Thursday, October 31, 2019

Participation Discussion Questions Essay Example | Topics and Well Written Essays - 750 words

Participation Discussion Questions - Essay Example Sometimes planners think about that marketing fated planning efforts right from the start by in advance promising features, techniques, and budget. They think that the planning step was quick, poorly budgeted, and with irritation managed by management. Planners think that the development group did not completely made use of their planning documentation and that management permitted them to deviate too far from the planned project development (Kerzner, 2006). In this discussion Amon has presented the overall Project Technical Planning in a better way and I am agreed with his views. In this discussion Sandya has presented the project planning in view of resource handling and main agent. She has also discussed about the risk management as a sub-activity in the project planning. Without proper planning a project can not achieve success. There is a successful planning at the back of every successful project. The key to a winning project is in the planning. Forming a project plan is the first thing managers should do when taking responsibility of any kind of project. Often project planning is disregarded in for saving time. However, many people fail to recognize the significance of a project plan in saving time, money and many problems (Pinkerton, 2003). I will add to the view of Sandya. As she considers the project planning as the management of resources but project planning is indispensable. Not only it is a roadmap to how the work will be carried out, but it is also a tool for decision making. The plan suggests alternative approaches, schedules, and resource req uirements from which the project manager can choose the most excellent substitute. A complete plan undoubtedly states the tasks that need to be done, why they are compulsory, who will do what, when it will be completed, what resources will be needed, and what criteria must be met in order for

Tuesday, October 29, 2019

Will Machines Replace The Human Race Research Paper

Will Machines Replace The Human Race - Research Paper Example The widespread phenomenon, however, provides a biased and one sided view. This paper aims to rebut this conception about human vs. robots debate. Waters and Waters (1995 p. 86) provides that the wide use of robots and machines in the modern environment may lead to massive amounts of unemployment. The computers, other machines and robots are able to tackle most of the tasks that were traditionally performed by human beings. This replacement of human tasks has reduced the need of labor force in the work environment. However, the complete replacement of human beings with robots or any kind of machinery is impossible to achieve. If we assume or take the position of people who presume robots as a replacement of human power and need for the organizations and other areas of life, it is quite obvious that robots are not able to perform every task which they are directed to perform. The main distinction between a human being and a robot is the ability to think, evaluate and form judgments on those thoughts and feelings. Human beings perform a task keeping their thoughts, views and personal likes influencing them. The Robots, however, perform the task in the exact manner that they are programmed to do so (Kids can press 2008 p. 37). Robots lack thinking and critical viewing which are essential for human beings in order to face, tackle and go through every situation in their lives (Shelly et al., 2010 pp. 209-216). Machines are man-made. The simple phenomenon which rejects any power or force given to the machines over humans is the reliance of machines on human beings for their performance, existence and instructions. The machines and robots are human made and they are incapable of performing any task which is out of their programming. A human, on the other hand, has the ability to perform every task assigned to them. They have the power to think, plan and perform the tasks assigned to them. Human beings are not reliant on any kind of programming to perform the entirely d ifferent tasks. They can perform home chores as well as the business activities which are totally different things yet they do not require any new programming or alteration in their regular mechanisms unlike machines. Machines and robots are entirely dependent on how human beings program and use them. They have a unlimited number of tasks which they can perform with new programs installed in them by the human beings. They can perform life-risking tasks which human beings cannot since robots are not living things. They are machine-based human figures (McMeans 2010, pp. 185-187). The media plays an important role in setting up views and altering the perceptions of human beings. The movies and shows which promote the view of robots and machines overrunning the human race are merely exaggerating the idea and use of machines. The concept of technologies and their use is not truly exposed in the movies and shows which recently portray how machines and robots may rule over human beings (Sc alzi 2005). The machines and technological advancements may be of less importance or benefit for one group but the group which is benefitting from them is much larger. The machines are promoted, developed and used by human beings. They have the power to create and destroy them, however, the extreme integration of machines in our lives leaves no space for us to eliminate the use of machines. The robots are developed to perform a particular task in any field. The robots are used in the households to help the mothers and other family members in the routine work. Robots are also used for commercial purposes like in the businesses in packing, data saving or any other field. The use of robots in battle fields is also common (Safford 1978). Robots are used in aircrafts in wars to keep the

Sunday, October 27, 2019

Literature Review of E-Banking

Literature Review of E-Banking CHAPTER 2. LITERATURE REVIEW This chapter is the literature review; the purpose of this chapter is to investigate past publications by different authors. This will include textbooks, articles and online publications that could enlightened the readers more on the area of banking and internet security measures, the standard and policy used for internet banking security in the United Kingdom and more importantly, the synergistic impact of online banking and information security in the UK banking sector. Since the invention of information technology and the internet, people of different calibre are using it to improve the services efficiently and effectively. In the retail banking sector, most of the businesses have moved majority of their physical transaction processes to online transaction process. A good example of this, I own an account with the HSBC bank for over 4years now and I cannot remember the last time I went into my branch to transact business. Most of my bill payment and transfers are done through my online banking.) Irrespective of this, Lassar et al. (2005) also affirmed that financial institutions should be able to forecast and figure out how such technology will be applied by customers. Banks and Financial institutions rely upon mostly on Information Technology for their everyday activities; therefore the Information acquired by financial organisation is not used only by the organisation and their employees but also by their customers and stake holders and partners. The users who rely on these services anticipate constant possibility of direct access to organizational information (McAnally, et al 2000). Comment..Your idea is good but you are not using well structured sentences and paragraphing. We need to talk about this asap! DEFINITION OF E BANKING. The growing tendency of e banking transaction has really signalled issues on information security that are to be noted and stringently taken care of. To get this security managed, it must be a combined effort and relationship between the customers and the financial institutions. (Re-structure the above paragraph) In general, e-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic, interactive communication channels. E-banking includes the systems that enable financial institution customers, individuals or businesses, to access accounts, transact business, or obtain information on financial products and services through a public or private network, including the Internet which is an integral part of e-banking. (FFIEC handbook, 2006). This new development as drastically changed the phase of internet business in the United Kingdom and it is a welcome phenomenon. WHAT IS INTERNET BANKING. For quite some years now, internet banking levels have been executed to be more fficient approach through which the banking transactions are made without having o leave your place of abode or your place of work. Some of the customers have been ecognised to turn to internet banking as a result of frustrations with conventional tandard of operation and practices. Anand, (2008) said further that while some ustomers want human interaction in transaction, some of them turned to the internet acilities for security reasons. The reason is that the customer are given assurance that heir transactions are safe and secured and most of these transactions are made via the nternet explorer interface. In its report in 2009 (what report?.This is not Harvard standard of referencing), he said online bankinghas risen. 25% of all the people who responded as regards to the most preferred way to bank.Mobile bankinghas not started at all. Only 1% of the people make transaction via mobile. The figure below s hows how they stand: Online banking: 25% Branches: 21% ATM: 17% Mail: 9% Telephone: 4% Mobile: 1% Unknown: 23% Comment Can you represent this figures or percentage with a pie chart/graph or something more comprehensive? He went ahead and said more people visit the bank branch than using the online banking . The term internet banking can then be referred to as the use of internet as a secluded way of doing banking services. These services comprise the conventional ways such as account opening or funds transfer to different accounts and new banking services like payments online that is customers permission to receive and pay bills on their website. Having understood the significant importance of IT and e banking and amount of risks and threats involve in driving the business process, therefore there is need for consistent continuation of security in business, which brings about the understanding of Information security. It is a continuous process. Information security, is the process of protecting information and information system from unauthorised access, use, disclosure, disruption, modification, destruction or bombardment, it involves confidentiality, integrity and availability of various data irrespective of the form the data takes. E.g. electronic, print, written verbal or in any other forms. (ISACA and CISA Review Manual, 2006). Comment You are not given your headings titles figures e.g. 2.0, 2.1, 2.2 etc You did not give your tables title and figures either. An Overview Of Online Banking Environment in UK An increasing competitions among the financial institutions have forced many of the competitors to offer similar prices on deposits and loans, the effort for gaining competitive advantage were shifted towards no priced-factors (Akinci et.al 2004). customers and financial institutes have noted the recent revolution in UK retail banking. The conversion from traditional banking to internet banking has been effective (kolodinsky and Hogarth, 2001). Although some researchers have bated that online banking has not lived up to expectation e.g Sarel and Marmorstein (2003) and Wang et al. (2003), a lots of studies still say that internet banking is still the most wealthiest and profitable means to transact business(Mos,1998;Sheshunoff, 2000).Online banking has come to stay no doubt about that and financial institutions are ready to move on with it. Luxman (1999) for example predicted that in the nearest future that the importance of internet banking will be felt most especially in the remote areas where some bans have closed their branches Going by the survey carried out for alliance and Leicester by (VOBS survey, 2004), 2,395 UK adults were interviewed, more that half of them now bank online. 61 percent now used it more than the previous couple of years. However, visiting the baking hall is very much popular with respondents preferring to go to banking and deal face to face with the banking staff for activities like paying cheques 73 percent, 20 percent withdraw cash over the counter and 20 percent will lodge on one complaints or the other. Mike Warriner (2008).said in a recent report from Forrester stated that only 31% of British adults bank online despite 75% regularly shopping online to quote Benjamin Ensor, principal analyst at Forrester Research, By international standards, the U.K. is an online banking laggard. He then goes on to say that The U.K. also has a relatively large number of quitters, with about two million people saying that they used to use online banking but have given up. WHAT IS WRONG WITH UK INTERNET BANKING According to a survey carried out by Darrell R. (2009) Medium size organizations all over the world are very much concerned about cyber threats. The number of incidents reported really justifies their doubts. At the close of mid 2009, McAfee discovered a new malware as they did in 2008 which could cause a lot of havoc in the internet world..Irrespective of this discovery; most organizations still cut their IT security budget instead of increasing it. A threat up budget down, McAfee called it security paradox. Ron C. (2009) reports that most companies in the UK are lagging behind the rest of the world in information security management practices, according to a new study from PriceWaterhouseCoopers. 7,000 security professionals all over the world was surveyed, mainly in large companies consisting of 455 in the U.K. The survey found out that British organisation emerges to be less prepared to fight the risks that tackle them in their information systems. The table below shows that U.K. lags in quite a few key areas of information security. Organisations have smaller amount CISOs in place; only 37% have a clear idea of where their data is stored. Then, nearly half (49%) do not know the number of security incidents they experienced in the preceding year. INTERNET TRANSACTION Transactions online help customers with the competence to conduct transactions via the website of the institution by introducing banking transactions or buying products and services. There are lots of transactions customers can engaged in on the internet which can be a small as basic retail account balance to a very big business funds transfer. Internet banking services, such as the ones carried out through some other means are categorised based on the type of customers they support. The following table shows some of the common retail and wholesale internet banking services offered by financial institutions. (FFIEC, 2006) Since transactional websites typically enable the electronic exchange of confidential. Customer information and the transfer of funds, services through online banking makes the financial institutions to be vulnerable to higher risk than basic. ADVANTAGES OF ONLINE BANKING. Convenience According to (Gerlach, 2000), internet banking services allow customers handle their habitual banking transaction without visiting the bank building or meeting any banks staff. No need to wait until 8 or 9 in the morning before you can get answer to your bank account request or details Customers can handle their transactions anywhere they like as long as they are connected to the internet or where there is availability of internet. However, since most banks offers 24 hours online banking services 7 days a week, internet banking can allow you to view and work with your account no matter what time or day it is. Thus, they can make payments, check balance, transfer money etc at the comfort zone of their homes or offices. Hence online banking has broken the limitations of the conventional way of banking thus provides customers swiftness and convenience. Time Saving and Money. When you visit banks, you will discover that most banks branches are always engaged with one activity and customers have to wait for a long time before attended to. This is a waste of time and energy. Luckily, some banking transactions can be handled at home or in office or anywhere that is convenient for the customers. In other words, customers do not need to wait for a long time in a long queue or go to their respective banks branch to carry out their banking business. Online banking therefore helps can help customers to save time and cost of travelling. Ease and Efficiency As long as they adhere to the simple steps to be followed by login in their information and clicking the right button, customers can able to check their accounts and know what their balance is, transfer funds and also carry out other valuable transactions. The timely check can help customers overdraft charges and also to know if the transactions they made was successful and completed. Hence, banking online helps customers to manage their account more easily and conveniently. On Time Gain and Update Information Online banking systems also provide the customers a timely updates about both their existing and new products and services, banking news and other vital information that the customers need to know or be updated with. Therefore customers can benefit some relative information at the appropriate time for them to make quick and right decisions. Profitability Fewer banking building will be maintained as a result of online banking and fewer employers will be involved there is a much lower over head with online banks. The saving they get as a result of this process allows them to give greater interest rates on savings account and lower lending rates and service charge. Cost Effective Internet banking cost less, this is because there are only few buildings to maintain and salaries paid to employees will be reduced as well. Since they have more to safe now and this allows them to increase their interest rate on savings account and lower lending rate and charges Easier To Catch Fraudulent Activities Since you have the opportunity of viewing your account details at anytime, it is easier to know if any fraudulent activities have gone through your account before much damage is done. Once you log into your account, you will see immediately whether there is anything wrong when you check your deposits and debits. If you do not make any transaction and you see any strange details in your account, you will see it write away and make necessary alarm to the financial institution While the internet offers miscellaneous advantages and opportunities, it also presents various security risks. Having this in mind, banks take wide measures to protect the information transmitted and processed when banking online. This comprises ensuring confidential data sent over the internet cannot be accessed on modified by unauthorised third party. But banks dont normally have influence of the systems used by the customers. The choice is entirely up to them. More over a system connected that is a pc connected to the internet for example will usually be used for a number of other applications as well. The systems used by the online banking customers are therefore exposed to risks beyond the banks control. For this reason, the bankers cannot be liable for them. Berlin, (2007). Some Dangers Faced When Using the Internet. Berlin, (2007) Third party gaining access to information transmitted or getting information under false pretences, this can be done with the aid of the following: Virus and warms: Programmes that are sent over the internet that can damage your pc when they replicate. Trojans: programmes that intercepts passwords that is not known to users that compromise computer security. Phishing: Using a fake name, website or address for fraudulent purposes. Pharming: Users being redirected to fraudulent server Root kits; An unauthorized administrative level access without the real administrator noticing through a malicious software. Their feature is almost as Trojans. Hacking: Having access to a PC via the internet when not authorised. Banks now have some numbers of measures in place that gives effective protection against attacks when information are processed by the bankers server or when information is sent over the internet. SOME SECURITY RULES WERE ALSO GIVEN Rule 1: Install security software including an up to date scanner. Additional security software has to be installed. your normal operating system standard tools alone cannot solve some security problems. F your security is not adequately in place, you run the risk of unauthorised persons gaining access to your data.e.g never save you PINs and TANs on your PC. A firewall can protect you from such attack Rule 2: Protect sensitive data when sending it over open network. Data sent over the internet may be intercepted or viewed by an unauthorised third party when the network is not secured. Banks have now taken some measure to ensure that data sent via the internet is encrypted before transmission. Rule 3: Be sure you know who you are dealing with. Not everyone on the internet are not who they claim they are. Check the URL you are in and make sure that your banks internet address is correctly spelled. Hackers impersonate someone in a position of trust to get the information they needed. This is called PHISHING. It is another technique to steal confidential code. This works by redirecting you to their own rogue server. Rule 4: Be careful with sensitive data and access media Your access code and media must be protected e.g. (PINs, chips) from unauthorised use. Do not save sensitive data such as Passwords PINs, access code, credit card numbers on your hard drive especially if the PC is not been used by you alone. This could allow third party to view your data. Rule 5: Choose a secure password. A combination of upper case and lower case letters , numbers and symbols is a typical example of a good password usually of six to eight characters. It will be difficult for anyone to guess your password. Rule 6: Only use a programme from a trustworthy source Dont download from the internet any programme into your hard drive unless you are sure of the source and that its reliable. Rule 7: Use up-to-date programme version Use your preferred internet browser and PC operating system version that is up-to-date. Rule 8: Run security checks on your PC Take a few moment to run a personal security checks before using your PC to bank online. Make sure the entire security feature that protects your computer are on. Rule 9: The security setting on your internet browser must be activated. Use Block ActiveX Control and let Java applet to run after confirmation. Do not make use of browser auto-completion function which is able to save your user name and passwords you enter and suggest matches. Rule 10: Do not make your current account available for fraudulent financial transaction. Any offers that is asking you to make your current account available for payment and other financial transaction for unknown firms and individual must be suspicious especially if they are located not within your country SOME ONLINE BANKING SCURITIES AVAILABLE Internet Security: Internet security refers to the methods used in protecting data and information in a computer from unauthorized persons. It is a serious issue in the world wide today. People who use internet should be using the internet should be well conscious of the trouble aroused as a result of it. A familiar methods used by people to guarantee information in internet are Encryption of the data Encryption of data deals with packaging up the original information into an unintelligible form that can be decoded using a certain technique. This is called cipher text. Usage of passwords -Passwords are used to avoid illegal entry of data so that the entire system is protected. Creation of passwords must be in a way that the other people do not simply guess it. Methods: There are some several methods that helps in internet security. They are listed below; Firewalls:This is software that filters unlawful access in a network. It must have a correct configuration and has to be combined with proxy firewall for a protected system. Taking Backup of Data: backup of the data from the system should be taken regularly. If the computer unexpectedly crashes down or the operating system failed to boot due to virus attack, by taking the backup data will reduce the penalty. Preventing Virus Attack: Viruses can affect computer, Trojan horse, worms etc as a result of some infected files downloaded from the internet. They are programs that are installed by itself and run at any time the host programs run and cause malicious attack. Baleful Links:Those who use the internet can avoid their system from getting affected by the virus by avoiding needless links and emails.Links may lead to download files suddenly. These cause a problem to the security of the computer and therefore must be avoided. File Sharing:Both original and pirated files are joined when files are shared on the internet thereby reduces the speed of the computer. This must be prevented. Routers:Some connections are prevented by certain routers from outside from the computer. NAT (Network Address Translation) is software that does this function and its of low cost and smallest amount complexity. Preventing Spy-Ware: Internet securities are threatened by several software. Without the permission of the user some software runs along with other application. Insider threat detection sill a challenge Threats detection from inside has always been a problem, but most investments in information security still tend to focus on keeping out viruses and intruders. The possible danger of a rascal employee can regularly be discounted, mistreated or just take the risk of doing business. A new survey conducted among 600 office workers in Canary Wharf, London and Wall Street, New York, revealed that many employees have no qualms about mishandling information. One-third of them said they would steal data to help a friend find a job, and 41% admitted they had already taken data, just in case they needed it in some future employment. Ron C. (2009) The study, which was commissioned by security company Cyber-Ark Software Inc., found that customers and their contact details were the favourite files to steal, followed by plans, proposals and product information. CUSTOMERS ATTITUDE Understanding of the impact of technology based transaction system on customers perceptions and behaviour is essential. (Moutinho et al. 2000).If banks are willing to integrate new technology into their existing relationship buildng activities Asher (1999) argued that cooperate customers seems to be willing to use internet as a key medium in banks dealings. He said the evidence suggest that coperate clints have shown a preference for online banking, due to the perception of being more cost effevtiv thah conventional channels Financial institutions use this technology in service delivery may often compromise bank business relation. (Keltner 1995) in terms of higher degree of convinience and accessability. (Devlin 1995) Therfore customers perception is very high in the delivery of the electronic banking. According to Nexhmi et al.(2003). Customers participate typically is the process of enabling customers to make their services, products. It can be diversified between the types of serv ices offered, even the services providers within the same market place for intance. Meuter et al.(2000) points out that self service technologies are increasing the way in which customers interact with their providers in the creation of service outcomes and are a typical example of a market place transaction that require no personal interaction FINANCIAL INSTITUTION AD MANAGERS ATTITUDE AND APPROACH Internet banking was still in a very young stage and its entire benefits has been realised.(Nath et. al 2001). In this case, managers of financial institutions attitude towards the perceptions of electronic channels were of significant importance.(Akinci et .al( 2004). Mols (2001) state that management support and future orientation were the two most important factors which driving the introduction and expectation of the new e-channel In another study, Mols (2000) grouped the bank managers according to their attitude towards internet banking: The sceptics the nervous, the positive and the reluctant groups. In Scotland, Moutinho et.al (2002) emphasized he scotish bank managers efficiency and enhancement of customer services as to perceive advantages of internet banking. Faster easier and more reliable service to customer and the improment of the competitive position were highlighted. (Aladwani ,2001). Based on the UK evidence,Li 2001 claimed that: the integrated banking model, aroun d which traditional banks have built their strategies in the past were showing sign of fragmentation In this sense, he sumerised four emerging internet model in the UK. The first was based on accepting internet banking as a new delivery channel that was integrated with existing model. The second model is called e-banking, was based on multibanking in which the internet was the integrative component. The third model consisted of creating baby e-banks with their own e brand name and product range. The last model was seen as entirely a new business model without a physical network. Laws, Directives, Regulations and Standards Shon Harris All in One Certified Information System Security Professional Exam Guide, Fourth Edition, 2008 Different laws, directives, regulations and standards were enacted for different reasons which include data protection, software copyright, data privacy, computer misuse as well as controls on cryptography. Health and safety, prevention of fraudulent activities, personal privacy, public order, intellectual property, environment protection and national security are reasons why the regulations can be implemented in governments and private sectors. The violation of these regulations has a severe punishment attached to them which may range from fine to jail term of up to ten years or more depending on the gravity of the crime committed. Examples of the regulations that governs information usage and protection are discussed briefly below The Sarbanes-Oxley Act (SOX) The SOX was enacted in 2002 as a result of the corporate scandals and fraud that threatened the economy of United States of America. This is also known as the Public Company Accounting Reform and Investor Protection Act of 2002 that applied to companies that publicly trading on United States market. How organizations must track, manage and report on financial information was provided for in the SOX requirements. Processes and controls must be in place to protect data because of the organizations reliance on computer equipment and electronic storage for transacting and archiving data, the section 404 of SOX is directly applied to information technology. Chief Financial Officer (CFO), Chief Executive Officer (CEO) and others can be jailed if the law is violated. The Computer Fraud and Abuse Act This act is the primary U.S federal antihacking statute that was written in 1986 and amended in 1996.Prohibition was made on seven forms of activities and was made federal crimes: The knowing access of computers of the federal government to obtain classified information without authorization or in excess of authorization.. The intentional access of computer to obtain information from a financial institution, the federal government, or nay protected computer involved in interstate or foreign communications without authorization or through use of excess of authorization. The intentional and unauthorized access of computers of the federal government, or computers used by or for government when the .access affects the governments use of that computer. The knowing access of a protected computer without authorization or in excess of authorization with the intent to defraud. Knowingly causing the transmission of a program, information, code, or command and, as a result of such conduct, intentionally causing damage without authorization to a protected computer. The knowing trafficking of computer passwords with the intent to defraud. The transmission of communications containing threats to cause damage to a protected computer. The penalty for breaching this act ranges from felonies to misdemeanors with corresponding small to large fines and jail sentences. Employee Privacy Issues For a company to be adequately protected, various employee privacy issues must be considered within the organization. Organization must understand what it can and cannot monitor as a result of different state with different privacy laws. Organization must state it in its policy that monitoring in any form are done within the organization to prevent being sued by employee for invading their privacy. This is considered the best way in which organization can protect itself. Payment Card Industry Data Security Standard (PCI DSS) The advent of internet and computer technology led to the increase in identity theft and credit card fraud which gives opportunity to millions to be stolen at once. Stabilizing customer trust in credit card as a safe way of conducting transaction and to curb the problem, a proactive step was taking by the credit card industry. The standard affects any entity that processes, transmits, stores or accepts credit data. The PCI Data Security Standard is made up of 12 main requirements that are broken down into six major categories. They are A Secured Network must be built and maintained. Requirement 1: To protect cardholder data, a firewall configuration must be installed and maintained Requirement 2: Ensure that systems passwords and other security parameters are not in vendors supplied defaults. Data of Cardholder must be protected. Requirement 3: Stored data of cardholder must be protected. Requirement 4: Across open and public networks, cardholder data must be encrypted in transmission Vulnerability Management Program must be maintained. Requirement 5:Anti-virus software must be used and updated regularly. Requirement 6: Secured systems and applications must be developed and maintained. Access Control Measures must be strong in its implementation. Requirement 7: Based on Business need-to-know, cardholder data access must be restricted. Requirement 8: Every individual having access to computer must be given a unique ID. Requirement 9: Physical access to cardholder data must be adequately restricted. Monitoring and Testing of Networks must be carried out regularly Requirement 10: All access to network resources and cardholder data must be tracked and monitored. Requirement 11: Security systems and processes must be regularly tested. An Information Security Policy must be developed and maintained. Requirement 12: A policy that addresses information security must be maintained The violation of the standard does not lead to jail term but may result in financial penalties or revocation of merchant status within the credit card industry because PCI DSS is a private sector initiative. 2.5 Database Security, Compliance and Audit by Charles Le Grand and Dan Sarel. Information Systems Control Journal Vol 5, 2008. Grand and Sarel (2008), states what it takes to adequately protect the database to ensure that compliance is met. It also provides information for auditing purposes. The objectives for ensuring database access control were also exploded by the authors. On the conclusion note of the article the authors said that the simple goal of ensuring database security is to ensure that only authorized individuals have access and all access is monitored. To limit access to only people whose jobs require it, access protection must apply to identifying the sensitive data elements: the methods for managing user credentials and access rights: and the records of who accessed what, when and what they did with it. Insider

Friday, October 25, 2019

As I Lay Dying Essays: The Dysfunctional Family :: As I Lay Dying Essays

After reading As I Lay Dying, I was unsettled by something. It wasn't the plot, although As I Lay Dying had a singularly bizarre storyline. During the action of the novel a mother dies, and her family embarks upon a disaster ridden journey in order to fulfill her last wishes. The eldest son breaks his leg, the family has to sell or mortgage practically all it's worldly goods, and Jewel risks his life twice in order to get his mother's body to Jefferson. Why has Disney not snatched up the film making rights to this singular testament to Bundren family's love and dedication? The answer, and the source of my discomfort, is that the Bundren family is awful. They are almost completely and totally defunct. The fact that there is next to no mourning following Addie's death, the most basic tribute a family can give, is only the tip of the iceberg of selfishness which seems to characterize the Bundren family. The trip to Jefferson, a journey which under other circumstances could be seen as a family's noble tribute to a fallen matriarch, was ruined by the selfish motives of most of the family for undertaking the expedition. Dewey Dell wanted to go to get an abortion. Vardaman wanted to go to get some bananas. Anse wanted to go to get a new set of teeth. Cash wanted to purchase a record player. Not only were the motives selfish, but they were utterly transparent. The Bundren's neighbor Tull expresses the absurdity of the situation best when he said, "They would risk the fire and the earth and the water and all just to eat a sack of bananas." (p. 140) Indeed, the last images of the Bundren's as a family (minus Darl) are of them eating bananas out of a sack, and sitting around a record player at home. There were two members of the family, however, with no ulterior motives for going into town. Jewel and Darl seem to have no object in getting to town other than the burial of Addie Bundren. Both Darl and Jewel have special connections with their mother. It is tempting to draw the conclusion that Darl loved his mother the most. He narrated the majority of the chapters in the novel, and as readers we grow most accustomed to his voice. Cora Tull is certainly under impression that Darl loves his mother the most when she says, "it was between her and Darl that the true understanding and the true love was.

Thursday, October 24, 2019

Chevy vs. Ford Essay

We have all heard the argument concerning vehicles and their brands, whether you are a Chevy, Ford, or even Dodge fan it really doesn’t matter. We all seem to stick to one side and if nothing else is ever said about either company, they both have very loyal customers and very similar beginnings. Not to mention that if it were not for the difference maybe more people would be willing to admit just how alike these two brands really are. Louis-Joseph Chevrolet was born Christmas Day in 1878, in a small village in Switzerland. During his childhood he spent his time in the villages of Bonfol and Beurnevà ©sin, which were close to the French border. Around 1887, Louis learned to repair and later race bicycles. Louis had gained a hunger in the knowledge for the repair of bicycles while working at a mechanics shop which fixed not just bicycles but carriages as well. There is where he would learn the basics of gears and mechanicals. He would also end up building and selling his own bicycle called the Frontenac. This name would be later used for his race cars. Louis became known for racing manufactured bicycles and was given a job in the mechanical shops of Mors and Darracq Company. Darracq built the â€Å"well-known† Gladiator bicycles, Louis was introduced to the Darracq internal combustion engine and this would consume his interest and where he would began studying the 4 cycle engine. Louis Chevrolet founded the brand in 1911 in Detroit Michigan, along with W.C. Durant. They both earned a reputation for developing cars with performance, durability, and value. Those characteristics are still a core part in the business today which is the fourth largest automotive brand. Chevy has made performance affordable. With its four and six cylinder engines they have become known for their strong performance and their durability. In the 1955 Chevy introduced a small-block V-8 which opened a new era in attainable high performance that would result in powering millions of cars and trucks for the next 50 years. With the traits of the small block Chevy  has helped establish their company as a force in almost all forms of motorsports. This legacy has been passed on to new generations, and it is very evident that they have stayed true to the original beliefs which are still noticeable with today’s Camaro SS and the Corvette. The Ford Motor Company has a similar past with the exception of their founder, Henry Ford. Henry was also a racecar driver in fact he not only drove racecars but also built them as well to demonstrate that his designs produced a reliable vehicle. Ford finally came to be in 1903, after two failure attempts before. In this case Henry Ford was on as vice president and chief engineer where he could realize his own dreams which was to produce an automobile that was reasonable priced and efficient. This came about with the introduction of the Model T in 1908. In 1913 Henry Ford was the first to introduce the continual moving assembly line, by have all the employees stay in one place and having their parts sent to them on conveyor belts with that, he single handedly revolutionized the automobile industry in 1913. By 1918 50% of all cars in the United States were Model Ts. With the growing economy the demand for the Model Ts were in such high demand that they had to open a larger factory in Highland Park, Michigan. Although he was a very clever businessman, Henry Ford was at time a complex and contradictory personality with strong held opinions and a very wide range of interest. Both founders were very dedicated and strong willed unfortunately with Chevrolet, he sold his shares to the Chevy companies cofounder, W. C. Durant. Henry Ford was a part of his company until his death in 1947. Both companies are still going strong today and are still a force in the automotive industry. Both are producing efficient and affordable vehicles and it really does come down to the individual’s choice as to whom you fall  in with. For the diehard racers Chevy offers the Camaro where Ford has the Mustang, both are beautifully made vehicles and are very similar not just in appearance but also in performance. Both offer the standard package that comes with any car, they both have similar gas mileage, engine size, and optional features. Both have even started producing more energy efficient type cars as well as electric and even hybrid vehicles. With both companies track record I am sure both will have their ups and downs but that doesn’t make one better than the other, in fact, it appears that both companies are dependable, affordable, and dedicated to their customers. However there is one difference that sticks out more than any other, Fords seems to have the edge on pricing and making sure their vehicles are affordable to any income bracket. While Chevy can be on the expensive side depending on make and model you are looking into to purchase. Both companies continually produce well built vehicles, their customer base is evident of that. It’s understandable for people to have their preferences but what does it really come down to? It comes down to which one offers everything each individual wants in a certain type of vehicle. You can see the similarities in almost every model each company has. Chevy has the Silverado; Ford has the F series in the truck models. Chevy has the Camaro and Corvette to where Ford has the Mustang, and both companies produce minivans as well as sedans. The argument between the two companies will continue to go on for years to come, but is there really any argument about the two companies other than if it weren’t for the difference in name there wouldn’t be an argument since both are still producing efficient and affordable vehicles along with exploring other options concerning energy sources, because of those decisions they are both still moving strong in today’s economy and both are still a force to be reckoned with in the automotive industry and will be for many years to come.

Wednesday, October 23, 2019

Managing Diabetes in a Patient with Enduring Mental Health

DIABETES; A CONTEMPORARY APPROACH 2486 WORDS CONTENTS CONTENTSPAGE1 INTRODUCTIONPAGE2 DISCUSSIONPAGE2 CONCLUSIONPAGE8 REFERENCESPAGE9 ARTICLES ACCESSED ONLINEPAGE12 APPENDIX 1SCENARIOPAGE13 APPENDIX 2 ‘EATWELL PLATE’PAGE14 Introduction Lavinia had suffered a relapse in her mental health and had been using illicit drugs and alcohol to combat the disturbing positive symptoms of her illness and had stopped taking any of her prescribed medications.The nursing assessment indicated that the first issue to deal with was her chaotic behaviour and once that was under control a series of therapeutic interventions could be put in place to aid her recovery. Initially her chaotic presentation and challenging behaviours (Beer et al, 2005; Xeniditis et al, 2001) made it difficult to engage with her with in a therapeutic way and she resisted staff’s attempts to help her. The decision was made to manage her using intramuscular injections (IM) of an anxiolytic that necessitated usi ng physical restraint in order to administer the IM.The first few days were not pleasant for Lavinia due to staff needing to restrain and inject her in order to manage her challenging behaviours but her chaotic behaviour did resolve over time and she became more accepting of staff interventions. Lavinia’s named nurse engaged with her and spent time ‘counselling’ her and a series of therapeutic interventions were agreed. Mental health nurses are specialists in caring for people with mental health problems and it has been identified that they have deficits in their knowledge of diabetes (Nash, 2009).This was the case in caring for Lavinia at the time. Little emphasis was placed on the importance of managing her diabetes because staff were not aware of the implications of poor diabetes management. Discussion In the United Kingdom mental illness is by far the largest single source of burden of disease. There is no other illness or disease in the combined extent of pe rsistence, prevalence and breadth that impacts on the person more (Friedli and Parsonage, 2007).There is an inextricable link between poor mental health and an increased risk of physical illness, increased health risk behaviour, deprivation, poor educational achievement, substance misuse (National Institute for Health and Clinical Excellence, (NICE) 2009). Managing mental illness carries the single largest cost to the National Health Service (NHS) coming in at ? 10. 4 billion (Department of Health, 2012). Schizophrenia is a psychotic disorder that can have a debilitating effect on many aspects of a person’s life including perceptions, thinking, language, emotions, social, behaviour.The positive symptoms of schizophrenia can include hallucinations of any senses, delusions, disorganized thought processes, causing the person to lose contact with reality. Diabetes is a serious condition that can have a debilitating effect on the person. It can cause kidney failure, blindness, hea rt disease, stroke, psychosocial problems, if left untreated (NICE, 2008). The United Kingdom is facing a significant increase in the number of people diagnosed with diabetes. In the past 16 years the number of people diagnosed with diabetes has increased from 1. million to 2. 9 million cases and it is estimated that this figure will continue to increase as the number of older people and overweight/obese people increase (Diabetes in the UK, April 2012). Diabetes mellitus is a condition whereby the body is unable to properly use the glucose it produces because of either lack of or resistance to the hormone insulin. There are two main types of diabetes; type 1 & type 2. Insulin is needed to enable the glucose to pass from the blood and enter the cells of the body where it is stored.Type 1 diabetes occurs when the body (pancreas) is unable to produce its own insulin (an autoimmune disease) and the person needs to have regular daily injections of insulin to counter this. Type 1 diabetes accounts for approximately 10% of all people with diabetes (Diabetes in the UK, April 2012). Type 2 diabetes mellitus is a condition whereby the body either does not produce sufficient insulin or that the person is insulin resistant. It can be treated with medication alone or medication and insulin.Type 2 diabetes accounts for approximately 90% of all people with diabetes (Diabetes in the UK, April 2012). It is known that type 2 diabetes mellitus has an increased prevalence in people with schizophrenia compared to the the general population (Schoepf et al, 2011). Further, the treatment for schizophrenia is typically with antipsychotic medication and it is now clear that some antipsychotics elevate the risk of developing diabetes and weight gain (iatrogenic effect) though just why this happens is not fully understood (Dixon et al. 000). Lavinia suffers from schizophrenia, is obese, takes antipsychotics, and suffers from type 2 diabetes. Diabetes is potentially a life threatening con dition. Blood glucose levels below 3. 5mmol/l are too low for the brain to function; this is hypoglycaemia. The signs of hypoglycaemia are similar to a person experiencing psychoses, e. g. aggression, disorientation, changed behaviour. It would have been imperative that nursing staff should have made it a priority that Lavinia’s blood glucose levels were monitored.Lavinia could have been experiencing a hypoglycaemic state when in fact nurses might have mistaken this for challenging behaviour. Lavinia’s blood glucose levels might have been above the recommended guidelines (>8mmol/l) which is hyperglycaemia and the nurses would need to have an understanding of the potential elevated blood glucose levels can have, e. g. damage to the micro and macro vascular system leading to blindness, increased risk of heart attack, increased risk of stroke, diabetic ketoacidosis.Not having sufficient knowledge of diabetes while at the same time caring for someone with diabetes and not acting compromises the nurse’s professional obligations (Nursing and Midwifery Council, NMC, 2002) and the NMC or the courts would have no reluctance in pursuing this should it become an issue (Kane Gorny, 2009). Any nurse who cares for a person needs to be competent. Roach (1992) defines competence as, â€Å"the state of having the knowledge, judgment, skills, energy, experience and motivation required to respond dequately to the demands of one’s professional responsibilities†. The nurses caring for Lavinia would therefore be duty bound to refer her to a diabetes nurse/Dr. According to the NICE (2008) recommendations it is vital that people with diabetes receive an annual check up including; blood pressure; feet check; smoking status; urinary albumin test (or protein test to measure kidney function); serum creatinine test; retinopathy screen; cholesterol levels; weight and BMI measurements; HbA1c– blood glucose levels.Lavinia may have had these checks ca rried out within the last 12 months but due to her chaotic lifestyle over the past few months her results might differ significantly thus during this admission it would be an opportune time to have these checks carried out. Hypertension can have devastating effects on the person whether they have diabetes or not, e. g. increased risk of stroke, cardiac disease, renal failure. Research by Diabetes UK (2012) found that little more than 50% of people with diabetes were meeting their blood pressure targets which they recommend should be 130/80.The importance of good foot care in diabetes cannot be overstated. Poor foot care can lead to ulceration and ill health, gangrene and even amputation. Diabetes UK state that up to 80% of amputations annually in England are avoidable. The risks that smoking presents are well documented, e. g. heart disease, stroke, vascular complications, amputation. A person with diabetes is pre disposed to certain illnesses and should he/she decide to smoke then their health risk profile increases considerably by multiplying the potential deleterious effects.Blood tests can identify potential or actual renal failure. Diabetes causes harm to the micro vascular system which includes the very tiny vessels in the retina of the eye. If this is not addressed it can lead to blindness and Diabetes UK recommend an annual eye screen. High cholesterol levels are serious whether the person has diabetes or not and can lead to heart disease, circulatory complications, stroke, fatty liver. Abnormal levels of cholesterol can cause insulin resistance.Type 2 diabetes is one of the most serious consequences associated with being obese or overweight. Over the past 25 years the number of people in England who are classed as obese has doubled and it is anticipated by the year 2050 obesity will affect 60% of adult men, 50% of adult women, and 25% of children (Foresight, 2007). The blood glucose levels – HbA1c – is an indicator for risk of damage to blood vessels. NICE (2008) recommend an HBA1c level of between 6. 5% and 7. 5% would be the goal for people with diabetes.For people with type 2 diabetes, effective blood glucose control can reduce the risk of diabetic eye disease by 25% and kidney damage by 33% (UK prospective Diabetes Study (UKPDS). It is clear that management of diabetes can be a challenging role and a multidisciplinary approach is needed to manage it as effectively as it can be managed. Multidisciplinary teamwork is important in any care giving role (Liberman et al, 2001). The most important person in the multidisciplinary team is Lavinia. She is the person who has the most control and needs to manage her diabetes on a daily basis.For Lavinia there are two issues; managing schizophrenia and managing diabetes. Using a depot antipsychotic in preference to oral medication would help Lavinia because a nurse would administer it weekly thus reducing the risk of relapse. NICE guidelines (2009) advise that people with s chizophrenia should be offered access to psychological therapies including cognitive behavioural therapy (CBT) and/or family therapy. If Lavinia did benefit from psychological interventions it might reduce her reliance on medication thus reducing side effects.In order to manage her diabetes Lavinia should have access to a team of professionals including diabetic nurses; podiatry; Dr’s; ophthalmology; dietician; pharmacist; physiotherapist; counsellor. An assessment for management of diabetes should be holistic (Dunning, 2009 pgs. 36 – 49) and appropriate to a person’s lifestyle. For Lavinia this means sitting down with a specialist diabetic nurse and having a complete assessment of her lifestyle and her understanding of how it interacts with her diabetes. She needs to fully understand the importance of good glucose control and the consequences of poor control.She might already have experienced hypoglycaemic attacks but been unaware of what they were/are, i. e. c ould be confused with positive effects of schizophrenia. As a starting point it would be appropriate to ensure she knows how to test her blood glucose levels, which is one of the NICE (2008) guidelines, and how to interpret the result. She needs to be aware of the relationship between food intake, physical activity and medication understanding how managing these can help her maintain appropriate blood glucose levels. Diet is known as the cornerstone of management in type 2 diabetes.An appropriate diet will help control blood glucose levels, maintain an appropriate weight/body mass index, and prevention of complications. Lavinia is obese which is possibly due to the combination of antipsychotic medications she takes for schizophrenia and her lifestyle. An assessment by a dietician or specialist diabetic nurse into her eating habits would help to identify any areas she would benefit from by making changes to her diet. The ‘Eatwell Plate’ (Department of Health, 2011) offer s a model for healthy eating in the United Kingdom (see appendix 2).It gives good visual, easy to understand, guidance on the balance/proportion and types of food that contribute to a healthy diet. Lavinia would benefit from an assessment with the physiotherapists to determine her level of fitness and areas that could be worked on in order to improve her fitness with a view to losing weight. Exercise can reduce the risk of major illnesses e. g. heart disease, stroke, diabetes and cancer by up to 50% (National Health Service, 2012). However, the benefits of exercise on glycaemic control and body mass in type 2 diabetes is not clear (Boule’ et al, 2001).The potentially damaging effects that diabetes can have on a person are well known and documented (e. g. UK prospective Diabetes Study, 1977 thru 1997 (UKPDS). The damaging effects of poor blood glucose control are not always immediately observable and consequently people with diabetes do not always fully appreciate the importan ce of controlling their blood glucose levels (see Mail Online, 2010). The reality of diabetes care is self management and effective self management delays the onset of complications. Lavinia needs to understand how the lifestyle choices she makes, e. . level and frequency of physical activity, what and when she eats, managing her mental health, are all major factors in controlling her diabetes. Because the damaging consequences of not managing diabetes are not immediately obvious the impetus to manage it is not always paramount (Diabetes UK, 2012). It might be enough that Lavinia understands these factors and therefore takes action to manage her condition. If not, she would need support to help her change her behaviour/lifestyle in order to manage her diabetes. There are several models of behavioural change, e. g. ealth belief model (Becker, 1974); theory of reasoned action (Fishbein and Atzen, 1975); social learning theory (Bandura, 1977). Motivational interviewing (MI) (Rollnick a nd Miller, 1995) is a model that is used to bring about behavioural change and has been shown to be effective in bringing about change in a range of healthcare settings including diabetes care, e. g. VanWormer et al (2004); Clark and Hampson (2001); Kim et al (2004). The aim of MI is to bring about discrepancy in the persons beliefs and thoughts by bringing about a state of cognitive dissonance, i. e. he difference between where the person is currently and where they want to be in future and setting small goals to achieve. Thus, Lavinia has full knowledge of the damaging effects diabetes can have and in future she would like to get married and have children. To have children she needs to be as ‘healthy’ as she can be and therefore she will be self motivated to resolve the dissonance she experiences. Used in combination with Prochaska and DiClemente’s model, stages of change (1983) and Egan’s (1998) skilled helper model of problem management could work to g ood effect for Lavinia in bringing about a change.Conclusion The link between poor mental health and poorer outcomes for physical illness, increased health risk behaviour, deprivation, educational achievement, substance misuse is well known (NICE, 2009). Diabetes is potentially a life threatening condition; Lavinia has schizophrenia and diabetes. Her poor mental health could be supporting the deleterious effects of her diabetes. Not having sufficient knowledge of diabetes while at the same time caring for someone with diabetes and not addressing it compromises the nurse’s professional obligations (NMC, 2002).Lavinia needs support from both the mental health and diabetes services. She needs to have a good understanding of the interplay between the diabetes and mental health. She needs to have insight into potential relapse signatures to her mental health so that she can get help as early as possible. A diabetes counsellor could help Lavinia make lifestyle changes by engaging h er in a course of motivational interviews (Rollnick and Miller, 1995) in combination with Prochaska and DiClemente’s model, stages of change (1984) and Egan’s (1998) skilled helper model of problem management. ReferencesBandura, A. (1977). Social Learning Theory. Englewood Cliffs, NJ: Prentice Hall. Becker, M. H. , ed. (1974). The Health Belief Model and Personal Health Behavior. Health Education Monographs, Vol. 2 32473. Beer, D. Turk, V. McGovern, P. et al, (2005), Characteristics of patients exhibiting severe challenging behaviour in low secure mental health and mild learning disabilities units. Journal of Psychiatric Intensive Care, Vol. 1, pp 29-35. Boule’, N. G. Haddad, E. Kenny, G. P. Wells, G. A. Sigal, R. J. , (2001). Effects of Exercise on Glycemic Control and Body Mass in Type 2 Diabetes Mellitus.A Meta-analysis of Controlled Clinical Trials. JAMA, Volume 286, No. 10, pgs 1218 – 1237. Clark, M. Hampson, S. E. Avery, L. Simpson, R. (2004), Effec ts of a Tailored Lifestyle Self-management Intervention in Patients with Type 2 Diabetes. British Journal of Health Psychology , Vol. 9, 365–379. Dixon, L. Weiden, P. Delahanty, J. , (2000) Prevalence and correlates of diabetes in national schizophrenia samples. Schizophrenia Bulletin Vol. 26, pp 903–12. Dunning, T. (2009) Care of People with Diabetes, A Manual of Nursing practice, 3rd edition, Wiley Blackwell, pp. 36 – 49.Eatwell Plate, (2011), Department of Health in association with the Welsh Government, the Scottish Government and the Food Standards Agency in Northern Ireland. Egan, G. (1998), The skilled helper, a problem-management approach to helping. Brookes/Cole, CA. Fishbein, M. Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley Foresight (2007), Tackling obesities: Future choices – Modelling Future Trends in Obesity & their Impact on Health. 2nd edition, Government Of fice for Science. Kim, C. J. Hwang, A. R. Yoo, J. S. , (2004).The impact of a stage matched intervention to promote exercise behaviour in participants with type 2 diabetes. International Journal of Health Promotion, 41, 833-841. Kirk, A. F. Higgins, L. A. , Hughes, A. R. , Fisher, B. M. Mutrie, N. , Hillis, S. , et al. (2001). A randomized, controlled trial to study the effect of exercise consultation on the promotion of physical activity in people with type 2 diabetes: a pilot study. Diabetic Medicine, Vol. 18, pp 877-882. Lean, M. E. Pajonk, F. G. (2003), Patients on atypical antipsychotic drugs: another high-risk group for type 2 diabetes: response to Hardy and Breier [letter].Diabetes Care, Vol. 26, pp 3202-3203. Liberman, R. P. Hilty, D. M. Drake, R. E. et al, (2001), Multidisciplinary Roles in the 21st Century; Requirements for Multidisciplinary Teamwork in Psychiatric Rehabilitation. Psychiatric Services, doi: 10, 1176/appi. ps. 52. 10. 1331. Nash, M. (2009), Mental Health Nu rses’ Diabetes Care Skills. British Journal of Nursing, Vol. 18, No 10, pp 626-630. National Institute for Health and Clinical Excellence (2008), Type 2 Diabetes: The Management of Type 2 Diabetes. NICE Clinical Guideline 66. Developed by the national Collaborating Centre for Chronic Conditions.Mental Health Act (1983) Code of Practice, (2001), 7th edition, Department of Health and Welsh Office under licence from the Controller of Her Majesty’s Stationary Office. National Institute for Health and Clinical Excellence (2009), Depression in Adults with a Chronic Physical Health Problem: Treatment and Management. NICE clinical guideline 91. Developed by The National Collaborating centre for Mental Health. Nursing and Midwifery Council Code of Professional Conduct (2002): Standards for Conduct, Performance and Ethics. Nursing and Midwifery Council. Prochaska, J.O. DiClemente, C. C. (1983) Stages and processes of self-change of smoking: toward an integrative model of change. Journal Consult Clinical Psychology, June; 51(3):390–5. Roach, M. S. , (1992), The Human Act of Caring; A Blueprint for the Health Professions, 2nd Edn. Canadian Hospital Association Press, Ottawa. Cited in, An Integrated Career and Competency Framework for Diabetes Nursing, (2001) 3rd Edn. TREND, pg. 4. Published by SB Communications Group. Rollnick S, & Miller, W. R. (1995). What is motivational interviewing? Behavioural and Cognitive Psychotherapy, Vol. 3, 325-334. Schoepf, D. Potluri, R. Uppal H. et al (2012), Type-2 diabetes mellitus in schizophrenia: increased prevalence and major risk factor of excess mortality in a naturalistic 7-year follow-up. EUR. Psychiatry, Vol. 1, pp 33-42. VanWormer, J. J. Boucher, J. L. (2004), Motivational interviewing and diet modification: a review of the evidence. The Diabetes Educator, 30 (3): 404-416. Xeniditis, K. Russell, A. Murphy, D. (2001), Management of people with challenging behaviours. Advances in Psychiatric Treatment, Vol. 7, pp109-116. Articles accessed onlineDepartment of Health (2010) Programme Budgeting Tools and Data. Available online and accessed July 2012 at: http://www. dh. gov. uk/en/Managingyourorganisation/Financeandplanning/Programmebudgeting/DH_075743). Diabetes UK. Available and accessed online in July 2012 at: http://www. diabetes. org. uk/About_us/News_Landing_Page/Half-of-people-with-diabetes-have-high-blood-pressure/ http://www. diabetes. org. uk/Get_involved/Campaigning/Putting-feet-first/? gclid=CPyGnpCyo7ECFcVkfAodWzK1zg http://www. diabetes. org. uk/Guide-to-diabetes/Complications/Retinopathy/? clid=CJjF7q63o7ECFYzbfAodghophw Friedli, L. Parsonage M. (2007), Mental Health Promotion: Building the Economic Case. Northern Ireland Association for Mental Health. Available online and accessed July 2012: http://www. chex. org. uk/media/resources/mental_health/Mental%20Health%20Promotion%20-%20Building%20an%20Economic%20Case. pdf Mail online. Available and accessed in July 2012 at: http:// www. dailymail. co. uk/health/article-1309609/The-cruel-cost-ignoring-diabetes-Jane-lost-arm-legs-disease-like-didnt-seriously. html NHS Choices.Accessed online in July 2012 and available at: http://www. nhs. uk/Livewell/fitness/Pages/Whybeactive. aspx UK prospective Diabetes Study (1977-1997). Available and accessed online in July 2012 at: http://www. dtu. ox. ac. uk/ukpds_trial/index. php Appendix 1 Scenario Lavinia (pseudonym) is a 25 year old female with a history of schizophrenia stretching back to her late teens. She has been placed on a section of the Mental Health Act (MHA, 1983) and detained on a psychiatric intensive care unit (PICU) due to her presenting with chaotic behaviour posing a threat to