Sunday, February 16, 2020

Values Essay Example | Topics and Well Written Essays - 750 words

Values - Essay Example However, there is a disparity when it comes to loyalty. I hold that loyalty should be kept only when it is necessary. For example, in case an agency is exploiting people, it significant to tell the truth (Kraemer, 2011). Describe how people acquire and change values Everyone is guided by values; the difference is that we vary on how intensely we hold each our values. This is linked to how our values have been molded during the course of our lives. Recurrent engagement of values is likely to reinforce them. Our lives offer frequent prospects for and restrictions on the detection and development of some values. In addition, practice ensures that values are instilled in our mind (Duggan & Cowburn, 2013). Our involvement with different features of culture and society helps acquire and strengthen certain values. Churches, trade unions, Community centers, and libraries are examples of establishments that we are part of and recognized as encouraging the mutual understanding in that they may surge to the significance we put on equality, friendship, or social justice. Our experience with parks and forests promotes our appreciation for nature and other intrinsic values (Kraemer, 2011). Our experience of particular institutions as well as guidelines can alter or strengthen our views of what is conceivable, wanted, and normal through a procedure identified as policy feedback. Exposure to the institutions of consumer culture may also represent a form of policy feedback. Through our day-to-day lives and interaction with others, we acquire certain values and change others. We encounter different experiences and different people who believe in different things from us and who hold different values from us (Howe, 1995). In the process of interacting with them, we may acquire some new values and therefore changing the values, we have. We also acquire new values form our different religions and cultures. Explain what values do to us and for us Values are those guidelines and prin ciples that guide our life. Our values provide an outline to our conduct even though we are uninformed of what values are. Understanding our values provides one with a superior awareness in behavior. Our decision-making ability depends on the value we have in that we can do something based on which values we hold. Appreciating the significance of our values offers transparency in that we are in a position to define and understand ourselves (Barkan, 2011). Values can also offer discernment into the nature of interactive relationship that one should engage in while relating with others. When we identify and comprehend the meaning and importance of our values, we are able to appreciate ourselves, our relationships and our view of the world. What is the nature and importance of human values at the workplace? Upholding values at the work place is important for any organization. Employees who uphold values are likely to perform well as compared to those who take them for granted.

Sunday, February 2, 2020

Private International Law Essay Example | Topics and Well Written Essays - 4250 words - 1

Private International Law - Essay Example In the resolution of cases of conflicts of law, problems arise when the different nationals have different rights and claims under their own laws, and at times the law of the place and the law agreed upon in a contract add a third or fourth consideration as to which set of laws shall apply in settling the case. There are three important determinations to be made prior to even beginning to address the substance of the case. The first is that of jurisdiction, and the second is the choice of law, and third is the matter of enforcement of the judgment. In this essay, only the first two shall be considered. Jurisdiction refers to the power to legislate or adjudicate with effect. It is the first question to be decided in a dispute involving a foreign element.1 Proceeding to hear a case without the proper jurisdiction is fatal to the case under that tribunal, and can only be remedied by a change of venue. The second important consideration is that of the choice of law. Once the English cour t has accepted and affirmed jurisdiction, it has then to determine what system of law must be applied to the dispute, pursuant to which the rights and liabilities of the parties shall be determined.2 There are two contexts of jurisdiction – territorial jurisdiction, and power jurisdiction.3 The first, territorial jurisdiction, pertains to the determination of which persons are within the reach of the courts of England, as claimed by English law. Contrary to the term’s implied meaning, this jurisdiction may extend beyond the physical boundaries of England and Wales (where this law is applicable), where English nationals over which the English legal system claims jurisdiction may sojourn outside the geographical territory of England and Wales. The second context in which jurisdiction may be taken refers to the power jurisdiction, that is, the situations and circumstances where the English courts may actually gain power to adjudicate a particular case involving persons wh o are within the territorial jurisdiction of the court.4 In order for an English court to gain competence over a case, said court should gain both territorial and power jurisdiction over the case. In private international law, the characterisation of issues subject of claim is the prerogative of the court of the forum.5 The case of Brian First claim: The consignment of biscuits from Bleagh Spa The claim of right in this case is one that arises out of contract. A contract of sale for Italian biscuits was drawn between Brian and Italian food supplier Bleagh Spa for the delivery of biscuits specified to be Italian. Instead, Bleagh had delivered Liechtenstein biscuits, which were unsuitable for the purpose for which they were bought, as such products should be sold in an Italian restaurant as Italian fare. This constituted a breach of the terms of the contract which specified the goods to be Italian. As such, Brian had a claim of right against Bleagh, one that constitutes a dispute of t he fulfilment of a contract that is of a commercial nature. . Jurisdiction As to the domicile of the parties, it is specified that Brian is domiciled in the U.K., being a British national and living within the U.K. as permanent resident. Bleagh Spa, on the other hand, is an Italian business organisation, and in the absence of other information, is presumed to be domiciled in Italy. The conflict of laws problem therefore arises between the

Saturday, January 25, 2020

Dangers of the Internet | Essay

Dangers of the Internet | Essay Abstract This essay presents a critical debate on whether the Internet is as dangerous as the physical world. First, the unique dangers posed by the Internet are outlined. This is followed by an examination of some of the major threats to safety that are present in the physical world but not in the virtual world. In the conclusion, the report also looks into how the virtual world might shape in the future. Is the World of Networked Computing as Dangerous as the Physical World? Introduction In cyberspace, no one hears your screams. (Merkow and Breithaupt, 2000) Modern society depends on the technology of networked computing more than ever. Whether it is the Internet, the World Wide Web (WWW), or other less well-known networks, people around the world depend on it for multifarious reasons from work and entertainment to essentials of life such as life support in medicine. Networked computing offers easy access, a large degree of anonymity and while this presents us with unique opportunities, it also presents us with unique dangers. In light of the increasing use and even dependence on networked computing, it is pertinent to examine the social, physical and ethical dangers presented by it. This essay critically debates the issue of whether the world of networked computing is as dangerous as the physical world. The Dangers on the Internet Preying by Paedophiles One of the most disturbing crimes on the Internet today is ‘grooming’. Child grooming is an act where a paedophile will befriend a child, or form an intimate relationship in order to lower a child’s sexual inhibitions. Grooming will initiate from chat rooms designed for children and teenagers and sometimes through emails, where an adult will pose as a teenager, but will often move into using instant messaging services so that the paedophile can talk the victim into sending images and even using a webcam. Research conducted by the Cyberspace Research Unit at the University of Central Lancashire states â€Å"another of the frequent topics concerned on-line grooming and in particular, ways in which to avoid detection† (O’Connell, 2003). While this statement gives concern that paedophiles may be able to escape without notice, the report goes on to say, â€Å"Throughout each of the stages there are clear and easily identifiable differences in the pattern s of behaviour of the individuals.† The stages that are talked about here are known as ‘Friendship forming state’ where the paedophile will just spend time getting to know the child, ‘Relationship forming state’ where the paedophile will start to ask questions about things such as school and home life, ‘Risk assessment stage’ where the paedophile will ask the child questions like who else uses the computer, ‘Exclusivity stage’ where the victim is encouraged to trust the paedophile, and ‘Sexual stage’ where the paedophile will ask the child about previous intimate experiences. Bullying and Other Negative Electronic Relationships The virtual world is home to some serious negative and destructive electronic relationships. Cyber bullying, one of the more common ones, is mainly targeted at school pupils in addition to actual physical and verbal bullying. Carnell (2007) points out to evidence that many pupils are being targeted in their own homes, by phone texts, silent calls, on instant messenger, and by abusive websites and forums, some set up with the specific intention of causing humiliation and embarrassment. This shows the severity of cyber bullying in society today. Griffiths, M.D. (1998) offers the following explanation. The Internet is easy to access from home or work. It is becoming quite affordable and has always offered anonymity. For some people it offers an emotional and mental escape from real life, and this is especially true for individuals who are shy or feel trapped in unhappy relationships. It is also true for individuals who work long hours and have little opportunity for social life. Electronic (or internet) relationships started off when chatrooms were introduced and really boomed since the creation of Instant Messaging. A person can enter a chatroom, use an alias, and can talk to other members without revealing their true identity. However, this raises an important question. If you can do all that without revealing your true identity can you really trust the person you are talking to? Can you be certain that they are being honest with you? Some say that it’s not real and therefore they don’t really worry about it, while others suggest that Internet relationships have a way of tapping into deep feelings and it’s easier to get hurt. Katz and Rice (2002, p286) suggest, â€Å"students are meeting and â€Å"dating† on the internet†¦they even have monogamous relationships this way, telling others who might ask that they will not go out with them because they are â€Å"dating† someone.† Various researches suggest that it is more common for young people to meet and date people using the Internet and it is becoming more widely accepted as a social meeting point. This however causes concerns about why people are choosing to use the Internet for this reason. Many people feel more comfortable talking about feelings over instant messaging, and this is especially true of shy people or people that feel trapped in an offline relationship. Addictions The Internet also has the notoriety of helping to create unhealthy addictions. The majority of UK bookmakers now run online websites in which people can make exactly the same bets they would in the betting shop, but from the comfort of their own home. The rate at which the online gambling industry is commercialised today is astronomical. From 2005 to 2006 the sector has become the fifth largest advertiser online, jumping to 2.5 billion from 911 million ads in the last year (Schepp, 2002). And this is without the likes of TV ads, magazine ads, and adverts on the radio. This means that the majority of people in society now see online gambling as more acceptable than in recent years. Besides the increased risk of fraud on the Internet, the online gambling also poses the serious problem of an easier way to get addicted. This is because it is relatively easier to sit in front of a computer and gamble than to walk to the nearest betting shop in the cold winter to make a bet. Gambling is ho wever, just one of the addictions people are vulnerable to online. Mitchell (2000) uses the term Internet addiction to indicate the spectrum of additions that one is susceptible to on the Internet. He states that although there is some disagreement about whether Internet addiction is a real diagnosis, compulsive Internet use has psychological dangers, and reports such behaviour can result in the users having withdrawal symptoms, depression, social phobia, impulse control disorder, attention deficit disorder, etc. Viruses and Hacking In 2000, the number of worldwide email mailboxes was put at 505 million, and this was expected to increase to 1.2 billion in 2005 (Interactive Data Corporation, 2001). Schofield (2001) points out that more than 100 million people use instant messaging (IM) programs on the net, and a growing number among them also use it to transfer files. This number is obviously growing, but this example shows that online communication is becoming a much widely used method of communication. Online communication such as email and instant messaging does not come without problems. Hindocha (2003) states that instant messengers can transfer viruses and other malicious software as they provide the ability to transfer text as well as files. Viruses and malicious software can be transferred to the recipients computer without the knowledge of the user. This makes them very dangerous. As the use of online communications becomes more widespread, it is seen as an opportunity for people to gain access to the fi les on a computer. Hindocha (2003) gives the example of hackers using instant messaging to gain unauthorised access to computers, bypassing desktop and perimeter firewall implementations. This is a real concern for most users, especially as the instant messaging and email client software are trusted software; for a home user, their personal information stored on the computer, such as internet banking security details, identifying information that could be used in identity theft, etc. are the risks. However, online communication software such as these are also often used in businesses also, and in this case, extensive records of financial information are vulnerable. Hindocha (2003) goes on to say about instant messaging systems, â€Å"finding victims doesn’t require scanning unknown IP addresses, but rather simply selecting from an updated directory of buddy lists.† This throws up serious concerns. Theft and Fraud Electronic commerce faces the major threats of theft and fraud. Online theft commonly occurs in the form of identity theft, and less commonly, outright theft, for example by unauthorised access to bank accounts. Camp (2000) points out that while it may seem a big leap to exchange a bill of paper money for machine readable data streams, the value bound to the paper abstraction of wealth is simply a reflection of trust in the method of abstraction that is widely shared and built over centuries. Money on the Internet is simply a different abstraction of wealth, and has similar issues with trust and risk as traditional money, together with the additional dangers posed by the virtual nature of the environment. Because all communication on the Internet is vulnerable to unauthorised access, this means that it is relatively easy to commit fraud. Where legislation is not a deterrent, technology is almost none. Credit card fraud and theft, electronic banking theft, etc. are some of the more co mmon crimes committed online involving money. What Makes It Safer Than The Physical World? Safe from Immediate Physical Harm Perhaps the only upper hand the virtual world has is that its inhabitants are immune to the immediate threat of physical violence; one cannot be randomly mugged online. However, vulnerable people are still susceptible to physical violence and harm, perhaps more to self-harm; there are many websites that promote anorexia, suicide and self-harm, and this can leave a big impact on impressionable minds. Presence of Strong Safeguards The main safeguards on the Internet are policing with the accompanying legislation, and technology itself. There are organisations in place to deal with the abusive websites and forums, appropriate legislation to prevent child pornography, paedophilia, theft, fraud and a variety of other online crime. There is also a vast array of technology that can help keep adults and children safe online, from parental control software that can restrict the websites viewed by children, to anti-virus and cryptography software and firewalls that help prevent hacking and viruses and keep data safe. Conclusion Staying safe online It is commonly accepted that the Internet provides us with opportunities that have been hitherto unavailable. Many sing the praises of this so-called information superhighway; however, it is prudent not to be lulled into a false sense of security by the promising opportunities. People should be made aware of the dangers lurking in the Internet, and be given the education and means to take steps to stay safe online. Just as children are taught not to speak to strangers in the real world, they should be taught not to speak to strangers online as well. Education in schools should include education about how to stay safe online; just as children are taught that eating fruit and vegetables are healthy, they should also be taught that excessive online activities can lead to addiction, with various negative consequences. This is because the virtual world is not very different from the physical world in terms of people waiting to take advantage of the weak and vulnerable, and also with respe ct to dangers such as addiction. The future of the virtual world In many ways, the virtual world is a reflection of the real world. After all, the people who inhabit the real world are the same people that also inhabit the virtual world. It follows therefore, that what people do and want to do in the real world, they would try to do in the virtual world too. Where the physical constraints of the virtual world restrict them, they would try to find ways to get around it. The rapid development of technology also gives rise to new means by which people can do things, beneficial or harmful. The development of virtual reality may mean that one day, people in the virtual world may not be immune to immediate physical harm either. However, the technology by itself is neither good nor bad; it is the way the technology is put to use that creates positive and negative consequences for human beings. In the end, it can be said that virtual world is perhaps just as dangerous as the physical world. References Camp, L. J.(2000) Trust and Risk in Internet Commerce Publication: Cambridge, Mass MIT Press. Carnell, L. (2007) Pupils Internet Safety Online. Bullying Online [online]. Available at: http://www.bullying.co.ukpupils/internet_safety.php (last accessed Aug 2007) Griffiths, M.D. (2002) The Social Impact of Internet Gambling Social Science Computer Review, Vol. 20, No. 3, 312-320 (2002) SAGE Publications Griffiths, M. (1998) Does Internet and computer â€Å"addiction† exist? Some case study evidence International Conference: 25-27 March 1998, Bristol, UK IRISS 98: Conference Papers (Available online at http://www.intute.ac.uk/socialsciences/archive/iriss/papers/paper47.htm last accessed Aug 2007) Griffiths, M.D. (2000) Cyber Affairs. Psychology Review, 7, p28. Hindocha, N. (2003) Threats to Instant Messaging. Symantec Security Response, p3. Interactive Data Corporation (2001) Email mailboxes to increase to 1.2 billion worldwide by 2005 CNN.com (Available online at http://archives.cnn.com/2001/TECH/internet/09/19/email.usage.idg/ last accessed Aug 2007) Katz, J.E. and Rice, R.E. (2002) Social Consequences of Internet Use. Massachusetts Institute of Technology. p286. Merkow, M. S. and Breithaupt, J. (2000) The Complete Guide to Internet Security New York AMACOM Books Mitchell, P. (2000) Internet addiction: genuine diagnosis or not? The Lancet,Volume 355,Issue 9204,Pages 632-632 O’Connell, R. (n.d.) A Typology of Child Cyber Sexploitation and Online Grooming Practices. Cyberspace Research Unit UCLAN, p7-9. Schepp, D. (2002) Internet Gambling Hots Up BBC Online (Available online at http://news.bbc.co.uk/2/hi/business/1834545.stm last accessed Aug 2007) Smith, J. and Machin, A.M. (2004) Youth Culture and New Technologies. New Media Technologies, QUT.

Friday, January 17, 2020

Leader-Member Exchange theory of leadership Essay

The Leader-Member Exchange theory of leadership (Also known as LMX, LMET or Vertical Dyad Linkage Theory) is a type of leadership theory that focuses on the dyadic relationship between leader and follower where the leader treats individual followers differently, resulting in two groups of followers—an in-group and an out-group. The in-group consists of a small number of trusted followers with whom the leader usually establishes a special higher quality exchange relationship. The out-group includes the followers with whom the relationship of the leader remains more formal. It focuses on increasing organizational success by creating positive relations between the leader and subordinate (follower). The theory asserts that leaders do not interact with subordinates uniformly. ‘In-group’ followers perform their jobs in accordance with the employment contracts and can be counted on by the supervisor to perform unstructured tasks, to volunteer for extra work, and to take on additional responsibilities. Supervisors exchange personal and positional resources (inside information, influence in decision making, task assignment, job latitude, support, and attention) in return for subordinates’ performance on unstructured tasks. High LMX relationship achieves increased mutual trust, confidence, job satisfaction, organizational commitment, common bonds, open communication, independence respect, rewards & recognition and hence benefits both the organisation and the employee. Recognizing the existence of the in-group and out-group, could be discriminating against the out-group thus affecting employee turnover based on bad-quality LMX and job dissatisfaction. This is because members of ‘out-group’ Example of an organization that has successfully used this theory is ‘E-Myth Worldwide’

Thursday, January 9, 2020

Acct2127 Course Guide S2 2013 - 2393 Words

RMIT Course Guide System - HE Part B: Course Detail Page 1 of 5 Accounting for Management Decisions Part B: Course Detail Status: Published Version 1 Teaching Period RMIT Course Code RMIT Course Title School Career Campus Learning Mode Primary Learning Mode Sem 2 2013 ACCT2127 Accounting for Management Decisions 615H Accounting Postgraduate City Campus Face-to-Face Primary learning mode is face-to face class seminars Credit Points Teacher Guided Hours Learner Directed Hours Course Coordinator Course Coordinator Phone Course Coordinator Email Offering Coordinator 12 36 per semester 72 per semester Arabella Volkov 9925 5731 arabella.volkov@rmit.edu.au Arabella Volkov Offering Coordinator Phone +61 3 99255731 Offering†¦show more content†¦19/07/2013 RMIT Course Guide System - HE Part B: Course Detail Page 3 of 5 7 COST

Wednesday, January 1, 2020

The Issue Of Criminal Activities - 1554 Words

To participate in criminal activities means to be involved in â€Å"An act committed in violation of law where the consequence of conviction by a court is punishment, especially where the punishment is a serious one such as imprisonment.† There are various reasons why an individual may choose to commit the offense; however, there are also many different developing theories and suggestions about why crimes actually occur at all. For example; do some individuals have a predisposition, born of either their nature or nurture, which leads them to commit crimes? Can the likelihood of committing a crime be decided within the first four years of life? And therefore, whether or not are offenders always to blame? Attachment can be defined†¦show more content†¦These children are often easily soothed by their attachment figure and are able to then grow and develop confidence in their attachment figure to be there to support them. Children are then able to use their attachment figure as a secure base in which to explore their surroundings. However, when the child and their caregiver are separated, the child becomes upset and distressed until their return, in which they are again easily comforted. An insecure resistant attachment develops as a result of inconsistent levels of responses from their primary caregiver. The child grow to be dependent on their attachment figure and often exhibit clingy behaviour but as a result of not developing any feelings of security toward them, they are not easily soothed or comforted by interaction with their primary caregiver when distressed. Children with resistant attachment type explore their surroundings very little as they prefer to stay within the close proximity of their caregiver. Insecure avoidant attachment type may develop if the child’s primary caregiver is inattentive or unavailable during times of distress. This motivates the child’s belief that any communication of their needs will have no impact on their primary caregiver. As such the child then continues not to seek contact with their caregiver during further times of distress. Children with this attachment type also tend not to orientate their explorations of the world in accordance to

Tuesday, December 24, 2019

Essay about AIDS Problem - 2599 Words

1. Introduction Acquired immunodeficiency syndrome, also known as AIDS, is caused by human immunodeficiency virus (HIV).HIV damages body’s immune system by destroying white blood cells which help us to destroy invaded pathogens. When HIV enters a white blood cell, it may remain dormant. However, once it is activated, it infects another cell to produce many new HIVS. After a certain period of time, the white blood cells are destroyed and leading to a loss of function of the immune system (Y.K. Ho,2004). People infected by HIV will turn out to have AIDS. Infected people are very weak to fight off other infectious disease and soon they will die. According to the data and statistics of WHO, global summary of the AIDS epidemic, 2009, the†¦show more content†¦At, that time, more than 100 thousand farmers were infected; nearly 10 thousand of them died. Predicting the trend, it is difficult for China to have only 370 thousand people living with AIDS as the Chinese government just want to hide the fact and did little to deal with the current situation. This essay will state the factors leading to such condition in detail. And also criticizes the policies or measures that applied by the government. At the end, there will be some suggestion to resolve the issue. 3. Factors that lead to the condition According to the public health model, health status is not only relying on individual and form a biological perspective. It also related to the interaction with the social or physical environment. Therefore, when analyzing the factors that lead to the severe AIDS problem in Henan, where the famous â€Å"AIDS villages† located in China, we should consider comprehensively, include the scientific, economic and social perspective. ï  ¬ Scientific perspective In this case, the epidemiologic triangle can be used to describe the rapidly transmitted AIDS disease. The triangle is composed by three parts: pathogen, host and environment. This part will focus more on pathogen and host; environment will be further discussed in economic and social perspective. A common pathogenetic feature underlying is the deficiency of the immune system caused by HIV, whichShow MoreRelatedAids : The Problem Of Aids1250 Words   |  5 PagesAlthough advancements in AIDS research have continued over the past 2 decades, the misconception that people can contract the AIDS virus from sharing a drink is still prevalent. Aids is a major issue throughout the world and kills many people. One of the problems with aids is that it can kill people. A current solution for aids is there are medicines that people suffering from aids take and these medicines increase a person with aids life span. A future plan for aids is to find a cure so that peopleRead MoreThe Health Problem Of Aids1652 Words   |  7 Pages Getting to Know HIV Alberto Macias ID#: 58522456 PH 1- Dr. Bic November 8, 2015 Public Health Problem HIV stands for human immunodeficiency virus. It attacks the t-cells in the human body and when it destroys so many, it leads to a disease called AIDS (acquired immunodeficiency syndrome), the final stage of the HIV infection. HIV is one of the few viruses that is yet to be curable, so once you contract it, you have it for life. It affects the cells of theRead MoreThe Problem Of Hiv / Aids1093 Words   |  5 PagesHIV/AIDS Background/Intro: Public Health costs us, as tax payers, a lot of money. Without public health initiatives, diseases such as small pox would still be with us, and other diseases, such as antibiotic- resistant staphylococcus would get out of control and cause sickness and death throughout the country. As taxpayers we rely on our government to ensure that we get â€Å"good value† for our money. In Australia our health is very good compared to may nation of the world and most citizens’ have comeRead MoreThe Problem Of Hiv / Aids1871 Words   |  8 Pagesproject, we wanted to see how much the average high school student knew about HIV/AIDS- ourselves having minimal knowledge of the disease. In order to do so, we created a quiz and charted the results. After reviewing the results of the quiz, we realized that this ISP is giving us the platform to inform and enlighten ourselves and others of this serious global phenomenon. The quiz consisted of basic questions regarding HIV/AIDS and the ratio of correct to incorrect answers was mostly even with a few irregularitiesRead MoreThe Problems Caused by AIDS in Africa718 Words   |  3 PagesDid you know â€Å"AIDS is the leading cause of death in Africa† (Quinn, online). Twenty percent of Africa’s population has died from AIDS. Poverty is a big problem in Africa. Men have been forced to become migrant workers in urban areas. And antiretroviral treatment at this time is not available to African people. AIDS is a big problem in Africa today that is now requiring help from the world. There are an immense amount of problems in Africa caused by the AIDS disease. Healthcare providers areRead MoreThe Hiv / Aids Social Problem863 Words   |  4 PagesHIV/AIDS social problem. The conflict theory is simply a theoretical approach that views social problems based on conflicts between two or more groups. In addition, society is divided by social classes which are confrontational, competitive and attempt to exploit one another to gain social status and power. This division can be related to racial and ethnic inequalities, which is often created by prejudice and bias. When we directly evaluate this theory as it relates to HIV and AIDS, it aids in explainingRead MoreProblem And Extent Of Hiv / Aids1539 Words   |  7 PagesProblem and Extent of HIV/AIDS Impact in China From the narrative, Dazou merely represents one of the thousands of people who have contracted HIV through paid plasma plasma donation and unhygienic blood banks. The National Health and Family Planning Commission of the People’s Republic of China reports 501,000 reported cases of people living with HIV/AIDS. Although the pervasiveness of HIV may be low compared to China’s 1.3 billion population, certain communities have HIV prevalence rates as highRead MoreThe Health Problem Of Hiv / Aids2353 Words   |  10 Pages Health problem is a pathological state, in which a physical condition caused by the disease. To make the person free from the diseases is the main goal of the Health promotion program. Now I am interested to discuss about on epidemiological case i.e. HIV/AIDS, which is more common in world wide. And more dangerous which spoils the person’s life knowingly or unknowingly and I want to create awareness regarding this disease mainly in rural areas and use importantRead MoreAids : Too Big Of A Problem Essay1785 Words   |  8 PagesAIDS: Too Big of a Problem Something that I have come to learn this semester in Core 7, between the books and lectures, is terrible the disease of AIDS is in Africa. The disease is taking over a million lives a year. The numbers are sickening to look at. The disease has become, undoubtedly, a huge problem in Africa. Is it possible to put a stop to this terrible disease that is killing Africans by the millions? AIDS is very prevalent throughout all of Africa. The presence of this epidemic is a massiveRead MoreHiv / Aids And Young People : The Problem And The Solution1081 Words   |  5 PagesHIV/AIDS and Young People: The Problem and the Solution According to the Foundation for AIDS Research, â€Å"Among the 1.1 million Americans living with HIV/AIDS, twenty-five percent of them are between the ages of 13 and 24† (The Foundation for AIDS Research [amfAR], 2015). In other words, HIV/AIDS (Human Immunodeficiency Virus/Acquired Immunodeficiency Syndrome) is very common among teenagers and young adults. People in this age group are infected with HIV every day. As a result, Healthy People 2020