Free Essay

Tcp-1 Annotated Bibliography

In:

Submitted By herreracain79
Words 1367
Pages 6
Thesis Statement and Annotated Bibliography

Thesis Statement: Studies indicate that occurrences of adult and pediatric cancer in the United States are on the rise and are caused by increased parental and prenatal environmental exposures and both adults and children whose lifestyles lack a healthy diet and physical activity.

Annotated Bibliography

American Cancer Society (2014) Diet and Physical Activity: What’s the cancer connection? Retrieved from: http://www.cancer.org/cancer/cancercauses/dietandphysicalactivity/diet-and-physical-activity
The American Cancer Society has been a leading organization in cancer prevention and awareness for over a century. They contribute to the fight against cancer in a variety of ways to include advocating and creating laws to prevent and treat cancer, investing in cancer fighting research, and helping those who are diagnosed with cancer cope and treat their illness. The information in this article states that there is indeed a link between cancer and poor diet and physical inactivity. The article provides several interventions and mitigating strategies an individual can take to manage risk of cancer due to a lack of exercise and heathy diet. This article is key in validating the second point in the thesis statement as a cause of cancer.

National Cancer Institute (NCI) (2014) Cancer in Children and Adolescence. Retrieved from: http://www.cancer.gov/cancertopics/factsheet/Sites-Types/childhood
NCI is a part of the U.S. Department of Health and Human Services and is the main agency of the Federal Government tasked with the study, research, and training of cancer. This fact sheet confirms that occurrences of pediatric cancer are rising in the U.S. and provides a range of helpful statics to support the thesis. Section three of the fact sheet also discusses the possible causes of cancer in children to include environmental factors which are believed to cause the genetic mutations which lead to cancer. It is referenced by over twenty medical doctors in the oncology field.

T.J. Key (2004) Diet, Nutrition, and the Prevention of Cancer. Public Health Nutrition: 7(1A), 187–200.
Timothy J. Key is the Deputy Director, Professor of Epidemiology at the University of Oxford in the United Kingdom. This publication was done in partnership with the World Health Organization (WHO) and included contributions from the Harvard School of Public Health.
The publication provides research that strongly suggests dietary factors can both reduce and increase the risk of cancer. It is incredibly specific providing evidence linking certain foods to increased risk for certain cancer types. Also included is a table which measures the strength of the supporting evidence and allows the reader to determine if the evidence is convincing, probable, or insufficient. This research is important as it identifies which foods in our diet are unhealthy and should be avoided and provides evidence suggesting that obesity increases risk to certain cancers.

Ghosh, Heck, Cockburn, Su, Jarrett, Ritz (2013) Prenatal Exposure to Traffic-Related Air Pollution and Risk of Early Childhood Cancer. American Journal of Epidemiology 2013;178(8):1233-1239.
The American Journal of Epidemiology leads the Nation in publishing epidemiological research and developments. This study examines the link between cancers in developing fetuses in the womb as a result of environment exposures to the mother during pregnancy. The journal establishes environmental risk factors such as air pollution, pesticides and electromagnetic fields. The study shows that the odds of retinoblastoma increase by nearly ten percent in mothers that were exposed to air pollution. This research is important as it identifies which factors in the environment have been studied and directly supports the first point in the thesis.

Shim, Mlynarek, Wijngaarden (2009) Parental Exposure to Pesticides and Childhood Brain Cancer: U.S. Atlantic Coast Brain Cancer Study. Environmental Health Perspective (EHP); DOI:10.1289/ehp.0800209
EHP is supported by the U.S Department of Health and Human Services and has been a recognized source of research and news relating to environmental health since 1972. This study evaluates the link between occurrences of pediatric brain cancer and parents who had residential or occupational exposure to pesticides. The study establishes pesticide as a viable environmental risk factor and indicates there is indeed a significantly elevated risk astrocytoma in children whose parents were exposed to pesticide. This research provides additional evidence to support the first point in the thesis and strengthens the claim that occupational exposures of both men and women can lead to cancer diagnosis in their children.

World Health Organization (WHO) (2003) Retrieved from: http://www.who.int/mediacentre/news/releases/2003/pr27/en/
WHO is the agency that provides subject matter expertise and leadership on health matters from a global perspective for the United Nations. WHO was formed in 1948. In this article the highlights of the World Cancer Report are discussed and how statistics show the upward trend of cancer occurrences to be on the rise. It provides benchmark data for cancer occurrences worldwide and a variety of strategies and tactics public health agencies can employ to stem the trend. It also identified increased risks that are inherent to the western diet such as intake of refined carbohydrates and animal proteins. This data support the thesis by stating that cancer occurrences are actually rising and that diets in western cultures are of a unique concern.

National Cancer Institute (2012) Obesity and Cancer Risk. Retrieved from: http://www.cancer.gov/cancertopics/factsheet/Risk/obesity
The fact sheet provides definitions and an overview of the differentiation between being underweight, normal, overweight, and obese. The cancers which are liked to obesity are listed and a summary of the cancer and obesity link. The possible mechanisms to explain the connection are also provided. Several links to other related studies are available and the fact sheet is well referenced. Obesity is often linked to lifestyles that lack physical activity and exercise which support the last point in the thesis.

Natural News (2013) Top 10 Most Unhealthy, Cancer Causing Foods. Retrieved from: http://www.naturalnews.com/039970_cancer_junk_food_carcinogens.html# This article summarizes common foods that include known human carcinogens or have been linked to causing rapid tumor growth in animals and the active ingredients responsible. Sodium Nitrate and Sodium Nitrite are discussed as being used as preservatives in processed meats and linked to an increased risk in colon cancer. High-glycemic foods such as refined flower can raise blood sugars which directly feed the growth of free radicals. This article is important as it shows the link cancer has to everyday, common foods and the interactions their unknown ingredients have to the human body. This connection further strengthens the argument made in the second point of the thesis.

U.S Department of Veterans Affairs (n.d.) Diseases Associated with Ionizing Radiation Exposure. Retrieved from: http://www.publichealth.va.gov/exposures/radiation/diseases.asp
This brief, all be it, important article discusses the occupational exposures to radiation linked to cancer and other diseases. It provides proof that the federal government recognizes this connection and provides compensation to veterans who have had such exposures. A list of the know cancers and other diseases which result from ionizing radiation are listed. The Federal Governments acknowledgement of this link by providing compensatory benefits is important to establishing proof there is a link between environmental exposures and cancer. This is an important over theme not only in the thesis but the research paper overall.

U.S. Department of Health and Human Services (2003) Cancer and the Environment: What You Need to Know and What You Can Do. Retrieved From: http://www.niehs.nih.gov/health/materials/cancer_and_the_environment_508.pdf
This article provides comprehensive data on what substances in the environment are known to cause cancer and where they are located. Detail on the scientific approach to identifying these substances, how risk is determined, how standards relating to expectable exposure are created and how public policy is made. Charts which describe how exposure to environmental carcinogens alter the genetic structure of our DNA and create cancer in the body. An analysis on how cancer trends have changed in recent years is also presented. This collection of data is invaluable to any argument on linking environment to cancer and is provided by arguably one of the most credible sources of information available on the topic.

Similar Documents

Premium Essay

Internet Ages

...CHAPTER – 1 INTRODUCTION TO INTERNET WHAT IS A NETWORK? [pic] A network is a group of computers that are able to communicate with one another and share data, files, programs, and operations. The computers in a network are connected via hardware and software. The hardware is what physically connects the computers in the network together. For example: telephone lines, fibre-optic cables, routers and gateways, and the computers themselves. The software is what enables us to use the hardware for communication and exchanging information. Just as your brain tells your body parts how to function and work together, the software governs the way computers in the network communicate with each other and perform functions. Software that enables networking follows a set of rules that are generally referred to as protocol. Networks can be interoperable. This means that different types of computers, using different operating systems, can be connected, communicate with each other, and share information - as long as they follow the network protocols. [pic] In Summary: A network is a group of two or more computers, connected together through a physical infrastructure, that are able to communicate and exchange information because they agree to use software that observes the same set of rules, or protocol. WHAT IS THE INTERNET? • A network of networks • Based on TCP/IP (Transmission Control Protocol/Internet Protocol) • Global • A variety of services and...

Words: 48401 - Pages: 194

Premium Essay

Server 2008 for Dummies

...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...

Words: 139691 - Pages: 559

Premium Essay

Monicah

...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...

Words: 139691 - Pages: 559

Premium Essay

Cyber Security

...2011 Ethical Hacking & Penetration Testing ACC 626: IT Research Paper Emily Chow 20241123 July 1, 2011 I. Introduction Due to the increasing vulnerability to hacking in today’s changing security environment, the protection of an organization’s information security system has become a business imperative . With the access to the Internet by anyone, anywhere and anytime, the Internet’s “ubiquitous presence and global accessibility” can become an organization’s weakness because its security controls can become more easily compromised by internal and external threats. Hence, the purpose of the research paper is to strengthen the awareness of ethical hacking in the Chartered Accountants (CA) profession, also known as penetration testing, by evaluating the effectiveness and efficiency of the information security system. 2 1 II. What is Ethical Hacking/Penetration Testing? Ethical hacking and penetration testing is a preventative measure which consists of a chain of legitimate tools that identify and exploit a company’s security weaknesses . It uses the same or similar techniques of malicious hackers to attack key vulnerabilities in the company’s security system, which then can be mitigated and closed. In other words, penetration testing can be described as not “tapping the door” , but “breaking through the door” . These tests reveal how easy an organization’s security controls can be penetrated, and to obtain access to its confidential and sensitive information asset by hackers...

Words: 11999 - Pages: 48

Free Essay

The University of New South Wales School of Computer Science & Engineering Issues in Physical Xml Database Design

...THE UNIVERSITY OF NEW SOUTH WALES SCHOOL OF COMPUTER SCIENCE & ENGINEERING ISSUES IN PHYSICAL XML DATABASE DESIGN Damien Fisher (3065680) Bachelor of Computer Science (Honours) Supervisor: Dr. Raymond Wong Submission Date: October 29, 2003 Abstract Recent years have seen a surge in the popularity of XML, a markup language for representing semistructured data. Some of this popularity can be attributed to the success that the semi-structured data model has had in environments where the relational data model has been insufficiently expressive. It is thus natural to consider native XML databases, which are designed from the ground up to support XML data. Developing a native XML database introduces many challenges, some of which we consider here. The first major problem is that XML data is ordered, whereas relational databases operate on set-based data. We examine the ordering problem in great detail in this thesis, and show that while it imposes an unavoidable performance penalty on the database, this penalty can be reduced to an acceptable level in practice. We do this by making use of type information, which is often present in XML data, and by improving existing results in the literature. XML data is frequently queried using XPath, a de facto standard query language. The importance of XPath is increasing, due to its use as a primitive in the more powerful emerging query language, XQuery. It is widely believed that the one of the most promising approaches to evaluating...

Words: 38239 - Pages: 153

Premium Essay

Databasse Management

.........................................................................15 Contents of This Edition.........................................................................................................................17 Guidelines for Using This Book.............................................................................................................19 Acknowledgments ..................................................................................................................................21 About the Authors ..................................................................................................................................22 Part 1: Basic Concepts............................................................................................................................23 Chapter 1: Databases and Database Users..........................................................................................23 1.1 Introduction ..............................................................................................................................24 1.2 An Example ..............................................................................................................................25 1.3 Characteristics of the Database Approach...

Words: 229471 - Pages: 918

Premium Essay

Public Speaking Book

...CONTENTS PART 1 • GETTING STARTED 1. Becoming a Public Speaker 2. From A to Z: Overview of a Speech 3. Managing Speech Anxiety 4. Ethical Public Speaking 5. Listeners and Speakers 1 2 8 1 4 23 30 PART 2 • DEVELOPMENT 6. Analyzing the Audience 7. Selecting a Topic and Purpose 8. Developing Supporting Material 9. Locating Supporting Material 10. Doing Effective Internet Research 1 Citing Sources in Your Speech 1. 36 37 49 57 64 73 83 PART 3 • ORGANIZATION 1 Organizing the Speech 2. 1 Selecting an Organizational Pattern 3. 1 Outlining the Speech 4. 92 93 103 1 10 PART 4 • STARTING, FINISHING, AND STYLING 15. Developing the Introduction and Conclusion 16. Using Language 1 22 1 23 1 31 PART 5 • DELIVERY 1 Choosing a Method of Delivery 7. 18. Controlling the Voice 19. Using the Body 1 39 1 40 1 44 1 48 PART 6 • PRESENTATION AIDS 20. Types of Presentation Aids 21. Designing Presentation Aids 22. A Brief Guide to Microsoft PowerPoint 154 155 161 164 PART 7 • TYPES OF SPEECHES 23. Informative Speaking 24. Persuasive Speaking 25. Speaking on Special Occasions 1 74 1 75 188 21 7 PART 8 • THE CLASSROOM AND BEYOND 230 26. Typical Classroom Presentation Formats 27. Science and Mathematics Courses 28. Technical Courses 29. Social Science Courses 30. Arts and Humanities Courses 31. Education Courses 32. Nursing and Allied Health Courses 33. Business Courses and Business Presentations 34. Presenting in Teams 35. Communicating in Groups 231 236 240 243 246 248 25 1 253 258 262 APPENDICES...

Words: 104318 - Pages: 418

Premium Essay

Ggao-09-232g

...AUDIT OFFICIALS, CIOS, AND OTHERS INTERESTED IN FEDERAL AND OTHER GOVERNMENTAL INFORMATION SYSTEM CONTROLS AUDITING AND REPORTING This letter transmits the revised Government Accountability Office (GAO) Federal Information System Controls Audit Manual (FISCAM). The FISCAM presents a methodology for performing information system (IS) control 1 audits of federal and other governmental entities in accordance with professional standards, and was originally issued in January 1999. We have updated the FISCAM for significant changes affecting IS audits. This revised FISCAM reflects consideration of public comments received from professional accounting and auditing organizations, independent public accounting firms, state and local audit organizations, and interested individuals on the FISCAM Exposure Draft issued on July 31, 2008 (GAO-08-1029G). GAO would like to thank the Council of the Inspectors General on Integrity and Efficiency and the state and local auditor community for their significant input into the development of this revised FISCAM. Summary of Major Revisions to FISCAM The revised FISCAM reflects changes in (1) technology used by government entities, (2) audit guidance and control criteria issued by the...

Words: 174530 - Pages: 699

Free Essay

Business Process Management

...Institute for Informatics, Saarbruecken, Germany Richard Hull Jan Mendling Stefan Tai (Eds.) Business Process Management 8th International Conference, BPM 2010 Hoboken, NJ, USA, September 13-16, 2010 Proceedings 13 Volume Editors Richard Hull IBM Research, Thomas J. Watson Research Center 19 Skyline Drive, Hawthorne, NY 10532, USA E-mail: hull@us.ibm.com Jan Mendling Humboldt-Universität zu Berlin, Institut für Wirtschaftsinformatik Unter den Linden 6, 10099 Berlin, Germany E-mail: contact@mendling.com Stefan Tai Karlsruhe Institute of Technology (KIT) Englerstraße 11, Gebäude 11.40, 76131 Karlsruhe, Germany E-mail: stefan.tai@kit.edu Library of Congress Control Number: 2010933361 CR Subject Classification (1998): D.2, F.3, D.3, D.1, D.2.4, F.2 LNCS Sublibrary: SL 3 – Information Systems and Application, incl. Internet/Web and HCI ISSN ISBN-10 ISBN-13 0302-9743 3-642-15617-7 Springer Berlin Heidelberg New York...

Words: 147474 - Pages: 590

Premium Essay

Damsel

...2014-2015 Undergraduate Academic Calendar and Course Catalogue Published June 2014 The information contained within this document was accurate at the time of publication indicated above and is subject to change. Please consult your faculty or the Registrar’s office if you require clarification regarding the contents of this document. Note: Program map information located in the faculty sections of this document are relevant to students beginning their studies in 2014-2015, students commencing their UOIT studies during a different academic year should consult their faculty to ensure they are following the correct program map. i Message from President Tim McTiernan I am delighted to welcome you to the University of Ontario Institute of Technology (UOIT), one of Canada’s most modern and dynamic university communities. We are a university that lives by three words: challenge, innovate and connect. You have chosen a university known for how it helps students meet the challenges of the future. We have created a leading-edge, technology-enriched learning environment. We have invested in state-of-the-art research and teaching facilities. We have developed industry-ready programs that align with the university’s visionary research portfolio. UOIT is known for its innovative approaches to learning. In many cases, our undergraduate and graduate students are working alongside their professors on research projects and gaining valuable hands-on learning, which we believe is integral...

Words: 195394 - Pages: 782

Premium Essay

Mcgraw-Hill - Quality Management Demystified

...QUALITY MANAGEMENT DEMYSTIFIED Demystified Series Advanced Statistics Demystified Algebra Demystified Anatomy Demystified asp.net Demystified Astronomy Demystified Biology Demystified Business Calculus Demystified Business Statistics Demystified C++ Demystified Calculus Demystified Chemistry Demystified College Algebra Demystified Data Structures Demystified Databases Demystified Differential Equations Demystified Digital Electronics Demystified Earth Science Demystified Electricity Demystified Electronics Demystified Environmental Science Demystified Everyday Math Demystified Genetics Demystified Geometry Demystified Home Networking Demystified Investing Demystified Java Demystified JavaScript Demystified Linear Algebra Demystified Macroeconomics Demystified Math Proofs Demystified Math Word Problems Demystified Medical Terminology Demystified Meteorology Demystified Microbiology Demystified OOP Demystified Options Demystified Organic Chemistry Demystified Personal Computing Demystified Pharmacology Demystified Physics Demystified Physiology Demystified Pre-Algebra Demystified Precalculus Demystified Probability Demystified Project Management Demystified Quality Management Demystified Quantum Mechanics Demystified Relativity Demystified Robotics Demystified Six Sigma Demystified sql Demystified Statistics Demystified Trigonometry Demystified uml Demystified Visual Basic 2005 Demystified Visual C# 2005 Demystified xml Demystified QUALITY MANAGEMENT DEMYSTIFIED SID...

Words: 122414 - Pages: 490

Free Essay

Test2

...62118 0/nm 1/n1 2/nm 3/nm 4/nm 5/nm 6/nm 7/nm 8/nm 9/nm 1990s 0th/pt 1st/p 1th/tc 2nd/p 2th/tc 3rd/p 3th/tc 4th/pt 5th/pt 6th/pt 7th/pt 8th/pt 9th/pt 0s/pt a A AA AAA Aachen/M aardvark/SM Aaren/M Aarhus/M Aarika/M Aaron/M AB aback abacus/SM abaft Abagael/M Abagail/M abalone/SM abandoner/M abandon/LGDRS abandonment/SM abase/LGDSR abasement/S abaser/M abashed/UY abashment/MS abash/SDLG abate/DSRLG abated/U abatement/MS abater/M abattoir/SM Abba/M Abbe/M abbé/S abbess/SM Abbey/M abbey/MS Abbie/M Abbi/M Abbot/M abbot/MS Abbott/M abbr abbrev abbreviated/UA abbreviates/A abbreviate/XDSNG abbreviating/A abbreviation/M Abbye/M Abby/M ABC/M Abdel/M abdicate/NGDSX abdication/M abdomen/SM abdominal/YS abduct/DGS abduction/SM abductor/SM Abdul/M ab/DY abeam Abelard/M Abel/M Abelson/M Abe/M Aberdeen/M Abernathy/M aberrant/YS aberrational aberration/SM abet/S abetted abetting abettor/SM Abeu/M abeyance/MS abeyant Abey/M abhorred abhorrence/MS abhorrent/Y abhorrer/M abhorring abhor/S abidance/MS abide/JGSR abider/M abiding/Y Abidjan/M Abie/M Abigael/M Abigail/M Abigale/M Abilene/M ability/IMES abjection/MS abjectness/SM abject/SGPDY abjuration/SM abjuratory abjurer/M abjure/ZGSRD ablate/VGNSDX ablation/M ablative/SY ablaze abler/E ables/E ablest able/U abloom ablution/MS Ab/M ABM/S abnegate/NGSDX abnegation/M Abner/M abnormality/SM abnormal/SY aboard ...

Words: 113589 - Pages: 455