Premium Essay

Human Protection

In:

Submitted By JGreen48
Words 2629
Pages 11
HIV/AIDS in the United States
Jamie Green
Grand Canyon University: NRS-427V
April 06, 2014

HIV/AIDS in the United States
Scientists identified simian immunodeficiency virus, in chimpanzees in West Africa, as the source of the mutated human virus through contact with the chimpanzee’s infected blood (U.S. Centers for Disease Control and Prevention, 2014). Human immunodeficiency virus (HIV-1) is a preventable, transmissible infection first reported in the United States (U.S.) in 1981. More than 30 years later, HIV infection continues to spread in epidemic proportion discernable by reported demographic information. The community health nurse (CHN) performs many rolls to support demographical information collection, epidemiologic research, addressing determinates of health, providing preventive services, building and collaborating with community resources while effecting change to increase the well-being of communities across the nation.
Description of Communicable Disease
Dr. Robert Gallo (U.S.) is credited with discovering the retrovirus believed to be the cause HIV/AIDS. Simultaneous research in France, by Dr. Luc Montagnier and Professor Francoise Barre-Sinousi, substantiated Dr. Gallo’s discovery. The retrovirus invades cells of the body’s immune system, incapacitating the immune response over time, eventually leaving the body defenseless against opportunistic infections (OIs). HIV is suppressible but not curable. Medications can slow viral activity for decades but, eventually, viral activity overcomes and acquired immunodeficiency syndrome (AIDS) ensues.
Cause
The HTLV-III retrovirus (a “slow” lentivirus in the Retroviridae family), now referred to as HIV-1 strain, is the causative agent for HIV/AIDS in the U.S. The retrovirus attaches to CD4 cells, invades the cell, replicates and ultimately renders the cell ineffective to signal other immune

Similar Documents

Free Essay

Human Participants Protection

...Protection of Human Participants Sheema Reji Grand Canyon University NRS-433V Introduction to Nursing Research May 19, 2014 (O103) Ms. Angie Lawson June 12, 2014 Protection of Human Participants CRITICAL APPRAISAL GUIDELINES: QUANTITATIVE STUDY Protection of Human Participants There are many forms of benefits and risks that the author had addressed pertaining to the protection of human participants. One method of studying diseases was by infecting individuals with the same disease causing pathogen to check to see the outcome. This is very dangerous to the humans because many of the times the outcome can result in death. This method was used in the time periods from 1940-1970’s. In many cases, prisoners were the individual who were used for these studies. In more recent time periods there are many laws and government related rules that prohibit certain forms of tests on humans. The author did not mention many technology related advances in the protection of human participants concerning things such as gear. The advancement and uses of certain types of gear make it safer and be cautious about the health of the participant. The individuals that are a part of the study were not always chosen by their own will especially during the early stages of studies. In later stages participants chose whether or not they would like to get involve with the tests. Data Collection The independent and dependent variables are identified in the experiments. The independent variable describes...

Words: 755 - Pages: 4

Premium Essay

'Liberalism Is Closely Associated with the Protection of Human Rights and the Promotion of Constitutional Reform' Discuss (30)

...Liberalism refers to the political school of thought which revolves around enabling individuals whilst also protecting them in order to preserve their freedom and liberty. A positive view of human nature underpins the liberal belief that all people are rational and considerate and are able to decide which types of political organisations etc. can best protect individual needs and promote individualism. Liberalism aims to facilitate a political culture which is both tolerant and pluralistic. The pillars on which liberalism was built on suggest that the protection of human rights as well as the promotion of constitutional reform is both intrinsic in liberal aims and ideology. Liberals championed the idea of constitutional reform links to Constitutionalism which refers to the practice of limited government brought about by the existence of a constitution that aims to protect individuals from the threat of tyrannical government. It aims to protect liberty through the establishment of internal and external checks on government power. Liberals place great weight on constitutionalism and it could be argued to be one of the pillars of the whole political ideology, upon which all other fundamental tenets such as toleration, pluralism and justice, lie. Without constitutionalism, it would be difficult to guarantee these other doctrines. The Government within the UK exercises great power which results in the constant threat of tyranny, which liberalism as a political concept is aware of...

Words: 1028 - Pages: 5

Premium Essay

Papa

...progress deeper into the era of information technology these ethics become a more prevalent part of our daily lives. From education and banking to medical and motor vehicles, information technology has now become as much of a constant in human life as ever. It’s because of this rapid growth and integral involvement in every aspect of how we as humans choose to live that we must take into consideration the intentions of how we ethically or unethically choose to use the technology that continues to develop before our eyes. Privacy Privacy as it pertains to information technology is very relevant and important in today’s society. With inventions like “The Cloud”, Email, and online banking it is very easy for people to have their privacy violated. I have had an old Facebook account get hacked into and various emails were sent out to people on my friend’s list. Whoever hacked into my account obviously had access to my private messages, they could see my entire friends list, and even make posts and send messages as if they were me. This was a clear violation of my privacy. As social media sites and other web based functions are used by young adults and children, their online protection has come into question. The Children’s Online Privacy Protection Act is an example of particular steps being taken to protect the privacy of children online. Accessibility Who can gain access to our information online is another growing concern. How do we determine where to draw the line between allowing...

Words: 651 - Pages: 3

Free Essay

Cis 502 Critical Infrastructure Protection

...CIS 502 Critical Infrastructure Protection Click Link Below To Buy: http://hwaid.com/shop/cis-502-critical-infrastructure-protection/ Due Week 6 and worth 50 points Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure. The following documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment. Write a three to five (3-5) page paper in which you: 1. Examine the Department of Homeland Security’s : a. mission b. operations c. responsibilities 2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. 3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure. 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion. 6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times...

Words: 1288 - Pages: 6

Free Essay

Marine Project Paper

...slightest interference can cause a dysfunctional ecosystem. To ensure that human interference does not cause damage to the ecosystem certain areas are protected by different laws and regulations. These protections are known as Marine Protected Areas or MPA’s and apply to certain areas to ensure that things can be changed to protect the marine life and the area that is being affected. The human impact on coastal zones can be severe and is what leads to the enactment of MPA’s. An understanding will be developed of what are Marine Protected Areas, how humans interfere with coastal zones, and how Marine Protected Areas can limit the human interference especially in the Atlantic Ocean. This knowledge will develop the information needed to prevent human problems in the Atlantic Ocean and to continue to further enhance all Marine Protected Areas. Importantly, understanding the difference between what MPA’s are and are not is critical. Marine Protected Areas are not exactly as their name states they are somewhat different. The range of the Marine Protected Areas goes from very strict restrictions to recreational restrictions that can vary in all aspects. “In reality, ‘marine protected area’ is a term that encompasses a variety of conservation and management methods in the United States.” (National Marine Protected Areas Center 2013). The legislation on an area can include full restriction to the area from all human contact or can be limited restriction based on the activity, such as scuba...

Words: 1012 - Pages: 5

Free Essay

Bsa375

...2014 ARCHITECTURE DESIGN According to Joseph S. Valacich, (2012) the four basic parts of information systems software consists of four parts: presentation logic, data access logic, application logic and data. The basic components for hardware is servers, networking, and client computers. The primary objective of an architecture design is the description of how information systems hardware components and software work together. For Riordan Manufacturing Human Resources the recommended architecture is to switch to a cloud based solution. This would be an upgrade from Riordan’s current architecture. The cloud based solution will meet the functional and non-functional requirements and project constraints. SECURITY CONTROLS System security is necessary to protect information systems against threats from hackers, weather, and power outages. Security protects systems against interruption and data loss. The four parts of security controls are data protection, authentication, encryption, and authorization. Data protection consists of data loss recovery and encryption. Authorization allows users to interact with a certain resource. Authentication validates the identity of all users. Since Riordan’s HR system will be a cloud based solution there is some cause for concern. Cloud based solutions are managed by third party vendors which means that none of the data will be stored on site which will require data encryption. Riordan should also take extra step to properly educate and...

Words: 370 - Pages: 2

Premium Essay

Unit 7. Lab 1. New Building – Safety Plan

...Unit 7. Lab 1. New Building – Safety Plan Making safety a priority may be as simple as sending a letter to all employees outlining your plans to make safety as important as quality. Your employees should believe just as strongly as you do in safety. Hire the safest employees, starting in the interview process. Get a sense of how prospective employees feel about a total commitment to safely. Have they worked in other organizations where safety is a top priority? Always make the prospect aware of the physical demands the job entails. Review your workers compensation losses and ask your insurance carrier for a list of all of your workers compensation claims for the past 6 years. Look for trends, note the type of injury, the job the employee was performing when hurt, the name of the employee and the equipment or tools being used . Focus on the common causes that are responsible for the greatest number of you claims. Get all employees involved in the safety effort. Solicit employee suggestions on what they think can be done to prevent accidents and take action on these suggestions. Many businesses have regulations imposed on them by state and federal agencies. Your state’s insurance department or labor department may have employer requirements related to workers compensation and the provision of medical services OSHA has several volumes of rules and regulations that may affect your business. You should contact your trade association, chamber of commerce or state business and industry...

Words: 1431 - Pages: 6

Free Essay

Risk Managmeent

...include training, procedures, etc. With EPLAN, the main pieces for a disaster program would be around data. This company data is its key. This does not just contain customer data, but each individual’s data and their work needs to be backed up. Also they will need a plan for backing up all human resources filing and information, billing and finance and marketing data. First steps would be for the team to assemble a list of what are some of the hazards and assess the risks of losing this data. Second they would need to conduct an impact analysis plan to see if this will hurt the business. Third examine ways to prevent hazards from happening. With a company such as EPLAN, the team would evaluate all data and where the data is housed. Some servers are currently overseas but most data is stored in the office of Farmington Hills, MI. The server room is not protected by any Fire protection walls. The company data for employees are on their computers and are currently not being backed up onto the server as most of the employees work from home. The only employees that are backed up on the server are out of the Farmington Hills office. This office is where the Finance and human resource departments are located. So all of the electronic documentation is housed on the in house server but there currently they do not have a data warehouse to back up this data. All marketing data is housed on the marketing manager’s computer with no back up. This position works...

Words: 2318 - Pages: 10

Premium Essay

Assignment 1 Ethical Issues in Information

...will illustrate what I know firsthand. I’ll identify some human and technological protective measures I would use as security safeguards and enforcement actions in order to address the Privacy issue, list some problems related to management information systems that may arise from this issue, and propose at least one solution to address the problem in question. Privacy is the right of individuals to retain certain information about them without disclosure and to have any information collected about them with their consent protected against unauthorized access. In the workplace unfortunately, what we consider private could potentially be the reason for our employment or even our termination. Employers have monitoring systems that can measure performance and determine time spent at desk, and organizations, institutions, and firms can gather personal information and enter it into databases for their personal gain. One protective measure to safeguard my privacy would be to use a “private browsing mode”. That limits the web history kept on the computer, which will prevent others from accessing history data. Another measure would be to use cryptography to hide the content of communications while they stream between the user and the person receiving the communication. There is also software that can used to protect instant messages or chat applications (ChatSecure for example). At the workplace, the simplest human act of safeguarding information is to lock the computer every...

Words: 522 - Pages: 3

Premium Essay

Laser Safety

...There's no guaranty that the setup won't change because of another's mistakes or an equipment problem. In addition, the beam can be accidentally deflected for a number of reasons. Sometimes an accident is caused by simple human error. For example, an invisible infrared laser may appear to be off when it isn't. This may cause someone to look directly into the beam. Complacency Experience by itself doesn't guaranty your safety. Safety requires constant vigilance every day. In addition to the desensitization effect discussed above, some experienced workers may judge they have the skill to take shortcuts that violate safety protocol. Success at pulling this off encourages them to repeat this violation until their luck runs out. Sometimes a serious accident happens during the first attempt. Accidents aren't the exclusive province of inexperienced workers. - Mistakes Related to Laser Safety Glasses - Not Wearing Laser Safety...

Words: 907 - Pages: 4

Free Essay

Pheobe and Jane in Catcher in the Rye

...The Catcher in the Rye: A Struggle to Preserve Innocence Adolescence is a crossroads for many, there is the natural gravitation toward adulthood as that is the next logical step in life, or for others, like Holden Caufield, it is means never growing up. William Faulkner once said ‘The only thing worth writing about is the human heart in conflict with itself.’ This applies to Holden at his core. He is a teenager struggling to balance his need for preserving childhood innocence and his desire to become an adult. In contrast to all adults whom Holden sees as riddled with flaws and phoniness, he sees children as pure, gentle, innocent, and perfect – frozen in time. His need to become the protector of the innocent or the “catcher in the rye” is deeply rooted in the traumatic loss of his younger brother Allie, along with his own fears of changing and growing up. This is what drives him to protect Phoebe and Jane as he might feel that if he can protect two people he loves from the thing he fears most, he can also protect himself. Holden was traumatized by the death of his brother Allie, sensitizing him to the reality of unjust death and suffering. His family’s impersonal approach to Holden’s expression of grief may have been an important contributing factor in the way he deals with figures of threatened innocence. Jane’s interactions with Holden occur a summer apart from the death of his brother. Holden states that ‘She was the only one, outside [his] Kanal2 family, that [he]...

Words: 982 - Pages: 4

Premium Essay

Science 110 First Assignment

...LAB RESEARCH 1 PROCEDURES IN PHYSICAL SCIENCE EBONI G JOE 5/4/14 SCI 110 PROFESSOR A 1) Astronomy is the branch of science that deals with celestial objects, space and the physical universe in whole. Three specific challenges to making direct measurements in the fields of astronomy are: How to calculate how far away the stars are from the earth? How hot does the sun get? And how could we tell that there is life on Mars? The way that scientist have utilized indirect forms of measure to overcome these challenges are. To measure how far the stars are away from earth astronomers measures the distances to the close –by object. Then use the measurements observations to measure the other distance in the galaxies. This is a difficult because scientist cannot really make the correct measurements, its’ just a guess. Scientist can make direct measurements by using the Parallax to determine the distance of the stars, which can also guess the position of the plants. For the measurement of how hot the sun can get NASA scientists have not been able to get close enough to the sun to actually determine how hot the sun is. Scientist estimate the temperature of the sun by how much radiation that comes from the ball of gas, the gamma-rays and also the X-rays from the sun are measured to be very hot according to www.imagine.gsfc.nasa.gov. The scientist uses a formula to measure the volume, density of the sun and the radius helps determine how hot the sun maybe. Scientist cannot get close...

Words: 1023 - Pages: 5

Free Essay

1. Explain Whether or Not the Fact That Gabby’s Surname Is Rally Gives Her the Right to Use It Any Way She Wishes.

...or not it matters that Rally is associated with pizza.Tradename protection extends to zone of reputation, zone of expansion, and zone of marketing in addition to being the first in the area. Because Rally is associated with Pizza andwith Motors, it is not as much of a conflict as it would have been if Gabby had a used car dealership and decided to call it Rally¶s Used Cars. According to Robert Wayne Olson Jr¶sexample, ³The Rose Cafe (a restaurant) does not conflict with The Rose Law Firm (legalservices), nor does either conflict with Rose Story Farm (a nursery). However, if Violet Rosewants to open the Violet Rose Bistro, that name could be sufficiently confusing to bar its use inthe same area as The Rose Café.´ In my opinion it is not distinct and therefore can beconsidered as confusing. In order to be protected under tradename laws, the business owner must not have a confusingly similar name to a company that was registered in the same 4 Running head: RALLY ROUND THE TRADE NAME geographic area first. Rally is associated with pizza as well as with motors and as a result in thevideo, many consumers were confused and were calling the car dealership and placing orders for pizza.3. E xplain how important the fact is that Herman started to use the name Rally first in that particular geographical area.The fact that Herman began using the name 40 years ago protects him under common law,trade name protection by registration and he used the name first in the area. Under each...

Words: 549 - Pages: 3

Premium Essay

Safety Inspection

...month I s tasked to inspect all the companies safety equipment and personal protective equipment. My inspection was broke down into three categories, availability, serviceability and whether it was within calibration standards. During the availability portion I was to find out how easy it was to get if needed, and if there was enough available according to how many personnel used it. Having enough PPE was the biggest issue that I found. Safety glasses, hard hats and leather gloves were items that I found not every person had. We did have adequate amounts of disposable earplugs. I had my supply order the shortages and ordered earmuffs that attach to the hard hats, so everybody had them. We have several generators at our company; hearing protection is a high priority. Serviceability was next on my agenda. There is a lot of equipment in my company that is getting old and out dated. This equipment is very expensive, so I needed to justify major purchases. I did not find much that was not functional. I was able to get little tools purchased, and put an order in for more updated equipment. We are very reactive, not proactive. When things break they are purchased, if they’re not broke we won’t fix them. Lastly I had to check to see if the equipment has been properly tested within the allotted time frame. This area had been neglected, and I found numerous deficiencies. I found test equipment that was out of date with calibrations and PPE that was out of its window for inspection...

Words: 421 - Pages: 2

Free Essay

Ethics

...Security measures are the different procedures taken by an organization to secure their networks against threats that internally exist within the organization as well as externally. As for Dar Al-Hekma college different security measures are taken. The first and foremost action taken by Dar Al –Hekma college in order to secure their network against threats is by having both software firewall as well as hardware firewall in one device called cyberoam as well as MacAfee anti-virus . A firewall is a system designed to prevent unauthorized access to or from a private network.It is located at a network gateway server. A firewall plays an important role on any network as it provides a protective barrier against most forms of attack. It controls the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set by the organization using. There are two types of firewall: * Software Firewall: Is a software program installed in any computer in order to protect it. Software firewalls is best suited for protecting computers from Trojan programs, e-mail worms, or spams. It prevents any unauthorized access. An example of software firewall includes Zone Alarm, Sygate, Kerio. An illustration is shown below: * Hardware firewall: Is a device which connects your computer or network in order to protect them from unauthorized access. An example of hardware firewalls includes Linksys...

Words: 741 - Pages: 3