Thursday, October 31, 2019

Consumer Compliance- Discussion Post 4 Assignment

Consumer Compliance- Discussion Post 4 - Assignment Example CFPB and FTC both have limited powers to sue any party but are free to intervene in the litigation. Both agencies coordinate their activities in ensuring elimination of task duplication. For instance, both bodies would inform each other of an investigation and enforcement of actions against any party that exploits consumers. FTC and FFPB both conduct a joint customers’ education in promoting consistency of information and proper knowledge about the use of resources (FTC, 2012). CFPB protects consumers against exploitation by banking institutions and credit unions. FTC, however, does not serve to protect consumers over banks and credit unions. FTC develops auto financial tips on its website in conjunction with American Financial Services Association and National Automobile Dealers Association. CFPB, however, does not provide financial tips. CFPB gathers consumers’ complaints on its website and forwards them to relevant authorities that resolve consumers’ grievances. The strategy that CFPB uses in consumers’ protection is strict and firm while FTC’s web site is neutral and adopts no strict measures in solving the problems of customers (Consumer Financial Service Group, 2011). Consumer Financial Service Group. (2011, July 7). How the CFPB and the FTC interact (part 1). CFPB Monitor. Retrieved May 13, 2015 from http://www.cfpbmonitor.com/2011/07/07/how-the-cfpb-and-the-ftc-interact-part-i/ Federal Trade Commission (FTC). (2012, January 23). Federal Trade Commission, Consumer Financial Protection Bureau Pledge to Work Together to Protect Consumers. Press Release. Retrieved May 13, 2015 from

Tuesday, October 29, 2019

Youngs modulus of elasticity of nicrome wire Essay Example for Free

Youngs modulus of elasticity of nicrome wire Essay This can be avoided by not adding the weights if and when there are persons on the wooden block side of the wire. Apparatus Wire (around 3. 5 meters) 2x wooden blocks 1 G-clamp Weight Hook 12-15 weights. (100g each) Accuracy 0. 1g in 100g = 0. 1% error Roller Pulley Celotape Micrometer Screw-gauge. Accuracy 0. 01mm in 0. 19mm = 5. 36% error Scale (e. g. Rule) Accuracy 2mm in 3570 mm = 0. 06% error Total Approximate error range: 5. 52% = 6% RESULTS: Note: I have taken the force of one Newton to be the where the extension because I found it difficult to measure the length of the wire without pulling on it. This was because the wire was coiled originally and so kept trying to go back to its original coiled state. This means my wire length will be inaccurate to approximately half a millimetre. This would not have affected the permanent length of the wire because the wire enters the plastic region only after around 10 Newtons (Represented on a graph of axis force against extension) The slip mentioned in the results refers to how much the wire has been pulled from the two markers, which is referred to in the method. The slip is evidently not part of the extension and will be taken into account. Original Length of the Wire = 3570mm. = 3. 57 meters Original Diameter of the wire = 0. 175mm = 1. 75 x 10-4 meters. Area = 0. 0000000962m3 = 6. 92 x 10-8m3 These results may be unduly accurate and this will be taken into account in the conclusion. As the Youngs Modulus concerns the region where Hookes Law is obeyed, then this will be the region where the extension increases in small equal amounts. In this case it is 1-9 Newtons here. As this only caused small extensions of 1mm per each weight added, this is where the biggest errors will occur. Ruler to half millimetre accuracy 0. 5mm in 8mm = 0.5 / 8   100 = 6. 25% CONCLUSION What is Youngs Modulus Of Elasticity for Nicrome Wire? Youngs Modulus For Elasticity is defined as Stress Over Strain. So (Force   Length)   (Extension   Cross-sectional Area). This is the gradient of a graph representing stress over strain. (In the region where Hookes Law is obeyed) Force (N) Stress (Pa) Extension (m) Strain (Pascals) Youngs Modulus (Giga Pascals)   The gradient of the graph represent the stress over the strain. The gradient over the ? y/? x region is big enough to provide a good average. It is more accurate than the tabulated result because it contains the linear y=mx+c graph (This is due to Hooks Law) which is the line of best fit for the results (The average). The y-intercept on the graph is very close to the origin, which is what would be expected because if there were no stress (e. g. no force acting on the wire) then there would be, by definition, no strain, as there would be no extension occurring. This shows that this area is obeying Hooks Law because using the y=mx+c equation, this would say c i 0 (approximately equal to 0). So y=mx where tis the stress, x is the strain, and m is the constant; being Youngs Modulus. Conclusion: My results are accurate, because the graph was a very straight line, as all the points could be plotted to a good degree of accuracy to the original plot from the y=mx equation; Stress = (5. 52 x 1011 ) x Strain :- Where 5. 52 x 1011 Gpa is my result for Youngs Modulus for Nichrome Wire Stress (Pa) Strain Stress=(5. 52 x 10^11) x Strain Error From Original Dividing the result of multiplying the stress by my Youngs Modulus by the original, and multiplying by 100 calculated the error from original column. For every multiplication I got a a result of 6. 72%, which is close to my approximate error range of 6%. My results compared to my prediction: My results, did not entirely agree with my prediction. From preliminary experiments the Youngs Modulus would be in the region of 180 GPa.

Sunday, October 27, 2019

Treating Long Head of Biceps (LHB) Pathology

Treating Long Head of Biceps (LHB) Pathology Abstract Background Clinical examination of the shoulder joint has gained attention in recent years as clinicians aim to practice with an evidence-based and accurate clinical examination of the biceps tendon. There is an increased desire for proper diagnosis while simultaneously minimizing costly imaging procedures and unnecessary procedures. Thus, the purpose of this study is to create a decision tree analysis that enables the development of a clinical algorithm for diagnosing and subsequently treating long head of biceps (LHB) pathology. Methods A literature review of level one and two diagnostic studies was conducted to extract characteristics of clinical tests for LHB pathology through a systematic review of Pubmed, Medline, Ovid and Cochrane Review databases. Tests were combined in series and parallel to determine final sensitivities and specificities, and positive and negative likelihood ratios were determined for each combination using a subjective pre-test probability. The gold-standard for diagnosis in all studies included was arthroscopy or arthrotomy. Results Seven studies regarding LHB clinical diagnostic testing met inclusion criteria. The optimal testing modality was use of the uppercut test combined with the tenderness to palpation of the biceps tendon test. This combination achieved a sensitivity of 88.4% when performed in parallel and a specificity of 93.8% when performed in series. These tests used in combination optimize post-test probability accuracy greater than any single individual test; adding a third test decreases accuracy. Conclusion Performing the uppercut test and biceps groove tenderness to palpation test together has the highest sensitivity and specificity of known physical examinations maneuvers to aid in the diagnosis of long head of the biceps pathology as compared to diagnostic arthroscopy (The PEC exam). A decision tree analysis aides in the PEC exam diagnostic accuracy post testing based on the ordinal scale pre-test probability. A quick reference guide is provided to use in the clinical setting. Level of Evidence: II Systematic Review and Meta-Analysis Key Words: biceps tendon; long head; physical examination; pathology; diagnosis; shoulder examination Introduction The physical examination is a requisite and inexpensive component to medical diagnosis. The shoulder examination, in particular, encompasses a myriad of special provocative maneuvers, displaying a wide range of sensitivities and specificities pertaining to diagnostic accuracy. Accurate understanding from the correct sequence of maneuvers or tests increases diagnostic yield. In the modern era, clinical diagnosis heavily relies on imaging modalities including ultrasound (US), magnetic resonance imaging (MRI), computed tomography (CT), arthrography, and arthroscopy to diagnose shoulder pathology21,33. Current gold standard diagnostic testing options have limitations. MRI has poor statistical characteristics for diagnostic accuracy as it very reader and technician dependent, adds both direct and indirect costs, and may be less accurate than the physical exam37. Diagnostic arthroscopy is successful in diagnosing intra-articular pathology, but is limited in visualization for extra-articular pathology, is costly, and increases patient risk37. Increased use of diagnostic imaging contributes to rising health care costs14,30,32,38. According to the Centers for Medicare and Medicaid Services (CMS), diagnostic imaging costs are significant, accounting for up to 40% of overall healthcare expenditure increases over the past 10 years25. Advanced imaging techniques res ult in not only higher direct costs, but may increase indirect costs and jeopardize outcomes36,39. As the healthcare landscape transitions to cost minimization and value-based healthcare delivery, the development of an efficient, cost-effective, shoulder examination is desired. Shoulder examinations have poor sensitivity and/or specificity that makes diagnosing certain pathologies difficult4,28,30,33. Thus, evaluating the long head of the biceps brachii tendon (LHB) pathology with high-yield examination maneuvers can aid physicians through increasing the accuracy of shoulder diagnoses and aid in surgical decision making. Previously published studies focused on the following questions: whether physical examination special tests correlate with surgical findings; whether imaging correlates with surgical findings; and whether physical exam tests are accurate enough to diagnose pathology effectively5,9,10,26,28,29,33. Currently, there is a need to develop new algorithms to provide shoulder practitioners with a practical but comprehensive evidence-based approach to diagnose LHB pathology during an office visit and to further reduce the need for diagnostic imaging20,22,34. The purpose of this study was to perform a systematic review and a secondary sensitivity analysis based on pre-formed likelihood scenarios based on the history of present illness (HPI) past medical history (PMH), and epidemiology to provide clinicians a practical, evidence-based clinical (P.E.C) physical examination algorithm to accurately diagnose patients with LHB pathology. Specific objectives were to: compile the peak performing physical exam tests extracted from level I and II studies within the English literature; synthesizing the most accurate test combination; develop a clinical algorithm to provide quantify LHB diagnostic accuracy; and create a diagnostic accuracy reference guide. Materials and Methods A systematic literature review with the terms proximal, biceps, clinical and examination in the Medline database through the Pubmed, Medline, Ovid and Cochrane Review databases was completed in May 2015. The searches included the use of Boolean operators such as AND and OR. The databases were scrutinized independently by three authors. Inclusion criteria included studies that were focused on physical examination tests and compared to the diagnostic gold standard from Level I and II studies published in scientific journals. Exclusion criteria were: non-English, non-full text, level III of evidence or lower, related to superior labrum anterior to posterior (SLAP) lesions, investigated rheumatoid arthritis patients, or did not compare tests to a validated gold standard. The validated gold standard utilized for all studies and systematic reviews included were diagnostic arthroscopy or arthrotomy to confirm anatomical findings. Relevant studies were independently assessed, and conflicting studies were included only if there were consensus amongst the authors. References of included studies were additionally evaluated to identify additional articles for inclusion. Applicable data was extracted by reverse calculation where the information desired was not directly stated. Using PRISMA guidelines for systematic reviews (Fig. 1), our original search retrieved 2,086 studies from Pubmed, Medline, Ovid and Cochrane Review databases. Twenty-eight additional records were included through a review of references from each article included in the systematic review. After duplicates were removed, the initial search yielded 2,112 studies. Subsequently, 1,689 studies were removed for irrelevant titles or abstracts, and an additional 362 were excluded because they were not in English. Lastly, the remaining 63 articles were assessed for eligibility; 14 were excluded for non-full text, 22 were excluded for not being level I or II study, and 18 were excluded for non-relevant data. The data extracted was summarized and analyzed according to the statistical methods described by Eusebi et al. focusing on test specificity, sensitivity, positive predictive value and negative predictive value12. Next, clinical tests were combined to assess improved diagnostic accuracy. The clinical tests were applied both in parallel and in series. The first approach in parallel analysis, consists of two special tests performed in theory at approximately the same time. The parallel analysis can interpret the findings in an and or or technique. When a parallel analysis is performed in an or technique, the overall sensitivity of the two tests is greater than the sensitivity of either special test alone. This parallel analysis allows for two opportunities to observe the potential pathology. If both tests are negative then it is considered a negative finding in the algorithm and rule out the pathology, but if just one of the two special tests is positive then it is not considered a negative result in parallel analysis. The second approach in series analysis, consists of two special tests performed; however, the overall negative or positive finding depends on the outcomes of both special tests. By utilizing two special tests in an and technique in series, the specificity for both tests is higher than for either test alone. If both special tests are positive, then it is considered a positive result. If either special test is negative, then the in series analysis cannot be considered a positive result. In order to calculate the post-test diagnostic probability of LHB diagnosis, we performed calculations for each test with four pre-test probability options. Pre-test probability is defined as the probability of a patient having the target disorder before a diagnostic test result is known. Therefore, pre-test probability is based on patient history, subjective complaints, epidemiologic probability and the medical opinion of the provider ordering the test. The ordinal scale created has four different probabilities: very unlikely 0.2 (20%); unlikely 0.4 (40%); likely 0.6 (60%); and very likely 0.8 (80%). The physical exam test combination with the optimal test performance was identified (named the PEC exam). A decision tree analysis was developed to determine the PEC exam diagnostic accuracy post testing based on the ordinal scale pre-test probability. A table was created as a simple reference guide to use in the clinical setting. Results The initial electronic database search retrieved 2,112 unique articles, with 28 obtained from a manual search of reference lists. Of these, 2051 studies were found unrelated to the topic of interest based titles and abstract review, resulting in 63 full-text articles evaluated according to selection criteria. Fifty-four articles were excluded for the following: full-text unavailable (N=14), not a Level I/II study (N=22), and irrelevant data after full-text review (N=18). Seven relevant (N = 7) articles were identified through the systematic review and scrutinized (Supplementary Table S1). From the reviewed articles, special tests and modalities evaluated included Speeds, Yergasons, bicipital groove tenderness, uppercut, bear hug, belly press, OBriens, and anesthetic injection. Statistical characteristics for each test are documented in (Supplementary Table S2). The bear hug and uppercut special tests demonstrated the highest sensitivity for the physical examination special maneuvers (79%, 73% respectively), whereas the belly press and Yergasons tests demonstrated the lower spectrum of sensitivity (31%, 41% respectively). The belly press and OBriens special tests demonstrated the highest special test specificities (85%, 84% respectively), whereas the bear hug and bicipital groove tenderness tests showed the lowest specificities (60%, 72% respectively). Diagnostic ultrasound, used as a reference and also included to study as a potential application for in-office point of service testing, demonstrated the highest sensitivity and specificity of all statistical characteris tics revealed through the review (Sensitivity 88%, Specificity 98%). In series and in parallel assessments determined two physical exam tests improved test performance over any single test. Performing more than two physical examination tests decreased diagnostic accuracy. The uppercut test combined with the tenderness to palpation of the LHB test provided the highest physical examination accuracy for diagnosing pathology at the proximal biceps. This combination has a parallel testing sensitivity of 88.3% and a series specificity of 93.3%. We characterize this as the PEC exam. Additional combinations, including diagnostic ultrasound, are reported in (Supplementary Table S3). The uppercut test and diagnostic ultrasound in parallel revealed the highest sensitivity (97%). Each of the Speeds, Yergasons and upper cut tests paired with diagnostic ultrasound all achieved the highest specificity (100%). A decision tree analysis aides in the PEC exam diagnostic accuracy post testing based on the ordinal scale pre-test probability (Fig. 2). A quick reference guide is provided to use in the clinical setting (Fig. 3). Discussion LHB pathology is an increasingly recognized generator of shoulder pain and functional impairment in symptomatic patients. Physicians are faced with diagnostic challenges due to non-specific clinical presentations and lack of direction based on physical exam findings. As such, the purpose of this study was to perform a decision-tree analysis to create a clinical algorithm to diagnose biceps pathology with increased accuracy compared to previously reported diagnostic examinations 8,11,15-17,19,22,24. This was achieved by conducting a systematic literature review including only level I and II studies. Special test sensitivities and specificities were combined in series and parallel. Analysis showed that the uppercut test combined with tenderness to palpation of the LHB within the bicipital groove provided the highest accuracy physical exam tests for diagnosing pathology at the proximal biceps. Application of this PEC exam, coupled with pre-test probability assignments can now provide cl inicians diagnostic confidence in the office. In equivocal cases, point of care ultrasound examination can further improve diagnostic accuracy2,31. Applying the PEC algorithm provides a simple, efficient and reproducible physical examination protocol for shoulder clinicians yielding an accurate diagnosis in the clinic. Now, with the calculated accuracy reference guide available, a clinician may rely on the office-based diagnosis with improved certainty and may consider forgoing advanced imaging, thereby avoiding additional cost, treatment delays and possible patient risk. In order to cover an array of clinical scenarios, we used a pretest probability range of 20-80% at 20% increments according to the likelihood of pathology. After addressing the disease prevalence, HPI and PMH, the pre-test probability likelihood of long head bicep pathology was appointed. If the pre-test probability was above 90% or below 10%, we then assume there is no need to perform additional testing with acceptance of a 10% error rate. Combination of physical examination techniques demonstrated that the uppercut test combined with tenderness to palpation of the LHB provided the highest accuracy for diagnosing pathology at the proximal biceps. This combination has a parallel testing sensitivity of 88.3% and a series specificity of 93.3% (Supplementary Table S3). The values of the test used in series and in parallel were definitive and overpowered the value of the pre-test probability assessment in many clinical scenarios. This adds credibility to a reproducible, simplified two-step P.E.C. examination without the need for additional maneuvers to be performed. Furthermore, we feel that the application of the PEC test is generalizable to non-shoulder specialists, facilitating both increased utilization and diagnostic accuracy of LHB disease. Many studies have explored the accuracy of physical examination and special test maneuvers in diagnosing LHB pathology with limited conclusions regarding its efficiency18,22,23,37. However, our study is unique in that it additionally produces a diagnostic tool, both enabling accurate point of care diagnosis of LHB injury and minimizing the need for advanced imaging. The value of the P.E.C. examination corroborates with current clinical recommendations. In 2009, Churgay et al. stated that bicipital groove point tenderness is the most common isolated finding during physical examination of patients with biceps tendinitis, and that ultrasonography is the best modality for evaluating isolated biceps tendinopathy extra-articularly3,6. With regards to diagnostic accuracy and fluidity of exam, our study revealed that the best maneuver combination for diagnosing biceps pathology are the uppercut test and tenderness to palpation. Incidentally, our study has also concluded that use of ultrasound after equivocal physical examination findings improves the sensitivity and specificity of all evaluated test combinations. Unlike past studies, we incorporated a diagnostic algorithm to aid efficient shoulder examination and to increase physician confidence in biceps tendon diagnosis. In addition to enhancing diagnostic accuracy, development of a value-based clinical decision pathway may play a small, but essential role in the improvement of the current state of the healthcare system. High-yield, algorithm-derived examination like our proposed sequence further alleviate the number of follow-up visits needed until diagnosis, which often delay expedient care delivery35,39. Moreover, simplified diagnostic algorithms may also result in cost reduction and decreased iatrogenic injury associated with unnecessary advanced imaging studies. A shoulder examination that provides accurate diagnosis provides multiple advantages that benefits both physicians and the healthcare system with the ultimate goal of improving patient outcomes. However, it is important to note that clinical decisions should be tailored to patient clinical presentation, and that MRI may be a more appropriate diagnostic modality for surgical candidates or patients with inconclusive preliminary workup. These findings provide evidence towards the current trend in orthopedic surgery education as more national conferences and residency programs are increasing musculoskeletal ultrasound (US) courses incorporated into their curriculums. Accordingly, the American Medical Association for Sports Medicine has endorsed increased integration of sports US into sports medicine fellowship curriculums13. Studies have proposed that proficient level diagnostic skills may be quickly obtained by the inexperienced orthopedist with an established examination protocol1. Murphy et al. conducted a study investigating diagnostic improvement in four orthopedic surgeons who attended a formal training course to identify and size tears on the rotator cuff through US. In the later training period, results showed positive predictive value improving by 16%27. An additional study by Roy and colleagues also demonstrated improved diagnostic accuracy of US irrespective of whether a trained radiologist, sonographer or orthopedic surgeon operated the device32. US requires further studies to evaluate its cost effectiveness compared to advanced imaging techniques like MRI or arthroscopy, but an algorithm(Fig. 3) may provide a simple evidence-based decision analysis for physicians to rely on when considering LHB as the major source of pain. This study, however, also has its limitations. Foremost, a majority of the studies included in our data collection did not solely focus on LHB pathology. True positives may have included superior labrum, anterior to posterior (SLAP) lesions within the diagnosis of biceps pathology. Studies may have also incorporated biceps pathology into other diagnostic categories (e.g. impingement). Therefore, it was difficult to find studies which solely focused on diagnostic accuracy of LHB pathology. Additionally, only level I or II studies were considered for diagnosis, which routinely compare diagnostic testing algorithm (DTA) to the gold standard of diagnosis. Unfortunately, there is no clearly defined arthroscopic findings for diagnosis of LHB pathology. To aid in any study misinterpretations due to inaccurate language translations, only articles originally written in English were evaluated, and only published articles were included. This may have introduced both publication and/or selection bias. A method to eliminate some of these potential biases would be to perform a truly systematic review and meta-analysis combining results from multiple studies; however, even this can be hindered by bias with the lack of currently published methods for meta-analyses evaluating diagnostic testing. Another future direction for this study may be to further evaluate the accuracy of new special tests described to evaluate long head of the biceps pathology, specifically the uppercut test. Currently the uppercut test has only been described and analyzed in a single level I or II study that we utilized for our algorithm24. Further validation testing for this specific test may be warranted. Conclusion Performing the uppercut test and biceps groove tenderness to palpation test together has the highest sensitivity and specificity of known physical examinations maneuvers to aid in the diagnosis of long head of the biceps pathology as compared to diagnostic arthroscopy (The PEC exam). A decision tree analysis aides in the PEC exam diagnostic accuracy post testing based on the ordinal scale pre-test probability. A quick reference guide is provided to use in the clinical setting. References 1. Amoo-Achampong K, Nwachukwu BU, McCormick F. An orthopedists guide to shoulder ultrasound: a systematic review of examination protocols. Phys Sportsmed. 2016 Aug 22;1-10. doi: 10.1080/00913847.2016.1222224 2. Ardic F, Kahraman Y, Kacar M, Kahraman MC, Findikoglu G, Yorgancioglu ZR. Shoulder impingement syndrome: relationships between clinical, functional, and radiologic findings. Am J Phys Med Rehabil. 2006 Jan 1;85(1):53-60. doi:10.1097/01.phm.0000297449.72296.3d 3. Armstrong A, Teefey SA, Wu T, Clark AM, Middleton WD, Yamaguchi K, et al. The efficacy of ultrasound in the diagnosis of long head of the biceps tendon pathology. J Shoulder Elbow Surg. 2006 Jan-Feb;15(1):7-11. doi:10.1016/j.jse.2005.04.008 4. Arrigoni P, Ragone V, DAmbrosi RI, Denard P,Randelli F, Banfi G, et al. Improving the accuracy of the preoperative diagnosis of long head of the biceps pathology: the biceps resisted flexion test. Joints. 2014 Jul 8;2(2):54-8. doi:10.11138/jts/2014.2.2.054 5. Bennett WF. Specificity of the Speeds test: arthroscopic technique for evaluating the biceps tendon at the level of the bicipital groove. Arthroscopy. 1998 Nov-Dec;14(8):789-96. No doi 6. Churgay CA. Diagnosis and treatment of biceps tendinitis and tendinosis. Am Fam Physician. 2009 Sep 1;80(5):470-6. 7. Chu K. An introduction to sensitivity, specificity, predictive values and likelihood ratios. Emergency Medicine Australasia. 1999 Sep 8;11(3):175-81. doi:10.1046/j.1442-2026.1999.00041.x 8. Chen HS, Lin SH, Hsu YH, Chen SC, Kang JH. A comparison of physical examinations with musculoskeletal ultrasound in the diagnosis of biceps long head tendinitis. Ultrasound Med Biol. 2011 Sep 30;37(9):1392-8. doi:10.1016/j.ultrasmedbio.2011.05.842 9. Cohen SB, Valko C, Zoga A, Dodson CC, Ciccotti MG. Posteromedial elbow impingement: magnetic resonance imaging findings in overhead throwing athletes and results of arthroscopic treatment. Arthroscopy. 2011 Oct 31;27(10):1364-70. doi:10.1016/j.arthro.2011.06.012 10. Dinnes J, Loveman E, McIntyre L, Waugh N. The effectiveness of diagnostic tests for the assessment of shoulder pain due to soft tissue disorders: a systematic review. Health Technol Assess. 2003;7(29):iii, 1-166. doi:10.3310/hta7290 11. Dubrow SA, Streit JJ, Shishani Y, Robbin MR, Gobezie R. Diagnostic accuracy in detecting tears in the proximal biceps tendon using standard nonenhancing shoulder MRI. Open Access J Sports Med. 2014 Apr 28;5:81-7. doi:10.2147/OAJSM.S58225 12. Eusebi P. Diagnostic accuracy measures. Cerebrovasc Dis. 2013 Oct 16;36(4):267-72. doi:10.1159/000353863 13. Finnoff JT, Berkoff D, Brennan F, DiFiori J, Hall MM, Harmon K, et al.. American Medical Society for Sports Medicine recommended sports ultrasound curriculum for sports medicine fellowships. Br J Sports Med. 2015 Feb;49(3):145-50. doi:10.1136/bjsports-2014-094220 14. Freeman R, Khanna S, Ricketts D. Inappropriate requests for magnetic resonance scans of the shoulder. Int Orthop. 2013 Nov;37(11):2181-4. doi:10.1007/s00264-013-1968-4 15. Gazzillo GP, Finnoff JT, Hall MM, Sayeed YA, Smith J. Accuracy of palpating the long head of the biceps tendon: an ultrasonographic study. PM R. 2011 Nov;3(11):1035-40. doi:10.1016/j.pmrj.2011.02.022 16. Gill HS, El Rassi G, Bahk MS, Castillo RC, McFarland EG. Physical examination for partial tears of the biceps tendon. Am J Sports Med. 2007 Aug;35(8):1334-40. doi:10.1177/0363546507300058 17. Gilmer BB, DeMers AM, Guerrero D, Reid JB, Lubowitz JH, Guttmann D. Arthroscopic versus open comparison of long head of biceps tendon visualization and pathology in patients requiring tenodesis. Arthroscopy. 2015 Jan;31(1):29-34. doi:10.1016/j.arthro.2014.07.025 18. Hanchard NC, Lenza M, Handoll HH, Takwoingi Y. Physical tests for shoulder impingements and local lesions of bursa, tendon or labrum that may accompany impingement. Cochrane Database Syst Rev. 2013 Apr 30;(4):CD007427. doi: 10.1002/14651858.CD007427.pub2 19. Hashiuchi T, Sakurai G, Morimoto M, Komei T, Takakura Y, Tanaka Y. Accuracy of the biceps tendon sheath injection: ultrasound-guided or unguided injection? A randomized controlled trial. J Shoulder Elbow Surg. 2011 Oct;20(7):1069-73. doi:10.1016/j.jse.2011.04.004 20. Hegedus EJ. Physical Examination of the Shoulder and Elbow with a Focus on Orthopedic Special Tests. In: Park JY, editor. Sports Injuries to the Shoulder and Elbow. Heidelberg: Springer. 2015. p. 35-44. (ISBN No. 978-3-642-41794-8. doi:10.1007/978-3-642-41795-5 21. Hegedus EJ, Cook C, Lewis J, Wright A, Park JY. Combining orthopedic special tests to improve diagnosis of shoulder pathology. Phys Ther Sport. 2015 May;16(2):87-92. doi:10.1016/j.ptsp.2017.08.001 22. Hegedus EJ, Goode AP, Cook CE, Michener L, Myer CA, Myer DM, et al.. Which physical examination tests provide clinicians with the most value when examining the shoulder? Update of a systematic review with meta-analysis of individual tests. Br J Sports Med. 2012 Nov;46(14):964-78. doi:10.1136/bjsports-2012-091066 23. Jordan RW, Saithna A. Physical examination tests and imaging studies based on arthroscopic assessment of the long head of biceps tendon are invalid. Knee Surg Sports Traumatol Arthrosc. 2015 Nov 26 [Epub ahead of print]. doi:10.1007/s00167-015-3862-7 24. Kibler BW, Sciascia AD, Hester P, Dome D, Jacobs C. Clinical utility of traditional and new tests in the diagnosis of biceps tendon injuries and superior labrum anterior and posterior lesions in the shoulder. Am J Sports Med. 2009 Sep;37(9):1840-7. doi:10.1177/0363546509332505 25. Health Care Spending and the Medicare Program. Medicare Payment Advisory Commission. Washington DC: 2011. p.1-207. 26. Momenzadeh OR, Gerami MH, Sefidbakht S, Dehghani S. Assessment of correlation between MRI and arthroscopic pathologic findings in the shoulder joint. Arch Bone Jt Surg. 2015 Oct;3(4):286-90. 27. Murphy RJ, Daines MT, Carr AJ, Rees JL. An independent learning method for orthopaedic surgeons performing shoulder ultrasound to identify full-thickness tears of the rotator cuff. J Bone Joint Surg Am. 2013 Feb 6;95(3):266-72. doi:10.2106/JBJS.K.00706 28. Naredo E, Aguado P, De Miguel E, Uson J, Mayordomo L, Gijon-Banos J, et al. Painful shoulder: comparison of physical examination and ultrasonographic findings. Ann Rheum Dis. 2002 Feb;61(2):132-6. doi:10.1136/ard.61.2.132 29. ÃÆ'-stà ¶r AJ, Richards CA, Tytherleigh-Strong G, Bearcroft PW, Prevost AT, Speed CA, et al. Validation of clinical examination versus magnetic resonance imaging and arthroscopy for the detection of rotator cuff lesions. Clin Rheumatol. 2013 Sep;32(9):1283-91. doi:10.1007/s10067-013-2260-0 30. Razmjou H, Fournier-Gosselin S, Christakis M, Pennings A, ElMaraghy A, Holtby R. Accuracy of magnetic resonance imaging in detecting biceps pathology in patients with rotator cuff disorders: comparison with arthroscopy. J Shoulder Elbow Surg. 2016 Jan;25(1):38-44. doi:10.1016/j.jse.2015.06.020 31. Read JW, Perko M. Shoulder ultrasound: diagnostic accuracy for impingement syndrome, rotator cuff tear, and biceps tendon pathology. J Shoulder Elbow Surg. 1998 May-Jun;7(3):264-71. doi:10.1016/S1058-2746(98)90055-6 32. Roy JS, Braà «n C, Leblond J, Desmeules F, Dionne CE, MacDermid JC, et al. Diagnostic accuracy of ultrasonography, MRI and MR arthrography in the characterisation of rotator cuff disorders: a systematic review and meta-analysis. Br J Sports Med. 2015 Oct;49(20):1316-28. doi:10.1136/bjsports-2014-094148 33. Sandrey MA. Special physical examination tests for superior labrum anterior-posterior shoulder tears: an examination of clinical usefulness. J Athl Train. 2013 Nov-Dec;48(6):856-8. doi:10.4085/1062-6050-48.3.14 34. Sciascia AD, Spigelman T, Kibler WB, Uhl TL. Frequency of use of clinical shoulder examination tests by experienced shoulder surgeons. J Athl Train. 2012 Jul-Aug;47(4):457-66. doi:10.4085/1062-6050-47.4.09 35. Seagger R, Bunker T, Hamer P. Surgeon-operated ultrasonography in a one-stop shoulder clinic. Ann R Coll Surg Engl. 2011 Oct;93(7):528-31. doi:10.1308/147870811X13137608454939 36. Skendzel JG, Jacobson JA, Carpenter JE, Miller BS. Long head of biceps brachii tendon evaluation: accuracy of preoperative ultrasound. AJR Am J Roentgenol. 2011 Oct;197(4):942-8. doi:10.2214/AJR.10.5012 37. Taylor SA, Khair MM, Gulotta LV, Pearle AD, Baret NJ, Newman AM, et al. Diagnostic glenohumeral arthroscopy fails to fully evaluate the biceps-labral complex. Arthroscopy. 2015 Feb;31(2):215-24. doi:10.1016/j.arthro.2014.10.017 38. Voigt JD, Mosier M, Huber B. In-office diagnostic arthroscopy for knee and shoulder intra-articular injuries its potential impact on cost savings in the United States. BMC Health Serv Res. 2014 May 5;14:203. doi:10.1186/1472-6963-14-203 39. Zhang AL, Kreulen C, Ngo SS, Hame SL, Wang JC, Gamradt SC. Demographic trends in arthroscopic SLAP repair in the United States. Am J Sports Med. 2012 May;40(5):1144-7. doi:10.1177/0363546512436944 Figure and Table Legends Figure 1: PRISMA Systemic Review Flow Diagram: This figure displays the process and rationale behind why studies were omitted from the systemic review. Figure 2: (A) Diagnostic Combination to Rule in Pathology: These findings demonstrate that the combination of tests that best help rule out pathology are the TTP + Uppercut test when performed in series. If both tests are negative in a scenario with a low pre-test probability (i.e. prevalence), then there is a very small chance of pathology being present. TTP = Tenderness to palpation (of the long head of the biceps within the bicipital groove); Diamond = TTP + Uppercut in series, square = TTP + Speeds in Series, triangle = TTP + Yergasons in Series (B) Diagnostic Combination to Rule Out Pathology: These findings demonstrate that the combination of TTP + upper

Friday, October 25, 2019

Against United States Currency Mentioning God Essays -- Politics Gover

"In God We Trust" should be removed from United States' currency. The mention of God, which is a religious belief, misrepresents those United States citizens who do not hold this belief. In Source D, Jon Murray, President of the non-profit organization American Atheists, argues that the motto "In God We Trust" inscribed on the mint violates the Free Speech, Free Exercise, and Establishment clauses of the First Amendment. It violates Free Speech by the inability to erase or eliminate the inscription by making it illegal by criminal law that "[w]hoever fraudulently alters, defaces, mutilates, impairs, diminishes, falsifies, scales, or lightens any of the coins coined at the mints of the United States' shall be fined under this title or imprisoned not more than five years, or both (18 USC Sec 331)." It is likewise this way with paper notes in 18 USC Sec 332. To function in this society, people must carry around money. People who don't support the inscription are forced to carry aroun d false representation and therefore, according to Murray, this violates the Free Expression Act. The Establishment Clause isn't so clear, mainly that Church and State must be separate and that the government should avoid any entanglements with religion. Recently, instead of "Will there be too much government entanglement with religion?" judges have been defining violation of the Establishment as if the subject ?benefits religion in a way more direct and more substantial than practices that are excepted into our national heritage.? And that?s what the blurry notion of what?s religious and what?s in our heritage is (Source I). A common argument debating the motto on our coins is that ?God? is not, in fact, a religious belief, merely an important par... ...DocServer/In_God_We_Trust_In_Public_Schools.pdf?d ocID=151?>. Leahy, James E. The First Amendment, 1791-1991: Two Hundred Years of Freedom. McFarland & Company, Inc. Publishers. 1991. Murray, Jon. ?God On Our Coins?. American Atheists. Sept. 14, 1988. . Swank, Grant. ?Atheist Attacks ?In God We Trust.?? The Conservative Voice. Aug. 16, 2006. . United States Department of the Treasury. Coins and Currency. History of ?In God We Trust?. Online Database. August 31, 2007. . W.W. Hening. Statutes at Large of Virginia, vol. 12. 1823. Jefferson, Thomas. Pages 84-86: ?Virginia Statute for Religious Freedom.? .

Thursday, October 24, 2019

I Am Sam Analysis

Sam loves his daughter Lucy very much and tries very hard to keep her with him. Although, he is mentally-challenged and the court argues whether or not he should keep Lucy. They say he only has the ability of â€Å"a 7-year old† and doesn’t have enough money. He looks for a lawyer to help him get Lucy back, which she offers for free under the pressure of being seen by these women who gossip about her at work. She is super annoyed with him at first but eventually starts to understand and be nicer to him, so she helps him what to say at court.Lucy is with a foster family who eventually gives her back to Sam because they don’t think they can promise to give her the love she’s never had. They decide to be on Sam’s side in court & promise not to tell that Sam can’t take care of her alone. They win the argument and Sam and Lucy live together again. Main Character Description Sam: He is a mentally-challenged father who loves his daughter very much. He’s very caring, happy, and loves Ihop. He enjoys making paper cranes and other different shapes too.His job was working at Starbucks, and then he quits and works at Pizza Hut. Sam can also lose his temper quite easily as shown in the scene where he and Lucy eat at a different breakfast place and he throws a fit when she tells him they don’t have French pancakes with fruit toppings on the side. Lucy: She is a very smart and sneaky young girl. Even though her dad isn’t normal, she still loves him unconditionally and wants to see him as much as possible. She is also very understanding towards her father and cares about him a lot.Rita: Rita is Sam’s lawyer to help him with getting Lucy back. She lives a very stressful life with people who dislike her, with hundreds of things she needs to do, and then she has to deal with this case she brought herself into. She never loses, so she tries very hard to win this case. She becomes very caring and understanding to wards Sam as she helps him through getting Lucy back. Psychological Illness Autism is portrayed in this movie with Sam who struggles to keep his daughter to live with him.In the beginning, Lucy’s friend asks her, â€Å"What is wrong with your dad? Is he retarded? † and replies with a yes. Her friend judges Sam very negatively because he is not â€Å"normal. † On the day of Lucy’s birthday party, Sam tries to calm everyone down so they can surprise Lucy; he touches one of the kids to hide and the child says, â€Å"get off me! I have cooties! † The child doesn’t even want to be touched or handled by him because of the way he is.The father also pushes him down away from his child right when Lucy walks in and sees that. She loves her father no matter what because he has always been there for her and will always love her like no one else can. Her peers would look at him like he is a weirdo and laugh at him. Whenever he would talk to people, they would just keep nodding their heads like they’re listening because they don’t care what they have to say. But Sam has some friends just like him who all like to hang out just like a regular group of friends.They would compliment each other a lot, encourage each other, support each other, and talk about their same interests. The court officials thought it was best for Lucy to not live with Sam because they don’t think he has the ability to support her. Especially since he has a mental illness, they don’t think he would be able to take care of her properly. But he pointed out that all she needs from him is love, support, patience, to listen to her, and happiness.

Tuesday, October 22, 2019

Mentoring: A Way of Life -an integrative paper of the course ‘Art of Mentoring’ Essay

In this course, â€Å"Art of Mentoring†, I learned the relevance of mentoring in education, counseling ministry and self-directed learning of graduate students. The objective of the course was to encourage us students to use mentoring in different fields of profession and in service to the religious community. Having finished the course, I am inspired to use the concepts of mentoring in my personal education and be more effective in my profession, other involvements, as well using these concepts in my personal life. I realized that mentoring is a very broad term in a sense that it encompasses profession and organizational duties because it involves sharing of lives and experiences so as to develop ones holistic identity. The term is generally used to refer to the relationship between a mentor, who has the mastery, experience wisdom passion for a profession; and a mentee, who has equal passion to learn from the mentor’s knowledge and experiences (http://www.managementhelp.org/guiding/mentrng/mentrng.htm). Our history tells us that the concept and method of mentoring has been long practiced even before the word came about. When men taught basic skills like hunting and farming, they did it through the use of modeling or mentoring (Cagle, 2004). Now in the 21st century there is an increasing need of mentoring in different fields of profession. And I have come to the conclusion that mentoring is one of the most effective means of influencing and training individuals to be dynamic and efficient leaders, rich in their personal professions in a developing community. The Bible itself shows mentoring as a way of training individuals for leadership, as what is happening in the Church today (Cagle, 2004).   .   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     I learned that mentoring is also very substantial in the academe, especially in graduate schools. To develop professional excellence, each student should have professors or advisers who have a strong interest in their growth not just as professionals, but as dynamic individuals, and guide them to that path.   Self-directed adult learning on the other hand, although it is more informal and not necessarily academic, can also be more effective when used with mentoring.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As Christians, we are also called to influence the society with godly leadership. Christian leaders in the community can use mentoring to train and guide their subordinates in promoting righteous and godly leadership. I believe that people in the society are looking for individuals who can mentor and motivate them to be better and excellent individuals. Now I understand that I have an important role in the development of my own sphere of influence, where I can help my colleagues to be godly citizens by mentoring them through the use of the Bible and living a godly lifestyle. I then realized that this is one way of personal leadership, that through a deep understanding of godly values and good lifestyle, I can mentor other individuals to be good citizens and future leaders in our community.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Now with the use of mentoring, church growth, especially in rural areas, can accelerate rapidly (Cagle, 2004). Training and mentoring effective church leaders will result to a growth in their individual churches. As Jesus Christ taught his disciples by mentoring, so they followed his examples and this paved the way for rapid church growth. Mentoring, which also has the characteristic of using motivation and the boosting of self-esteem, can be used in having an effective counseling ministry, where ministers could help and guide a person to his full potential.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   After learning about mentoring and having my personal insights on the method of effective influence, I now believe I can influence my peers better through the art of mentoring. I believe mentoring can occur in two ways. One way could start with an individual who needs another individual capable of guiding and mentoring him to his fullest potential. Then having found the suitable person, the mentor now decides to accept the responsibility of guiding and the mentee. And from there the relationship would develop into a fruitful, guided growth of the individual. On the other hand, mentoring can start with an older person, who sees the potential in an individual, to develop and with whom he can impart his skills and knowledge in a specific field of profession or life in general. Then now it is up to the chosen individual to accept the mentor’s offer to be guided and influenced for his personal excellent growth as an individual. And when finally accepted, the mentoring process now begins.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Although mentoring can be used in large scale institutions like universities and the Church, I believe it is also a way of influencing our peers and colleagues with our personal lifestyles. Like what I said earlier, I believe that mentoring is also a form of leadership. Now, having learned the concept and art of mentoring, I am now confident to influence the young people I know to be good citizens as well as future leaders in the community. Reference: Cagle, J. (2004). Journal of Asian Missions. Pp. 235-244 (March, 2004) http://www.managementhelp.org/guiding/mentrng/mentrng.htm   

The expropriation procedure in Spain to establish telecommun essays

The expropriation procedure in Spain to establish telecommun essays The liberalization of telecommunications in Spain has resulted in new undertakings in the telecommunications market which need the authorization of the owner of the land to establish their network, for example, buried cables, antennas on the top of the buildings. When there is no agreement between them, the operator must request the Spanish administration to open an urgent expropriation procedure. The structure of this procedure can vary depending on circumstances, but, the general procedure is as follows: first, there is a declaration of public utility; second, a declaration of the occupations necessity; third, the establishment of the indemnification; and fourth, the lands occupation. The expropriation procedure begins when a technical project is submitted by the operator to the Spanish administration justifying the necessity of occupying the land to establish its telecommunications network. This project must meet the technical and legal requirements to obtain a declaration of public utility. Then, the project is examined by technical civil servants to determine in a report whether it suits the technical requirements. Once the report is given by technical officers, it is transferred to legal officers to determine if the project fulfills the legal requirements. Once the Administration finds that the project satisfied the technical and legal requirements, the land to be expropriated is declared of public utility or social interest. The owner of the land is then allowed to formulate objections within a limited period of time. As son as objections have been give, they are examined by the Spanish Administration which arrives at a Resolution declaring or not the necessity of occupation of the land for the specific purpose of establishing the telecommunication network. After the declaration of necessity of occupation, the owner and the operator are required by the Administration to reach an agreement about the pri ...

Sunday, October 20, 2019

Othello Essays (953 words) - Othello, Iago, Michael Cassio, Roderigo

Othello Essays (953 words) - Othello, Iago, Michael Cassio, Roderigo Othello Othello - A Racist Play? Although there are lots of things to suggest this is a racist play I don't think that racism actually dominates the play, even though it has a racist theme. There is a romantic union between black and white which gets destroyed because most people think the relationship is wrong. At the time the play was written, 1604, even the Queen of England was racist so there must have been a strong hatred of blacks around that time. Most racist comments in the play are said by people that are angry or upset. For example, when Emilia found out that Othello had killed Desdemona she was extremely mad and she called Othello a Blacker devil, this was the only time in the play that she had said anything racist about Othello. The main characters that have racist attitudes are Iago, Brabantio, Roderigo and Emilia, with the hatred of Othello as the basis for their racist actions and comments towards him. Iago is the most racist character in the book as he has it in for Othello right from the start. What sparks off Iago's hate towards him is the fact that when Othello chose his lieutenant , it was Cassio who was chosen instead of Iago. What made Iago angry was the fact that Cassio had no experience in war when he did and Cassio was chosen instead of him. Iago does not say anything racist to Othello's face but he has a lot to say against him behind his back. He schemes to destroy Othello and anything in his way including Cassio and Desdemona. The first time we hear one of his racist comments is when he's talking to Brabantio about Othello and Desdemona, Even now, very now, an old black ram is tupping your white ewe. Iago says this to try and turn Brabantio against Othello. Iago uses racist comments all the way through the play, as he tries to turn people against Othello, for example calling him a Barbary Horse. He never says anything racist to Othello's face because in his plot he had to be his best friend, so as not to make him suspicious that Iago was causing all the trouble for him. Iago is jealous of Othello for many reasons, one being that Othello has higher ranking in the army than him, and also he has a good marriage with Desdemona which Iago does not have himself with Emilia. These are the main causes of his hatred for Othello and the reason he adopts such a racist attitude. Roderigo is another one of the racist characters in the play, being so right from the start. He is Iago's accomplice and will do anything that Iago wants him to. I think he does this because of the way Iago can twist a situation to make it sound as if Roderigo would get something good from it but in the end he doesn't. One of the racist names he calls Othello behind his back is Thick-lips . He hates Othello because he's jealous of him as he also loves Desdemona but cannot have her. I don't think he views Othello in a very bad, racist way but uses the racism against Othello because he's jealous of him. Neither Roderigo or Iago would say anything racist to Othello's face as he is the general of the army. Brabantio is also a racist character, and is enraged when he finds out that his daughter, Desdemona, has been seeing the moor behind his back. Brabantio is so mad he sends out his guards to catch Othello and put him in prison. Brabantio views Othello as a foul and dirty no good black, I think this racist view of his is because he's angry when he finds out that his daughter has been seeing this moor. Unlike Iago and Roderigo, Brabantio will openly make racist comments about Othello to his face such as, lascivious moor, Wheeling stranger. Brabantio can do this because he is the Senator of Venice and is higher in rank than Othello. The other character who is racist towards Othello is Emilia, the lady in waiting to Desdemona. Emilia is disgusted with Othello when she finds out that Othello had killed Desdemona this is the

Saturday, October 19, 2019

Meaning of the The Handsomest Drowned Man In The World Essay

Meaning of the The Handsomest Drowned Man In The World - Essay Example Marquez has effectively used this story to explain how the arrival of a dead body on the beach of a small village stimulates the aesthetic and creative senses of the inhabitants of those village. This means that the washed up man had the qualities of a hero due to which the villagers get inspired by his beauty so much that they decide to restore their houses, build up their village, and demand beauty themselves. The story tells how a drowned man who was once hidden and nothing to world, ultimately inspires an entire village to live creatively and strive for a better life. The story is basically about a man who drowns in the water owing to ill fate, dies, and later his seaweed covered body appears on the beach of a small village. Initially, the children play with the poor corpse until the elders find the body and decide to give him a proper funeral after which the body must be thrown into the sea, as a custom. This man is named Esteban by the villagers later, who appear to be excessiv ely awed and astounded by Esteban’s manly features and overwhelming perfection of face. Even the villagers’ wives take a liking to the beauty of Esteban’s body and start comparing his beauty with their husbands’, due to which the men show disapproval for the mysterious man.

Friday, October 18, 2019

Healing and Spirituality Essay Example | Topics and Well Written Essays - 1000 words

Healing and Spirituality - Essay Example Conversely, some patients may be cured but they may not feel healed, for instance a breast cancer patient may still find herself grieving about her situation despite going into remission. The main aim of healing hospitals is to enhance harmony of a patient’s mind, body and spirit (Marberry, 2006).. With this in mind it is necessary to create an environment that reduces the patient’s anxiety, stress and which can positively impact on the patient’s health and steer him or her towards recovery. The concept of healing the healing hospital is based on three main components namely; the physical environment, the integration of technology and work design and a caring and loving culture. The physical environment refers to the patient’s general surrounding in the cause of the illness. This includes the people around the patient and the nature of the room. A good physical environment is one that makes the patient comfortable and less anxious. ). A noisy and confused environment increases the patient’s anxiety, heart rate and blood pressure which slow down the healing process. A renowned medical scholar, Florence Nightingale, suggested that the best environment that supports healing is on e that is quite and allows the patient access to natural lighting and fresh air. The other component of healing hospital is the integration of technology and work design. This entails medical stuff and physicians employing the most advanced technology to facilitate the patients’ healing process (Marberry S. 2006). The latest technology available can be easily be integrated with the working design of the hospital to enable staff and physicians to identify the best ways possible to make the patient comfortable. The last and most critical element of hospital healing is the hospital’s culture. This entails the organization adopting a philosophy that revolves around a caring and loving culture. It involves how the medical staffs treat and relate with patients and their families or their care takers. A strong compassionate culture facilitates healing through a holistic approach which seeks to address the patient’s physical, emotional and spiritual feeling. Since healing is a holistic approach aimed at creating harmony between one’s mind, body and spirit, spirituality is a very important element in the healing process (Marberry S. 2006). In instances where physicians may have different religious practices and beliefs, they should not let their personal bias affect the way they perceive their patient’s spirituality. Spirituality and healing are closely intertwined. It is very important for health care providers in healing hospital to consider their patient’s spirituality and religious beliefs in order to promote a good healing environment. When patients are allowed to practice their spiritual beliefs, they will feel more comfortable with their treatment and hence move faster toward healing. Questio n 2; Challenges of creating a healing environment Despite it being necessary for health care providers to create a good healing environment, there are various challenges that make this a difficult task. One of the biggest challenges in this aspect is finance. Creating an environment conducive for healing requires huge financial investment which most health organizations lack. Enabling a good

The Educational Experience Essay Example | Topics and Well Written Essays - 750 words

The Educational Experience - Essay Example During her high school days, she had a lot of chores to perform at home after school and this did not give her a chance to study. She was the only lady in her family and therefore she had to assist her mother with the cooking after school after completing other tasks like washing the kitchen utensils and fetching water for use for the following day. Because her task burden, she could not compete well with her male counterparts. That made her be always last in her class, but the trend changed while in college. In college, she had all the time to do her personal studies and the many tasks that she used to perform during her high school days were greatly reduced. According to the two authors that is Adrienne Rich and John Tierney, the aspect of disparate opportunities for both the gender causes the difference in their education as in the situation of Dawn Riley. In her school days, her performance was dismal and that was due to the numerous chores that she used to perform after school r eprieving her chance to study. Educational history and choices The high school educational history of my friend provides a perfect platform to complement on the argument of the Adrienne Rich. Her history will support the argument of Adrienne Rich about women not receiving an equal opportunity in education (Adrienne 2). According to this author, most of the male view the female students as prey and this stereotype mind has greatly affected women students. The female, on the other hand, has also been made to believe that their assertive behavior might cause them of their marriages and this belief has made the female students failures. A lot of humiliation and self-doubt have always engulfed the minds of the female students because of the various mind raping that has been implanted in them by the male students (Adrienne 6). The choices between the two genders when it comes to professionalism also tend to support the arguments of the authors about choices. Most of the courses which are considered difficult have very few female students, unlike the male students who have the numbers in all courses. The authors were right when they said that the educational choices between the two genders are also different. The element of dividing issues to worry about has also been pinpointed by the authors to be a determinant of the educational differences between the two genders. This line of argument according to my opinion is right because female students have many things to worry about as compared to their male counterparts. For purposes of equality in education then the female and the male students should be given equal opportunity. Overburdening the female student with a lot of chores after school always reprieve them the chance to properly focus on their studies. The male students should also shun from their stereotype mindset of viewing the female students as preys. The aspect of considering the female students as preys always make them close up in terms of their particip ation in class related aspects (Adrienne 12). The author went further and started the difference that exists between the female and the male even at the workplace caused by the school life of the two genders (Adrienne 12). The female students also need to put away the intellectual self-doubt as this would cause them a lot in terms of their academic carriers.        

How the Anthropocene is related to my major Business Management Research Paper

How the Anthropocene is related to my major Business Management Explain through McDonalds especially their Beef Hamburgers - Research Paper Example Their production activity requires meat from animals, yet livestock production is one of the human practices that results in adverse changes in the environment. Subsequently, the current sorry state of the environment marked by degradation and depletion of essential resources is attributed to anthropogenic activities. Moreover, scientists believe that there is a new wave of anthropogenic activities that started in a particular period, a concept referred to as anthropocene. Being business management student, understanding the concept of anthropocene and environmental degradation is important, as it helps in finding solutions to the issue. McDonalds is one of the biggest fast food restaurants in the world. The restaurant was established in 1955 in Illinois USA and has more than 30000 outlets located in 120 countries globally that serve more than 54 million customers daily. McDonalds is famous for producing delicious and tasty beef hamburgers that attract many customers every day. As a result, the company is growing day by day, and the customer base is equally rising, which translates to increased consumption of beef hamburgers, and thus production of more of meat by farmers. The primary source of meat is nature. Therefore, increased demand for beef is among the anthropogenic activities that results in adverse effects on the environment and natural resources. The continuous and enormous use of natural resources disturbs the balance in the ecosystem resulting in numerous problems that cause environmental problems. One of the adverse effects of production and consumption of beef hamburgers is the depletion of the natural resources in the environment. The main ingredient of McDonald’s hamburgers is meat from animals. Halden and Schwab states, â€Å"Finally, but growing more urgent every day, industrial agriculture may be a significant contributor to climate change, as the production of greenhouse gases from

Thursday, October 17, 2019

Discussion Essay Example | Topics and Well Written Essays - 500 words - 14

Discussion - Essay Example Thankfully, we live in the United States, where this battle has been fought, and has gained  a substantial amount of ground. Womens rights in the US are equal mostly, with the exception of salary differences between men and women. Unfortunately, in other parts of the world, women are still treated as less superior and some are not even allowed to work. Sadly, this will be a battle I believe will never go away. Yes, you are right. Women’s rights are a critical issue in our society today. Many people do not seem to even consider them because they may think that it is so old fashioned, but I am pleased to see that this issue is important to you. You are also right when you say that even people who aren’t feminists need to get behind and supports these issues because this is simply a matter of self-respect, nothing more. Compared with much of the world, the United States treats women equally and fairly. That doesn’t mean that you should not accept any unfair discrimination against women in the United States because it does still happen occasionally. One example you mentioned was the differences in salary. This is true because the research does show that there is a gender gap in terms of salary. For you own information, this is commonly known as the glass ceiling. There have been many activists who have fought over the years to try to get this barrier removed so women can be treated equally in the workplace, but it is yet to happen for reasons that are still contentious. Many other countries do not afford the same freedoms to their women. You only have to look at most Islamic countries and see that women are inferior to men. These women are banned from doing activities that we take for granted. Finally, you are spot on when you comment that this is a battle that will never go away because there will almost always be resistance to women’s rights from some men. When I was thinking about and researching human rights, I

Philosophy of Management Essay Example | Topics and Well Written Essays - 250 words

Philosophy of Management - Essay Example Having gained their consent, she took the campaign to other levels. Moved by her determination to improve the health of our nation, my manager took practical steps to convince the people as well as the government. She arranged public visits to the hospitals to show them children that have acquired the genetic diseases. My manager was righteous in her cause. She wanted to reduce the number of children with genetically acquired diseases. She was offered bribery by various agencies to convince her to abandon her plans of making the testing before marriage a law, but she refused all of them. She is self-less, and worked for a greater cause than becoming rich herself. Concluding, a manager has to be intelligent, practical and righteous in order to succeed. Since my manager had all these qualities, she became successful in her campaign and after the meeting with the King, testing before marriage was made a law in the Kingdom of Saudi

Wednesday, October 16, 2019

How the Anthropocene is related to my major Business Management Research Paper

How the Anthropocene is related to my major Business Management Explain through McDonalds especially their Beef Hamburgers - Research Paper Example Their production activity requires meat from animals, yet livestock production is one of the human practices that results in adverse changes in the environment. Subsequently, the current sorry state of the environment marked by degradation and depletion of essential resources is attributed to anthropogenic activities. Moreover, scientists believe that there is a new wave of anthropogenic activities that started in a particular period, a concept referred to as anthropocene. Being business management student, understanding the concept of anthropocene and environmental degradation is important, as it helps in finding solutions to the issue. McDonalds is one of the biggest fast food restaurants in the world. The restaurant was established in 1955 in Illinois USA and has more than 30000 outlets located in 120 countries globally that serve more than 54 million customers daily. McDonalds is famous for producing delicious and tasty beef hamburgers that attract many customers every day. As a result, the company is growing day by day, and the customer base is equally rising, which translates to increased consumption of beef hamburgers, and thus production of more of meat by farmers. The primary source of meat is nature. Therefore, increased demand for beef is among the anthropogenic activities that results in adverse effects on the environment and natural resources. The continuous and enormous use of natural resources disturbs the balance in the ecosystem resulting in numerous problems that cause environmental problems. One of the adverse effects of production and consumption of beef hamburgers is the depletion of the natural resources in the environment. The main ingredient of McDonald’s hamburgers is meat from animals. Halden and Schwab states, â€Å"Finally, but growing more urgent every day, industrial agriculture may be a significant contributor to climate change, as the production of greenhouse gases from

Tuesday, October 15, 2019

Philosophy of Management Essay Example | Topics and Well Written Essays - 250 words

Philosophy of Management - Essay Example Having gained their consent, she took the campaign to other levels. Moved by her determination to improve the health of our nation, my manager took practical steps to convince the people as well as the government. She arranged public visits to the hospitals to show them children that have acquired the genetic diseases. My manager was righteous in her cause. She wanted to reduce the number of children with genetically acquired diseases. She was offered bribery by various agencies to convince her to abandon her plans of making the testing before marriage a law, but she refused all of them. She is self-less, and worked for a greater cause than becoming rich herself. Concluding, a manager has to be intelligent, practical and righteous in order to succeed. Since my manager had all these qualities, she became successful in her campaign and after the meeting with the King, testing before marriage was made a law in the Kingdom of Saudi

Economic Impact Of The Development Of Airline Industry Essay Example for Free

Economic Impact Of The Development Of Airline Industry Essay Hardly many inventions can manage to change the way people live and also how they experience the world like the way inventing airplane has done. The airline industry offer air transport for passengers. The airlines companies own the airplanes or may lease them. Airlines Company differs in terms of capacity, some are smaller with one or two airplanes to transport mail and cargo, while other are big multinational companies with hundreds of aircrafts. Majority of airlines are privately owned, though some are government owned. Today, the air travel has grown to an extent that no one can imagine life without it. Air travelling as greatly reduced travelling time and opened up links all over the world. Economic Impact of the development of airline The air airline industry has played a major role in world economic growth; it has improved the mobility and facilitated world supply lines all over the world. The aviation industry not only serves as an economic tool for nations and cities, but also servers as a vital network for transport within the world. The industry creates jobs by providing them directly and also by creating opportunities in the travel and hotel industry. Aviation industry has continued to be critical in the world economy, in terms of creating these job opportunities, and the industry has employed thousands of employees in the whole world. And has the industry continue to grow more jobs are created. This leads to economic growth. Transport plays a major role in making sure that goods reach their destinations. The World Bank estimates that the airline industry contributes to a total of 5% economic growth in the world. Competition Competition in the industry can be traced back when most governments deregulated the industry I order allow competition among the industry to regulate fares. For many years now this resulted in low fares as the airline industry responded to customers needs. Most of the reduced fare also comes from new players on the market, and also from the big airlines themselves. With the growth of economy in many countries, more travellers are using the air, this id due to the fact that the fares have also been reducing gradually. In a report carried out in America by the senate, it was found out that competition has resulted into low fares, and from 1990 the traffic has gone up by over 33%, it was found out that the number of flights had also gone up to over 20%. This of course has a positive impact on economic growth. Competition in the industry has also lead to mergers as small companies fail to compete. This has improved the industry service delivery. It is important to note better service delivery has economic advantage. With the economic development being witnessed in many countries, the amount of travelling has gone up. Many people are travelling to transact their business. The high demand of air passengers has caused resource constraints, on airports and also on airways, especially during the peak travelling periods. Business community usually travels at these times and normally makes last minute bookings. However, main airlines have planned their networks to be able to meet the high rate flight requirement by the business passengers, though; these fares are expensive as the airlines need to cover cost of servicing high number flight. Nevertheless, airline competition and the way they price their tickets causes concerned. It has been noted that, with the emerging of low fare trends that have been occurring since 1996, when smaller airlines enter into this market with low fares, the major airlines drastically reduce their prices. And also avail a high number of low fare seats. This behaviour seems to be ill intended because it aims at repressing competition from the smaller airlines. Increase in fuel prices Oil and fuel prices have continuously increased for the past 10 years, for example, in 2001 the price per barrel was $20, yet in 2006 it had reached $75. The increase in price can be attributed to various such as, high demand of oil, collapse of Yukos Oil Company in Russia and political instability in the Middle East. This high increase in oil prices has affected the aviation industry. The increase in fuel prices has lead to reduction in the global trade. It is estimated that about 40% of goods traded on the world market are transported by the air, and cargo traffic is used to reflect economic growth. Fuel account for 20-30% of the total cost of operation expenses of the airline industry. Due to this high cost in oil the economy has suffered negatively. The microeconomic effect for those countries which import oil will be harsh, in the industry high prices is a big problem; the companies are forced to increase consumers’ fares to upset the fuel price increase, for example if fuel price reached 100$ per barrel, then a gallon of jet fuel will be more than 3$. This will imply that a passenger will have to pay 50$ more to travel than previous. This will result in reduction of passengers and for the case of cargo transporters it may lead to high reduction in demand of their services, which may spell down for the airline companies. The indirect impact on the airline industry caused by high fuel prices in the increase in airline products prices. The overall impact is reduction in international trade. As pointed out by the world trade organisation , increase in oil prices leads to low economic growth as it was observed in 2005. Terrorist threat Since the September 11 terrorist attack, the airline industry suffered so much, the industry experience a reduced number of passengers as many opted to use alternative means. The economic impact on the global level was immerse, has many countries experienced low foreign exchange due reduced business especially in tourism industry. The terrorist attack had a big effect on the aviation industry, and also on the economy. In America alone, more than 2 million passengers travel on air daily. Airline industry and tourism alone account for mote than 8% the world GDP. With the imminent threat of terrorism, the industry has undertaken different security measures. For example in America, the industry has to use over 11$ billion in security improvements. This costs at the end of the day have to be met by the passengers, thus, the fare in the industry have steadily gone up. This has reduced the volume of goods and passengers using the industry and negatively affected the economy. Any small distractions in the industry send shock waves in many other industries. Currently, the industry has experienced a trend by which they are weak economy, insecurity fear and other issues. This has led to reduced number of passengers flying. Even those passengers who are flying they are paying less because most of them are taking economy seats. This trend has resulted in decline of the growth of the industry. In decline in the industry usually result in reduction of economy growth of the world economy. After the September 11 many airline companies grounded their business due to security concerns this was so pronounced in America. The impact of the attack reverberated all over the world. It was estimated that the attack caused a reduction of 1% world economic growth. In this area of global economy the aviation industry all over the world suffered. The industry saw an increase in costs of airline insurance, increased expenses on security, and customer fear to travel using the air due to insecurity. This led to massive losses for the industry in the whole world. This was the worst disaster the industry had suffered in the past 50 years. In whole world more than 400,000 jobs were lost. Decline in the air travel has a direct consequence on number of business which includes tourism, travel agencies and entertainment spots, this is felt global. It is important to note that, in the continuous threat of terrorist, the world economy has been affected badly. The industry had to go through lean times and some companies had to shut down. Conclusion The airline industry is very important in economic development, the airline employees a lot of people directly and indirectly. The industry has developed steadily over the last 50 years, and has continuous grown. Competition, fuel increase and terrorist attack pose a serious challenge to the industry and the industry should come up with ways to controlling these effects to maintain profitable. However, the airline industry will continue to grow though, it will be faced with more challenges.

Monday, October 14, 2019

Packet Sniffing Software Is A Controversial Subject Information Technology Essay

Packet Sniffing Software Is A Controversial Subject Information Technology Essay Packet sniffing software is a controversial subject and a double-edged sword. It can be used to analyze network problems and detect Internet misuse. But at the same time, it allows hackers and people with malicious intention to sniff out your password, get your personal information, and invade your privacy. That is also why securing and encrypting data is so important. In this paper, the definition of packet sniffing will be introduced and several functionality and possible uses of packet sniffers will be explained. Also, information on how to protect against sniffers and man-in-the-middle attacks will be provided. An example of a packet sniffer program, Wireshark, will be given, followed by a case study involving the restaurant chain Dave Busters, which will show the negative consequences that can occur when organizations are not aware of the threat of packet sniffing by hackers. Definitions A packet sniffer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network (Connolly, 2003). Packet sniffers are known by alternate names including network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer (Connolly, 2003). As binary data travels through a network, the packet sniffer captures the data and provides the user an idea of what is happening in the network by allowing a view of the packet-by-packet data (Shimonski, 2002). Additionally, sniffers can also be used to steal information from a network (Whitman and Mattord, 2008). Legitimate and illegitimate usage will be explained in later sections. Packet sniffing programs can be used to perform man-in-the-middle attacks (MITM). This type of attack occurs when an attacker monitors network packets, modifies them, and inserts them back to the network (Whitman, et al., 2008). For example, a MITM attack could occur when two employees are communicating by email. An attacker could intercept and alter the email correspondence between each employee, without either knowing that the emails had been changed. MITM attacks have the potential to be a considerable threat to any individual or organization since such an attack compromises the integrity of data while in transmission. Packet sniffing programs work by capturing binary data that is passing through the network, and then the program decodes the data into a human-readable form.   A following step called protocol analysis makes it even easier for the data to be read.   The degree of these analyses varies by individual packet sniffing program. Simple programs may only break down the information in the packet, while more complicated ones can provide more detailed information and analysis, for example, by highlighting certain types of data such as passwords that pass through the network (Packet Sniffing, Surasoft.com, 2011). As for todays networks, switch technology is commonly used in network design. This technology makes it increasingly easy to set up sniffing programs on servers and routers, through which much traffic flows. In addition, there are already built-in sniffing modules being used in todays networks. For example, most hubs support a standard called Remote Network Monitoring (RMON). This kind of standard allows hackers to sniff remotely with the SNMP (Simple Network Management Protocol), used in most network devices, and only requires weak authentication. Network associates Distributed Sniffer Servers are used by many corporations. These servers are set up with passwords that are quite easy to guess or crack. In addition, computers with Windows NT system usually come with Network monitoring agent, which also allows remote sniffing (Packet Sniffing, ISS.net, 2011). Essentially, these sniffing programs are set up for the use of network administrators. However, the threat exists that hackers ca n gain access to the network and view the program logs. Packet sniffers capture all of the packets that travel through the point where the sniffer is located.   For example, if the program was installed next to the server of an organization, the user could have access to all the data being transferred across the company through that server.   Typical types of packets intercepted by attackers include the following: SMTP (email): The attacker can intercept unencrypted emails (Packet Sniffing, ISS.net, 2011). HTTP (web): Web traffic information and history can be easily captured (Packet Sniffing, ISS.net, 2011). Telnet Authentication: Login information to a Telnet account can be intercepted (Packet Sniffing, ISS.net, 2011). FTP traffic: Access to an FTP account can be sniffed in cleartext (Packet Sniffing, ISS.net, 2011). SQL database: Information from web databases is also vulnerable (Packet Sniffing, ISS.net, 2011). Functionality and Possible Uses of Packet Sniffers Good and Bad Uses Like any tool, a packet sniffer is a double-edged sword because it can be used for good or bad purposes (Orebaugh, Ramirez, and Beale, 2007). It can be used by security professionals to investigate and diagnose network problems and monitor network activity (Orebaugh, et al., 2007). Conversely, it can be used to eavesdrop on network traffic by hackers, criminals, and the like, who can use the data gathered for harmful purposes (Orebaugh, et al., 2007). Professionals such as system administrators, network engineers, security engineers, system operators, and programmers use packet sniffers for a variety of uses, including troubleshooting network problems, figuring out system configuration issues, analyzing network performance (including usage and bottlenecks), debugging during the development stages of network programming, analyzing operations and diagnosing problems with applications, and ensuring compliance with company computer usage policies (Orebaugh, et al., 2007). Good: Troubleshoot Network Problems When an error occurs on a network or within an application, it can be very difficult for administrators to determine what exactly went wrong and how to correct the error. Many consider the packet sniffer to be the best tool for figuring out what is wrong with programs on a network (Neville-Neil, 2010). Examining packets as a starting point for solving problems is useful because a packet is the most basic piece of data and holds information, including the protocol being used and source and destination address (Banerjee, Vashishtha, and Saxena, 2010). Basically, at the packet level of analysis, nothing is hidden when all layers are visible (Neville-Neil, 2010). Understanding the timing of what happened is another important factor in debugging network problems (Neville-Neil, 2010). This information can be easily attained by using a packet sniffing program. Essentially, packet sniffers allow you to find out the who, what, and when of a situation, all of which are vital to understanding how to fix a problem (Neville-Neil, 2010). Once these things are known, the administrator can determine what is causing the problem and how to go about fixing it. As soon as a problem occurs, the first recommended step is for the network administrator to use a packet sniffing program to record all network traffic and wait for the bug to occur again (Neville-Neil, 2010). If the administrator already had a packet sniffing program with logging in place, then he or she could go back and examine the log records. Assuming the administrator did not have a log previously set up, the next step would be to only record as much information as necessary to repair the problem (Neville-Neil, 2010). It would not be a good idea to record every single packet of data because if too much data is collected, finding the error will be like finding a needle in a haystack although the administrator has likely never seen a haystack that big (Neville-Neil, 2010). For example, recording only one hour of Ethernet traffic on a LAN will capture a few hundred million packets, which will be too large to sort through (Neville-Neil, 2010). It goes without saying that the admini strator should not record the data on a network file system because the packet sniffer will capture itself (Neville-Neil, 2010). Once the data is recorded, the administrator can examine the packets to analyze and understand what occurred to solve the problem. Good: Network Optimization In addition to solving network communication problems, packet sniffers can help administrators plan network capacity and perform network optimization (Shimonski, 2002). A packet sniffer allows users to view data that travels over a network packet by packet (Shimonski, 2002). However, rather than having to examine each packet, the appropriate sniffer program will perform the analysis for the administrator. The tools are especially useful because depending on the packet sniffing program used, the packet data will appear in an easy-to-understand format. Packet sniffers can often generate and display statistics and analyze patterns of network activity (Shimonski, 2002). Data can appear in graphs and charts that make analysis and comprehension easy. Additionally, the network administrator can filter by selected criteria to capture only the relevant traffic rather than having to sort through irrelevant data (Shimonski, 2002). Knowing what programs and which users use the most bandwidth can help administrators manage resources efficiently and avoid bandwidth bottlenecks. Good: Detect Network Misuse Packet sniffers can be used to monitor application traffic and user behavior (Dubie, 2008). This can be used to detect misuse by company employees or by intruders. To use a packet sniffer to monitor employees legally, a network administrator must do three things. First, he must be on a network owned by the organization, second, he must be directly authorized by the networks owners, and finally, he must receive permission of those who created the content (Whitman, et al., 2008). Permission by content creators is needed because packet sniffing is a method of employee monitoring (Whitman, et al., 2008). Typically, an employee will sign a release form when first employed that allows the employer to monitor the employees computer usage. By using a packet sniffer, employers can find out exactly how each employee has been spending his or her time. Packet sniffers can be used to see all activity and administrators can monitor for behaviors such as viewing inappropriate websites, spending time on the job on personal matters, or abusing company resources. For example, a packet sniffer program could show that a particular employee was downloading music at work, both violating organizational policies and using a large amount of network bandwidth (Dubie, 2008). Packet sniffers are also used to detect network intrusion, log traffic for forensics and evidence, discover the source of attacks such as viruses or denial of service attacks, detect spyware, and detect compromised computers (Orebaugh, et al., 2007). A packet sniffer and logger that can detect malicious entries in a network is a form of an intrusion detection system (IDS) (Banerjee, et al., 2010). The packet sniffer IDS consists of a database of known attack signatures. It will then compare the signatures in the database to the logged information to see if a close match between the signature and recent behavior has occurred. If it has, then the IDS can send out an alert to the network administrator (Banerjee, et al., 2010). Despite this use of packet sniffers to detect intrusion, hackers have methods of making themselves very hard to detect and can use packet sniffers for their own advantages. Bad: Gain Information for Intrusion Intruders maliciously and illegally use sniffers on networks for an innumerable number of things. Some of the most common are to capture cleartext usernames and passwords, discover usage patterns of users, compromise confidential or proprietary information, capture voice over IP (VoIP) telephone conversations, map out a networks layout, and fingerprint an operating system (Orebaugh, et al., 2007). The previously listed uses are illegal unless the user is a penetration tester hired to detect such types of weaknesses (Orebaugh, et al., 2007). An intruder must first gain entry to the communication cable in order to begin sniffing (Orebaugh, et al., 2006). This means that he must be on the same shared network segment or tap into a cable along the path of communication (Orebaugh, et al., 2007). This can be done in many ways. Firstly, the intruder can be physically on-site at the target system or communications access point (Orebaugh, et al., 2007). If this is not the case, the intruder can access the system in a variety of ways. These include breaking into a certain computer and installing sniffing software that will be controlled remotely, breaking into an access point such as an Internet Service Provider (ISP) and installing sniffing software there, using sniffing software that is already installed on a system at the ISP, using social engineering to gain physical access to install the software, working with an inside accomplice to gain access, and redirecting or copying communications to take a path that the intruders comp uter is on (Orebaugh, et al., 2007). Intruders can use sniffing programs designed to detect certain things such as passwords and then use other programs to have this data automatically sent to themselves (Orebaugh, et al., 2007). Protocols that are especially vulnerable to such intrusion include Telnet, File Transfer Protocol (FTP), Post Office Protocol version 3 (POP3), Internet Message Access Protocol (IMAP), Simple Mail Transfer Program (SMTP), Hypertext Transfer Protocol (HTTP), Remote Login (rlogin), and Simple Network Management Protocol (SNMP) (Orebaugh, et al., 2007). Once the intruder has access to the network, he can collect data and use it as he likes. Common examples of stolen data include credit card numbers and proprietary organizational secrets, but include anything the hacker desires. Although organizations may use a primarily switched network, they are not protected from sniffer attacks because many programs exist that allow packet sniffing in a switched network (Whitman, et al., 2008). Because intruders who use packet sniffers do not directly interface or connect to other systems on the network, they are considered to be a passive-type of attack (Orebaugh, et al., 2007). It is this passive nature that makes sniffers so difficult to detect (Orebaugh, et al., 2007). In addition to this, hackers use normally use rootkits to cover their tracks so that their intrusion will not be detected (Orebaugh, et al., 2007). A rootkit is a collection of Trojan programs hackers use to replace the legitimate programs on a system so that their intrusion will not be detected (Orebaugh, et al., 2007). Rootkits replace commands and utilities that the hacker inputs and clears log entries so that there will be no record of his entry (Orebaugh, et al., 2007). Though it is difficult, there are some ways to detect rootkits. Methods of detection include using an alternate, trusted operating system, analyzing normal behaviors, scanning signatures, and analyzing memory dumps (Rootkit, Wikipedia , 2011). Removing rootkits can be very complicated and difficult and if the rootkit is in the central operating system, reinstalling the operating system may be the only option (Rootkit, Wikipedia, 2011). The threat of eavesdropping by intruders is large and challenging. However, there are some defenses that can be taken to prevent hackers from using packet sniffers against an organization. Protecting Against Packet-Sniffers and Man-in-the-Middle Attacks Packet sniffing and man-in-the-middle attacks compromise the integrity and confidentiality of data while in transmission.   Fortunately, there are several techniques that can be used by organizations and individuals to protect against these threats and reduce risk.   Specifically, technology, policy, and education are typically used to cover all aspects of security.    Technology Encryption is the best form of protection against any kind of packet interception (Orebaugh, et al., 2007).   The reason behind this is that even if the data is captured by the packet sniffer, the information is completely unreadable by the attacker (Orebaugh, et al., 2007). By using this technique, messages are encrypted once the data leaves the senders computer.   Both sender and receiver hold a key that decrypts the message being transferred.   Most popular websites apply a level encryption by using the HTTP Secure (HTTPS) protocol.   With this technology, the connection between the web server and the users computer is encrypted; making the information intercepted by a third party useless.   Currently, most popular websites such as Google, Facebook, Yahoo, and Twitter use the https technology.   However, some sites (such as Amazon.com) use https only at the login page and fail to provide a secure connection afterwards.   In order to assure complete security, it is im portant to apply the https protocol throughout the users browsing experience.   The main disadvantage of this feature is that it slightly slows down the users connection.    Email can also be protected from packet sniffers by using encryption.   Email extensions such as Pretty Good Protection (PGP) can be easily implemented using standard email platforms like Microsoft Outlook (Orebaugh, et al., 2007).   Once sender and receiver start using the encryption techniques, intercepted email messages cannot be interpreted by an attacker (Orebaugh, et al., 2007). Another way to protect against sniffers is by using One Time Passwords (OTP). With this method, a different password is sent every time the authentication is requested to the user (Orebaugh, et al., 2007).   Similarly to the case of encryption, if a third party intercepts someones password, this information will be useless since these can only be used once (Orebaugh, et al., 2007).   This technology can be extremely useful to ensure security; however, remembering new passwords for each login can be very challenging and frustrating for most users. A new security technique called quantum encryption is also provides good protection against sniffing attacks.   This technique consists of making each bit of data as small as a photon (McDougall, 2006).   The data is then transferred across fiber-optic lines.   Ã‚  If the information is picked up and intercepted by any kind of packet sniffer, the entire photon message is disrupted, ending up the entire transmission (McDougall, 2006).   A technology like this would make it impossible to intercept information since the communication will be cut in the case of interception.   However, it requires fiber-optic Internet connections, which many service providers do not own and its installation can be expensive. Policy Information security professionals can help secure employees connections by requiring the use of any of the technologies explained before.   For example, if certain employees need to access websites that are outside of the organizations network, they should be allowed to use only websites that use the https protocol such as Google and Yahoo.   Policies requiring Access Control Lists (ACL) can also help prevent sniffer attacks.   All secured networks and assets should be supported by an ACL to prevent unauthorized access.   Additionally, physical security policies should be implemented to efficiently protect the computer and server rooms in the organization.   Unauthorized access to these locations could cause the installation of sniffer programs and equipment. Education Every security initiative should have a training program supporting it.   Basic but regular training sessions given to employees about the dangers of packet sniffing can prove to be very valuable when protecting a network.   Security facts such as not allowing strangers to computer rooms should be explained to all employees. Example and Demonstration of a Packer-Sniffer Program: Wireshark Originally named Ethereal, Wireshark is a free and open-source packet analyzer (sniffer) typically used by network and security professionals for troubleshooting and analysis (Orebaugh, et al., 2007).   However, many potential attackers also use it to perform man-in-the middle attacks and gain information for password cracking.   Wireshark is available for most operating systems (including OS X, Windows, and Linux) and allows users to see all the traffic that goes through a specific network (Orebaugh, et al., 2007). Wireshark differs from other packet-sniffer programs mainly because of its easy-to-understand format and simple Graphical User Interface (GUI) (Orebaugh, et al., 2007).   Wireshark can be easily set up to capture packets from a specific channel.   Once the program is running, all the network packets are shown in the screen.   The top panel (summary panel) shows a summary of the entire packet, including source, destination, and protocol information (Orebaugh, et al., 2007).   Since one quick web browse can provide a large amount of packets, Wireshark solves packet browsing issues by categorizing each packet according to its type and showing each category with a specific color in the GUI.   Additionally, the user has the option of applying filters to see only one type of packets.   For example, only packets dealing with http functions may be shown.   The middle panel in the GUI is called the protocol-tree window. It provides decoded information of the packet (Orebaugh, et al., 2007). Finally, the bottom panel (data view window) shows the raw data of the packet selected in the Summary panel (Orebaugh, et al., 2007).   Figure 1 shows a screenshot of Wireshark while running and graphically shows the three main panels of the GUI. Figure 1 Screenshot of Wireshark while running and the three main panels. To troubleshoot network problems, Information Systems professionals use Wireshark by installing the sniffer program in various locations in the network and seeing which protocols are being run in each location (Orebaugh, et al., 2007).   Additionally, if the sniffer is placed in a location where it can capture all data flowing to the main server, Wireshark can detect network misuse by providing the source and destination of all packets.   For example, if an employee in a company uses his computer to access inappropriate websites, Wireshark will show the employees and the websites IP addresses in the source and destination columns with detailed information about the website in the info column and the protocol tree panel. It is easy to see how useful Wireshark is for network troubleshooting and identifying misuse; however, the program can also be used with malicious intent.   For example, the program can be used to find out passwords on unencrypted websites.   To demonstrate this case, the username john_doe_user and password 123mypasswrd were used to log in to the unencrypted and unsecured www.bit.ly website.   At the same time, Wireshark was set up to capture all packets in the computer.   After the packets were captured by the sniffer, the data can easily be filtered by the http category.   In the info column, a packet labeled POST means that someone has entered text to a website.   After clicking on this specific packet, all the username and password information can be seen in the center section of Wireshark (as shown in figure 2).   Unencrypted and unsecured websites are very vulnerable to these types of attacks.   On the other hand, websites using the https security feature prove to be safer for users.   For example, the same situation as before was applied to the encrypted website www.facebook.com by trying to log in, but Wireshark was unable to capture any packets with login information. Figure 2 Wireshark screenshot showing username and password. Other types of malicious attacks can also be performed with Wireshark.   For example, some toolkit add-ins to Wireshark such as Dsniff and Ettercap can be used to perform man-in-the-middle attacks and password cracking (Orebaugh, et al., 2007).   Even if the incoming data is encrypted, these tools can crack some passwords by using dictionary brute force attacks (Orebaugh, et al., 2007). Case Study: A costly attack at Dave Busters In 2007, the popular restaurant chain Dave Busters experienced the power of malicious packet-sniffing software attacks.   A multinational group of hackers was able to penetrate the companys corporate network and install basic packet-sniffing software at 11 of the chains restaurant locations (Thibodeau, 2008).   During a four-month period, the attackers were able to intercept customer credit card data going from Dave Busters restaurant locations to the corporate headquarters network in Dallas (McMillan. 2008).   Extremely sensitive information such as credit card numbers and security codes were sold to criminals, who used this data to perform fraudulent transactions to online merchants (McMillan, 2008).   The attack proved to be very profitable for the hackers.   For example, from information coming from only one restaurant location, the criminals were able to gain over $600,000 in profits (McMillan, 2008).   It was estimated that approximately 130,000 credit or debit ca rds were compromised by this attack (Westermeier, 2010). To access Dave Busters network, the attackers simply drove around a restaurant location with a laptop computer and took advantage of vulnerable wireless signals to access the computer networks (Westermeier, 2010).   Malicious sniffing software was then installed in the network to intercept credit and debit card information (Westermeier, 2010).   The packet-sniffing software was written by one of the groups hackers and consisted of SQL injection attacks (Thibodeau, 2008).   However, many organizations have stated that the code was not very impressive.   For example, the CERT Coordination Center described the programs source code as a college-level piece of technology (Thibodeau, 2008).   Additionally, the malicious code had one weakness: it would shut down every time the computer that was monitoring rebooted (McMillan, 2008).   Therefore, the criminals had to go back to the restaurant location, gain access, and re-start the packet-sniffer every time this happened. The fac t that this costly program was developed by someone with just basic programming skills and how they consistently gained access to the network highlights the lack of protection of Dave Busters security systems.    According to the Federal Trade Commission (FTC), Dave Busters information security systems and policies did not provide the necessary security features to protect customers information (Westermeier, 2010).   The attackers were able to access the network not just once, but repeatedly over a time frame of four months (Westermeier, 2010).   The fact that the company was oblivious to these multiple intrusions during a long time period proves that they were vulnerable to attacks and that Dave Busters did not apply any Intrusion Detection Systems (IDS) to their networks, nor did they monitor outbound traffic (Westermeier, 2010).   Additionally, sensitive customer information was not given special protection.   Credit card data was transferred across simple unprotected and unencrypted networks (Westermeier, 2010).    What could Dave Busters have done? First of all, private networks should have been protected in a better way.   It was just too easy for hackers to gain access and install malware.   By allowing only a specific group of IP addresses, or granting only temporary access, the firm could have been safe from unauthorized access by strangers.   But even in the case of hacker access, tools such as IDS can help monitor the network during an attack.   If the company had implemented an IDS in their network, the unauthorized intruders would have been detected in time to prevent losses. Additionally, by treating sensitive data differently than regular communications, the company could have considerably reduced the threat.   Dave Busters could have simply used readily available firewall systems to the networks that held customer data (Westermeier, 2010). Encryption devices could have also proven to be useful.   If link encryptors had been used, the intercepted data would have been completely useless for the hackers.   Data isolation could have also been useful.   The firm could have separated the payment card systems from the rest of the corporate network (Westermeier, 2010). Sensitive information did not necessarily require connection to the Internet; so the company should have separated these transmissions from the network. Finally, a general company-wide policy requiring access restriction, IDS installation, firewall usage, and sensitive data isolation throughout all restaurant locations could have been extremely useful.   A uniform and thorough information security policy along with a comprehensive training program given to specific employees would help enforce the security features.   Considering that Dave Busters had not implemented any of the security features explained in this section, it is obvious that their story would have been different if these techniques had been used. Conclusion Packet sniffing is a sophisticated subject that wears two hats. It can be used for either good or evil depending on the intentions of the person using the program. It can help with analyzing network problems and detect misuses in the network for good purposes. Meanwhile, it can also help hackers and other cyber-criminals steal data from insecure networks and commit crimes, as in the case of Dave Busters. The best way to protect data from being sniffed is to encrypt it. Necessary policies and training also help with the protection. As technology evolves, there will be more and more ways to commit cyber crime. Extremely sensitive data like credit card information and health care data should be well protected, from the perspectives of both the business and personal. In order to protect this information, organizations and individuals must be aware of the threat of packet sniffers.