Thursday, October 31, 2019

GoTo Statement Essay Example | Topics and Well Written Essays - 500 words

GoTo Statement - Essay Example A goto statement is a constituent of many languages like C, C++, COBOL, Pascal, Algol and others, especially of assembly languages. Nevertheless a goto statement is not popular in all higher-level languages of programming. Thus in Java goto statement is a reserved statement at present (Tribble 3). During the period of early stage of structured programming development many experts in computer science arrived at a conclusion that in programs it is better to use "structured flow-control commands", for example, loops and "if-then-else statements" rather than a goto statement (Tribble 5). Though there are experts who consider that despite the fact that "goto statement considered harmful", there exist some problems in a great number of programming languages that can't be directly decided without a goto statement, like, for instance, exception handling or breaking out of nested loops (Knuth 268). "There are few good uses for a goto statement. It is not uncommon for the class instructor to ban goto statements altogether. But the traditional legitimate use for a goto is to allow the programmer to escape from deep nesting when a special case (usually an error) has been encountered. For Pascal programmers, this means that, on rare occasion, you may want to goto'' the end of a subroutine in order to exit.

Tuesday, October 29, 2019

Personality Essay Example | Topics and Well Written Essays - 750 words - 8

Personality - Essay Example Analyzing individual’s personality necessitates evaluation of cognitive and behavioral aspects and entails collaboration of various disciplines such as psychodynamics, biology and humanities, evolution and sociology just to mention a few. The information from these fields are then analyzed in an empirical dimensional approach principled on various multivariate statistics and evaluation based on sociologically or psychologically modified framework such as factor analysis, theory development and other evaluation platforms (Furr, 13). Myers- Briggs framework also known as Myer- Briggs Type Indicator [MBTI] is an assessment questionnaire that seeks to understand the psychological preferences in how people make decisions, react to other non-decisive phenomenon and how they generally perceive their surroundings. The framework involves psychometric analysis with focus on human behavior and personality with emphasis on extraversion and introversion; inborn or acquired traits that influence individual’s experience and perceptions in terms of sensation, feeling, intuition and thinking aspects. These aspects are further grouped into conceptual approaches of rationality and irrationality with typing based on either extraversion for sensing, thinking and judgment or introversion for intuition, feeling and perception. The evaluation is based on four dichotomies of introversion and extraversion; sensing and intuition, thinking and feeling, judging and perception, in a bid to indicate one’s reference over the ot her. Psychologically, individuals are born with and/ or develop certain preferred ways of deciding and perceiving the environment or phenomenon in the society and with guidance of MBTI framework this paper will analyze the personality of Warren Buffet and evaluate how his personality has impacted on his daily activities and as a leader in the business arena. Warren Buffet can be described as a business mogul with vast interests in

Sunday, October 27, 2019

Wireless Network Security

Wireless Network Security There is a growing need to find lasting solutions on how to deal with security issues involving with wireless networks, in order to make them as secure as possible. The growth of the Internet has been an explosive since inception, and this has lead to a great increase in the number of portable/mobile computing and communication devices such as notebook computers and mobile phones, in recent years. As manufacturers constantly improve on the features, and general capabilities of mobile devices, the Internet also continues to get bigger and to improve, even at a faster rate than these mobile devices. In fact, the market for mobile computing and telecommunications is likely to overtake the market for fixed (conventional) computing and telecommunications, in the near future. This is because there has been a consistent growth in the demand for mobile devices for computing and telecommunications. [1] Without a doubt, wireless technology was has been a very relevant and vital breakthrough in the computer and telecommunications world, and the Wireless third generation (3G) network is proving to be increasingly beneficial to many users of various networks. The main advantages of the 3G networks are that they provide a lot more interconnectivity and, a better and wider reach. Wireless Local Area Network (WLAN) has also been advantageous. Some of the advantages of WLAN include the use of Broadband service with low costs and wide-reaching technology. Therefore, integrating 3G wireless networks with wireless local area network was invented, naturally, so as to get the best of both words of3G wireless network and WLAN. [1] http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf Background. WLAN and 3G are two key mobile/wireless technologies, which have been identified to have great potential in terms of value to the customer. While 3G is a standard that defines technology that can provide high bandwidth wireless access over a large area and supports various services such as roaming, WLAN is a disruptive technology that provides higher bandwidth within small areas. With WLAN getting integrated to 3G networks, there are several security threats that need to be considered. These are threats that are unique to such an integrated network as well as threats due to the vulnerabilities inherent in each network. The 3rd Generation Partnership Program (3GPP) has defined the standards for the integrated WLAN-3G network. The organisation takes into consideration several security issues, as part of its standardisation efforts. However, there are still some gaps in the security that can adversely affect service delivery and vulnerability. From the security point of view, the network architectures are defined for both Roaming and Non-Roaming inter-working scenario. Additional components are specified to the 3GPP network architecture to facilitate inter-working such as Packet Data Gateway (PDG) and WLAN Access Gateway (WAG). The inter-working is based on UMTS Authentication and Key Agreement (AKA) authentication method. This requires a user equipment to run the USIM application. This means that WLAN user equipment is equipped with capability to use UICC smart cards. The inter-working mechanism enables a 3G mobile network subscriber to access WLAN networks operated by different service providers. This also supports roaming scenarios. Wireless local area network (WLAN) and 3-G devices enable users to carry their computers and communication devices around within their offices and homes, without having to handle any wires and without having to disconnect from the network when moving around. There is greater flexibility with these devices, due to less wiring, thereby increasing overall efficiency, and also reduced wiring costs. For instance, networks that use Bluetooth technology can be used for synchronization of data with network systems, and enable the sharing between of computer applications between devices. With Bluetooth functionality, there is no need for printer cables and some other connection equipment for peripheral devices. 3G network based security threats. The key threats for 3G networks in perspective of integration of networks are: Wireless LAN customer who does not have access to 3G networks get access to 3G services without subscription. WLAN user gains access to 3G network and creates issues such as Denial of Service WLAN user gains access to 3G network and uses impersonation for using the service but charging other customers. Manipulation of charging when services like calls are transferred from one network to another. Application and Data related threats. Collection of login details and personal details that are transmitted over the network by using sniffing tools and mechanisms, especially when sufficient transport security is not set. Manipulation of information used for user authentication or service access to gain access to unauthorised services or manipulation of billing. Extracts personal information that are used at other places such as credit card information. Obtain information about user such as permanent identity in the network. Virus attacks from WLAN devices to other devices in the network Trojans and malicious software passed from one end-device to another. For volume based charging model, a rogue partner can flood the user with garbage packets to increase the invoiced amount. Malicious programs on the user terminal that increases the traffic to certain sites or content to illegally increase the traffic. Security Considerations for 3G-WLAN Integrated Networks. The security framework for 3G-WLAN integrated networks consists of various layers. Each security layer is independent of the other layers. However, there needs to be an overall security scheme that connects all the security requirements together. Also, since some of the vulnerabilities can happen at multiple layers, a holistic approach and framework is required to address all the risks of the special network. Authentication security at the user terminal. The authentication scheme in the case of 3G-WLAN should be based on a challenge response protocol similar to the existing mobile communication authentication scheme. This requires that the authentication details in the user terminal to be stored securely on UICC or SIM card. This should support mutual authentication and security mechanisms such EAP. Signalling and User Data Security. The subscriber needs to have the same level of security as the mobile access that is specified for the 3G networks. This means that the WLAN authentication and re-authentication mechanisms must be at the same levels as for 3G USIM based access. It needs to support the maintaining session key verification and maintenance. Also the 3G systems should provide the required keys with sufficient length and levels of entropy that are required by the WLAN subsystem. WLAN key agreement, distribution and authentication mechanism should be secure against any attacks by middlemen. The WLAN access technology between the user equipment and the access point/ network should be able to utilise the generated session keying material to ensure the integrity of the connection for authentication. Privacy of User Identity. The keys used by 3G AAA function that are used for the generation of temporary identities that is used for the communication between the network element and the user terminal should not be possible to recover. If it is possible to retrieve the keys, the permanent identity can be derived from any of the temporary identities. Also it should be possible to mask the different temporary identities corresponding to the permanent identity. Security of the access interface. The access interface between the user equipment and the network element should be protected against eavesdropping and all attacks on the security-relevant information. Sufficient cryptographic mechanisms should be employed to ensure adequate security, and at least 128 bit encryption keys should be used for the security system. The interaction between the different endpoints of the local interface should be properly authenticated and authorised. Also the keys used for the security should not be shared across the local interface links and each interface should use unique keys. Access of the user terminal and SIM remotely should be monitored such that the user can choose to allow or disallow the connection. Displaying of the information should be provided to the user to enable the user to take the decision. Further, the USIM information should be secured when it is transferred across different networks such as 3G core network, WLAN network or any other networks involved. Link Level Security. Wireless link can be classified as the most vulnerable interface among all the interfaces in the 3G-WLAN integrated network. The link layer security provided by the WLAN network should be used for ensuring security at this layer. At this layer, the confidentiality and integrity of user data should be protected. In addition, any signalling information between the user equipment and the access point should also be secured. Another area of vulnerability is the key distribution, key validation, key freshness and key ageing. Security of any Tunnelling. UE can tunnel information to other devices in the Visited PLMN or the Home PLMN. When such tunnelling is employed, the data origin should be authenticated and integrity checks should be supported. Also the confidentiality mechanisms should be in place between the systems. As the 3G systems have defined security roles in tunnelling, the decision on allowing tunnelling is a function of the 3G network. It is essential to implement the right decision parameters such as level of trust in the WLAN access network or the Visited PLMN involved, capabilities supported in the WLAN user equipment in terms of security in tunnelling and whether the user is authorised for such services. Privacy of User Identity. User identity privacy ensures that none of the permanent subscriber identification information is send across the network in clear. This is based on temporary identities such as pseudonyms or re-authentication identities. Sufficient security procedures should be followed in generating, distributing, using and updating these identities. Also the period of maintaining a temporary identity is also important to prevent tracing of the identity. Various scenarios need to be considered for design of such a system such as: WLAN UE receiving more than one temporary identity from the AAA server Tunnel establishment If the identity privacy support is not activated by the home network Confidentiality Protection. The confidentiality protection should consider different scenarios and network access options. The key scenarios are: In WLAN direct IP access: Here the function is implemented using the WLAN access network link layer. In WLAN 3GPP IP access: Here the integrity of IP packets that is sent through the tunnel between the user equipment and the network should be protected. Research Points. Authentication, Authorisation and Accounting are the most important factors in ensuring network security. There are various techniques available in various types of network available for AAA. One example is UMTS-AKA in 3G network and EPA in wireless networks. Each of these techniques are suitable for the respective types of networks and considering the security requirements. With the integration of networks, the characteristics expected of the integrated network are a combination of both networks. The integrated network is expected to work with the same simplicity and efficiency as a WLAN network but with the security implementations of a 3G network. However a 3G-network security introduces overhead on the network resources that are not desirable in the integrated network. Also when there is an access from one network to another, the overall security profile of the integrated network is that of the weaker part of the network, in this case, the WLAN network. There is a need for the use of the AAA method, which is simple in operation in terms of the message handshakes required and delay introduced and at the same time secure enough to match the 3G network security requirements. The objective of this research is to: Evaluate the current AAA mechanisms available in terms of its capability, Recommend the best option for WLAN-3G network in terms of the efficiency and the security effectiveness. Methodology The methodology for identification of suitable AAA function involves the following: Evaluation of the currently selected methodologies used UMTA-AKA, WLAN-EAP These protocols are evaluated in terms of the overhead required to handle the mechanism and strength of the method infrastructure required to support the system in terms of network elements. Identification of other methodologies used in other technologies and networks Profiling of the different technologies in terms of the capabilities, limitations and characteristics Establishment of minimum requirements of 3G-WLAN network Comparison of profile to the minimum requirements established and selection of methodologies Recommendation of modifications required in the methodologies to suit to WLAN-3G environment. Research Tools. Various tools and resources will be employed during the course of this research, including: Reference implementations of AAA functions. Simulation software for evaluation of the robustness and strength of the AAA functions. Standardisation documents that provide evaluation of the AAA methodologies. Commercial products that employ AAA functions; such as WLAN access points and WLAN user equipments. Software protocol analysers for checking the message flow and function. Expected Results. This research will aim at providing guidance to operators and vendors, on the use of AAA functions for 3G-WLAN networks. Specifically, the following results expected at the end of this research: Identification of suitable AAA function for use in integrated WLAN-3G networks Recommendations of modifications required for the current implementation of the AAA function. References. A Guide to Wireless Network Security: White Paper. http://techlibrary.networkcomputing.com/rlist/920045790_12/sort_by/doc_type/IP- Networks.html Wireless Networks Evolution, Vijay Garg, 2002, Prentice Hall. http://www.cs.columbia.edu/~charles/publication/ft-concept.pdf http://fiddle.visc.vt.edu/courses/ecpe6504-wireless/projects_spring2000/report_sathyamoorthy.pdf http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf http://compnetworking.about.com/od/wirelesssecurity/tp/wifisecurity.htm http://www.pcstats.com/articleview.cfm?articleID=1489 http://www.practicallynetworked.com/support/wireless_secure.htm http://www.windowsecurity.com/articles/Wireless-Network-Security-Home.html http://computer.howstuffworks.com/wireless-network.htm http://netsecurity.about.com/od/hackertools/a/aa072004b.htm http://netsecurity.about.com/cs/wireless/a/aa112203_2.htm http://www.networkworld.com/topics/wireless-security.html Home 3GPP TSG Services and System Aspects, 3G Security: Wireless Local Area Network (WLAN) Interworking Security (release 6), Technical Report, 3GPP TS 33.234 V6.5.1, (2005-6), December 2005. 3GPP TSG Services and System Aspects, 3G Security: Security Architecture (release 6), Technical Report, 3GPP TS 33.102 V7.0.0, December 2005. 3G and WLAN Interworking Security: Current Status and Key Issues, International Journal of Network Security, Jan 20063GPP TSG Service and System Aspects, Feasibility Study on 3GPP System to Wireless Local Area (WLAN) Interworking (release 6), Technical Report, 3G TS 22.934 v. 6.2.0 (2003-09), Sept. 2003.

Friday, October 25, 2019

Characteristics of Magical Realism in If Dinosaurs Were Cats And Dogs :: Dinosaurs Were Cats And Dogs Essays

Characteristics of Magical Realism in If Dinosaurs Were Cats And Dogs      Ã‚  Ã‚   "If Dinosaurs Were Cats And Dogs" is a short story written by Colin McNaughton. "If Dinosaurs were Cats And Dogs" was published in 1981. It is classified under the fantastic sublime. However, based on the analysis of "If Dinosaurs were Cats And Dogs" one would believe that magical realism is a genre of the sublime.    While reading "If Dinosaurs Were Cats And Dogs", one comes upon the illustrations in the book. Through out all of the illustrations, the people are on a smaller scale then the animals. Scale is a sign of a sublime work. It creates a mood of nature being more important than humans or anything else for that matter. Scale, when used in sublime works, sets a universal or macroscopic tone.    I would confidently maintain that nothing contributes so decisively to the grand style as a noble emotion in the right setting, when it forces its way to the surface in a gust of frenzy, and breathes a kind of divine inspiration into the speaker's words (Longinus 109). Longinus is explaining how a moment in a story line becomes clear to the reader out of a turbulent setting. It is considered by Longinus to be a perfect specimen of the sublime. In the short story "If Dinosaurs Were Cats And Dogs", many examples of the emotion force their way to the surface in an uncontrollable frenzy. A good example from "If Dinosaurs Were Cats And Dogs' would be this excerpt: " This snake is over ten miles long, which makes it very hard to steer. When people shout, "Look out! Look Out! Its head's too far away to hear"(McNaughton 21). In the excerpt from the story, when it is explained that even though people are shouting for the snake to watch where it is going, the snake can't hear because the it's head is ten miles away. This is a brilliant examples of sublime literature.    Although "If Dinosaurs Were Cats and Dogs" is classified as fantastic sublime, the story has many examples of magical realism within its pages. The way in which the animals in the story are humungous is one of the many examples of magical realism. A parrot that is twenty-nine feet tall is extraordinary. Even more extraordinary is a snake that is ten miles long.

Thursday, October 24, 2019

A Social Worker

Social work is a profession in which it is important to have a set of rules to follow while working with clients. In the social work field, the code of ethics, values and use of supervision are important keys in how licensed social workers should handle their clients' private documents and other information in association with having skilled attitudes towards their work as well as in their personal life. The code of ethics is a set of rules set by the National Association of Social Workers made order for a social worker to follow while being a professional. These principles could also be considered universal in social work practice across the nation. Furthermore, these principles are further explain the six core values that licensed professional social workers understand must be upheld daily in their career. According to NASW (1996), the six core values are service, social justice, dignity and worth of the individual, importance and centrality of human relationships, integrity and competence (NASW, 1996). The value of service highlights the ethical principle of serving the community by addressing social issues that may be seen in certain communities. An example of service while being a social worker would be to helpa client who may be homeless find resources to enable him or her to get back on their feet. This could entail assisting the client with being put on the Housing Authority waiting list. The value of social justice is in relation to being an advocate for a client who may be treating unfairly and getting them into a situation in which he or she may have equal rights as others do. As a professional social worker, I feel like that it is only right to be a part of at least one organization that would assist me in learning how to take be an advocate and stand up against various laws that can work against the progression of the community that I may be serving as a professional social worker. By joining educational organizations, I won't just be able to join in activities that would educate and bring awareness to such issues but I would also be building my continuing education that a social worker take part in. The ethical principle defined by the National Association of Social Workers, for dignity and worth of the person is being able to respect clients no matter his or her situation. I believe that this is important as a social worker because this will help in building trust and a relationship with the client. This shows a client that just because they are the ones needing help that they will still be treated with dignity and respect. By being respectful and treating them as a person and not as someone who is looked at as being a bad person would open the door for more opportunities and resources that could be beneficial to the well-being of the client and situation. The importance of human relationships as an ethical principle is understanding that relationships are important while being a professional. This would help the client in building new relationships and build a social worker's expertise to be able to work more effectively with their clientele. Human relationships allow a person to be able to bond and grow more. Integrity and competence is a social worker understanding that he or she must act in a professional way and continue learning daily. As a licensed social worker and student, I am expected to become educated through professional development workshops and attending conferences. Within the State of Alabama, a social worker is to uphold these core values and ethical standards while practicing in the field. The use of supervision is not only an obligation but it is quite beneficial to a licensed social worker. In order for a social worker to keep his or her license, he or she must undergo hours of required supervision. Supervision is beneficial in that it assist a social worker in their ethical conduct. Under State of Alabama laws, a social worker would have to experience a minimum of 4 hours monthly for a continuous period of 24 months within a 36 month timeframe. Supervision would occur starting with having an occupation. Supervision is only completed by licensed professionals who are qualified as a Licensed Master Social Worker or Licensed Independent Clinical Social Worker. The first requirement of supervision is for a Licensed Bachelor Social Worker. If a social worker decides to no longer practice in a specific area, then he or she must complete a minimum of 4 hours monthly for a period of 6 months. Supervision is discontinued upon records and a contract is signed stating the type of supervision and conditions. Social Work Licensure and LawsWhile researching Social Work Licensure and Laws, I learned more about how the state of Alabama follows a standard guideline for the licensure and laws of social work. According to to the Alabama Legislature (1977), Title 34 Section 30 states that a person is not able to give themselves the title or practice social work unless they have been licensed and passed the social work exam (Alabama Legislature, 1977). In order to apply to take the exam, a candidate must be a graduate of an accredited BSW or MSW educational program. The applicant must be 19 years of age, have paid the initial examination fee of $250, passed the examination, signed a notarized statement and sworn of the professional code, and meet any additional requirements based on the level of licensure. In the state of Alabama, there are three types of licensure that are given to those who meet the above requirements. A person can be licensed as a Bachelor Social Worker, Master Social Worker, or an Independent Clinical Social Worker. In order to receive a license for BSW, a person has to have a bachelor degree from an accredited college or university. Furthermore, a person has to show that he or she has a completion of the social work major and completed two years of continuous full-time employment in a social work position under supervision. If a person does not have a Bachelors in social work, a person who has a Bachelor's in a related field, such as sociology, rehabilitation counseling, psychology and guidance counseling is eligible to apply for a MSW program or have a social worker job but will not be titled a social worker. In order to receive an LMSW, a person must have completed the Master or Doctorate of Social Work from an accredited or approved college or university. An exclusion to this requirement is a person who has candidacy that is granted by the Council on Social Work Education. After I graduate with my MSW, I will be seeking my LMSW. I believe that by going further in my education will not only make me more marketable in the social work field, but it will allow me to be more knowledgeable as how to work with clients. To become a LICSW, a person would need either a master's or doctorate of Social Work. A person would also need at least two years of supervision by after graduation, and be a U.S. citizen with appropriate documentation. When and if a person is issued a license from another state, he or she would be required to meet state requirements if qualifications from the other state are not equal to the qualifications of Alabama. However, this is with the exception that the application fee and exam has not been paid or passed. Those persons who are seeking exemption from the Board's examination must meet all qualifications for that specific license and also have completed six years of continuous supervised full-time employment approved by the Board or seven years of continuous full-time employment with a public agency on or before May 1, 1977. In the State of Alabama, a social work license must be renewed every 2 years. The fee for a license renewal is $100. If applicant fails to renew within a 60-day time frame of the expiration date, then the license is either terminated or suspended. Per state of Alabama law, any licensed professional who is actively practicing social work cannot be denied for license renewal. If the applicant would like to remain inactive, then that person may write a request to the Board Examiners to be placed on the inactive list. Social Work Practice Stages The Social Work practice stages are also known as the Generalist Intervention Model (GIM). According to Miller, Tice and Hall (2008), the Generalist Intervention Model is a method of practice that integrates casework, group work, and community organization, and focuses on the interaction between persons and their environments (Miller, Tice and Hall, 2008). The GIM uses engagement, assessment, intervention planning and implementation, evaluation and termination as a way to better assist clients to planned change. An example of utilizing the GIM would be first greeting and welcoming the client. For the purposes of this assignment, we will call the client- Client A. Client A is a female coming to a social worker in efforts of having planned change from her addiction of abusing alcohol. In efforts of demonstrating engagement, the social worker would use proper body language to show that he or she is listening to the client, using appropriate hand gestures and making good eye contact. The social worker would ask Client A to tell her what she thinks her needs are and what resources in the community may be beneficial to assisting her with changing. This would allow Client A to provide detailed information about her current situation and what she thinks about her surroundings. It is important for the social worker to take notes to assist Client A after the initial meeting. However, before taking notes, the social worker should ask Client A for their consent before taking notes. After asking open-ended questions through engagement, the social worker should go over with Client A how the social service agency works and the services that we will provided. Any questions that may be asked of Client A will assist the social worker with assessing Client A's needs. During the assessment portion, the social worker should assess Client A's mental/emotional state, appearance/ mobility, ability to perform her activities of daily living, her environment, health, economic status, education status and transportation needs. The social worker could utilize the tool of an Ecomap to assist her in assessing Client A's needs. For planning and implementation, the social worker should work with Client A regarding a plan that is real and attainable. Client A must believe that the plan will work and must desire to reach goals that will be made together with the social worker. The social worker should prioritize the importance of change and helping Client A understand that change is a good thing. The social worker should assist Client A in understanding how this could benefit her socially. Once the goals are established, the social worker should address the objectives of each task given and how to proceed with actions towards those goals. Since client A is struggling with alcohol abuse, the social work should assist Client A with establishing the goal of: Lessening her urge to drink alcohol. The objective would be for her go to an Alcoholic's Anonymous support group once a week for 6 weeks. The social worker will encourage Client A to keep a journal of her progress and Client A must write in her journal after each support group session and describe her experience. This will assist Client A as well as the social worker in understanding her growth.As a form of evaluation, the social worker will obtain Client A's journal that she has been writing her experience in and Client A will also complete a questionnaire on her progress. Client A would complete the questionnaire two weeks before her last appointment. The questionnaire would ask her about how she thinks she has progressed, services that were rendered, and about the social worker's expertise. Once she has successfully completed her goal, the social worker will talk with Client A about termination two weeks after the last meeting. During this, the social worker will also discuss with Client A her progression. The social worker should encourage Client A to continue with the progress she has made. If needed, the social worker should refer Client A to additional services that may be beneficial to other issues that she may face following termination. It is important for the social worker to follow-up with Client A once services are terminated. Follow-up can help Client A from relapsing or even coming back for services. However, the social worker should give Client A the phone number to the agency in case services may be needed again.Intervention and Developmental Theories for Direct Practice with Individuals, Families and GroupsThere are several theories that are used to explain the behaviors of an individual, and has provided the framework for various models and interventions. One theory that can be utilized is Conflict Theory. Conflict Theory focuses on the structure in an individual's life. This theory would showcase issues that could have occurred through a power struggle between family members or friends as well as in various stages of the individual's life. The conflict theory would then consider the familial structure, and if there is a continuous cycle that may be from the past. There is also the Systems Theory. According to Gibson (2016), Systems theory, also called social systems theory, in social science, is the study of society as a complex arrangement of elements, including individuals and their beliefs, as they relate to a whole (Gibson, 2016). The Systems Theory would show how the individual interacts with others and if there is any correlation between the influences in the client's life and their behavior. The last theory is practice models that focuses on creating an intervention through consultation and assessment of the individual. There are an array of interventions that may be completed, such as the Solution-Focused model, Crisis model, Task-centered model, and the Problem-solving model. The practice models would require more interaction with the client. Life stages would play an important role in each model especially when it comes to understanding what to focus on and what not to focus on. For example, a 50 year old is not at the same stage as a 20 year old because the 50 year old is more experienced with life. Therefore, it is key that the social worker understand this before using the practice models. Diversity/ Social Justice/ Advocacy/ Rural and Urban Communities Diversity, social justice, advocacy for rural and urban communities are at the core of social work. I believe that diversity is more important in urban communities rather than rural communities because individuals are looking for employment and better opportunity for school, homes, and the quality in urban areas. As a social worker working mostly with the older adult population, I work in both urban and rural areas. I observed that the services are limited in rural areas and is especially harder for my clientele to receive the necessary resources, such as transportation to and from their doctor's appointments. I observed that there is a need for more rural social workers to assist clients in obtaining more resources to a better quality of life. Social justice in both rural and urban communities is beneficial as there are most likely political and social issues faced by persons who live there. Some people in rural areas may not even have an opportunity for their social injustice issues to be addressed due the scarcity of resources. As a social worker, it is important to be an advocate for those who may not be heard. Advocacy for rural and urban communities varies due to the resources that the community may be lacking. Sometimes a social worker will have to be an advocate for those living in a rural area for there to be more resources, such as additional transportation for the aging to be able to get to their doctor's appointments that are located in urban communities. The lack of services delays certain individuals from getting the appropriate assistance, and as a result can place the community in a mentality that they are not able to be helped and their voices will never be heard. Policy and Policy Analysis Policy and policy analysis refers to the guidelines that are set to uphold the welfare and good of the clients. Policies are ever-changing and revised in accordance with time. An analysis is completed before a policy is written. The analysis helps in the development of the policy that is brought forth through careful research, surveys, case studies and other tools. It is crucial to have an analysis completed because it provides a thorough evaluation of any revisions or changes that need to be made. It also shows how useful the policy is to the population that is should protect. Understanding the efficiency and the worth of a policy helps lawmakers and other important decision makers. Research, Program Evaluation/Needs Assessment Research, program evaluation, and needs assessment are mainly targeted, not at the needs of one client, but of a client base. A single subject design is conducted for understanding the needs of an individual. In order to conduct research on a specific group of people, there must be an Institutional Review Board. The IRB is also known as a human subject committee is used to oversee research to ensure that it is following the proper guidelines set forth to be able to conduct the research. According to Royse, Thyer, and Padgett (2016) the guidelines include: the research participants must be volunteers, the participants should be given sufficient information about the study to determine possible risks or discomforts as well as benefits, no harm shall result from the study, and sensitive information should remain protected (Royse, Thyer and Padgett , 2016, pp. 45-46). According to Royse, Thyer and Padgett (2016) A program evaluation is conducted to understand if the services are really helping the clients that they are intended to serve (Royse, Thyer and Padgett , 2016, p. 1). During this process, information is gathered to see if the social worker and/or agency are the best fit for the client. According to Royse, Thyer and Padgett (2016), The mission of program evaluation in social work is to provide information that can be used to improve social programs (Royse, Thyer and Padgett , 2016, p. 2). Evaluation can range from a series of open-ended questions to observation of the client base in various environments. According to Royse, Thyer and Padgett (2016), Needs assessment are attempts to identify and document unmet needs, gaps in services, or problems in a community (Royse, Thyer and Padgett, 2016, p. 63). The assessment used would be dependent on how severe the clients' needs are and the type of resources that can be used to assist the clients. The individual conducting the needs assessment can utilize tools, such as surveys, personal interviews, focus groups and etc. to perform a needs assessment.

Wednesday, October 23, 2019

How to Ensure Individual Freedom and Community-Building in a Society?

Topic: How to ensure individual freedom and community-building in a society? Every people want to live freely to do whatever they want in a society with freedom and want to communicate with every social groups or governments to build up a good community. If we want to ensure individual freedom I shall briefly that what is the freedom and community is? Freedom is the power or rights to act, speak or think as one wants without hindrance or restraint. Community means that all people living in a particular area or place which call local communities.How to ensure individual freedom and community-building in a society? First of all, Individual freedom is talk about people is given rights to pursue life, liberty and happiness. To ensure individual freedom in society is security. Security is the most important point for the individual freedom because security is the degree of protection to safeguard for citizens live in country. If the country does not maintenance the security for the citize ns or in society have not well developed in security, so the citizens or in society have no freedom to act or rights to do everything and it might be harm in society.But if the society does maintenance the security for the citizens or this country in society will have no war. And also a country which provides citizens live in freedom under well developed in security in everything that they feel free to do anything they want. Hence, people have individual freedom that want to do everything freely because freedom is born out of an understanding of natural law and natural consequences and that drive each of us to be personality responsible for our own actions, to be self-reliant in our thinking and in our work.Second, to ensure individual freedom in society is self-autonomy because self-autonomy is a self-governing in society whom responds for our own actions in society. If we have self-autonomy to do something, to govern in our own decision in society, it seems that we strongly have a bility to do everything. So self-autonomy is another point that seek to individual freedom. For the community-building is creation or enhancement of community among ndividual within regional area or with common interest. To improve community-building we have to make social capital. Because social capital produce a sense of belonging which make an increasing overall health of community. Social capital is a social group that cooperated between citizens and governments that participates in society. To increase evidence shows that social capital cohesion is critical for societies to prosper economically and for development to be sustainable.Social capital is focus on social relations that have productive benefits. It is the most important participates in this society is to make social group and the governments make it to the strong system one to ensure which mean to build up the local communities or social truth governments and create more policies. Thus, to ensure community-building in society is we have social capital which have group of social or governments cooperating to build up the strong community.To sum up, we seems to ensure individual freedom and community-building in a society have many reasons or explanations to describe. For reasons or explanations to ensure individual freedom are security and self-autonomy. If every people live in society does have individual freedom which means that their society must have well developed in security and have self-autonomy. But for the ensure community-building is about social capital which means that all citizens and governments work together with a good community in society.