Surveillance Essays


Research Approaches in Maritime Security

concerned Contracting Governments can exchange information on security often provided to the maritime security to boost its surveillance and monitoring of security within different port facilities, ports, and vessels. The ISPS Code operates within different countries and hence has a more of surveillance and information gathering activity that is instrumental to the stability of the maritime security operations. ISPS Code offers the best standards and measures that are in line with the objectives of the maritime security (Yap, 2009). For instance, the ISPS Code engages all countries to have facility-driven security measures that act as remedy measures in the… Continue Reading...

Enhancing Ship and Port Security Globally

exchange information on security, which is also provided to the maritime security to boost its surveillance and monitoring of security within different port facilities, ports, and vessels. The ISPS Code operates within different countries and hence has a more of surveillance and information gathering activity that is instrumental to the stability of the maritime security operations. ISPS Code offers the best standards and measures that are in line with the objectives of the maritime security (Yap, 2009). For instance, the ISPS Code engages all countries to have facility-driven security measures that act as remedy measures in the case of… Continue Reading...

Katz Vs United States

February 1965; this is a breach of federal regulation. Following wide-ranging surveillance, the Federal Bureau of Investigation attached a listening apparatus (microphones) atop the phone booth, using which it recorded Katz's telephone conversations, had him apprehended, and employed the recordings during trial as evidence. These microphones were positioned outside the booth without tape, and there was no sign of physical penetration within the booth (Samaha, 2011). Recording transcripts revealed conversations pertaining to procuring gambling-related information and bet-placing. Katz petitioned to suppress the evidence presented against him, citing the Constitution's Amendment IV. This motion was rejected. The appellate court discarded… Continue Reading...

Working for International Peace

government with the supplies and manpower to counteract the terrorist efforts of Boko Haram. These resources will include increasing surveillance of public places, and systematically attempting to regain territory which Boko Haram has captured. Logic Model or Logframe The logic model for this particular case study will be predicated on determining which counter-terrorist methods are the most effective for regaining territory taken by Boko Haram. The study will utilize a bevy of counterterrorist methods for achieving this objective, and systematically study them and their outcomes to learn which is the most worthy of long-term support. These measures will include… Continue Reading...

Government’s Right to Spy

There was panic that made the congress to give the government fresh surveillance authorities. However, it attached an expiration date to the authority so as to allow for further deliberations after the end of the emergency. Decades later, the law has been extended on a number of occasions, yet there has been no public discussion on how the law can be interpreted. There has been an expansion of the surveillance at all fronts regardless of the freedom created by the founders of the United States. The surveillance should make us safer without violating the liberties of the American Citizens.… Continue Reading...

Team America Surveillance and Espionage

.....motif of surveillance features prominently in Captain America: Civil War. More importantly, the film features the ability of a powerful state entity to control the behavior of its citizens. The types of surveillance and brainwashing depicted in Captain America: Civil War are completely different from those used by the American government. However, the methods of surveillance used by the American government to spy on its own people may be no less sinister. The methods of surveillance used by the government cannot directly control peoples' minds and behavior of individuals, but can control… Continue Reading...

Drone Strikes and Politics in Movies

calls into question the norms of global counterterrorism and warfare. Technological tools of surveillance allow for targeted operations, aimed at known terrorists. These tools entrench existing hegemonies of power. However much drones are celebrated for reducing the numbers of casualties in counterterrorism units while simultaneously targeting top terrorism suspects, the effects of the drone strikes can be devastating on the local innocents, the civilians caught in the drone fire, and may even have some detrimental long-term effects such as increased acts of terror or reduction of the credibility of counterterrorism. Public attitudes towards the use of drones vary considerably.… Continue Reading...

Medical Marijuana Growing in Butte County

enforcement agents in Butte County have indicated in their actions and surveillance that they do not condone marijuana growing in any form—but physicians following the letter of the law in Butte County have taken the liberty of recommending marijuana usage for patients like Patrick Kelly and Diane Monson. Local Research The issue of medical marijuana in Butte County has clearly been a contentious one, as the research on conflicts between local growers and law enforcement agents suggests, and as the County’s own laws regarding the banning of dispensaries since 2011 indicates.  Beginning in 1996, zoning for medical marijuana usage… Continue Reading...

Hiv Aids Infrastructures Around the World

lack of resources has caused the national government to increasingly rely on nongovernmental organizations for surveillance and treatment assistance (Powers, 2016). Likewise, HIV / AIDS sufferers in Vietnam are generally unable to access treatment due to the high costs together with a lack of government-sponsored healthcare facilities and most do not receive any treatment for the disease at all (Demarco & Cao, 2015). By sharp contrast, WHO reports no HIV / AIDS-related deaths in the United States since 2012 (USA summary, 2016). The most important needs in shaping and sustaining the infrastructure for dealing with this public health problem… Continue Reading...

Video Cameras and Public Safety

cameras to airports, public areas, and intersections to promote safety in these areas through constant surveillance (The Telegraph, 2016). Still, video cameras can be costly to implement, maintain, and monitor. Citizens may also feel their privacy invaded without their consent. Is having video cameras as part of a way to monitor the public for a crime a good idea or a bad one? The advantages are clear and lean towards public safety. Of the many crimes perpetrated in high traffic areas and public venues, many go unsolved due to lack of evidence. Video cameras serve to not only identify… Continue Reading...

Muslim Americans and the Impact Of September 11th

like John Bolton and William Kristol, whose behind-the-scenes work has promoted war in the Middle East and heightened surveillance and security of the homeland. Anti-Muslim immigration policy has been foisted on the American public as part of the planned-hysteria needed to support the wars in the Middle East, which have favored to a large extent the aims of Greater Israel.[footnoteRef:17] [17: John Davis. Presidential Policies and the Road to the Second Iraq War. (VT: Ashgate, 2006), 51. ] Policy papers like Rebuilding America's Defenses published by the Project For a New American Century think-tank (PNAC) propagated the idea that… Continue Reading...

Organizational Behavior and Communication Styles

et al., 2003, p. 11). When individuals feel they are "under surveillance from in-group members," they may not be fully honest in group communications or feel threatened, silenced, or cut off from the group in ways that can impede performance (Ellemers, et al., 2003, p. 11). Therefore, leaders need to be cognizant of group dynamics and aware of the ways that power is expressed in groups. This case study will illustrate how individuals formulate their identities in the group environment based on both formal and informal arrangements. Formal arrangements in the workplace have been shown to be insufficient because… Continue Reading...

Moral Issues with Internet Privacy

with regard to the major moral challenges linked to internet privacy, right from social media privacy to governmental surveillance. However, all stories have two sides, and this necessitates a closer examination of a few existing moral issues associated with internet privacy. Firstly, one needs to examine the chief element of guidance provided by the law on the matter of internet privacy. Possibly the most straightforward moral problem under the 'internet privacy breach' umbrella is malicious software (e.g., spyware) utilization for perpetrating cybercrime and stealing private data. A number of cybercrimes are made illegal by the governments of nations like… Continue Reading...

United States Vs Jones

privacy expectations. How This Case Will Influence Future Court Decisions Electronic Privacy Information Center (EPIC) is especially concerned about novel surveillance technologies' effect, as these can easily enable pervasive, warrantless, mass public surveillance by law enforcers. These techniques breach individual rights to privately operate their cars on public streets and be safe from unreasonable search activities. Time and again, EPIC has called for meaningful action by courts and regulators to safeguard motorists' privacy interests. In the Commonwealth v. Connolly case (454 Mass. 808 (2009)), a "Friend of the Court" case was filed by EPIC, contending that police tracker proliferation gives rise… Continue Reading...

Katz V United States

wagering information to Miami and Boston, thus violating federal regulation. Following careful surveillance, the Federal Bureau of Investigation tapped the booth to record the messages passed on by the petitioner. The secret recordings were subsequently presented at trial as evidence implicating Katz (Katz v. United States). Katz called for the suppression of these recordings, citing Amendment IV safeguards. The jury denied his motion. The appellate court also rejected the claim, found the evidence perfectly admissible, and granted certiorari. Court Decision The majority judgment was filed by Potter Stewart, Supreme Court Associate Justice. Katz vehemently argued that payphones were constitutionally… Continue Reading...

Apple Vs Federal Government

or switches on location services, for instance? With the government's appetite for surveillance in the wake of increased security threats, some of these possibilities cannot be ignored. This would lead to grave violations of constitutionally protected rights. Overall, both Apple's privacy concerns and the government's security concerns are important -- none of the concerns can be understated. As an organization, Apple has the responsibility to protect its customers' private data from hacking, identity theft, malicious foreign entities, and unjustifiable government surveillance. This is a critical concern in an increasingly risky cyber security environment. Equally, the government has a duty… Continue Reading...

Hsms Gap Analysis Hazard Identification and Risk Assessments

machineries to be mounted on anti-vibration mounts. 1 Month Manager 3000 € Physical observation. Maintenance records and local purchase orders. 12-01-17 3 Health surveillance. Conduct audiometry test on all vulnerable workers/ operators and results to be conveyed and kept as records. 1 Month Manager 3000 € Audiometry records for all staff clearly categorized separately for people with defects and healthy. Health records/ medical reports. 12-01-17 4 Encourage participation from employees. Encourage employees to seek medical advice if hearing damage is suspected. 1 Month Supervisor/ Line management 500 € Check record of referrals to clinic/ hospitals for hearing complaints. 12-01-17 5 Reduce duration of exposure to workers.… Continue Reading...

Digitalization to Enhance Customer Satisfaction at Apm Terminals

technologies in an effort to serve their customers better. Among other technologies, cargo tracking technologies, surveillance systems, sensor technologies, wireless technologies, mobile equipment, drones, 3D printing technologies, and analytics technologies are gaining popularity in the port industry. These technologies have proved to be valuable in ensuring timely shipping and cargo delivery, guaranteeing cargo security, maximizing port capacity, improving process efficiency, and reducing operational costs for both port operators and their clients (Accenture, 2016; Heilig, Schwarze and Vob, 2017). Nonetheless, there is little empirical evidence of the relationship between digitalization and customer satisfaction in the port industry. Focusing on APM… Continue Reading...

Digitalization to Enhance Customer Satisfaction at Apm Terminals

an effort to serve their customers better. Among other technologies, cargo tracking technologies, surveillance systems, sensor technologies, wireless technologies, mobile equipment, drones, 3D printing technologies, and analytics technologies are gaining popularity in the port industry. These technologies have proved to be valuable in ensuring timely shipping and cargo delivery, guaranteeing cargo security, maximizing port capacity, improving process efficiency, and reducing operational costs for both port operators and their clients (Accenture, 2016; Heilig, Schwarze and Vob, 2017). Nonetheless, there is little empirical evidence of the relationship between digitalization and customer satisfaction in the port industry. Focusing on APM Terminals (APM),… Continue Reading...

Use Of Chlorhexidine to Prevent Healthcare Associated Infections

Disease Control and Prevention. Retrieved  01 May 2017 from https://www.cdc.gov/hai/ surveillance/  Chlebicki, M. P., Safdar, N., O’Horo, J. C., & Maki, D. G. (2013). Preoperative chlorhexidine shower or bath for prevention of surgical site infection: A meta-analysis. American Journal of Infection Control, 41(2), 167-173. doi:10.1016/j.ajic.2012.02.014 CBIC, (2016). Certification. Certification Board of Infection Control and Epidemiology. Retrieved May 4 2017 from https://www.cbic.org/certification  Edmiston, C. E., Bruden, B., Rucinski, M. C., Henen, C., Graham, M. B., & Lewis, B. L. (2013). Reducing the risk of surgical site infections: Does chlorhexidine gluconate provide a risk reduction benefit? American Journal of Infection Control, 41(5).… Continue Reading...

Edward Snowden Essay

essentially as a domestic intelligence agency (Stein, 2013). In addition, Snowden revealed how the NSA’s telephone surveillance program can gather data on American citizens’ telephone calls including the numbers dialed, the length of the conversations and the dates on which they occurred (McCarthy, 2013). The disclosure of PRISM, an initiative by the NSA’s to gain direct access to servers in major online providers such as Google, Yahoo, Facebook, Microsoft and Apple, and others (Francheschi-Bicchierai, 2014). This disclosure caused a flood of criticism from the international community in general and the citizens of the U.S. and the U.K. concerning security,… Continue Reading...

Media Theory Essay

problems, as non-human actors become part of increasingly complex systems. Finally, digital media has enabled formal and informal surveillance and other forms of illicit behavior, transforming the relationship between actors and objects in ways that could alter political and social realities. Actor-network theory is an ideal lens and process by which to better understand the complex gamut of cybercrime. Developed initially in the 1980s and solidified in the 1990s, actor-network theory views technology within a social science framework. With actor-network theory, technology and media are both viewed as extensions of social and cultural realities, which is why the theory… Continue Reading...

Improving Public Relations Between the Police Department and the Citizens

third party that they are seeking to arrests or question. Body cams will come in handy in the surveillance of the said interaction between officers and community residents so as to not only enhance accountability but also help in the investigation of deviations. Violations can be investigated and corrective action instituted in the form of enhanced training or disciplinary action. b) Constitution of an Investigative Team. There is need to ensure that all complains against our officers are handled in a non-biased and professional manner. Members of the team could comprise of officers in a supervisory rank. The team… Continue Reading...

Public Health Officials Using Computers to Manage Outbreaks

as digital epidemiology provided strategies and methods for allowing digital-technology users to monitor infectious disease and conduct surveillance. These strategies help in the understanding of concerns and attitudes regarding infectious diseases. The process begins with the basics, such as the availability of internet access, online sharing platforms and other digital devices. These sources offer huge amounts of data. It is important to note that while these sources collect data, they do not, do so, with public health objectives in focus (Denecke, 2017). The past few decades have seen tremendous changes in the world. There have been many and varied… Continue Reading...

Intelligent Information Systems for Cars and Highways

whereby automobile manufacturers drive technological advancements. Regarding privacy, data security, and surveillance concerns, Hubaux, Capkun and Luo (2014) note that with smart technologies, all vehicles are effectively tracked at all times via the use of electronic license plates (p. 51). Resistance to constant third party monitoring also impedes rapid implementation of smart cars and smart highways. The same technologies used to save lives can become a “Big Brother” scenario (Hubaux, Capkun and Luo, 2014). Which companies or government agencies have access to or own the data is a core issue. Drivers may want assurances that their movements are not being… Continue Reading...

Sexually Transmitted Diseases and How Automated Disease Diagnosis and Monitoring Can Help

the state healthcare agencies. The mission CPDH pursues is the enhancement of the efficacy of surveillance exercises as well as the quick identification of health occurrences amid public via the gathering of timely and up-to-date surveillance information across the State. This provides a platform for reporting as well as collection of health conditions in real time throughout the year. CPDHs and LHDs (or Local Health Departments) are both allowed to use recent infections and laboratory results for disease monitoring, case management operations and public health examinations (California Department of health, 2017b). California is quite distinct in the sense that,… Continue Reading...

The Us Grant Programs for Emergencies

The initiative put into action using PHEP Grant funding aims at improving communications systems, facilitating disease surveillance and reporting, and designing and implementing emergency preparedness and mitigation plans (Emergency Response Department, 2017). The initiative’s objective is collaborating with partners in the community, for tackling public health crises and threats like bioterrorism and contagious disease epidemics. Since the year 2002, PHEP has offered over eleven billion dollars to public health organizations nation-wide (U.S. Department of Health & Human Services, 2017). The funding aids health departments in developing and strengthening their capability of successfully responding to diverse threats to public health,… Continue Reading...

Analyzing Two Global Security Organizations

well as employees with specialized skills and competencies in analytics, intelligence, surveillance and other sectors. Yet all operations fall under the rubric of the primary leadership structures of the parent organization. For example, the investigative solutions that TAL Global offers combine expertise in surveillance, litigation and legal prowess, with law enforcement strategies and techniques too. Both TAL Global and Wexford Group have in-house and international teams that work within various jurisdictions, necessarily navigating complex systems of international law and policy. However, Pillsbury’s (2017) Global Security Services focus more exclusively on the legal domains of international threat mitigation. Likewise, TAL… Continue Reading...

Sars and Patient Rights

a case in which informed consent would be required. 2 The data was clearly collected for research, since the time for surveillance had already passed as had the time for prevention. The Center simply wanted to know more about SARS since it had limited information at that point, and obtaining blood samples would allow the researchers to see if the disease had spread and what types of people were more susceptible. Thus, the whole point of the data collection was to obtain information for research purposes—and thus the people involved in the data collection should have been required to obtain informed… Continue Reading...

Health Concern Database Query Report

2% of the entire population of the United States. According to the HIV surveillance Report, “the annual number and the rate of diagnoses of HIV infection in the United States decreased” within the period under consideration (i.e. between 2010 and 2015). The HIV surveillance Report provides detailed analysis of surveillance data on HIV infection from across the country. The data is compiled and disseminated by the Centers for Disease and Prevention. It should, however, be noted that although the HIV infection rates dropped across all the categories within the specified period, data presented by the CDC (via the surveillanceContinue Reading...

Georgia Environmental Quality Departments

assessment methods which apply to public health issues The mission of GDPH is to offer primary prevention measures by integrating surveillance work, education programs, enforcement measures and programs for assessment aimed at identifying, preventing and alleviating the conditions likely to negatively affect human health (Georgia.Gov, 2017b). GDPH carries out inspections on foods, motels and hotels and pools to ensure that safety and health standards are upheld. Information on inspections and scores can be found on this link https://dph.georgia.gov/environmental-health-inspections (Georgia.Gov, 2017c). GDPH has a comprehensive waste water management system. GDPH issues certification for installers and pumpers of septic tanks, portable sanitation… Continue Reading...

Airlines Environmental Footprint

Data Communications systems have been promoted by the FAA and GPS surveillance is already allowing for carriers to streamline their routes (FAA, 2011). However, this is only one aspect of reducing emissions and hold-ups at airports can still cause lag time and increase fuel burn for jets that must wait while other jets clear the runway, disembark passengers, board and so on. Crews must be more efficient in handling the day-to-day airport activities in their support of carriers in order to assist in the reduction of fuel burn. Addressing discharges from fueling, de-icing and other industrial activities is also… Continue Reading...

Sepsis

relating to the nursing care of severe sepsis patients are made. Prevention recommendations relate to education, accountability, surveillance of nosocomial infections, hand hygiene, and prevention of respiratory, central line-related, surgical site, and urinary tract infections, whereas infection management recommendations related to both control of the infection source and transmission-based precautions” (Aitken et al., 2011). This study shows that preventing and minimizing sepsis is a truly involved process, one that has numerous aspects and requires the utmost professional excellence. For pediatric cases of sepsis, there needs to be an aggressive strategy in place, to minimize mortality. This was the focus… Continue Reading...

Fast Food Restaurant Security

Keys,” (n.d.). http://areasafe.com/products/category/e-cylinders-smart-keys/ Locknet (n.d.). Physical security audit checklist. https://www.locknet.com/newsroom/physical-security-audit-checklist/ Reynolds, E. (2015). Video surveillance lighting 101. Security InfoWatch. http://www.securityinfowatch.com/article/12103875/video-surveillance-lighting-101 Continue Reading...

Zika Virus Essay

2016, and there have been outbreaks reported in 20 countries and territories since active surveillance began in earnest. This essay provides a brief description of the Zika virus and an analysis of recent and current trends in global Zika virus infections. The paper concludes with a summary of the research and important findings concerning this growing global public health threat. Introduction The U.S. Centers for Disease Control (CDC) reports that members of the Flaviviridae family are all grouped in a single genus, flavivirus (Flaviviridae, 2016). These mosquito-borne pathogens include yellow fever, West Nile viruses, Dengue fever, Japanese encephalitis, and… Continue Reading...

The Virginia Tech Shooting

ongoing issue (Lyttle, 2012, p. 14). The University also now has surveillance cameras and speaker systems installed throughout campus to help monitor and alert students and staff (Lyttle, 2012). Changes Made to Campus Safety Procedures at a Separate University in the Wake of the Virginia Tech Massacre In the wake of the Virginia Tech shooting, students at Utah universities were given the right to carry concealed weapons on campus and in class (Lyttle, 2012). This represents a dramatic contrast with many universities that enforce gun-free zones. Personal Observations/Lessons Learned Observations and lessons learned from this case are: 1) Cho… Continue Reading...

Guide to Writing in Third Person (2018 Edition)

the third person. “The third person narrator, instead of being omniscient, is like a constantly running surveillance tape” (Andrew Vachss). “That's a sure sign someone is going crazy - when he refers to himself in the third person, talks in low tones, and walks around wearing shades all day!” (Chris Rock) Conclusion The greater your comprehension of writing in third person in comparison to other perspectives, the more you will have command of your writing. Using the third person successfully means you will inspire more confidence in your readers. You will also be able to give a greater variety to… Continue Reading...

Models Of Policing

oriented towards engaging with community members than with actually doing surveillance. In the reactive model of policing there is little interaction between the police and the community unless there is a reason for police to get involved—i.e., a crime has been committed or there is reason to suspect a person of committing a crime. This model also differs from OMP in that it does not focus on preventive strategies but rather is wholly reactive. It operates on a kind of “supply and demand” structure in the sense that if there is no demand for policing, the police will not… Continue Reading...

The Active Shooter Crisis in America

involving an active shooter, terrorist, or any other criminal. surveillance of ideologically driven individuals may certainly help with prevention methods, but it may be nearly impossible to identify the lone wolf types given their lack of interest in or affiliation with suspicious groups (Capellan 398). Even as gun control policy is a sensible debate to have, public policy on gun control is only one of many possible and necessary approaches to the active shooter crisis. Evidence does show that the “run, hide, fight” model and the video distributed by the Department of Homeland Security has been helpful in building… Continue Reading...

Health Concerns Involving Breast Cancer

is recommended for such individuals, along with genetic testing and counseling, risk-reduction surgery, chemoprevention counseling, and increased surveillance options in case the individual meets genetic or familial risk conditions (Padamsee, Wills, Yee & Paskett, 2017). Ethnic factors Evidence from research on health-related ethnic disparities maintains that inadequate knowledge on cancer, its symptoms, related services, and ethnic minority and African-American populations’ lower healthcare service access are factors contributing to their relatively lower cancer service utilization. Certain studies reveal that Black immigrants continue to be marginalized when it comes to health promotion, on account of the ‘migration effect’ (new immigrants might… Continue Reading...

Privacy and the Internet

the Internet has been turned into a tool of mass surveillance, notably with the NSA always lurking and spying on the Digital Era’s best means of communication. To some extent this type of spying and violation of privacy has become accepted as the norm because sociopolitical discourse in the modern era presupposes that there are two types of people in the world, as Greenwald puts it—those who are good (who do not plot against the state) and those who are bad (terrorists who do plot against the state). Those who are good have nothing to hide and therefore should… Continue Reading...

What Is the Relationship Between Control and Planning

decisions. Although having workers come to the office on time is important, if managers are unreasonable about engaging in surveillance and show little respect for or trust in workers, this can result in substantial costs of office morale and goodwill. Planning determines that the right actions will be taken and controlling determines that the actions will be carried out. Without determining that the right plans have been made, controlling will not result in optimal results. The ultimate goals for every organization usually involves a mix of profitability and productivity, although how these objectives are defined will vary from organization… Continue Reading...

Charlotte Perkins Gilman “the Yellow Wallpaper”

writing on her own, she is afraid to criticize her husband, as the surveillance of patriarchal society is always observing her, including John’s sister. Before the rest cure has fully begun, there are signs that the woman has a more adversarial rather than a loving relationship with her husband as one might expect. “If a physician of high standing, and one's own husband, assures friends and relatives that there is really nothing the matter with one but temporary nervous depression—a slight hysterical tendency—what is one to do?” she says (Gilman). Her husband insists on speaking for the two of… Continue Reading...

Why My Vote Matters Essay

& Newman, 2005). Other researchers have found “higher levels of citizen participation signal to representatives greater surveillance of their actions by their constituents and, thus, a higher probability of sanction. Representatives respond to these signals by deploying resources in ways that provide better intelligence of district needs and preferences. As a consequence, higher citizen participation is rewarded with enhanced policy responsiveness” (Martin & Claibourn, 2013).  [ text from this essay is missing, view full version to see entire paper. ] Another reason that voting is so crucial is because there are still close races for elected officials, where literally… Continue Reading...

Methicillin Resistant Staphylococcus Aureus Mrsa and Lyme Disease

and kept clean (especially in hospital settings), etc. References Beltz, L.A. (2011). Emerging Infectious Diseases: A Guide to Diseases, Causative Agents, and surveillance. Hoboken, NJ: John Wiley and Sons. Boswihi, S.S. & Udo, E.E. (2018). Methicillin-Resistant Staphylococcus Aureus: An Update on the Epidemiology, Treatment Options and Infection Control. Current Medicine and Practice, 8(1), 18-24. Centers for Disease Control and Prevention- CDC (2018). Lyme Disease. Retrieved from https://www.cdc.gov/lyme/index.html Centers for Disease Control and Prevention – CDC (2016). Methicillin-Resistant Staphylococcus Aureus (MRSA). Retrieved from https://www.cdc.gov/mrsa/lab/index.html Domino, F.J., Baldor, R.A., Golding, J. & Stephens, M.B. (Eds.). (2017). The 5-Minute Clinical Consult (26th ed.). Philadelphia: Wolters Kluwer… Continue Reading...

Digital Culture

is public lifestyle of digital culture, according to Zaslow (“ surveillance and Privacy”). As a result, information and the sharing of information have impacted the digital culture of today’s world by making it more ubiquitous, more intrusive, more evasive, and even more omniscient if that is possible. It is as though everything were being watched, and as an individual living in the modern world, where technology is a part of every process of human activity it seems, cannot escape the digital eye many simply shrug their shoulders: if you cannot beat them, join them. So Big Data and the purveyors… Continue Reading...

How Immigrants Deal with Discrimination

migrants as well as their social service and employment access and increasing surveillance on them. Undocumented or irregular immigrants form the main target populations of such efforts. Still, an emphasis on the legal difficulties of migrants might cause one to underestimate the contribution of aspects like ethnic/racial background in shaping their experiences in the US. Therefore, researches conducted in the U.S have noted that racialization projects as well as immigration policies usually frame groups that share a similar background into one single “other,” overlooking key within-group disparities (e.g., Latinos within the US). Further, studies reveal that receiving countries’ organizations… Continue Reading...

Boston Marathon Bombings

by security cameras and bystanders succeeded in identifying the two primary suspects and surveillance-camera pictures of the pair were released to the public on the evening of April 18, 2013 (Frommer, 2013). That same evening, a 27-year-old police officer working at the Massachusetts Institute of Technology was murdered by the two Tsarnaev brothers as he sat in his patrol car, apparently in an attempt to obtain his service revolver (Frommer, 2013). Shortly thereafter, the older brother stole a Mercedes SUV, and took the driver hostage, explaining that he was one of the two Boston Marathon bombers. The younger brother… Continue Reading...

Homeostasis Its Effect on the Critically Ill

is reducing bacteria exposure among the critically ill. The process entails disinfection, surveillance and absolute hygiene as well as selective decontamination. Recent findings suggest that bacterial colonization is only the symptom of the nosocomial infection and not the cause. The two suggested strategies for alleviating infection include better control of glucose in the blood and early restriction of macronutrients as previously discussed (Ingels, Vanhorebeek & Van, 2018). When critically ill, hyperglycemia becomes an expected response to stress. It is this hyperglycemia that causes mortality and morbidity. Sustained normal glycemic levels through insulin therapy have been shown to reduce the… Continue Reading...

Problems Implementing Cpted Measures

For example, a space might have large trees that obstruct surveillance, but those trees cannot be cut down without permission from the owner, or the city, and that permission is not forthcoming (nor cutting the trees be desirable for reasons that have nothing to do with security). Situations like that leave a business with certain barriers to implementing CPTED that may prove too challenging to overcome (Krehnke, 2009). There are ways to overcome these challenges of course. Fisher and Piracha (2011) provide a case study of multi-agency cooperation to overcome some of the logistical barriers that might prevent certain… Continue Reading...

Development Of an Health Advocacy Campaign

from a recent survey conducted by Behavioral Risk Factor surveillance System, the rate of obesity amongst adults in the United States presently surpasses 35 percent in 7 states, 30 percent in 29 different states and 25 percent in 48 states. Specifically, at the present moment, the state of West Virginia has the greatest rate of obesity in the nation at 38.1 percent (State of Obesity, 2018). Health Advocacy Campaign Plan Overweight is delineated as having a Body Mass Index (BMI), or weight-to-height ratio, that is higher than or equivalent to 25 and lower than 30, whereas obesity is delineated… Continue Reading...

Reducing Patient Falls

improved bedside alarms, slippers or footwear that prevents slips, and improved monitoring or surveillance tools for head nurses (Health Research & Educational Trust, 2016). Therefore, common themes in the literature relate to leadership, change management, communications, and technological innovations in preventing falls. Plan of Action After a distillation of the review of literature into a comprehensive but concise problem statement presented to hospital administration, the plan of action begins with mandatory staff meetings to provide an overview of the issue. Through staff meetings, nurse leaders will be empowered to offer their input as to how they can prevent falls,… Continue Reading...

Art Of War

on precipitous heights because of the strategic advantage of surveillance and prediction: being prepared. High ground confers multiple advantages in wars involving more advanced technological tools, such as the means by which to use tunneling and other terrain manipulations. If the enemy has occupied a high point first, Sun Tzu advises against being lured to higher ground. Interestingly, being located at a far distance from the enemy is considered not to be an advantage. Initiating a battle from a distance could theoretically prove disastrous. Yet in the art of war involving both cyber and aerospace, distance issues may be… Continue Reading...

Berg Versus Allied Security Inc

overworked and could not continuously supervise the security monitors. Had this guard been on the surveillance system monitoring the parking space, they would have definitely noticed the criminal attack incident against Joan Berg and initiated immediate assistance.  3. Was the CPTED concept applied properly?     The CPTED (Crime Prevention through Environmental Design) concept is premised on the conviction that crime may be impacted by an effective plan and application of a manmade environment (Kinney at al. 376–402). According to Kinney et al., the CAPTED concept is an essential link between human behavior and the design of the environment. The… Continue Reading...

Security and the Wall

(2017) notes, protective lighting is helpful but it really should be supported by surveillance systems, as these actually help to identify an intruder, capture the intruder on film, and set off an alarm that can alert security personnel if the threat is identified as real. Fennelly (2017) points out that “the job of security now must change to be more proactive” (p. 19) and this is for the precise reason that passive security systems (such as lighting) are simply not enough to withstand an intrusion or a threat to one’s property. More active defenses are needed: alarms, protective dogs,… Continue Reading...

Managing Theft with Low Tech and High Tech Techniques

after the normal operating hours were downgraded but at the same time were adequate enough to help in the surveillance of the area by the security patrols (Atlas, 2013). Image 1 Image 2 Image 3 Image 4 As outlined by IESNA (2003), numerous supermarkets in the present day are major volume operations surpassing more than 100,000 square feet, and offering a huge range of service whilst attracting thousands of consumers on a daily basis. Numerous of these supermarkets and malls such as Aventura Mall operates 24 hours every day of the week and their parking lots are massive. Approximately,… Continue Reading...

Physical Security Design and Methods Of Security

(Elert & Associates, 2013). The detection system could be alarms, surveillance systems, security lighting, alarms, CCTV cameras, and patrol guards where threat is higher. For security the attacker may have passed undetected through the obstacles and past the detection system (Elert & Associates, 2013). The final thing is to make an attempt at stopping the attacker. Security response from security guards has only one responsibility and that is to frustrate, repel and capture the attackers. By so doing whatever the attack was intended for is quelled (Elert & Associates, 2013). The implementation of physical security entails four layers. They… Continue Reading...

Hiv Aids Pandemic Outbreak and Discussion

“In September, Congressional representatives Henry Waxman and Phillip Burton introduce legislation to allocate $5 million to CDC for surveillance and $10 million to the National Institutes of Health (NIH) for AIDS research” (hiv.gov). This move signaled to the rest of the world just how serious the outbreak was: with so many people infected and unaware of it, the disease could spread rapidly with people completely oblivious to the fact that they were spreading it. In many ways, that’s exactly what happened. The following year, 1983, was a noteworthy year regarding the spread of the disease. In this year, the first cases… Continue Reading...

Joint Function As Related to Operation Anaconda

adversaries, threats, and weather. It is concerned with information collection and synchronizing this with tactical tasks of surveillance, reconnaissance, intelligence operations, and security. Intelligence development is a continuous process of analyzing information from different sources. The fires function denotes the collective and coordinated use of air and missile defense, indirect fires, and joint fires. Army fires systems will deliver fires in support of defensive and offensive tasks in order to create a lethal and nonlethal effect on the target. Sustainment function provides support and services in order to ensure freedom of action, prolong endurance, and extend operational reach. Sustainment… Continue Reading...

Defence and National Strategy

putting assets into orbit. As a recommendation, the Air Force must improve the surveillance of space, mitigate vulnerability in space and guarantee access to the space domain to achieve low operational and production costs (Bush, 2002). Freedom of Action in Cyber Freedom of action in cyber is a global domain found in the information environment. It consists of an information network on technology infrastructures such as computer systems, internet, telecommunication networks and processors existing interdependently. Cyber has recently been acknowledged to be important to military operations. However, for several decades now, the government, the private sector and academia has… Continue Reading...

Military Tribunals or Federal Courts Terrorism

allowed the admission of certain types of evidence—such as that yielded from unlawful surveillance—that would not have been permitted in a standard criminal case (p. 1). Federal civilian court trials do not necessarily equate with justice, just as military tribunals do not amount to miscarriages of justice. Contrary to popular belief also, federal civilian court trials allow for the protection of classified data that could be revealed more openly in the closed system of the military tribunal (“Myth v. Fact: Trying Terror Suspects in Federal Courts,” 2018). However, civilian courts do offer the opportunity to suppress or disallow evidence… Continue Reading...

Doctors Without Borders and Clean Water Crisis

violence. What is more, the members of this group rendered vaccinations and conducted health surveillance projects. The logistical staff members strived to enhance accessibility to drinking water, through supplying the residents in the region with approximately 2 million liters of water on an everyday basis (Fox 105). It is possible to volunteer with Doctors Without Borders. Local volunteers that are above the age of 18, from various backgrounds, ethnicities and interests enjoying giving their time into the United States office can join. Volunteers are delegated to work in positions which might encompass clerical work or expert services and experience.… Continue Reading...

How to Achieve Environmental Health

surveillance System for an Environmental Health Concern Introduction Environmental health is an important concern for health care providers because it comprises the areas of human health that are impacted by external factors, such as chemical agents, biological agents, physical environment and so on. Issues that fall under environmental health are air pollution, water pollution, pesticides, chemical spills, and other areas (Laroque, 2009). Because of the risk of these areas negatively impacting human health, there is a need to monitor environmental… Continue Reading...

New Equipment Development on Operation Influence Of Air Force

increase the coverage range and thus the strike as well as surveillance capabilities. At present, there are also various degrees of autonomy in reference to the operation of UAVs. It should be noted that although UAV are yet to be fully autonomous, significant technological advancements have effectively made this goal even more realistic in the coming years. In basic terms, “the ability of a UAV to take off, execute a mission, and return to its base without significant human intervention promises to enhance UAV deployment in many application domains” (Valavanis and Vachtsevanos, 2014, p. 104). Minimal human intervention would… Continue Reading...

How Germans View the Holocaust

though. They see the rise of the police state, of the surveillance state, coming out of the shadows again. They see it everywhere and they fear it. Their fear now is that the state will be like it was in the past. Perhaps the Germans did not move quickly enough to atone for the crimes they were told they committed. Perhaps in the East, where they denied all responsibility, and in the West where they at least listened to what they were told they did and accepted it, there should have been more willingness to act and begin a… Continue Reading...

Alternative Points Of View on the Abortion Debate

abortion. The International journal of health planning and management, 32(1), e39-e46. CDC (2018). CDCs abortion surveillance system FAQs. https://www.cdc.gov/reproductivehealth/data_stats/abortion.htm Faúndes, A., & Miranda, L. (2017). Ethics surrounding the provision of abortion care. Best Practice & Research Clinical Obstetrics & Gynaecology, 43, 50-57. “Historical Attitudes to Abortion,” (n.d.). BBC. http://www.bbc.co.uk/ethics/abortion/legal/history_1.shtml Ravitz, J. (2016). The surprising history of abortion in the United States. CNN. 27 June, 2016. https://www.cnn.com/2016/06/23/health/abortion-history-in-united-states/index.html   Continue Reading...

Mao Zedong and Defense Philosophy

stealth aircrafts, and helicopters. The PLA is also attentive on defending against possible electronic warfare, precision strike, surveillance and reconnaissance. According to Cheng (2011) the U.S. has an ability to dictate tactical and operational terms in any conflict through executing precision and coordinated strikes with their space assets. The U.S. is also able to dictate strategic conflict terms through influencing opposition will support from third parties, and domestic opinion. China is eager and alert in their intention of creating a deep defense mechanism against the threat from the U.S. The defense extends beyond operational and tactical levels through the… Continue Reading...

Economic Disadvantages and Respiratory Issues

National Asthma Control Program. Programmatic schemes have been established and incorporated into three component regions: interventions, surveillance and partnerships (Florida Health, 2019). Communication Plan Prescriptive drug therapies: Also referred to as maintenance drugs, they are generally consumed daily on a long-term basis in order to control chronic asthma. These drugs might be used occasionally if your kid’s symptoms of asthma worsen in specific times of the year. There are different kinds of long-term control drugs. They include: · Inhaled corticosteroids: These anti-inflammatory drugs are most common long-term asthma control drugs. They include Flovent HFA (fluticasone), Pulmicort (budesonide), Qvar (beclomethasone),… Continue Reading...

Neurofibromatosis

A. (2017). Optic Pathway Gliomas in Neurofibromatosis Type 1: An Update surveillance, Treatment Indications, and Biomarkers of Vision. Journal of Neuro-Ophthalmology, 37, S23-S32. Gutmann, D. H., Ferner, R. E., Listernick, R. H., Korf, B. R., Wolters, P. L., & Johnson, K. J. (2017). Neurofibromatosis type 1. Nature Reviews Disease Primers, 3, 17004. Kruyt, I. J., Verheul, J. B., Hanssens, P. E., & Kunst, H. P. (2018). Gamma Knife radiosurgery for treatment of growing vestibular schwannomas in patients with neurofibromatosis Type 2: a matched cohort study with sporadic vestibular schwannomas. Journal of neurosurgery, 128(1), 49-59.   Continue Reading...

Homeland Security and the Distinction Between Isr and Iaa

The Distinction Between ISR and IAA The intelligence, surveillance, and reconnaissance have capabilities that are aimed at improving the informational and situation awareness to the department of homeland security. The capabilities of ISR have increased in demand since the incident of Hurricane Katrina. The same capabilities of ISR are the ones that are termed Incident Awareness and Assessment (IAA). The Incident Awareness and Assessment (IAA) capabilities have been leveraged to respond to various kinds of threats such as hurricanes, wildfires or even ocean oil spill. The ISR has… Continue Reading...

Technologies Used by Isis the Terrorist Organizations

is absolutely possible for drones to be used by insurgent groups for surveillance, reconnaissance, intelligence gathering and other terrorist missions. Turkish rebels were used in January 2018 to carry out swarming attacks against Russian Bases inside Syria (The Cipher Brief, 2018). Hacking What intelligence officers feared most appears to be coming to pass. Junaid Hussein, A British Pakistani lived his life online and learned how to become an expert hacker (Carlin, 2018). His hacking missions would occasion a tech savvy terrorism mission that would extend the reach of the ISIS terror group beyond their physical location (Carlin, 2018). In… Continue Reading...

Securing a School Compound

the roof of the complex allowing for a 360-degree surveillance of the perimeter and beyond. This guard booth would be armed in case of a terrorist breach of the perimeter. A turret on both west and east wings would be installed for defensive purposes and a turret on the north face and the south face could also be installed for further defensive measures. However, in order to prevent a culture of criminality, as Tanner-Smith, Fisher, Addington and Gardella (2018) call it, the security forces should be blended in with the natural surroundings of the environment and with physical installations… Continue Reading...

Ethics and Technology at Homeland Security

number of court cases, especially those involving wiretapping, confiscating hard drives, or surveillance through FISA courts. Though these activities are conducted in order to obtain evidence so that the target might then be aptly accused of a crime, the Fourth Amendment is clear about persons being accused, first, and then detained or searched, and not the other way around. Any technology types that would enable DHS or FEMA to abrogate the Fourth Amendment should be carefully considered before being put into use. Likewise, drone technology represents a slippery slope because it is so easy to weaponize and can be… Continue Reading...

Air Force Tactical Force to Force Exercise

al., (2018) survey identifies that the combat control operators provide intelligence, command, surveillance control and reconnaissance than enable application of both lethal and non-lethal airpower across different military operations. The 35-week training produces the most highly trained personnel in the US military with Federal Aviation Administration air traffic control qualification. Military (2019) notes that it’s upon the completion of the combat control training that the combat controllers get to wear the scarlet beret. The first week of the training at the entails an Indoctrination course that focuses on CCT history and fundamentals, sports physiology basic exercise and nutrition. The… Continue Reading...

Epidemiology and Valley Fever

et al., 2019, p. e2). To understand the reality of the fungus, a proper epidemiological approach is therefore necessary. surveillance is a top priority in any epidemiological approach. Laboratory tests are used to confirm cases and incidence of the disease is recorded, monitored and analyzed. Severity, seasonality, geographical associations and so on are all examined during surveillance. Interviews with people who have been infected can be helpful in obtaining additional information about their habits, practices, recent travels and so on. This gives a clearer idea of where the patients had been prior to infection and where they might have acquired… Continue Reading...

Policy Alternatives for Mental Health

that public health systems in the United States have relied on public health surveillance to develop health programs. In this case, public health system in the U.S. utilize mental health surveillance to collect data regarding mental health conditions and plan health programs. Additionally, various health programs and initiatives are used as a means for promoting the mental health and wellbeing of adults suffering from mental disorders. The National Institute of Mental Health (2019) reports that some of these initiatives include inpatient treatment or counseling and outpatient treatment or counseling. Such treatment or counseling approaches for adults are regarded as… Continue Reading...

Endangered Hawaiian Monk Seals

ciguatoxin. The authors are of the opinion that the relevance of continued surveillance cannot be overstated as an approach to the early detection of various infectious diseases. Coupled with other conservation strategies, this is an approach that could immensely help in future conservation efforts. The fact that the authors in this case make use of an appropriate sample size further enhances the precision of the study’s estimates. Kittinger, John et al. “Sociocultural Significance of the Endangered Hawaiian Monk Seal and the Human Dimensions of Conservation Planning.” Endangered Species Research. 17. (2012): 139-156. Human conflicts with species have, in some… Continue Reading...

Discrimination and Employment Law

states have made this illegal, but employers still demand the right to exercise some surveillance over behaviors which can impact workplace conduct, such as drug use in sensitive occupations. As an employer and owner of an insurance agency, I believe that employees function best when they know they are trusted in a workplace context, and therefore I do not monitor employee behavior outside of the workplace. I would feel very uncomfortable if an employer even expressed interest in my behaviors such as smoking or doing extreme sports that might impact the workplace in the form of sick days or… Continue Reading...