Friday, February 28, 2020

Cohorting Colonized Low Risk Patients with MRSA and Using Universal Research Proposal

Cohorting Colonized Low Risk Patients with MRSA and Using Universal Precautions will Increase Patient Satisfaction, Improve pati - Research Proposal Example Since the aim is to cut-down the running costs of hospitals by implementation of newer method, the collection of cost-related data from hospital authorities to make comparisons is also part of this study. B. Study population i. Setting The best possible avenue for this study could be a general hospital, as the availability of multiple specialties provides an opportunity to work in a coordinated manner with all specialties who can possibly contribute to this study. A hospital with a Department of Infectious Disease will be preferred for this study. As the Department of Infectious Disease works with nearly all other departments of the hospital, its position is central in contributing not only to the hospital but also to this study. Presence of an isolation ward is mandatory for this study, due to the fact that MRSA infected cases are the subjects of this study, and they require isolation. In addition to this, a reasonable turnover of patients is also expected to be the norm of the sele cted hospital. The reason for this is the fact that, the higher the number of subjects enrolled for this study, the better will be the results. ii. Subject selection Various specialties of hospital will be informed about the ongoing study. They will be requested to report to the Infectious Disease Department, the presence of suspected cases of MRSA. These cases will then be evaluated in order to make sure they are suitable candidates for this study. A total of twenty patients will be selected from those who are being treated under contact isolation while another twenty will be selected from among those who are receiving universal precautions. Patients who are unable to communicate verbally will not be selected as subjects for this study, as this study also involves interviewing the subjects to assess their wellbeing. Mentally ill patients or children under the age of 13 will also be excluded from this study. iii. Subject recruitment strategy The subjects will be recruited from the h ospital. A clear-cut written guideline/checklist will be provided to the assisting hospital staff for the purpose of selection of candidates. Assistance will be sought from the hospital management and the hospital staff, especially doctors and nurses, who will help to identify the patients who fit the profile for the purpose of this research. Gaining assistance from hospital staff will also decrease our study cost, as the hospitals staff is often well aware of their patients’ conditions and the need to test them again for being suitable for the study-under-consideration will not exist. Willingness of patients to become part of this study will be sought after explaining to them the importance of this study, and how they can contribute to the overall wellbeing of humanity by being part of this study. The consent of each patient will be gained after explaining the purpose and scope of the study. C. Study variables i. Independent variables The independent variables for this study will include the frequency of use of universal procedures compared with the frequency of use of gloves and gowns byhospital staff in the course of their interaction with MRSA patients. These variables will help to determine the incidence of infections transmitted from MRSA patients under study to other patients and staff members in the hospital.It will include the instances where

Tuesday, February 11, 2020

Social Network as Facebook is Not Safe from Hackers Essay

Social Network as Facebook is Not Safe from Hackers - Essay Example Social networks such as Facebook result to the interconnection of millions of people from all over the world thus bringing diversities and similarities in close interactions. In this regard, Facebook offers an effective opportunity for people from different backgrounds to identify their similarity and therefore converge through chart rooms and groups or pages; for instance, the Facebook group of people opposed to the Revolutionary Armed Forces of Colombia is one such example of how people of similar interests converge on social media. However, this joining of different people with similar interests makes such individuals in those groups vulnerable to different forms of abuses at the same time. Hackers with ill intentions of compromising and sabotaging information communication systems have emerged and greatly undermined the reliability and security of information, and Facebook, like other communication systems, is not safe from hacker activities. Hacking refers to the unwarranted acc ess of other people’s online databases and directories; hackers are targeting personal information in personal Facebook accounts such as passwords, confidential data, secrets, among other things, with malicious intentions whose sole purpose is to harm the victims, thus breaching individual privacy on social networks. With the growing number of internet users, the highly porous nature of information systems, and features of service providers including the social networking sites that make it possible for unwanted users to access other peoples’ databases, social networks as Facebook are not safe from hackers. There are numerous reasons and explanations why Facebook is not safe from hackers; for instance, nowadays there is increasing use of social network for business transactions and advertising, even though the platform is strictly meant for personal relationships (Lu?sted 10). In this case, hackers abuse social network as businesses by stealing vital information such a s company trade secrets or operational blue prints thereby compromising the businesses. Investigations into cybercrimes are curtailed by the mere fact that the internet has transformed the world into a global village thus allowing hackers to commit crimes from any location of the world and go scot-free. Cyberspace security has also been largely compromised by the increasing internet population in addition to the aspect of anonymity that allows users to disguise themselves on social networks such as Facebook using fake account details while seeking to commit cybercrimes. New inexperienced Facebook users are particularly vulnerable to hacker attacks because they are yet to learn how to utilize the complex security features of the internet on the platform. Hackers can take advantage of the privileged personal information stolen from private accounts on Facebook to cause untold havoc and damage to personal and business relations; for instance, hackers may impersonate individuals to comm it cybercrimes or damage reputations of individuals. Perhaps the most serious consequence suffered by victims of hacking activities is the loss or destruction of vital information thereby compromising the entire systems network. Research Statistics provide evidence of the hackers and hacker activities, for instance, a recent research by the Privacy Clearing House reports indicate that over 1oo million records have been compromised since February 2005, and over 80 million cases were due to web hacking attacks. A similar research at Acunetix reports findings that about 75% of cyberspace attacks occur at the web