Friday, January 31, 2020

Effects of Divorce Essay Example for Free

Effects of Divorce Essay Divorce can be defined as the termination of a marital union, the canceling of the legal duties and responsibilities of marriage and the dissolving of the bonds of matrimony between married couples (Wikipedia, 2013). Divorce affects the couple and children (if any). The divorce is the most serious social problem that affects almost the entire life of the children and the couple, it also makes troubles like: sadness, despair, and unforgettable moments (Williams, 2013). In this paper, I will be discussing the factors contributing to divorce in Canada and will also explain certain statistics used as well. The methodologies that I will be using are both the qualitative and quantitative approach. The reasons I am using both of them are because by using the quantitative research, I will develop mathematical hypotheses pertaining to the phenomena. Also to analyze this topic with the use of statistics to make it somewhat accurate, while for quantitative; because it will explain in word data about my information. I strongly believe that these two forms of methodology will properly explain the factors contributing to divorce. The history of the legalization of divorce in Canada predates that of its colonial overseer, England, where it was only in 1857 that divorce was legislated, mainly on grounds of adultery. Nova Scotia, New Brunswick, and Prince Edward Island respectively enacted divorce laws in 1761, 1791, and 1837, generally on grounds of adultery (Wu Schimmele, 2009). It was not until 1968 that Canada enacted its first unified Federal Divorce Act, which was followed by the more liberal or no fault act of 1985 and it was mentioned that the sole reason for divorce is marriage breakdown, which is defined as either living apart for at least one year, or committing adultery, or treating the other spouse with physical or mental cruelty. Though divorce rates have not increased recently in Canada, the number of divorced persons is however increasing with population growth. In 2007, there were 972,183 divorced women and 712,531 divorced men in the population (Statistics Canada, 2007). The difference between the men and women is because divorced men re-partner faster and more than women and also because women live longer than men.

Thursday, January 23, 2020

A lEsson Befor dying Essay -- essays research papers

A Lesson Before Dying For my final book review I read the novel A Lesson Before Dying By Ernest J. Gains. The book took place in the 1940 right after the great depression. A society stricken by poverty is depicted early in the book. The atmosphere in the first chapter is leading us into the idea of: how can justice prevail in a society dominated by a single group of people? If this story took place in modern day I believe that question would not be as relevant as it is in the forty’s.   Ã‚  Ã‚  Ã‚  Ã‚  Grant Wiggins, one of the main characters is a teacher at an elementary school, Grant is a very bitter man for being so young, maybe it is because he has known nothing but segregation and racisms his whole life, growing up in Louisiana. Over the course of the novel, he learns to accept responsibility for his own life, for his relations with other people, and for the condition of Southern society. Jefferson is another one of the main characters; Jefferson is a black man who is described as being sensitive and kind of stupid. Jefferson is accused for a murder and faces the death penalty, he becomes very depressed waiting on death row because he feel so worthless in a white dominate world, but Grant befriends him and helps him out before he dies.   Ã‚  Ã‚  Ã‚  Ã‚  Jefferson is convicted of murder, while in his cell the hears his own lawyer call him a hog, this upsets him very much and he realizes how the white dominate the world and that justice can no...

Wednesday, January 15, 2020

Information Security Classification Essay

Information Security is simply the process of keeping information secure: protecting its availability, integrity, and privacy (Demopoulos). With the advent of computers, information has increasingly become computer stored. Marketing, sales, finance, production, materials, etc are various types of assets which are computer stored information. A large hospital is an institution which provides health care to patients. They are staffed by doctors, nurses, and attendants. Like any large organization, a hospital also has huge amounts of data and information to store. Hospitals have increasingly become automated with computerized systems designed to meet its information needs. According to the Washtenaw Community College website, the following types of information are stored in a Hospital: †¢ Patient information †¢ Clinical laboratory, radiology, and patient monitoring †¢ Patient census and billing †¢ Staffing and scheduling †¢ Outcomes assessment and quality control †¢ Pharmacy ordering, prescription handling, and pharmacopoeia information †¢ Decision support †¢ Finance and accounting †¢ Supplies, inventory, maintenance, and orders management Viruses, worms and malware are the most common threats to information security. In computers, a virus is a program or programming code that replicates by being copied or initiating it’s copying to another program, computer boot sector or document (Harris, 2006). Floppy disks, USB drives, Internet, email are the most common ways a virus spreads from one computer to another. Computer viruses have the potential to damage data, delete files or crash the hard disk. Many viruses contain bugs which can cause system and operating system crashes. Computer worms are malicious software applications designed to spread via computer networks (Mitchell). They also represent a serious threat to information security. Email attachments or files opened from emails that have executable files attached are the way worms spread. A Trojan is a network software application designed to remain hidden on an installed computer. Software designed to monitor a person’s computer activity surreptitiously and which transmits that information over the internet is known as spy ware (Healan, 2005). Spy ware monitors information using the machine on which it is installed. The information is transmitted to the company for advertising purposes or sold to third party clients. Identity theft and data breaches are two of the biggest problems facing Information security managers. Hackers steal Social Security numbers, credit card data, bank account numbers and other data to fund their operations. There are other potential threats to the hospital information like power outages, incompetent employees, equipment failure, saboteurs, natural disasters, etc. A large hospital requires an information classification policy to ensure that information is used in appropriate and proper manner. The use of the information should be consistent with the hospital’s policies, guidelines and procedures. It should be in harmony with any state or federal laws. The hospital’s information should be classified as follows: 1. Restricted 2. Confidential 3. Public Restricted information is that which can adversely affect the hospital, doctors, nurses, staff members and patients. Its use is restricted to the employees of the hospital only. Finance and accounting, supplies, inventory, maintenance, and orders management are restricted information which comes in this category. Confidential information includes data on patients which must be protected at a high level. Patient information, clinical laboratory, radiology, and patient monitoring are some of the information which comes in this category. It can also include information whose disclosure can cause embarrassment or loss of reputation (Taylor, 2004). Public information includes data which provides general information about the hospital, its services, facilities and expertise to the public. Security at this level is minimal. This type of information requires no special protection or rules for use and may be freely disseminated without potential harm (University of Newcastle, 2007). Information Classification Threat Justification Patient information Confidential Disclosure or removal Any disclosure or removal can cause serious consequences to the patient Clinical laboratory, radiology, and patient monitoring Confidential Disclosure or removal Any disclosure or removal can cause serious consequences to the patient Finance and accounting, supplies, inventory, maintenance, and orders management Restricted Loss or destruction Any loss or destruction of this information could be very dangerous for the organization General information about the hospital, its services, facilities and expertise Public Low threat Low threat since the information is public. It would affect public relations however. Research Information Confidential Disclosure or removal This is confidential material since its exposure would cause serious consequences for the hospital Figure: Classification table Information is an asset for the hospital. The above information classification policy defines acceptable use of information. They are based according to the sensitivity of the information. According to the government of Alberta information security guideline, there are four criteria are the basis for deciding the security and access requirements for information assets. These criteria are: Integrity: information is current, complete and only authorized and accurate changes are made to information; Availability: authorized users have access to and can use the information when required; Confidentiality: information is only accessed by authorized individuals, entities or processes; and Value: intellectual property is protected, as needed. Information security must adequately offer protection through out the life span of the information. Depending on the security classification, information assets will need different types of storage procedures to ensure that the confidentiality, integrity, accessibility, and value of the information are protected. The hospital director must be responsible for the classification, reclassification and declassification of the hospital’s information. The information security policy must be updated on a regular basis and published as appropriate. Appropriate training must be provided to data owners, data custodians, network and system administrators, and users. The information security policy must also include a virus prevention policy, intrusion detection policy and access control policy. A virus prevention policy would include the installation of a licensed anti virus software on workstations and servers. The headers of emails would also be scanned by the anti virus software to prevent the spread of malicious programs like viruses. Intrusion detection systems must be installed on workstations and servers with critical, restricted and confidential data. There must be a weekly review of logs to monitor the number of login attempts made by users. Server, firewall, and critical system logs should be reviewed frequently. Where possible, automated review should be enabled and alerts should be transmitted to the administrator when a serious security intrusion is detected. Access to the network and servers and systems should be achieved by individual and unique logins, and should require authentication. Authentication includes the use of passwords, smart cards, biometrics, or other recognized forms of authentication. This policy is the access control policy. It prevents unauthorized access to critical data. A large hospital like any organization today uses computers to store its information. The classification of its data is a very important goal to protect it from threats like viruses, Trojans, worms, spy ware, ad ware and hackers. Natural disasters and incompetent employees are another type of threats to the hospital’s data. A proper information security policy can protect the organization’s critical data from any external or internal threat. Bibliography Allen, Julia H. (2001). The CERT Guide to System and Network Security Practices. Boston, MA: Addison-Wesley. 0-201-73723-X. Krutz, Ronald L. ; Russell Dean Vines (2003). The CISSP Prep Guide, Gold Edition, Indianapolis, IN: Wiley. 0-471-26802-X. Layton, Timothy P. (2007). Information Security: Design, Implementation, Measurement, and Compliance. Boca Raton, FL: Auerbach publications. 978-0-8493-7087-8. McNab, Chris (2004). Network Security Assessment. Sebastopol, CA: O’Reilly. 0-596-00611-X. Peltier, Thomas R. (2001). Information Security Risk Analysis. Boca Raton, FL: Auerbach publications. 0-8493-0880-1.

Tuesday, January 7, 2020

African Americans And The Civil Rights Movement - 1260 Words

African Americans have fought for equality for a long period of time against desegregation and racism. It was an era where blacks couldn’t have the same rights as a white individual. African American were treated with hate and anger. The Civil Rights Movement is embodied in dramatic recorded speeches. Speeches like â€Å"I have A Dream†, the â€Å"Black Revolution†, and â€Å"Black Power’ and Coalition Politics. These speeches were written by great leaders. Martin Luther King Jr, Malcolm X, and Bayard Rusting were just some of the wise leaders of the Civil Rights. However, these influential leaders had a different view on how things had to be done during the civil rights movement. In 1954, the U.S. Supreme Court declares school segregation unconstitutional in Brown v. Board of Education of Topeka ruling. Additionally, they were teachers, secretaries, welders, ministers and students who simply wanted to be treated equally. Not to mention, that in 1955, R osa Parks refuses to move to the back of a Montgomery, Alabama, bus as required by city ordinance; boycott follows and bus segregation ordinance is declared unconstitutional. Individuals were arrested because for whites, blacks were acting in a violent way. Martin Luther King Jr speech was one of the greatest of all time. His speech brings tears to those who truly understand what was going, just by the beauty, depth, and soul of the words themselves. King, moved his people and the nation not only by being one of the most gloriouslyShow MoreRelatedThe African-American Civil Rights Movement1295 Words   |  5 Pages The African-American Civil Rights Movement is arguably the largest and most successful push towards toward change in American history. The movement was influenced by some of the biggest figures in American history as well, led by Martin Luther King Jr. and influenced by others such as president Kennedy and Johnson. Amongst the numerous protests and powerful speeches during the Civil Rights Movement perhaps the most prominent is the series of three marches in 1965 known today as the â€Å"Selma to Montgomery†Read MoreThe African American Civil Right Movement1040 Words   |  5 PagesThe African American Civil right mo vement in the late 1950’s and throughout the 1960’s was a powerful fight for equal opportunities to the basic rights and privileges outlined by the US government. During this movement thousands of African American individuals and those who believed in the power of the movement, battled against the piercing white supremacy through various tactics including grass root movements. The grass root movements in the 60’s was characterized by organizations of individualsRead MoreThe African American Civil Rights Movement1450 Words   |  6 PagesThe African American civil rights movement was a long journey for African American nationwide. The success involved many people, hardships and time in order to advance the African American community in America. The purpose of the movement was to achieve their rights, cease discrimination, and racial segregation. During the start of the African American civil rights movement, Africans Americans still were faced with Jim Crow laws which segregated them from whites. Under the Jim Crow laws AfricanRead MoreAfrican Americans And The Civil Rights Movement1624 Words   |  7 PagesDuring the early 1950’s and 1960’s, the civil rights movement defined how African Americans progressed from being considered second class citizens to a unified demographic who became more endowed to handle the high tensions between them and the white segregationists. After World War II, protests began to rise between the 1950’s and 1960’s. The large number of blacks that served in the military or worked in the war industry saw that they had a greater place in the world than they had been given inRead MoreAfrican Americans And The Civil Rights Movement1623 Words   |  7 Pages African Americans were brought to America during the colonial days by Britain, before the civil war, as slaves. They were the foundation of slave economy, being auctioned off and sold, with no thought given to their opinions, families, or lives. Throughout American history, African Americans have slowly fought their way towards where they are today. Their fight has developed into the Civil Rights Movement in the 1900s. Many historians would agree that the start of the Civil Rights Movement happenedRead MoreThe African American Civil Rights Movement756 Words   |  4 PagesAnother significant circumstance was the African-American civil rights movement in US in those years. Until the age of eighteen, he had never thought about ethnicity or cultural differences. After 1968, African-American movement turned to be seen in Milwaukee. He met with Father Grouppi*, but he did not support him and his followers. For a long time, he had not appreciated the African American civil rights movemen t. Moreover, he would think that this movement aggravates the racial segregation in societyRead MoreAfrican American Civil Rights Movement1594 Words   |  7 Pagesblack power movement in American Civil Rights Movement. Violence is a physical force intended to hurt someone. Politics is a platform where the wellbeing is thought for the citizens and in America the politics and laws have been placed in order for the betterment of the American citizens. In this essay I will unravel many factors arguing whether violence is legitimate or whether it is a mean that is necessary to a more equal nation mostly focusing on the American Civil Rights movement and the blackRead MoreAfrican American Civil Rights Movement1525 Words   |  7 PagesFollowing World War I, a new, militant spirit of resistance and activism burgeoned among African-American citizens across the United States. Empowered by the sense that blacks had played a crucial role in the conflict, the descendants of freedmen returned home to fight for their own rights only to find persecution; this dire situation called for immediate, decisive action. During the interwar years, African Americans in the southwest Georgia Black Belt fought for community empowerment and, through theRead MoreAfrican Americans And The Civil Rights Movement Essay2200 Words   |  9 Pagesequal rights. A perfect example of racial brutality was the summer of 1955 when Emmett Till was brutally murdered by two white men. This murder case promptly seized the attention of millions and modified the history of the United States. The Emmett Till murder case established itself as a defining event in the United States history because it became a spark to the Civil Rights movement, transformed people’s hearts and minds into realizing how dangerous segregation was, and it proved how African AmericansRead MoreAfrican Americans And The Civil Rights Movement1531 Words   |  7 Pagesstates for African Americans in the 1960, although it has been nearly 100 years since the Emancipation Proclamation. African Americans were still segregated from classrooms, restrooms, theatres, etc. due to â€Å"Jim Crow† laws; and in 1954, the â€Å"separate but equalà ¢â‚¬  doctrine was struck down by the U.S. Supreme Court. For hundreds of years African Americans fought for their civil rights, desegregation, and basic human rights. One significant movement in history that was major for the Civil Rights Movement