Tuesday, February 25, 2020

Evidence Based Health Essay Example | Topics and Well Written Essays - 500 words

Evidence Based Health - Essay Example The sample should be satisfactory in terms of size, representation of the whole population and relevance to the study. Selection of the wrong sample and sample size will lead to poor conclusions and results therefore leading to wrong implementation. The success of any research work depends highly on the selection of the participants and the participation level of the participants. The selection of the participants from those who were to join the university made the research a worthy activity to undertake. Participants selected should be from a group privy to the research outcome (Boyer, 1990, p34-37). The researcher selected participants from a vulnerable group. Though this was not a full representation of the group, the researcher was able to monitor the trends of the students as they continued with their studies. The research was aimed at investigating whether students’ anxieties and depressions increase after entering college, how much adverse life experiences lead to their increases, as well as the influence of adversity, depression and anxiety on test performance. The use of the sample data would enable the researcher establish the level of increase in the student depressions and anxiety and impacts on exam performance. However, the researcher should also have used the continuing students and those who had already completed their studies in order to reach at a conclusive decision and recommendations. The sample selected was to benefit from the research outcome as the recommendations made would impact their lives. The researcher ensured that the privacy of the students is maintained by use of questionnaires where the identity of the students was not to be revealed when answering them. The participants were briefed of the essence of the research but were not given the chance to state their position in participation. The participants were assured of confidentiality and anonymity. In my view,

Sunday, February 9, 2020

Surveillance Security research assingment Essay

Surveillance Security research assingment - Essay Example Introduction In this global technological evolution of information systems, every organization protects the network by firewalls, intrusion detection systems and other dedicated hardware. The widespread implementation of these network defense equipments facilitated the organizations to be more secure. However, the other side of the picture demonstrates that it has also maximized opportunities for hackers to breach in the systems. Security is essential part of any computer network that is operational. Security measures are mandatory as ‘www.businessdictionary.com’ covers the basics and states it as â€Å"Prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action†. Another definition in the context of network security stated as â€Å"Network security covers such issues as network communication privacy, information confidentiality and integrity over network, co ntrolled access to restricted network domains and sensitive information, and using the public network, such as Internet, for private communications †. Organizations spend enormous funds only for implementing advanced security devices and security applications The reason for doing large investments in order to protect networks is understandable as the impacts of security breaches are also equivalent. Security breaches related to data theft, hacking, unauthorized access etc. impacts on organizations reputation in the market as customer data is exposed to hackers, who can use it for many purposes for financial gain. Likewise, this will also lead in severe revenue loss. The current network of 1-Click Mobile Phones Ltd has only a firewall to combat all the threats. No internal access policies are implemented, no advanced security appliances are present, and no surveillance security framework is implemented. 1-Click Mobile Phones Ltd has recognized the importance of securing the net work and hence decided to equip the network with a surveillance security cameras and biometrics, advanced security appliances, wireless security and internal access policies. The objectives of this report are to identify and prevent Unauthorized Access, Monitoring Employee activities by surveillance, Monitoring critical server, database and equipments by surveillance and Preventing Wireless access. Although, advanced firewalls support packet-filtering technology to analyze every packet before granting access. Moreover, ‘computer security incident response teams’ are deployed to perform recovery whenever an incident generates on the network. Physical Infrastructure Policy The physical infrastructure policy will add surveillance security to the current network. There are no definitions available for video surveillance security apart from this one that states it, as â€Å"Intelligent Video Solution is a system of hardware and software that aids the security executives in performing their daily tasks. An intelligent video solution can be from a single manufacturer or it can be a compilation of components (both hardware and software) from a variety of manufacturers. The net end result is that it is the sum of all of its parts performing the tasks they were designed to do† (Elliott 2010). For the current network of 1-Click Mobile Phones Ltd, a cost effective network video recording surveillance solution s required. The ‘VS-8024 VioStor NVR (Network Video Recorder)’ will fulfill all the requirements of the network as it