Sunday, May 17, 2020

A Research Paper About Human Immunodeficiency Virus

A Research about Human Immunodefiency Virus I. HIV or Human Immunodeficiency Virus is a lentivirus responsible for gradually destroying the human immune system, and subjecting it to various invincible opportunistic infections. It is the most complex virus ever encountered by mankind. Many of its mysteries have been unleashed through persistent research and studies. While many, are yet to be revealed. II. There are a lot of things to know about this virus. A. History of HIV The human immunodefiency virus (HIV) descended from the related simian immunodeficiency virus (SIV), which infects apes and monkeys in Africa. Scientists had identified a type of chimpanzee in West-Central Africa as the source of the virus†¦show more content†¦In 1984, a Canadian flight attendant died of AIDS because of his sexual connection to a number of the first victims of HIV/AIDS. It was assumed that he was responsible for introducing the virus into the general population. In the same year, Western scientists became aware that HIV/AIDS was widespread in parts of Africa. Also, the world’s first needle exchange program was set up in Amsterdam, the Netherlands. One of the first high profile victims of HIV/AIDS was Rock Hudson, an American gay actor who had been married and divorced earlier in life, who died on October 2, 1985 having announced that he was suffering from the virus on 25th of July that year. He had been diagnosed during 1984. A notable British casualty of HIV/AIDS that year was Nicholas Eden, a gay Member of Parliament and son of the late Prime Minister Anthony Eden. In the same year, an HIV test was licensed for screening blood supplies. AIDS was found in China, and had therefore been seen in all regions of the world. In 1986, more than 38,000 cases of HIV/AIDS have been reported from 85 countries. In 1987, AZT was approved as a drug used for treating HIV/AIDS. The next year, the American government conducts a national HIV/AIDS education campaign. Health ministers met to discuss AIDS and established the World AIDS Day. In 1990, around 8 million people were living with HIV worldwide. The virus claimed perhaps its most famous victim yet on November 24, 1991, when British rock starShow MoreRelatedModern Day Methods Of Contracting1113 Words   |  5 PagesAbstract This paper breaks down and defines what SIV is, the different subfields involved, and which species they originate from. The zoonotic transmission of the SIV virus from these non-human primates is discussed as well. As a result of these transmissions, the human immunodeficiency virus is brought to life. In this paper, this virus and its journey throughout history will be explained. Also, HIV and the different subfields this virus can be classified in are discussed throughout the research. As wellRead MoreHuman Immunodeficiency Virus ( Hiv )1359 Words   |  6 PagesThis paper explores the human immunodeficiency virus (HIV) as well as the simian immunodeficiency virus (SIV). The virus has infected two million adults and children by the year 2005 already. The virus continues to race around the world, and new HIV infections are at 50,000 per year (Martine Peeters, Matthieu Jung, Ahidjo Ayouba) (2013). The final outcome of the HIV infection is Acquired Immune Deficiency Syndrome (AI DS). There are many treatments that have developed to help the large numberRead MoreHuman Immmunodeficiency Virus Research Paper1147 Words   |  5 Pages Human Immunodeficiency Virus and its Impact in Urban Areas Nakeria Cook California University of Pennsylvania Health Systems Management Archish Maharaja December 15, 2017 Abstract The purpose of this research is to provide insight into the prevalence of human immunodeficiency virus (HIV) in urban areas, particularly those who are at an economic disadvantage. This research will provide background on what HIV is, its history and the result that have been concluded based on the research andRead MoreAIDS Essay examples1537 Words   |  7 PagesResearch Paper: AIDS Did you know that in the United States of America the sixth leading cause of death in people from their mid 20’s through their mid 40’s is AIDS (Zuger, 2010)? AIDS stands for Acquired Immune Deficiency Syndrome and is a disease derived from the virus known as Human Immunodeficiency Virus. The immune system gets broken down when someone has AIDS and it is basically the highest form of HIV. When a person has HIV, the CD4 cells get infected and start to deteriorate and once theRead MoreThe Human Immunodeficiency Virus ( Hiv )948 Words   |  4 PagesThe Uses of Blood by the HIV Virus Blood-borne diseases have contributed greatly to poor health outcomes among individuals and communities. Though blood fulfills various functions to ensure our survival, it can also act as the mechanism through which we become diseased. Understanding the characteristics of such infectious diseases is essential to preventing further cases. In this paper I will discuss how the human immunodeficiency virus (HIV) uses blood to cause illness within the infected individualRead MoreThe Human Immunodeficiency Virus ( Hiv )1529 Words   |  7 Pages Human Immunodeficiency Virus Typing Template for APA Papers: A Sample of Proper Formatting for the APA 6th Edition Sheela Jose Grand Canyon University: HIV Known as a Communicable Disease A communicable disease is known an illness that results from an infectious agent that occurs through transmission either indirectly or directly, from an infected individual. The human immunodeficiency virus is considered a communicable disease, and will be explored further in relation toRead MoreHIV and Aids are something that have been a major problem in a large part of the world for many1400 Words   |  6 Pagesperson to receive the virus. As of today, there is still no cure for these horrible diseases. Until scientists and doctors are able to find a medicine that can cure them, many people will continue to be affected by these diseases. This research paper will break down each virus separately to better explain what they exactly are and how they affect people by their signs, symptoms, etc. The first virus I researched was that of HIV. HIV stands for Human Immunodeficiency Virus. To better break itRead MoreHuman Immunodeficiency Virus: Causes, Symptoms, Modes of Transmission, Demographics, and Health Statistics1454 Words   |  6 PagesIntroduction The following paper analyzes a description of a communicable disease Human Immunodeficiency Virus (HIV), its symptoms, mode of transmission, demographic and health statistics. It also summarizes the role of the community health nurse in response to the disease as well as, identifying a national agency or an organization that tries to address the issue of HIV as they give ways of resolving or reducing its impact in the economy. A communicable disease is a diseases transmitted whenRead MoreHiv / Aids ( Human Immunodeficiency Virus / Acquired Human Immune Deficiency )1249 Words   |  5 PagesAbstract This papers provides a brief introduction to the topic of HIV/AIDS, (Human Immunodeficiency Virus/Acquired Human Immune Deficiency) from its early appearance as a deadly communicable disease that causes a viral infection in humans. During the 1960’s the infection was largely due to unprotected sex; the victims contracted the disease mostly due to unprotected sexual contacts from others who already had the virus. It became an epidemic and even pandemic. Those infected eventually died fromRead MoreAcquired Immunodeficiency Syndrome in Africa922 Words   |  4 Pages Acquired Immunodeficiency Syndrome (AIDS) in Africa is the most affected area that it has reverse expected population growth to a net decrease (Oxford Analytica Ltd). Africa is the number one countries with the highest rate of HIV and AIDS among the other fifteen countries (Patel). HIV and AIDS spread among adults, teens, and even to children who know nothing. Around 35 to 42 million people are living with Human I mmunodeficiency Virus (HIV) and AIDS all over the world. However, about 25.5 million

Friday, May 8, 2020

Speech Title Love Should Not Hurt Domestic Violence...

The Persuasive Speech Name: Jessica Baeza Section: COMM 101-111 Speech Title: Love Should Not Hurt: Domestic Violence Awareness General Purpose: To persuade Specific Purpose: To persuade my audience to increase domestic violence awareness Organizational Pattern: Monroe’s Motivated Sequence INTRODUCTION: (1) Attention Getting Device: According to an article titled â€Å"Don’t Believe in the War On Women? Would a Body Count Change Your Mind?†, since September 11, 2001 more American women were killed by an intimate partner than all of the victims of 9/11 and all of the American military fatalities in Iraq and Afghanistan combined (Gidfar, 2012). One woman is fatally shot by a spouse, ex-spouse or dating partner every 14 hours, states Wright (2016) from the U.S. Department of Defense, and these are just the statistics for women, but domestic violence happens to men, as well, but less often. (2) Thesis Statement: Everyone in this room has a voice. We can take a stand and use our voice to educate ourselves and others on healthy relationships and decrease the number of women and men who are victims of domestic violence. (3) Justification: â€Å"It does not just happen to â€Å"other people† or â€Å"certain kinds of people† (Day, 2016). It can happen to our sisters. It can happen to our brothers. It can happen to our friends. It can happen to our peers. It can happen to people we love (Repetition). Nearly three-fourths of Americans know a victim of domestic violence personally (Wright,Show MoreRelatedNational Security Outline Essay40741 Words   |  163 PagesInterest: What Conditions Should We Seek? -Military Sufficiency -Issue is how much military capability is enough - is it enough to have the same capabilities as potential threats or should we pursue superior capabilities -US leaders have varied greatly on how much is enough -Domestic strength -Important goal is to seek political cohesion, economic vitality, and good educational policies at home because it will help country to prevail during war (increases domestic support and morale) -EconomicRead MoreDeveloping Management Skills404131 Words   |  1617 Pages 2002, 1998 Pearson Education, Inc., publishing as Prentice Hall, One Lake Street, Upper Saddle River, New Jersey 07458. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use materialRead MoreCompare and Contrast Functionalism and Structuralism14315 Words   |  58 PagesChapter 1 What is social psychology? LEARNING OUTCOMES When you have ï ¬ nished studying this chapter, you should be able to: 1 Outline the main differences between experimental and critical approaches to social psychology. 2 Describe the three main ‘metaphysical battles’ between them. 3 Trace the origins of social psychology through the work of William McDougall and William James, and the contributions made by Và ¶lkerpsychologie and crowd psychology. 4 Describe the two contrastingRead MoreFundamentals of Hrm263904 Words   |  1056 Pageswritten permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201)748-6011, fax (201)748-6008, website http://www.wiley.com/go/permissions. To order books or for customer service please, call 1-800-CALLRead MoreInternational Management67196 Words   |  269 Pagesand index. ISBN-13: 978-0-07-811257-7 ISBN-10: 0-07-811257-5 1. International business enterprises—Management. 2. International business enterprises—Management—Case studies. I. Doh, Jonathan P. II. Hodgetts, Richard M. International management. III. Title. HD62.4.H63 2012 658 .049—dc22 2011002070 www.mhhe.com Dedicated in Memory of Richard M. Hodgetts A Pioneer in International Management Education iii This page intentionally left blank Preface C hanges in the global businessRead MoreCoco Cola18335 Words   |  74 Pagesprofitable beverages, including soft-drinks and bottled water over tap water.[38] Tax issues[edit] Vietnam[edit] Coca-cola has continuously reported losses in the last decade of operations in Vietnam despite it being one of the biggest players in the domestic beverage market.[39][40] Nazi Germany and World War II[edit] In common with many large American companies, Coca-Cola had a controversial relationship with  Germany  before and during  World War II.  [41]  In 1936, Coca-Cola was deemed unsuitable forRead MoreHuman Resources Management150900 Words   |  604 PagesCHAPTER 1 Changing Nature of Human Resource Management After you have read this chapter, you should be able to: ââ€"  Identify four major HR challenges currently facing organizations and managers. List and define each of the seven major categories of HR activities. Identify the three different roles of HR management. Discuss the three dimensions associated with HR management as a strategic business contributor. Explain why HR professionals and operating managers must view HR management as anRead MoreOverview of Hrm93778 Words   |  376 Pageswhich are, you must be able to communicate, think creatively, plan effectively and deal with people. Copyright  © Virtual University of Pakistan 1 Human Resource Management (MGT501) INTRODUCTION TO HRM After studying this chapter, students should be able to understand the following: Describe HRM? Explain why are we concerned about HRM? Discuss Road-map of HRM VU Lesson 1 LESSON OVERVIEW This chapter introduces the students with the basic concepts of the human resource management (HRM)Read MoreW1 Active Adj14109 Words   |  57 Pagesdatabases of authentic English language. The Longman Communication 3000 represents the core of the English language and shows students of English which words are the most important for them to learn and study in order to communicate effectively in both speech and writing. Analysis of the Longman Corpus Network shows that these 3000 most frequent words in spoken and written English account for 86% of the language. This means that by knowing this list of words, a learner of English is in a position to understandRead MoreMarketing Mistakes and Successes175322 Words   |  702 Pageswritten permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201)748-6011, fax (201)748-6008, website http://www.wiley.com/go/permissions. To order books or for customer service please, call 1-800-CALL

Wednesday, May 6, 2020

Raising A Child Should Be A Parent s Number One Concern...

Raising a child should be a parent’s number one concern, everything else comes after. The innocent life that is brought into this world should not have to go through emotional despair or physical hardships at any a young age. Not so long ago it was common place to put children through hard practices without giving regard to their well-being. This kind of child abuse goes as far back as a millenia, and only recently has it gotten the legal attention it deserves. Child labor is the most apparent form of child abuse and has always been a part of the United States. The dawn of Protective laws for children started with the end of child labor. We must continue to engineer these laws to counteract child abuse. Let us legislate laws and create awareness to make a country where children won’t have to recover from their childhood. My eyes were opened to what child abuse was like at a young age. Back in elementary school I had a friend named Keyon who’s only meal was the one at school lunch. I found this out because at the time we were in third grade we’d go to lunch in a line and he would always ask different kids to let him cut in line. One day when he asked if he could cut me in line I was fine with it and allowed it but was curious to why he wanted his food so early everyday so I asked, â€Å"Hey Keyon why you always wanna be first in line? The food kinda sucks.† He turned around and said, â€Å"If I don’t eat now I won’t eat, this is the only meal we have for the whole day.† I was confused,Show MoreRelatedCommentary of Adam Liptak ´s Article Regarding Gay Marriage and Child Rearing716 Words   |  3 PagesAdam Liptak, a journalist for the New York Times, explained in Utah, in Opposing Gay Marriage, Find Three Arguments are Better than One why a heterosexual relationship is better for raising children in. The Utah law that would have allowed same sex couples to marry was recently shot down. Liptak goes on to explain why he agrees with the bill not being passed. The article states that this was important in â€Å"holding up and encouraging man-woman unions as the ‘preferred’ arrangement in which to raiseRead MoreAdopting A Single Parent Family978 Words   |  4 Pagesare many children whose parents have died or cannot raise them as well as abandoned infants. In order to solve this inevitable situation, so me couples and a single man or woman who have the ability to raise the kids will apply for the qualifications to adopt them. However, some people pose a question that should single people be able to adopt children as easily as couples. With a lot of attention, this topic has become a very intriguing argument. Nowadays, having two parents is not any more the essentialRead MoreChild Marketing Is A Social Problem1345 Words   |  6 Pagescars and ferocious video games to children and their parents. Drawing on the approaches of health care scientists, children activitists and organizational insiders, the video concentrates on the volatile growth of child marketing. It achieves this through deregulation where the youth have now adopted the latest improvements in marketing especially in psychology and neuroscience (Vrany, 2017). This has seen American children transform into one of the most influential and lucrative customer demographicsRead MoreAn Evaluation On Poor Practice1506 Words à ‚  |  7 Pageson the ways in which concerns about poor practice can be reported is by following the correct procedures that your school may have in place or by law. We need to ensure that those who are reporting findings with in a school are protected and not shamed. The whistle-blower we take this action to protect children and ensure that others know what is going on, it is important for the school to take this information and question it. It is every staffs responsibility to raise concerns if they have any andRead MoreParenting for the Second Time Essay1092 Words   |  5 PagesParenting can be a challenge the first time around, but many parents are finding themselves parenting for a second time, this time around, as the child’s grandparents. Grandparents may assume the role of parent for their child’s children when there are problems of substance abuse, abuse and neglect, incarceration, HIV/AIDS, mental illness, divorce, and death. (Dolbin-MacNab, 2006, p.1) Gran dparents usually are not expecting to have to parent again, this is the time most are enjoying their new foundRead MoreThe Evolution of the Family Systems Essay659 Words   |  3 Pagescultures to have three generations in one home. These families choose to care for their aging parents rather than to move them into an assisted living or skilled nursing facility. However, all of humankind has a similar view of what a family system is and what its functions should be. In the 21st Century family systems can be one parent and a child or children, same sex parents, or even a grandparent in the parent, guardian or caregiver role. No matter the number of adults, gender, or familialRead MoreThe Issue Of Same Sex Parenting1153 Words   |  5 Pagescourt rooms. More recently, the debate about gays having the right or ability to parent has become an increasingly popular topic, especially with same-sex marriage being legalized. There are typically two ways of thinking about gay parenting: it’s wrong and shouldn’t be accepted or that it’s perfectly sane and should be accepted. While the people who are against same-sex parenting would argue that kids rose by gay parents are more at risk for mental disorders, social, sexual and gender development,Read MoreSame Sex Parenting and Children Essay1639 Words   |  7 Pages The prospect of a nontraditional upbringing in a same-sex partnership, or marriage ought to be a problem when rais ing children. Some feel that there is no real negative influence that this form of parenting has on a child. Politics has raised concern, but there is a limited amount of research in this area to corroborate this concern. Should same-sex marriage be an issue when raising children? Some states such as Massachusetts, Vermont, and Connecticut have legalized the holy union between twoRead MoreThe Dc Urban Moms And Dads Message Board Into The Mommy Fight Site991 Words   |  4 PagesOn DCUMDs, well-followed set from Ward III for parents overshadows site s forums which are swarming with a lot of questions and issues like when do people reveal their revenue, if people can pilfer strollers or can children be hungry all the time when they are suffering from obesity. Population which is perceptible to the question of class and its division came into collision with those who were not capable to understand the guilt of money in questions of everyday life of D. C. Some user made aRead MoreTeen Driving Persuasive Essay1685 Words   |  7 PagesWas that one conversation with your friend worth the next one hundred y’all could’ve had? Was finding that certain emoji worth not being able to send it? Was your anger and lack of patience to get to your destination w orth not getting there at all? Most people are distracted at least half the time when driving; whether it be a phone, trying to change the radio station, drinking, eating, reaching down in the seat, or simply having a conversation with the passenger. It’s not expected for someone to

Critical Analysis of Milgram Obedience Experiment Free Essays

Critically discuss a classic experiment from the history of psychology (e.g. the Milgram Obedience Experiment, the Stanford Prison experiment). We will write a custom essay sample on Critical Analysis of Milgram Obedience Experiment or any similar topic only for you Order Now What, if any, relevance does it have to the present day? Abstract Stanley Milgram’s obedience study (1963) has been extremely influential in psychology. Milgram investigated human’s willingness to obey authority figures and instructions. He found that 65 per cent of the research subjects followed instructions from an experimenter and administered the highest voltage shock possible to a learner, even when they were uncomfortable in doing so (Milgram, 1963). This finding contributed to theories in psychology. Milgram’s method of conducting the experiment raised questions around ethics as deception was employed and the participants were distressed. This lead to the consideration of what is ethically acceptable and guidelines which protect participants being developed. These guidelines are in place today and therefore have an impact on the way in which current psychological research is conducted. Introduction Stanley Milgram’s Obedience experiment (1963) is thought of as a ‘classic’ experiment in the history of psychology. It was conducted in response to the Nazi war trials where individuals claimed that they were ‘just following orders’. Milgram attempted to investigate if people would follow orders even if they felt that they were morally wrong. Milgram’s study is well known for both its results and its means of obtaining them. Ethical issues were raised, which have relevance to today’s psychological research practice, with regards to the method the study employed. This essay will firstly outline Milgram’s Obedience Study, then it will discuss the ethical issues which were raised and it will look at the overall relevance that the experiment has in the present day. Milgam was interested in researching how individuals would respond to figures of authority when they were given instructions to do something that they did not feel comfortable doing. Participants for the study were recruited through a newspaper advert to take part in an experiment on learning and teaching methods. When they came to the laboratory the researcher showed them a device that was used to punish people who gave incorrect answers by means of an electric shock. The participant was meant to be the teacher and they were told that an individual in another room was the learner. The participant or teacher met the learner (who was privy to the true nature of the experiment) and witnessed the electrodes being strapped to their wrists. The learner expressed a degree of fear and questioned whether the shock would have any impact on their heart condition. The researcher told them that this was not something to worry about but they did inform them that the shocks could be extremely pai nful. During the learning session the teacher and learner were in different rooms and they communicated via intercom. The researcher told the teacher to increase the shock each time an incorrect answer was given. Regardless of uncertainty on behalf of the teacher, protests from the learner and latterly no sound at all from the learner, the researcher still instructed the teacher to administer the highest voltage possible. 65 per cent of the participants followed instructions and administered the highest voltage shock to the learner (Milgram, 1963). Following the experiment participants were debriefed and they were informed that the shock apparatus was not real and that the protests from the learners were scripted. Many of the subjects expressed emotional upset as they thought that they were inflicting immense pain on another person and that the high voltage shocks that they apparently administered had the capacity to kill somebody. Milgram was criticised as being ‘insensitive to his subjects’ (Baumrind, 1964). This study highlights ethical issues which are relevant in the present day. Perhaps Milgram could have tested his ideas on obedience without causing distress to his subjects. His experiment illuminates issues around deception. Deception occurs when subjects are not clearly and fully informed about the nature of the research (Glassman and Hadad, 2004). Milgram’s study influenced the current ethical guidelines that are in place and it is thought that his study would not be permitted now (Weiten, 2006). Modern ethical standards assert that participants must not be deceived, and that they must be told of any possible consequences. Guidelines stipulate that participants must take part on a voluntary basis and that they are free to withdraw at any point, that they are debriefed following the study and that there is an acceptable outcome of the research without harm being caused to subjects (British Psychological Society, 2009). It is thought that under these conditions no hurt can b e caused to the participant. It may be argued that Milgram’s study influenced the way that Psychologist’s conduct their current research as it changed research ethics and design, whilst contributing greatly to theory in psychology. Conclusion It becomes clear that a great deal can be learnt from past research, Milgram’s study informed the field of social psychology in terms of theories on obedience and authority (Benjamin and Simpson, 2009). In addition to this, in response to what would now be seen as unethical methods, a change in the way in which Psychologist’s work emerged as new guidelines regarding the treatment of research participants were developed. As such this experiment is relevant to the present day psychology in many respects. References Baumrind, D. (1964). â€Å"Some thoughts on the ethics of research: After reading Milgram’s ‘Behavioral Study of Obedience.’† American Psychologist, Vol. 19, pp. 421-423. Benjamin, L.T and Simpson, J.A. (2009) ‘The power of the situation: The impact of Milgram’s obedience studies on personality and social psychology’. American Psychologist, Vol. 64(1), pp. 12-19. British Psychology Society, (2009). Code of Ethics and Conduct 2009 [Online]. Available from http://www.bps.org.uk/the-society/code-of-conduct/ [Accessed: 26 May 2011]. Glassman, W.E and Hadad, M. (2004). Approaches to Psychology. Birkshire, UK: Open University Press. Milgram, Stanley (1963). â€Å"Behavioral Study of Obedience†. Journal of Abnormal and Social Psychology, Vol. 67 (4), pp. 371–378. Weiten, W. (2006). Psychology: Themes and Variations. California: Wadsworth Publishing Co Inc. How to cite Critical Analysis of Milgram Obedience Experiment, Essay examples

Critical Analysis of Milgram Obedience Experiment Free Essays

Critically discuss a classic experiment from the history of psychology (e.g. the Milgram Obedience Experiment, the Stanford Prison experiment). We will write a custom essay sample on Critical Analysis of Milgram Obedience Experiment or any similar topic only for you Order Now What, if any, relevance does it have to the present day? Abstract Stanley Milgram’s obedience study (1963) has been extremely influential in psychology. Milgram investigated human’s willingness to obey authority figures and instructions. He found that 65 per cent of the research subjects followed instructions from an experimenter and administered the highest voltage shock possible to a learner, even when they were uncomfortable in doing so (Milgram, 1963). This finding contributed to theories in psychology. Milgram’s method of conducting the experiment raised questions around ethics as deception was employed and the participants were distressed. This lead to the consideration of what is ethically acceptable and guidelines which protect participants being developed. These guidelines are in place today and therefore have an impact on the way in which current psychological research is conducted. Introduction Stanley Milgram’s Obedience experiment (1963) is thought of as a ‘classic’ experiment in the history of psychology. It was conducted in response to the Nazi war trials where individuals claimed that they were ‘just following orders’. Milgram attempted to investigate if people would follow orders even if they felt that they were morally wrong. Milgram’s study is well known for both its results and its means of obtaining them. Ethical issues were raised, which have relevance to today’s psychological research practice, with regards to the method the study employed. This essay will firstly outline Milgram’s Obedience Study, then it will discuss the ethical issues which were raised and it will look at the overall relevance that the experiment has in the present day. Milgam was interested in researching how individuals would respond to figures of authority when they were given instructions to do something that they did not feel comfortable doing. Participants for the study were recruited through a newspaper advert to take part in an experiment on learning and teaching methods. When they came to the laboratory the researcher showed them a device that was used to punish people who gave incorrect answers by means of an electric shock. The participant was meant to be the teacher and they were told that an individual in another room was the learner. The participant or teacher met the learner (who was privy to the true nature of the experiment) and witnessed the electrodes being strapped to their wrists. The learner expressed a degree of fear and questioned whether the shock would have any impact on their heart condition. The researcher told them that this was not something to worry about but they did inform them that the shocks could be extremely pai nful. During the learning session the teacher and learner were in different rooms and they communicated via intercom. The researcher told the teacher to increase the shock each time an incorrect answer was given. Regardless of uncertainty on behalf of the teacher, protests from the learner and latterly no sound at all from the learner, the researcher still instructed the teacher to administer the highest voltage possible. 65 per cent of the participants followed instructions and administered the highest voltage shock to the learner (Milgram, 1963). Following the experiment participants were debriefed and they were informed that the shock apparatus was not real and that the protests from the learners were scripted. Many of the subjects expressed emotional upset as they thought that they were inflicting immense pain on another person and that the high voltage shocks that they apparently administered had the capacity to kill somebody. Milgram was criticised as being ‘insensitive to his subjects’ (Baumrind, 1964). This study highlights ethical issues which are relevant in the present day. Perhaps Milgram could have tested his ideas on obedience without causing distress to his subjects. His experiment illuminates issues around deception. Deception occurs when subjects are not clearly and fully informed about the nature of the research (Glassman and Hadad, 2004). Milgram’s study influenced the current ethical guidelines that are in place and it is thought that his study would not be permitted now (Weiten, 2006). Modern ethical standards assert that participants must not be deceived, and that they must be told of any possible consequences. Guidelines stipulate that participants must take part on a voluntary basis and that they are free to withdraw at any point, that they are debriefed following the study and that there is an acceptable outcome of the research without harm being caused to subjects (British Psychological Society, 2009). It is thought that under these conditions no hurt can b e caused to the participant. It may be argued that Milgram’s study influenced the way that Psychologist’s conduct their current research as it changed research ethics and design, whilst contributing greatly to theory in psychology. Conclusion It becomes clear that a great deal can be learnt from past research, Milgram’s study informed the field of social psychology in terms of theories on obedience and authority (Benjamin and Simpson, 2009). In addition to this, in response to what would now be seen as unethical methods, a change in the way in which Psychologist’s work emerged as new guidelines regarding the treatment of research participants were developed. As such this experiment is relevant to the present day psychology in many respects. References Baumrind, D. (1964). â€Å"Some thoughts on the ethics of research: After reading Milgram’s ‘Behavioral Study of Obedience.’† American Psychologist, Vol. 19, pp. 421-423. Benjamin, L.T and Simpson, J.A. (2009) ‘The power of the situation: The impact of Milgram’s obedience studies on personality and social psychology’. American Psychologist, Vol. 64(1), pp. 12-19. British Psychology Society, (2009). Code of Ethics and Conduct 2009 [Online]. Available from http://www.bps.org.uk/the-society/code-of-conduct/ [Accessed: 26 May 2011]. Glassman, W.E and Hadad, M. (2004). Approaches to Psychology. Birkshire, UK: Open University Press. Milgram, Stanley (1963). â€Å"Behavioral Study of Obedience†. Journal of Abnormal and Social Psychology, Vol. 67 (4), pp. 371–378. Weiten, W. (2006). Psychology: Themes and Variations. California: Wadsworth Publishing Co Inc. How to cite Critical Analysis of Milgram Obedience Experiment, Essay examples

Academic Writing and Research Skills

Questions: 1) Use your notes to conduct a critical review of literature in the selected papers. 2) What do you understand by referencing and what are its different styles? Answers: 1. Deception and denial as a tool for cyber defense: Day by day as the cyber attack techniques are getting evolved and modernized, the traditional methods for preventing those attacks became inadequate. In the modern cyber attack scenario, the denial and deception are used to prevent the attacks. In the present day scenario this methodology is gaining momentum to secure the organizational networks (Heckman et al., 2015). The deception is used as a proactive cyber security approach to safeguard a particular computer network. As the signature based security mechanisms are failing in preventing and mitigating the modern Zero day attacks. Most of the cyber attackers, work on the assumption, that the visible network infrastructure is real, and the deception technology takes advantage of this assumptions by the attackers. Carefully outlined traps to pull in assailants while they are penetrating the network and in a flash recognize those attacks (Hsu, Marinucci Voas, 2015). Therefore, the intruders find the physical resources inaccessible by compromising the control system of the network. On the other hand, denial is considered as another effective tool to prevent the intrusion attacks. For this, the adversaries create condition like the denial of service. In this kind of situation, the network is flooded with excessive failed access attempts. This cyber attack prevention mechanism is implemented by the combined efforts of denial and deception planners, analysts, security operators (Heckman et al., 2013). The steps in implementing a Deception and Denial plan include the development of cover story which includes the selection of the information that is going to create the honey pots for the attacker. After that, the whole plan is executed by the security operators. Honeypots are intended to be assaulted to empower information gathering about the intruders/hackers practices and methods, and to uncover vulnerable services provided by the network. Honey pots are ordinarily sorted as high interaction and low interaction. Low interaction honey pots copy the services where the level of copying incorporated with the administrations decides the level of interaction with the honey pot by the intruder or attacker (Heckman et al., 2015). High interaction honey pots give a genuine working operating system intended to react intuitively with the attackers. Use of honey pots: Honey pots are genuine machines with false systems, for example, virtualization and system monitoring apparatuses, made to trick intruders into supposing they have compromised a worthless system, lessening the number of intrusion or attacks on a genuine and valuable system. Honey tokens are another deceptive security approach. Honey tokens are made of files such as records containing false data, an email address related with a non-existent individual or fake movement to recognizing eavesdropping in unknown and anonymous communication systems (Almeshekah Spafford, 2014). This honey tokens are not able to prevent the intrusion attacks, but is able to detect the intrusion in the early phases. In the year 2012, the MITRE Corporation performed a cyber-war game to check the effectiveness of the denial and deception tradecraft in securing an organizational cyber space. The cyber war game was intended to test a dynamic organizational network resistance digital security platform being researched and invented in The MITRE Corporation's Innovation Program called Blackjack, and to examine the utility of utilizing denial and deception method to upgrade the security of data in control and command systems (Hsu, Marinucci Voas, 2015). Figure 1: Architecture of CND based defense mechanism (Source: Heckman et al., 2013, pp-74) Blackjack utilized a rules engine to apply policies to each HTTP request coming in the organizational network with a specific end goal to direct the response to client requests called Intellect, which is domain specific language and rules engine developed in Python programming language. According to Bogatinov et al. (2015), the user requests are processed depending upon the proxy configuration and digital certificates of the users. Ant based approach: Another approach for securing the networks is, MTD (Moving target defense). This mechanism is applied to the already defended systems or networks. According to Hsu, Marinucci Voas (2015) this approach uses shuffling of the configurations of network equipments (like routers, switches), remapping of the address space is used to secure the network (Fink et al., 2014). In this way, an IP address targeted by the attackers does not always is assigned to a specific computer/ workstation. In order to implement this kind of security mechanism administrators depends on the ant based cyber defense approach. This approach is a flexible resistance mechanism that removes the chances of intruders ability to depend on prior knowledge, without any significant change in the secured network. 2. Referencing: While writing an academic paper, we refer to the information to another source. This source can be other authors theories, quotes and views in their own reports and journals (Wingate, 2012). Whenever we use those sources, we have to acknowledge those sources in our academic report or journal. Acknowledging the sources in the academic writing is known as referencing. Different styles of referencing: The following table describes different types of referencing styles used by different universities and organization for acknowledging the source of information. Referencing Style Organization Special features Application APA American psychological Association Author name and date used to in text. Social and behavioral sciences, anthropology and psychology. Harvard Harvard University Author name and date used to in text. Business studies, natural and social sciences. Chicago University of Chicago press Have flexible guidelines for the headings. Author, date and note used to in text (Turabian, 2013). Social, biological and physical sciences. IEEE Institute for Electronics Electrical Engineers Name of the journal or report on italics, authors first and last name is used. Electrical engineering studies and Electronics. MLA Modern Languages association of America Author and page number of the report or journal is used to in text. Modern day literature, humanities and other subjects and fields. Vancouver Proposed in a meeting in Vancouver Number for each source is used for in text (Wingate Tribble, 2012). Mostly in Medical sciences and humanities. References Almeshekah, M. H., Spafford, E. H. (2014, September). Planning and integrating deception into computer security defenses. InProceedings of the 2014 workshop on New Security Paradigms Workshop(pp. 127-138). ACM. Bogatinov, D., Bogdanoski, M., Angelevski, S. (2015). AI-Based Cyber Defense for More Secure Cyberspace. Fink, G. A., Haack, J. N., McKinnon, A. D., Fulp, E. W. (2014). Defense on the move: ant-based cyber defense.IEEE Security Privacy,12(2), 36-43. Heckman, K. E., Stech, F. J., Schmoker, B. S., Thomas, R. K. (2015). Denial and Deception in Cyber Defense.Computer,48(4), 36-44. Heckman, K. E., Walsh, M. J., Stech, F. J., O'boyle, T. A., DiCato, S. R., Herber, A. F. (2013). Active cyber defense with denial and deception: A cyber-wargame experiment.Computers Security,37, 72-77. Hsu, D. F., Marinucci, D., Voas, J. M. (2015). Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem.Computer,48(4), 12-14. Turabian, K. L. (2013).A manual for writers of research papers, theses, and dissertations: Chicago style for students and researchers. University of Chicago Press. Wingate, U. (2012). Using academic literacies and genre-based models for academic writing instruction: A literacyjourney.Journal of English for Academic Purposes,11(1), 26-37. Wingate, U., Tribble, C. (2012). The best of both worlds? Towards an English for Academic Purposes/Academic Literacies writing pedagogy.Studies in Higher Education,37(4), 481-495.