Wednesday, November 27, 2019

Ban of medical marijuana dispensaries in Santa Clarita Essay Example

Ban of medical marijuana dispensaries in Santa Clarita Essay Example Ban of medical marijuana dispensaries in Santa Clarita Paper Ban of medical marijuana dispensaries in Santa Clarita Paper Under 1995 Compassionate Act, it is legal to use, posses, and cultivate medical Marijuana in Santa Clarita. Acquiring, and possessing medical Marijuana is quite easier than any prescribed drug with a doctors presciption. According to the Act, patients are allowed to purchase Marijuana in medical dispensaries, or on the streets provided they have a doctors recommendation, and if they are California residents (Signal). This is usually proved by producing an identity card and a doctors prescription. This is usually used to ensure Marijuana is used, and cultivated for medical purpose, rather than recreational. In many California cities, use of Marijuana is illegal, but in Santa Clarita, it is not a crime to use and cultivate Marijuana as long as the law terms and conditions are applied. Possessing up to twenty eight and half grams of Marijuana is considered as an unarrestable offense, especially if the individual produces sufficient proof to be a resident, and agrees to appear before the court. After conviction for possessing such amounts, a fine of $ 100 is charge, but possessing greater amounts of Marijuana, the offense is considered punishable, and the offender is sentenced in jail for six months, and are charged a fine of $ 500 (MPP). In Santa Clarita, Marijuana is usually found anywhere, especially on sierra highway condos. It is common and popular such that every body between the age of fifteen and twenty five, regardless of color or race. Marijuana has various blends and categories in the city. Among all, medical bud is considered to have greater medical benefit, a factor that makes its price to be higher than others. Marijuana dispensaries in Santa Clarita are legalized by the States government, to supply medical Marijuana to all people who prove to be California residents, and who have doctors recommendation bas a prove of their illness. With these prove, individuals are allowed to cultivate the recommended amount of Marijuana and to use it at home without being arrested. The law protects doctor recommendation to Marijuana users under condition they use the recommended amounts of Marijuana without exceeding the dose. They are expected to use it solely without selling it to other people (MoI). Reports of various tests and experiments show that marijuana can be used to treat illnesses, and disorders such as; post traumatic stress disorder, severe anxiety, arthritis, migraine,glaucoma anorexia as a result of chemotherapy, HIV/ AIDS among others. However, in Santa Clarita, many people use Marijuana for other purposes other than medical. Not all people who use, posses or cultivate Marijuana are sick. Although they usually produce doctors recommendation to escape arrest, the recommendations are either fake or invalid the substance for recreation purposes, and use doctors recommendation as a shield to cover them up against arrest, conviction and charges (Indalecio 70). This has increased the use, possession and cultivation of Marijuana in Santa Clarita, as it is hard to tell who is using it for medical purpose, and for pleasure. Although Marijuana has medical value, its negative effects outweighs the benefits. This has caused conflict and arguments between Federal and State law in Santa Clarita. The Federal law is against the use, possession and cultivation of Marijuana; considering the substance to have many harmful effects to the users, people in the society, and the environment. States law Considers use of Marijuana to have medical benefits (Jan 42). The city council of Santa Clarita, has voted to ban medical Marijuana dispensaries, against the States law. Arguments on the ban of Medical Marijuana Dispensaries. The Federal law, and its supporters such as the city council of Santa Clarita, argues that majority of of Marijuana users are actually sick, and their health does not require Marijuana, and since they need Marijuana for recreational purposes, they decide to get a doctors recommendation to be able to freely access and use the substance without being arrested, convicted, or being fined. They get Marijuana from legalized Medical Marijuana dispensaries (DrugSense FOCUS Alert). The presciption they use as evidence to doctors recommendation are usually invalid. The users make a deal with doctors who recommend use of Marijuana at a pay. In this case, doctors make many false recommendation in order to get high amounts without considering the harm they are subjecting these individuals to. Medical Marijuana dispensaries end up selling Marijuana to wrong people without knowing that the recommendation is invalid. People study the literature on medicinal uses of Marijuana. They get the knowledge and information about the conditions, and symptoms the substance can treat. With the knowledge, people fake condition that would require prescription of Marijuana. Some of these conditions and illnesses, such as pain cannot be tested in a laboratory, so it becomes hard for doctors to determine the actual health status of the patient. They rely on the information provided by the patients, and which in most cases can not be evidenced. Doctors end up using the clinical signs and symptoms to prescribe Marijuana; the persons interest. Once the doctor has recommended use of Marijuana, the Medical Marijuana dispensaries dispense it without knowing the actual health status and requirement of the of the Marijuana to the user (Weedguru). The fact that Marijuana is common, popular, and allowed to be sold to recommended user at any place makes many people to participate in illegal trade at anyplace. These supplies are located near schools and parks. Easy access motivates young children to use substance, while still at school limiting their concentration and participation school. The process of buying and selling of Marijuana near schools and parks is usually distracting. If the medical Marijuana dispensaries can be banned, supply and use of Marijuana can be reduced, as there would be no legalized suppliers, since many people use the legalized medical Marijuana dispensaries to purchase Marijuana for recreational purposes. Medical Marijuana dispensaries, have influence on crimes. In Santa Clarita, crimes such as robberies, burglaries and sale of illegal drugs, especially outside Marijuana dispensary, are related to Marijuana (Zachariah 408). Medical Marijuana, especially the bud is usually sold at higher cost than the others. The crimes are committed either to earn money to purchase and maintain a consistence access of Marijuana, or by users through the influence of Marijuana. The crimes are increased in urban areas where the medical dispensaries are located. The City Council of Santa Clarita consider having the Marijuana dispensaries banned to reduce the number of crimes. In Santa Clarita, medical Marijuana is legalized but the dispensing Marijuana is against the Federal law (Shohov 121). A ban on legalized Medical Marijuana dispensary would mean destroying the back up of illegal dispensing, and a subsequent collapse. This is likely to reduce the use of Marijuana in Santa Clarita. Marijuana has THC as its active ingredient. Doctors recommend Marijuana as a source of this medically beneficial ingredient, which is believed to relieve and manage pain. Many users argue that banning Medical Marijuana dispensaries will limit the access of this beneficial ingredient of Marijuana , and patients will be be suffering prolonged pain (Brust 140). This argument is not sufficient to oppose the proposed ban of the dispensaries in Santa Clarita, since there are other medicines which are presented in form of pills and injectable which can be used to relieve and manage pain, rather than smoking Marijuana. The pills and injectables can be purchased from pharmacies, and medical facilities meaning that even after the ban of medical Marijuana dispensaries, patients can have pain managed by the other medicines from the pharmacies (Earleywine 148). Although Marijuana manages pain, there are other better, safer, and effective medicines which have negative side effects. Marijuana as medicine, has many negative effects to the user, other people and the environment. Its side effects to the user outweighs its benefits. Tests reports show that pot smoking destroys the respiratory organs, brain, heart, lungs and suppresses the immune system. Reports have associated Marijuana with chronic intractable illnesses especially to the habitual users (Alison and Joy 26). The smoke produced by Marijuana is a toxic pollutant. Studies show that the smoke has about two thousand chemicals which occur in a mix that cannot be be measured, predicted and deter ming their stability is hard. This means that those who use Marijuana are at risk of disorders and illnesses caused by the chemicals in the smoke. The smoke also posses problem to neighbors, since the smoke is emitted to the atmosphere (Alicia 1077). Neighbors of smokers inhale the contaminated atmospheric oxygen, and gets effects similar to the smoker. Although non-smokers suffer the harm without knowing, even with the knowledge, there is nothing they can do to save the situation, but if medical Marijuana dispensaries can be banned, the supply of Marijuana can be limited securing their health. Legalizing medical Marijuana is likely to pave way for legalizing other harmful illegal substances. Since there are other illegal substances containing beneficial medical ingredient, the medical Marijuana dispensaries are likely to dispense other harmful substances claimed to have medical benefits (Gieringer 42). A ban of the existing medical marijuana dispensaries will give a sigh of relief since the probability using other harmful substances will be low. Marijuana has both physical and psychological effects, such as loss of short-term memory, and respiratory related illnesses. Although Marijuana has medicinal ingredients, the medicine can only be taken through smoking, a factor that predisposes the user to illnesses related to smoking. For example, smoking Marijuana is likely to relieve pain, but it increases chances of lung cancer, as the smoke is carcinogenic. Marijuana influences its users to a continuous use. When an individual starts using Marijuana it causes a continuous need making the user to continually use it. Studies show that when Marijuana is used continuously chances of losing motivation in many areas in life increases. Users are likely to be trapped, and its negative influence on users motivation has showed poor performance of the users in their career, studies and other day to day activities. Habitual users of Marijuana have a tendency of forgetting thing after a very short time (Schrag 135). They forget very vital things which causes problems to their health, life, and other peoples in the society. For example, a n habitual user of Marijuana is likely to forget medical appointments causing inconsistence in their treatments. When driving they are likely to forget they are sharing road with other drivers and vehicles, causing accidents. They are likely to lack motivation to attend business meeting, where they are expected to represent their Company, a factor that can make their employers to punish them, or even fire them. People need to perform various duties in their life, and need to be responsible as long as they live with others in the society. People need to work to earn income for effective living, and need to attend medical appointments in a consistence manner to ensure that treatment is effective (Boire and Kevin 171). Since many people take Marijuana as medicine to the illnesses they need to follow appointments for effective treatment and recovery. If a patient can forget an appointment as a result of smoking Marijuana a medicine,then it means that the medicine does the patient more harm than good because the more Marijuana is taken to treat the more the loss of memory a greater problem. Use of Marijuana as a medicine need to be stopped, and be substituted with more effective medicines which reduces the patients illness, rather than adding more serious conditions. This can only be achieved by banning medical Marijuana dispensaries to cut the supply of Marijuana. Studies show that Marijuana impairs mental dexterity and visual skills. This has causes many problems and deaths in Santa Clarita. For example, users of Marijuana are not restricted from driving and riding (Cole 8). What happens is they use Marijuana and drive, or operate other machines. This causes many accidents and injuries in the city. Literature shows that use of Marijuana leads to systemic hypertension and can impair peripheral vasomotor, reflexes and nerves. It influences blood flow to the central nervous system, and limits the auto regulation of cerebral vascular Habitual users have show to be at a risk of stroke as a result of poor blood circulation in the central nervous system. Analysis made on the respiratory system of habitual users of Marijuana shows that Marijuana smoke deposits large amounts of tar in the lungs and the bronchioles. When smoked, the smokers hold s the smoke for some time. Similar studies show that the users of Marijuana have an increased mortality rate and a decreased life expectancy (Crotty 177). This is a threat to Santa Clarita, since the city is under crime, health and financial crisis as a result of increased use of Marijuana. Summary Analysis of the medical benefits of Marijuana particularly in Santa Clarita, it is clear that it has more harm to the users and the society at large. Smoking Marijuana influences the criminal behavior in the city, causes physical and psychological harm to users and their neighbors, increases death and mortality rate, and retards the economic development of the city. This shows that it is better to prohibit the use of Marijuana, and substitute it with other medicines which can effectively treat similar conditions and illnesses with little side effects to the user, and the entire society. This explains the reason why the City Council of Santa Clarita, and the Federal Law vote for ban of medical Marijuana dispensary. References: Boire, Richard and Kevin, Feeney. Medical Marijuana Law. New York: Ronin, 2007. Brust, JCM. Neurological aspects of Marijuana abuse. Boston:Butterworth-Heinemann, 1993. Cole, Spencer. New research on street drugs. Boston: Nova, 2006. Crotty, William. Americas choice 2000. New York: Westview,2001. DrugSense FOCUS Alert. Medicinal marijuana a mine field March 29, 2001. Lauderdale Sun-Sentinel. May 15, 2008 mapinc. org/alert/0201. html Earleywine,Mitchell. Marijuana and the costs of prohibition. New York: Oxford University,2006. Gieringer,Dale. Medical use of Cannabis in California. California: Haworth , 2002. Indalecio, Lozano. Therapeutic use of Cannabis sativa. Cannabis Therapeutics 1. 1 (2001): 68-70 Institute of medicine. Marijuana as Medicine? : Science beyond Controversy. 2000. NAS. May 15, 2008 http://books. nap. edu/openbook. php? record_id=9586page=38 Jan, Ziegler. Medical use of Marijuana. Hospitals and health networks 71. 12 (1997):40-45 Marijuana Policy Project. California and National organization for reform of Marijuana Laws. 2007. CANORML. org and NORML. com. May 15, 2008 webehigh. com/city/detail. php? CITYID=2335 Schrag, Peter. California: Americas High-stakes Experiment. California: University of California, 2008. Shohov, Tatiana. Medical use of Marijuana. Boston: Nova, 2003. Signal. Santa Clarita should leave the weed to the West side. Apr. 23, 2006. Signal Newspapers Opinion. May 15, 2008 http://forums. cannabisculture. com/forums/ubbthreads. php? ubb=showflatNumber=1164228 Weedguru. Negative medical effects. May 15,2007. Weedguru. com. May 15, 2008 weedguru. com/agamed. ph Zachariah SB. Stroke after heavy marijuana smoking. Stroke. 22 (1991): 408.

Sunday, November 24, 2019

Latin American History

Latin American History Introduction There are several changes that Latin America has experienced overtime like any other region in the world. The changes have occurred despite the challenges of corruption, inadequate resources, and violence among other detrimental issues.Advertising We will write a custom essay sample on Latin American History specifically for you for only $16.05 $11/page Learn More Changes At Different Periods Of Time The changes at different periods of time have been divided into eight periods that have contributed to Latin America’s history. The periods include: The pre-colonial period, discovery and conquest period, colonial period, piracy age period, the period of independence from Spain, nineteenth century period, twentieth century period, and the modern period. The discussion of the periods enables one to have a deep understanding of the changes in Latin America since time immemorial. The pre-colonial period This is the period before 1492. Not much o f the history of this period is known because during that specific period, less documentation of events occurred. The little history that exists reveals that many cultures existed and only a few cultures ruled and exercised their religions. All the other cultures adhered to the religion of undertaking agricultural activities, going for war, and worshiping. Discovery and Conquest This started in the year 1492. As depicted by the name of the period, many discoveries occurred as there was much sailing. In 1553, the cultures that used to dominate were civilized as a result of the discoveries. Conquests also occurred in form of resistance to the European domination. Latin Americans, Spain, and Portugal who were the dominant populations resisted the rule of Europeans despite the powerful weapons used by the Europeans and their ruthlessness. The colonial period Latin America was tired of wars and other adverse calamities. The period of colonialism took place from around 1492 to around 1810 . That period brought many changes and advancements to the current Latin America.Advertising Looking for essay on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More The original cultures were weakened and forbidden due to the low populations. Exploitation of the Latin Americans was rampant. Their powers were neglected by all means and their history was restructured. Latin Americans therefore fought for their identities and are doing so to the current times. Piracy period The period was dominated by piracy as a way of life. European powers were too much. The period occurred in the year 1700 to 1725. The conditions in this period gave residents a golden opportunity for piracy. Many pirates were killed and therefore, most people did not opt for it as a way of earning a living unless when the golden opportunity presented itself. The pirates had set rules to guide them. The rules included honesty and accountability and the rules gu ided their activities. The consequence of not abiding by their rules was countered with punishment in the form of one being ostracized from the group. The pirates were made up of all social classes. The period of Independence from Spain The period occurred when Spain was invaded by Napoleon and conquered. Latin America got independence between 1810 and 1825 because of its strong leadership then. During this period, Spain was weak because it had divided itself into colonies. Nineteenth century period In 1824, Latin America gained independence. It passed through several challenges of learning and adjustment to govern itself. Wars occurred as the people adjusted in their attempts to enhance prosperity (Edwards, 12).All the nations in Latin America experienced war except Argentina which had adopted its own constitution invented by Juan Bautista. He was a critical and creative thinker of the period. He enabled Argentina to be stable and peaceful during the time of conflicts and during ot her related struggles. The nations that borrowed his ideologies enshrined in the Argentinean Constitution also became stable. Twentieth century period Many revolutions occurred. The most prominent war during this period was the â€Å"Thousand days war†. The war took place in Columbia from the year 1899 to the year 1902. The root cause of the war was the existence of both the liberals and the conservatives.Advertising We will write a custom essay sample on Latin American History specifically for you for only $16.05 $11/page Learn More The individuals with liberal ideologies supported the changes that accompanied the independence while the conservative individuals rejected the changes brought about by the independence. The conflicts brought about some adverse effects in the all the nations of Latin America. Many people died. Rivalry, violence, and hatred dominated the nations of Latin America during this period. Modern period The period had several rev olutions in the key sectors of industrialization, education, health care, and land reforms. Many industries came in to existence and the few that existed began to enhance their operations (Rangel, 4). The education and health sectors improved in their operations to include both the poor and the rich residents. The revolution made the sectors affordable, accessible, culturally acceptable, and sensitive to needs of the nation. Modernization in the form of transportation and infrastructure also advanced. Conclusion In conclusion, the changes that have taken place in Latin America are responsible for the rapid development of Latin America. The development in the domains of the economy, society, politics, and law is attributed to the continued inventions by the people of Latin America and their aggressive attempts to fight for their existence. Edwards, Sebastian. Left Behind: Latin America and the False Promise of Populism, Chicago, USA: University of Chicago Press, 2010.Print. Rangel, Carlos. The Latin Americans: Their Love-Hate Relationship with the United States, New York, USA: Harcourt Brace Jovanovich, 1977.Print.

Thursday, November 21, 2019

International Service Quality Mystery Shopper Essay

International Service Quality Mystery Shopper - Essay Example In short, mystery shopping is a tool that helps companies in understanding where their services stand and helps them to rectify the problems their customers face and improve their services. 1 Mystery shopping was basically developed in the 1940s and 1950s in order to expose the deceitful employees that were working for companies. In the early days, much of it was carried out by private investigators and many had no idea about what the term actually meant. With the passage of time, many of the companies realized that the information revealed with the help of mystery shopping services was far more authentic and important in helping to improve their business. Also, the information revealed about customer care service issues, safety and environment were also considered important and service providing companies realized that the information about the operations was far more important than any other data (Ilisha, 2004). The most common places where mystery shopping techniques are applied are the services industry, such as movie theatres, restaurants, banks, fast food chains, health clubs etc where much emphasis is paid on the service quality and their customer base and reputation is dependent on it. Therefore, the management of these companies make sure they have sound methods and techniques to gauge their services in a non-biased way in order to correct any faults.2 HOW IT WORKS A mystery shopper first has to register himself/herself to an organization specialized to conduct mystery shopping. There is a Mystery Shopping Providers Association with which companies are registered and provide mystery shopping services to the people. The mystery shopper once registered, is given an assignment, specific to the area in which he or she is living and a number of topics on which he or she has to undertake the assignment. Most of the dealings between the company and the mystery shopper are done online which reduces the hassle of paper work for the mystery shopper and it is a source of easy money for many. MYSTERY SHOPPING AND MARKET RESEARCH Mystery shopping is considered as a tool of market research as it helps to understand the market a company is catering too. However, it is different from market research on many accounts. Mystery research is more associated to operations research. Mystery research is more of an operational research that provides feedback on quality control, training and inducement purposes. These shoppers are specially recruited in such a way that their demographics and social profile is similar to the target market of the organization. Mystery shoppers also visit certain areas and on certain times, it cannot predict every customer's opinion and experience of the service (Mystery-Shoppers.co.uk, 2008). Also, customer satisfaction cannot be gauged because a mystery shopper is just a job that the shopper is doing and customer satisfaction relates to the subjective idea of a real customer's thinking. Therefore, mystery shopping should just not be used to gauge customer satisfaction. Mystery shopping provides us with a unique feedback of the customer and the people who are the mystery shoppers exactly know what they have to evaluate and the front line workers who are being evaluated have no idea about it. However, ethical

Wednesday, November 20, 2019

Information Security Essay Example | Topics and Well Written Essays - 750 words

Information Security - Essay Example The next morning, Barry McPherson, their EVP, released a statement that was well phrased, but still unapologetic. Again, this was the wrong person to give such an announcement. The public relations and brand management team should have been the first people to make the announcement as it hurt their company’s image. The fact that the announcements were made by a spokesman and the EVP was damaging since their announcements came off as unapologetic, considering the major inconveniences suffered by their clients. The apology eventually came from the EVP, followed closely by the CEO three days after the malfunction of their anti-virus software (Harkins, 2013). This was too late, and the damage to McAfee as a trusted brand had already been done. If the CIO had liaised with the brand and public relations people, the issue would have been solved with less frustration from the clients. In this aspect, while McAfee was able to arrest the situation with relative speed, the communication of the malfunction was more damaging than the malfunction (Harkins, 2013). The effect that the anti-virus malfunction had on ordinary everyday computer users shows that the world is becoming too reliant on information systems. They have taken over the everyday running of organizations, as well as daily planning for individuals. Information systems are now used to store most of the information and transfer the information (Harkins, 2013). The use of cell phones and computers to communicate has gone up tremendously in the last ten years. It is almost impossible to imagine what life was like when one had to use a cell phone or write a letter. Increasingly, enterprises are transacting businesses using technology and most accounting is now information system based. The use of information system has also become indispensable to decision making and logistics for most medium and big organizations (Harkins, 2013). Finally, even government agencies are now reliant on information systems. This shows that, as a society, information systems have begun to define how man interacts with information. The advancement of information systems have been good for society and arguing otherwise overlooks how easy it has made decision making at multiple levels. However, this heightened use has ensured that the law of unintended consequences will apply (Harkins, 2013). In the case of any breach or failure for these systems, the consequences will be far reaching, particularly, if it is on a large scale. Over-reliance on information systems has made society a little more vulnerable. The use of passwords and pin numbers to guard these systems is basic to the threatening vulnerability. Because the society now uses interconnected systems for majority of their activities from banking, to food supply, to power, if anything goes wrong with the systems or they are sabotaged, the effects will be widespread. The collapse of information system networks due to cyber-attacks by terrorists or system f ailures, there would be mild paralysis (Harkins, 2013). As can be seen, the McAfee anti-virus update failure caused a lot of inconveniences to their clients. The reimbursement for reasonable expenses was the right thing to do, particularly for those home clients who were hit by the fault. In fact, McAfee was obligated legally to reimburse its clients (Harkins, 2013). Software is dealt with in the US and EU by the consumer guarantee act and other similar acts These require that, in a situation where

Sunday, November 17, 2019

Art of Negotiation Assignment Example | Topics and Well Written Essays - 500 words - 1

Art of Negotiation - Assignment Example Effective negotiation skills are the solution to every conflict despite the extent of the conflict. Leaving the money on the table is a lose-lose negotiation skill. In a lose-lose situation, both parties in dispute end up being worse off. Each party in this situations feels that they have lost and therefore none claim being discriminated against. In some case, a win-win option is available but the involved parties are not aware. In the case of two prisoners being convicted of similar crimes, a lose-lose, win-lose or win-win situation can happen. This depends on how the criminals individually respond to the allegations against them. If both the criminals confess to the charges are maximum equally sentenced lose-lose situation occurs. If neither of them confesses to the charges and a minimum sentence is laid on them, then they experience a win-win situation. However, if one prisoner accepts and the others decline the allegation at the expense of the other, making his or her opponent face sentence alone, then a win-lose situation occurs. In many countries, elections are bound to have some disputes especially after the announcement of final results. None of the candidates believes and wants to accept the fact that they have been defeated. Therefore, allegations are made on petty issues such as biased counting of votes, bribing of voters, ineffective electoral process, and instrumental failure among others. In such situation, an effective negotiation skill has to be put in place to avoid long and short-term effects to the nation. For instance, war and rivalry among communities. As a negotiator, I would use my negotiating skills in this situation in a wise manner. In the case of some of the allegation by the loser has some basis, the lose-lose situation would have to take place.  

Friday, November 15, 2019

Computer Security And The Threat Of Hacking Computer Science Essay

Computer Security And The Threat Of Hacking Computer Science Essay Computer security is a safety operating system that is an important feature to install on a computer. It ensures safety and protection from unknown users and threats. If a safety operating system is weak, unknown users, or hackers, are able to break into the database and install harmful viruses, as well as steal personal information. Computer security and hacking can have both disadvantages and advantages. Computer security has evolved from early on to being a key component to own. Hacking, as well as computer security, has developed into a more harmful and dangerous activity. Currently, security programs have been developed to stop hacking and viruses from encroach onto a users computer. Computer security and hacking have had impact on society today, globally and locally. Users use computer security to their benefit when keeping personal information stored on their database. Hacking can destroy a users identity, or possibly their reputation. Businesses and organizations have benefit ed from security, by its protection of information and protection from outside harm. Hacking can be used as a good way to check a computers sustainability to dangers through networks and the internet. Computer security and hacking are two important issues discussed and recognized today. Computer Security is an important element of safety precaution when using a computer. These operating systems run on computers to ensure the safety of personal and financial information, along with protection. Computer security can be a very useful component to acquire [1]. If an unknown user tries to access a computer database, computer security will ensure that that user will not be let in [2]. Besides keeping unknown users out of others computer databases, computer security also provides protection from harmful threats and viruses. Once these viruses find their way onto a users computer, information and control access can be stolen [3]. There are significant advantages and disadvantages of having a strong computer system, one advantage being protection from viruses and other harmful attacks [4]. Hacking has found its way into the world of computers. Hacking can be destructive, harmful, and can have some bad impact on peoples lives. If a computer system is not protected by a security operating system, hackers can find their way into that database easily. Once in, hackers can obtain personal, financial, and important information [5]. This can cause ruin in a users business and personal life, and much more. While being branded a bad thing, hacking can help many as well. Some hackers are able to test the reliability of a computers security system, to find weak spots in the barrier [6]. Like computer security, hacking can have both costs, but benefits too [2]. The purpose of this report is to allow computer users to gain insight on the aspects of computer security and the ethical issue of hacking. Computer security can allow users to feel comfortable knowing their personal information is being kept hidden. But even with a high-level computer security system, one is still vulnerable to a hacking intrusion. A computer users private information, such as social security, credit card numbers, passwords, email addresses, and other information is at risk to being taken. There are a number of objectives covered in this report. First, computer security is used to keep personal, financial, and other private information kept confidential. Second, computer security blocks viruses and attackers from encroaching on ones computer. Third, even with this security, one is still susceptible to a hacking attack. And lastly, hacking can be easily hurtful, but could in some cases be just as helpful for users. The main contents of this report include computer security, and the issue of hacking. Computer security is described as a protection technique for personal information, and for blocking unwanted threats from the internet. Hacking is described as being a harmful way to obtain information from other users databases. Viruses and threats are each described in order for other users to know the differences between them all. Also in this report are ways to check a computers security and ways to keep it protected from harm too. 2 Background 2.1Computer security is an operating system used on computer databases to protect and provide safety to users. Besides preventing unauthorized access, computer security provides protection for personal, financial, and classified information [1]. One type of this security system requires a validation of a username and password provided by the user, in order to gain access into the computer database [2, pg.267]. Besides validating who the user is, it also confirms that the user is not trying to attempt an unlawful operation [2, pg.31]. As shown in Figure 1, computer security requires a key, or username and password, in order to access the database. Many businesses and organizations have benefited greatly from this operating system, because it allows their private information to stay confidential and secret [1]. http://comtrec.com/wp-content/uploads/2010/05/Computer-Internet-Security.jpg Figure 1 Picture representing the security operating system, with the binary representation inside a computer. Computer security had begun physically in the 1950-60s. Computer systems then were guarded by security officers, to stop the attempt of gaining unauthorized access. Later on in the 60s and 70s, access could be granted over telephone lines, which caused a change in the way computers were externally guarded [2, 266-7]. By the 90s, companies sprang up to provide a more modern way of securing computer systems. Secure Sockets Layer (SSL) was developed by Netscape Communications, (which was an early web browser) to get secure transfer of info when buying online. By 1999, the Transport Layer Security (TLS) had been developed, and was very similar to the Secure Sockets Layer, but with a few important improvements [2, 350-1]. Hacking can be defined as the encroachment of ones personal or business computer system by an outside source [7]. Hackers, or the outside sources encroaching on the personal computer, can have many motives to these intrusions. Some hackers have admitted to only wanting to enjoy the challenge of overcoming a security system [8]. Other hackers have admitted to wanting private or financial information for their own personal gain [7]. There are different ways a computer can be hacked into. These ways include: through downloads, internet-based programs, and through fraud emails. Through these, hackers can plant viruses and attacks which make it possible to overcome a security system [3]. A hacker has had many definitions from early on. In the Middle Ages, a hacker was in the business of creating tools known as hoes. Later on into the 17th Century, a hacker had become a strong worker that handled a hoe. Today, a hacker has nothing to do with an actual tool, but is capable of being a strong worker, when it comes to intruding upon anothers computer system [2, pgs.657-8]. The earliest form of hacking was known as phreaking. This involved hacking using telephone lines [9, pgs.12- 13]. 2.2There are a number of advantages and disadvantages when it comes to computer security. Some advantages include: greater storage space, resource and file sharing, an increase in cost efficiency, and security of private information. Some disadvantages include: the expensive cost, it could have a number of weak spots, and some security issues [4]. Hacking has some important costs and benefits when it comes into play. Some costs include: the owner loses control over his or her information, harmful viruses and threats on users computers, and loss of data either being intentional or unintentional by hacker. An important benefit is ethical hacking, because users can determine where the weak spots in their system are [2, pg.659]. 2.3 There are some theories to deciding whether hacking can be good or bad. In some ways, it can be dangerous, hurtful, and devastating. Many can lose their personal information, such as social security, credit card numbers, emails, addresses, and much more, and can be left with nothing. In some ways, hacking could be a good thing. This is true because many hire ethical hackers to test their computers security strength to find weak areas in their systems. It is an undecided theory, because hacking can be labeled good and bad, and each argument can be supported [2, 659]. 2.4 A class for viruses, threats, worms, Trojans, spyware, and other forms of attacks is known as malware. [7]. A small portion of software that can enter a users computer secretly and in other easy ways is known as a virus. Trojans are similar to a virus, but different in the fact that once installed, it allows the Trojan horses creator the ability to see everything on the users computer. Spyware is capable of being installed within a users database with or without the user having knowledge of it [3]. These types of threats and attacks are hidden within programs that come as fake emails, internet-programs, and downloads. Figure 2 below demonstrates all the different types of harmful threats that can be uploaded onto your computer by hackers. http://www.dreamstime.com/computer-and-network-security-hand-thumb4123007.jpg Figure 2 This is a collection of all the different types of viruses and threats that can be harmful for a users computer. 3 Computer Security and Hacking 3.1Society has been impacted by computer security in a number of ways. Computer security ensures users that their personal, financial, and other information will be kept secret from the eyes of others. It impacts businesses and organizations by keeping their confidential data safe from view and harm and helping them in staying successful [1]. It allows users to share files and resources, an increased amount of storage space, and an increase in cost efficiency [4]. As well as protecting information, computer security has impacted users and their computers from nasty viruses, threats, and malware as well [3]. Computer security is an important piece of technology that has impacted society since its beginning. Hacking is impacting society today in many ways. Hacking impacts users by taking their personal information, and could possibly display it over the internet [7]. It is causing an increase in cost for companies and organizations to fix their computer systems after a security breach, and to obtain better security. There has been recent documentation dealing with an increased amount of threats found in web sites that can easily be uploaded onto databases. [10]. Hacking impacts businesses and organizations if these do not have a strong security system. Hacking can have a number of impacts on society, especially taking personal information from other users [5]. 3.2 Computer security involves another component, called a firewall. This component, software or hardware, is made to block unwanted threats and viruses from a users computer. A firewall is used to prevent the intrusion of hackers, viruses, and many other threats from gaining access and information onto a computer [11]. An example of a strong firewall that provides protection and dependability is the Cisco PIX Firewall [10]. A well-known security system used by many is called Symantec. Symantec had originated in 1982. It has become the worlds largest software company, with business internationally, and with over 17,000 workers. Symantec ensures security of the computer, its infrastructure, and all the components within it. Symantec has a research lab where new technologies are developed to ensure even more security [12]. Norton AntiVirus is Symantecs current security program. Norton provides safe networking, protection online, and a scanner to check for viruses and threats. Norton is a very trusting program, because it ensures safety for users and for their computers. Figure 4 is a picture of the program Norton AntiVirus. Figure 5 represents the Norton program at work. This main screen alerts the user if their system is not secure, and what types of protection the user would like to be on or off. [12] http://www.amitbhawani.com/blog/wp-content/uploads/2010/06/Norton360-Box-Package.png http://www.windows7hacker.com/wp-content/uploads/blog/DownloadNortonAntivirus2010BetaonWindows_E88F/NewNortonAntiVirus.png Figure 3 Picture of the Norton Figure 4 This figure represents the Norton AntiVirus program AntiVirus main screen 3.3 Even though hacking is labeled as dangerous, some have found hacking to be a blessing. Some computer users hire ethical hackers, which are those who imitate an actual attack onto a users computer system, in order to test that computers security system and its blocking power. While imitating this attack, ethical hackers are also looking for weaknesses within the system, and what could be stolen in a real hacking attack [6]. Another way to check a networks security is by sending a vulnerability scanner over the computer. Like ethical hacking, a vulnerability scanner will check for weaknesses in the security, and will increase the security as well. Besides scanning for weaknesses in the security wall, users should consistently be checking their computers for any type of threats or attacks. If these threats or attacks are not resolved, all types of malware could corrupt the database [10]. 4 Conclusion Computer Security is described as being a protection mechanism for computer databases. This mechanism can come in different shapes, styles, and forms [1]. One of the types of computer security is a validation code. The user of the computer must provide his/her own username and password to access the database [2]. Another type is AntiVirus security, such as Norton AntiVirus by Symantec. This program will provide protection from harmful threats and viruses, and hackers as well [12]. Computer security has provided many with comfort knowing that their private and financial information will be kept safe from other eyes on their computers. Big companies and organizations have benefited from computer security, because with it they have a comforting feeling that their important information will be kept safe [1]. Hacking is a dangerous and unfortunate activity that occurs on vulnerable computers [7]. Hackers find their way into other users systems, and depending on what they want, credit card numbers, social security, or anything of the like, they are likely to succeed in getting [5]. Hackers can plant harmful viruses and threats into a users system with or without that user knowing [7]. It can be a very upsetting and unlucky event to happen, because users are susceptible to having their personal information stolen or revealed to the public [2, pg.659]. But in the light of things, hacking could be a good thing for some users. Ethical hacking can be a useful method for checking a computers security barrier. It finds the weak spots that a computer hacker, virus or threat could enter the database through [6]. There are ways to improve computer security and to keep hackers and viruses out of computer systems. Ethical hacking could be a method used to find the vulnerable areas in the security, which would inform the user that better security is needed [6]. Similar to ethical hacking, a vulnerability scanner runs over the system scanning for weak spots, and improves security too [10]. Certain antiviral programs could be purchased and installed to increase security. Such programs as Norton AntiVirus will alert the user of any threats, scans the system, and will keep a computer safe [12]. There are conclusions Ive drawn from researching computer security and hacking. First, computer security is a very important component to have on a computer. Businesses and companies have impacted from it, because they are able to keep valuable information stored on their computers. Without it, users should not be on the internet or network at all. Hacking can be a very uncomforting and hurtful activity to users and their computers. Users can have their private and financial information taken from them, as well as being made public. There are many types of viruses and threats that can harm users computers, especially the ones thought to be low risk. The reason I drew these conclusions is because they are important things to know and understand. If one is naÃÆ'Â ¯ve to the risks of the internet and hackers, their computers, as well as themselves are in peril. There are some issues that I would like to address in future studies. I would like address the issue of weak spots in a computers security. I would like to see this security to not have these weak spots, and to fix them before using them on computers. Second, I want users to realize how dangerous it is to not have a computer security operating system, before they find it is too late. I would like to see programs such as Facebook and MySpace not allow users to put as much information as they allow now. Because of this displaying of information, many are susceptible to danger. I would like these issues to be addressed in future studies.

Tuesday, November 12, 2019

Religion Essay -- Philosophy, God

â€Å"Truth, in matters of religion, is simply the opinion that has survived,† was a statement made by Oscar Wilde. (Dawkins, pg. 222) In Richard Dawkins book, â€Å"The God Delusion,† regards the argument of the supernatural being in religion being not feasible. Richard Dawkins proposes his argument â€Å"with rigor and wit, Dawkins eviscerates the arguments for religion and demonstrates the supreme improbability of the existence of a supreme being.† (Dawkins, 2008) Moreover, the author uses vital assessments by allocating the origins of the religion, analysis of the Darwinian natural selection and other metaphysicists that are the contemporary reasoning for phenomenal causes, and the justification of God’s existence. Therefore, the purpose of this novel is to question and scrutinize our religious beliefs. This was shown when Charles Simony, a professor, had said, â€Å"This brilliantly argued, provocative book challenges all of us to examine our belief s, no matter what beliefs we hold† (Dawkins, 2008). Thus, this book is written for people who want to engage in the contemporary world of religion and science. An acknowledgement made by Seed stated, â€Å"A powerful argument for how to think about the place of religion in the modern world. It ‘s going to be a classic† (Dawkins, 2008). In addition, this book would most likely attract atheists because of the challenge of God’s existence in religion through the examination of the roles of religion and scientific explanations. The Economist stated, â€Å"Everyone should read it. Atheists will love Mr. Dawkins incisive logic and rapier wit, and theists will find few better tests of the robustness of their faith. Even agnostics, who claim to have no opinion on God, may be persuaded that their position is an unte... ... authoritative beliefs called â€Å"doctrine†), practices (including formalized rituals), and social institutions.† (bowen, 2011) There are many atheists within our contemporary society especially in North America which the debate of religion and science more prominent. In addition, within this book he uses many notable scientists and significant figures that are excellent proofs that support his argument. In my opinion, overall, the book was an eye-opener and the content was very engaging. In addition, when reading this novel, I felt like I agreed with some of the statements that Dawkins had proposed, in n particular, the natural selection of Darwinan theory. Therefore, this book is very persuasive and puts a new perspective on religion. Overall, the author reached their objectives because he was very convincing and included support and evidence throughout the novel.

Sunday, November 10, 2019

How and why do political systems change? Essay

Political systems through the world have changed over the ages. A political system is a significant set of social institutions implemented among the people by the government. Political systems have a lot of functions. Political systems create resources for health, education, welfare, industry and foreign policy. Political systems have changed significantly over centuries and are still changing everyday. To understand why and how political systems change, there are many factors. Some major factors are development, government upheaval and the economy. A main factor and influence on why a political systems change is due to the countries social economy. There is always a positive relationship between economic development and equality or income. The Linearity theory states that economic development leads to urbanization which leads to communication which leads to high levels of education and in turn leads to Democracy. This theory does an excellent job in showing how economics lead to a change in political systems. Wealthier nations such as the United States, Japan and other European countries often have more reasonable income distributions than poorer countries. But countries like Russia had a poor distribution of social economy due to communism. The USSR was a communist country believing in state owned and centrally planned government. The communists were able to keep up with the other large capital powers of the world. But as time went on and they tried to catch up, their economy was too hard to control. Their products were poor quality and their quantity was created on a need basis. There was no efficiency. The people of Russia would have to wait years for cars, apartments and waited hours in lines for simple things like food and other basic necessities. The soviets began to argue with the government. In 1991, Russia had gone through the worst of it’s inflation and industrial problems. Eventually Russia became the Russian Federation and there was an end to Communism. Urbanization is another reason that political systems change and develop. People run out of resources on their rural lands and are forced to flee to the bigger cities. People go to the bigger cities hoping to find a better life for their families and themselves. As more people go these cities, it creates more jobs. Industry grows and the social economy also grows. Political systems begin to create governments that work on foreign policy and trade which creates more a more stable economy. Sooner or later the political systems shape their governments to model those of the other larger wealthier countries in the world. Another factor that changed many countries political systems is that of a revolutionary change. Two countries that were strongly influenced by the revolutionary alteration were Russia and Germany. After World War I, Russians believed the revolution lead to the collapse of imperialism. Russia was doing well before the war. Industry was still growing and the moral of the people was high. That did not last long though, the war changed everything. When the Russian military went to war against Germany, the tsarist government fell. As the tsarist government fell apart so did the Russian economy. The government found themselves trapped in a situation that they knew little about. Eventually a Russian revolution created a party with the help of Germany lead to the fall of imperialism and capitalism. Soon after Russia became a communist country. Revolutionary change is apparent when looking at China’s development as a government. China and Russia’s political change are similar in many ways. One of the biggest revolutionary movements in China was Maoism. Maoism was created by a person named Mao Zedong. Mao believed in strengthening and rebuilding China and by doing so, he and his followers believed in guerrilla warfare and in turn created a so-called revolution. Maoism believed that it was important to listen to the peasants and tried to propaganda to join his army. He believed heavily in guerrilla warfare to take over the government. Mao’s acts were unsuccessful and in 1949 Communism became China’s government. Great Britain is a country were evolutionary change and development not only influenced its own development, but also many other countries in the world.  Great Britain government is considered the mother government. It is the oldest government in existence. Their evolution as a government was watched and studied by many countries. And due in part that one time the British Empire was one of the largest in the world, holding various lands and territories. Many parts of democratic governments such as the legislative and executive branch can be seen as early as 1066 for Great Britain. Great Britain legislative branch was called the Great Council and the executive branch was called king’s council. The Parliament was created early in their government and is very similar to many countries man governmental body. Great Britain created in 1689 Bill of Rights which gave people their individual rights and liberties, such as freedom of speech and abolishing slavery. Within the last few years, Great Britain has seen some decline because of its old form of government. There has been no major change in years in their government and some researchers believe it is effected their economy and other problems the country is having. This can be seen in Britain’s way of putting â€Å"old wine in new bottles†. The British Parliament can be compared to other main bodies such as the House of Representatives in the United States., Great Britain created the Bill of Rights. The Bill of Rights created human rights for everyone. Many countries around the world have tried to create similar rights for their people. Although Great Britain economy has a slight decline within the last few years, it has proven to be one of the most stable governments in the world. The political attitudes vary from country to country as well as they always change. As countries evolve, the attitude of the people change according to what is happening. In countries that are in a strong economic standing, the peoples’ attitudes probably will lead more toward a nationalist feeling. For example, the people of Germany are upset because ever since that wall separating East and West Germany had to come down, there has been lower unemployment and fewer jobs. At first everyone was so happy to see the wall come down and now some wish that it never had. It is proven that the happier the people are with their government, the more they will participate. When more people get involved, this leads to political change. Sometimes a countries political  system changes when the people are not happy with the government. People get outraged with corruption, unemployment, welfare, education, and human rights. When the people are outraged, they revolt against the government. Also, the people will be supporting a leader that will change the system from the way that it is being run. When looking at the evolution of countries and the change in their political system, it seems as if many countries have changed or have wanted to change their form of government to a democratic government. Many countries have adapted to the Western Countries forms of government. Within the past couple of decades, more and more countries are slowly moving into a democratic form of government. Democracy has not fully proven to be the answer to all country problems but has been a step closer to helping some situations. There are many theories that try prove the democratic countries are less likely to have a war and more likely to be similar and in the long run better the world market. So as time goes on, so will the political systems of the world and the countries they exist in. For better or for worse, Political change will always have its appropriate place in the world. I do believe that the key to world unity lies in the hands of democracy. And Americans should do all in our power to implement democracy to the countries who desire it. References Shively, Phillip. â€Å"Power and Choice† eighth edition. 2003 McGraw Hill Roskin, Michael G. â€Å"Countries and concepts† eighth edition. 2003 Prentice Hall

Friday, November 8, 2019

Free Essays on Christian And Muslim Marriages

Christian and Muslim marriages One definition of marriage is a union between two people that feel that they are right for each other, and decide to spend the rest of their lives together as one; this is the main case for Christian marriages. Some couples fear the worst, which is an unhealthy marriage that can lead to divorce. Others hope for the best, which is to live a long and healthy marriage. In this essay I will be explaining what happens in a Christian marriage service and what the importance of the ceremony is. I will be also going through an arranged Muslim marriage briefly which will help me decide which type of marriage I think is better and why. The day before the ceremony of a Christian marriage, the bride will probably have a hen night and groom will have a stag night. These 'nights' are a celebration; they tend to be a celebration of the couples last night of freedom. They are separate celebrations and the couple will not see each other until, the bride arrives at the church. It is known as bad luck for the couple to see each other before the wedding. It is also bad luck for the groom to see his future wife in the wedding dress. These are just superstitions, but now they tend to be a tradition. The Groom will be at the front of the church waiting for the bride, as the bride enters, the relatives, family and friends stand to watch the bride walk down the isle; and traditionally with her father, who gives her away. The ceremony starts when the bride and groom stand before the priest, the priest calls out a few blessings and prayers. Readings may be used; in some weddings a hymn might be sung. The priest then starts his talk and gets to a point were he tells the couple that they are about to make the vows in the name of God; he then says if there is a reason you cannot marry, please declare it now. The priest then says to the bride and the groom. The vows: â€Å"(Name), will you take (Name) to be your wife/hu... Free Essays on Christian And Muslim Marriages Free Essays on Christian And Muslim Marriages Christian and Muslim marriages One definition of marriage is a union between two people that feel that they are right for each other, and decide to spend the rest of their lives together as one; this is the main case for Christian marriages. Some couples fear the worst, which is an unhealthy marriage that can lead to divorce. Others hope for the best, which is to live a long and healthy marriage. In this essay I will be explaining what happens in a Christian marriage service and what the importance of the ceremony is. I will be also going through an arranged Muslim marriage briefly which will help me decide which type of marriage I think is better and why. The day before the ceremony of a Christian marriage, the bride will probably have a hen night and groom will have a stag night. These 'nights' are a celebration; they tend to be a celebration of the couples last night of freedom. They are separate celebrations and the couple will not see each other until, the bride arrives at the church. It is known as bad luck for the couple to see each other before the wedding. It is also bad luck for the groom to see his future wife in the wedding dress. These are just superstitions, but now they tend to be a tradition. The Groom will be at the front of the church waiting for the bride, as the bride enters, the relatives, family and friends stand to watch the bride walk down the isle; and traditionally with her father, who gives her away. The ceremony starts when the bride and groom stand before the priest, the priest calls out a few blessings and prayers. Readings may be used; in some weddings a hymn might be sung. The priest then starts his talk and gets to a point were he tells the couple that they are about to make the vows in the name of God; he then says if there is a reason you cannot marry, please declare it now. The priest then says to the bride and the groom. The vows: â€Å"(Name), will you take (Name) to be your wife/hu...

Wednesday, November 6, 2019

plaque assay essays

plaque assay essays Title: Exercise Seven Plaque Assay for Determination of Phage Titre One of the most numerous microorganisms known to man is viruses and these acellular agents can infect all types of cellular organisms. Viruses are considered infectious elements that contain a single type of nucleic acid but require a host cells metabolism to replicate. They are typified by both an extracellular state and an intracellular state. (Madigan et al, 2003; Prescott et al, 2002). The classification of viruses can be extended further, by focusing on a specific group known as Bacteriophages. These are viruses that infect bacterial cells and use them as their host. Those viruses that infect Eschericha coli are known as Coliphages and are identified by type numbers ie. T2, T4 and T7. (Prescott et al, 2002; Reddy, 2002). Temperate bacteriophages not only infect bacteria but can also establish a lysogenic relationship rather than immediately lysing their hosts. The DNA of the invading phage has two possible fates: reproduction leading to generation of new phage particles and lysis of the cell or integration into the host chromosome. Here it is replicated passively with the host DNA a process known as lysogeny. Some coliphages (although not exclusively) are temperate bacteriophages. (Lehninger et al, 1992; Madigan Despite the diversity in viral structures, most viruses complete similar stages in the viral lifecycle. Excluding the lysogenic pathway for the moment, a typical viral lifecycle can be categorized into five stages: 2. Penetration: by either the whole virion or just the nucleic acid 3. Synthesis of nucleic acid and proteins: where the hosts metabolism is utilized 4. Assembly: of structural subunits and packaging It should be noted that these are generalized stages and that viruses go about a ...

Sunday, November 3, 2019

Unit 2 Seminar Case Management in Human Services Research Paper

Unit 2 Seminar Case Management in Human Services - Research Paper Example The environment could be anywhere a person is located and the different systems refer to various kinds of environment. The microsystem is a small unit of the immediate environment in which the person operates from like a family or classroom. The other types of systems are a bit more complex but generally describe the interaction of two or more Microsystems to form larger environments, however it is all about how the person interacts with his environment (). Clients have various strengths in the various types of systems, for example in the microsystem, the client enjoys a closer relationship with a company or business, this relationship is often so close to the point that the client can express themselves better and push for good bargains. In the mesosystem, a client has the strength of being able to put to advantage his or her part of the system, for example when a company is a client to a different company, their relationship may influence the bargaining power of the client to its advantage. Finally, interactions between a client and a business in a macrosystem environment gives the client the strength inherent in power of choice. The ability to choose between many offers is a strength that most clients apply in the macro environment quite often. Ecological models are very important in working with clients because they enrich your knowledge and experience with dealing with different situations concerning clients. Being able to understand how the behavior of a client may be shaped by the environment is one of the necessities towards business success

Friday, November 1, 2019

Policy and procedure Development Essay Example | Topics and Well Written Essays - 500 words - 1

Policy and procedure Development - Essay Example The following policy and procedure provides a guide for the management of fatigue for cancer patients. Relaxing body massage is a proven non-pharmacological fatigue management therapy for cancer patients undergoing chemotherapy treatment. Cancer patients develop fatigue due to the inadequate number of red blood cells to circulate oxygen to body muscles. Accumulation of carbon dioxide in the body cells result in chronic body fatigue for cancer patients (Ahlberg, 2003). The drugs administration lack the complete relaxation effect for most cancer patients. Current studies have downplayed the use of drugs to control chemotherapy fatigue. More ever, traditional relaxation methods such as resting and escaping are time-consuming. Massage is cost-effective and time-saving. While other relief methods such as drugs may have cost implications, massage is cheap and has long-standing effects. Studies conducted at the University of Miami suggests that massage helps reduce fatigue. Smooth, soft caresses over the affected area trigger the mind to produce Dopamine, a chemical that induces a feeling of well-being. The research also indicated that massage causes an increase in the white blood cells that boost immunity. The cancer foundation called them the natural killer cells and appeared on the first and last days of the massage. Massages offer a significant fatigue reduction to cancer patients undergoing chemotherapy as compared to drugs. Specialized massage combined with other non-pharmacological practices such as physical exercise have proved effective in the control of body fatigue. Long usage of drugs to stimulate the body overworks the body cells and is detrimental more so to patients at the chronic cancer stages. Specialized cancer nurses and trained masseuse help determine the patient’s knowledge on non-pharmacological fatigue management. The cancer patient’s rights and family diversity will be