Saturday, January 25, 2020

Malware And Exploit Protection

Malware And Exploit Protection In todays modern world of information technology, malware and malware protection is becoming a large part of computer security. To analyse this problem various Internet and academic articles have been studied in order to grasp the main concepts of malware and its impacts on information technology as well as current security protection available in todays market. Introduction The purpose of this report is to give the reader an understanding on the concepts of malware and what technologies are being implemented to prevent unauthorized access of computers and networks. This report will also look into how cyber criminals are able to use a variety of measures to infect computers and networks and why it is necessary to implement various security applications to stop them from accessing data. A brief history on the exploit protection of computers and information systems is also included to provide the reader with a basic understanding of computer security and protection before the Internet was developed into a global fixture. The function of Malware and virus security PG 1 PG 1If a computer is communicating with other devices on a network it can potentially be at risk. Documents and files that are stored in that computer can be exposed to anyone who wants to access them especially if there is no security implemented on that particular device. In recent years the lack of security on Internet applications and web sites has been responsible for hackers entering computer and stealing files and private information. Because the Internet is so large and complex it is becoming increasingly hard to protect computers from malware and viruses. Cyber criminals are able to set up spam and can potentially enter a network through a backdoor or loop hole in the system. These actions can be hard to track and many hackers are not caught due to the fact they are accessing the content from a different location (often in a different country). The concept of malware security has taken huge steps in recent years to prevent computers being vulnerable to attacks. This report w ill focus on how computer security is breached by malware and what security measures are in place to deal with aspects such as anti-malware/virus and spyware protection, spam filters and other password based securities built around Internet applications. The history of security and birth of Malware and Viruses Computer viruses have been in existence long before the modern Internet came about. One of the outbreaks of virus activity was caused by mistake in the late 1980s. In 1987 the Vienna virus was developed, computer specialist Ralph Burger decided to investigate the virus so he got a copy of it and wrote his findings in a book titled Computer Viruses: a high tech disease. His book however caused major problems. Because his analysis was so in depth he ended up telling people how the virus worked and how to write them. As a result people who previously had no knowledge of what computer viruses or malware were now getting a beginners guide on how the process worked. Ralph Burgers book was effectively a guide on how to create viruses and in the years after publication his concepts and findings were still being put to use by cyber criminals who wrote thousands of malware viruses based on his methodologies. PG 2 PG 2The 1990s saw a huge rise in information technology security breach with the introduction of the modern Internet. Major viruses such as the Michelangelo and Melissa viruses saw a new dawn in virus activity and as a result the information technology industry started to take notice. New virus technology such as bots and botnets were beginning to take shape. The introduction of malware saw a huge rise in security breaches especially in home and business environments. For the first time confidential information such as user credentials and private details were being exposed over the Internet. The ability for hackers to trace cookies and monitor network activity in real time started to become a major issue for all internet users. During the mid to late 1990s there were many attempts to put a stop to cyber criminals and malware activities but overall the fact remained that there was no major force that could deal with the increasing problem of computer security and exploit protection. The problem had begun to take effect on national security. Because government agencies had confidential information on computer networks there became a real need to not only protect information on their networks but to protect national security. The U.S in particular became increasingly paranoid about their government agencies and there were a number of cases were their networks had been compromised. In 1998 the U.S attorney general unveiled a $64 million dollar scheme to try and counter cyber criminals and the effects of both Malware and Viruses. A command center was set up to protect all U.S computer systems; the National Infrastructure Protection Center was another major step in internet security in the 1990s. As the Internet continues to grow Internet security is still an extremely important issue. With more and more people using tools such as internet banking and purchasing online items there are now a lot more procedures being put in place to keep these applications secure fro m malware and viruses. Types of Malware and viruses In todays world there are a number of major malware, viruses and bugs that are commonly used to infiltrate Internet applications and computer networks. This section of the report will look at what they are, how they work and what tools are available to counter this kind of criminal activity. PG 3 Viruses A virus is a computer program that is able to replicate itself and infect computer devices. In order for a virus to replicate itself it must first be granted access to execute its code. To make this possible most viruses will try to attach themselves to executable files that are commonly apart of legitimate programs and applications. Viruses can be made to do a number of things including damaging data files, corrupting applications and lowering system performance. Viruses can also be transferred between devices especially if the user has no knowledge of the viruses presence. Commonly USB drives and other forms of memory units will transfer viruses amongst computer devices. What is Malware? Malware is an abbreviated term that stands for malicious software. The main purpose of malware is to spy or damage a computer device. Malware can also include things like tracking cookies, which will allow someone to monitor Internet activity and usage. In todays modern information technology malware encompasses a lot of different types of viruses and exploitation. Spyware As its name suggests spyware is used to spy on a computer or device. Spyware is a form of Malware that performs predominantly the same kind of tasks. It is often used in advertisements known as adware that can be used to track activity on a computer. In recent times spyware has be known to log keystroke activity which enables criminals to gather bank account details and other sensitive data. Worms PG 4A computer worm is able to replicate its self and uses a network to send copies of its self to other devices on a network. Worms are a kind of Malware that can infect a large number of devices on a network, once the worm has been released on a computer it can quickly cause damage over a network. Unlike a virus worms do not need to attach themselves to an executable file. Bots Bots are programs that are capable of taking over a computer. Bots allow the hacker to control a computer from a remote location often starting out as Malware. Cyber criminals will often hide their remote control software attaching to a legitimate source such as a game or application. When the application or game is running they are able to run their software in the background and gain remote access whenever the device is online. Hackers usually try to go unnoticed while implementing bots. In a lot of cases hackers will create a lot of bots and set up botnets (an army of bots) these can then be used to send out spam and other forms of illegal activity. Trojans Trojans (also known as Trojan horse/s) are programs that disguise themselves by doing a legitimate task on a computer. In actual fact the Trojans main purpose is to spy on computer activity and steal information such as credit card details and pin numbers. Once the information has been captured it is then sent back to the cyber criminal who initially set up the Trojan. Trojans are commonly sent as email attachments and are NOT viruses. A Trojan does not infect files or replicate it self like a virus and its main purpose is to go unnoticed within the system. Spam Spam is a type of advertising that is commonly sent to a large scale of computer users. Most spam is developed in the form of get rich schemes, suspicious messages and other forms of advertising that are aimed at tricking the user into releasing credit card details and other information that can benefit the person who sent the spam. Because spam costs the sender next to nothing to send they are able to send it on a large scale increasing their chance of success. PG 5 Current Malware protection Security breaches can come in all forms of illegal activity. These are simply the mainstream problems that occur on a day-to-day basis. There are many more forms of malware that put Internet security to the test and cyber criminals continue to develop new ways of infiltrating computers and networks. So what are some of the current developments put in place to stop malware and other forms of illegal activity? Firewalls The term firewall was fist established by fire fighters. The firewall was a large barrier put in place to prevent the fire from spreading. In computing terms a firewall performs relatively the same task. Essentially a firewall operates by working with a router-based application to make decision of wether to forward packets to a device or wether to drop the packets all together. An easier way to think of a firewall is to imagine a police check point on a road, the cars coming into the checkpoint represent packets being sent across the internet, the police check point represents the firewall as well as the process that is taken to determine if the packet (car) is able to continue to its destination (a network or computer). In other words a firewall is a scan that can detect infected or illegitimate data files or programs before they reach their intended destination. In organizations and businesses a firewall will often be set up on an elected computer that is separated from the rest of the network so that incoming traffic does not have immediate access to the rest of the network. One of the main methods that a firewall uses is screen requests to insure that domain name and internet protocol addresses are genuine. With devices such as PDAs and cell phones, firewalls will allow remote access to certified networks by using password based security measures. Anti Malware/virus software PG 6Anti Malware/virus software applications are used to scan files and eliminate any Malware or viruses that are found on a particular device. Current anti virus applications have come along way in protecting users from malware viruses. Anti virus applications will typically use two forms of scanning procedures to identify malware. The first is analyzing the computer programs and looking for any suspicious activities that are not normally conducted. The second is done by scanning a computer using a malware and virus dictionary this is one of the most effective ways of identifying a security breach. The malware/virus dictionary works by examining a database of known viruses that has been established by that particular anti virus Software Company; it will then scan the computer and try to match any piece of code in its database to the files on a computer. If a match is found then the user will be prompted with a message that gives the user options to deal with the malware and/or virus . For this process to be successful in the long term the malware/virus dictionary needs to be updated on a regular basis to keep up with newly written viruses being developed by hackers and cyber criminals. This is the main reason that anti malware/virus software applications will prompt users to update on a regular basis. Anti-spyware based applications work with the same method of spyware dictionary scanning. Spam filters PG 7In todays modern Internet spam is always a constant threat to computer security for users worldwide and will often contain malware viruses. Although most people will ignore spam a small amount of users get sucked in to spammers advertising schemes. Because spammers are sending out thousands of spam based messages at a time they can easily profit from a couple of over trusting users and because spam is cheap to develop there is always a market for them. In past years users would receive hundreds of messages a day by spammers and trying to sift through emails to find a legitimate message proved to be a daunting task for users. For this reason spam filters were introduced. Spam filters work by using a number of procedures. The first is a language-based filter; these are the easiest procedures for a spam filter to implement. The filter will simply scan through emails and remove any that are not in the native language of the user. Settings for this can obviously be changed if a user i s working in a foreign country, the user can simply enable the languages that they would like to receive by changing the settings of the filter. Content spam filters use a complex set of rules to evaluate messages that are likely to be spam-based advertising. The spam is redirected into a spam folder that can later be deleted by the user. This is one of the most effective approaches to countering spammers however on occasion it can result in legitimate emails being sent to spam folders due to a user request of an advertising promotions or news letters. User spam filters can be the most effective filters if used properly. They require the user to input a set of rules for the filter to follow, although this can be an effective method it can be time consuming and is not the easiest tool for users to use. Conclusion Overall there are a lot of security measures that can be implemented to protect computers and networks form malware. Most security measures that are available to users are aimed at protecting computers from malware, adware, spam and various types of common viruses. Although there are a lot of companies providing these services cyber criminals are always looking for new ways to get around firewalls and anti virus software and on some occasions they are successful. Because there are so many hackers and spammers around the globe new ways of getting around these barriers are frequently being developed and catching them can be very difficult. However if users take the appropriate steps such as installing firewalls and anti malware/virus software they will be less likely to fall prey to cyber criminals. PG 8

Friday, January 17, 2020

Tuskegee Study of Untreated Syphilis in the Negro Male

Between 1932 and 1972, the United States Government engaged in a scientific study in which approximately 400 African-American men infected with syphilis were diagnosed but left untreated. The Tuskegee Study of Untreated Syphilis was led by the United States Public Health Service (PHS). It took advantage of uneducated, poor African-American farmers from Macon County, Alabama. The movie â€Å"Miss Evers’ Boys† reveals that the Tuskegee Study was conducted by a group of Southern doctors, and tells the story of the 400 African-American men who were the uninformed subjects of this study, which sought to determine whether untreated syphilis affects African-American men in the same way that it does white men. Further data for the study were to be collected from autopsies. Although originally projected for completion within six months, the study actually remained in progress for 40 years. At first, these African-Americans were treated for the disease, but once funding for the study was cut, treatment ceased. The study proceeded without informing its subjects that they were no longer being medicated. Miss Evers was told that once the Government realizes that the study has remained in progress, new funds will be made available within a year. But the study went on for forty years, without the researchers resuming the men’s treatment at any point. The men were simply given placebos, then observed. They were even given spinal taps (â€Å"back shots†) to give them the impression that they are receiving treatment. Penicillin became available, but it was not administered to them, partly because of a rumor that it could kill them, but mostly because the researching doctors did not want the study’s outcomes jeopardized by this unforeseen variable. Most of the men died, and some went crazy; very few were alive at the end of the forty-year research period. The eventual finding was that untreated syphilis affects African-Americans and whites alike. The study began with good intentions. In 1929, prior to its inception, the blood-testing of African-Americans was funded by The Rosenwald Foundation for Black Community Development in the South. These blood tests were intended to locate the presence of syphilis, after which treatment could begin. When it transpired that treating all the infected men would be monetarily unfeasible, Dr. Taliaferro Clark, director of the PHS, proposed the study of the effects of untreated syphilis (in its late stages) in the black male. This study was to be an initiative of the Tuskegee Institute in Macon County, Alabama. After Dr. Clark retired in June of 1933, Dr. Raymond Vonderlehr succeeded him as Director of the Division of Venereal Diseases. The true nature of the study had to be kept from the subjects, to ensure their cooperation. Its goal was to discover how syphilis affects blacks as distinct from whites—the theory being that whites experience more neurological complications from syphilis, whereas blacks are more susceptible to cardiovascular damage. How this knowledge was to be useful in the clinical treatment of syphilis is uncertain. Regulations for using human beings in medical experiments are strict, and require that patients have a full knowledge and clear understanding of the experiment’s health risks and benefits. Yet the government doctors associated with the study refused even to use the term â€Å"syphilis. Instead, they misled their subjects by simply informing them that they had â€Å"bad blood. † Even when penicillin became available in 1947, these men were denied access to it, because its administration would interfere with the findings of the study. Local physicians, draft boards and PHS venereal disease programs were given as information nothing more than a list of â₠¬Å"subjects. † The only treatment the men received was aspirin and iron supplements. Since none of them had ever had more than a little healthcare, they believed that what they were getting as treatment was very effective cure for bad blood. In exchange for taking part in the study, the men received free medical examinations, free hot meals, a certificate signed by the Surgeon General, and a $50 burial stipend. Syphilis is a highly contagious disease caused by the spirochete Treponema Pallidum. Acquired T. Pallidum enters the body through skin mucous membranes, usually during sexual contact. Congenital Syphilis (CS) is transmitted to the fetus from the infected mother when the spirochete penetrates the placenta. Syphilis is a systemic disease, attacking tissues throughout the body. After initial penetration, the spirochetes multiply rapidly. First they enter the lymph capillaries, where they are transported to the nearest lymph gland. There they multiply, and are released into the blood stream. Within days the spirochetes invade every part of the body. A multi-organ infection, CS may result in a the neurologic or musculoskeletal handicap, or death, of the fetus when not properly treated. Trends in the CS rates of women of childbearing age follow by approximately one year the rates of primary and secondary syphilis. Racial/ethnic minorities continue to be affected disproportionately by CS. No biologic association exists between race and the risk of delivering an infant with CS; race serves as a marker of other factors, such as poverty and access to health care, in communities with high syphilis rates (5-7). Individual factors, such as illicit drug use and the â€Å"wanted† status of a pregnancy, also influence the chances of a mother delivering an infant with CS. In acquired syphilis, the organism rapidly penetrates intact mucous membranes or microscopic dermal abrasions, and, within a few hours, enters the lymphatics and blood to produce systemic infection. The central nervous system is invaded early in the infection. Examinations demonstrate that there are abnormal findings in the cerebrospinal fluid (CSF) of more than 30% of patients in the secondary stage of the infection. In the first 5-10 years of contracting the infection, its principal involvement is with the meninges and blood vessels, resulting in meningovascular neurosyphilis. Later, the parenchyma of the brain and spinal cord are damaged, resulting in parenchymatous neurosyphilis. Three stages mark the progression of the disease: primary, secondary and tertiary. The primary stage commences 10-60 days after infection. Lesions usually appear at the point of contact, which is typically the genitals. After that, a painless, somewhat raised round ulcer appears. This chancre may be so small that it goes undetected. Leading into the secondary stage, the chancre will heal within 30-60 days without any treatment, leaving a scar that can remain for months. The secondary stage lasts from approximately 6 weeks to 6 months. During this time, a rash similar to measles or chicken pox appears on the skin. Fever, indigestion and headaches may accompany the rash. Bones and joints may be painful, and cardiac palpitations may also develop. In some cases, highly infectious, spirochete-laden ulcers may appear in the mouth. Scalp hair may drop out in patches, creating a moth-eaten appearance. Syphilis in the tertiary stage manifests as gummy or rubbery tumors on the skin, which is the result of spirochete concentration in body tissue. These sores band together into large, encrusted ulcers that consist s of several layers of dry matter. â€Å"Tumors may also attack and weaken the walls of heart or blood vessels. Heart valves may no longer open and close properly, resulting in leakage. The stretching vessel walls may produce an aortic aneurysm, a balloon-like bulge. If the bulge bursts, as often is the case, the result is sudden death† (Pyle). Many factors declare the destructive Tuskegee experiment wrong, regardless of whether it contributed to the fight against syphilis. There were 28 deaths directly attributable to the syphilis experiments, 100 deaths due to the complications of the disease, 40 wives of experiment subjects were infected by the disease, and 19 children were born with congenital syphilis. Risks have to be taken in science for the sake of advancement, and risks always have some negative consequences. But scientific experimentation on people selected on the basis of their skin color and social class, then kept ignorant of their condition and its danger to themselves and to others, and misled to believe that they are receiving curative treatment, is nothing short of a conspiratorial act of pure evil. The Tuskeegee experiment went on until 1972, close to thirty years after penicillin was discovered during the ’forties. Syphilis, the deadly bacterium Treponema pallidum, had reached epidemic proportions in the past. Science should strive to make the world a better environment to live in. It is to be applauded when its research efforts make great strikes to this end. But in the case of the Tuskegee Study, the wrong done in the name of scientific research far outweighs the right. This study made victims of its subjects, and of people connected with them, knowingly and unnecessarily. It wantonly lied to the subjects who had volunteered in good faith, first by refusing to disclose the exact nature of the medical condition, then by pretending to them that they were receiving curative treatment, then again y withholding the apt curative treatment that became available. This study sought out African-American men who had been infected by syphilis, then proceeded to treat them like purpose-serving injected lab rats. Even after the whistle was blown in 1972, in a Washington Star article by Jean Heller, the public health service remained unrepentant, insisting that the men had freely volunteered to become the subjects of the study. An Alabama state health official even tried to make light of Heller’s revelation of gross abuse and deception: â€Å"People are making a mountain out of a molehill. Science is a necessary part of life. But for its great achievements, mankind would still be in the Dark Ages. However, pursuit of the advancement of scientific knowledge must never cross the well-marked line between that which is necessary, and that which is cruel and unnecessary. The Tuskegee syphilis experiment did cross that line, and that besmirched scientific research and the integrity even of its ethical practitioners. Work cited Pyle, Kevin C. â€Å"Tuskegee Syphilis Experiment. † Available at: http://www. dreamscape. com/morgana/adrastea. htm.

Thursday, January 9, 2020

Gender Development in Children Essay - 998 Words

There have been many theories and studies in support of the development of gender identity and gender roles. One major theory was the one put forward by Bandura and his social learning theory. Banduras social learning theory states that gender is learnt through direct and indirect reinforcement. The direct reinforcement is influenced by parents and according to the social learning theory gender identity is also reinforced through the beliefs and attitudes that the parents implement within their children through gender stereotypical behaviour. However, gender roles can also be learnt through observation and modelling of behaviour. Although Bandura did devise a theory into the explanation of development of gender identity, he did†¦show more content†¦For example, if a parent encouraging traditional female behaviour by saying to the young girl `Your look pretty in that dress, through these comments they are reinforcing gender appropriate behaviour. The influence of peers is also seen as a form of direct gender reinforcement, under the social learning theory. Again, Bandura did not have any evidence through studies to show that this was the case, so therefore Lamb and Roopnarnine took up the chance into providing empirical evidence through the use of an observational method. They observed a group of nursery schoolchildren and found that the children generally reinforced peers for gender appropriate play by giving them more attention or imitating and they were quick to criticise gender inappropriate play. So whilst having your own behaviour reinforced you are also learning by watching others behaviour being reinforced. These findings support Banduras suggestion and the idea of learning through imitation and modelling is certainly present. According to the social learning theory, the influence of the media in the formation of gender roles and identity is known as being indirectly and vicariously reinforced. It states that we can learn gender appropriate behaviour by learning from others. So by having gender stereotypes portrayed in the media, it has a powerful influence on all of us but especially on children because they are currentlyShow MoreRelatedGender And Gender Development : How Children Perceive And Develop Their Genders1649 Words   |  7 Pagesand their take on how children perceive and develop their genders. The articles explore the ways in which children express themselves and fall into specific gender roles or stereotypes. The manner in which children are gendered and taught to think in gendered terms is looked into as well. This paper also aims to clarify the difference between sex and gender, and the impact that outside forces such as parents, media, school, and society place pressures and rules on how children see themselves and areRead MoreChildren s Gender Development And Family Studies Professional991 Words   |  4 Pagesquestion that is discussed in this paper. This particular question states, â€Å"As a human development and family studies professional, how would you describe the ways in which parents influence their children’s notions of gender roles?† (Santrock, 2015, p. 168). Parents play a major role in their children’s gender development. Fathers and mothers are also â€Å"psychologically important to their children’s gender development† (Santrock, 2015, p. 168). Throughout the world, there are different expectations forRead MoreChildren s Appearance Rigidity And Cognitive Theories Of Gender Development1110 Words   |  5 PagesElizabeth Meyer PSYC 232 05 A. May Ling Halim and Diane N. Ruble, 2013, Pink Frilly Dresses and the Avoidance of all things ‘girly’: Children’s Appearance Rigidity and Cognitive Theories of Gender Development, Developmental Psychology Vol 50 (4) pp.1091-1101 B. I chose this article because I found it to be a subject I could relate to. Growing up with a sister a younger than me, and a brother a year younger than her I distinctly remember all of us going through stages of being extremely picky aboutRead MoreThe Role Of Parental Sexual Orientation On Children s Gender Development1767 Words   |  8 Pagesstructure on children’s development. Findings are presented on a sample of 20 gay father families, 20 lesbian mother families and 20 heterosexual parent families who have a child of age 4-6 years. Natural observations in a lab environment recorded children’s tendency to choose gender specific, non-gender specific or neutral toys. Comparisons in toy choice were made between children of gay-, lesbian- and same-sex parents. Overall, children from heterosexual families showed greater gender stereotyping thanRead MoreGender Socialization Of Children : Gendered Toys, Media, And Parental Affects Child Development1289 Words   |  6 PagesAbstract Gender role expectations are inescapable in our society as we naturally tend to sort humans into categories, the easiest one being gender. Upon first meeting a person, most people automatically classify the other’s gender. With this classification come the inevitable gender role expectations. Even for those who consciously try their hardest not to cloud their perceptions of others based on â€Å"traditional† gender role expectations, it is almost impossible not to subconsciously succumb to theseRead MoreChildren s Gender Identity Development : The Dynamic Negotiation Process Between Conformity And Authenticity1545 Words   |  7 PagesBrinkman, B. G., K. L. Rabenstein, L. A. Rosen, and T. S. Zimmerman. â€Å"Children s Gender Identity Development: The Dynamic Negotiation Process Between Conformity and Authenticity.† Youth Society (2012): 835-52. Print. This article describes the experiment performed by aspiring scientists along with the results of the experiment. In their experiment, the aspiring scientists questioned children of varying ages on how they felt about the sex they were assigned at birth, and the stereotypes thatRead MoreGender Differences Within Social Development1747 Words   |  7 Pagesinform the reader of the gender differences through social development. Depending on a child’s gender, things such as gender identity and social acceptance have a great impact in their development. The first thing parents learned about their children before birth is the sex of the baby. This highlights the importance of sex and gender. Sex differences have long been a very important topic in psychology and in understanding why gender differences affect social development. Social learning theoryRead MoreEssay about Compare and Contrast Two Theories of Gender Role Development1379 Words   |  6 Pagescontrast two theorie s of gender role development A dominant debate in current psychological research is one on gender development. Psychologists try to understand relative importance of social and cognitive factors. Various theories are brought up in this field and in this essay two of the most standard theory in this field are going to be explained. The theories covered in this essay relate to aspects of children’s thinking that are central to their gender development. This will include, Kohlberg‘sRead MoreNegative Effects Of Toys1004 Words   |  5 Pages Toys are a way for children to express themselves. Industries are categorizing children’s toys by gender, using colors and advertising products in a certain way, leading to gender stereotyping, which is putting the â€Å"boy and girl† labels on toys. â€Å"By the mid-1990s, however, gendered advertising had returned to 1950s-levels, and it continued to grow in the 2000s† (Robb). These rates have gone up over the years and continue to cause negative effects on children’s development. However, some peopleRead MoreEvaluation Of A Preschool Classroom During Play Time1238 Words   |  5 Pagesdifference in how children may play and/or interact is clear to see. At a very young age, children already have started to associate different toys, clothing, jobs, behaviors, and/or colors with gender. What accounts for accounts for this in children? Reading about gender typing in the book made me become more interested in what factors contribute to developing gender t yping in children. The book, in my opinion, gives a very vague description of what really develops gender typing in children. My belief

Wednesday, January 1, 2020

Masculinity Masculinity And Masculinity Essay - 1593 Words

Introduction Masculinity is a topic that has been debated in society quite often. Many wonder what is means to be masculine and if there can truly be one definition to a term that can vary so widely. Traditional masculinity has certain characteristics assigned to it such as strength, power, control, to be tough, and show no emotion, etc. These traits and thus masculinity have been traditionally assigned to the male body as â€Å"the male body is the most common purveyor of masculinity, but that does not mean that masculinity is entirely contained within the male body† (Reeser 17). While the male body might appear to be the most natural element of masculinity â€Å"masculinity has no natural attachment to the male body, even if is it commonly considered a male belonging† (Reeser 131). Transgender men, individuals who have transitioned or in the process of transitioning from female to male, embrace cultural ideals of masculinity as a means of being accepted into society as male. In th is sense, masculinity can be perceived as a performance that transgender men give in order to successfully move through the world as male. Masculinity offers a sort of camouflage that allows transgender men to function as men without having to reveal their transgender status. The camouflage that embracing traditional ideal of masculinity and visibly passing as cisgender allows a sense of relief and safety for transgender men. This essay will examine how transgender men perform masculinity as crucial aspectShow MoreRelatedMasculinity : Masculinity And Masculinity1850 Words   |  8 Pagesin which femininity and masculinity play a role in society. At the end of World War II, there were many interpretations on what it meant to be a man† most notably for soldiers returning home from the war whom were either unemployed, handicap and/or suffering from PTSD (Post Traumatic Stress Disorder). Film and television acted as pivotal agents that influenced a change in the way masculinity was defined. They explored social values as they refer to the ideas of masculinity and femininity by reflectingRead MoreMasculinity : Masculinity And Masculinity851 Words   |  4 Pages Masculinity At its Manliest In both Douglas Schrock and Michael Schwalbe’s Men, Masculinity, and Manhood Acts and Sharon Bird’s Welcome to the Mens’s Club, we see compelling arguments for the treatments on the categories of â€Å"masculinity.† By comparing both articles, the significant similarities and differences between the two variations can be identified. In doing so, the function of â€Å"masculinity† in society, according to each author, can also beRead MoreMasculinity : Masculinity And Masculinity Essay1623 Words   |  7 Pagesbe a shot to his manhood. To most men and boys in western society, masculinity is what separate the men from the women and the boys from the girls. However, what is masculinity and why do most men and boys’ try so hard to guard theirs? My understanding of masculinity, and as technically defined, is having customary qualities attributed to or usually applicable to a male. My position is that society encourages hegemonic masculinity thu s forming basis for males to exhibit traditional masculine qualitiesRead MoreMasculinity : Masculinity And Masculinity1769 Words   |  8 Pages Masculinity There are different ways for men become masculine, people can teach them or let them figure it out when growing up. Masculinity is usually described as being strong, manly, or dominate. It is also used when someone is describing men and how masculine they are. Many people use the word â€Å"masculine† to describe a man and put them into a category if they see that he fits. Many people believe that boys should not be brought up by punishing them if they did not do something masculine. TheyRead MoreHegemonic Masculinity : Masculinity And Masculinity926 Words   |  4 PagesMultiple Masculinities The certain qualities a man processes plays into how masculine he is rated to be. The way he portrays himself in his looks, actions and everyday life paints a bigger picture for the type of male he is. Connell argues that hegemonic masculinity is the ultimate goal that men strive for. Hegemonic masculinity is the idea of men being powerful, strong and dominant. Not many people actually live up to this theory, but nearly all men strive to achieve it. Marginalized masculinity andRead MoreMasculinity : Masculinity And Violence Essay2278 Words   |  10 PagesMasculinity and violence Violence is a mechanism of coercive control that is used to maintain and reinforce gender difference and hierarchy. Building on Lynch s (2009) claim that hegemonic masculinity is toxic to both the men and women left in its wake this essay aims to explore the relationship between hegemonic masculinity and violence. Placing a specific focus on acts of intimate partner violence and mass shootings, and exploring the works of Lynch (2009), Keith (2011), Baugher, GazmararianRead MoreHegemonic Masculinity : Masculinity And Masculinity1092 Words   |  5 Pages‘hegemonic masculinity’ and ‘the field of masculinity’ depicted in this film. ‘Hegemonic masculinity’, which is proposed by Connell (1987), is assumed to ‘the pattern of practice (i.e., things done, not just a set of role expectations or an identity) that allowed men’s dominance over women to continue.’ (Connell and Messerschmidt 2005, p.832) However, hegemonic masculinity h as strong influence not only over women, but also over other men as Demetriou (2001, p.341) states. Hegemonic masculinity dominatesRead MoreMasculinity And Masculinity, By Michael Kimmel Essay1976 Words   |  8 Pagesmen are often subject to extreme methods of proving their masculinity, and to reinforce what it truly means to be a man. Michael Kimmel, famous sociologist said, â€Å"Masculinity is the relentless repudiation of the feminine† (Kimmel, 2015), which not only reflects how men think about themselves but how North Americans as an entire culture think about masculinity and manhood. The following pages will be centered on issues of the lens of masculinity in contexts such as the sphere of education, the predominanceRead MoreToxic Masculinity : Substance Masculinity1921 Words   |  8 PagesAs a boy grows into a man he faces the ever-raising mountain of masculinity. In regards to the occurrence, he finally reaches maturity he has no choice but in order to fight to re tain his measly sense of manhood. He is not allowed to act feminine or else he’s not man enough, he can’t show his emotions, he has to hide that he can do anything a woman can do sans give birth. Boys grow up being told they are not allowed to cry and that they are supposed to be tough, that they are not able to be likeRead MoreHegemonic Masculinity : Masculinity And Masculinity2351 Words   |  10 PagesWhat is hegemonic masculinity? What are the merits and shortcomings of this concept? In Connell’s original conception, hegemonic masculinity can be understood as ‘the pattern of practice that allowed men’s dominance over women’ (1987). Hegemonic masculinity is the exclusive masculinity of which only a few exhibit. The majority of men in fact experience complicit masculinity, allowing them to dominate in the patriarchal system in which it created. Connell (1987) believed it was this that created

Monday, December 23, 2019

My Current Stress At A High Level - 799 Words

My current stress is at a moderate to high level. I just finished my last class for my bachelors last Sunday and as you know, we have just started the Masters in counseling program. I am a bit overwhelmed with the work for this week, but it is coming along. To start out the week I found out by accident that my stepdaughters are being left alone by their biological mother afterschool. I have been their mom for 7 years now. I do not feel they are ready to be left alone as they still get scared at night and have to sleep with a night light. In Colorado, there is no law it is a suggested age of 12 years old. One thing that worries me about this is they have no phone to call for help when they are alone. Another thing is I suspected this and asked them before and they were quick lie. Just a couple weeks ago my husband saw their mother Brandee driving without the girls and he asked them. The told him quickly again they were with her and they was not the truth because I found an email from mom saying she was not going to be home until 4:45 or 5:00 that day. Anyway, I might be paying a visit to their counselor soon to discuss my concerns. Children should not have to lie for anyone and it have to be making them feel extreme guilt. Another part of my worry is my own daughter just was in the hurricane Hermine last night so I did not sleep well. Thank the Lord they weathered the storm and are all okay. Today we will leave for our last camping trip of the season at a dude ranch where weShow MoreRelatedAccuracy Of The And How Fast A Person Can Complete A Certain Amount Of Math Problems1567 Words   |  7 Pagesaccurate, and how fast a person can complete a certain amount of math problems within only a few mins; then, determine how this relates to stress. It is important to see how much mathematics a student knows, and how the pressure affects them. Doing this study could decrease students’ anxiety levels when it comes to taking a mathematics test in a timely manner. Stress is defined as your body’s way of responding to any kind of demand, or the feelings we have when under pressure. Speed-Accuracy TradeoffRead MoreEffect of Stress on Students1086 Words   |  5 Pagesï » ¿The Stress Epidemic Stress can destroy a human physically, emotionally, and mentally. The average high school student in this generation shows to have higher stress and anxiety levels, along with increased medical problems from this stress, than ever before. Many factors can contribute to this stress and the negative effects it can take on one’s body and mind. With students and their undeveloped minds, stress takes a larger toll on their current and future health. But what exactlyRead MoreThe Cardiovascular System Of The Heart And Blood Vessels1668 Words   |  7 Pagesdisorders of the heart and blood vessels. Examples of CVD are an arrhythmia, coronary artery disease, and congenital heart disease.] [Tobacco use increases the risk for CVD because it damages the lining of arteries. Also, it decreases the level of HDL and increases the levels of LDL cholesterol. Nicotine causes an increase in blood pressure and heart rate. Carbon monoxide in cigarette smoke lowers the amount of oxygen the blood can carry. Tobacco smoke increases the tendency of blood platelets to stick togetherRead MoreNo More Tests in School1582 Words   |  6 Pagesstudent. Tests can create stress for the school and the student, teachers franticly try to prepare the students and the students try to prepare themselves for the heavily weighted test. Testing creates stress for the students and only measures their ability to take a test, Tests only measure current knowledge and not jumps in knowledge , and teachers only â€Å"teach the test†, Testing doesn’t count disabilities or external factors. Standardized testing is not good for students. My first reason is from anRead MoreThe Effects Of Stress On Stress And Stress864 Words   |  4 PagesMerriam-Webster defines stress as â€Å"a physical, chemical, or emotional factor that causes bodily or mental tension and may be a factor in disease causation† (Stress, 2015). Many people think of stress as being overworked or overwhelmed, but stress can be caused by all facets of everyday life. Through the evaluation of my stress self-assessment and the course readings, it has become abundantly evident that stress impacts the body, is affected by motivation and emotions, and by understanding the psychologyRead MoreExperiencing Depression Throughout Life Essay936 Words   |  4 Pagesdiagnosis the patient . The functioning and well-being of depressed patients, a medical outcome study of 11,242 out patients determined that â€Å"patients with either current depressive disorder or depressive symptoms in the absence of disorder tended to have worse physical, social, and role functioning, worse perceived current health, and greater bodily pain that did patients with no chronic conditions.† (Kenneth B. Wells, MD, MPH; Anita Stewart, PhD; Ron D. Hays, PhD; M.Audrey Burnham, PhD;Read MorePsychology Applied to Everyday Life1185 Words   |  5 Pageseveryday life in many ways. The three main ways Psychology applies to my life is through motivation and emotion, Stress and health and Psychological therapies. These topics of psychology are the ones that best describe my life. When most people think of psychology they think of therapists and psychological disorders. Psychology is much more than that and applies to everyone’s life in some form. The first way that Psychology applies to my life is the Motivation and Emotion part of it. Motivation is whatRead MoreSymptoms And Treatments Of Sleep Apnea1332 Words   |  6 PagesHypothesis: Individuals experiencing stress are more likely to develop sleep apnea. My Initial Hypothesis Through our discussion in class over sleep disorders, we have discussed all different types of disorders, which lead to an interesting one called sleep apnea. In lecture, I have learned that sleep apnea can take a toll on the people it affects, and can make a difference in the way one lives. Sleep disorders make us understand how complex and interesting the brain can be. Sleep disordersRead MoreAn Understanding Of Intrapersonal Effectiveness And The Five Factor Model1091 Words   |  5 PagesIntroduction This portfolio will provide an analysis of my intrapersonal effectiveness contextualised by the Five-Factor Model’s ‘Big Five’ personality traits. A theoretical understanding of intrapersonal effectiveness and the Five-Factor Model (FFM) will preface a discussion of my intrapersonal effectiveness, framed by results from the International Personality Item Pool (NEO IPIP) questionnaire. The resultant insights will highlight deficiencies relevant to my career goals and strategies will be suggestedRead MoreAmerican Indian1261 Words   |  6 Pagespatient’s skin quality; along with the falls risk scale that assess how high the patient’s chances are for falling; are two common assessment tools used worldwide. Along with these physical assessment tools are an array of non-physical assessment tools used to evaluate anything from the patient’s coping skills to evaluating their stress level. Three popular ones are the daily hassle scale, Beck depressio n inventory, and the perceived stress scale. All three of these scales are imperative in finding out what

Sunday, December 15, 2019

Job Evaluation Free Essays

string(42) " the Jobs have been evaluated and ranked\." Table of Contents Acknowledgement Executive Summary Outline the merits and limitations of Crop Banks proposed reward system for the managers and staff. Develop an alternative reward system for bank employees and explain why it is superior to the proposed reward system Conclusions Crop Bank has become a most strategic Bank in the field. It has faced a strong competition from both Government sector and local private and foreign banks. We will write a custom essay sample on Job Evaluation or any similar topic only for you Order Now To face these challenges Crop Bank always has to introduce new technology, new financial products and new reward system to their employees and to their customers. The reward system is mainly concern thing within the Corp. Bank. Reward system for the Manager mainly based on the Customer satisfaction and leadership qualities. For the staff the reward system is based on customer satisfaction. These categories evaluated within three criteria. Within the Board meeting Bank CEO accept this rewarding system. Within this case study we have to find; 1. Outlining of Merits and Limitation of Crop Banks propose rewarding system for the manager and staff 2. Develop an alternative reward system for Crop Banks employees and explain why it is superior to the proposed reward system 1 . Outline the merits and limitations of Crop Banks proposed reward system for the managers and staff. Job Evaluation Methods: The essence of compensation administration is Job evaluation and the establishment of the pay structure. By Job evaluation we mean using the information in Job analysis to systematically determine the value of each Job in relation to all Jobs with in the organization. In short, Job evaluation seeks to rank all the Jobs in the organization and place them in a hierarchy that will reflect the relative worth of each. We must first understand what are the Merits and Limitations within the Crop Banks’ current Nanking method. Merits 1 . It is a simple method; current ranking method is a simple one. It only based on â€Å"How much was the customer is satisfied†. So as we can see it is the easiest way of ranking. And the ranking method limits to only three categories they are â€Å"1 . Not meeting customer expectation, 2. Meeting Customer expectation, 3. Far Exceeding Customer expectation†. This is a simplest method on ranking. 2. This current ranking method is a low cost method; as we can see this is a simple ranking system, because of that this cost a low budget. 3. The current rating system can be used in service based organization. In the banking sector such as Corp. Bank they provide a service as for this current ranking method is based on customer service it can be a lot of help to a serviced based organization such as Banks. 4. Ranking method that is currently using by Corp. Bank can be use daily basis because it mainly concern about the Customer satisfaction. Limitations As we can see the Merits within the current reward system there are also Limitation within this. 1. Can’t clearly measure the categories; the rewarding system clearly based on the Customer Satisfaction. And it is only rated by â€Å"1 . Not meeting customer expectation, 2. Meeting Customer expectation, 3. Far Exceeding Customer expectation†. There is no guideline how to evaluate. This is a limitation occurred in current reward system in Corp. Bank. 2. As the above mention rewarding system is clearly based on customer satisfaction. From this we are facing a problem â€Å"Only Customer Satisfaction is enough? † As a developing Bank it is a limitation that Corp. Bank is only concern about the Customer satisfaction when there are more facts that should taken for ranking 3. When concentrating about the Customer Satisfaction factor we are clearly facing a halogen, how can we identify the customer satisfaction because Human is dynamic creature. Some Customers can be satisfied and some customers can never be satisfied because there needs and wants are clearly different. As Abraham Moscow has described there are different needs and want and there are different motivators. As we can see Human can not be easily satisfied. 4. Managers can not always control their subordinates. This is another limitation in the current ranking method in Crop Bank. Managers will not be able to control their subordinates; subordinates will always use their personal feelings within the aerospace. Managers can’t always control this. Reward system only concerns about the customer satisfaction this because of the subordinates work Managers may have to pay the price. 5. The current reward system of the Crop Bank will not effect to the entire bank. Customer satisfaction will be only effect to the front office where the customers usually go. But when it comes to the back office customer satisfaction is not enough. For an example Accountants Job can’t be evaluated from Customer satisfaction. So as we can see current rewarding system is not enough to evaluate the entire banking industries. 6. In the case study it is clearly mention from this reward system only the salary of the employees will go up. But not all people will get motivate from financial benefits. According to Herbage’s theory everyone is not motivated by Money. 2. Develop an alternative reward system for bank employees and explain why it is superior to the proposed reward system There are four main Job Ranking Methods. We must first identify what is the most suitable ranking method for the Crop Bank. A. Ranking method: Raters examine the description of each Job being evaluated and arrange the Jobs in order according to their value to the company. This method requires a committee, typically composed of both management and employee representative to arrange Job in a simple rank order from highest to lowest. No attempts are made to break down the Jobs by specific weighted criteria. The committee members merely compare two jobs and Judge which one is more important, or more difficult to perform. Then they compare the other Job with the first two, and so on until all the Jobs have been evaluated and ranked. You read "Job Evaluation" in category "Papers" The most obvious limitation to the ranking method is its sheer inability to be managed when there are a large number of Jobs. Other drawbacks to be considered are the subjectivity of the method- there are no definite or consistent standards by which to Justify the rankings- and the fact that because Jobs are only ranked in terms of order, we have no knowledge of the distance between the ranks. B. Classification method: A Job evaluation method by which a number of classes or grades are defined to describe a group of Jobs is known as Classification method. The classifications are created by identifying some common denominator skills, knowledge, responsibilities tit the desired goal being the criterion of a number of distinct classes or grades of jobs. Once the classifications are established, they are ranked in an overall order of importance according to the criteria chosen, and each Job is placed in its appropriate classification. This later action is generally done by comparing each position’s Job description against the classification description and benchmark Jobs. The classification method shares most of the disadvantages of the ranking approach, plus the difficulty of writing classification descriptions, Judging which Jobs go where, and leaning with Jobs that appear to fall into more than one classification. . Factor comparison method: Raters need not keep the entire Job in mind as they evaluate; instead, they make decisions on separate aspects, or factors, of the Job. A basic underlying assumption is that there are five universal Job factors: (1) Mental Requirements, (2) Skills, (3) Physical Requirements, (4) Responsibilities, and (5) Working Conditions. The committee first rank each of the selected benchmark Jobs on the relative degree of difficulty for each of the five factors. Then, the committee allocates the total pay rates or each Job to each factor based on the importance of the respective factor to the job. A Job comparison scale, reflecting rankings and money allocations, is developed next. The raters compare each Job, factor by factor, with those appearing on the Job comparison scale. Then, they place the Jobs on the chart in an appropriate position. D. Point method: Raters assign numerical values to specific Job components, and the sum of these values provides a quantitative assessment of a Job’s relative worth. The point method requires selection of Job factors according to the nature of the specific group of Jobs Ewing evaluated. After determining the group of Jobs to be studied, analysts conduct job analysis and write Job descriptions. Next, the analysts select and define the factors to be used in measuring Job value and which become the standards used for the evaluation of Jobs. Education, experience, Job knowledge, mental effort, physical effort, responsibility, and working conditions are examples of factors typically used. The committee establishes factor weights according to their relative importance in the Jobs being evaluated, and then determines the total number of points to be used in the plan. A distribution of the point values to Job factor degrees is made, with the next step being the preparation of a Job evaluation manual. Point Rating method will be the most effective way for the Corp. Bank. It can be identify step by step. Determine the cluster of Jobs to be evaluated First we have to identify what are the Job categories in the bank. We can identify there are two categories in the bank as Front Office and the Back Office. Corp. Bank Front Office -Manager (Chief Manager) -Personal Banking Officer -Customer Service Manager -Executive Officer -Tellers Collect the Job Information Back Office -Operation Managers -Banking Assistant -Clerk Identify a clear knowledge about Job. We can prepare Job Analysis to identify about the Job. Now we can briefly identify Duties and Responsibilities about above mention job categories. Front Office:- Customer Handling. Opening Accounts, Updating and Issuing Pass books. Collecting cheeses and Drafts. Cash and Queue withdrawal. NRC Accounts handling Back Office:- Issuing Loans Issuing Credit Cards Loan Recoveries Other clerical works As we can see these two Job categories plays different roles within the same bank. Be equity towards both parties we have to identify Compensable factors that can evaluate both parties equally and fairly. Selecting Main Compensable factors and Sub Compensable factors To identify the value of the Job, we must select some main compensable factors that are common for every Job within the Crop Bank such as Skills, Effort, and Responsibilities. After identifying these main factors, we must identifying sub compensable factors that elaborate use of the main factors. Showing below is a model for the Crop Bank reward system Skills Education Training Experience Effort Mental Physical Complexity of Duties and Responsibility Job Condition bib Diseases, Stress) bib Diseases are the ones occurred from the current Job for an example employee who daily working with the computers gradually have a bad eyesight. ) Dividing Grades After we have identified main and sub Compensable factors. We have to identify the Grades. From Job to Job above mention factors may defer, for an example: – Under Skills there is a factor called Education. Education can be divided several grades according to the Jobs within the bank Grade 1 Passed Advance Level Grade 2:- Diploma Holder Grade 3:- Degree from a recognized University or equal qualification Grade 4:- Post Graduate Degree holder As we can see to establish an effective Job evaluation system several grades must be issued. In the Crop Bank we can categories to 4 grades according to Jobs within the bank Grade 1 Tellers Clerk Banking Assistant Grade 2:- Personal Banking Officers Executive Officers Grade 3:- Grade 4:- Customer Service Manager Manager (Chief Manager) Valuing According to Grades Factor Degree and Points 2nd 3rd 4th Education Skills 20 35 50 2 3 15 45 4 Mental Effort 10 30 5 Physical Effort Duties/Responsibilities 7 Job Condition Total 200 300 Preparing a Guide book to Evaluate Points There should be a Guide Book to instruct the evaluator. The guide book should contain details about Compensable factors and guidelines about how to evaluate the employees properly. This should help the evaluator to do his duty properly. Evaluation Finally the Job should be evaluated properly and the points should be afforded according to the Guide book. Below is the model example sheet Evaluation Sheet Name of the Job -? Date: / Details Marks Total(Total Value of the Job) How to cite Job Evaluation, Papers

Saturday, December 7, 2019

Change Climate Impacting Every Country

Question: Discuss about the Change Climate Impacting Every Country. Answer: Introduction: The climate in every country is continuously changing. Change in climate is impacting every country. There are many causes for climate change. It can be due to irregular human actions, for example flaming of fuels oils, coal and natural gases land and agricultural clearance. It is the reason of additional high temperature in climate, raising global sea level and melting snow and ice. Basically, climate change is one of the critical problems which is facing by every country today. Climate change can be described as variation in the global climate of earth or in the regional climates over time. Climate change in the atmosphere may be defined by many in many ways. Some define the climate change as consequences of natural processes of earth; on the other hand, some define it as the outcome of human activities. Maintain the balance between these two different perspectives; climate change can be defined as the change which is connected directly or indirectly with the human activities and t hat is the combination of natural climate variability also. Climate change happens due to extreme weather conditions, extreme rainfall and change in regional temperature. Such conditions are the results of greenhouse effect (Brger, Murdock, Werner Cannon, 2012). Now researchers in all over the world have begun to raise the concern about climate changes. There are several incidents of climate change which have been recorded across the world. This report will describe the impact of climate change in India and the possible solutions to overcome from this issue. Climate change affecting world Due to climate change, entire world has faced many problems. Climate change has affected the industries, communities and ecosystem of the world. It has been seen that the warmth of the atmosphere has increased and rainfall has reduced throughout last years. Decreasing rainfall is one of the causes of climate change that impacts on entire the world. It can be seen that there are changes in rainfall, temperature and sea level in the world. Basically climate change is the result of many activities. When climate change happens then temperature can increase. Same as when temperature rises, many different changes take place on the earth. For instance, it can be the cause of more floods, excessive rain, droughts and more heat waves. There are many changes that can be seen in the oceans and glaciers such as glaciers are melting, sea levels are rising and water of oceans are warming and becoming acidic which is affecting people across the world. These changes are frequently happen in recent d ecades. These all changes are challenging to the world and environment (Dillman 2015). Impact of climate change on India Although climate change is the reason of many challenges in all over the world, but this report would specifically focus on the country India. There are many issues in India due to climate change such as water stress, issues in agriculture production and problems in food security, rising sea level, risk on human health and biodiversity. The issues due to climate change have huge relevance from the perspective of India. Impact on Agriculture and food security: Climate change has major impact on the agriculture. Due to temperature, glacier run and excessive rainfall, the climate change has affected the production of agriculture. It affects agriculture in many ways. Agriculture is in important part of Indian economy that provides food and security of livelihood to the Indian population. The productivity of agriculture in India depends upon the rainfall and its patterns. Agriculture is also dependent not only on the patterns of rainfalls but also depends upon the timings of rainfall. But the productivity of many crops is decreasing due to increment of heats and temperature and decrement in the availability of water. Raising temperature is increasing the production cost of crops. Along with this, the increased frequencies of floods, droughts, cyclones and storms are affecting the agricultural production (Feyen, Dankers 2009). Impact on water situation: Water security is one of the most important threats in the climate change. Water resources are facing pressure under the changing climate. Himalayan glaciers are the main source of fresh water in India. In recent years, Himalayan region is facing changes due the extensive use of land such as agriculture practices, deforestation and urbanization. Due to increment in temperature, rain fall pattern is also changing. The demand of water is increasing due to production in the agriculture but there is the scarcity of water due to climate change. Global warming is also affecting the water security. There is the problem in water security in terms of quality and quantity for developing countries such as India. Impact on biodiversity: India is the land of biodiversity in terms of deserts to glaciers. Now, climate change is threatening to the ecosystem. The Himalayan ecosystem is considered as the lifeline of India. So, the climate change is threatening the life of human beings. The monsoon of the country is basically depending upon the ecosystem. India is dependent upon the monsoon for the agriculture and water needs. Climate change is the main reason of changing patterns of monsoons in India (World Resources 2001). Impact on human health: Climate change has strong impact on the human health. The climate change is the result of air pollution, which is impacting the health of human beings. The studies suggest that there will be increment in the health problems due to climate change. It also has been estimated that the number of death will increase due to air pollution. Climate change and high global temperature are the cause of increasing frequency of flood and it is increasing the risk of disease of infection (McKinsey company, 2009). Response to climate change The impact of climate change can be seen very clearly on the environment of India. The impact of climate change is increasing continuously and no country can now afford to sit on sidelines. India is not doing any commitment in reducing the impact of green house gas emissions. But India is taking part equally to the negotiations on climate change. According to India, many developed countries are responsible for the climate change. So, developed countries must do commitments to decrease the negative impact of climate change on human beings. India is committed to the way of sustainable development (Jha, 2014). Although, per capita emissions of carbon gases of India is low in the world but country have recently adopted a national action plan for climate change. India is a responsible nation and it is supporting globally in terms of financial flows and technology access (Ghosh Ray, 2015). India is attending international conferences on climate change for development of clean technologies which are environment friendly. India is also trying to convince developed countries to transfer cleaner energy technologies and environment friendly sound for the use of developing countries. Along with this, India is the partner of Asia Pacific Partnership on Clean development and Climate which focuses on transfer of clean and efficient technologies in developing countries (Sharp, 2009). Measures taken by India Although the contribution of India is greenhouse emission is very small but the government of India is using many measures to improve the situation regarding climate change. The Ministry of environment and forests is the main agency for solving the issues due to climate change in India. India has taken initiatives for climate change issues by many climate friendly measures (Hallegatte, 2009). The country is focusing mainly in renewable energy programs. Along with this, India has also adopted the National Environment policy 2006 which has provided many different measures and policies to create awareness about climate change among the citizen of country. Further, the National Forest Policy also providing active measures for measuring increased carbon sinks in the country. All with this, Indian government has conducted Green India program to protect forests land in the country. The result is that the Green India program will cover around six million hectare land in India in 10 years (Du bash, Jogesh, 2014). Conclusion Climate change is the main issue in present time. It is the greatest challenge for sustainable development. So, the issue related to climate change should be addressed by all the developing countries. The joint work of the developing countries by collaborative strategies will be helpful to address the issues of climate change. The countries need to use a new economic paradigm for the sustainable development. According to Jeffrey Sachs who is a perspective commentator, the current ecological, economic and demographic condition of world is unsustainable and if the countries contribute in business than it will be possible to hit special and ecological crisis. The actual meaning sustainable development is addressing the needs of poor and scarce of water, energy, land, air, and biodiversity and those will have to be sustained by more cooperative ideas and measures by the countries. Then, world could be able to make some development by saving the planet and earth from the issues of climate disasters. References Brger, G., T. Q., Murdock, A. T., Werner, S. R., Cannon, A. J., (2012), Downscaling extremes-an inter comparison of multiple statistical methods for present climate, 25(12), 43664388 Dillman T., (2015), Climate Changes Could Affect Pacific Fisheries, Fishermens news Dubash, N. K. and Jogesh, A., (2014), From Margins to Mainstream? Climate Change Planning in India as a Door Opener to a Sustainable future, Centre for Policy Research (CPR) Research Report, New Delhi Feyen, L., Dankers R., (2009), Impact of global warming on streamflow drought in Europe, 114(D17) Ghosh A., Ray, S., (2015), Fixing Climate Governance through Effective Technology Partnerships: CIGI Fixing Climate Governance Series Hallegatte, S., (2009), Strategies to adapt to an uncertain Climate Change, Global Environmental Change, 19(2), 240-247 Jha, V., (2014), The Coordination of Climate Finance in India: Centre for Policy Research (CPR) Overseas Development Institute (ODI) Research Report, United Kingdom McKinsey company, (2009), Environment and Energy Sustainability: an Approach for India, McKinsey India Sharp, J., (2009), Low Carbon environmental goods and services: an industry analysis, UK: BERR World Resources (2001), People and Ecosystems: The Fraying Web of Life, World Resources Institute, NY: Oxford University Press