Thursday, December 26, 2019

Are Social Media Sites Keeping our Information Safe - Free Essay Example

Sample details Pages: 15 Words: 4437 Downloads: 7 Date added: 2019/04/10 Category Society Essay Level High school Tags: Social Media Essay Did you like this example? Introduction Technological advancements have greatly benefited our society. An example of a technological advancement that has benefited many people around the world was the creation of the Internet. The Internet makes it easier to search and look for information. Don’t waste time! Our writers will create an original "Are Social Media Sites Keeping our Information Safe?" essay for you Create order It has also allowed for it become easier for people to become interconnected with one another around the world. Social media websites or applications are created to allow users to create and share content or participate in social networking. These websites allow for users to make new people or become reacquainted with family or friends they have not seen in a long time. As great as the internet is there are some negative effects that social media websites have on their users, an example is that being that there are users who catfish other users which means that they create false identities to trick other users. Catsfishers arent not the only group of people that social media users should be concerned with rather there are other things on social media sites that should be more concerning to all users. One group of people they should be concerned with is hackers they are people who use computers to attempt to gain unauthorized access to data, which include social media websites. Users should be concerned with how safe are the social media websites they visit secure, if they are able to adequately protect their information. It will be interesting to find out the different kinds of security methods they use to ensure that their users are safely protected. Finding out whether or not social media websites use differing or similar security methods to keep users safe. If any of these websites prioritize keeping information safe for all the users and what they do if they notice any suspicious activity on their sites. If they offer any information that informs users on the dangers they can possibly face while using their websites. How they report any suspicious user activity and what they can do to make sure that they use the website safely. Keeping users information safe is not only the r esponsibility of the websites but as well as the responsibility of the user and knowing what they could be to make sure they arent vulnerable to any attacks. Users should be aware that there are certain activities that may pop on their screen that they should be precautious and shouldnt click on everything they see. They should be able to detect any form of phishing website links that may pop up on their page. It is imperative that users know what phishing attacks are. They should know where they have to report any suspicious behavior they see on their screen. They should know how to make sure that they can keep their personal information private. In order to understand how and why these social media websites get attacked the user should become aware of the different ways they can get harmed. Users should be aware that there are cybercrimes that are punishable with the law. All users should have a basic knowledge in what phishing attacks are and how they can become victims. The things they should keep an eye from to avoid becoming victims. If they do become victims the users should also be aware of how malware may affect their computer device. There was a moment in time when cybercrimes were committed and authorities could not punish these individuals because there werent any laws that punished cybercrimes. Although it takes time laws have been created in order to punish these different offenses and they are frequently amended to keep up with technological changes. Who uses Social Media? In order to see which groups of people are most vulnerable to cybernetic attacks on these websites we have to found out who uses these sites and why they use it. Finding out this information makes it easier to assess who the targets are and what can be done to protect them. Social media is used by different groups of people some who use it as a means to meet new people, voice their opinion are different subject, staying connected with friends and family or are looking to establish relationship with other users. Social media has the benefit that many people around the world can connect with one another. The invention of the smartphone has given people around the world easier access to the Internet. Which also means that it is easier for them to join social media websites and apps. Currently the major social media websites are Facebook, Twitter and Instagram. Of course there are many more social media websites but the ones mentioned above are currently the most popular. Social media we bsites or apps are built with the intention that they are easy to use so different types of people can use it. Demographics on social media websites vary on the sites they are subscribed to as well as the age group. Duggan and Brenner conducted research in 2012 on the demographics of social media users. Their research concluded that Facebook in that time was the most popular social media site usually used women ages 18-29. Their research also focused on the gender, race, education as well as ethnicity to see what sites are popular for each group. Their research sample included people of differing age, gender, education as well as being conducted in English and Spanish. It is also important to point out that their research was published in 2013 and it is obvious that their findings could possibly be outdated. Of course compared to 2012 more people presently own smartphones or have access to a computer that allows them to use the Internet. It is highly likely that more people use social media sites and the percentage for each website is higher than the numbers given by Duggan and Brenners 2012 research. But their research is helpful in the sense that it can be used as an estimate for the amount of people that use social media sites. These are groups of people who may be exposed to vulnerabilities that different websites may or may not have. Benefits of Social Media As stated previously a benefit of using social media is that ability to reconnect with family or friends that live far or near the user. There are people who firmly believe that social media is responsible for causing people to be less communicative with one another. Many believe that they are so focused in checking the phones constantly that they have become less concerned with people who are physically with them at the moment. Social media has caused many positive outcomes like the ability to communicate and discuss various topics with people around the world. It permits the user to see the opinions of others and it allows them to see why they think they way they do. People can see how different users around the world are influenced to think the way the do based on where they live. Social media sites allows for its young users to be able to voice their concerns through their websites. They are able to create awareness on a subject matter that many people didnt know existed. Through the use of a social media site a person can also be aware of the news that occurs near them or any place around the world. But a problem with this is the possibility that there may be fake news circulating through these websites and how can a user know whether or not what they are reading is factual or not. Its fantastic that have social media means that there is an easy instant way to communicate with people. Social media can be a great tool if a person has started a new business. It allows for them to promote their business online and depending the website they use it possibly may be free. They are able to find a larger range of consumers who did not know they existed. Not only can they do free self-promoting their business but allows them to see whether or not they are able to pro vide adequate services or goods for their consumers based on comments they may post. If they have satisfied customers it is highly likely that they will post their delight about the business on their social media accounts. These websites can also be used as a means of relaxation and enjoyment because some people think that they are fun to use. Using social media can allow the individual to take a break from work. It allows you to be able to see what the users friends are up to without needing to actually communicate with them. Perhaps the user may find it enjoyable to see when their friends comments on their posts.   Disadvantages of Social Media There are people that firmly believe that social media has caused more harm than any good for users. As stated previously people believe that social media can be attributed to people becoming less communicative with one another. People have become so addicted and attached to their cell phones they have become less aware what is going on physically around them. There are users who are focused on their online interaction with other users that they have forgotten the importance of making sure they also interact with people. It has become more difficult to interact people because they are focused on their smartphones and are frequently checking it out. Another con of using social media websites is that there is a high probability that the user will have more than one profile on different sites. Its not uncommon for one person to have a Facebook, Instagram or Twitter account. The problem arises when an individual may become overwhelmed with all the accounts they have to check on. They hav e to check messages on each social media site. It might be overwhelming for users to try to keep up with everything going on with their pages. Using social media can also been seen as a distraction and why people tend to procrastinate. People have the need to constantly check their smartphones to see look at their social apps and text messages they receive. People arent fully given their attention to a person or to the tasks they need to do. Using these apps can be used to as an excuse to prolong having to fulfill their responsibilities or tasks. Not only does it disrupt a persons daily routine it can also harm their sleep routine. People have spent hours at a time on these apps. It can also cause a person to be situated in one spot for hours at a time without moving at all. Humans have the basic need to fit in with their peers so they may be pressured to follow the social trends. They think that it is important for them to have a social media website because they everyone else they know has one. Teens and adults have been seen to do whatever they can to fit in with their peers. A negative consequence of this is that we hav e seen the increase of cyber bullying; which is when people use electronics to a bully a person by sending them threatening or intimidating messages. They also may create posts about an individual where multiple people can start commenting attacking the person. Of course person who is the victim of cyber bullying is high likely to develop stress, anxiety, or depression. In extreme cases there have been people who have been victims of bullying who have committed suicide. All these previously mentioned disadvantages of using social media are important to be aware of but one other issue that stands out the most would be the privacy issues that come with using social media apps or websites. People should be aware of the possible consequences of using any site. It is possible a person can become a potential victim if they post their geographic location on their social media website. Another case would be if a person decides to post something about their job this can be brought to the attention of their employers and a person can become at risk for getting fired. Sharing personal information on these sites can become a problem when there are people who can use this information against the user. A possible problem a person may face because of over sharing would be they think could inadvertently offend someone or a group of people. Once something is posted it will always stay on the Internet. It should be common knowledge that cybernetic attacks are becomin g frequently used by different groups of people around the world. They commit these crimes because it is easy to do. One benefit is that they do not have to leave the comforts of their home to do so. People have become more susceptible to these attacks because they are not aware they should be cautious of what they post. People dont realize that they expose themselves to become a victim when they carelessly post personal things about themselves on these websites. Without even realizing it people through the use of their social media pages have become victims of cybernetic crimes. As time progresses and the uses of the Internet increase there has been a dramatic increase of cybernetic crimes committed by people around the world. Cybernetic Crimes Cybernetic crime is also known as computer crime that refers to any crime that involves a computer and a network. It is an attack on information about individuals, corporations, or governments. Wadha and Arora article A Review on Cyber Crime: Major threats and Solution(2017) goes into detail that there is a broad spectrum on the different types of crimes that can be committed through the use of a computer. On one end of the spectrum of cybernetic crimes people are actively looking for digital information to steal to use against a person or who their own advantage such as stealing someones identity. On the other end of the spectrum there are individuals who are actively attempting to disrupt people from using the Internet by creating malware, viruses, or shutting down websites. A Review on Cyber Crime; Major threats and Solution(2017) state that people that are motivated to commit these crimes are computer nerds wanting to have bragging rights that they were able to hack a website. Th ere also business that rely on these methods to illegally search what their competitors are doing with their companies. Criminals are also searching for individuals personal information to sell the information on the black market. They made a valid point that countries now have to worry about terrorists using the Internet to commit cyber strikes. They could possibly hack the governments top-secret information to use against them. One of the problems that occur with cyber crimes is the lack of reporting by the victim. Often times these crimes are not reported because the individual hasnt realized that they have become a victim of a crime. Its extremely difficult to realize that an individuals private information has been stolen. Hackers have become resourceful in their methods to steal information without the users finding out. If they do find out they have been a victim to cybercrime sometimes people are unaware where they should report their crime too. Cybercrimes are not like regular crimes the perpetrator can be far or anywhere else around the world. Businesses are targeted not only by their competitors but also by hackers who are trying to steal their customers information. Hackers want customers personal information and their credit card information. Business sometimes decided not to report these crimes because it is bad for their business of course they dont want to lose their customers. Their security systems come into scrutiny because one of their main concerns is to make sure that their clients information is stored and safely protected. Failure to report these crimes becomes detrimental because no one knows the accurate numbers of these crimes. If the actually number is higher then the reported how are people supposed to combat these crimes? Criminal justice agencies may not be aware that they should have more personnel looking into these cybercrimes. Reporting crimes can lead to connecting whether or not the same person or groups of people are committing these crimes. It may lead to there apprehension. Laws on Cybernetic Crimes Technology is constantly and rapidly changing. Every year people have witnessed how technology changes and helps improve society as a whole. Like everything nothing can or should be considered to exist without any flaws or some kind of disadvantage. In the case of rapid technological change one of the major downsides of these constant changes is whether or not it is possible for the law to keep up these changes. In order for a law to be created it take to be created and to be passed at a legislation level. So it is possible that by the time the law is created it has become outdated. Questions whether or not itll ever be possible for laws to keep up with all the changes. The Department of Justice created a template based on their current knowledge of cybernetic crimes that are committed and their possible punishment for committing these crimes. Computer crimes started to become a problem within the nation in the early 1980s so in order to combat the rise of the crimes they created the Computer Fraud and Abuse Act (CFAA). It was also created so the federal government and states could be able to create laws to punish cybercriminals. The CFAA has been revised on multiple occasions in attempts to keep up with the constant change in technology. Eliminating and making sure to expand the statues in hopes to appropriate punish individuals for their crimes. Before then they had no idea on how to deal with the crimes or how they should be prosecuted so there were individuals that went unpunished for their crimes before these laws were created. Like regular crimes that are committed cybercrimes are also divided into felonies and misdemeanors. The more severe the crime the harsher the punishment they may face. The criminal may be forced to pay a fine and or spend time in prison. Cybercrimes can be committed anywhere it imperative to know that if the cybercriminal is another nation depending on the crime they committed they could possibly be extradited to the United States. An example would be if a criminal outside the US decides to use a computer and it affects the United States foreign commerce or communication, if there location is known the US could extradite them. More than often cyber criminals are usually individuals who are tech savvy so they make sure that they are able to hide their tracks. Sometimes these criminals are so good it is nearly impossible to know where their location is. The chart below was a table taken out of Prosecuting Computer Crimes(2015) is the list of possible punishment a person may face for co mmitting any cyber crime. The article was created 3 years ago meaning that it is possible that some of the information is outdated and more crimes can and should be added to the chart. The federal government uses the table below so they know how to prosecute computer crimes; it is important to note that conspiracy to commit and attempts of these crimes are also punishable. This serves as guideline for states to be able to create their own laws. It should be considered important to all social media users that there are cybernetic crimes that can be punishable. They should know that it is imperative if they are a victim of a cybercrime they report crimes that are committed against them to the proper authorities. Its important to do so because those criminals should be punished as well as it stopping them from targeting other people. This information can also be useful to the social media sites so they can find out how they can make sure their websites are safer for their users. They should be aware that anyone who attempts to illegally obtain their passwords to their accounts can and should be punished. One reason a criminal hacks into social media users accounts is in order to search for their personal information on their page. Another reason would be to access the information on their personal computers. One way the attempt to access personal account information is through the use of phishing attacks. Phishing Phishing attacks are defined as a kind of social engineering attacks that is used in order to steal a users data. Which also includes stealing login information from websites and the users credit card numbers. Originally phishing attacks were primarily done thru the use of emails but that gradually changed as more sites were created and the Internet was expanded. These criminals try to obtain information from people by impersonating as a trusted entity. However, nowadays, phishing attacks are increasingly sophisticated. Beyond email, phishing attacks spread via twitter direct messages, games on social networks, voice over IP phones and more; thus, blocking the phishing attacks from the source becomes increasingly difficult. (Gang, 2012). If the user unknowingly clicks on malicious link it may lead to installing malware on their computer or device. Examples of devastating consequences of clicking on fraudulent links are the possibility of unauthorized purchases, having the users funds stolen or suffering from identity theft. Hackers have become more resourceful in finding ways to trick users to clicking on their malicious links. Besides the examples previously provided hackers are also able to create fraudulent ads on social media pages. There have been cases where people believe that they are logging on to their social media accounts without realizing theyre putting their information on fake sites. When logging on to fake sites its almost nearly impossible to tell the difference between the actually site and their site because they are able to do a decent job at replicating the sites. People see the companys logo and assume theyre on the right websites without thinking to check on the links they clicked on. If users are paying close attention to what they are clicking theyll be able to tell that the URL they are clicking from another website. An example of fraudulent websites is like picture below the URL spells amazon incorrectly with two-letter Ns instead of one. In order to combat phishing attacks there are websites that make sure that they leave copyright information on the bottom of the page. Whenever a user is unsure whether or not theyre not the right webpage it would be a great idea if the scrolled to the bottom of the page to check for the company right information. This method isnt always isnt foolproof because these criminals also tend to create replicas copyright information on the bottom of the webpage. According to Jensens article, Training to Mitigate Phishing Attacks Using Mindfulness Techniques(2017) in order to combat phishing attacks company do three things  ¦automated removal or quarantine of phishing messages and corresponding websites; (2) automated warning mechanisms that notify individuals when they encounter a suspicious message or website; and (3) behavioral training during which individuals are taught to identify and report attacks. Companies are responsible in making sure they secure their websites but all users sh ould be aware of the risk they face by not making sure they are in authentic websites. In social media sites phishing occur more frequently than users tend to notice and realize they do. Getting Phished on Social Media (2017) article focused on explaining two kinds of phishing scams that people may incur on social media sites. According to Vishwanath (2017) article, one form of attack is that criminals create fake profiles on social media sites and attempt to befriend people. Usually these fake profiles have hundreds of friends that is why some users accept their friend request thinking that they are legitimate users. The second way they may attack a person is to directly extract an individuals information by sending them direct messages. In his article he states that it is frequently more difficult on social media sites to tell if the user exposes themselves to a phishing scam due to the fact that there are users who are not aware that such attacks can take place on social media sites. The picture above is from a random Facebook account, it is an example on fraudulent ad on someones home page. If a person pays close attention and reads the ad theyll notice that the URL says www.walmart100.com, clearly a spoof link. On the bottom of the picture it also says its a click bait scam in order to get personal information from someone. All social media users should be aware and cautious of possibly being a victim of a phishing attack. As mentioned before being contacted by the scammers is one to become a victim. Another possible way to become a victim on a social media page is that scammers are able to create fraudulent links on their home pages. Not only that but they are able to create fake advertisements; people on their accounts homepage are able to see and click on the links. In some cases it may be clearly to anyone that the ads on the page are suspicious and it is not a good idea to click on them. These scammers have become more creative in creating different kinds of phishing attacks and all users should be aware of who and what the click on they are on their accounts. If they are unsure they should report the suspicious link to the website page or block the random person who has request to be their friend. People are unaware that the link on they clicked on is apart of phishing attack that may introduce a malware on to the device or computer the person is using. Malware Malware is defined as any piece of software that was created with the intention to harm data, devices or to people. Some examples of malware are viruses, Trojans or spyware. When a computer or device is infected with a virus it can attach themselves with clean files and infect other clean files in order to delete or corrupt files. Trojans is a dangerous malware that was created to appear as legitimate software. The goal of this particular malware is to create backdoors in the devices security to let other malware in. Obviously spyware was created to steal information on an individuals computer or device. It hides within the computer system since the user is unaware that the spyware is keeping track to the different passwords the user has for different accounts.

Tuesday, December 17, 2019

The Criminal Of Criminal Profiling - 1830 Words

Criminal profiling is a process by which, evidence found at a specific crime scene, is analyzed in order to determine plausible offender character traits. Furthermore, the main objective of this practice is to identify significant personality and demographic characteristics that help draw a comprehensive picture of what type of person is capable of committing the crime in question. Criminal profiling has been used to aid in investigative proceedings, however, admissibility in the courtroom has been called into question since very little research has been done to assess the validity of the generated profiles. In the past, profiling was more of an unplanned habit in which police officers turned to psychologist and psychiatrists to give insight on complex criminal inquiries, yet in recent times, the call for a more widespread acceptance of this methodology has amplified. This can be attributed in part to the portrayal of criminal profiling in media outlets. Television shows like Crimina l Minds serve to sway public opinion and by promoting the efficacy of profiling in general. Therefore, an analysis into whether or not televised depictions of criminal profiling are realistic is warranted since such representations have an impact on public opinion and transitively, the legal system as a whole. First a foremost, an understanding of the premise of Criminal Minds is necessary to situate the analysis that will follow. Each episode of the program revolves around an elite team ofShow MoreRelatedCriminal Profiling1152 Words   |  5 Pagesinformation on criminal profiling. Some psychiatrists, criminologists, and psychologists believe there are specific traits, psychological factors that will separate a person from the rest of society. This thesis will explain that criminal profiling will help narrow the list of suspects from rape and homicide by formulating the type of person whom the investigators should be looking for. How long does he or she think criminal profiling has been used in law enforcement? Criminal Profiling Read MoreCriminal Profiling1917 Words   |  8 PagesCriminal Profiling The term â€Å"serial killer† was derived from a man named Robert K. Ressler, who, in the 1970’s deemed this term because of the term the English used; â€Å"crimes in a series† and because of the serial films he grew up watching. (Freeman, 2007) Prior to the term serial killer, people would use the terms, mass murders and stranger-on-stranger crime. The definition of a serial killer, according to dictionary.com is; â€Å"a person who attacks and kills victims one by one in a seriesRead MoreCriminal Profiling, Criminal, And Forensic Psychology1226 Words   |  5 PagesCriminal profiling is another subject of criminal and forensic psychology, which is probably one of the oldest studies of forensic science. Criminal profiling has been called many things, such as behavioral profiling, crime scene profiling, criminal personality profiling, psychological profiling, and more recently even criminal investigation analysis. Criminal profiling’s history h as come from a history of criminal behavior, the study of mental illnesses, and forensic examinations. Criminal profilingRead MoreCriminal Profiling And The Criminal Justice System1117 Words   |  5 Pagesa person from the rest of society. Criminal profiling is the approach that an individual who commits a crime, may leave some sort of psychological evidence that can be crucial to an investigation. This theory is a vital part of the criminal justice system today. Criminology targets why individuals commit crimes and why they behave in certain situations. By understanding why a person commits a crime, you can develop ways to control crime or change the criminal to a certain extent. There are manyRead MoreCriminal Profiling And Racial Profiling1373 Words   |  6 PagesCriminal Profiling and Racial Profiling. Criminal profiling has been around since the 1880’s, and up to this day, that method still has not had a great success rate. Also, racial profiling has not had a great success rate either through the years. At times, innocent people get detained and charged with crimes that they never committed due to matching the characteristics of other suspects. In other words, creating assumptions that will narrow down a suspect is just not the best method to utilizeRead MoreRacial Profiling And Criminal Profiling Essay1538 Words   |  7 PagesRacial Profiling Vs Criminal Profiling Camilo Paez Briarcliffe College Professor Keirnan 11/13/2016 â€Æ' Executive summary Racial Profiling is a big problem is society. Over time you become biased of certain groups which is good and bad. Criminal profiling helps keep the bad guys off the streets. This maybe be also linked with being racist according to the people stopped by police. As a police officer you never win because no one wants to go to jail. It is very hard to â€Æ' Racial Profiling VsRead MoreThe Validity Of Criminal Profiling Essay1531 Words   |  7 PagesThe Validity of Criminal Profiling and its Effectiveness on Solving Crime In law, law enforcement relies on a variety of approaches to solving crimes. One method of doing so, is criminal profiling. Police use criminal profiling as an aid to identify the typology of individuals most likely to fit the suspect profile. In this approach, evidence of a crime is used to identify the characteristics of the criminal in relation to their personality and psychological state of mind. As wellRead MoreEssay on Criminal Profiling1253 Words   |  6 PagesCriminal profiling is one of few first things to think of when it comes to forensic psychology. Criminal profiling is featured in popular television shows such as in Law and Order and CSI. Often in those shows, the police officers were able to catch the criminals based on the criminal profile that forensic psychologists came up with. In a theory, the polices rely on criminal profiling to catch criminals, educate the public about a possible criminal, and confirm the witnesses’ accounts. Criminal Read MoreCriminal Profiling Essay2440 Words   |  10 PagesThe Origin and Art of Criminal Profiling Sawyer Thompson Southwest Baptist University December 13, 2011 Abstract Criminal profiling is a process by which investigators attempt to solve a crime through careful analyzing of data and patterns. It can be found in numerous places throughout history, from the Roman Catholic Church to World War II to the present day. It officially began in the Behavioral Science Unit; Howard Teten, Pat Mullany, Robert Ressler, and JohnRead MoreCriminal Profiling Essay1767 Words   |  8 Pagespsychopathology is called criminal profiling. Around the country, several agencies rely on the minds of criminal psychologists to lead them in the right direction to finding the correct offender. Criminal profiling provides investigators with knowledge of the appearance and behavior of a potential criminal. Criminal profilers are primarily employed by the Federal Bureau of Investigation, most commonly known as the FBI. (Walker) The Central Intelligence Agency (CIA), Army Criminal Investigation Division

Monday, December 9, 2019

Symptoms and Biochemical Screening †Free Samples to Students

Question: Discuss about the Symptoms and Biochemical Screening. Answer: Introduction: Cushings syndrome encompasses a collection of symptoms and signs that occur due to prolonged cortisol exposure. In other words, Cushings syndrome or hypercortisolism occurs due to abnormality in the levels of cholesterol. Corticosteroid medications are considered as a primary reason for this physiological abnormality (Lacroix, Feelders, Stratakis Nieman, 2015). Most common symptoms of this condition include hypertension, abdominal obesity, round red face, lump between shoulders, muscle weakness and weak bones. This essay will contain a discussion on a case study of a patient Susan Summers and will describe the etiology, pathophysiology, cause and symptoms of this health abnormality management. Pathophysiology refers to the disorder or disrupted physical processes that are associated with development of an illness or disease. The pituitary gland and hypothalamus, located in the brain are responsible for the disease. The hypothalamus comprises for paraventricular nucleus (PVN), which releases CRH, the corticotropin-releasing hormone. This hormone is responsible fro stimulating the pituitary gland, which in turn gets triggered to release the polypeptide tropic hormone, adrenocorticotropin (ACTH) (Manenschijn et al., 2012). This hormone is found to get released in the bloodstream and travel along it, followed by reaching the adrenal glands, located on the top of kidneys. Upon reaching the adrenal gland, ACTH facilitates secretion of cortisol. Evidences suggest that cortisol belongs to the class of glucocorticoids and are released by the zona fasciculata layer of the adrenal cortex, in response to ACTH secretion (Lodish, Dunn, Sinaii, Keil Stratakis, 2012). An increase in the levels of cortisol is found to create a negative feedback loop on corticotropin hormone, which results in a subsequent reduction in the ACTH amount released from the anterior pituitary (Dekkers et al., 2013). Cortisol is responsible for regulating blood pressure and maintain normal functioning of the cardiovascular system. Thus, cortisol-releasing adenoma present in the adrenal cortex of the adrenal glands can be considered as the primary aetiology of Cushings syndrome. This results I an elevation in the levels of cortisol. A dexamethasone suppression test, followed by MRI of the pituitary gland and CT scan of the adrenal glands confirms the disease. The potential causes or aetiology of Cushings syndrome include prescribed administration of glucocorticoids for the treatment of other health abnormalities. Corticosteroid treatment is used for a plethora of diseases such as, rheumatoid arthritis, asthma, or immunosuppression after an organ transplantation to prevent the immune cells from rejecting the transplant. Administration of medroxyprogesterone is also considered as a major factor that contributes to development of Cushings syndrome (Stratakis, 2012). It results in glucocorticoids are found to downregulate the release of ACTH hormone. Furthermore, a deviation from the normal functioning of the body in cortisol secretion also result in a condition, commonly referred to as endogenous Cushings syndrome. ACTH secretion is also found to occur from tumors located outside the pituitary-adrenal system, which in turn creates an impact on the adrenal glands (Guaraldi Salvatori, 2012). This aetiology is commonly referred to as paraneopl astic Cushings syndrome, due to its association with cancer cells in the body (de Bruin et al., 2012). Excess cortisol secretion can also occur due to high levels of stress, malnutrition, alcoholism or depression. Thus, the fact that Susan consumes wine on a regular basis significantly contributes to her current medical state management. Most common signs and symptoms associated with Cushings syndrome include rapid gain of weight, in the face and trunk, sparing certain parts of the limbs. Accumulation of fat along the collarbones, back of neck and face are commonly observed. Other major symptoms encompass capillary dilation, excess perspiration, skin thinning that results in dryness and bruises along the hands, red or purple striae, muscle weakness or hypoglycemia (Nieman, 2015). Women suffering from the condition are also found to suffer from irregular menstrual period and thicker facial or body hair. In addition, other symptoms such as, cognitive impairment, headache, impaired growth among children, emotional disturbances, and hypertension may also be observed. Thorough assessment and monitoring of post-operative patients are considered imperative for identifying all kinds of deterioration in the prevailing health condition. Such physical assessments involve measurement of a patients vital signs that encompass evaluation of the major life-sustaining functions of the physiological system. Measurements of vital signs help in assessing the general physical condition of the individual and also provides cues to detect probable health deteriorations or recuperation from a disease. Susans post-operative respiratory rate (RR) was found to be 30 breaths per minute. It commonly refers to the number of breaths taken by a person per minute. In other words, it indicates the number of movements that depict inspiration and expiration per unit time. Normal levels of RR range from 16-20, at rest (Elliott Coventry, 2012). This suggests that the patient Susan is suffering from tachypnea, where her RR has increased beyond 20 bpm. Blood pressure is another vital sign, the normal range of which is around 120/80 mmHg (Elliott Coventry, 2012). The patient demonstrates a higher blood pressure (160/90 mm Hg), that indicates presence of hypertensive symptoms. Her post-operative vital signs also show a huge deviation from the normal pulse range of 50-80 bpm for adults, which indicate the rate at which the heart beats for pumping blood in the arteries. Pulse rate of 128 bpm area clear indication of deterioration in the health status, following laparoscopic right adrenalectomy (Elliott Coventry, 2012). Susan also demonstrates a decrease in body temperature, below the normal range 36.5 C. Evidences suggest that elevated heart rate are found to be associated with an increase in blood pressure or hypertension. Normal urine output is around 800-2000 milliliters/day with an intake of 2 liters/day. Low urine output can be attributed to the surgical procedure of adrenalectomy that was performed in the patient. High abdominal pressure due to pneumoperitoneum contributes to a reduction in urine production. Overweight is also considered as a major risk factor that contributes to an increase in blood pressure (Nguyen Lau, 2012). Furthermore, regular alcohol consumption results in a temporary increase in blood pressure, and heart rate and results in weakening of the heart muscles. This contributes to irregularities in the heart beat. Moreover , associations have also been established for obesity and respiratory complications that result in an increased demand for ventilation (Sarkhosh, Birch, Sharma Karmali, 2013). This elevates the breathing rate due to inefficiency of the respiratory muscles. Alcohol consumption can have also been linked to diminished respiratory compliance. Moreover, the post-operative deteriorating vital signs can be directly correlated with Cushings syndrome. Hypertension occurs due to the fact that renal conversion of cortisol hormone to cortisone gets reduced in the disorder. This directly elevates mineralocorticoids., which in turn result in increased reabsorption of tubular sodium, and hypokalemia. Cortisols also inhibit the vasodilators, thereby increasing blood pressure (Prodam et al., 2013). The glucocorticoids exert their direct effect on the heart that results in tachycardia (over 100bpm). Furthermore, hypertension leads to dysregulation of the autonomic nervous system that leads to heart rate variability. Hypothermia refers to core bosy temperatures that are below 35C. It results in a drastic drop in the metabolic rate of the body. At such low temperatures, the bosy will fail to produce the necessary heat and the core body temperature will quickly drop. This will make the patient shiver, followed by contraction of the blood vessels and release of hormones to facilitate heat generation. A direct impact of the condition will be observed on the other vital signs such as, blood pressure, respiratory rate and heart rate, all of which will increase. Further drop in temperature will lead to reduction in oxygen consumption, and irregular heart rhythm. Major effects will be manifested in the form of reduced cardiac output, slow brain activity, dilated pupils, and a state of coma (Pasquier et al., 2014). Post-operative safe care involves administration of a regular diet after problems of nausea get resolved. All wounds should be closed using skin glue and the patient might be allowed to shower the following morning. Performing exercise should be prevented until 10 days following the operation. Deep breathing exercise and administration of Tylenol are required to relieve pain and aches (Dimopoulou et al., 2014). Persistent swelling or calf pain would indicate presence of blood clot and the patient should be immediately assessed. The patient needs to be started on steroid therapy such as, prednisone to restore normal functioning of the adrenal gland (Hartmann et al., 2016). NSAIDs such as, naproxen and ibuprofen should also be prescribed for immediate pain relief. Narcotics might result in constipation. Thus, there is a need to intake extra fluids, fiber, along with usage of stool softeners. Several healthcare professionals will play a major role in enhancing the health outcome and subsequent patient satisfaction in this context. A nutritionist would play an essential role in evaluating the diet consumed by the patient on a regular basis. This healthcare professional will be responsible for formulating a diet plan that includes around 8 ounces or 2 liters of daily fluid intake. The nutritionist will also help in making the patient consume a diet that is rich in fibers, such as, whole grain, cereals and fruits (Dietiticians association of Australia, 2014). The endocrinologist will also assist in the patients long term recovery by monitoring and balancing long-term hormonal imbalances in the body. He/she will be involved in administering selective steroids following the surgery to restore the levels of coritsol in the body, Another healthcare professional imperative to improvement of patient health is a physical therapist who will assist the patient in pain reduction and mobility restoration (Australian physiotherapy association, 2016). This professional will help the patient during walking or climbing steps. Thus, complete assistance from the aforementioned healthcare professionals are needed to improve Susans health condition. To conclude, it can be stated that Cushing syndrome is a major health abnormality that occurs due to prolonged exposure of the human body to cortisol hormones, and results in fat accumulation in the face, shoulders and marks on the skin. This occurs due to improper functioning or tumor of the adrenal glands. Thus, surgical removal of the adrenal glands are essential to restore normal body functioning. References Australian physiotherapy association. (2016). Scope of Practice. Retrieved from https://www.physiotherapy.asn.au/DocumentsFolder/APAWCM/Advocacy/Scope%20of%20Practice_with%20on%20brand%20diagrams.pdf de Bruin, C., Hofland, L. J., Nieman, L. K., Van Koetsveld, P. M., Waaijers, A. M., Sprij-Mooij, D. M., ... Feelders, R. A. (2012). Mifepristone effects on tumor somatostatin receptor expression in two patients with Cushing's syndrome due to ectopic adrenocorticotropin secretion. The Journal of Clinical Endocrinology Metabolism, 97(2), 455-462. https://doi.org/10.1210/jc.2011-1264 Dekkers, O. M., Horvth-Puh, E., Jrgensen, J. O. L., Cannegieter, S. C., Ehrenstein, V., Vandenbroucke, J. P., ... Srensen, H. T. (2013). Multisystem morbidity and mortality in Cushing's syndrome: a cohort study. The Journal of Clinical Endocrinology Metabolism, 98(6), 2277-2284. Dietiticians association of Australia. (2014). Nutrition Support Role Statement: Role Statement for Accredited Practising Dietitians practising in the area of Nutrition Support. Retrieved from https://daa.asn.au/wp-content/uploads/2016/12/Nutrition-Support-Role-Statement-1.pdf Dimopoulou, C., Schopohl, J., Rachinger, W., Buchfelder, M., Honegger, J., Reincke, M., Stalla, G. K. (2014). Long-term remission and recurrence rates after first and second transsphenoidal surgery for Cushing's disease: care reality in the Munich Metropolitan Region. European journal of endocrinology, 170(2), 283-292. doi: 10.1530/EJE-13-0634 Elliott, M., Coventry, A. (2012). Critical care: the eight vital signs of patient monitoring. British Journal of Nursing, 21(10), 621-625. https://doi.org/10.12968/bjon.2012.21.10.621 Guaraldi, F., Salvatori, R. (2012). Cushing syndrome: maybe not so uncommon of an endocrine disease. The Journal of the American Board of Family Medicine, 25(2), 199-208. Hartmann, K., Koenen, M., Schauer, S., Wittig-Blaich, S., Ahmad, M., Baschant, U., Tuckermann, J. P. (2016). Molecular actions of glucocorticoids in cartilage and bone during health, disease, and steroid therapy. Physiological reviews, 96(2), 409-447. https://doi.org/10.1152/physrev.00011.2015 Lacroix, A., Feelders, R. A., Stratakis, C. A., Nieman, L. K. (2015). Cushing's syndrome. The lancet, 386(9996), 913-927. https://doi.org/10.1016/S0140-6736(14)61375-1 Lodish, M., Dunn, S. V., Sinaii, N., Keil, M. F., Stratakis, C. A. (2012). Recovery of the hypothalamic-pituitary-adrenal axis in children and adolescents after surgical cure of Cushing's disease. The Journal of Clinical Endocrinology, 97(5), 1483-1491. https://doi.org/10.1210/jc.2011-2325 Manenschijn, L., Koper, J. W., Van Den Akker, E. L. T., De Heide, L. J. M., Geerdink, E. A. M., De Jong, F. H., ... Van Rossum, E. F. C. (2012). A novel tool in the diagnosis and follow-up of (cyclic) Cushing's syndrome: measurement of long-term cortisol in scalp hair. The Journal of Clinical Endocrinology Metabolism, 97(10), E1836-E1843. https://doi.org/10.1210/jc.2012-1852 Nguyen, T., Lau, D. C. (2012). The obesity epidemic and its impact on hypertension. Canadian Journal of Cardiology, 28(3), 326-333. DOI: https://doi.org/10.1016/j.cjca.2012.01.001 Nieman, L. K. (2015). Cushing's syndrome: update on signs, symptoms and biochemical screening. European journal of endocrinology, 173(4), M33-M38. doi: 10.1530/EJE-15-0464 Pasquier, M., Zurron, N., Weith, B., Turini, P., Dami, F., Carron, P. N., Paal, P. (2014). Deep accidental hypothermia with core temperature below 24 C presenting with vital signs. High altitude medicine biology, 15(1), 58-63. https://doi.org/10.1089/ham.2013.1085 Prodam, F., Ricotti, R., Agarla, V., Parlamento, S., Genoni, G., Balossini, C., ... Bellone, S. (2013). High-end normal adrenocorticotropic hormone and cortisol levels are associated with specific cardiovascular risk factors in pediatric obesity: a cross-sectional study. BMC medicine, 11(1), 44. https://doi.org/10.1186/1741-7015-11-44 Sarkhosh, K., Birch, D. W., Sharma, A., Karmali, S. (2013). Complications associated with laparoscopic sleeve gastrectomy for morbid obesity: a surgeons guide. Canadian journal of surgery, 56(5), 347. doi: 10.1503/cjs.033511 Stratakis, C. A. (2012). Cushing syndrome in pediatrics. Endocrinology and Metabolism Clinics, 41(4), 793-803. https://doi.org/10.1016/j.ecl.2012.08.002

Monday, December 2, 2019

Middle Childhood free essay sample

Identify your topic choice: Social Skills Provide a 1 paragraph summary of your topic: I want to look deeper into the social aspects of early childhood education. I find it fascinating that early childhood aged children have already developed most of their basic ground social skills, and will build from there on up. What makes your topic appropriate for the age group you have chosen (1-2 sentences): I believe that early childhood is an age that as a teacher, I can be very influential in molding them in the right way socially and helping them set the basis for major social skills that they will use for the rest of their lives. The social skills you learn in early childhood usually stick with you forever. Early childhood is a time for planting the right seeds in them for a future of successful growing. Â  List your 2 outside resources in APA style: How does your theory help to explain or apply to your topic (2-3 sentences): This theory will help to explain my topic because I am interested in how social skills of early childhood aged children change over time and how social factors affect how they react to certain situations. We will write a custom essay sample on Middle Childhood or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This theory focuses on outside factors contributing if not mainly affecting the cognitive development of a person. Identify who (or where) you plan to observe/interview: I plan to observe/interview a third grade classroom at Worthington Estates Elementary school. I am going to interview the teacher, as well as a few of the students to get the teacher’s outside opinion on certain issues, as well as the student’s personal first hand experiences. I believe this setting is appropriate for my topic and theory because I will be able to gain knowledge on the same issues but from different views. This will give me a great range of feedback on my topic. Although you likely have not completed your observation, I would like to see an example so that I know whether or not you are on the right track. So, in the space below, you may either make up your own example and how it applies to your topic, theory, and age group, or, you may use this sample: o Donny talked back to his mother at the dinner table. His mother told him that this was rude and continued eating. A few minutes later, Donny talked back to his mother again. Can you take this pretend observation and relate it to an appropriate age group, topic, and theory and how it can be explained by these elements? If so, you’re likely on the right track for your own observation examples. Donny may have talked back to his mother the first time because he did not know that it was wrong, or did not realize that it was rude. If Donny is an early childhood aged child, then according to Vygotsky’s theory, he will pick up on what his parents or older peers do and think that is the appropriate way to act. He may have seen his parents in an argument and talking back to one another. If Donny saw this and thought that it was okay, he may perform these acts and not think anything is wrong by doing it. Then, when his mother tells him that it was rude, he may not take it seriously since he has seen her do it when she didn’t know she was watching. Middle childhood free essay sample Tracy, a ten year old is undergoing a vigorous amount of pressure from his parents. The amount of pressure his parents is laying on him has caused him to withdraw from school activities including his friends. There were circumstances that took place in his family’s past that lead into Tracy’s parents contemplating divorce. Tracy is in his middle childhood years. This is the point inn a child’s life where they develop socially and mentally. When children reach this stage they are able to make new friends and gain new skills, which will enable them to become more independent and enhance their individuality. This is the stage where children experience more peer pressure than pressure from parents. Tracy may be undergoing a sense of perfection so he allows his parents to influence his academic activities and because he would want to meet his parents needs the pressure they put on him would have negative effects, therefore causing him to pull away. We will write a custom essay sample on Middle childhood or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Not only is the pressure from his parents affecting him negatively but the past events that took place resulting in his parents considering divorce can effect Tracy negatively. At this stage in life, when a child’s family goes through major events such as divorce the child may feel like they are they reason to blame. Divorce can weigh heavily on a child and it can be the reason in the decrease in grades. Some children do not know how to handle their parents splitting up and in result they create a shell for themselves. As a mental health counselor the first step in help Tracy through this obstacle in life is finding ways to help him cope with the events taking place at home. Home is where all his troubles seem to begin. Tracy’s parents don’t need to pressure him but need to encourage him to be more involved in school activities and try to maintain friendships. At this stage making friends is very more to the child because it gives them a sense of belongingness. Once Tracy is able to cope with things at home everything else may begin to pick up such as his grades and becoming more involved.