Tuesday, February 18, 2020

Medication Management Case Study Example | Topics and Well Written Essays - 500 words

Medication Management - Case Study Example Dr. Mack's prescription could have been helpful with regards to its aim to alleviate the problems; however, most of the prescribed drugs, despite its aim to cure one problem, tend to complicate the others. Simvastatin could aggravate muscle cramps which have been presented by the patient. Simvastatin aims to lower blood cholesterol, and since the referral does not clarify if it was monitored, I would suggest that it would be necessary to do so. for the patient's worsening ischaemic heart disease, a maintenance drug such as Nifedifine (Calcigard) should be prescribed assured non-sensitive to it. However, blood pressure must be monitored because it is contraindicated to those with low systolic blood pressure. It should also be taken into consideration that Aspirin can worsen poor kidney function and breathing problems such as asthma. However, if the need for such drug persist, interic coated aspirin must be use instead; hence, the effect of Aspirin with regards, to her digestive problem (reflux) would be minimized. Ditropan despite its aim to solve stress incontinence should not be administered to patients with untreated glaucoma. Moreover, the patient presents gastric reflux that needs extra caution upon use of such medication. Seretide has been found to lower blood potassium level, thus monitoring of such blood electrolyte is necessary.

Monday, February 3, 2020

Cyber security Coursework Example | Topics and Well Written Essays - 750 words

Cyber security - Coursework Example An example of how cultural values impact on the moral legitimacy can be drawn on the norms regarding theft in society. The golden rule concerning ethical behavior stresses on treating other as you would wish for them to treat you (Cavalier, 2005). Consequently, the cultural norm pertaining to theft is that, it is a vice and a morally illegitimate behavior. On the other hand, if one’s cultural values ascribe to the ethics that justifies an action is morally right so long as it results to personal interest, the moral legitimacy is granted (Spinello, 2004). The implication, resulting here is that theft is morally justified since it serves to benefit the thief. The linkage between the effect cultural values and cyber ethics is intricate and drawn from the moral legitimacy of one’s actions (Spinello, 2000). For, example in the case of content piracy, it is a form of theft yet based on the actor’s different points of view, issues pertaining to legitimacy arise. Foremos t, there is one individual who views content piracy as illegal and a violation of cyber ethics. His/her logic is drawn from the tenets of the Golden rule. However, on the flip side, there is one internet user who justifies his/her action based on the personal benefit derived from the action. His or her logic arguments include; why pay for expensive, when I can freely download it from the piracy sites? Besides, I am not harming anyone by my actions? Consequently, the different perspective regarding one’s cultural values and legitimacy of moral actions are the major challenges about the regulation of cyber ethics. Topic 2 Ethics refers to the prescribed set of laws that govern the precincts of right or wrong behavior or actions in society (Averweg, 2006). The contemporary society is rapidly developing into a global village due to increased access and growth of information technology. Furthermore, companies have integrated information technology in facilitating their day to day functions. Beneath the growing fascination with internet use, there lies the need for developing a code of ethics that guides the behavior and actions of employees in the use of information and communication technologies. There are several practices that can be integrated in the acceptable internet use policy of a company. Foremost, guidelines should specify that data must be strictly used for the satisfaction of the company’s business objectives. Furthermore, access to the internet can only be done via the company’s authorized firewall, router and content scanning software. Moreover, any employee accessing data should respect and comply with the legal protection accorded to it by the relevant licenses and copyrights. In addition guidelines regarding security of both data collected and user should be addressed. Consequently, security measures such as encryptions and firewall software are to be applied in the company’s computer server system (Criddle). In relatio n to the acceptable conduct policy, a specific guideline for inclusion pertains to disclosure of data use information. Consequently, all employees are obligated to disclose any information regarding the type of data they store and their plans for usage. Furthermore, company staff should only access and collect data in a manner that is not deemed as illegal or unfair. Another guideline pertains to the accuracy of data collection and retention policy. In light of this policy, all employees