Saturday, January 25, 2020

Website For Malaysian Insurance Institute

Website For Malaysian Insurance Institute INTRODUCTION: The project aim is to setup a website for Malaysian Insurance to allow insurance agency leader to enroll their candidates for the Pre-Contract Examination. In phase 1, the author will conduct a few studies related to the electronic commerce to allow insurance agency leader to pay for the exam fees. Furthermore, additional security features to protect the website and the user will also be study to enhance the security of the website. FINDINGS: Background Study of Malaysian Insurance Institute Malaysian Insurance Institute is a non-profit organization that founded in 1968. This organization is a leading insurance institute that provide insurance knowledge, training and offer all kinds of qualifications that recognized by the international insurance company such as insurance, financial planning and risk management. MII is known as the primary insurance knowledge provider in Malaysia. It works together with other insurance company in the industry with supports and helps from the Bank Negara Malaysia and Regulator to guarantee the provided education is up to date and fulfill the changes in the insurance industry. Figure 1.1: Malaysian Insurance Institute Website 1.1 MII AS EDUCATIONAL AND TRAINING BODY An average of 300 training programs is organized by MII to educate the brokers, insurers, reinsurers, adjusters and regulators. In each training program, there are about 10,000 participants from all other countries including Malaysia. These outstanding records make MII a place in the Education Board of the Federation of Afro Asian Insurers and Reinsurers (FAIR) that based in Egypt. Besides that, MII also help general and life insurance agents by providing training to them. These training will help them to provide a better service to their customers. For agency leaders, MII is ally with LIMRA (USA) to organize the Agency Management Training Course (AMTC) to upgrade their leadership and professionalism. There are two primary professional programs provide by MII. They are the Diploma of The Malaysian Insurance Institute (DMII) and the Associateship of The Malaysian Insurance Institute (AMII). These two programs are the basic requirement for the insurance industry and also for the emerging markets. 1.2 MII AS EXAMINATION CENTRE MII act as a guardian to monitor the education standards of insurance exam. Besides that, it is also the authorized exam center to conduct insurance examination. MII offers 32 major examinations that attract over 60 thousand candidates for the insurance industry in a year. Because of the outstanding management and good reputation as an education and exam centre, MII is consigned to be the primary place to conduct some others examinations that organize by others examination bodies such as The Institute of Risk Management (UK), Chartered Institute of Loss Adjusters ( UK), The Insurance Institute of America ( USA), The Society of Actuaries (USA) and others. 1.3 MII AS INSURANCE INFORMATION CENTRE MII is proud to have their own library that specialized in the insurance industry and others related industry. Besides that, all kind of collection of books, magazines or journals that related to insurance is also collect by the library for public use. Moreover, MII also has an electronic library portal that publish information to the public such as online newspapers, electronic journals, links to others insurance companies, associations, regulators, university and other related sectors. 1.4 MII AS CONFERENCE ORGANIZER There are around eight conferences that conducted by MII in a year which was planned to fulfill the needs of the emerging insurance industry. Most of the conference receives massive response from all kinds of business industry from local and international. These conferences not only provide experience and knowledge to the public but also provide a chance to each other to build up their networking with other industry. 1.5 AFFILIATION WITH INTERNATIONAL BODIES MII has a firm belief in collaborating its efforts and resources together with other reputable insurance education bodies throughout the world so as to maximize and leverage on each others strengths. MIIs commitment to deliver the best quality standards in education is reflected in its international links with major insurance institutions, universities and relevant organisations. Among the collaborations that MII has established are with The Chartered Insurance Institute (UK), Australasian Institute of Chartered Loss adjusters (AICLA), Chartered Institute of Loss Adjusters (CILA), Australian New Zealand Institute of Insurance and Finance (ANZIIF), LOMA (USA), Institute of Risk Management (UK), LIMRA (USA) and others 1.6 INTERNATIONAL PRESENCE While addressing the domestic needs will always remain as a main focus and priority, MII has also spread its wings into the international scene, particularly in fulfilling the needs of the emerging markets. This is in line with its vision to be the preferred Institute for training solutions, education and information in insurance in Malaysia and the emerging markets. The increasing numbers and wide range of international training participants and conference delegates is a testimony of the recognition and regard for the relevant and high quality programmes being offered by MII. MIIs presence in the emerging market, particularly within the ASEAN region is quite significant. When the 10 ASEAN insurance regulatory authorities formed the ASEAN Insurance Training Research Institute (AITRI), MII was given the honour to lead as the secretariat for AITRI. AITRI is a non-profit organization to provide regional research, insurance education and training support for the regulators as well as the industry of the ASEAN member countries. Its activities are featured in international publications and have gained great recognition and international support such as the World Bank (USA), International Association for Insurance Supervisors ( Switzerland), Office of the Superintendent of Financial Institutions ( Canada) and others. 1.7 INTERNATIONAL AWARD MII won a title named as Professional Service Provider of the Year 2007 Award at year 2007 from The Review Worldwide Reinsurance Association in London, U.K. MII show up as the first winner that come from Asia after 14 years when the award is started. MIIs effort and their compliance for the training and the education was the reasons for them to receive the award. 1.8 List of Certification and Professional Programs The list below is the certification or professional programs that offer by Malaysian Insurance Institute. These certification or professional programs are recognized by all the insurance company in Malaysia. The agent of an insurance company must possess the related certification or professional programs to promote or sell the insurance to the customers. Diploma of Financial Services Associateship of the Malaysia Insurance Institute (AMII) Associateship of the Malaysia Insurance Institute (AMII) International Diploma of the Malaysia Insurance Institute (DMII) Diploma of the Malaysia Insurance Institute (DMII) Life Certificate of MII Insurance (CMII Insurance) Pre-Contract Examination for Insurance Agent (PCEIA) Certificate Examination in Investment-Linked Life Insurance (CEILLI) International Certificate in Risk Management (CIRM) Basic Agency Management Course (BAMC) Registered Financial Planner (RFP) Basic Certificate Course in Loss Adjusting (BCCILA) Intermediate Certificate Course in Loss Adjusting (ICCILA) Basic Certificate Course in Insurance Broking (BCCIB) Intermediate Certificate Course in Insurance Broking (ICCIB) Certificate in General Insurance Actuarial Practice (CGIAP) 1.9 Conclusion MII is a powerful organization that provides high quality education to the insurance industry and others related field. Besides that, MII is also recognized by international organization for their quality services and excellent programs. Literature Review This chapter discusses about the online electronic commerce system and the security features that plan to implement on the registration website such as on screen keyboard, multi step authentication and secure socket layer. 2.1 Electronic Commerce Electronic commerce is known as any transaction or payment that occurs through the internet. It includes a wide range of area such as auction website, retail website, registration website, banking website, and etc. The content of electronic commerce can be goods or services. It has become important with the emerging of the internet and World Wide Web. Since electronic commerce is conduct on the internet, so the customer can ignore the barrier of distance and time. The electronic commerce is growing frequently since five years ago and it is expected to growing in faster rate. When electronic commerce is conducted, it means online payment will be conduct during the transaction. There are several of payment method are available online such as credit card, PayPal, and Google checkout. (Networksolution, 2010) Credit card is the most popular payment method used by most of the electronic commerce website. A marketing research shows that an electronic business will lost 60 to 80 percent of potential customers if credit card payment is not implemented in their electronic commerce system. With credit cards payment enabled, it makes the customer has the impulse to purchase an item at anytime and also ensure the legitimacy of the electronic business to the customers. (EasyStoreCreator, 2010) Another popular online payment method is PayPal. The benefit of PayPal is it allows the merchant or customer to make online and offline transaction at anytime. Furthermore, PayPal is well known for its ease of use and no verification bounding of credit rating. The users of PayPal only need to verify their electronic mail address and their accounts personal information. Payment can be easily directed to the PayPal account with the tied electronic mail address like [emailprotected] Additionally, Google checkout is also a preference of some electronic business merchant. Google checkout fast enough to become popular is because the provided service of this system is user friendly, very stable and reliable. Another benefits of Google checkout is it charge lesser merchant fees compare to PayPal and this makes it grow at a rapid rate. (Arora.n, 2010) 2.2 Types of Electronic Commerce There are multiple types of electronic commerce that are available on the internet. Among all kinds of electronic commerce, there are 4 popular types that occupy most of the electronic commerce website. They are business-to-business (B2B), business-to-consumer (B2C), consumer-to-business (C2B), consumer-to-consumer (C2C). Out of these popular types, there are also some others electronic commerce are used by those electronic business merchant such as business-to-employee (B2E), government-to-government (G2G), government-to-employee (G2E), government-to-business (G2B), business-to-government (B2G), government-to-citizen (G2C), citizen-to-government (C2G) and etc. (DigitSmith Embroidery and Screen Printing, 2006) 2.3 On Screen Keyboard On screen keyboard is a software or application that shows on the monitor of the computer. It allow user to input any kind of text by mouse or the monitors touch screen. On screen keyboard can help those mobility impairment people or those people that cannot type. Besides that, on screen keyboard also can help users to bypass those virus, Trojan or key logger to steal data (Microsoft Corporation, 2010). Figure 2.1 shows an example of on screen keyboard. It is a default application that comes with the operating system provide by Microsoft. msosk.jpg Figure 2.1 Microsoft on screen keyboard 2.4 Multi Step Authentication The single factor authentication such as the username and password process is widely used by a lot of website in the World Wide Web. Due to the demand for more security during login, an ideology named multi step authentication has been create to fulfill the public demand. Multi step authentication is a process of login and authenticates users in multiple webpage. The first step of the authentication is verify the username entered by the user. If it is match with any name inside the database, then the user will be redirect to the second step. Second step required the user to enter their password and if it is correct, then the system will redirect the user to the services they login to. (Agilewebsolutions, 2010) Besides that, this feature also block any malware that using form robot to capture password entered by the user because there is two different login processes is performing. 2.5 Secure Socket Layer Protocol(SSL) Secure Socket Layer is a well known protocol that uses to provide a secure connection between the server and the client. The purpose to secure a connection is to protect the integrity of data, privacy and authentication. SSL protect data by encrypting a plaintext message to ciphertext. Ciphertext is meaningless to everyone if someone captured the data packet try to crack it. A pair of key is used to encrypt the data. They are named public key and private key. Public key is used to encrypt data that send from the client and the private key is used to decrypt the data that received by the server. To ensure the server side is the real owner of the service provider, a digital certificate will be issue by a third party certificate authority such as GeoTrust and VeriSign. This process is to identify the domain is maintain by the recognized owner and it is legal. Figure 2.2 shows an example of digital certificate. (GeoCerts, 2010) cert.gif Figure 2.2: Digital Certificate Netscape introduced the SSL Protocol in 1994 due to the concern for the security over the internet was rising. At first, SSL is develop to secure the connection between the server and the client but modification was make to fit it in to other services such as TELNET, FTP, Email and etc. (Martz. C, 2010) 2.6 Conclusion Security feature is an important session to keep a website safe from any threats. All the features discussed is planned to implement into the website to work with the electronic commerce system and the website security. Electronic Commerce System Security It is a big challenge to maintain and securing an electronic commerce system as the internet world is emerging every day. It is important for electronic merchant to implement security for their electronic commerce website. 3.1 Components of Electronic Commerce Security There are 5 components of electronic commerce security that is important to electronic commerce website. The first component is containment that uses to prevent all kinds of attacks. The second component is compartmentalization that uses to avoid unauthorized access to the website system. Besides that, it prevents collateral damage deal to the website during attacks. The third component is continuity that guarantees website system to keep running even during DOS attacks or even during the equipment failure. The fourth component is recovery that frequently starts the recovery operation during external attacks or malicious internal activity. The fifth component is performance that ensures the network performance is not reducing due to the others security operation. 3.2 Electronic Commerce Vulnerabilities The fearful of online transaction threats has been increase with all types of attacks. Multiple vulnerabilities will be discussed to understand their characteristic. 3.2.1 SQL Injection SQL injection is a technique that inserts the SQL meta character into the user input. This technique allows the attacker to force the back-end database to execute the command entered into the system. To check whether the website is vulnerable to this attack, a single quote () character will be send into the database. An invulnerable website will return an error message which exposes the technology being used at the host machine. These information is enough for the attackers to perform further attacks to the restricted area or the operation system. SQL injection attack can be different depends on the types of database. If the attack is conduct on the Oracle database, it needs the UNION keyword to execute and it is harder to capture compare to Microsoft SQL server. (Mookhey. K. K, 2004) 3.2.2 Price Manipulation This is a new threat that threatens the payment gateway and the shopping cart. In the common case, the total price that needs to pay by the customer is saved in a hidden HTML field. A web application proxy such as Achilles can modify these figures when the information is send from the users browser to the website. The figure 3.1 is taken from one of the Symantec article showing that the price can be modify by the attackers to any value. Then, this information will be send to the merchants payment gateway. (Mookhey. K. K, 2004) achilles.jpg Figure 3.1: Achilles web proxy 3.2.3 Buffer Overflows Bad consequences will be happen when massive number of bytes is sent to an application that is not set up properly to handle these bytes. According to K. K. Mookhey, the path of the PHP functions is exposed when he sent in a very large value in the input field. Figure 3.2 shows that when a large value is sent in and the PHP script cannot process the value, the returned error message expose the location of the PHP functions. This error message reveals the admin folder that allows attackers to conduct further attacks. (Mookhey. K. K, 2004) phptimeout.jpg Figure 3.2: PHP timeout error 3.2.4 Cross-site Scripting Cross-site scripting is primary concentrated to the end user and also leverages two factors, the weak input output validation of the web application and the trust gain from the user to the well known website name. This attack required the website to take in user input, process it and shows the result together with the original user input. This sequence is commonly found in the search system. The attacker conducts the attack by embedding the JavaScript into the user input as part of the input. Then, a link will be created which contain this JavaScript and the victim will be persuaded to click on it. For example, the URL will looks similar like this: http://www.vulnerablesite.com/cgibin/search.php?keywords=alert(OK). This example will pop up an alert box that shows the text OK. The attacker can place the script they want into this link to conduct the attack. Usually, the attacker will use this method to capture the victims cookies that may contain victims sensitive information. Besides that, the JavaScript can be also use to redirect the victim to the website that contain malicious code and conduct the attack at there. 3.2.5 Weak Authentication Authentication system that does not block multiple fail login can lead to unexpected consequences. An attacker may use some brute force software to guess an accounts password by sending all kinds of combination to the server to validate the password. Another weak authentication is when the website uses basic authentication but does not transfer it through SSL. Attacker can sniff the traffic packet and discover the user information inside the packets. 3.3 Pros and Cons of Electronic Commerce System Although electronic commerce provide a lot of benefits to electronic business and the consumer, but there are also some consequences that affect both merchant and the consumer. The benefits of electronic commerce are it save the users time compare to shopping at any shops or markets. Everything transaction is conduct on the internet and just a few clicks, consumer can buy everything they want and pay it. Compare to shopping at regular shop, consumer have to travel to the shop, park the car, walk to the shop, browse the shop for the item, then pay it and that is wasting a lot of time. Electronic commerce is cheap compare to the product selling at regular shops and markets. This is because every electronic merchant does not need to pay for the rental and utilities expenses like the physical shop. That is why they can sell cheaper product when they do not need to cover these expenses. Besides that, lowering the product price is one of the marketing skills to attract customers to buy from their electronic shop. (Finnila. J, 2008) Most of the electronic commerce is supported with credit cards paying method. With this method enable, consumer does not need to download or install special plugin to make a transaction. Besides that, consumers with credit cards are always fill with impulse to buy something during every visit. Furthermore, the electronic merchant can keep the customer transaction information for future use such as follow up sales or advertise product. (Nightcats Multimedia Productions, 2010) The disadvantages of electronic commerce are the competitor is all around the world. Electronic merchant have to keep generate new marketing strategy to attract customers or keep the customers to visit them again. As the internet world is changing rapidly, there are a lot of new traps appear to steal information from the consumer such as phishing website and malicious scripts. For any electronic commerce user that unaware to these internet threats will expose their personal confidential information to those scam owners. (Finnila. J, 2008) From the point of view of most of the customers, it is an abuse to the customers personal information when the electronic merchant keeps the information for future use. The customer may want to keep their personal information in private and it is better to request for their permission before their information is used. Besides that, the customers also worry that their personal information may leak out to the public in any accident. It is a benefit for the merchant but a disadvantage to the customers. (Nightcats Multimedia Productions, 2010) 3.4 Conclusion It is important to electronic merchant to secure their electronic commerce system to prevent all kinds of incident that cause unexpected losses to the business. CONCLUSIONS: The author successfully completed objective one to three in the phase 1 of the project. The author learns how MII works in daily operation and their roles and responsibilities. Besides that, the author also learn how those additional security features works to protect the website and the users. As a proof of meeting objective one to three, the reference list below shows various information from different sites. REFERENCES (BACKGROUND READING MATERIALS): About MII (Online) (Cited 20 MAY 2010) Available from: http://www.insurance.com.my/mii2010/about.html MII Vision and Mission (Online) (Cited 21 MAY 2010) Available from: http://www.insurance.com.my/mii2010/about_vision.html Certification and Professional Programmes (Online) (Cited 22 MAY 2010) Available from: http://www.insurance.com.my/mii2010/certification.html What is Ecommerce? (Online) (Cited 23 MAY 2010) Available from: http://www.networksolutions.com/education/what-is-ecommerce/ Choosing a Merchant Credit Card Processing Vendor To Meet Your ecommerce Credit Card Processing Needs (Online) (Cited 25 MAY 2010) Available from: http://www.easystorecreator.com/choosing-vendor.asp Different Payment Methods in E-Commerce Website (Online) (Cited 26 MAY 2010) Available from: http://ezinearticles.com/?Different-Payment-Methods-in-E-Commerce-Websiteid=2073803 Ecommerce definition and types of ecommerce (Online) (Cited 26 MAY 2010) Available from: http://www.digitsmith.com/ecommerce-definition.html Handling Financial Web Site Tricks (Online) (Cited 28 MAY 2010) Available from: http://help.agile.ws/1Password3/multi_step_logins.html Two-Step Authentication Method For Online Banking (Online) (Cited 30 MAY 2010) Available from: http://priorartdatabase.com/IPCOM/000126859 Handling Financial Web Site Tricks (Online) (Cited 30 MAY 2010) Available from: http://help.agile.ws/1Password3/multi_step_logins.html Turn On and Use On-Screen Keyboard (Online) (cited 31 MAY 2010) Available from: http://www.microsoft.com/windowsxp/using/accessibility/oskturnonuse.mspx SSL Secure Sockets Layer (Online) (Cited 1 JUNE 2010) Available from: http://www.birds-eye.net/definition/s/ssl-secure_sockets_layer.shtml How SSL Works (Online) (Cited 1 JUNE 2010) Available from: http://www.geocerts.com/ssl/how_ssl_works Pros Cons of E-Commerce (Online) (Cited 2 JUNE 2010) Available from: http://ezinearticles.com/?Pros-and-Cons-of-E-Commerceid=1481356 Pros and Cons for consumers when shopping online (Online) (Cited 2 JUNE 2010) Available from: http://www.nireland.com/e.commerce/Pros%20and%20Cons.htm Beginners Guide to Ecommerce (Online) (Cited 2 JUNE 2010) Available from: http://www.nightcats.com/sales/free.html 5 Essential Components of E-Commerce Security (Online) (Cited 3 JUNE 2010) Available from: http://www.intruguard.com/E-commerceSecurity.html Common Security Vulnerabilities in e-commerce Systems (Online) (Cited 4 JUNE 2010) Available from: http://www.symantec.com/connect/articles/common-security-vulnerabilities-e-commerce-systems ***END OF REPORT***

Friday, January 17, 2020

Post Sigmoid Coletomy Care

This paper will critically examine the care needs and management of Mr Braun. An appropriate framework will be used, namely the ABCDE. Alternative treatment will be analysed using the 5 WHs critical decision making too (Jasper, 2006)l. His care will be based upon the nursing process ensuring that patient outcomes are agreed, implemented and evaluated. The assessment framework to be used is this assessment is the ABCDE assessment framework. The ABCDE framework looks at Airway, Breathing, Circulation, Disability, and Exposure/Elimination.The reason for choosing this framework is that it uses a systematic method of assessing, it aids with elimination of post op complications. In addition, it is a commonly accepted framework which is widely used and can be used in critical care situations, pre & post-operative care and emergency situations. Furthermore, it allows the nurse to use her skills in accessing the patient’s needs. The disadvantages of the framework are that it is a medic al model in the sense that it looks specifically at the biological aspects of care and lumps emotional/psychological/cultural/social care under the exposure/elimination catergory.Therefore it does not promote exploring these issues in great detail (Younker, 2008 & Hargan 2012) Cancer Physiology Bowel cancer normally starts in the rectum or sigmoid colon. It starts as adematous polyps and then progresses to adematous carcinomas. It spreads by direct extension via the bowel circumference, submucousa and outer bowel wall layers. It can also spread to other areas by direct extension, for example, to the liver, pancreas and spleen. Metastasis is normally by way of the surround lymphnodes.Primary cancerous cells can also travel into the lymphatic and circulatory system causing secondary cancer in other organs such as liver and pancreas (LeMone & Burke, 2003). Mr Braun is undergoing an operation for his sigmoid colon cancer. One route to take would be the traditional method. This consists of open bowel surgery. This entails making a large opening. A bowel prep is given prior to surgery, there is a longer starvation process, which can cause dehydration and electrolyte imbalance. Furthermore, it causes stress on the body, insulin resistance in the body is longer and the recovery period is longer.In addition it causes longer paralytic ileus (Siddiqui et al. , 2012). The alternative treatment to the traditional method would be the laparoscopic method. Mr Braun would have a smaller incision, therefore making a quicker recovery. He would be in less pain and would be able to mobilise quicker. He would have a quicker return of GI function and a lesser period of paralytic ileus. He would be able to deep breath better as he would not be experiencing a lot of pain, therefore he would be at less risk of contracting a chest infection.This would all work towards him having an earlier discharge, for example, 3-5 days post op compared to anywhere between 8-12 days on the traditional method. Research has also shown that community rehabilitation is much quicker, 2-3 weeks rather than 6-8 weeks on the traditional method (Jenson 2011). Further research shows that patients undergoing laparoscopic surgery have fewer complications post discharge (Hargan 2012). It appears then the laparoscopic route has better outcomes for the patient and in addition, the NHS.Being able to discharge a patient between 3-5 days who experience fewer complications post operatively not only frees up beds but costs less to treat the patient. Therefore, after weighing up the pros and the cons of both the traditional and the laparscopic it would seem that Mr Braun would be better off having the laparoscopic route. It appears from research that the lapascopic route is the route which is used in almost 90% of colorectal surgery. However, the route that is taken ultimately depends on the surgeon’s choice. Prior to collecting the patient from the recovery roomBefore collecting Mr Braun fro m the recovery room I will need to check the bed area. This includes checking that the oxygen is working. I will need to ensure that there is a nasal tube and a venturi mask. I will also need to check the suction is working and ensure that a new tube is present by the bedside. I will also need to make there is a yonker. I will put a dynamap beside the bed which will allow me to take Mr Braun’s clinical observations on return to the ward. I will also ensure that a drip stand is next to the bed as he may be on fluids or have a PCA on his return to the ward (Nicol et al. 2012).Collecting the patient from the recovery room On collecting the patient from recovery, I will take with me a kidney bowel in case the patient needs to be sick on his return journey, a pair of gloves, a oropharyngeal (geudel) airway in case his airway becomes compromised in anyway and a pocket mask for mouth to mouth. My first priority is to ensure that Mr Braun is safe to return to the ward. I will check h is level of consciousness using the AVPU tool. This tool looks at whether he is Alert, whether he responds to Voice or whether he only responds to Pain and whether he is Unconscious. I will then take a handover from the recovery nurse.This should include informing me of the procedure Mr Braun has had, how well he has responded to the surgery and his current responsiveness/consciousness level. I would need to check with the recovery nurse whether his vital signs are within the normal range. This is for patient safety which is paramount and is at the centre of nursing care. This would need to be checked against the Early Warning Score (EWS) system which includes level of consciousness, the physiological parameters, for example, temperature, blood pressure, Oxygen saturation (SATS), respiratory rate, pulse and urine output.The EWS gives an overall score which informs me whether or not it is safe to take Mr Braun back to the ward. The recovery nurse would also inform me which medication s he has had, information regarding IV fluids, how long they should run for and whether more are needed when it finishes and check they are written up on the drug chart. In addition, I would need to see the wound bed. This would help with later assessment on the ward where I would be able to compare whether there has been any further bleeding or leakage. I would need to see the stoma site.The recovery nurse would inform me whether Mr Braun had a urinary catheter and whether there had been any urine output. After handover I would say hello to the patient and manually take his pulse so that I can get an indication of his heart rate (Nicol et al. 2012). On the ward On returning to the ward I will orientate the patient. I will inform him of every procedure that I do so that I can gain informed consent (NMC 2012). I will immediately carry out a set of clinical observations. This is so I can make a comparison with his perioperative baseline.Although doing the clinical observations with th e dynamap, I will manually take his pulse as it is vital that I know whether it is regular/irregular, strong or weak. ABCDE Assessment Airway The best way to check the airway is to speak to ask the patient and get him to respond to you. If he is able to talk in normally, this will be indicative of his airway being patent. I would need to listen to whether there are any sounds, like barking or gurgling as this could indicate that there is partial obstruction.I would also need to check whether Mr Braun is experiencing any nausea or vomiting. If Mr Braun is experiencing this I would need to immediately administer an anti-emetic as per drug chart instruction. This would help prevent the risk of pulmonary aspiration. I would also need to check whether Mr Braun has any allergies. I would ensure that he is wearing two red wrist bands with the allergies clearly written on them so that other staff members are aware. His allergies would be documented in his nursing notes and on his drug chart with information on what sort of reaction he experiences.Assessing whether Mr Braun has any allergies is extremely important as allergic reactions can cause swelling of the tongue and in the throat which would compromise his airway and leave him with difficulties breathing (Resuscitation Council UK, 2012). Breathing I would now assess breathing by checking Mr Braun’s respiratory rate (RR). The normal range is between 12-20 breaths per minute. In PAC, his RR was slightly raised. This could have been due to anxiety but was more than likely due to his anaemia (this will be looked at further under circulation). I will be able to gain a comparison and start looking for a trend.It is important that the RR is counted for a full minute. His breathing may be irregular and therefore not counting the full minute would give an inaccurate measurement. I would also check Mr Braun’s SATS. The normal range should be >95%. Checking his SATS will inform me whether he is getting enough oxygen and whether his tissues are being perfused adequately. Lack of oxygen can cause hypoxia which if not managed will lead to multiple organ dysfunction and ultimately death. I will also therefor check for cyanosis as this will also inform me whether he is lacking oxygen. It is important to look at how Mr Braun is breathing.For example, is he struggling to breath, is he breathing deeply or is it shallow. Does he have to use his accessory muscles to help him breath. I would check whether his chest is rising equally on both sides. I would also speak as him a question to ascertain whether he is able to speak in full sentences because someone who is struggling to breathe is unable to speak in full sentences. I would look at whether he is breathing fast or slow. Furthermore, I would look at how he is sitting, for example, is he leaning to one side. Also when you are assessing breathing it is important to listen for any wheeze or stridor.RR is one of the first things to alter when a pa tient is deteriorating. It is vital that if Mr Braun is experiencing any of the above, the nurse responds quickly. The first thing would be to check whether he is written up for any more oxygen and if so to increase it. The nurse would then have to check in RR and SATS again after 15 minutes to ascertain whether there was any improvement or further deterioration even. If the patient was deteriorating further the nurse would need to involve the doctor who would be able to review Mr Braun immediately and give further instructions on his care (Queen Mary University & City University, 2006).Circulation An assessment of Mr Braun’s pulse needs to be undertaken. This will allow the nurse to ascertain his heart rate. In addition, it would allow me to feel whether his pulse is strong or weak and whether it is regular or irregular. The normal resting pulse should be between 60-80 beats per minute (bpm). In the PAC, Mr Braun was slightly tachycardic, which could be due to anxiety of his diagnosis, hearing about the treatment he would receive or his prognosis. By taking his pulse it will allow for a baseline, pre-operative and peri-operative comparison.His blood pressure (BP) would also be assessed. The normal ranges are 90/60-140/90. Mr Braun’s BP in PAC was 135/80. Although this is still within the normal range, it is slightly high. However, this would be an appropriate BP given his age. It is vital that clinical observations are carried out every 15 minutes for the first two hours post-op as there is a higher risk of complications occurring and clinical signs are the physiological parameters which tell you whether a patient is deteriorating or improving.For example, if a patient is tachycardic and hypotensive this could be indicative of hypovolaemic shock which would need to be managed immediately as this can lead to potential death. It is vital when taking clinical observations that the nurse is aware that she should not only rely on the measurements. Th is is because a patient can be in hypovolaemic shock and still have a normal BP. This is because in hypovolaemic shock, the compensatory mechanisms take over and the body will do everything it can to keep the BP at normal level.Therefore, it is vital that the nurse also observes what the patient looks like, for example, does he look palor, he is sweaty or clammy. These are all important factors when carry out clinical observations. When a patient undergoes surgery he has enforced reduced mobility. Mr Braun will be in bed for a while and due to these factors is therefore at risk of Deep Vein Thrombosis (DVT), which is one of the highest cause of PE leading to hospital deaths. The nurse should check whether he still has his TED stockings on and check that they are not rolled down or creased as this may prevent them from achieving good prophylaxis.Furthermore it could compromise his skin integrity. Mr Braun will probably also be prescribed oral or subcutaneous anticoagulants as a furth er prevention of DVT. Mr Braun’s Hb levels should be checked to ensure that his anaemia is improving. If Mr Braun was assessed in PAC as having met the criteria, which is expected to make a good recovery, for the ERP, his anaemia would have been dealt with prior to him being admitted. He would have been assessed for any co-morbidities and his GP would have been involved to treat his anaemia.If his anaemia had not been treated, prior to his admission, it is likely that Mr Braun would have undergone a blood transfusion during surgery. This would mean that he would have a cannula in situ which would need to be assessed to check for phlebitis. This would need to be documented on the VIP chart (Hargan 2012). The cannula needs to be checked to ascertain whether it is patent. The date of insertion should also be noted on the VIP chart as it is not allowed to stay in for longer than 72 hours. Mr Braun will also have a catheter in situ. Therefore it is important to check for urine out put.Mr Braun should have a urine output of 0. 5ml/kg/hr, in other words half his body weight per hour. Therefore if Mr Braun weighs 80kg, he should have a urine output of 40mls per hour. If going through the traditional method, Mr Braun would have to have a low residue diet approx. 2 days prior to the operation. He would only be allowed clear fluids approximately 12-18 hours before surgery and would then be starved from the midnight before the day of surgery to prevent aspiration. Research has shown that prolonged starvation causes dehydration and electrolyte imbalance.It causes the body to experience insulin resistance for longer and cause the body more stress (Burch & Slater 2012). In contrast, he would have been given carbohydrate loading prior to surgery in the form of iso-osmolarity which 90% passes through the stomach within 90 minutes therefore he would have been able to have it one and a half hours prior to surgery. This would cause less insulin resistance and put his body t hrough less stress. He would be able to come off any IV fluids as he would be encourage to eat and drink at will post operatively.

Thursday, January 9, 2020

Essay about Economic Conditions - 860 Words

To analyze an economy, certain statistics can be used to predict the economy’s future. This is important because it helps prepare people for prosperity or hard times. Certain indicators can be used to determine the future of aggregate demand and others can be used to determine aggregate supply. Using eight aggregate demand indicators and four aggregate supply indicators we developed a prediction for the economy in the near future. Changes in aggregate demand are reflected in changes of GDP. To find valuable indicators of the future aggregate demand is to find statistics that tell about change in the components of GDP (C+I+G+Nx). Aggregate supply is influenced by the costs of production to producers and the advent of new or better factors†¦show more content†¦In general, they are a good indicator of the economy and public sentiment for it. If people are confident in an economy, they will invest more in stocks, but if they are wary of an economies future, they are more likely to save their money. Stock prices have been falling after a year of record gains, indicating that the period of economic growth is either slowing or coming to an end. The Industrial Production Index is a good indicator of the I in GDP. This index will reflect growth for producers, whether they are making profits, and if new jobs are being created. After several years of steady increase, Industrial Production is down, hinting that a ggregate demand may soon be too. Unemployment is another indicator of aggregate demand. If unemployment is low, many people have jobs, and they will probably be spending, adding to GDP. Unemployment has been at a record low, but recent layoffs in the auto industry as well as other have driven that number up to 4.2 from 4.0. This is still a low figure, but if it continues to rise, that may impact GDP greatly. Disposable personal income reflects how much money people have to spend. Obviously, the more money someone has the more likely that person is to spend it. After many quarters of positive figures for real disposable personal income, those numbers have been dropping, even registering as negative in the last few months. Less income will mean less spending, a lower GDP, and aShow MoreRelatedCurrent Uk Economic Conditions1160 Words   |  5 PagesOrganization for Economic Cooperation and Development (OECD). United Kingdom is a well developed country. It has a rich economy brought up by economies of its individual countries England, Scotland, Wales and Northern Ireland. Landon which is the capital of UK and England is the most important financial center for international business and commerce. UK is one of the most important globalised countries of the world. GDP GDP, or Gross domestic product is a measure of a country s economic activity, namelyRead MoreEconomic, Monetary And Financial Conditions1955 Words   |  8 PagesEconomic, Monetary and Financial Conditions China An efficient economy is an economy where resources are allocated to serve every citizen in the best way so that there will be minimal waste and inefficiency within the economy. China is the short name for the country, but the real name is People’s Republic of China. China happens to be one of the economies that falls under an efficient economy because it has continued to improve other the past decades. â€Å"Over the past five years, economic freedomRead MoreThe Historical Conditions For Economic Development1627 Words   |  7 PagesQuestion A In the historical conditions for economic development, the change in development of countries has lead to enormous transformations of both political and social state. Why did China refuse between the year 1400 and 1980 only to re-build a major presence in the world economy? Why did Europe, an area separated by suffering and strife after the downfall of the Roman Empire, become the existence of modern economic growth? As experts on these two regions of the world, we make particular differencesRead MoreAssignment on Economic Condition of Bangladesh3697 Words   |  15 PagesASIAN UNIVERSITY OF BANGLADESH An Assignment On â€Å"Economic condition of Bangladesh† Course Title: Microeconomics Course code: BBA 1204 Submitted to Dr. Shamsul Islam Latifi Associate profesor, Dept. of Economics Asian University of Bangladesh Submitted By Md. Hasan Khan ID: 200920863 Batch: 36th Date of Submission 5th September, 2013 Letter of Transmittal Dr. Shamsul Islam Latifi Associate professor, Dept. of Economics Asian University of Bangladesh. Sub: Letter of Transmittal. DearRead MoreThe Impact Of Economic Condition Of A Business Organization1433 Words   |  6 Pagesinfluenced by the formation of economy. Economics is the fact that can establish or demolish a business. Changes of economic condition of a business organization are the main following factor. The increase of economic condition is the sign of business success. On the other hand a business organization can identify its failure by seeing the decrease of economic condition. Economics for business is related with the issues and problems regarding the economic strategies. The structure of an organizationRead MoreEconomic And Social Conditions On The Health Of People And Communities Essay1544 Words   |  7 Pagespoorer countries live shorter lives and this is directly related to the inequality. Unequally access to the healthcare, food, housing, education. Job that does not come with stress. 2. I think that economic and social conditions effect the health of people and communities. Economic and social conditions are resulted by the amount of money people have, by power, and by available resources and all of these are influenced by the policies. In short, if you are closer to the top of the chart, you are healthierRead MoreAnalysis Of The Fomc On Economic Conditions And Monetary Policy3046 Words   |  13 Pages Report to the FOMC on Economic Conditions and Monetary Policy April 2015 4/30/2015 B7251 - Group 3 Samar Al Sayyed Nicholas Blake-Knox Nisrin Hala Damian Rozo Munoz Raluca Tintoiu Jassen Trenkow (Chair) Mimi Vavilala â€Æ' Table of Contents Part 1: Summary of Current Economic and Financial Conditions 3 Labor Market 4 Inflation/CPI 7 Output/GDP 8 Housing Market 9 Consumer Confidence and Retail Sales 10 Consumer Credit 11 ISM 12 PPI 13 Durable Goods Orders 13 Industrial Production 14 Trade BalanceRead MoreCurrent Economic Conditions Of The United States Economy1963 Words   |  8 PagesCurrent Economic Conditions †¢ As previously stated in the executive summary, the United States’ economy is currently stagnating. From week to week we may see a rise in one indicator while there is a fall in another indicator, but none of the rises or falls are drastic enough to have an overwhelming impact on the economy as a whole. Although the economy is not near as strong as it was before the 2008-2009 recession, arguably one of the biggest economic crises of the past decade, there has beenRead MoreEconomic Conditions Applied For Farmers Bank Trust1392 Words   |  6 Pages ECONOMIC CONDITIONS APPLIED TO FARMERS BANK TRUST Junior Intersession Assignment #1 Kevin Huff SW Graduate School of Banking Class 59 Completion Date Farmers Bank Trust Texarkana, TX TABLE OF CONTENTS TITLE PAGE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...i TABLE OF CONTENTS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ii INTRODUCTION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...1 GLOBAL MACROECONOMIC SNAPSHOT AND FORECAST†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...2 MACROECONOMIC SNAPSHOT AND FORECAST†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. FORECAST†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Read MoreIntroduction And Literature Review : The Decline Of Economic Conditions881 Words   |  4 Pages1. Introduction Literature review The early 2000s recession was a drastic decline in economic conditions, which mainly occurred in the developed countries. From 2001, the Federal Reserve initiated a move to quell the stock market, caused successive inflation in interest rate, thus â€Å"plunging the country into† the worldwide economic recession (Ruddy, 2006). The annual GDP growth rate dropped below 1% along with the significant downturn in U.S. housing and the stock market. From 2002, the economy

Wednesday, January 1, 2020

The Trial Of Rape Cases - 1940 Words

Over the years there has been much controversy on the idea of defendants being kept anonymous during the trial of rape cases. This essay will be discussing the history of rape trials, including the Heilbron report and the Sexual offences (amendments) act 1976, section 4 and 6. There will be recent cases that bring to light different sides of the anonymity debate and will be used in the conclusion of this essay. The idea of anonymity in rape cases began in 1975, when Mrs. Justice Rose Heilbron (the Heilbron Committee) was asked to look into the issue of rape and write a report, creating an overview of the need for anonymity for defendants (Whiston. R, 2011) .The Heilbron Committee felt that fear of publicity by the complainant was getting†¦show more content†¦The Sexual offences act 1976 was put in place to ‘prohibit the publication and broadcasting of a name, and of any other material likely to lead to the identification of, a woman as a complainant in a rape case after a person has been accused of the offence.’ (Adler. Z, 1987) .The sexual offences (amendments) act in 1976 brought anonymity, not only to complainants in section 4 but also defendants in section 6, against the recommendations of the Heilbron Committee. Complainants were given anonymity to persuade any other victims to come forward and they would feel safe in doing so. Furthermore victims would feel safer , knowing that if there was not enough evidence to convict the defendant they will not try to seek revenge on the complainant or repeat the offence, as he would not know who it is. If a name is mentioned in the press it opens up the world of the victim (and also the defendant), reporters delve into their background and personal life, as seen in one specific case in this article. As soon as complainants’ names are mentioned, there life becomes news and they are subjected to