Tuesday, December 24, 2019

A Systematic Review Of The Existing Literature On Nursing

2. REVIEW OF LITERATURE 2.1 Introduction A systematic review of the existing literature on nursing and its various dimensions was done prior to the conduct of the research to have an in-depth understanding of the field as well as the various factors that have an effect on nursing. This also aids in exploring the extent to which the field of nursing have been explored. Nurses and midwives are the largest group of health workers who provide a wide range of health services, which include promotive, preventive, curative, rehabilitative and supportive care to individuals, families and groups (WHO 2006). Their adequate representation and utilization in the health care system is very crucial to achieve the results for the services that are†¦show more content†¦Advocacy, promotion of a safe environment, research, participation in shaping health policy and in patient and health systems management, and education are also key nursing roles.’ (ICN, 2002) There are several definitions for the term ‘Nurse’. The International Council of Nurses (ICN) provides a very comprehensive definition for the term ‘Nurse’. ‘The nurse is a person who has completed a program of basic, generalized nursing education and is authorized by the appropriate regulatory authority to practice nursing in his/her country. Basic nursing education is a formally recognized program of study providing a broad and sound foundation in the behavioral, life, and nursing sciences for the general practice of nursing, for a leadership role, and for post-basic education for specialty or advanced nursing practice. The nurse is prepared and authorized (1) to engage in the general scope of nursing practice, including the promotion of health, prevention of illness, and care of physically ill, mentally ill, and disabled people of all ages and in all health care and other community settings; (2) to carry out health care teaching; (3) to participate fully as a member of the health care team; (4) to supervise and train nursing and health care auxiliaries; and (5) to be involved in research.’ (ICN, 1987) 2.2.2 Roles and Functions of the Nurse There are several roles assumed by a nurse in the process of caring for the patients. Berman and Snyder (2013) enlistsShow MoreRelatedNarrative Literature Reviews1589 Words   |  7 PagesNarrative literature reviews Introduction n A literature review is a comprehensive study and interpretation of the work that has been published on a particular topic n A literature review should convey the knowledge and ideas that have been established on a topic and their strengths and limitations Why undertake a literature review? n To provide a review of the current knowledge in a particular field n Provide a description of research studies n Identify gaps in current knowledge n Identify emergingRead MoreThe Role Of Clinical Governance Project Leader At Mokoia District Health Board Essay1479 Words   |  6 PagesManagement consists of the interlocking functions of creating corporate policy and organizing, planning, controlling, and directing an organization s resources in order to achieve the objectives of that policy. Clinical governance is defined as â€Å"Systematic approach to maintaining and improving the quality of patient care within the health system† (National Health Services, 2014). According to Sir Liam Donaldson, chief medical officer as cited by Miller (2002) clinical governance is a system throughRead MoreElectronic Medical Records Vs. The Ohio State University Medical Center1061 Words   |  5 Pageswhich are common among nursing homes residents Review Method I prefer to use Systematic Review method, for my detail review regarding Health Information Technology Integration. I go through previous articles related to my study; which helps a lot to gather some important information regarding my research and that makes my work more effective in way of providing better report and analyze data if necessary in my further study. I used many good and reliable literature reviews and books for collectingRead MoreInterpreting The Role Of Nurses During Kerala s Public Health Care System1680 Words   |  7 Pagesthe existing HR. Why not utilize the existing human resources? Nurses and midwives are the largest group of health workers who provide a wide range of health services, which include promotive, preventive, curative, rehabilitative and supportive care to individuals, families and groups (WHO 2006). With the education and training Nurses receive it would be highly beneficial for the health system if their expertise is also incorporated. This leads us to the concept of advanced practice nursing. ThereRead MoreResearch Study On A Literature Review Essay1400 Words   |  6 Pages4.2 Research Hypothesis Hypothesis Researchers almost never conduct a study in an intellectual vacuum; their studies are usually under taken within the context of an existing knowledge base. It helps to lay the foundation for the study and also inspire new research idea. Hypothesis in other words is an assumption for the research, the researchers organizes his or her ideas and critically thinks what could be the reasons for the stated research questions; thinking of the reasons or possible causalRead MoreThe Incidence Of Aggression And Violence Essay923 Words   |  4 Pagescompared to other healthcare providers and auxiliary staff (Schablon, Zeh, Wendeler, Peters, Wohlert, Harling Nienhaus 2012). Evidence suggests that psychiatric nurses are two times likely to be exposed to threats of assault than medical-surgical nursing. As well, psychiatric nurses are 1.4 times more likely to be physically assaulted and 1.8 times more likely to be emotionally abused compared to nurses working in all other types of un its (Hesketh et al. 2003). It is also estimated that between 25%Read MorePrevention Of Central Line Infections1588 Words   |  7 Pagesquestion largely depends on a thorough literature search. This implies that the replication of the existing study that exists in the literature should not be repeated. Depending on the research question, the aim of the study can be achieved through adoption of different population sample, new conceptual frameworks, various techniques, or trying to link different studies where the outcomes did not provide solutions to the problem. The goal of literature review is to determine the kind of search thatRead MoreHow to Investigate for Specific Research on Teachers Programs, An Outline958 Words   |  4 PagesTHE PROBLEM: â€Å"A study to assess the effectiveness of planned teaching programme (PTP) on knowledge regarding management of selected obstetric emergencies among the final year GNM students of selected school of nursing, Belgaum, Karnataka† OBJECTIVES OF THE STUDY: 1) To assess the existing level of knowledge among Final year GNM students regarding obstetric emergencies by using structured knowledge questionnaire. 2) To evaluate the effectiveness of PTP on knowledge regarding obstetrical emergenciesRead MoreEnhanced Recovery After Surgery Case Study1274 Words   |  6 Pagesthe Colorectal Surgery Collaborative (CSC) in 2014, with the aim of improving patient outcomes for colorectal surgery, maximizing patient satisfaction, managing costs and promoting innovation in colorectal surgery. CSC is a body of administrative, nursing, and physician representatives across the Partners network specializing in improving quality, safety, and efficiency of colorectal surgery at Partners hospitals. Among the six Partners institutions represented in CSC are two academic medical centersRead MoreAn Article On Academic Evidence And Influence On Nursing Practice1879 Words   |  8 PagesW. and Pei, J-J (2011). The aim of this essay is to critically analyse an article of published, academic evidence and to evaluate its relevance and contributions to nursing practice. Critical literature analysis plays an important role in nursing practice as the discipline produces an ever-expanding amount of research and literature that is essential to the on-going development of practice. Critical analysis is an important skill that allows for the gathering and processing of information. It produces

Monday, December 16, 2019

Incident of the French Camp Free Essays

Incident of the French Camp Reference to Context Introduction These lines have been extracted from the poem Incident of the French Camp written by Robert Browning. The poem describes an act of chivalry, gallantry, patriotism and sacrifice on the part of a young French Soldier. The French Army had attacked the German city of Ratisbon. We will write a custom essay sample on Incident of the French Camp or any similar topic only for you Order Now After they had achieved triumph, the news of the victory was conveyed to the Emperor Napoleon Bonaparte by that young soldier who was brimming with pride and glory although he was on the verge of death. Thereafter, the wounded soldier breathed his last. Lines YOU KNOW, WE FRENCH STORMED RATISBON: A MILE OR SO AWAY, ON A LITTLE MOUND, NAPOLEON STOOD ON OUR STORMING DAY; WITH NECK OUT-THRUST, YOU FANCY HOW, LEGS WIDE, ARMS LOCKED BEHIND, AS IF TO BALANCE THE PRONE BROW OPPRESSIVE WITH ITS MIND. Explanation In the lines given for explanation, the poet is describing the scene of the French attack on the German city of Ratisbon. Marshal Lannes led the French aggression in the year 1783. On that occasion, the French emperor Napoleon stood on a hillock just a mile away from the scene of the onslaught. He appeared to be in a pensive mood. He had his neck sticking out and his legs were wide apart. He had his arms joined behind his bark and a cloud on his brow was quite visible. It seemed that something very important was weighing upon his mind and he was perhaps working out his future strategy and line of action. Lines JUST AS PERHAPS HE MUSED, MY PLANS THAT SOAR, TO EARTH MAY FALL, LET ONCE MY ARMY. LEADER LANNES WAVER AT YONDER WALL,’- OUT ’TWIST THE BATTERY SMOKES THERE FLEW A RIDER, BOUND ON BOUND FULL-GALLOPING; NOR BRIDLE DREW UNTIL HE REACHED THE MOUND. Explanation These lines bring to light the contemplative nature of Napoleon, and the courage and enthusiasm of the young soldier who was heading towards him to convey the good news of victory. Napoleon was lost in his thoughts pondering over the events of the days to come. All his future planning depended upon his success at Ratisbon. He was eagerly waiting to see the French flag flutter over the German City. As he concentrated upon his future strategy, he observed a young French soldier rushing towards him, riding at top speed. The rider pierced through the blanket of smoke. He came straight to the place where Napoleon was standing and was waiting to receive the good tidings. Lines THEN OFF THERE FLUNG IN SMILING JOY, AND HELD HIMSELF ERECT BY JUST HIS HORSE’S MANE, A BOY: YOU HARDLY COULD SUSPECT – (SO TIGHT HE KEPT HIS LIPS COMPRESSED, SCARCE ANY BLOOD CAME THROUGH) YOU LOOKED TWICE ERE YOU SAW HIS BREAST WAS ALL BUT SHOT IN TWO. Explanation In the given lines, the poet appreciated the heroic behaviour of the young soldier. Although he was fatally wounded, he displayed extraordinary courage, confidence and self-control. He jumped off his horse and stood at attention before his chief. His mouth was full of blood but he had his lips so tightly sealed that not a drop of blood oozed out of it. He maintained his cool and composure, and with confidence and chivalry, conveyed the cheerful news of victory. One could never realize that the young soldier’s breast was shot into two unless one has very keen and observant eye on him. Lines ‘WELL, CRIED HE, ‘EMPEROR, BY GOD’S GRACE WE’VE GOT YOU RATISBON! THE MARSHAL’S IN THE MARKET-PLACE, AND YOU’LL BE THERE ANON TO SEE YOUR FLAG-BIRD FLAP HIS VANS WHERE I, TO HEART’S DESIRE, PERCHED HIM! ’ THE CHIEF’S EYE FLASHED; HIS PLANS SOARED UP AGAIN LIKE FIRE. Explanation In the lines given for explanation, the poet is describing the way in which the young soldier informed Napoleon of their success and the reaction of the Emperor to this good news. Although the young man was in intense pain and suffering, he finally opened his lips, and with a great sense of pleasure and personal pride, informed Napoleon of the annexation of the German City. Napoleon was delighted to learn that Marshall Lannes had reached the heart of the city and the emperor was eagerly awaited by the triumphant forces. The soldier felt a special kind of joy and pride in the fact that he, with his own hands, had flown the French flag over Ratisbon. The flag had the figure of a bird on it. Thus when the flag fluttered in the air, it seemed as though the bird on it. Thus when the flag fluttered in the air, it seemed as though the bird was flapping its wings. No sooner did Napoleon get the news of victory, a sparkle of joy and satisfaction came to his eyes. He once again started thinking about his future strategy. Lines THE CHIEF’S EYE FLASHED; BUT PRESENTLY SOFTENED ITSELF, AS SHEATHES A FILM THE MOTER-EAGLE’S EYE WHEN HER BRUISED EAGLET BREATHES: ‘YOU’RE WOUNDED! , ‘NAY’, HIS SOLDIER’S PRIDE TOUCHED TO THE QUICK, HE SAID: ‘I’M KILLED, SIRE! † AND HIS CHIEF BESIDE, SMILING, THE BOY FELL DEAD. Explanation These lines bring to light Napoleon’s loving and affectionate behaviour towards the young soldier who was about to breathe his last. The good news of success had brought to Napoleon’s eyes a special kind of glitter which faded away no sooner had he noticed that the soldier was fatally wounded. The feelings of Napoleon at that moment were just like those of the mother eagle who gets confused when she finds her young ones badly bruised and on the verge of death. She fails to understand how to save their lives. Similarly, that maternal affection surged up in Napoleon’s heart and he inquired whether the boy was wounded. The soldier proudly declared that he felt joy and thrill in giving his life for his country. There was a smile of pride and satisfaction on the young soldier’s lips as he fell dead near his emperor’s feet. How to cite Incident of the French Camp, Papers

Sunday, December 8, 2019

Mobile Forensic on Iphone free essay sample

In recent years, mobile forensics is a new science, which means that the items we are used to retrieve from computers are not available on the mobile devices; one such example is deleted files. By constantly changing the models of mobile phones, it is deemed to be a great challenge. Therefore, there is a need to be able to perform forensic investigations on mobile phones since majority of the people rely on mobile phones, particularly iPhone. Also, iPad and iTouch are also hot products developed by Apple. The iPhone was first released to the market in June 2007. The main purpose of the iPhone released was to allow consumers and the public to be able to check their emails, take photographs, browse the internet and many more functions on the go which saves them trouble of switching on their laptop or PC just to check and make their replies respectively. Other than the named functions of an iPhone, there are also applications that help the organization work flow and also provide entertainment. We will write a custom essay sample on Mobile Forensic on Iphone or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page As iPhone has been widely used today, more and more applications are developed to help one does their job on the go. These applications not only serve to help the organization, it also helps students and even the elderly these days. With such a robust amoung of iPhone users, many consumers have treated it as a mini computer no matter where they go. With a large number of users using this smart phone, this would mean that most of the data will be stored in this small little device. In iPhone forensics, there are many aspects which we are looking at in terms of hardware and software. We will further explain the aspects below. iPhone Specification Comparing the differences between the four different iPhone models, iPhones do have integrated GPS except that of iPhone first generation, which can actually track the location of the iPhones. This helps in tracking the previous locations which the iPhone has been which the information can be viewed at the micro read level which will be covered later on. Also, the table below shows the basic applications inbuilt in the iPhone. These applications might render some help in the mobile forensic investigation. Application| How information helps| Map| Previous location user has gone to| Call| Provide call logs between user and others| Photos| Provide latitude and longitude when the picture was taken (if location services are enabled)| Mail| Emails received/sent/drafts| Messages| Conversations between user and others| Calender| Provides dates user deemed as important (marked dates)| By having the information from these built-in applications, we can at least gather some evidence and document the end results to further on analyze before we can recover deleted files such as deleted emails. iPhone leveling When we talk about iPhone leveling, we will tools to do the different classification. The tool, developed by Sam Brothers in 2007, allows the examiner to assign the iPhone to whichever category depending on the different depths of examination they are doing. The main purpose of this tool is to allow easier comparison between the tools and provides a standard for examiners. The purpose is also to let examiners know what they are doing with the iPhone. Figure 1. 1 It can be seen that the higher the different level of pyramid, the more technical the methods will be. For each of the levels progressing up, the time needed for performing analysis will be significantly longer. Also, the techniques will be in-depth each by each level. Manual Extraction is the most significant phrase as it is the first hand information of the device, first hand meaning the physical contact of the phone, browsing the data using the keypad and documenting the results. There will be error in the analysis will arise if the phone is physically damaged (Screen unresponsive/ Buttons spoilt). In Level two, this involves logical analysis. Logical Analysis, involves a connection of the device with a computer and analyzing it with software. This involves looking into details of what the phone has. In level 3, which is the hex dump, requires a connection to be established in Level 2 in order to push the data stored on the phone across to the communication conduit. The next level is Chip-off level. This involves the acquisition directly from the device memory chip which is the NAND Flash Memory. The chip will be physically removed from the device and data will be extracted from the chip reader and stored on a computer. One challenges faced is that the time taken to interpret and read the raw data will be long. The last level will be the Micro Read level. This level involves manual reading of physical gates and interpreting data seen on the chip. Because it is at the highest level, this means that the process of micro reading is time consuming and expensive. Acquisition Types There are a few acquisition types. The types of acquisition include: Backup, Logical, Physical and Nontraditional. These few types of acquisition techniques may overlap with what is covered in the previous sections. I will explain further in the different types below. Backup Backup in IPhone is stored in the active directory. When we sync data on iPhone, it is simply to ensure what is kept in the phone is in sync in the PC, only certain data are synced. For example, photos, contacts and some application data are sync. In the backup phase, every single files or directory is being duplicated. For example, call logs, SMS and other applications are all backed up. In this acquisition type, it will read the data from the iPhone backup files created through the iTunes using Apple Synchronization Protocol. Only files that are synchronized by this protocol can be analyzed. Logical In logical acquisition, it involves direct obtaining of data from the iPhone and is preferred over recovering files from the computer the iPhone have sync with. Using this approach, the active files and folders from the iPhone’s file system are recovered; however data contained in the unallocated phrase (slack space) is not recovered. Physical In physical acquisition, it allows bit by bit copy of the file system of the iPhone. The process of this particular acquisition is a more complex process as it recovers the most data. This method can recover any data stored on the phone. When looking further at this type of acquisition, even deleted messages , photos , GPS location can be recovered. Nontraditional In a nontraditional method, Jail breaking could be one techniques in the nontraditional methods. In a jail broken firmware, it is meant to modify the firmware to allow better flexibility. This technique of investigations will require a high educational experience personnel as the firmware is already mess up. IPhone OS In iPhone, IOS is the platform and the operating system that is developed for iPhone. With the IOS developed, it is now running in different devices like the IPad, Itouch and so on. IOS Layers Layers| Description of layers| Core OS| This layer is situated directly above the hardware which provides the services which include low-level networking, access to the accessories as well as OS handling. | Core Services| Provides the minimum systems needs that are required in the applications of the device. It contains fundamental interface to allow low level data types. | Media| This is the part where all the audio and videos are stored. | Cocoa Touch| Contains technological things that provide the backbone to implement the virtual interface for applications. Objective –C is being used. | File System The file system used by any Apple device is HFS Plus. The HFS Plus is used to ensure that disk space efficiency is met, international-friendly filenames and making it compatible to any operating systems. iPhone disk partitions iPhone uses NAND Flash which have two partitions. The two partitions are firmware partition and user data partition. The firmware partition is when the operating system and the applications are hold. The user partition takes up most space on the disk. This is the place where most evidence can be found. The info taken from this part of the partition will be transforming to a disk image and named as a ‘. dmg’ file and put on mac for further analysis. The table below will show you more about the two partitions: | Partition 1 â€Å"System†| Partition 2 â€Å"User Data†| Referred as| System or firmware partition| User Data or Media partition| Storage on device | 0. 93/8 GB; 1. 4/16GB; 2. 7/32GB| 7. 07/8GB; 14. 6/16 GB; 29. 3/32 GB| Mount location on iPhone| â€Å"/† (root)| â€Å"/Private/var†| Type of data stored| Operating System, basic application, firmware upgrades| All user data (SMS, Call Logs, Photos, ITunes files, etc)| Figure 1. Iphone disk partitions( Taken from reference below) Acquisition Techniques There are many acquisition techniques as discuss earlier. There are three main methods of acquisitions. The three main types are physical, logical and back up acquisition. In the Backup acquisition, the backup of the device on the computer is retrieved. This backup is used only when the device is not available. The following files status. plist, info,plist and manifest. plist are the files that contain configuration files about the phone or any apple device, backup files, and status of backup. The two main files that we are looking at is *. mdata and *. mdinfo. These two types of files are the binary files which contains user information that are not readable when opened directly. Tools are needed to enable you to read these files. All the plist file should be converted to xml in order for it to be legible. In an unencrypted backup, it is easy to acquire the data, while in an encrypted backup require a password to be keyed in before syncing. Therefore, the standard tool is not able to view the files directly unless a password cracking tool is used to decrypt the password. In a logical acquisition, active file system are being duplicated into another file. These files will then be viewed in particular tool and then export to become a report. The overall steps involve in the acquisitions is the following no matter what software is being used: 1. Run the forensic software of your choice 2. Connect the device 3. Begin to acquire the image from the phone: This step will pull out all the information from the device that is backup via the apple synchronization protocol. 4. Depending on the software you use, some of these could be turn into a report. Zdziarski Technique In this technique, the examiner could use bit-by-bit copy of the user data partition. This process requires the modifying of the read-only system partition. This method requires the examiner to know some commands in order to use this method as the tool is command line driven. There is some software required for this method which needs to be installed in the system partition to allow this to work. Once the phone is rebooted, the user initiates a raw disk image on the device and pulls it onto the forensic workstation for further analysis. iXAM Technique XAM was created by Forensic Telecommunications Services Ltd. This is a software base which requires a USB dongle. It runs on windows only, but able to run in a VM environment that can be run on Linux or Mac. iXAM is installed by running a setup file, provided by FTS on an external USB drive. The iXAM works when an unassigned code is sent over a USB connection to a device running in the DFU mode. Before I moved on further, I would like to describe on the different operating modes of a iPhone. Normal mode In the Normal mode, the device is on in a typical fashion. Recovery mode In the Recovery mode, the examiner will boot the device into iBoot, bypassing the Operating System. iBoot is something at level 2 of the Apple device which is where the recovery mode lies. By powering off the device, and holding down the home button and connect to your computer will move to the recovery mode. DFU mode In DFU mode, actions are required to initiate various actions on the iPhone, most commonly to perform a physical acquisition. It can be called as the â€Å"Firmware upgrade â€Å" mode. In order to get into DFU mode, you have to connect phone with the computer and make sure that itunes is not auto on. If it is auto connect to itunes be sure to exit. Then hold down both power and home button for ten secs and release the power button(while holding the home button) Continue to hold the home button for ten more secs to enter the DFU mode. When entered correctly, no apple logo should be seen. Once you are in the DFU mode, the code will run on the RAM and not at the user partition. The iXAM also prevents the device from connected to the external networks. This is an important feature as this allows the protection of the data which is required in computer forensics too. Real World Applications Mobile forensics on iPhone, iPad and iTouch has been widely used among all the countries due to the fact that Apple users have a fairly active hacking community which yielded tools and researches which support forensic investigations. Some examples of tools that supported are: -UFED Cellebrite -Oxygen Forensics for iPhone -MacLockPick SubRosaSoft By having forensic investigation, it is a must to make sure that the procedure of investigating the source information does not be modified in any manner just so to maintain the integrity of the information. If the source information has been modified and that the information could not be restored back to its original state, the forensic investigation will be deemed fail. Two techniques that can be utilized by the forensic software products are as follow: Backup: By analyzing the backup of the iPhone file system using Apples protocol. The procedure involves reading and acquires files explicitly synchronized by Apples synchronization from the iPhone. By querying the databases which the information are stored in, that is SQLite, the chance of recovering the information such as deleted call logs and messages will be higher. Physical bit-by-bit copy: The process involves a physical bit-by-bit copy of file system. Although this technique has the highest amount of data being recovered, it is usually considered to be more complex and requires other sophisticated tools. By having forensic investigations on mobile such as iPhone, challenges are often faced by the investigators. One such challenge is the time taken to perform the physical acquisitions and analysis. Secondly, there are more than a dozen of software and hardware solutions for the data extraction and analysis in the market. Product descriptions given on websites do not give clear understanding of software functions and features, which made the product, seemed unclear. Conclusion In order to do mobile forensic investigation or analysis, we must first know how the things work inside iPhone, iPad and iTouch. As it seem, all Apple touchscreen devices uses the same iOS (iPhone Operating System), therefore it is much easier to do a forensic analysis since they are all on the same platform. Reflections and Task Allocation Task Allocation: Spread across all parts and overall edit. By researching on the real-world applications, I found out that there are actually a lot of mobiles forensic tools out in the industry to try out. From this assignment, I have learnt that mobile forensics is equally important to the normal forensic investigations because in this technology advanced technology world, mobile forensic will be really needed in the near future. It consists of a lot of steps in order to get the data needed. E. g. deleted messages will have to go through a lot of process to retrieve, which might be time consuming. By Candice.