esearch Databases - Nursing
Stroke Disparities
The incidence and mortality rates for stroke differ markedly along racial lines, with African-Americans having a much higher risk of stroke and death from stroke compared to Whites (Howard, 2013). Approximately 40% of this difference can be explained by the variables included within the Framingham Stroke isk Score, while another 10% can be explained by socioeconomic status. Other contributing factors probably include differential health care access and quality. Accordingly, the Surgeon General of the United States (2014) recently issued a statement describing government actions being taken to reduce health disparities and published a list of recommendations for providers. Among these recommendations are focusing on at-risk communities, improving care access and quality, improved provider training, and better evaluations of stroke risk among minorities. For these reasons I have chosen to focus on stroke incidence and mortality in African-Americans.
270 words for each database
Database #1: U.S. Centers for Disease…...
mlaReferences
Howard, V.J. (2013). Reasons underlying racial differences in stroke incidence and mortality. Stroke, 44(6 Suppl. 1), S126-8.
Surgeon General of the United States. (2014). National Prevention Strategy. Elimination of health disparities. Retrieved from http://www.surgeongeneral.gov/initiatives/prevention/strategy/health-disparities.pdf .
The background checks can take months and months, so they're walking around with a card in the meantime & #8230;That's why so many of these airport employees are arrested so long after the fact, and are continuing to be arrested in sweeps by the Justice Department. When the information finally
does come back, they see they've got somebody out there that has a felony and lied on his application, or has a warrant out, or is in the country illegally"
(Sperry, 2003).
Civil ights Issues in Passenger Screening
While the security protocols in relation to typical potential "weapons" in the possession of passengers are fundamentally flawed, federal authorities working with British security services did identify a specific threat in 2006 that precipitated necessary precautions against more than a certain amount of liquid allowed per passenger. Unlike the other senseless concern over nail files and cosmetic scissors, this precaution was justified by virtue of…...
mlaReferences
Dershowitz, a. (2002). Shouting Fire: Civil Liberties in a Turbulent Age. New York:
Little Brown & Co.
Dyer, C., McCoy, R., Rodriguez, J., Van Duyn, D. "Countering Violent Islamic
Extremism" the FBI Law Enforcement Bulletin; Vol. 76 No. 12: 3-9 (2007).
These words, 'necessary and proper,' in such an instrument, are probably to be considered as synonymous. Necessarily, powers must here intend such powers as are suitable and fitted to the object; such as are best and most useful in relation to the end proposed. If this be not so, and if congress could use no means but such as were absolutely indispensable to the existence of a granted power, the government would hardly exist; at least, it would be wholly inadequate to the purposes of its formation. 17 U.S. 316, 324-325.
Furthermore, the Court firmly established the supremacy of the Federal government, by determining that state action could not impede the Federal government's valid exercise of power. The Court determined that:
The constitution, therefore, declares, that the constitution itself, and the laws passed in pursuance of its provisions, shall be the supreme law of the land, and shall control all state…...
mlaWorks Cited
ACSBlog. "Issue Brief: 'A Call to Protect Civilian Justice: Beware the Creep of Military
Tribunals." Separation of Powers. 2008. ACSBlog. 19 Mar. 2008 http://www.acsblog.org/cat-separation-of-powers.html.
Clinton v. Jones, 520 U.S. 681 (1997).
Cole, David. "The Constitution." Harper's Magazine. 2007. The Harper's Magazine
The bottom line on ethical behavior for "civilian" agencies of the Bush Administration is that since September 11, 2001, they can follow what laws they want to, ignore what laws they want to, and even write their own laws that serve their unethical interests. Since the terrorist attacks of 2001, it is clear that Congressional oversight is very much subject to what the executive branch decides is acceptable, not what federal law requires.
orks Cited
Eggan, Dan. "Bush Authorized Domestic Spying." ashington Post 16 Dec. 2005, Retrieved July 30, 2006, at http://www.washingtonpost.com.
Fuchs, Meredith, & Blanton, Thomas. "CIA Claims the Right to Decide hat is News." The National Security Archive, 14 June, 2006. Retrieved July 30 at http://www.gwu.edu/~nsarchiv/news/20060614/index.htm.
Hersh, Seymour M. "National Security Dept. Listening In." New Yorker 82.15 (2006): 24-25.
The National Security Agency. "Organization and Management / Overview." Retrieved July
31, 2006, through The National Security Archive, http://www.gwu.edu/.
The National Security Archive. "About the…...
mlaWorks Cited
Eggan, Dan. "Bush Authorized Domestic Spying." Washington Post 16 Dec. 2005, Retrieved July 30, 2006, at http://www.washingtonpost.com .
Fuchs, Meredith, & Blanton, Thomas. "CIA Claims the Right to Decide What is News." The National Security Archive, 14 June, 2006. Retrieved July 30 at
NSA/FISA
Following the terrorist attacks of September 11, 2001 there has been a significant effort to protect America from any further terrorist attacks. The purpose of this discussion is to examine the U.S. National Security Agency's ability to identify and monitor the communications of terrorists and prevent terrorism from occuring. The research will also investigate how the implications of employing these techniques for foreign intelligence surveillance suggests that the Foreign Intelligence Surveillance Act ("FISA") is inadequate in addressing recent technological developments. These developments include the transition from circuit-based to packet-based communications; the globalization of communications infrastructure; and the development of automated monitoring techniques, including data mining and traffic analysis. The research will also focus on how FISA is challenged by technological developments.
The Monitoring of Communications
The National Security agency was created to "protect U.S. national security systems and to produce foreign signals intelligence information." The strategic plan of the agency is to…...
mlaWorks Cited
Bill to Amend FISA. (2007) The United States Select Committee on Intelligence. Retrieved March 4, 2009 from; http://intelligence.senate.gov/071019/fisa.pdf
Feingold, R. (2008) Remarks of U.S. Senator Russ Feingold
Opposing H.R. 6304, FISA Amendments Act of 2008. Retrieved March 4, 2009 from;
Terrorist is Created:
Terrorist acts are usually motivated by two major reasons i.e. The belief that violence or its threat will be suitable in contributing to change and social and political injustice. Throughout history, many terrorists have stated that they chose violence because they felt they had no alternative after long deliberations. In this case, these terrorists have considered violent acts justify the ends following long deliberations. Notably, there are various factors that contribute to the development and recruitment of terrorists, especially political, religious, economic, and cultural conditions. In most cases, the political and social conditions have been considered as the major factors that result in the creation of a terrorist. Through these conditions, people choose terrorism in attempts to right perceived wrongs in their social or political lives. These individuals resort to violence or its threats when they feel that they have been stripped of their land or denied…...
mlaReferences:
"The NSA Program to Detect and Prevent Terrorist Attacks -- Myth v. Reality." (2006, January
27). Office of Public Affairs. Retrieved from U.S. Department of Justice website: http://www.justice.gov/opa/documents/nsa_myth_v_reality.pdf
Zalman, A. (n.d.). The Causes of Terrorism. Retrieved November 13, 2012, from http://terrorism.about.com/od/causes/a/causes_terror.htm
This essay reviews the relevant literature to provide a background on Edward Snowden and how his high-profile actions adversely affected the work of the National Security Agency (NSA). An analysis of what the NSA was doing prior to the leaks and how it collects intelligence information now is followed by an examination concerning what Snowden leaked and why. Finally, a discussion concerning whether the U.S. government violated Snowden’s constitutional rights is followed by a summary of the research and important findings concerning this issue in the conclusion.
Background of the Issue
Beginning in June 2013, Edward Snowden, a computer analyst working for the National Security Agency began leaking thousands of classified documents. These classified documents were disclosed to the Guardian and alleged that the NSA routinely gathered telephonic metadata from telecommunications companies, allowing them to scrutinize American citizens’ Internet activities (Morrison, 2014). According to Francheschi-Bicchierai (2014), among the thousands of documents that…...
Abdo's (2013) testimony to the American Civil Liberties Union (ACLU) is about the NSA privacy breaches first exposed in depth by Edward Snowden. The speaker accuses the NSA of using intrusive and "in certain respects unlawful" surveillance methods (p. 2). The NSA has also used their surveillance techniques outside as well as inside of the United States. Abdo (2013) speaks directly to the ACLU to outline the scope of the NSA's surveillance program. The overall purpose of the speech is to suggest what role the ACLU can and should play in promoting civil liberties, which is of course the mission of the organization.
Because NSA surveillance is a direct threat to privacy and civil liberties, the subject matter is directly relevant to the core goals of the ACLU. First, the author lists some of the main components of the NSA surveillance program. A few of the components are rooted in legislation…...
mlaReference
Abdo, A. (2013). Testimony to ACLU.
trackedinamerica.org.
Some of the violations of civil and human rights that have resulted for the PA include "aggressive deportations, crackdowns at borders, surveillance of mosques and homes...destroyed livelihoods, splintered families and the loss of a sense of belonging and citizenship," the group asserts on their eb site. Moreover, many peace activists, demonstrators at anti-war rallies, animal-rights groups, student organizations, and critics of the U.S. policy towards Cuba, have been monitored and added to FBI and CIA databases as potential "enemies of America."
ID CHIPS: An article in ABA Journal (Tebo, 2006) points out that employees of some companies are being asked to have ID chips implanted in their arms so their employers "can monitor their movements," Tebo writes. And while the company that is using these ID chips, (www.Cityatcher.com) can rightly say absolute security is pivotal to their customers, many experts, the article continues, "worry that the law is not keeping pace…...
mlaWorks Cited
American Civil Liberties Union. (2006). Federal Court Strikes down NSA Warrantless
Surveillance Program. Retrieved 27 Oct. 2006 at http://www.aclu.org/safefree/nsaspying/26489prs20060817.html .
Berghel, Hal. (2006). Phishing Monger and Posers. Communications of the ACM, 49(4), 21-25.
Eggan, Dan. (2005). Bush Authorized Domestic Spying. Washington Post, Retrieved 27 Oct, 2006, at http://www.washingtonpost.com .
S. mainland. The court can reject the procedures only if it finds the plan for complying with the law as "clearly erroneous." The program may also continue for a year although the law is scheduled for renewal in six months. Warrant-less eavesdropping may begin immediately and ahead of the security court approval of the procedures (Savage).
Spur of the Moment and Secret Order
Weeks after the 9/11 attacks, President ush signed a secret order, which authorized NSA to wiretap international phone calls and emails without a court order (Savage 2007).
It was expressly prohibited by the 1978 warrant law. President ush claimed that war-time powers authorized him to bypass that law. In January this year, the Attorney General said that the program was brought under the supervision of the national security court. A judge allowed some form of surveillance to continue. Several months ago, however, another judge ruled that the order was unlawful.…...
mlaBibliography
Bush, George W. The Protect America Act of 2007. National Security Agency, September 19, 2007. Retrieved on October 23, 2007 at http://www.lifeandliberty.gov/docs/bush-disc-paa07.pdf
Fact Sheet: the Protect America Act of 2007. The White House News: the White House, August 5, 2007. http://www.whitehouse.gov/news/releases/2007/08/20070806-5.html
Cable News Network. Bill Would Require Details of All Eavesdropping Since 2001. CNN Politics. CNN: Time Warner Company, October 9, 2007
Bush: Surveillance Bill Must Not Hamper Fight Against Terrorism. CNN Politics. CNN: Time Warner Company, October 10, 2007
Organized Crime elated Intelligence
Those interested in global intelligence would recognize acronyms like CIA, KGB and MSS however for the sake of those who have no knowledge in this area, they mean Central Intelligence Agency -- United States, KGB (Komitet gosudarstvennoy bezopasnosti) -- Soviet Union/ussia, and the Ministry for State Security (MSS) -- China and their activities are covered well by contemporary media. However, here we consider the less famous and covert intelligence agencies that operate currently or used to exist. A number of these agencies had specific job descriptions while the function of the rest were quite vague, however, all these agencies fulfilled their common responsibility of giving their superiors in-depth knowledge of a situation to aid their decisions (Powell, 2014)
The Frumentarii
The Frumentarii, who bear close similarities to the contemporary "secret police" like the SAVAK of Iran and the Kempeitai who existed in Japan during World War II, served the…...
mlaReferences
Greenberg, M. R., & Haass, R. (1996). Making Intelligence smarter. Council on Foreign Relations.
Juul, P. (2013, july 23). Adapting to the Future of Intelligence Gathering. Retrieved from American Progress: https://www.americanprogress.org/issues/security/reports/2013/07/23/70281/adapting-to-the-future-of-intelligence-gathering/
Nomikos, J. M. (2008). Greek Intelligence Service: A Brief Description. European Journal of Intelligence Studies.
Powell, J. (2014, July 11). A Historical View of Intelligence Gathering: From the Kryptia to the CIA. Retrieved from https://sofrep.com/37879/obscure-intelligence-agents-agencies-part-1/
orks Cited
Blanton, Thomas. (2006, February 4). iretap debate deja vu. National Security Archive.
Retrieved April 22, 2009 at http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB178/index.htm
Congresswoman calls alleged wiretap 'abuse of power' (2009, April 2009). CNN.com
Retrieved April 22, 2009 at http://www.cnn.com/2009/POLITICS/04/21/harman.wiretap/
Lewis, Neil A. & Mark Mazzetti. (2009, April 20). Lawmaker is said to have aided lobbyists.
The New York Times. Retrieved April 22, 2009 at http://www.nytimes.com/2009/04/21/us/politics/21harman.html?_r=1&em
Maclin, Tracey. (2009). iretapping and electronic surveillance. Law Library.
Crime and Justice: Volume 4. Retrieved April 22, 2009 at http://law.jrank.org/pages/2323/iretapping-Eavesdropping.html
iretapping and Eavesdropping -- contemporary legal status. (2009). Law Library.
Crime and Justice: Volume 4. Retrieved April 22, 2009 at http://law.jrank.org/pages/2319/iretapping-Eavesdropping-contemporary-legal-status-wiretapping-eavesdropping.html
iretapping and Eavesdropping - early restrictions on electronic surveillance. Law Library.
Crime and Justice: Volume 4. Retrieved April 22, 2009 at http://law.jrank.org/pages/2318/iretapping-Eavesdropping-Early-restrictions-on-electronic-surveillance.html
iretapping and eavesdropping - The impact of electronic surveillance on personal privacy.
Law Library. Crime and Justice: Volume 4. Retrieved April 22, 2009
A http://law.jrank.org/pages/2317/iretapping-Eavesdropping-impact-electronic-surveillance-on-personal-privacy.html...
mlaWorks Cited
Blanton, Thomas. (2006, February 4). Wiretap debate deja vu. National Security Archive.
Retrieved April 22, 2009 at
Cyber Terrorism
The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the public could gain access of huge amount of data from anywhere in the world. The following list tells us how Internet can be used to spread evil, and assist terrorist organizations to apply more danger and fear to the world. According to Weimann (2004), the Internet has:
- easily approachable
- no single controller or regulator to control or censor information
- the makings for widespread spectators all round the globe
- the power for the user to remain anonymous
- quick access to information
-…...
mlaReferences
Army, U. (2005). Cyber Operations and Cyber Terrorism. In U. Army, U.S. Army Training Doctrine Command, Handbook No. 1.02
Bridis, T. (2005, May 26). USA Today. Retrieved September 14, 2011, from "Silent Horizon" war games wrap up for The CIA:
http://www.usatoday.com/tech/news/techpolicy/2005-05-26-cia-wargames_x.htm
Coleman, K. (2003, October 10 ). Cyber Terrorism. Retrieved September 14, 2011, from Cyber Terrorism Article: http://www.directionsmag.com/article.php?article_id=432&trv=1
component graded.
The amassing of data has become an integral process of life in the 21st century (Nunan and Di Domenico, 2013, p. 2). This fact is partially reflected by the fact that in contemporary times, people are generating much more data than they previously did. Every time someone goes shopping and makes a purchase with a credit card, receives a call or sends a text message, or visits a web site on a computer or downloads information to a mobile phone application, they are generating data. This data is stored and, through sophisticated processes of analytics that involve data mining and even predictive capabilities, is analyzed to determine aspects of consumer, individual, and collective behavior. The generation of these massive quantities of data in the myriad forms such data takes at the rapidity of real-time access is known as big data, which government representatives claim they are analyzing to…...
mlaReferences
Byman, D., Wittes, B. (2014). Reforming the NSA. Foreign Affairs. 93(3), 127-138.
This source considers a number of possibilities for reforming the NSA which are viable in the wake of Snowden's security breach. It examines other country's approaches to espionage as well. In provides an in-depth read into the considerations the NSA must make for securing the country
Hackett, K. (2013). Edward Snowden: the new brand of whistle blower. Quill. 101(5), 26-31. This source examines the ramifications of the actions of whistle blowers, and attempts to deconstruct the privacy issues associated with security concerns in the U.S. It details the actions of Snowden.
Nuna, D., Di Domenica, M. (2013). Market research and the ethics of big data. International Journal of Market Research. 55(4), 2-13. This source considers the practice of amassing and analyzing big data largely from a marketing research perspective. It details the wide scope of data that is regularly stored and scrutinized regarding the lives of citizens.
FISA's recent rise to fame has been due to attempts by the Bush Administration to apply the law as justification for warrant-less wiretaps of U.S. citizens in apparent disregard of their Fourth Amendment protections. This issue will be examined in more detail below, however, it is important to first discuss some of the key court cases that help establish the Constitutionality of FISA. Specifically, this report will address three cases that directly feed into the Constitutional requirements of FISA: Olmstead v. U.S. (1928), Katz v. U.S. (1967), and U.S. v. U.S. (1972).
Olmstead v. U.S. (1928)
For the civil libertarian, the case of Olmstead v. U.S. (1928) is a nightmare violation of constitutionally guaranteed Fourth and Fifth Amendment rights. In the case, oy Olmstead was convicted of bootlegging during the Prohibition years of U.S. history. Without obtaining any kind of judicial approval, federal agents placed wiretaps in the building Olmstead kept…...
mlaReferences
Fein, B. (2007, March). Presidential authority to gather foreign intelligence. Presidential Studies Quarterly, 37(1), pp. 23-36.
Katz v. United States. (1967). FindLaw for Legal Professionals. Retrieved March 25, 2008, at http://laws.findlaw.com/us/389/347.html
Malooly, D.J. (1998, Winter). Physical searches under FISA: a constitutional analysis. American Criminal Law Review, 35(2), pp. 411-424.
Olmstead v. United States (1928). The Oyez Project. Retrieved March 25, 2008, at http://www.oyez.org/cases/1901-1939/1927/1927_493/
Business communication plays a significant role in day to day activities, because nearly every transaction a person engages in is a form of business. At work, business communication is more than just talking with the boss about important matters. It's also small interactions between colleagues, how you talk to customers and vendors, and non-verbal communication concerns like posture and facial expression. In an increasingly global society, proper business communication is becoming more significant. You can find information on this issue in business journals. The website ACBJ.com provides you with access to a large number of business journals from a wide variety....
The five distributive bargaining methods (recognize the situation, set a reservation price, use bracketing, use common social norms, and learn the role of framing) can be found here: http://www.prenhall.com/behindthebook/0131868667/pdf/CarrellCh03final.pdf To buy a house, you would use these to first realize that a house purchase is something that is generally open to negotiation. Very few people who sell their homes aren't willing to negotiate the price or other terms. Before you make an offer, determine a price you're willing to pay - and one you will not go above, even by a penny. Then, start with a price (offer) below that amount.....
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now