDP reflects both prices and quantities of goods and services produced by an economy, whereas nominal GDP reflects the produced quantities only. GDP does not reflect accurately the nation's productivity. There are products that GDP excludes, because it is difficult to measure them. For one thing, GDP includes all items produced and sold legally in the market. This means that products that are produced and sold illegally cannot be traced and measured by the GDP. Additionally, GDP does not include products and services that are actually produced by households but never enter the market. These are, for example, home grown fruit or vegetables that are used within the households that cultivate them. Also, GDP excludes other immeasurable variables like the quality of the environment or leisure time and does not reflect the distribution of income within an economy.

Tuesday, October 29, 2019

An analysis of Information Security Governance in the Universities in Zimbabwe Essay Example for Free

An analysis of Information Security Governance in the Universities in Zimbabwe Essay Abstract The complexity and criticality of information security and its governance demand that it be elevated to the highest organizational levels. Within a university setup, information assets include student and personnel records, health and financial information, research data, teaching and learning materials and all restricted and unrestricted electronic library materials. Security of these information assets is among the highest priorities in terms of risk and liabilities, business continuity, and protection of university reputations. As a critical resource, information must be treated like any other asset essential to the survival and success of the organization. In this paper the writer is going to discuss the need for implementing Information Security Governance within institutions of higher education. Further than that, a discussion on how to best practice Information Security governance within the universities in Zimbabwe followed by an assessment on how far the Zimbabwean universities have implemented Information Security Governance. A combination of questionnaires and interviews is going to be used as a tool to gather data and some recommendations are stated towards the end of the paper. Introduction Governance, as defined by the IT Governance Institute (2003), is the â€Å"set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise’s resources are used responsibly.† Information security governance is the system by which an organization directs and controls information security (adapted from ISO 38500). It specifies the accountability framework and provides oversight to ensure that risks are adequately mitigated as well as ensuring that security strategies are aligned with business and consistent with regulations. To exercise effective enterprise and information security governance, boards and senior executives must have a clear understanding of what to expect from their enterprise’s information security programme. They need to know how to direct  the implementation of an information security programme, how to evaluate their own status with regard to an existing security programme and how to decide the strategy and objectives of an effective security programme (IT Governance Institute, 2006). Stakeholders are becoming more and more concerned about the information security as news of hacking, data theft and other attacks happen more frequently than ever dreamt of. Executive management has been showered with the responsibility of ensuring an organization provides users with secure information systems environment. Information security is not only a technical issue, but a business and governance challenge that involves adequate risk management, reporting and accountability. Effective security requires the active involvement of executives to assess emerging threats and the organization’s response to them (Corporate Governance Task Force, 2004). Furthermore the organizations need to protect themselves against the risks inherent in the use of information systems while simultaneously recognizing the benefits that can accrue from having secure information systems. Peter Drucker (1993) stated: â€Å"The diffusion of technology and the commodification of information transforms the role of information into a resource equal in importance to the traditionally important resources of land, labor and capital.† Thus as dependence on information system increases, the criticality of information security brings with it the need for effective information security governance. Need for Information Security Governance within universities. A key goal of information security is to reduce adverse impacts on the organization to an acceptable level of risk. Information security protects information assets against the risk of loss, operational discontinuity, misuse, unauthorized disclosure, inaccessibility and damage. It also protects against the ever-increasing potential for civil or legal liability that organizations face as a result of information inaccuracy and loss, or the absence of due care in its protection. Information security covers all information processes, physical and electronic, regardless whether they involve people and technology or relationships with trading partners, customers and third parties. Information security addresses information protection, confidentiality, availability and integrity throughout the life cycle of the information and its use within the organization. John P. Pironti (2006) suggested that among many reasons for information security  governance, the most important one is the one concerned with the legal liability, protection of the organization’s reputation and regulatory compliance. With the university setup, all members of the university community are obligated to respect and, in many cases, to protect confidential data. Medical records, student records, certain employment-related records, library use records, attorney-client communications, and certain research and other intellectual property-related records are, subject to limited exceptions, confidential as a matter of law. Many other categories of records, including faculty and other personnel records, and records relating to the universitys business and finances are, as a matter of university policy, treated as confidential. Systems (hardware and software) designed primarily to store confidential records (such as the Financial Information System and Student Information System and all medical records systems) require enhanced security protections and are controlled (strategic) systems to which access is closely monitored. Networks provide connection to records, information, and other networks and also require security protections. The use of university information technology assets in other than a manner and for the purpose of which they were intended represents a misallocation of resources and, possibly, a violation of law. To achieve all this in today’s complex, interconnected world, information security must be addressed at the highest levels of the organization, not regarded as a technical specialty relegated to the IT department. Information security is a top-down process requiring a comprehensive security strategy that is explicitly linked to the organization’s business processes and strategy. Security must address entire organization’s processes, both physical and technical, from end to end. Hence, Information security governance requires senior management commitment, a security-aware culture, promotion of good security practices and compliance with policy. It is easier to buy a solution than to change a culture, but even the most secure system will not achieve a significant degree of security if used by ill-informed, untrained, careless or indifferent personnel (IT Governance Institute, 2006). In an interview the executive director and information security expert on IT Governance and cyber security with the IT Governance and Cyber Security Institute of sub-Saharan Africa, Dr Richard Gwashy Young has this to say â€Å"†¦remember in  Zimbabwe security is regarded as an expense not an investment† (Rutsito, 2012). Benefits of Information Security Governance Good information security governance generates significant benefits, including: The Board of directors taking full responsibility for Information security initiatives Increased predictability and reduced uncertainty of business operations by lowering information security-related risks to definable and acceptable levels Protection from the increasing potential for civil or legal liability as a result of information inaccuracy or the absence of due care. The structure and framework to optimize allocation of limited security resources Assurance of effective information security policy and policy compliance A firm foundation for efficient and effective risk management, process improvement, and rapid incident response related to securing information A level of assurance that critical decisions are not based on faulty information Accountability for safeguarding information during critical business activities. Compliances with local and international regulations will be easier Improved resource management, optimizing knowledge, information security and information technology infrastructure The benefits add significant value to the organization by: Improving trust in customer/client relationships Protecting the organization’s reputation Decreasing likelihood of violations of privacy Providing greater confidence when interacting with trading partners Enabling new and better ways to process electronic transactions like publishing results online and online registration. Reducing operational costs by providing predictable outcomes—mitigating risk factors that may interrupt the process The benefits of good information security are not just a reduction in risk or a reduction in the impact should something go wrong. Good security can improve reputation, confidence and trust from others with whom business is conducted, and can even improve efficiency by avoiding wasted time and effort recovering from a security incident (IT Governance Institute, 2004). Information Security Governance Outcomes Five basic outcomes can be expected to result from developing an effective governance approach to information security: Strategic alignment of information security with institutional objectives Reduction of risk and potential business impacts to an acceptable level Value delivery through the optimization of security investments with institutional objectives Efficient utilization of security investments supporting organization objectives Performance measurement and monitoring to ensure that objectives are met Best practices The National Association of Corporate Directors (2001), recognizes the importance of information security and recommends four essential practices for boards of directors. The four practices, which are based on the practicalities of how boards operate, are: Place information security on the board’s agenda. Identify information security leaders, hold them accountable and ensure support for them. Ensure the effectiveness of the corporation’s information security policy through review and approval. Assign information security to a key committee and ensure adequate support for that committee. It is critical that management ensure that adequate resources are allocated to support the overall enterprise information security strategy (IT Governance Institute, 2006). To achieve effective information security governance, management must establish and maintain a framework to guide the development and maintenance of a comprehensive information security programme. According to Horton, et al (2000), an information security governance framework generally consists of: An information security risk management methodology; A comprehensive security strategy explicitly linked with business and IT objectives; An effective security organizational structure; A security strategy that talks about the value of information both protected and delivered; Security policies that address each aspect of strategy, control and regulation; A complete set of security standards for each policy to ensure that procedures and guidelines comply with policy; Institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk; A process to ensure  continued evaluation and update of security policies, standards, procedures and risks. This kind of framework, in turn, provides the basis for the development of a cost-effective information security program me that supports an organization’s goals and provides an acceptable level of predictability for operations by limiting the impacts of adverse events. In his article Kaitano (2010), pointed some characteristics of good corporate governance coupled with good security governance. These include and not limited to: Information security being treated as and organization wide issue and leaders are accountable. Leads to viable Governance, Risk and Compliance(GRC) Milestones It is risk-based and focuses on all aspects of security Proper frameworks and programs have been implemented It is not treated as a cost but a way of doing business Roles, responsibilities and segregation of duties are defined It is addressed and enforced by policy Adequate resources are committed and Staff are aware and trained It is planned, managed, measurable and measured It is reviewed and audited The overall objective of the programme is to provide assurance that information assets are protected in accordance with their value or the risk their compromise poses to an organization. The framework generates a set of activities that supports fulfillment of this objective. Principles for information security within the University In their article titled Information Security Policy: Best Practice Document, Hostland et al (2010) pointed out some guiding principles for information security within a university setup. The following are some of the principles they mentioned: 1. Risk assessment and management The universitys approach to security should be based on risk assessments and should be continuously done and the need for protective measures evaluated. Measures must be evaluated based on the universitys role as an establishment for education and research and with regards to efficiency, cost and practical feasibility. An overall risk assessment of the  information systems should be performed annually. Risk assessments must identify, quantify and prioritize the risks according to relevant criteria for acceptable risks. Risk assessments should be carried out when implementing changes impacting information security. Some recognized methods of assessing risks like ISO/IEC 27005 should be employed. Risk management is to be carried out according to criteria approved by the management at University. Risk assessments must be approved by the management and if a risk assessment reveals unacceptable risks, measures must be implemented to reduce the risk to an acceptable level. 2. Information security policy The Vice Chancellor should ensure that the information security policy, as well as guidelines and standards, are utilized and acted upon. He must also ensure the availability of sufficient training and information material for all users, in order to enable the users to protect the universitys data and information systems. The security policy should be reviewed and updated annually or when necessary, in accordance with principles described in ISO/IEC 27001. However, all important changes to universitys activities, and other external changes related to the threat level, should result in a revision of the policy and the guidelines relevant to the information security. 3. Security organization The Vice Chancellor is responsible for all government contact. The university should appoint CSO (Chief Security Officer). Each department and section should also be responsible for implementing the units information security. The managers of each unit must appoint separate security administrators. The Registrar Academics has the primary responsibility for the information security in connection with the student registry and other student related information. The IT Director has executive responsibility for information security in connection with IT systems and infrastructure. The Operations manager has executive responsibility for information security in connection with structural infrastructure. He also has overall responsibility for quality work, while the operational responsibility is delegated according to the management structure. The Registrar Human Resources also has executive responsibility for information security according to the Personal Data Act and is the controller on a daily basis of the personal information of the  employees. The Registrar Academics and Research Administration have also executive responsibility for research related personal information. Universitys information security should be revised on a regular basis, through internal control and at need, with assistance from an external IT auditor. 4. Information security in connection with users of Universitys services Prior to employment security responsibility and roles for employees and contractors should be described. A background check is should also be carried out of all appointees to positions at the university according to relevant laws and regulations. A confidentiality agreement should be signed by employees, contractors or others who may gain access to sensitive and/or internal information. IT regulations should be accepted for all employment contracts and for system access for third parties. During employment, the IT regulations for the universitys information security requirements should be in place and the users responsibility for complying with these regulations is to be emphasized. The IT regulations should be reviewed regularly with all users and with all new hires. All employees and third party users should receive adequate training and updating regarding the Information security policy and procedures. Breaches of the Information security policy and accompanying guidelines will normally result in sanctions. Universitys information, information systems and other assets should only be utilized for their intended purpose. Necessary private usage is permitted. Private IT equipment in the universitys infrastructure may only be connected where explicitly permitted. All other use must be approved in advance by the IT department. On termination or change of employment, the responsibility for termination or change of employment should be clearly defined in a separate routine with relevant circulation forms. The universitys assets should be handed in at the conclusion of the need for the use of these assets. University should change or terminate access rights at termination or change of employment. A routine should be present for handling alumni relationships. Notification on employment termination or change should be carried out through the procedures defined in the personnel system. 5. Information security regarding physical conditions IT equipment and information that require protection should be placed in secure physical areas. Secure areas should have suitable access control to  ensure that only authorized personnel have access. All of the Universitys buildings should be secured according to their classification by using adequate security systems, including suitable tracking/logging. Security managers for the various areas of responsibility should ensure that work performed by third parties in secure zones is suitably monitored and documented. All external doors and windows must be closed and locked at the end of the work day. On securing equipment, IT equipment which is very essential for daily activities must be protected against environmental threats (fires, flooding, temperature variations). Information classified as sensitive must not be stored on portable computer equipment (e.g. laptops, cell phones, memory sticks). If it is necessary to store this information on portable equipment, the information must be password protected and encrypted in compliance with guidelines from the IT department. During travel, portable computer equipment should be treated as carry-on luggage. Fire drills should also be carried out on a regular basis. 6. IT communications and operations management Purchase and installation of IT equipment and software for IT equipment must be approved by the IT department. The IT department should ensure documentation of the IT systems according to universitys standards. Changes in IT systems should only be implemented if well-founded from a business and security standpoint. The IT department should have emergency procedures in order to minimize the effect of unsuccessful changes to the IT systems. Operational procedures should be documented and the documentation must be updated following all substantial changes. Before a new IT system is put in production, plans and risk assessments should be in place to avoid errors. Additionally, routines for monitoring and managing unforeseen problems should be in place. Duties and responsibilities should be separated in a manner reducing the possibility of unauthorized or unforeseen abuse of the universitys assets. Development, testing and maintenance should be separated from operations in order to reduce the risk of unauthorized access or changes, and in order to reduce the risk of error conditions. On system planning and acceptance, the requirements for information security must be taken into consideration when designing, testing, implementing and upgrading IT systems, as well as during system changes. Routines must be developed for  change management and system development/maintenance. IT systems must be dimensioned according to capacity requirements and the load should be monitored in order to apply upgrades and adjustments in a timely manner as it is especially important for business-critical systems. Written guidelines for access control and passwords based on business and security requirements should be in place. Guidelines should be re-evaluated on a regular basis and should contain password requirements (frequency of change, minimum length, character types which may/must be utilized) and regulate password storage. All users accessing systems must be authenticated according to guidelines and should have unique combinations of usernames and passwords. Users are responsible for any usage of their usernames and passwords. Data Gathering A structured questionnaire adapted and modified from previous questionnaires used by Corporate Governance Task Force, (2004) was used as the main instrument to gather data. Of the total 13 universities in Zimbabwe, 9 managed to participate in this research. The questionnaires were completed by the Executive Dean, IT Director, Operations Manager or Chairperson for the department. Section I: Organizational Reliance on IT The first section was designed to help in determining the institution’s reliance on information technology for business continuity. Table 1: Characteristics of Organization Questions Scores/Frequency 0 1 2 3 4 Dependence on information technology systems and the Internet to conduct academic, research, and outreach programs and offer support services 9 Value of organization’s intellectual property stored or transmitted in electronic form 2 7 The sensitivity of stakeholders (including but not limited to students, faculty, staff, alumni, governing boards, legislators, donors, and funding agencies) to privacy 2 3 4 Level of regulation regarding security (international, federal, state, or local regulations) 1 4 3 1 Does your organization have academic or research programs in a sensitive area that may make you a target of violent physical or cyber attack from any groups? 5 1 2 1 Total score 1 9 6 7 22 Scoring: Very Low = 0; Low = 1; Medium = 2; High = 3; Very High = 4 Section II: Risk Management: This section assesses the risk management process as it relates to creating an information security strategy and program. Table 2: Information Security Risk Assessment Questions Scores/Frequency 0 1 2 3 4 Does your organization have a documented information security program? 2 5 2 Has your organization conducted a risk assessment to identify the key objectives that need to be supported by your information security program? 2 4 3 Has your organization identified critical assets and the functions that rely on them? 2 2 5 Have the information security threats and vulnerabilities associated with each of the critical assets and functions been identified? 2 4 2 1 Has a cost been assigned to the loss of each critical asset or function? 1 3 3 2 Do you have a written information security strategy? 2 4 2 1 Does your written information security strategy include plans that seek to cost-effectively reduce the risks to an acceptable level, with minimal disruptions to operations? 4 2 2 1 Is the strategy reviewed and updated at least annually or more frequently when significant changes require it? 2 3 3 1 Do you have a process in place to monitor federal, state, or international legislation or regulations and determine their applicability to your organization? 2 2 3 2 1 Total 10 16 26 14 16 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section III: People This section assesses the organizational aspects of the information security program. Table 3: Information Security Function/Organization Questions Scores/Frequency 0 1 2 3 4 Do you have a person that has information security as his primary duty, with responsibility for maintaining the security program and ensuring compliance? 4 3 1 1 Do the leaders and staff of your information security organization have the necessary experience and qualifications? 5 2 2 Is responsibility clearly assigned for all areas of the information security architecture, compliance, processes and audits? 3 4 1 1 Do you have an ongoing training program in place to build skills and competencies for information security for members of the information security function? 2 2 3 2 Does the information security function report regularly to institutional leaders and the governing board on the compliance of the institution to and the effectiveness of the information security program and policies? 2 3 3 1 Are the senior officers of the institution ultimately responsible and accountable for the information security program, including approval of information security policies? 3 4 2 Total 16 17 14 7 0 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section IV: Processes This section assesses the processes that should be part of an information security program. Table IV: Security Technology Strategy Questions Scores/Frequency 0 1 2 3 4 Have you instituted processes and procedures for involving the security personnel in evaluating and addressing any security impacts before the purchase or introduction of new systems? 2 3 3 1 Do you have a process to appropriately evaluate and classify the information and information assets that support the operations and assets under your control, to indicate the appropriate levels of information security? 1 2 3 2 1 Are written information security policies consistent, easy to understand, and readily available to administrators, faculty, employees, students, contractors, and partners? 2 3 3 1 Are consequences for noncompliance with corporate policies clearly communicated and enforced? 1 3 2 3 1 Do your security policies effectively address the risks identified in your risk analysis/risk assessments? 2 3 4 Are information security issues considered in all important decisions within the organization? 3 2 3 1 Do you constantly monitor in real time your networks, systems and applications for unauthorized access and anomalous behavior such as viruses, malicious code insertion, or break-in attempts? 1 3 3 1 1 Is sensitive data encrypted and associated encryption keys properly protected? 2 3 2 1 1 Do you have an authorization system that enforces time limits and defaults to minimum privileges? 2 2 2 3 Do your systems and applications enforce session/user management practices including automatic timeouts, lock out on login failure, and revocation? 2 3 2 2 Based on your information security risk management strategy, do you have official written information security policies or procedures that address each of the following areas? Individual employee responsibilities for information security practices 4 3 1 1 Acceptable use of computers, e-mail, Internet, and intranet 2 3 2 2 Protection of organizational assets, including intellectual property 2 2 3 2 Access control, authentication, and authorization practices and requirements 1 2 3 1 2 Information sharing, including storing and transmitting institutional data on outside resources (ISPs, external networks, contractors’ systems) 2 1 3 2 1 Disaster recovery contingency planning (business continuity planning) 1 1 3 4 Change management processes 2 3 2 2 Physical security and personnel clearances or background checks 1 3 3 2 Data backups and secure off-site storage 1 1 3 4 Secure disposal of data, old media, or printed materials that contains sensitive information 2 3 4 For your critical data centers, programming rooms, network operations centers, and other sensitive facilities or locations: 2 3 4 Are multiple physical security measures in place to restrict forced or unauthorized entry? 1 2 3 3 Is there a process for issuing keys, codes, and/or cards that require proper authorization and background checks for access to these sensitive facilities? 2 1 3 3 Is your critical hardware and wiring protected from power loss, tampering, failure, and environmental threats? 1 4 4 Total 17 45 58 50 47 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Discussion As shown by the total scores on Table 1, a majority of the university has a very high reliance on the IT in their services. This is depicted by the structure and characteristics of the university. Information risk assessment and management leaves a lot to be desired by the universities. Most the universities have partially implemented such programs. A large number of employees in the IT departments of most universities do no have sufficient skills to implement good information security governance. Most universities lack the leaders who have the rightful know how on the subject. In addition  to that, there is no a representative in the council who will be an IT expert, hence most leaders lack interest and initiatives on information security. Due to lack of full responsibility of information security by the leaders, to implement processes for information security might also be a challenge especially to the IT department as normally is the department given the responsibility. Conclusion There is a need for institutions to start focusing on proper information security governance. For a start organization such as the Government, the Computer Society of Zimbabwe, Zim Law Society, POTRAZ, ICAZ, IIAZ, Zimbabwe Institute of Management and other industry governing bodies should put their heads together and define the appropriate legislations that mandates information security governance either by referring to existing international frameworks (PCI-DSS, SOX, COSO, ITIL, SABSA, Cobit FIPS, NIST, ISO 27002/5, CMM, ITG Governance Framework) or by consulting local information security and business professionals to come up with an information security governance framework. As the Zimbabwean economy is slowly sprouting, the art of information security governance in the universities should also take a leap. The adoption information security governance will ensure that security will become a part of any university and thus customers confidence will be boosted. References Drucker, P. ‘Management Challenges for the 21st Century’, Harpers Business , 1993. Corporate Governance Task Force, Information Security Governance: Call to Action, USA, 2004. IT Governance Institute, Board Briefing on IT Governance, 2nd Edition, USA, 2003, www.itgi.org. IT Governance Institute, Information Security Governance: Guidance for Boards of Directors and Executive Management, 2nd Edition, USA, 2006. ISO/IEC 38500: Corporate Governance of Information Technology, 2008. IT Governance Institute, COBIT 4.0, USA, 2005, www.itgi.org IT Governance Institute, COBIT ® Security Baseline, USA, 2004, www.itgi.org National Association of Corporate Directors, ‘Information Security Oversight: Essential Board Practices’, USA, 2001 John P. Pironti,  Ã¢â‚¬Å"Information Security Governance: Motivations, Benefits and Outcomes,† Information Systems Control Journal, vol. 4 (2006): 45–8. 21. Rutsito, T. (2005) ‘IT governance, security define new era’ The Herald, 07 November. Kaitano, F. (2010) ‘Information Security Governance: Missing Link In Corporate Governance’ TechZim. http://www.techzim.co.zw/2010/05/information-security-governance-missing-link-in-corporate-governance [accessed 02 May 2013]. Horton, T.R., Le Grand, C.H., Murray, W.H., Ozier, W.J. Parker, D.B. (2000). Information Security Management and Assurance: A Call to Action for Corporate Governance. United States of America: The Institute of Internal Auditors. Hostland, K, Enstad, A. P, Eilertsen, O, Boe, G. (2010). Information Security Policy: Best Practice Document. Corporate Governance Task Force, (2004). Information Security Governance: Call to Action, USA

Sunday, October 27, 2019

Cask Of Amontillado By Edgar Allan Poe

Cask Of Amontillado By Edgar Allan Poe The story of The Cask of Amontillado by Edgar Allan Poe is full of conflict from beginning to end. The narrator of this story does not reveal why such a conflict exists other than to say someone has impugned his honor. Poe makes use of irony, symbolism among other linguistics means to tell a revenge story under Montresors, the murderer, view and ideas. Even knowing the narrator is not reliable and he probably is mad, the reader stands on his side from the beginning to the end of the conflict. This article will try to analyze the tools used by Poe to create this short story. The Style of Poe in The cask of amontillado Strengthening readers comprehension of his writing is also a key function of the imagery Poe uses. The variety of stylistic devices used by Poe to create the atmosphere of horror and terror includes the setting, one of the things the author uses to paint a dark and gloomy picture in the readers mind. For example: as described by him in the beginning of the short story It was about dusk, one evening during the supreme madness of the carnival seasonà ¢Ã¢â€š ¬Ã‚ ¦ or like in this paragraph: At the most remote end of the crypt there appeared another less spacious. Its walls had been lined with human remains, piled to the vault overhead, in the fashion of the great catacombs of Paris. Three sides of this interior crypt were still ornamented in this manner. From the fourth side the bones had been thrown down, and lay promiscuously upon the earth, forming at one point a mound of some size. Within the wall thus exposed by the displacing of the bones, we perceived a still interior crypt or r ecess, in depth about four feet, in width three, in height six or seven. It seemed to have been constructed for no especial use within itself, but formed merely the interval between two of the colossal supports of the roof of the catacombs, and was backed by one of their circumscribing walls of solid granite. Imagery in Poes style of writing clearly involves readers in the story, and his use of complex vocabulary ensures that readers understand his themes and implications. The use of symbolism is what makes Poes short story even more interesting. Symbolism, according to the The Dictionary of Literary Terms, is an object, person, idea, etc. used in a literary work, film, etc., to stand for or suggest something else with which it is associated either explicitly or in some more subtle way. It may not be clear for some readers, but in The Cask of Amontillado the fight between two social class conflict and the aristocratic social codes is very well pictured. Montresor meets Fortunato as if by chance when it is clear that Montresor already of Fortunatos attendance during the Carnival celebration at a banquet. When Montresor leads the intoxicated Fortunato into the blind wall in the subterranean passages of Montresors family grave and takes him prisoner, he already has mortar and trowel prepared for walling up his victim. Since Fortunato had given Montresor a Masonic sign and asked him if he were a Mason, a question which response was that Fortunato was nothing more than a real stone mason and the murderer laughingly showed the real trowel he had with him, it can also be a humorous imitation of the French Freemasonry, whose motto was libertà ©, à ©galità ©, fraternità ©. Fortunato is of bourgeois origin and Montresor, who is full of aristocratic pride reflected in his thoughts of titles of nobility, genealogy, escutcheons, coats of arms, quarterings, the bones of ancestors, fiefs, and inheritable property, could not handle an offense against ones honor called for justice and punishment. The motto on his coat of arms is Nemo me impune lacessit (No one insults me with impunity). He cannot challenge the ignorant Fortunato; besides, with his purchased title he holds some official post in the government, is perhaps an intendant, and is thus a personification of the evils that had been foisted on the provincial aristocracy by the crown. Since Fortunato has power, Montresor turns on to murder. The symbolism can also be noticed in some other aspects and details of the short story. Ironically, the victim is named Fortunato, which in English means lucky man or fortunate. He is said to be wearing motley: a tight-fitting parti-striped dress, and his head was surmounted by the conical cap and bells, just like a jester. The ironic meaning of Fortunatos name, for the story proves that he is greatly unfortunate, creates a symbolic image of a light-minded, frivolous man, who shows little understanding of his own life. On what it comes to the narration style, Poe does what he did in other two of his short stories (The Black Cat and The Tell-Tale Heart): he conveys the story through the murderers perspective. In a very wise way, Poe presents the narrator in the first-person, Montresor, what makes him not reliable, since he tells the story under his perspective. As we can see in this part of the story, Montresor never tells the reader the real cause of his revenge: THE thousand injuries of Fortunato I had borne as I best could, but when he ventured upon insult I vowed revenge. You, who so well know the nature of my soul, will not suppose, however, that gave utterance to a threat. At length I would be avenged; this was a point definitely, settled but the very definitiveness with which it was resolved precluded the idea of risk. I must not only punish but punish with impunity. A wrong is unredressed when retribution overtakes its redresser. It is equally unredressed when the avenger fails to make himself felt as such to him who has done the wrong. Poe uses irony as a catharsis for his inner angst. Even beneath the grotesque visions of dead remains everywhere in the underground vault, the reader feels little sympathy for Fortunato, perhaps because of his elitist attitude when he mocks Montresor, saying You are not of the brotherhood. It is important to remember that Fortunato had countless opportunities to leave at the narrators insistence, but this man disregards them nevertheless, forever sealing his own fate; when the narrator proclaims his family motto and the description of his family crestas a snake biting into the heel that crushes it, all of these are clues that could potentially allow for Fortunatos escape. In recalling the image of the snake, it is Montresor who plays this role against the man who would mercilessly step upon him, demeaning him, as Fortunato had done so many times before. The Cask of Amontillado is filled with irony, starting by the title that mentions a barrel of a rare wine which is a secondary, if not a mere detail in the whole story. We also have a situational case of irony as Montresor takes the opportunity of the carnival season celebration, a date to celebrate joyfully, to trap and murder Fortunato. In this short story we can find three types of irony: Verbal irony which involves saying one thing but meaning the opposite. Situational irony which occurs when events turn out the opposite of what would ordinarily be expected. For example: the title of the short story as mentioned before. Dramatic irony is when readers or viewers of a story know more than the characters or can interpret more accurately what they have to say. When Montresor repeats Fortunatos Let us be gone, readers probably make a second interpretation of what Fortunato understand by that. The first words Montresor utters when he meets Fortunato is full of irony, since he did not met his friend by a chance, neither Fortunato was luckily met: My dear Fortunato, you are luckily met. Fortunatos jester costume is also very satirical. The way the story unfolds itself and the way Montresor talks to Fortunato is full of irony from the beginning to the very end when he screams Fortunatos name right after he died. Here are some excerpts to illustrate: Montresor expressing himself worried about the nitre-covered walls and exacerbation of Fortunatos cough-this is an example of verbal irony. As the victim replies: the cough is a mere nothing; it will not kill me. I shall not die of a cough. The second bottle of wine consumed is a flagon of De Grave here Poe plays with the wine brand and the word grave in English which means sepulture: I broke and reached him a flagon of De Grave. He emptied it at a breath. His eyes flashed with a fierce light. He laughed and threw the bottle upwards with a gesticulation I did not understand. They made a toast to Fortunatos long life, who did not know he was about to face death: Drink, I said, presenting him the wine. He raised it to his lips with a leer. He paused and nodded to me familiarly, while his bells jingled. I drink, he said, to the buried that repose around us. And I to your long life. Fortunato is the real ignoramus, term he used to insult Luchesi, whom Montresor has several times suggested as a connoisseur who could substitute for Fortunato: As you are engaged, I am on my way to Luchesi. If anyone has a critical turn, it is he. He will tell me Luchesi cannot tell Amontillado from Sherry. Let us go, nevertheless. The cold is merely nothing. Amontillado! You have been imposed upon; and as for Luchesi, he cannot distinguish Sherry from Amontillado. Poe uses repetition to ensure readers to deeper comprehend the concepts and story development. conclusion In this short story we do not have a violent, drunk or psycho character that kills for no reason or disconnected from reality. Montresor knows what he is doing and maintains focused and lucid all the time and that is what apart The Cask of Amontillado from Poes other tales. This tale contains a great amount of dark humor and is somehow a type of warning for those who thread other people by bullying them because the offended ones might always come back urging for revenge.

Friday, October 25, 2019

Turning Points in History :: essays research papers fc

Turning Points in History   Ã‚  Ã‚  Ã‚  Ã‚  Turning points in history can mean a change in the way the things are done in the past, sometimes for the better, and other times for the worse. Two notable turning points in history were the Industrial Revolution and also World War I. These both had some political, social and cultural impacts.   Ã‚  Ã‚  Ã‚  Ã‚  The Industrial Revolution was a time of great change and increased efficiency. No more would be goods be produced by sole means of farming and agriculture, but now by the use of machinery and factories. Technology was beginning to increase along with the food supply as well as the population. However, this increase in population would greatly impact the social aspect of that time. Urbanization was becoming much more widespread. Cities were becoming overwhelmingly crowded and there was an increase in disease as well as harsh child labor. Although child labor would be reduced somewhat due to unions, the Industrial Revolution still contained both it’s positive and negative results.   Ã‚  Ã‚  Ã‚  Ã‚   World War I was another major turning point in history. This turning point consisted in the way war was fought and how it has changed due to the advances in technology that took place during this time in the 1900’s. War was triggered in the Balkans where the Ottoman Empire had once maintained control. Industrialization and technology had both contributed to the advances in the development of weapons. This devastatingly was the cause of millions of deaths in World War I. War was now fought in trenches and they used machine guns as well as tanks and grenades. There was definitely a turning point in the way war would be fought. However, the most important turning point in the war had to be the involvement of the US. The US tried to remain neutral in the war but ended up joining the Allies. Thanks to the US’s involvement, however, the Allies received the help needed to win the war.   Ã‚  Ã‚  Ã‚  Ã‚  In conclusion we can see that revolutions and wars can lead to positive and negative turning points.

Thursday, October 24, 2019

Genetically organism Essay

Everyone in the world competes in his/her way to maintain standards through which he/she can feed themselves and their loved ones with food. It is the basic necessity every human being requires daily from birth until death. Today in the modern days different forms of many foods have evolved ranging from organic foods to genetically modified foods. Since the genetically modified foods have taken over the market they are known to be greater in resistance to pesticides and viruses, provide higher nutritional value and have a longer expiration date. Lastly, these foods are sold at cheaper prices in comparison to the organic foods. However, the potential risks of these foods are still being debated all over the world. The three reasons why the genetically engineered food should be labeled separately are the health hazards, religious – ethical concerns, and economic concerns involved. The reason why genetically modified foods should be labeled separately from organic foods are the health hazards involved in the production. The major health hazard involved in the non-labeling of genetic foods is that people all over the world have allergies to particular types of ingredients used in the manufacturing of the foods. The genetically modified foods include soybean, maize, chicory, potato, squash, oilseed rape (canola), pineapples, and strawberries. [1] Genetically modified foods can cause health diseases such as cancers, a newly discovered disease Morgellons, and other allergies. Without any specific labeling, the rate at which these diseases can occur doubles because people allergic to certain genes used in these foods, and there is no other way to determines these foods contain these genes or not. A recent article published in Lancet examined the effects of GM potatoes on the digestive tract in rats. This study claimed that there were appreciable differences in the intestines of rats fed GM potatoes and rats fed unmodified potatoes. Many children in the US and Europe have developed life-threatening allergies to peanuts and other foods. There is a possibility that introducing a gene into a plant may create a new allergen or cause an allergic reaction in susceptible individuals. (Raab, Grobe; 2009) [2] The quoted article above examines the differences between the Rats that fed on organic produce of potatoes and the ones’ that fed on the GM potatoes. The rats that fed on GM foods developed precancerous cell growth in their digestive tracts, inhibited developments of their brains, livers, and testicles. They also faced enlarged pancreas and intestines, and suffered immune system damage. The quote also demonstrates the possibility of the harmful side effects that GM foods can cause to future human generations. The possible solution to minimize these side effects is that Extensive testing of GM foods should be required to avoid the possibility of harm to consumers with food allergies. Labeling of GM foods and food products will acquire new importance. Before buying a certain GM product, people will be able to determine if they are allergic to its ingredients or not. Another reason why genetically modified foods should be labeled separately from organic foods is the religious – ethical concerns involved in the production. Different religious groups prohibit themselves from eating certain types of animal products. For example, Muslims do not eat any type of enzymes extracted from Pork. [3] Thus, using genes to create traces of genetic material from pork in GM foods and plants without labeling them could cause a stir in the Muslim sect. Another ethical concern is that Animal rights can harmfully be affected by excessive manufacturing of Genetic Foods. For example, Sheep given more powerful hormones could suffer problems relating to growth and problems in digestive systems. Without specific labeling on foods, animals being tested cannot be identified, and this could lead to further malpractices by large corporations. Ethical and religious concerns include the belief that the technology involved is unnatural, and preoccupations regarding the consumption of religiously forbidden ingredients from certain animals. These new technologies, it is argued, violate religious freedom by placing a burden on those who follow strict religious dietary laws. The government is not constitutionally obligated to make accommodations in favor of religious groups that are incidentally affected by neutral rules. Accordingly, the neutral decision of not labeling genetically modified foods met this constitutional standard and was not subjected to a more rigorous constitutional adjudication test. (Lietz, 2000) [4]. The quoted excerpt above from the Harvard law review emphasizes the importance of the labeling on genetically modified foods because without explanation of how these foods are manufactured, it is unethical and unfavorable to religious and cultural groups that restrict themselves from practices in consumption of certain ingredients included in these foods. In other words, the use of these technologies is harming the religion freedom of people. [4] The government of United States protects the non-labeling by not passing laws that require rigorous tests on GM foods because it is believed that there are already laws that protect religious groups. The third reason why genetically modified foods should be labeled separately is the economic concerns involved in the production. The main economic concern is that the world food market could be monopolized by large multinational corporations that control the production and distribution of genetically manufactured seeds. If this happens, they would be able manipulate governments to pass laws that don’t require companies to label their GM foods. [5] Monopolization will increase prices of seeds and eliminate small level farming. GMOs are the products of large corporations and considered intellectual property. Thus, they are protected by patents and copyrights. This means that if farmers want to use genetically modified crops, they must buy it from a corporation. If the world relies solely on GMOs, this means that these corporations will control the world’s food supply, leading to the monopolization of food. The use of GMOs is driving out the need for small farmers. These small farmers are forced to switch to GMOs in order to compete with other GMO farmers, but in the process, they are subjugated to the control of the corporation that produced the GMOs. (Barton, 2002) [6] The above passage was taken from a research about non labeling consequences published in the Harvard Law Review that extrapolates the consequences if the food industry is monopolized. It explains that if this happens, the patents and copyrights will increase prices of foods massively and abolish the system of low scale farming. Each and every farmer will need to rely on large corporations to grow crops, and GM foods will be seasonal that means in every season the seeds will expire and costs of storage and harvesting will sky rocket. All in all, the corporations will completely take over the food sourcing misleading people in what they produce for the sole purpose of profits. Thus, it will be considered legal and ethical. Regulations should be passed by governments all around the world that strictly insist on the labeling of genetically manufactured foods. Without labeling on the Genetically Modified Foods the health hazards, religious – ethical concerns, and economical concerns will increase over time. Therefore, instead of looking at the future from the eyes of the economic benefit, the world should look at the consequences this evolution could lead. Works Cited Page 1. â€Å"Genetically Modified Food. † Crowdsourcing Questions & Answers. N. p. , n. d. Web. 18 May 2011. 2. [6]Barton. â€Å"GMF Labeling Issues. † Harvard Law Review, Winter 2002. Web. 18 May 2011. . 3. Daneil, â€Å"Genetically Modified Foods | Better Health Channel. † Home | Better Health Channel. Deakin University. Web. 18 May 2011. . 4. [2]Grobe, and Raab. â€Å"Genetically Modified Foods | Better Health Channel. † Home | Better Health Channel. Deakin University. Web. 18 May 2011. . 5. [4] Lietz, supra note 11, at 416; Julie Teel, Regulating Genetically Modified Products and Processes: An Overview of Approaches, 8 N. Y. U. ENVTL. L. J. 649, 660-61 (2000) 6. â€Å"Genetically Modified Food. † Crowdsourcing Questions & Answers. N. p. , n. d. Web. 18 May 2011. .

Tuesday, October 22, 2019

Definition Of Hiv And Aids Health And Social Care Essay

I have chosen the subject of HIV/AIDS. In this written assignment, Firstly, I will get down by presenting what are HIV and AIDS and the influence of them. Second, I will bring forth some figure of the universe and besides in Hong Kong. Then, I will utilize the biopsychosocial theoretical account to depict the causes of HIV. Last but non rent, I will discourse the wellness publicity and Motivation Strategies.2. Definition of HIV and AIDS:Definition of HIV The short term of Human Immunodeficiency Virus is called HIV which is a virus and it is reported by Dr. Luc Montagnier in 1983. They can non reproduce and turn by themselves, they have to trust on a life being and infect the cell of them in order to retroflex. Viruss normally are found and killed by the human immune system rapidly, nevertheless, HIV could straight assail the human immune system which would impact our organic structure wellness and can non acquire rid of a virus. Definition of AIDS AIDS – Acquires Immune Deficiency Syndrome which is caused by inflexion of HIV which would destruct the human ability to contend with the diseases and malignant neoplastic diseases. AIDS is non a individual disease and it combine with timeserving infection which would occupy the unrecorded organic structure easy when the immune system is destroyed. Peoples with HIV are non equal to infect AIDS. For the people who inflect HIV can besides stay hibernating in organic structure for several old ages. During the average incubation period, for grownup, it would take ten old ages to develop AIDS on norm. And a batch of people with HIV may be unaware of their inflexion position and look healthy.3. InfluenceFor the people who have infected HIV are they are higher hazard to acquire septic and malignances because the immune system is harm which is called ‘opportunistic infects ‘ . The most common HIV-related timeserving infections and diseases includes the bacterial diseases and protozoal diseases, fungous diseases, Viral diseases and HIV-associated malignances. There are different status would look in different phase of HIV infection. For the first phase patient, they have higher rate to infect TB, bacterial pneumonia, malaria, staphylococcal tegument infections, herpes shingles and blood poisoning and more hard to retrieve. For the ulterior phase of the patient, the immune system is being more and more weak, it is easier for them to infect PCP, cryptococcosis and toxoplasmosis which can be fatal.4. Figure of HIV/AIDSHIV is a planetary epidemic. They affect different state of the universe. It could hold negative effects in households, communities and the whole states. From the above saloon chart, we can happen that the figure of people populating with HIV addition from 8 million in1990 to 34 million in 2010. Besides, in recent old ages, the overall figure of growing of the epidemic has become more stable and the one-year figure of the new inflexion has continuously decreased because of the increasing figure of people has received antiretroviral therapy. Furthermore, AID-related deceases figure has besides lessening. From the above saloon chart, it is clearly to see the bulk people populating with HIV is largely unrecorded in low and in-between income states, particularly Sub-Saharan Africa where has two-thirds of all septic people of the whole universe which carries the greatest load of the epidemic. Besides, South and South-East Asia is the 2nd highest figure of people who are infected HIV. Figure in Hong Kong This research is done by The Virtual AIDS Office ( VAO ) of Hong Kong. In Hong Kong, the first instance of HIV infection was reported in 1984. From the above artworks, we would happen that the figure of instance of people infected HIV maintain on increasing in recent old ages. The figure of instances has a mild bead in 2009 and 2010, nevertheless, the figure of instance in 2011 addition to a record high of 438 instances. Besides, it is clearly to happen the most inflexion were in grownup, male and Chinese. In 2011, there is 79 % of the reported instances were work forces and 66 % of reported instances is Chinese and the 83 % of the reported instances aged between 20-49 which is the highest. This pie chart show the suspected path of HIV transmittal in 2011, we would happen that the big proportion of people acquiring septic HIV is from sexual transmittal which includes 39 % of homosexual, 27 % of heterosexual and 4 % of bisexual. Besides, 3.5 % is infected from blood contact which includes contaminated blood, blood merchandises and acerate leafs.5. CausesBiological Causes Transmission of HIV – Sexual contact During the sexual contact, the seeds or vaginal discharge of the inflected spouse would straight in contact with the mucose membrane of the male and female ‘s generative organ. Therefore, homosexual and homosexual contact can convey HIV, such as vaginal, unwritten or anal sex. And the hazard of HIV transmittal would increase when there is ulcer and blood during the sexual contact. Blood contact HIV would be transmitted by contaminated blood, blood merchandises and acerate leafs because there is the high concentration of HIV in blood of the people inflected. It is common to happen that blood-borne transmittal of HIV frequently occurs when the drug users who infected HIV portion the acerate leafs with others. Besides, we would happen some instances in the wellness attention puting, such as needlestick hurts and the HIV transfuse to the blood or blood merchandise. Mother to infant infection During gestation, bringing or breasting eating, there is 15-40 % alteration that HIV can convey the baby if the female parent is infected. Psychological Causes There are a batch of psychological causes would increase the hazard of HIV. For illustrations, the personal depression, self-destructive ideas, deficiency of slumber would take to an addition of emphasis and may do some psychiatric jobs which would decelerate down our immune systems and we have to put more discoloration on it. Besides, for the people who have infected HIV it would take to high HIV viral tonss. Furthermore, addition of emphasis will do a batch of jobs. When people acquiring more and more nerve-racking, some people may take to travel to the recreational topographic point to loosen up themselves, such as clubbing, saloon and game centre. It is easier for them to run into some bad friend and they may misdirect them to take the drugs or have the sexual relation which would increase the hazard of HIV transmittal, such as blood contact and sexual contact. In add-on, for the people who have infected HIV, eating wont would besides impact the procedure from HIV to AIDS which is base on the diet of the patient. It would be faster if the patient is malnourished. Sociological Causes – For the underdeveloped state In the underdeveloped state, there is a deficiency of antiretroviral interventions and hapless wellness attention system which leads to the rate of people septic HIV remains in a high degree. Peoples in the development states are unawareness of HIV, For the modern society In the modern society, people are more open-minded. A batch of people may take to travel to the nine or saloon to loosen up after work and they may believe there is nil job to hold sex with person and it would take to an addition to the figure of people acquiring sexual contact. -Media The mass media ever play the cardinal function of the whole society and it would impact the head of the citizen. In the modern society, one of the causes that people acquiring more and more open-minded is affect by the media. Although they are non aim to direct whose messages to them, but when they watch the films or a Television programmes that the histrions can easy hold the sexual relation to others or they are taking drugs which would straight impact their head and they may desire to copy. It would increase the hazard of infect HIV through blood contact and sexual contact.6. Health publicity– Information and instructionThe effectual AIDS programme should advance the information and proviso of instruction which is the cardinal requirements. It should cover the all sectors of the society and educate them in a manner that they can easy understand and acceptable. Besides, it should be put attempt continuously to accomplish the result. HIV and AIDS instruction in schools For educating the immature about HIV and AIDS, the most common topographic point is to larn from school which is a important scene to educate the immature. School normally pays an of import function in determining the young person ‘s attitudes, sentiments and behaviour. Therefore, learning in school about the biological facets of HIV and AIDS is ideal environment for learning the societal. HIV and AIDS instruction in the workplace To forestall HIV/AIDS, the cardinal location is to educate them in the workplace. It is an of import manner to give them the information about what are HIV/AIDS, the causes and some bar. Besides, learning them at the workplace can make people who have non larn it before at school. Furthermore, there are some researches found that there are nine out of 10 people who are infected HIV are working. Therefore, supplying instruction at the workplace can assist the people live healthier. For the authorities, they can advance some plans of the International Labour Organization ( ILO ) for some company to fall in. One of the purpose of the International Labour Organization is to advance different prevent solutions at the workplace and back up the workers with HIV, such as supplying intervention and attention. -HIV and AIDS instruction through the mass media Besides the other effectual manner is educating the populace through the mass media. Mass media ever play the cardinal function in a batch of states in respond to HIV and AIDS. For illustration, UK authorities in order to raise the consciousness of the populace about the HIV and AIDS, they use the progamme called ‘blanket instruction ‘ which make good usage of the mass media that can cover the whole society, and it is truly successful in advancing HIV and AIDS.-Clinical and support serviceInformation and instruction is non sufficient to inform to public. The most critical measure is to supply the guidance, advice, medical interventions and support services which should besides cover the whole society, particularly for whole who are high hazard to infect HIV, such as the drugs users, commercial sex workers. These interventions and services are both indispensable to the AIDS programme which can contend against the disease. For illustration, for the bar of sexual Transmission of HIV, there are some sexually transmitted diseases ( STD ) clinics can advance some AIDS information and instruction to be informed to the patients, such as inform the people who have high hazard of infecting HIV should hold a regular trial. Besides, an effectual AIDS programme should develop some wellness professional to supply effectual interventions to the patients.7. Motivation Schemes-For the people who have non inflect HIV To forestall sexual contact Apart from abstention, safe sex should be reciprocally monogamous sexual relationship with an clean individual. If you do non cognize your spouse is affected or non, you should utilize the rubbers from the beginning whatever which types of sexual intercourse. Using rubbers can cut down the hazard of infecting HIV. To protect yourself and to love your sexual spouse, rubbers have to utilize decently and systematically. To forestall blood contact For drug user: There are 4 things that they can make to forestall the blood contact. First, they should avoid taking drugs and every bit shortly as possible to seek the drug intervention and rehabilitation services. Second, if person can non avoid taking drug instantly, the shooting method of taking drugs should be adopted and they should fall in the dolophine hydrochloride intervention programme. Third, if the drug users can non halt to shooting drugs, they should non portion panpipes and acerate leafs to other and they should utilize once-only panpipes and acerate leafs. Last, if the drugs users do non hold their ain syringe and acerate leafs, they should utilize bleach to unclutter the syringe twice and twice with H2O to avoid infection. For wellness attention workers: In the wellness attention puting, wellness attention workers are easier to hold some blood borne diseases such as HIV through needlestick hurt. If the accident occurs, to cut down the hazard of infection, first-aid direction is really of import. Furthermore, the most effectual manner to cut down the hazard of infection is to utilize cosmopolitan safeguards to all patients, such as have oning the protective barriers and rinsing manus often. To forestall female parent to infant infection For the adult females who are sing holding a babe or have been pregnant, if they are suspected to be infected with HIV, they should speak to their physicians or the AIDS counsellor and should hold an HIV antibody trial. Furthermore, to forestall mother-to-child transmittal, there is a manner to utilize antiretroviral drugs which can cut down the hazard of the kid acquiring septic HIV. For the people infected HIV: Have the Medical direction of HIV infection Although from now on, there is no such method to root up the disease, but there is some intervention have been made of AIDS. It includes two types, one is the antiretroviral drugs acceptance which can command the activities of the HIV, aid to reconstruct the unsusceptibility maps and minimise the harmful consequence of the virus. The other 1 is to hold some intervention and prophylaxis to minimise the hazard of timeserving infection. Using the above methods can better the wellness of the septic people and better their measure of life and endurance in people. Therefore, for the people infected, they should hold the regular medical followup for monitoring of the disease, so that the wellness attention professional can follow the instances. It can observe the complications earlier and have appropriate intervention which can better the endurance alteration. Control your emotion When the patients face the unwellness of HIV/AIDS, they must experience fear, uncertainness, guilt, anxiousness, choler and depression. However, it may something decline the state of affairs. Therefore, they should non deny their feeling. Ventilation of feeling may assist them to deciding the emotional job. You may portion your feeling and concern to person you trust. They may besides seek to derive reding support, there will be the societal worker to assist you.8. DecisionTo reason, from the above transitions, we would establish that the figure of people acquiring septic HIV is remind in a high degree. And the causes can divide into the biological, such as the transmittal of HIV, psychological, such as the emphasis and eating wont and sociological causes which depend on the different states and society. Furthermore, there is some wellness publicity which should educate the populace and supply some clinical intervention and services to them. Last, we have discussed the motive schemes which design for the people have non inflected and the patient with HIV. And I believe that with the above methods, the jobs of HIV/AIDS would be improved in foreseeable farther.