Write My Essay Sample: Mothers’ Incarceration and Its Effects on Their Children’s Education
Posted by: Write My Essay on: November 8, 2018

Sample by My Essay Writer

Mothers’ Incarceration and Its Effects on Their Children’s Education

Arrigo, B. A., & Shipley, S. L. (2004). Introduction to Forensic Psychology (2nd ed.). Amsterdam, Netherlands: Elsevier.

In this book, Arrigo and Shipley show how incarceration can negatively impact on the psychology of children whose mother is incarcerated. On this matter, mother’s incarceration is connected to the child’s poor psychological development since he/she always looks up to the mother for everything imaginable. Arrigo and Shipley’s book on the impact of incarceration suggests that parental incarceration leads to negative mental imprints on the children’s psychological health, developmental health, as well as their education. Thus, they recommend other correctional measures to be imposed on mothers, apart from incarceration. This is because mother’s incarceration directly affects children who are innocent.

In this Saturday, Oct. 7, 2017, photo, inmate Angela Rekoutis holds her daughter Ava during “Kids Day” at the Utah State Prison in Draper, Utah. For mothers behind bars, photos and the rare visit are a lifeline to their children, many of whom face their own struggles while their moms are serving prison time. (Scott Sommerdorf/The Salt Lake Tribune via AP)

Berg, J. (2011). Critical review of literature: Children of incarcerated parents (Master’s Thesis). University of Wisconsin–Stout, Menomonie.

Berg on his Master’s thesis on the impact of incarceration to the children defined several reasons as to why this would affect the child’s performance in school and even lag behind socially. The academic thesis by Berg critically examines other scholarly articles that offers the researcher readily available information on the effects of incarceration of mothers to the children’s behavior and learning. It is an academic paper showing the educational aspect of the child and how it is affected.[“Write my essay for me?” Get help here.]

Chandler, M. A. (2015, November 13). How do parents in prison affect children in school? The Washington Post. Retrieved from

This is an online scholarly article that clearly shows how children in school can be affected by parents in prison. In most cases, the article emphasis on the incarcerated mother and the effects it has to the way the child socializes with others in school and the general performance. The article examines education as a discipline and how it would be impacted by either of the parents being in prison. The article has rich information on the various ways children are negatively affected. It also shows the reasons as to why the children’s education can be affected.

Covington, S. S., & Bloom, B. E. (2003). Gendered justice: Women in the criminal justice system. In B. Bloom (Ed.), Gendered justice: Addressing female offenders (pp. 1-20). Durham, NC: Carolina Academic. Retrieved from

On this academic online journal, Covington and Bloom explores the challenges that female offenders go through in prison. The thought of their children having no one to care for them, leaves them frustrated and wishing they were free once and for all to witness their children’s happiness. The article further asserts that this affects the children’s academic performance, social and spiritual growth.  It further checks on the psychological perspective of the child and the mother when she is incarcerated in prison. [Click Essay Writer to order your essay]


Fejes, K. E  & Miller, D. (2002). Assessing Gender-specific Programming for juvenile Female Offenders: Creating Ownership, Voice, and Growth. Journal of Correctional Education, 53(2), 58-64.

This educational journal by Fejes and Miller (2002) is a perpetual portrayal of how ill incarceration of mothers can be to their children’s learning. Correctional educational, however offered to the mothers in prison, is not enough to help their children who still suffer a lot back at home. They are unable to come into terms with the fact that their parents are in prison; away from them. According to the researchers the children could undergo psychological torture due to the stigma invoked on them by other children who continuously provokes them about their incarcerated mothers/parents.

Feldman, R., Weller, A., Leckman, J. F, Kuint, J., & Eidelman, A. I. (1999). The Nature of the Mother’s Tie to her Infant: Maternal Bonding under Conditions of Proximity, Separation, and Potential Loss. Journal of Child Psychology and Psychiatry, 40(6),

Feldman et al (1999) explore the different psychological problems the child would undergo if it happened that they were separated from each other. According to their explanation, the child and its mother bond well when they are together and this can be inseparable not unless the mother is incarcerated or death occurs. In such a case, the child grows psychologically abnormal where he/she experiences a lot of difficulties in life without the mother.

Glaze, L. E., & Maruschak, L. M. (2008). Parents in Prison and their Minor Children. Washington DC: U.S. Department of Justice. Retrieved from

This is a well researched article that is deeply relevant on the issue of the parents who are incarcerated while their children are suffering out there. Kids below the age of 10 years need their mother close to them on a daily basis.  Although simple as it might seem, this is a vital factor in the child’s mental development and if not well accorded to them, it can leave a damaging impact on the child’s psychology. The children are traumatized when they are taken to visit their parents in the prison to find them crying. On the other hand, the authors assert that this can greatly impact on the performance of the child in school as it is likely to dwindle as a result of this incarceration. In most cases the child will need a counselor in school who will keep the child hopeful of seeing their mother again.

Harris, Y. R., & Graham, J. A. (2010). Children of Incarcerated Parents: Theoretical       Developmental and Clinical issues. D. R. Carpenter et al. (Eds). New York, NY:           Springer

This is a well researched book that covers the psychological perspective of a child who has lost contact with his/her mum trough imprisonment. This book is more than thrilling as it expounds and gives examples of children affected by their parents especially mothers being incarcerated. The books on the other hand, points out on some of the most common conditions under which the child is tormented and psychologically ill. I would use the book to show some of the dire consequences incarceration of a parent could have on a child especially educationally.[Need an essay writing service? Find help here.]

Mumola, C. (2000). Incarcerated Parents and their Children. Washington, D.C: US Department of Justice, Office of Justice Programs, Bureau of Justice Statistics.

This is a legal document that indicates the rights that an incarcerated parent has on their kids even when they are still serving their sentences in jail. These parents still have a say and can contribute to their children’s lives although serving their terms on correctional facilities. On this aspect, the document spells out on the times and span the parent should be allowed to see and talk to their children and other family members. This can affect their children academically and even improve their grades greatly. I would use the article to show the government’s stand on incarcerated parent.

Sparks, S. D. (2015). Parent’s’ Incarceration Takes Toll on Children, Studies Say. Education Week, pp. 1-18.

Sparks writes a very detailed and well researched article on educational effect of incarceration on their children. On this aspect, it is clear that there is a huge impact felt on the child’s education due to the fact that the mother or one of the parent is imprisoned. The performance of the kid could go down since he/she lacks a suitable mentor and a friend. I would use the article to show how the incarceration toll has an effect on the children who are still on with their studies in school.[“Write my essay for me?” Get help here.]


Arrigo, B. A., & Shipley, S. L. (2004). Introduction to forensic psychology (2nd ed.). Amsterdam, Netherlands: Elsevier.

Berg, J. (2011). Critical review of literature: Children of incarcerated parents (Master’s Thesis). University of Wisconsin–Stout, Menomonie.

Chandler, M. A. (2015, November 13). How do parents in prison affect children in school? The Washington Post.

Covington, S. S., & Bloom, B. E. (2003). Gendered justice: Women in the criminal justice system. In B. Bloom (Ed.), Gendered justice: Addressing female offenders (pp. 1-20). Durham, NC: Carolina Academic.

Fejes, K. E., & Miller, D. (2002). Assessing gender-specific programming for juvenile female offenders: Creating ownership, voice, and growth. Journal of Correctional Education, 53(2), 58-64.

Feldman, R., Weller, A., Leckman, J. F, Kuint, J., & Eidelman, A. I. (1999). The nature of the mother’s tie to her infant: Maternal bonding under conditions of proximity, separation, and potential loss. Journal of Child Psychology and Psychiatry, 40(6), 929-939.

Glaze, L. E., & Maruschak, L. M. (2008). Parents in prison and their minor children. Washington DC: U.S. Department of Justice.

Harris, Y. R., & Graham, J. A. (2010). Children of incarcerated parents: Theoretical developmental and clinical issues. D. R. Carpenter et al. (Eds). New York, NY: Springer.

Mumola, C. (2000). Incarcerated parents and their children. Washington, D.C: U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics.

Sparks, S. D. (2015). Parents’ incarceration takes toll on children, studies say. Education Week, pp. 1-18.

Woodard, T., & Copp, J. E. (2016). Maternal incarceration and children’s delinquent involvement: The role of sibling relationships. Children and Youth Services Review, 70, 340-348.


Write My Essay Sample: Personality Tests
Posted by: Write My Essay on: November 7, 2018

Sample by My Essay Writer


Personality tests are also referred to as psychological tests. A psychological test is a measure of an individual’s character based on how he/she answers a set number of questions. In the past, people tried to measure personalities using different methods. There is the Enneagram test which is understood as nine personality traits that are linked together. The Myers-Briggs is another personality test which was first introduced in 1962, Based on Carl Jung’s theory on personality traits, it still remains the most taken by people. Lastly, there is The Big Five test. Researchers analyze how individuals respond to personality questionnaires and come up with a way of summing up a person’s character. These tests can be useful at the workplace. This paper will discuss how each of these three methods captures a person’s personality; it will also describe the criticism of each method.

The Enneagram method of measure divides human personalities into nine behavioral types.  After taking the Enneagram test, the score is as follows:

  • Orderly 26%
  • Helpful 10%
  • Focussed 14%
  • Selfishness 14%
  • Intelligent 30%
  • Security concerns 58%
  • Full of adventure 30%
  • Aggressive 26%
  • Calm 46%

According to the Enneagram test that I took, my main type is 6 which I scored 14 marks which amounts to 58%. [“Write my essay for me?” Get help here.]

According to the research undertaken by Savich (2005) in the field of neuroscience, he explored the Enneagram into detail specifically on the functions of the brain. The research took him to a hypothesis connecting the Enneagram to patterns of asymmetric movements in the brain. People are put in a box for description purposes only, before undertaking the test.

The Myers Briggs is another personality test that I conducted. The results were as follows:

  • Extrovert 6%
  • Intuition 6%
  • Thinking levels 59%
  • Judgement 19%

Savich (2005) agrees that the Myers Briggs test indicator (MBTI) has mistakes. The psychometric test developed on Jung’s theory of the many types of personalities there are globally; you are placed in one on the 16 types of personalities. This is based on some of its categories such as being an introvert or an extrovert (2005). Savich (2005) asserts that one of the main problems with the (MBTI) is that it shows what is known as ”test-retest reliability”. I f you take the test after a month, you have a 50% chance of falling into a different personality category; therefore lacking credibility.

The last personality test that I took is the Big Five and here are the results:

  • Extrovert- 84%
  • Being in agreement with others- 3%
  • Conscientiousness- 62%
  • Neuroticism- 66%
  • Being open- 0%

The big five rankings change over time, Savich (2005) reports that any of the big five factor can’t stand alone as a variable (2005). Birth-order and gender can be connected to traits of being open. Extroversion generally decreases a person ages. There seems to be a connection between cultural factors in certain countries. Savich (2005) concludes by saying that the big five method is based on theory and it cannot accurately point to a specific behavior (2005).[Click Essay Writer to order your essay]

Finally, the outcomes of these personality tests have been found to be unreliable over a period of time. It is of utmost importance to remember that personality tests do have their limitations just like other forms of tests. However, these tests can have a positive response in the workplace while selecting employees. Further research needs to be conducted to show the reliability of the tests. [Need an essay writing service? Find help here.]


Savich, P. (2005) Personality and the brain: A hackers journey through the enneagram and the emerging brain research.,NewYork, NY: Perennial.

Essay Writing Sample: Research Proposal Achieving Energy Sustainability through Solar Power Technology
Posted by: Write My Essay on: November 6, 2018

Sample by My Essay Writer

Achieving Energy Sustainability through Solar Power Technology


In the past decade, there have been serious concerns about the impact of human activities on the environment and whether there is a possibility to adopt better ways of doing things that could create sustainability in the future. It is common knowledge that climate change has been around for some time and has been discussed highly within the political circles, the academia fraternity and in the media for a long time. In most of the instances, these discussions have attempted to project what impact this change may have in the future. However, climate change has already started hitting us hard in various ways. The icebergs on the poles are quickly melting. This has slowly led to the destruction of ecosystems that we ought to protect. It has led to rising sea lvels and acidification of water in the oceans. Pollution has also increased as the earth continues to feel the pressures of globalization and its effects in the future.

Greenhouse gases have led to global warming.  This has brought huge risks not only to our health but also to the health of animals in various ecosystems. It is time to act and develop sustainable solutions that can reverse the whole process and restore the ecosystem. This brings us to the idea of developing sustainable energy sources that are both renewable and easily available in our environment. The research proposal aims at developing a clear and well-articulated project that can be used to develop strategies that can be used to develop solar power as a major source of energy in the coming years. It also borrows the ideas of Elon Musk on why solar power technology is the next being thing in the modern world (Kannan & Vakeesan, 2016).

Research Purpose

Today, many companies in the automobile industry have developed car models that utilize electric energy. This is a move that is seen by many as one that will reduce the amount of fuel that is spent on vehicles in the future. An example is the Tesla Motor Company that uses electronic engines for its wide range of automobiles. These vehicles will in the future demand a lot of energy and solar power technology is seen as the best source of energy. It is preferably better as compared to wind energy which tends to be expensive and may at times not be available due to varying weather patterns within a given region. Elon Musk suggests that improving the technology that is used to make the lithium-ion batteries could be a huge step in understanding how various industries can take advantage of solar energy.[Click Essay Writer to order your essay]

Research Rationale

The debate that arises from the best source of renewable energy to be integrated into the energy sector, one must consider the various characteristics of the currently available energy sources. The study will thereby delve into explaining why solar energy is better than wind energy. Solar energy is available as a free source from the sun. It only requires the setting up of solar panels so as to capture the sun rays and convert this into electricity. On the other hand, wind turbines tend to be expensive and often noisy thus making it difficult to be stationed at numerous places within a given jurisdiction. Some of the major issues to be addressed in the research include the design of solar panels and how solar power technology has evolved over time. Understanding these concepts would offer a reader significant information on the needs that must be implemented in the future so as to reduce climate change.

A concern that needs to be addressed in solar power technology is the length and life of these batteries. Today, many people do not see solar power technology as a sustainable resource since it has low potential and lasts for shorter times. Modern technology needs to be integrated into these batteries since many people would prefer to use other sources of energy such as fuel instead of electric energy.  This has been a concern observed in Tesla Motors that have a small range before they require charging. Adoption of appropriate technology would be the most appropriate route towards making these batteries stronger and offer significant energy for their operation.  [“Write my essay for me?” Get help here.]

So as to integrate solar power energy technology in the modern era, the research also aims at coming up with strategies that can be used to create awareness on the need to move to renewable energy sources. This can be done through involvement of the media in sensitizing the need to use solar energy so as to protect the environment. Innovators must also ensure that only appropriate changes are made in the development and implementation of solar power technology in our modern lives. The research also aims at identifying the clear boundaries that must exist in the developments of solar energy in the future. Integrating solar power energy could also require sufficient goodwill from the government and authorities so as to create a situation that brings about such sustained success.[Need an essay writing service? Find help here.]

If I am successful in undertaking this study, there are several implications that it may have in the future and on the energy sector. Energy needs have been on the rise with each increase in the world population. As a result, power bills have been consistently rising in our homes and in various industries that utilize considerable amounts of energy. The research study will clearly point out on how firms and even homes can cut down on their energy costs through the adoption of solar power technology. Today, billions of dollars are spent paying electricity bills in our homes, organizations, and within the industries (Gillingham et al, 2016). The research tends to propose how these units could develop easy solutions that could be implemented from the societal level up to the national level by the federal and state governments. Doing so could not only reduce the cost of energy, it could also lead to environmental protection. Such protection could lead to sustainability of both the society and the different corporations that are purported to contribute to the highest percentages of pollution. It could also lead to reduction in the rate of global warming that is currently observable across the globe.[Click Essay Writer to order your essay]

Proposed Research Methodology

The proposed research methodology will utilize both primary and secondary sources of data and information.  In the primary sources of data, a number of interviews will be conducted and relevant questionnaires administered with an aim of unearthing current economic trends related to solar energy and solar panels. Mainly, this will focus on analyzing the future of renewable energy, specifically relating to Elon Musk. On the other hand, secondary sources will utilize both scholarly and non-scholarly articles. This proposed research will explore the initial stages of developing the proposed idea, the contemporary situation in the industry as well as the future endeavors and expectations.


Gillingham, K., Hao, D., Wiser, R., Darghouth, N. R., Nemet, G., Barbose, G., & … Changgui,

  1. (2016). Deconstructing Solar Photovoltaic Pricing: The Role of Market Structure, Technology, and Policy. Energy Journal, 37(3), 231-250.

Kannan, N., & Vakeesan, D. (2016). Solar energy for future world: – A review. Renewable &

Sustainable Energy Reviews, 621092-1105.

Write My Essay Sample: Discussion Assignment
Posted by: Write My Essay on: November 5, 2018

Sample by My Essay Writer


Families are now changing, and people are forced to adapt to such changes to face the challenges that come with failure to do the same. Households with both parents working are now facing the challenging of modifying the domestic roles. In many cases, men have maintained their roles as providers but then the pressure is increased on women, who have to engage in their professional jobs and then resume their domestic roles at home. This is likely to place immense pressure on the women and ultimately the family. My pastoral care approach would include improving the communication between Grace and Brandon.

Improving communication would guarantee transparency, in which Grace will share with Brandon on how she finds it difficult to manage both roles. In many disputes, communication is often the determining factor, and that could easily apply in this situation. Poor communication has failed to make Grace share with her husband that she finds it challenging to be a full-time homemaker and full-time worker. However, I do admire Grace for trying to balance these two roles. The fact that she has tried to balance the two roles for some time should make Brandon notice how difficult it has become. My approach would involve counseling these two to propose solutions on how to improve this situation. [“Write my essay for me?” Get help here.]

Relying on spiritual leaders would not be a good idea for such an issue. Most spiritual leaders are known to have a rigid understanding of gender roles. I would expect a spiritual person to advice Grace to quit her job and devote her life towards serving her husband. Such advice would fail to consider the importance of her financial contribution in the house (Piterman, 2008). Should Grace fail to consider communication, then she risks a mental breakdown, and that could affect Brandon and their children. Therefore, Grace and Brandon have to discuss on how to share the domestic roles in the house. One proposal would be they get a house help to reduce the workload in the house.[Need an essay writing service? Find help here.]

Response 1

I would also propose that Grace discusses with her female friends on how they manage to balance their work and house roles. Obviously, she will find other female workers in her place of work. Such inquiries could provide her with insight on how to balance the two. She is likely to find different responses from her female colleagues. She should use her intellectual ability to weigh her options and consider the ones likely to work. For instance, if a colleague tells her that she shares the domestic roles with her husband then she has to consider the fact that Brandon is also a full-time worker. This option could be used before she approaches Brandon on the increased pressure. Therefore, this approach provides Grace with the chance to resolve the issue without involving Brandon by proposing a solution.

Response 2

Also, Grace and Brandon should consider the modern times and find an ideal way to solve such an issue. Finding a house help could be considered ideal since they are likely to increase their household income. Even though this seems to be the best solution, she will need to communicate with Brandon on why they stand to benefit from this arrangement. Even if they were to meet a professional to guide them through this challenge, it would be more convenient to find a professional rather than a religious person. Seeking help from spiritual leaders is likely to provide a solution that fails to comply with the modern times. People should learn to adapt to societal changes, and this now includes women getting active roles in management and even politics. [Click Essay Writer to order your essay]


Piterman, H. (2008). Women in management. The Leadership Challenge, 1-90.

Essay Writing Service Sample: Cyber Security
Posted by: Write My Essay on: October 31, 2018

Sample by My Essay Writer

Cyber Security


The Sony Playstation Network Hack of 2011 that affected 77 million people, the December 2015 hack of Valve’s Steam platform that impacted 34,000 subscribers and the September 2016 Yahoo hack that compromised the personal information of 500 million users show that major corporations, even those with supposedly “impenetrable systems” are not immune to being penetrated by a determined hacker or hacking group. The problem stems from the programming arms race between corporations and hackers with one group constantly looking for flaws in program architecture and the other patching the identified flaws in the system (Ferdinand, 2015). [“Write my essay for me?” Get help here.]

Company databases are valuable since they can contain personal information and credit card numbers which would enable whoever obtains them to accomplish identity theft (Jenab & Moslehpour, 2016). In fact, there is an underground market on the dark web (sites that can only be accessed via TOR browsers) that enable people to buy and sell information that has been obtained by hackers. Companies attempt to safeguard their databases through continuous investment into better systems, more robust programming architectures, elaborate anti-virus programs and other methods of preventing their accumulated data from being stolen by unscrupulous individuals. Unfortunately, there is no such thing as a truly secure system when it is connected to the internet. Programs follow, by their very design, a set of rules when it comes to their implementation within a system. Understanding these rules and knowing their different vulnerabilities based on research and experimentation is the very essence of what hackers do.       Through this paper, the concepts of security by design, present day security measures and the process of vulnerability management will be examined to showcases how each method contributes towards methods of safeguarding data. It is anticipated that this process will reveal that, no matter how advanced the method of database protection, there is always a means of circumventing it.  [Need an essay writing service? Find help here.]

Security by Design

The phrase “security by design” is a blanket terminology used to describe systems that have been developed based on the security needs of a company. In essence, a system is built with the idea of securing it from potential vulnerabilities and attacks and making it potentially “impenetrable” to hackers (El-Hajj, Ben Brahim, Hajj, Safa, & Adaimy, 2016). However, going along the line of thought that there is no such thing as a completely secure system, there are some caveats to the concept of security by design. Not all companies have the resources to fund their own dedicated I.T. department and, as such, they generally hire external service providers for their security needs.

The problem with this strategy is the potential for hacking groups to specifically target the systems from such a vendor due to the number of companies utilizing it. For example, the Denuvo copyright protection system is used by many businesses to prevent their digital games from being copied and distributed online via torrent sites. It utilizes a combination of encryption, serial number identification and online referencing to prevent a copied game from working. This has made it the “go-to” method of copyright protection for many game companies due to its supposed “impenetrability.”

Unfortunately, as of August 2016, multiple news sources have reported that Denuvo has been successfully hacked resulting in potentially hundreds of games being vulnerable to illegal online distribution via torrents. This example shows that relying on a readily available platform for your security needs may be the most cost-effective solution, but it does leave a company vulnerable to potential breaches given the focus that hackers would have on penetrating such a system due to its widespread use.

Since generic security systems bought from a vendor utilize the same open ports, they would all have the same port vulnerabilities which enable hackers to readily know how to attack a system, what route they should take and the potential success they would have (El-Hajj et al., 2016). The same vulnerability also extends to the use of generic firewalls that have similarly been bought from a provider. This does not mean though that only large corporations have the potential to safeguard their system.

This indicates that smaller businesses should hire external providers for a more expensive but more secure custom designed system for their needs rather than one that is generic and sold to multiple companies. The logic behind this for businesses is that it is better to have multiple systems with different protocols than a single one that ‘s hard to penetrate but affects multiple systems. This ensures that even if the system of one company is penetrated, this does not impact other businesses that have used the same systems provider.

Security Measures

Aside from designing a system from the ground up, there are other methods that companies implement when it comes to safeguarding their systems. These practices consist of the following:

a.) Access Control Methods

This method involves limiting the capacity of people or external entities from interacting with specific parts of a company’s system through control compartmentalization. The basic principles of this method focus on giving access only to specific aspects of a system based on that individual’s role within the company. For example, a Customer Service Representative (CSR) for AT&T’s mobile phone division would only have access to the company’s customer management system (it’s CARE platform), its mobile phone activation and maintenance program (the Telegence system) and its payment processing program which is connected to the Vesta payment system (Van Staalduinen, Khan, & Gadag, 2016). However, the CSR would not be given access to the company’s mobile network platform which controls signals within specific areas, nor would the CSR be given the capability to access more private aspects of a customer’s data (ex: their call and text records). Access to these systems is restricted only to personnel that handle cases that are limited to those systems (Van Staalduinen et al., 2016).

By implementing a compartmentalized approach, this prevents a potentially malicious employee within the company from affecting systems that could cause millions of dollars in damage. Not only that, access control helps businesses to track potential anomalies that appear in the system by tracking which department was in charge of that system. Methods like this contribute to preventing malicious access to systems and ensures the continued integrity of stored data.

However, the problem with access control methods is that it can also work against systems by making sure that only select people within an organization can modify or control them. This was seen in 2008 when a disgruntled network administrator in San Franciso shut access to the FiberWAN network for the city administration due to a clash in belief about network security protocols and granting access to people he deemed as unfit and potentially incapable of correctly handling the system.[Click Essay Writer to order your essay]

Safety and competency aside, this situation shows the inherent issues when it comes to access control limitations since, if the person with access to a particular aspect of a system intends to commit malicious behavior, they can implement it with the compartmentalized limitations preventing others from potentially undoing what they did. There is no readily available solution to this particular issue since access control has become a standard practice in most corporations.

b.) Hardware Protection

This method refers to the methods used in protecting a system by preventing unauthorized modification of system protocols via preventive methods on the hardware (Khatri & Brown, 2010). This can come in the form of write protection being utilized on the hard disks of a system, implementing methods of memory protection, and even installing devices on computers to monitor current activities and to prevent unauthorized access. For example, one of the most common methods of hardware protection in companies is to block off access to external read/write ports for desktop computers.

Due to the potential presence of viruses on thumb drives and CD, these ports are usually blocked off since, no matter how secure a company’s firewalls are, it cannot protect itself from viruses being introduced directly into the system via USB terminal. This particular practice is the most feasible when it comes to preventing access to systems since, by physically blocking the ports to a system, an ordinary employee cannot gain access to it.

c.) Encryption of Data

Aside from limiting access to data, there are other methods that can be implemented if unauthorized access is achieved. Data encryption is the process of utilizing a series of symbols, jumbled letters, and symbols to represent the original content of data. The data can only be unencrypted if the correct encryption key is placed thereby enabling the program to unscramble the information.

This method of data protection is utilized in a wide variety of different systems since it adds an added layer of safety over the safety protocols that are already in place. However, it should be noted that data encryption should not be considered as a 100 percent effective means of safeguarding data. Encryption keys can be solved via a wide variety of different methods (ex: brute forcing encryption through a program specifically designed to solve encryptions). This is why methods of data encryption are always evolving alongside current processes meant to circumvent them.

d.) Authentication

The process behind authentication is very straightforward, if you use a system and provide a username or access the system via a company provided laptop with a built-in network access program, a “handshake” occurs between your access of the system and the database of users within the system. Once your network credentials have been examined, the system will then compare it to the database of users that exist within the system and will grant access if authentication server finds the necessary credentials.

e.) Passwords

The use of passwords involves the creation of a unique identifying key that is used to access a network, system or file. It is was one of the first methods used in data protection and continues to be used to this day. Unfortunately, as seen in numerous publicized cases (ex: Mark Zuckerberg’s Facebook account being hacked) passwords can be guessed and, as such, people should practice proper password management and creation strategies to prevent this from happening.

Vulnerability Management

The concept behind vulnerability management is acknowledging the fact that there is no such thing as a 100 percent secure system and having the necessary vigilance to anticipate potential threats before they become a serious issue. There are hundreds of new viruses, trojans, and malware that are created each year with the express purpose of penetrating computer systems. One of the ways vulnerability management practices help to prevent such threats from affecting computer systems is through constant security updates and testing the present day security measures in the system (Chua & Storey, 2016).

Security updates come from database updates from various government and non-government organizations that identify potential virus threats and release data on how to counter them. System admins then implement these solutions into the system and test the security measures that have been implemented to ensure continued system integrity. Aside from this, there is also application and network security protocols to take into consideration. Application protocols limit the ability of installed programs to influence a system’s program. This ensures that applications only work within a pre-defined environment which helps to limit the potential damage they cause (Bamrara, 2015).

Network security measures are used in the same context; however, they involve isolating systems and preventing one system from affecting the other. For example, a system that a CSR operates in is kept on a separate server and network infrastructure than other critical systems. This ensures that if a virus were to compromise the CSR system, it would not affect critical systems in other parts of the company. The last practice involving vulnerability management are password management practices which often means changing passwords on a bi-weekly basis. Exercises like this help to lower potential network break-ins by ensuring that methods that can be used to gain access to the system (ex: a stolen password) are changed (Wei, Murugesan, Kuo, Naik, & Krizanc, 2013).[Need an essay writing service? Find help here.]


Overall, what this paper has shown is that there is no such thing as a system that cannot be penetrated so long as it is connected to the internet. Even systems that are not directly connected to the net can be breached via human incompetency or through malicious actions by an employee within the company. This is why companies should practice constant vigilance when it comes to the actions they take when safeguarding their databases.


Reference List

Bamrara, A. (2015). Evaluating Database Security and Cyber Attacks: A Relational Approach.    Journal Of Internet Banking & Commerce, 20(2), 1.

Chua, C. H., & Storey, V. C. (2016). Dealing with Dangerous Data: Part-Whole Validation for    Low Incident, High Risk Data. Journal Of Database Management, 27(1), 29-57.

El-Hajj, W., Ben Brahim, G., Hajj, H., Safa, H., & Adaimy, R. (2016). Security-by-construction in web applications development via database annotations. Computers & Security,            59151-165.

Ferdinand, J. (2015). Building organisational cyber resilience: A strategic knowledge-based view            of cyber security management. Journal Of Business Continuity & Emergency Planning,        9(2), 185.

Jenab, K., & Moslehpour, S. (2016). Cyber Security Management: A Review. Business    Management Dynamics, 5(11), 16-39.

Khatri, V., & Brown, C. V. (2010). Designing Data Governance. Communications Of The            ACM, 53(1), 148-152.

Van Staalduinen, M. A., Khan, F., & Gadag, V. (2016). SVAPP methodology: A predictive         security vulnerability assessment modeling method. Journal Of Loss Prevention In The      Process Industries, 43397-413.

Wei, D. S., Murugesan, S., Kuo, S., Naik, K., & Krizanc, D. (2013). Enhancing Data Integrity     and Privacy in the Cloud: An Agenda. Computer, 46(11), 87-90.

Essay Writing Sample: Nutrition and Behavior Tracking
Posted by: Write My Essay on: October 31, 2018

Sample by My Essay Writer

Nutrition and Habit Tracking

           Nutrition and exercise are vital in determining the health status of an individual. There are certain activities and kinds of food that when included in one’s daily nutrition and behaviors, can likely lead to certain illnesses. On the other hand, certain types of food and behaviors can help to prevent given diseases. Thus, it is important to analyze some of the foods, behaviors, exercises, rest and sleep patterns, and their possible impacts on an individual’s health.

Table 1: Nutrition, Behavior, Sleep and Exercise Log

Nutrition     Behavior Sleep Exercise Stress Management
Daily calorie intake – 1,600 calories  Food


Day Target Actual        
Monday 2 cups fruits 3 cups of orange juice with sugar Eating lunch at my desk 10 hours 2 hours walking No stress issues
  3 cups of vegetables 1 cup cooked spinach        
  7 ounces of grain 12 slices of brown bread        
  6 ounces of protein 7 eggs        
  3 cups of dairy 5 cups of milk with sugar        
Tuesday 2 cups fruits 4 cups mango juice with sugar Playing a video game at lunch on my phone 12 hours 1.5 hours walking Loneliness and eating snacks
  3 cups of vegetables 1 cup leafy salad green        
  7 ounces of grain 8 slices of bread        
  6 ounces of protein 8 table spoons of peanut butter        
  3 cups of dairy 4 cups of milk        
Wednesday 2 cups fruits 3 peeled oranges Drinking juice instead of water 9 hours 2 hours walking Staying quiet and eating snacks at  every opportunity
  3 cups of vegetables 2 cups cooked spinach        
  7 ounces of grain 9 cups cooked rice        
  6 ounces of protein 10 ounces chicken with 1 table spoon salt        
  3 cups of dairy 6 cups of yoghurt with sugar        



I currently weigh 180 lbs and my goal is to attain 150 lbs. My calorie consumption is about 16,000 units. To achieve this, I have to achieve a certain target of nutrition, limit consumption of food late at night, be serious with my lunch, and exercise regularly. As an adult, I am required to be active at least two and half hours every day. I am also required to limit my consumption of sugar and salt. However, I often end up with unhealthy choices. At the end of a 4 week log, I ended up gaining 3 lbs instead of losing.[“Write my essay for me?” Get help here.]

I walk a lot each day, as my job requires me to do so quite often. I believe helps me keep fit and thus maintain my health. Also, I exercise for a short while each day, which I also believe helps improve my life by burning excess calories and keep my body strong (Casey, Benson & MacDonald, 2004). Ensuring that I vary what I eat each day helps in regulating the amounts of calories I consume on a daily basis. Thus, according to Schulherr (2008), I must monitor and regulate what I take to ensure that my diet is balanced every day. [Need an essay writing service? Find help here.]

Adding sugar and salt to my food may not help in improving my health. Too much of these may increase my risks of suffering from diabetes. Being dormant or lonely whenever I am stressed up never helps improve my health. It may end up complicating my stress levels. On the same note, eating snacks each and every time I am stressed up can result to obesity. I have a tendency of taking my supper very late at night and I often wake up at night to eat some snacks. According to Lister (2009), eating late at night may lead to indigestion and may work against my dream of losing weight. This has placed me at risk of developing stomach and health complications (Lister, 2009). My other habits that are not beneficial to my health include; taking lunch at my desk while playing video games. In most cases, I end up feeling hungry more quickly than normal. Consequently, this forces me to eat snacks so as to elevate the level of hunger pangs.

I tend to take too much calories on Wednesdays. On other days, my consumption is relatively constant. I sleep for longer than 12 hours on weekends and do not exercise at all. This is because I have no engagements on weekends to remind me that I need to wake up, get ready and attend to. This inconsistency is due to my habit of generally staying indoors on weekends. This also implies that I do not exercise on weekends. However, it is worth noting that I am sometimes keener on my diet whenever I have appointments to attend to. Those are also the times I get to remember to exercise. That is why there is a variation between week days and weekends on my food consumption patterns and behavior.


In order to address my weaknesses, I intend to increase my daily water consumption to at least 8 cups. I also plan to reduce my sugar and salt consumption as much as possible. I intend to implement this by ensuring that I take dairy products and fruit juices in their natural form. Also, plans are underway aimed at increasing the amount of time I take during exercises to more than two hours every day. To achieve this, I intend to join a gym club and maintain a fixed schedule of two hours in the morning and another hour in the evening. To increase my active hours, I will also walk to the places that are at walking distances. For long distances, I will use a bicycle as opposed to a car. When stressed up, I will try to talk to my close friends about it instead of being dormant and lonely (Duppong et al., 2007).

To improve on my strengths, I will ensure that I do not exceed the target quantity of each type of food and vary them as much as possible. I will also ensure I stay away from foods that have too much cholesterol and fat. An excess of red meat may lead to undesired health conditions. Thus, my plan is to avoid red meat as much as I can. Currently, I get enough sleep, though sometimes I sleep abnormally longer. This will be adjusted to no more than 10 hours of daily sleep.

Now that I have joined a graduate school, I expect my hours of sleep to change. I also expect to be very busy. To keep up with my plan, I will ensure that I complete my daily activities at 9.00 pm or earlier and retire to bed. I will then wake up at 5.00 am and go to the gym, exercise for an hour before going to my classes. After classes, I will go to the gym for one hour prior to settling down to work on my homework. After the homework, I will take my supper and go to bed (Casey, Benson & MacDonald, 2004).


Assuming I was advising a patient with the same health log as mine, I would emphasize on more exercise.  I would also advise him or her to limit his or her consumption of sugar and salt. Besides, it is important to limit the consumption of sugar in order to avoid becoming diabetic in the future. The patient should also find alternative stress management techniques rather than staying indoors indulging in eating snacks. This is because eating while stressed up increases the likelihood of being obese (Gibson et al., 2004). If one does not exercise regularly, it is easier for him or her to gain weight. Thus, it is important for the individual to exercise more and to cut down excess calories (Casey, Benson & MacDonald, 2004). The individual must learn to eat early and without any distractions.[Click Essay Writer to order your essay]



Casey, A., Benson, H., & MacDonald, A. (2004). Mind your heart: A mind/body approach to stress management, exercise, and nutrition for heart health. New York: Free Press.

Duppong, J., Costin, C., Broome, K., Smeltzer, D., & Truitt, B. (2007). You can’t just eat a cheeseburger: How to thrive through eating disorder recovery.

Gibson, A., Heyward, V., Mermier, C., Janot, J., & Wilmerding, M. (2004). Comparison of DXA, Siri’s 2C, and Lohman’s Db-Mineral Models for Estimating the Body Fat of Physically Active Adults.International Journal Of Sport Nutrition And Exercise Metabolism14(6), 657-672.

Lister, B. (2009). Importance of Nutrition and Health Education. Nutrition And Health,20(1), 11-20.

Schulherr, S. (2008). Eating disorders for dummies. Hoboken, NJ: Wiley Pub.

Write My Essay Sample: Quebec Immigration Policies
Posted by: Write My Essay on: October 30, 2018

Sample by My Essay Writer

Quebec Immigration Policies: How the Provincial Policies Shape Multiculturalism in the Province and Contribute to Quebec Ethnic Nationalism


The new immigration reform has been dubbed “Together, we are Quebec” is undergoing serious deliberations.  At the core of this immigration reform policy is to match immigrants with regional economic profiles. The reform aims at increasing economic immigration by 70% of the current annual intake (Canadian Citizenship & Immigration Resource Center, 2015). The new system essentially will do away with the present immigration policy of “first come, first served” concept that is prevalent in Australia and New Zealand. The following paper explores the proposed Quebec immigration policy, especially in regards to how this provincial policy will shape multiculturalism in the province and contribute to ethnic nationalism in Quebec.[“Write my essay for me?” Get help here.]

1.The new policy reform takes into account the current challenges in the immigration process and the need to recognize the current and changing nature of labor trends. One of the ways that the new policy will contribute towards that agenda is through making the system faster (FW Canada Inc, 2015).

2.The need to speedily give access to new immigrants who are specialized in industries that the workforce in Quebec needs. This strategy will increase multiculturalism in the workplace, making the economy take the best of the labor force out there to enrich its workforce portfolio. One of the requirements in the new reform will be the need by immigrants to have an adequate level of the French language (Solymon, 2016).

3.Immigrants will be placed in places outside of the greater Montreal (CBS News, 2016). The new settlement procedure will now build a truly modern Quebec ethnic nationalism where the immigrants and the indigenous people feel a new sense of belonging to a new-face Quebec.

This policy will bring in more cultures from all around the world and will contribute greatly to the creation of a true multicultural system in Quebec. It also significantly alters the traditional ethnic nationalism because a lot of people who are coming to stay will bring their ideas of nationalism to Quebec especially one based on global nationalism. Quebec’s society will undergo a significant change because a good fraction will have to be based on the need to accommodate a wider variety of views on many social aspects of Quebec and a wider ethnic nationalism platform that it already is.


            Kathleen, the Quebec Immigration Minister recently confirmed the intention of the government to undertake an ambitious immigration reform- the first major reform in a quarter of a century. This reform has been dubbed “Together, we are Quebec.” At the core of this immigration reform policy is to match immigrants with regional economic profiles. The reform aims at increasing economic immigration by 70% of the current annual intake (Canadian Citizenship & Immigration Resource Center, 2015). The new system essentially will do away with the present immigration policy of “first come, first served” concept that is prevalent in Australia and New Zealand. The following paper explores the proposed Quebec immigration policy, especially in regards to how this provincial policy will shape multiculturalism in the province and contribute to ethnic nationalism in Quebec.


            The new policy reform takes into account the current challenges in the immigration process and the need to recognize the current and changing nature of labor trends. One of the problems with the old provincial immigration policies has been its inability to retain foreign talent. The new policy’s objective is to retain immigrants who are temporary workers or students on temporary visas. The policy aims at keeping this important resource just like other countries such as the United States of America and Europe. As the minister observed at the launch of the reform, workers and students now have a wide variety of choices because the US and many European states are interesting to the potential immigrants and Quebec wants to do better that its competitors. One of the ways that the new policy will contribute towards that agenda is through making the system faster (Solymon, 2016). Weil observes that the present provincial system takes an average of four years for a potential immigrant to be approved and by the time that one arrives to Quebec, the labor market often has undergone fundamental changes. The introduction of digital technology to the immigration process is expected to quicken the immigration process. This strategy is going to increase multiculturalism in the province as immigrants from the rest of the world will enter Quebec, fundamentally altering ethnic nationalism in the province.

Another issue that the policy emphasizes on is the need to speedily give access to new immigrants who are specialized in industries that the workforce in Quebec needs. Quebec will borrow heavily on Ottawa because Ottawa was able to find candidates who matched their job requirements in 2015. The need to speedily usher immigrants into the job market is important because finding a job is a big challenge for Quebec immigrants. This strategy will increase multiculturalism in the workplace, making the economy take the best of the labor force out there to enrich its workforce portfolio. To achieve that, employers from various industries will be encouraged to outline their requirements and professional associations will also be required to recognize foreign diplomas (FW Canada Inc, 2015). One of the requirements in the new reform will be the need by immigrants to have an adequate level of the French language. Without the ability to use French, the process of integrating immigrants into the Quebec society has been rather slow. The new requirement will ensure that immigrants are quickly and seamlessly integrated into Quebec society, thereby expanding the current multicultural platform that Quebec enjoys. It will also increase the level of nationalism amongst the immigrants because language is an important concept in building nationalism not only in Quebec but in other parts of the world. [Need an essay writing service? Find help here.]

According to the new proposed reform, immigrants will be placed in places outside of the greater Montreal. This is essential because currently, three quarters of all new immigrants have settled in the greater Montreal area. This strategy is also going to significantly affect the process of building a multicultural society in Quebec. The current settlement pattern has not significantly affected the traditional ethnic nationalism pattern because multiculturalism has only been built around the greater Montreal (CBS News, 2016). The new settlement procedure will now build a truly modern Quebec ethnic nationalism where the immigrants and the indigenous people feel a new sense of belonging to a new-face Quebec. In a few years, Quebec’s nationalism will come to be characterized by multiculturalism rather than the present one distinguished by a vast majority of indigenous Quebec and a few immigrants who do not consider themselves as part of the nation.

A lot of the opponents of the policy have often questioned the 42.5 million Canadian Dollars that have been allocated and have argued that that is a large sum allocated to a single ambitious project. However, what their argument fails to see is that the sum will go to various sectors of the economy and can potentially bring benefits in the short, medium and long term. For example, it will go into the technology needed to quicken the visa approval list, eradication of job discrimination and reduction of waiting list for French classes. All these measures are effective in ensuring an inclusive society and social harmony that is important in the long run. [Click Essay Writer to order your essay]


This ambitious policy proposal will greatly impact on many sectors in Quebec, but one area that will greatly be affected is the culture. This policy will bring in more cultures from all around the world and will contribute greatly to the creation of a true multicultural system in Quebec. It also significantly alters the traditional ethnic nationalism because a lot of people who are coming to stay will bring their ideas of nationalism to Quebec especially one based on global nationalism. With about 1.4 billion jobs to be filled by immigrants, Quebec’s society will undergo a significant change because a good fraction will have to be based on the need to accommodate a wider variety of views on many social aspects of Quebec and a wider ethnic nationalism platform that it already is.


Canadian Citizenship & Immigration Resource Center. (2015, October 21). Quebec to Reform Immigration Policy in 2017 Featuring Declaration of Intent Immigration System. Immigration News Articles .

CBS News. (2016, March 7). New Quebec immigration policy aimed at attracting, retaining foreign talent. CBS News .

FW Canada Inc. (2015, August 20). Canada: Quebec Talks Immigration Reform. FWCanada Inc

Solymon, C. (2016, March 7). Quebec immigration reform to match applicants to jobs. Montreal Gazette

Essay Writing Service Sample: Patient Case Description
Posted by: Write My Essay on: October 29, 2018

Sample by My Essay Writer


The following is a case description of male patient suffering from multiple progressive myositis ossification. The patient is an Italian aged 37 years old and a catholic. Hi case was diagnosed in his childhood and was admitted at the facility six years ago. He has been hospitalized at the facility for the whole of his life. He was the last child in the family and one of his parents died recently.

Multiple progressive myositis ossification is a subtype of myositis ossification which is has been found to be hereditary. Progressive myositis ossification is an autosomal dominant disorder and is a very rare disease. According to Talbi et.al (2016) article “Myositis ossificans progressive: Case report” published on Pan African Medical Journal Pan Afr Med, this disease is associated with progressive ectopic ossification and skeletal malformation in connective tissues of muscles of the body.  Progressive myositis ossification usually affects mainly brachialis, quadriceps femoris and the adductor muscles of the thigh. For cases of multiple myositis ossification, it also affects other muscles of the body, for instance muscles of mastication such as the pterygoids.  This illness is characterized with skeletal malformations, limited joint movements, tendon weakness and muscle weaknesses (Rowlands, 2014).  [“Write my essay for me?” Get help here.]

According to Spinzia et al. (2014) article: “A rare isolated unilateral myositis ossificans traumatica of the lateral pterygoid muscle: A case report”, published on J Med Case Reports Journal of Medical Case Reports, progressive myositis ossification occurs without any injury involvements since it is inherited affliction. This condition has been known to progress in a predictable manner among many patients. The disorder is an autosomal dominant trait which can be passed over to offsprings in case parents have the same condition. Some cases of progressive myositis however could be viewed as being non hereditary since they occur as a result spontaneous genetic mutation at the time of conception (Frontera, 2008).

Case presentation

The 37 year old patient presented with a case of multiple progressive myositis ossification which was diagnosed while he was a child. He relied very much on his wheel chair for support and movement. The patient has also been diagnosed with a chronic pressure. This patient has problems with normal feeding through the oral cavity, his muscles of mastication have failed and as a result he takes liquefied meals only and through a straw. The patient was admitted six years ago after the parents could no longer manage him and his condition at home since he is very stiff and rigid. [Need an essay writing service? Find help here.]

The patient also has a liking for sexy photos which has made his parents provide the sexy posters he wanted in his room. He has also extended the same towards the female staff at the hospital and he talks sexually to them. The patient is fully dependent on the facility staff for everything.

Plan, Management and Outcome

Patients of multiple progressive myositis ossification have been found to develop complications such as eating disorders due to impaired muscles of the mouth and pressure ulcers on their skins. The two mentioned above could result into cases of gastric ulcers and constipation for the case of feeding disorders and peripheral pain resulting from the pressure sores. The above cases were considered and the patient was put on the following regimen.

The patient is currently on vitamin D and prevacid. The vitamin D supplements are for regulating bone metabolism which would ease the situation.  Prevacid on the other hand is to help regulate the amount of acid produced in the patient’s stomach. Since the patient has problems with feeding, there is a high possibility of over secretion of gastric acids that could result to the ulceration of the gastrointestinal tract (Rowlands, 2014).[Click Essay Writer to order your essay]

The patient is also on medical directives such as Tylenol and laxatives. Tylenol is a painkiller and so could be used in relieving headaches and any other kind of pain. Tylenol was also to relieve pains from the pressure ulcers the patient has developed. Laxatives have a fundamental role in improving the gastrointestinal motility of the patient. The patient has problems with his gastrointestinal functionality and so there are chances of constipation presenting.

The nursing staffs at the facility were advised to seek for ways of discouraging and handling the patient’s weird liking for sexy information and content through guidance and counseling. Since they could not provide sexy posters in the hospital, there was need to try and train his mind on liking some other content.


The patient presented with multiple progressive myositis ossification which had been diagnosed in his childhood. No history the patient showed he had been involved in any accident. It was therefore clear that this was the heritable subtype of myositis ossification. However none of the parents or any of his siblings had the same case. It was therefore hypothesized that the cause of the illness could be mutations that occurred during his conception.


Nurses play a fundamental role in the education and medical management of people with disorders such as myositis ossification. The partnership between nurses and patients improve care offered to the patient and also helping the patient become a self-manager. It is therefore their mandate to combine skills and expertise in teaching and counseling their patients to allow quicker recovery.

From the above information, the following questions can be asked. Is the medical care offered to the patient sufficient, given that he is only on vitamin D and prevacid. Are the medical officers of the facility right to have Tylenol and laxatives as the medical directives to the patient? And lastly is healthcare offered to the patient sufficient, since we see that he has ended up developing a pressure ulcer.


Frontera, W. R., Silver, J. K., & Rizzo, T. D. (2008). Essentials of physical medicine and rehabilitation: Musculoskeletal disorders, pain, and rehabilitation. Philadelphia, PA: Saunders/Elsevier.

Rowlands, D. J., & Clarke, B. (2014). Recent advances in cardiology.

Spinzia, A., Moscato, G., Broccardo, E., Castelletti, L., Maglitto, F., Orabona, G. D., & Piombino, P. (2014). A rare isolated unilateral myositis ossificans traumatica of the lateral pterygoid muscle: A case report. J Med Case Reports Journal of Medical Case Reports, 8(1).

Talbi, S., Aradoini, N., Mezouar, I. E., Abourazzak, F. E., & Harzy, T. (2016). Myositis ossificans progressive: Case report. Pan African Medical Journal Pan Afr Med J, 24.

Essay Writing Service Sample: Patient Safety
Posted by: Write My Essay on: October 25, 2018

Sample by My Essay Writer

Increasing Participation in Patient Safety Initiatives


Importance Statement:

The primary purpose of any healthcare center, is the provision of patient safety and care. Ensuring that all nurses and doctors participate actively in enhancing patient safety is thus the duty of every leader in any hospital. In this project, the researcher proposes some of the best practices that can help in increasing participation in patient safety initiatives. To help patients receive the best and safest care, it is important to involve the patient. Also, to ensure a high quality health care, the patients, the practitioners, the providers and families must collaborate and work together. All parties must participate in ensuring that quality care and patient safety is achieved. When patients know their part in the treatment process and participate actively in ensuring compliance, they are more likely to heal quicker and save costs. When practitioners do their best to ensure a safe and quick care to patients, the families know their roles in the treatment process of the patient; all is bound to go smoothly. However, this has not been the case in many hospitals. The participation of, especially patients and their families, has not been significantly achieved.

Purpose Statement

In this project, some of the best ways of ensuring that patients and families work together with the healthcare providers to ensure safe care are discussed. The proposed project aims at promoting knowledge of the patient safety issues among all stakeholders including patients, practitioners and administrators. Through the promotion of this knowledge, the researcher is optimistic that the participation in patient safety will be enhanced. [“Write my essay for me?” Get help here.]


Some of the best practices include training family members from the patient side on some of the nursing care activities including dressing, washing the patient and feeding the patient. Patients should also be trained on some of the safest practices that can help speed up their recovery. Explaining to patients the kinds of foods they should eat to ensure they heal properly and safely should also help in improving patient safety (Blaney-Koen, 2009). To ensure these activities are effectively implemented, it is important to consult the relevant stakeholders including the ministry of health, the healthcare providers, the community members, the faith-based healthcare providers, school administrators and community health workers (Barone, 2015). In the next section of this paper, these practices are explained in detail.


Improving participation in patient safety is important to the nursing profession since it is the right of patients to receive the safest and highest quality care. In the nursing code of ethics, nurses have the responsibility of ensuring that patients are kept safe from any form of harm. Thus, the initiative to improve participation in patient care is relevant and important to all people in the nursing profession. Nurses receive their job satisfaction when they see their patients happily recovering. Patients can only be happy when, among other things, they are kept safe at all times. It is important, thus, to obtain the participation of both the patients, their families and that of the nurses in ensuring the safety of the patients (Kalra, 2011). [Need an essay writing service? Find help here.]

Steps to Be Taken in Determining the Need for the Initiative

To ascertain that there is actually a need to improve participation in patient safety, the researcher intends to carry out surveys in 5 different healthcare centers, selected at random. The researcher will identify ways in which patient safety has been ignored or overlooked and how patients have suffered from neglect. The researcher will also interview 100 randomly selected patients and come up with solid evidence that the safety of the patients is at stake and there is a need for action. 100 nurses will also be interviewed to obtain their views on the need for the initiative. The next step will be to analyze the obtained information and come up with accurate information that is conclusive and reliable.

Steps to Determining the Readiness of the Organization to Implement the Initiative

The first step will be to approach the administrators of the organization and ask them whether it will be prudent to implement the proposed initiative and whether the organization has the necessary resources. Next, the researcher would interview the nursing practitioners within the organization on their perception on whether the initiative can be useful when implemented. Their response will help to determine the readiness of the organization to implement the initiative.

The barriers will be identified by looking at the things that can hinder the implementation of the policy to train nurses, patients and family members on patient safety. Some of the barriers that may be encountered include the tight schedule of nurses and nursing students, the poor health of some patients and the indifference of some family members. Reviewing the time tables for all nurses can help in identifying the free time when the training can be offered to the nursing practitioners. The patients can be selected on the basis of their health conditions whereby the critically ill will not be disturbed, but will be trained one by one on their bedsides. However, this move may proof to be time-consuming and fruitless since some patients can barely concentrate. [Click Essay Writer to order your essay]

Some of the enablers that may be obtained include aggressive nurses and family members who are ready to learn more about patient safety. This will potentially help in boosting support for the initiative among the patients, nursing practitioners and other key stakeholders (Sanchez, 2012). The availability of resources to facilitate the initiative can also act as an enabler to the proposed project.

Steps to Determine the Necessary Strategies to Implement the Initiative

The strategies that will be necessary in implementing the proposed idea will be identified through consultation with the relevant stakeholders including the administrators of the healthcare centers, the nursing practitioners and the patients. These will be achieved through interviews and surveys. A thorough review of relevant literature will also be done to identify some of the most effective strategies.

Strategy to Implement the Initiative

To enhance participation of nurses in patient safety, the proposed strategy is to offer safety training to the nurses and put in place a reward scheme for best practice. When nurses are trained on safety issues and on how to handle them, they will have the required know-how on how to handle patients in a safe way and keep them from harm. For instance, if nurses know that patients can only be kept safe if they are dealt with utmost honesty and trust, then they will begin to exercise honesty and develop trust with their patients. After recovery, feedback can be taken from them to determine the quality of care they received. The nurses whose patients give excellent feedbacks can then be rewarded accordingly. Leadership by example can be very important in ensuring that this is achieved (Clancy, 2007).

The best way to get nurses interested in learning about patient safety is by informing them about the key benefits of the initiative. When they learn that they can be more successful as nurses by making the safety of their patients the major concern, they can get interested in learning how this is done. After their interest is aroused, the researcher will ask the nursing practitioners to group themselves according to their shifts and the time they are available so that classes can be organized according to the times when are free.

To offer training to patients on their safety and how they can enhance it, patients who are strong enough to attend an organized forum will be asked to attend the forum and learn on how they can participate in ensuring their safety and quick recovery. When patients learn that they can actually play a part in their recovery process and their safety, they will most probably become interested in learning how they can participate (Vincent, 2010). Family members will also be asked to attend the forums where they will learn how they can ensure that their sick relatives remain safe as they recover.[Need an essay writing service? Find help here.]

First Few Steps in Implementing the Initiative

If the proposal was to be implemented, the first few steps in implementation would include approaching the nurses and nursing practitioners and asking them what they think about patient safety. The next step would be to request them if they would be willing to participate in a training program that would help in improving their participation in patient safety. After that, the researcher would approach a qualified and professional nursing practitioner who has knowledge and experience in patient safety and ask him/her to train the nursing practitioners on patient safety. In conjunction with the administration, the researcher would then institute a reward scheme for the best practicing nurses. The scheme would then be made known to the nurses after completion of the training.

After the nurses have been duly trained, the researcher would approach the patients one by one and ask them whether they would be willing to participate in a patient safety improvement forum. The details of the forum and expectations would then be explained to the patients one by one and their consent obtained. The researcher does not expect any hardships in acquiring the consent of the nurses and the patients.


Barone, J. (2015). Patient Safety in Surgery. Patient Saf Surg, 9(1), 10.

Blaney-Koen, L. (2009). Patient Education: Improving Patient Safety. Journal Of Patient Safety, 5(3), 197.

Clancy, C. (2007). Putting the Patient in Patient Safety. Journal Of Patient Safety, 3(2),

Kalra, J. (2011). Medical errors and patient safety. Berlin: De Gruyter.

Sanchez, J. (2012). Patient safety. Philadelphia, Pa.: Saunders.

Vincent, C. (2010). Patient safety. Chichester, West Sussex: Wiley-Blackwell.

Write My Essay Sample: Diabetes in Older Adults
Posted by: Write My Essay on: October 24, 2018

Sample by My Essay Writer


Diabetes is considered the oldest disease in human history. It affects the way the human body handles glucose. Despite the disease having prevalence in any age group, research indicates that older people, for long excluded from control trials regarding its treatment and the associated conditions, are more prone to it than younger ones. According to the American Diabetes Association (ADA) (2014) report, about 25% of Americans aged 60 years and above live with the disease. The report further acknowledges that aging is the primary cause of the epidemic. Older adults with the disease are more prone to both acute and chronic cardiovascular and micro-vascular complications. Due to the heterogeneity of the health status of the older adults, it is difficult to ascertain a standard intervention approach that fits the entire population range. Thus, this research paper explores and designs an exercise program and prescription for older adults with diabetes. However, a brief overview of the types of diabetes causes, and symptoms would all be necessary for this research and as such are briefly discussed.

Causes of Diabetes Mellitus

Usually, the pancreases secrete a hormone known as insulin. It converts glucose in the body that is available in the foods we consume into energy. Whenever the cells fail to use the hormone as required, a medical phenomenon referred to as insulin incidence sets in. Initially, the pancreas secretes more insulin in an attempt to get the glucose into the concerned cells. However, it eventually fails to stand it, and as a result, sugar starts to accumulate in the blood stream instead as is the case with type II diabetes. [“Write my essay for me?” Get help here.]

It is worth noting, however, that the condition arises as a result of a combination of causes. These include Genes, extra weight, and metabolic syndrome to name a few. According to Joslin Diabetes Center (JDC) (2016), genetic history makes some people more susceptible to the disease than others. The different bits that DNA contains explain why some people in a certain family lineage stand at a more risk of getting the disease than others. Overweight is another possible cause of the disease. It stems from the fact that it leads to conditions that result in resistance to insulin. This is the reason attributed as to why type II diabetes affects both adults and children with obesity.  Moreover, diabetes can also result from metabolic syndrome. Those people that sustain insulin resistance happen to live with several conditions such as extra fats, high blood pressure, high glucose levels in the blood and high cholesterol.

Research has also established that too much of glucose from the liver causes diabetes. When the blood sugar is low, the liver responds by secreting more glucose to counterbalance the condition. After meals, particularly containing high levels of carbohydrates, the blood sugar level escalates, necessitating the liver to reduce the secretion of glucose (Postic et al., 1999). In the case where people experience a breakdown in the communication between cells, the process of insulin secretion is affected giving rise to diabetes. It could be as a result of wrong signals or failure to pick messages correctly.  Additionally, if the there is a breakdown in the beta cells, they send out the wrong amount of the hormone throwing off blood sugar, thus, predisposing people into getting the disease. In the entire analysis above, it should be noted that high blood glucose (that is characteristic of Diabetes Mellitus) is detrimental to cells.

Diabetes Mellitus Types

Diabetes is categorized into two; type I diabetes and type II diabetes. In the first case, the body immune system damages the cells responsible for the secretion of insulin, and ultimately, eliminating the production of the hormone in the body. It accounts for about 5% of the people living with diabetes.

Type II diabetes is not limited to age as it can set in at any stage of human development cycle. However, it becomes more prevalent as one transit from adulthood to old age. In children, this kind of diabetes seems to be on the rise too of late. It accounts of up to 95% of the people suffering from the disease. Here the body fails to use insulin correctly as required resulting into insulin resistance. As the condition worsens, the pancreases secrete a decreasing amount of insulin, resulting into insulin deficiency in the body. According to Olokoba et al. (2012), the type II diabetes mellitus is solely due to genetics and lifestyle factors. The later factors include sedentary lifestyle, physical inactivity, generous consumption of alcohol and cigarette smoking. Notably, obesity contributes 55% of type 2 diabetes incidences.

These types of diabetes differ from symptom manifestation. In type I diabetes, it starts either at childhood or at intermediate stages just before adulthood. The sudden symptoms compel the sufferers to seek medical attention because of an abrupt manifestation of high blood sugar symptoms. On the converse, in the type II diabetes, an individual may not necessarily portray symptoms before diagnosis. The disease shows up in mostly in adulthood. However, there are increasing cases of children diagnosed with the disease currently.

The two types of diabetes are similar in the manner that they both increase the sufferers’ chances of experiencing serious complications. However, it is much easier to monitor and manage the disease if the resultant complications can be prevented and contained. If this is not the case, diabetes can lead to kidney failure and blindness. As well, the disease continues to be the critical risking factor of heart disease, foot amputations and stroke. The type II diabetes predisposes patients to the risks of other complications long-term and short-term, often leading to premature deaths. The increase in mortality and morbidity rates in type II diabetes is due to the commonness of this kind of disease. This is because the disease has insidious onset coupled with late manifestation of the accompanying symptoms. As Olokoba et al. (2012) points out, it is even worse in low-income countries such as those in Africa, Latin America and some parts of Asia. According to JDC (2016), diabetes mellitus affects approximately 20.8 million Americans annually. While 1.5 million of them are diagnosed and are in total awareness of the disease, 6.2 million represent undiagnosed cases, hence unaware of their situation regarding the disease.

The Role Physical Exercises Play in Decreasing Medical Conditions

Overall, physical activities have several benefits to the skeletal health in the entire age spectrum, besides the general benefits to the body. Regular exercise is a vital part of managing diabetes when it is coupled with proper diet, taking medications according to prescriptions, and handling stress adequately according to Haskell et al. (2007). While the human body remains active, it increases the cells’ sensitivity to insulin, making it work more efficiently. These cells help in removing the glucose from the bloodstream leveraging a mechanism that is independent to that of insulin as one engages in physical excises. In other words, exercising regularly helps the body in lowering the blood glucose and hence, improving the body’s ability to handle sugar levels. Regular physical activities assist in reducing blood pressure as well as cholesterol levels in the body, burning calories necessary in either losing or maintaining body weight among a myriad of other benefits.

The contemporary research asserts that consistent decrease in muscle and strength fitness with age can be preventable in part if individuals always engage in regular physical activities. As people grow older, insulin sensitivity decreases partly due to lack of physical exercises. Lowering the rate at which one participates in physical activities predispose a significant number of people to the type II diabetes. Recent surveys regarding physical exercises training are involving older patients to identify whether this can improve their fitness conditions (ADA, 2004). The report indicates that patients do well with adequate training which as well boosts their metabolic responses. Additionally, maintaining quality levels of fitness leads to less cases of chronic vascular diseases, hence improving the quality of life.

Pre-exercise Evaluation

The structured approach, as described by ASCM, gives particular recommendation regarding the frequency, type, duration and intensity of the necessary physical activities (Haskell et al., 2007). This approach currently captures lifestyle to enhance healthy lives. However, it recommends that diabetes mellitus patients should participate in a thorough evaluation using appropriate diagnostic survey. While doing this, the examination should examine for the possibilities of both macrovascular and microvascular to isolate compromising situations that can aggregate while engaging in an exercise program. As a result, this would necessitate the establishment of areas of concern, allowing one in designing an exercise prescription at individualized levels, which can help in minimizing risk to the patient.

Mainly, for older adult diabetes, they need to engage in several counseling sessions since there are some factors to be considered in implementing an exercise prescription. Patients are supposed to attend at least twice in such meetings and fill the activity assessment form as required in that matter. ASCM recommends that it is important to identify the physical status of the patient (Haskell et al., 2007). Then, the patient should be assessed for the potential necessity and cardiovascular pre-exercise testing to avoid mishaps while one engages in the program. The first counselling should seek to review the assessment form, with more focus on physical examination and the history of the patient. Equally, important, it should give room for identifying the performance goals of the person. The second session would help in reviewing the exercise prescription at an individualized level. [Need an essay writing service? Find help here.]

By examining an exercise assessment form, it would be easier to identify the levels of the physical activity. They include pre-contemplator, contemplator and active people. The first case categorizes people who do not have the intention of starting and do not necessarily exercise. The second instance identifies them as either to have considered beginning participating in the program or they have infrequently attend it. The active individual, on the other hand, has either achieved or near achieving the activity standards.

ACSM Recommendations for Old Adults

As ACSM recommends that both muscle-strengthening and aerobic activity are vital for healthy aging. It suggests that older adults can at the minimum achieve the best health benefits by engaging in the activity for two and half hours of aerobic activity at moderate intensity (for example brisk walking) every week on top of muscle-strengthening activities minimum two days a week. If the action involves aerobic activity of vigorous intensity, then old adults should engage in the program for 75 minutes. Additionally, they should participate in muscle-strengthening activities minimum two days per week. Alternatively, ACSM suggests that one can have the combination of the above discussed activity in addition of at least four days per week (Haskell et al., 2007).

Furthermore, for increased activity with an aim of obtaining additional health benefits, ACSM recommends that five hours of aerobic activity of moderate intensity is ideal if done weekly on top of muscle-strengthening activities done in two days every week. A patient can achieve this through a two-hour-and-half engagement in an aerobic activity of vigorous intensity weekly coupled with two-day muscle strengthening activities every week. Alternatively, one can obtain maximum benefits of physical activity by a combination of the two approaches plus two-day muscle-strengthening activities weekly.

Activity Plan

Each recommended activity has specific requirements that one has to conform. With that in mind, creating an activity plan helps in addressing each activity. That would ensure that patients of different levels of diagnosis use the recommended physical activity that may not end up causing more harm. For instance, patients sustaining chronic conditions need a plan that incorporates prevention and treatment. Additionally, the exercise program should help them in gradually and progressively increasing physical activity as it may seem necessary as time advances as particular conditions of ACSM recommends (Haskell et al., 2007).. During the counselling session, physicians should encourage older adults to engage in sufficient physical activity on a weekly basis, ensuring they meet additional exercises as required regarding the specific goals and needs. For example, old adults can achieve the recommended minimum level of activity if they participate in several but short-lived physical activity.  Patients should individualize their functional abilities through participation in a combination of different approaches as long as right the recommendation for a particular activity prevails.

Examples of muscle-strengthening and aerobic activities include callisthenic exercises, bicycle riding, dancing, swimming, walking and jogging among others. Intercepting warm-up and cool-down activities allow muscles to regain energy. Patients should self-monitor their activities regularly coupled with re-evaluation of the activity plan in analyzing improvement in their abilities. With that, they could be able to predicate if they should reduce or increase the physical activities so as not to overwhelm body abilities. Moreover, the old adults should be able to tell if they can increase their activity level or modify their diet as an approach to maintaining a healthy body weight (Buchner, 2009).[Click Essay Writer to order your essay]



Physical activity plays a significant role in promoting health and disease prevention. ACSM recommends that the time, frequency and intensity of the exercise entirely depend on the pre-exercise evaluation results. The previous discussions have shown that type II diabetes epidemic has a close association with the decreased activity levels, leading to increased obesity prevalence. Engaging in physical activity, thus, is a critical component of preventing and managing type II diabetes. Frequent exercising lowers the chances of the disease by improving the metabolic abnormalities as it could be easier to count an earlier progression of insulin resistance that leads to impaired sugar tolerance (ADA, 2004). For type I diabetes more emphasis should be focused on therapeutic remedies adjustments. This allows participating in physical activity safely in line with the patient’s goals and desires.



American Diabetes Association. (2003). Physical Activity/Exercise and Diabetes. Diabetes Care, 27(Supplement 1), S58-S62.

American Diabetes Association. (2014). Older Adults. Retrieved 5 October 2016, from

Buchner, D. M. (2009). Physical activity and prevention of cardiovascular disease in older adults. Clinics in geriatric medicine, 25(4), 661-675.

Haskell, W. L., Lee, I. M., Pate, R. R., Powell, K. E., Blair, S. N., Franklin, B. A., … & Bauman, A. (2007). Physical activity and public health: updated recommendation for adults from the American College of Sports Medicine and the American Heart Association. Circulation, 116(9), 1081.

Olokoba, A. B., Obateru, O. A., & Olokoba, L. B. (2012). Type 2 diabetes mellitus: a review of current trends. Oman Med J, 27(4), 269-273.

Joslin Diabetes Center. (2016). Genetics and Diabetes: Are you at risk? | Joslin.org. Retrieved 5 October 2016,

Postic, C., Shiota, M., Niswender, K. D., Jetton, T. L., Chen, Y., Moates, J. M., … & Magnuson, M. A. (1999). Dual roles for glucokinase in glucose homeostasis as determined by liver and pancreatic ? cell-specific gene knock-outs using Cre recombinase. Journal of Biological Chemistry, 274(1), 305-315.

Page 13 of 20« First...1112131415...20...Last »