Mobile Computing Strategic IT Guided by Dr Samuel Ekundayo Group Members Oksana BelaiaNayana PatilChangze Yang Vinay Gowda Assignment 1 Abstract Apple

Mobile Computing

Strategic IT

Guided by Dr Samuel Ekundayo

Group Members
Oksana BelaiaNayana PatilChangze Yang
Vinay Gowda

Assignment 1
Abstract
Apple, Google, Amazon and windows these leading companies are innovating amazing smart devices which are contributing to mobile computing. The mobile applications can do so many things like sharing, e-commerce, banking, emails, chatting and many more thus organizations such as business, entertainment, commercials, enterprises are integrating mobile computing. As an end user point of view, this is choice of convenience and easy accessibility to the information and computational activities. Organizations are making strategic plans to attract users to their services, IT plans for application development, investments by offering anytime, anywhere accessibility of the information so that the user are also considering mobile computing as a choice of comfort. Global companies like Amazon, Google, Microsoft, Apple, IBM are leading in mobile computing plus New Zealand based companies such as ANZ bank Auckland traveler are also influenced by mobile computing.

Contents TOC h u z Contents PAGEREF _Toc526275574 h 3Introduction: PAGEREF _Toc526275575 h 42. History of mobile computing PAGEREF _Toc526275576 h 43 Use of mobile computing PAGEREF _Toc526275577 h 53.1 Integration PAGEREF _Toc526275578 h 53.2 Key points PAGEREF _Toc526275579 h 64. Global Example PAGEREF _Toc526275580 h 64.1 Characteristics of organizations PAGEREF _Toc526275581 h 64.2 Strategic plan of company PAGEREF _Toc526275582 h 74.3 Advantages of using mobile computing PAGEREF _Toc526275583 h 74.4 Security PAGEREF _Toc526275584 h 75. IT strategic plan PAGEREF _Toc526275585 h 95.1 Theoretical background PAGEREF _Toc526275586 h 95.2 Critiques of WSSC IT Strategic plan PAGEREF _Toc526275587 h 106 Examples of mobile computing in New Zealand Company PAGEREF _Toc526275588 h 116.1 Characteristics of Auckland Transport mobile application PAGEREF _Toc526275589 h 116.2 Characteristics of Kiwi Bank mobile computing PAGEREF _Toc526275590 h 126.3 Influence of mobile technology on New Zealand organization PAGEREF _Toc526275591 h 137. The CIO role in mobile computing PAGEREF _Toc526275592 h 157.1 Ethical challenges PAGEREF _Toc526275593 h 157.2 Corporate governance PAGEREF _Toc526275594 h 167.3 Security policy PAGEREF _Toc526275595 h 16Conclusion PAGEREF _Toc526275596 h 18References PAGEREF _Toc526275597 h 19

Introduction:Mobile computing is evolving nowadays. companies are getting confused with mobile technology to use, How the technology will help them grow their business? The evolution of information technology, cloud computing and the progress of innovative smartphones in the information technology world (Weng, 2015), mobile computing is being trendy. Advanced smartphones and tablets have been innovated by well-known companies such as Apple, Amazon, Google and that broaden mobile software market. Basically, companies are adopting mobile technologies because mobile applications are taking place of web applications and desktop applications to provide remote access to information. Organizations worldwide are presently investigating conceivable open doors into the mobile application market. In any case, what is the extent of mobile technology innovation? What are the standpoints as far as the significance and dangers of these innovations? These key inquiries should be replied before firms can believe in the precision of business strategy planning (Weng, 2015). Companies are migrating their data sources to mobile operators data sources.

This report focuses on mobile computing characteristics, the benefits to the organizations, how organizations are influenced by this technology. Sharing information online, remote access to information shared by organizations (Kenneth McBride, 2014). Organizational perspective behind migrating to mobile computing with the examples of organizations influenced by mobile technologies. Although some challenges are faced by firms while adopting mobile computing which includes strategic business planning. Business strategies of mobile computing in an organization will be stated with an example. Companies management or corporate governance manage the strategic IT plan for mobile application before integrating the application.

2. History of mobile computingToday the mobile technology has reached to certain extent it is very difficult to find people not using mobile technology. But its humble beginning or origins started back in the year 1894,when the inventor of radio waves by Marconi the primary person to provide radio waves across the long distances that marks the beginning of mobile technology. The first wireless network eventually got completed in FRG in the year 1958.the Motorola’s first invention of  worlds initial personal phone or cell (Livingston) in the year 1983.this led to the invention and creation of industrial cellular market for 113 years of history of mobile computing. This led to rapid growth on new mobile technologies and also the mobile os IOS by apple in the year 2007.
 Mobile computing can be defined as a two way radios that use large antennas to communicate messages. starting from there it has ended to 3 inch personal computers that will do almost all of the work whatever a personal computer does. This is  such a mobile devise all you need is just an internet to connect from any place anywhere from there you can start to work basically 2 way radios are used by police officers that was also considered as mobile technology. but now people can connect without any wires that is wireless connectivity to the internet any where around the world. if and only if he the devices that is capable of connecting to the internet (Chung, K., Yoo, J., ;amp; Kim, K. J et al., 2014.)
The popularity of mobile computing has grown drastically with help of new innovative ideas and smart devises which is better utilized by smart phones and mobile tablets (Sykes, E. R. et al., 2014 ) Due to these innovative technology all the business are adopting to new mobile computing technology that include migrating all their resources from their server to mobile service provider. instead of  only browsing the mobile devise users are more keen in creating and sharing content. Now it is even more easier to accesses information and share them. This has led to users to move towards data centers of in order to get a better response and reliability(Sykes, E. R. et al., 2014 ) .

3 Use of mobile computing For business strategies, companies are moving to the mobile computing but there are so many factors has to be considered before integrating mobile computing for the organization. Mobile computing is more restricted than the other technologies because of the small platform size, multitasking of user, dynamic context at the other hand challenges of security and privacy of the information. (Tarasewich, Gong, Nah ; Dewester,2008).

3.1 IntegrationA survey held in the USA the benefits of using tablets and mobile devices for medical students studies has found advantageous. Mobile devices and tablets usually come with a wireless internet connection so that transmitting information via mobile and tablets is easy and fast (email, browsing) with help of (Robinson ; Burk, 2013)in medical education mobile and tablets are used for pre-clinical curriculum. It is a reasonable investment in the education of medical students. In a survey held in 7 medical schools out of 148 schools of AAMC. They found students are happy with the addition of tablets and mobiles in medical education.one of the schools reported improvement in the United States Medical Licensing Examination(USMLE) test scores as consequence of using tablets and mobile devices in medical education. most medical students of AAMC schools use tablets for ebooks, references, and study for board exams(Robinson ; Burk, 2013).

3.2 Key pointsFor mobile companies, strategic planning of adopting mobile computing may increase their business in a market with low risk.(Tarasewich,Gong,Nah,Dewester,2008).Since mobile devices have smaller screen size, creating user interface is a hard task for mobile development. Mobile devices are used for all operations such as information sharing information, social media, email, education, banking and so on. Thus organizations have to be cautious about the mobile application restrictions while developing an application and creating a strategic plan for the mobile computing.

4. Global Example4.1 Characteristics of organizationsAny organization that needs to grow in this competitive environment then their characteristics of that respective organization plays an important role. An well organized company will share the business objectives with its employees at each level the management shares its objective with its employees in order to achieve the required purpose (mission).Each company that has  long term accomplishments they must create and well maintain a healthy atmosphere in the working places (Chung, K., Yoo, et al., 2014). A healthy institution in order to be in a competitive phase they should continuously evolve themselves in order to get good revenues .understanding the characteristics of an institute helps you to detect and tackle those problems in the company in the long term. Must have high employee morale and offering training opportunities and any person to lead a team must posses strong leadership qualities. Understanding the risks and act according to circumstances. lastly a great team work.

To understand the functionality of an organization or its characteristics we have taken  Amazon company for its global reputation and great organizational skills. Amazon.com Inc.’s they follow a different organizational structure which helps them to enables massive control on global e-commerce operations.  In an organization the corporate structure will be established in a firm there will be interaction among design and members. For example, Amazon’s corporate structure determines how managers direct and influence operational activities in various business areas. As the leading online retail business in the world, the company must maintain an organizational structure that sufficiently supports its expanding market reach
Amazon.com . has a functional organizational structure. This structure focuses on business functions as bases for determining the interactions among components of the organization. The following characteristics are the most significant in Amazon’s corporate structure:
Global function-based groups
Global hierarchyGeographic divisions 
4.2 Strategic plan of companyIf a business has to grow then we have to take many calculated risks that includes ashort term and long-term plans and how to increase and expand operations. Creating such a strategic plans will lead to the growth of the business. A business plan is totally different from strategic plan. To a achieve the short-term goal and the steps taken to achieve them is called a business plan. A long term plans to achieve the required strategies is called as strategic plan. There are different methods to understand strategies planning .analyzing the current situation and understanding the internal and external environments. Forming the strategy and executing the strategy, levels of operational planning and checking for those plans for sustainability
4.3 Advantages of using mobile computing    The most important advantages of mobile computing are flexibility of location, Time saving, productivity can be enhanced, easiest way of research, entertainment streamlining of business process, easiest way of operating, touch screen, wireless, facility to access from anywhere reducing  and maintenance cost (Chung, K., Yoo, J., & Kim, K. J et al., 2014). Accessibility around the globe, software up gradation is a major concerns here in after need not worry because we are using flexibility and highly automated processes .the huge advantage of using mobile computing is cost savings. Improving data storage capacity, improving reliability, scalability, ease of integration (Chung, K., Yoo, J., & Kim, K. J et al., 2014).

4.4 SecurityIt is necessary that the corporate 1st defines the sort of mobile devices it will support, giving support for too several platforms would eventually weaken the safety system and build it not possible for the IT security team to handle future problems, embrace solely the most recent mobile devices, which supply higher security measures and device-level secret writing.

The company needs to next set a limit to the user’s right of accessing and storing company data received via his or her mobile device. This limit mostly depends upon the kind of the organization and also the nature of data the institution offers its workers access to, offer workers access to all or any mandatory knowledge, however conjointly see thereto that this knowledge can’t be keep anyplace on the device.
Different workers tend to use their mobile devices for various functions. Each one, therefore, accesses differing levels of knowledge with their mobile gadgets. determine high risk users and to transient them on the industry’s security controls. Request to feature a tool typically, it becomes imperative for a corporation to refuse employees’ requests of adding on specific sorts of mobile devices to their accepted list. this is often particularly the case wherever the business has got to keep its information secret
Every mobile device connected to your network has to follow an equivalent security policies on your network, and also the best to begin with square measure screen locks and passwords.

 In a mobile cloud environment, there is a large number of users and including organizations. any breach in this mobile cloud computing environment will lead to exploding of  all users and organizations (Amandeep, S. W. et al.,  2017)
Most of the companies will be outsourcing the data to people providing cloud services. due to  low cost that a cloud can offer, there are many occurrences when the data will be breached due to malicious attack and server crashes other disaster like fire or earthquakes resulting in loss of data (Amandeep, S. W. et al.,  2017)
Any communication that occurs between clod service provider and API through clients where clients can manage the data. Due to these interfaces has to be secure to make sure any unauthorized accesses.

An unapproved person who has a password can view the data of clients by stealing it, revamping it, may be removing , or chances where they may sell for certain benifits. There are various solutions to avoid any description or service seizing
• Can prevent the users by not sharing their credentials
• Using a two-factor authentication method
The data location matters when the user data is stored in allocation that is prone to disasters. There are certain rules and regulations in specific countries where the company can have their own data center.

 The mobile cloud services they offer hardware and software sources that can be shared among several users. If somebody hacks and occupies all available resources this will lead to shortage of resources there by leading to denial of service, which will end up in slowing down of accesses. Usually IT identify a user based on his username and including password. In an security systems authentication is far different from authorizing, which is the method of giving individuals an accesses to the system base do their identity (Pallavi, L. et al., 2014).

It’s a process of giving permission to a particular person a permission or to access the resources. in this sort of permission giving access to read or write files ,time to access amount of allocated space (Pallavi, L. et al., 2014).

Encryption is performed at higher  levels of a organization, appropriate to the use of context and other components of the system., it translate the data into a secret code and is most efficient way to attain data security (Pallavi, L. et al., 2014).

Every user in mobile must ensure the integrity of their data present on the cloud. Every access should be verified and authenticated. Every access must be authenticated assuring that it is their data and thus verifying its integrity (Pallavi, L. et al., 2014).

The effective method to protect these contents from piracy and illegal access are applied such as paid access or encryption and decryption keys to access these contents.

5. IT strategic plan5.1 Theoretical background
Information technologies provide support for all business functions in the organization, it delivers new opportunities for the implementation of competitive advantages and interaction with customers and stakeholders. Key factors for a successful company in a competitor’s environment are IT effectiveness and efficiency that support business strategy (Silvius et al., 2011). In this regard, the planning of the company’s growth in the information technologies field acquires important meaning. The basic direction of work in this area is the implementation of the IT strategic plan (Chen ; Kamara, 2008).

The IT strategic plan is a complex document that provides future progress of the company’s IT infrastructure for several years, it also clearly defines the priorities and objectives of IT development and focuses on improving the business value (Hong, 2009). IT strategy is a kind of continuation of the all business strategy of the organization in the IT development field. Moreover, the IT plan is a combination of IT solutions and resources that guarantee the implementation of the company’s core business objectives (Chan ; Reich, 2007).

The IT plan determines the prospects, technologies, timeframes and budget required by an organization to reduce cost of business operation or generate additional profits, which provide strategic and competitive advantages. Some factors that have serious impact on successful implementation of strategic plan were found in the literature, for example appropriate resource allocation, stakeholders’ involvement and detailed implementation planning (Hong, 2009).

Most of the authors agreed that IT strategy have to reflect the organization’s strategy and support business objectives. In this case IT plan should include vision and mission statement that are relevant for the business.

It is necessary for IT strategic plan to be clear with its goals, containing a set of technology investments that the IT department deems a priority to contribute to the organization’s success. It is critique important that the plan have to contain evaluations of the company’s existing IT financial plan and assign project-specific resources and responsibilities within the IT department to run into their aims (Chan ; Reich, 2007).

Today mobile is an important part of the business, it provides communication channels between employees, customers, managers and shareholders, and it is an instrument, which provides help with business operation to the company. All of this facts influence to a company strategy, from this perspective organization mobile strategy should be crossed with general strategy and be part of IT company’s strategy (Lakhdissi, El Habi, Semma, & Bounabat, 2013).

5.2 Critiques of WSSC IT Strategic plan
The Washington Suburban Sanitary Commission (WSSC) is the company that deliver good quality and reliable water and provide wastewater services to their customers in the USA. Their vision is to be the one of the best tier of the top-managed water and wastewater functions in the world. WSSC IT Strategic Plan includes investments in mobile computing, mobile workforce and prepare staff with real-time data and guidance (Lawson et al., 2011).

IT Plan clearly explains that mobile computing in WSSC should have to be developed from the bottom to support business and operational functions through the company (Lawson et al., 2011).

Mobile workforce would play a central role in providing the vision of a real-time WSSC where working activities are visible and managed in real-time, delivering important solution in the way of upgraded customer service and process effectiveness. This plan ties in nicely with WSSC company strategy for the next few years and it should be delivered within the budget and timeframe (Lawson et al., 2011).
One of the most valuable advantages for WSSC from implementation of mobile workforce is motivation of company’s employees by providing them more flexibility, allowing each person to decide when and where to work (Raguseo, Paolucci ; Neirotti, 2015).

Another great advantage for company is reducing transfer costs (Kahle-Piasecki, Miao ; Ariss 2012). Thus, company provide maintenance services to customers can provide their employees with tablets or smartphones with installed software that will inform employee with the instructions and customer address and any additional information, which is could be required during the working day (Raguseo, Paolucci ; Neirotti, 2015). In this case each employee doesn’t need to visit WSSC office after each job finished, so number of visits is reducing to only one or maximum two visits per day (Bhatia, 2016).

Choosing mobile workforce could also significantly reduce WSSC real estate expenses due to the fact that mobile workers are often outside of company’s main site working at customer location, and if they receive all the instructions through mobile workforce, there is no need for their presence at company site and WSSC can reduce office rent due to optionality having offices for mobile workers (Kahle-Piasecki, Miao ; Ariss, 2012).Despite the fact that that introducing mobile workforce brings a lot of advantages to a company, there are some disadvantages which could arise as a result of its implementation. Such factors as low internet speed, small display size of smartphone, difference between mobile and desktop web applications can reduce efficiency of using mobile application (Kahle-Piasecki, Miao ; Ariss, 2012). Another problem is using WSSC internet for private purposes by employee and as a result reducing internet traffic speed (Raguseo, Paolucci ; Neirotti, 2015). Hacking the wireless connection can compromise the whole company network that can be a serious concern for the WSSC. Stolen corporate mobile phone or laptop can also become a significant vulnerability for security system (Bhatia, 2016).

In addition, WSSC IT Strategic Plan includes road maps for business needs and IT solutions for them and for IT initiatives with strategic priorities. The map provides information about key steps like Foundation to “real-time” utility for Mobile Workforce and Geographical Information Systems (Lawson et al., 2011).

One more advantage that has WSSC IT Strategic Plan is that after implementation of mobile app employees will have online access for information all time in any location, in that case it will increase their productivity (Weng ; Lin, 2015).

Nevertheless there are some threats that mobile computing provide. One of them it is the security of the customers personal and payments data (Weng ; Lin, 2015). The IT plan provides procedures for disasters recovery and cyber-attack only. It is not caver authorized systems of mobile app for customers, staff and shareholders. Secure access to IT infrastructure has to stop information leaked with unauthorized entrée into business system (Lakhdissi, El Habi, Semma, ; Bounabat, 2013). The availability that customer information is not secure could influence on consumers trust to the WSSC at all.

Moreover, WSSC created five years IT Strategic Plan, with comments that it should be reviewed to verify that, technologies are still modern and add new business needs from time to time. There is not time frame for this procedure in this plan. For IT industries, particularly for mobile computing, it is necessary to follow new trends and technologies that provides competitor advantages and customers satisfaction for organization (Chen ; Kamara, 2008).

6 Examples of mobile computing in New Zealand Company6.1 Characteristics of Auckland Transport mobile applicationAT mobile is a mobile application developed by Auckland transportation. It can help find, plan and track the routes of the public transportation network in Auckland more quickly and conveniently.

The mobile computing application is in the map matching of AT Mobile. When implementing GPS signal and GIS integration, the problem we have to consider is the accuracy of GPS signal positioning points or trajectories. When the moving target is displayed on the electronic map, the influence of the electronic map itself, the GPS system error, the GPS receiver, etc., When the mobile target is displayed on the electronic map, it is not guaranteed to be on the road (Luo, 2010).

For example, when a car is driving on a bridge, due to the error described above, the GPS positioning point may not be on the bridge but in the river. Such positioning indicates that the failure will not work. In addition, when the electronic map is scaled to a larger or smaller scale, the positional offset will also occur. Therefore, in the positioning query function room of the mobile GIS system, it is necessary to match the map, that is, it is necessary Artificially correct the position of the moving target (Luo, 2010).

First collect data on how people in Auckland use the roads, roads and public transport of our city. Use all possibilities and certainty to provide all known and reliable data from a variety of sources and in a variety of formats. The published data is also provided by developers and researchers, or some open data enthusiasts, for free. The Auckland transportation developer portal is a platform to showcase the various APIs and transportation data of Auckland transportation and NZTA. This service is provided to developers and companies under the terms and conditions of the Auckland transportation API (Application interface) (Luo, 2010).

The API data includes: Real-time alerts, vehicle locations and trip updates. Public transport routes, stops, agencies and trip information. Parking locations, scheduled works, customer service centers and points-of-interest  (Luo, 2010).

Open GIS data site provides access to, download and use of Auckland-related data sets with the ultimate goal of encouraging local communities to develop innovative ideas, services, applications and business ideas. Google Transport Feed public transportation information is available in a series of data sets. Menstrual Cycle Monitoring. Use automatic bicycle monitoring equipment to monitor and report the number of bicycle trips in 13 city centres and 14 regional centres in Auckland. The number of daily trips is compiled monthly. The data has a .csv format. Learn how to collect data and download monthly (Luo, 2010).

6.2 Characteristics of Kiwi Bank mobile computingKiwi Bank is similar in many respects to an earlier post office-based bank owned by the New Zealand government. As more and more people use smartphones and tablets, almost every bank has its own app, and almost everyone can use the Internet. Two methods of establishing such a mobile banking are Wireless Application Protocol (WAP) and standalone mobile applications. WAP is equivalent to accessing Internet pages on mobile devices. (Johnson ; Maltz, 1996) These are the page settings for the personal computer, but mobile devices can access them as if they were accessing the computer based on the concepts of browser, server, Uniform Resource Locator (URL) and gateway. One advantage of this approach is that users can use the web pages they are familiar with using the computer and don’t need to download anything, such as an app. One major drawback is that mobile devices lack the same level of anti-virus software and personal firewalls. (Johnson & Maltz, 1996) A standalone mobile app. This requires users to download applications that are user-friendly and allow banks to customize and brand to their liking. (Johnson & Maltz, 1996) This approach is widely regarded as the future of mobile banking. Users need to be authenticated when they log in. Mobile computing technology is needed, the technology associated with generating a user’s specific profile can be scanned using mobile computing techniques. It can also be used to authorize encrypted messages, application-specific encryption keys, or to access and store data. Mobile computing technology can identify the user’s information, including account transaction information, user name and password, and so on.
6.3 Influence of mobile technology on New Zealand organization The AT mobile software, people can quickly, preferentially and efficiently select the right public transport. Make transportation more convenient and convenient. Formed a formal, stable public transportation network, becoming more orderly and safer. More efficient reduction or avoidance of individual traffic congestion (Transport, 2018). It is possible to record any place and route that has been visited in real time, effectively and conveniently. Clearer and clearer search for historical traffic records. For the government, the realization of the excellent public transport planned by Auckland has achieved the results of excellent and efficient public transport. A sustainable financing model is ensured to ensure that assets are maintained and updated, service levels are gradually improved and additional capacity of the transportation system is increased to meet future growth needs and needs. Develop creative, adaptive, innovative, fast and efficient transportation services for Auckland Transportation’s projects and new projects (Transport, 2018). Establishing networking and resilience for travel time, enabling existing services and assets to be better valued, and having good regulatory and resilience to future shocks, such as changes in oil prices, travel patterns and changes in demand, And natural disasters such as floods, tsunamis, earthquakes, etc. It also enhances customer attention and good experience by providing users with roads, public transportation, bicycles, walking services and various transportation services. It has improved the public transport system in Auckland, improved the way people travel, and provided a good traffic environment to meet the people. Achieving the outcomes and priorities of the Auckland Plan is linked with meeting key targets for increasing public and active transport mode share, reduced greenhouse gas emissions, improved accessibility, lower congestion for public transport, delivery of services and freight, travel time savings and the delivery of transport infrastructure priorities over the next three decades Transport, 2018). 
The Kiwi Bank software, helps protect accounts and organizations safely and effectively. This is an approach based on three pillars: protection – protecting customers with multi-level security. And it can monitor customers’ Banks 24 hours a day in case of potential threats. Ensuring customer security, using some of the best security and technology to protect information security. Online codes and unique pins make it easier for customers to register software that will receive an Online Code when new devices are added. This adds an additional layer of protection. Then, select an KIWI BANK PIN at the first registration and log in each time you use the app. It has reduced many factors of insecurity and reduced the generation of fraud and other behaviors of obtaining personal information, strengthened the protection of customers’ bank information and improved the information security of the organization, improved the reliable connection between customers and the organization better and more effectively, and enabled customers to have profound credibility to the organization.

To sum up, AT mobile and Kiwi bank app are products that conform to The Times, have certain influence and benefit on the development of today’s society, and play a huge role in promoting the development and progress of enterprises and companies. Along with the advance of science and technology, mobile computing application in various fields, for the people, improving the efficiency of the application software, at the same time also brought a fast and convenient, for organization, in the creation of high yield, more established a good operational mechanism, make enterprise keep good contact with the customer. For the government, it has improved its governance capability.

7. The CIO role in mobile computing

The chief information officer?CIO? is the chief information officer or information director and is a senior official in charge of all aspects of a company’s information technology and systems. They support the company’s goals by guiding the use of information technology (Boomer, 2012). They have both technical and business process knowledge and a versatile concept, often the best person to combine the organization’s technology deployment strategy with business strategy. CIO originally refers to the chief information officer in the government management department. As the information system develops from the auxiliary tools of the rear office to the powerful means of directly participating in the enterprise, the CIO emerges as the enterprise and emerges as a pivotal figure (Boomer, 2012).

With the continuous progress and development of the company or organization, CIOs gradually enhance and improve their functions, and further study and participate in the business and work of the organization. In mobile computing, the CIO, improves the responsiveness of the tasks in the enterprise, and according to changing customer needs and make the appropriate changes, reduce the risk, to maximize the use of IT resources through the application of the method, evaluation and change without affecting the at the same time, the appropriate modern reduces the application cost, increase the value of the application software, at the same time reduce the unnecessary infrastructure and operating costs. It further improves users’ trust, preference and personalized interaction to the enterprise. It provides these services on multiple devices and identifiable user locations and devices, understands specific scenarios, including their past interactions, high responsiveness and true scalability, and supports unpredictable growth patterns (Boomer, 2012). CIO services and oversight are at the beginning of the enterprise lifecycle and integrate security into each process and service. More importantly, use the multi-source security intelligence provided in specific scenarios to detect threats and prevent and defend against them. Protects key business services such as e-commerce, application chains, or messaging systems from day-to-day operations (Boomer, 2012).

7.1 Ethical challengesMobile devices are being the part of the information technology spreading in the world widely (Kenneth McBride, 2014). Some mobile devices have been accepted by users but sometimes the corporate world is not happy with the devices. Plus some conflicts occur when a mobile device works for corporate and individuals need simultaneously (Tarasewich, Gong, Nah, Dewester,2008). (Weng, 2015) says this technology is not for all organizations except unguarded ones.

Privacy:- Adopting mobile computing is always a risk for organizations because the privacy and security of the data of the company have been compromised. Users are sharing more information than before. the possibility of integration has increased because of the wide use of mobile applications (Kenneth McBride, 2014). Maintaining privacy has become difficult since anyone can access the data from anywhere. Hence the privacy is a big concern for organizations so new techniques should be used to solve the privacy issues while adopting mobile computing. Some organization’s mobile applications save their client’s personal data such as location, contacts, card details etc. Thus, they should address privacy issues (Wong, 2010).

Accuracy:-The data which is being shared on mobile applications and on the web are not guaranteeing accuracy (Kenneth McBride, 2014). There are many unverified authors writing this information although many people agree with the data but they all might be wrong or misunderstood. Accuracy is also an important aspect of mobile computing and organizational data (Kenneth McBride, 2014).

Property:- According to (Kenneth McBride, 2014) owning the information as intellectual property is not yet agreed but some organization may share information for free. Hence companies are more concern about there data but because of mobile computing and web technologies, it has been shared online and given access to all people at no cost.

Access:-When the information is being shared online, the accessibility is hard to manage because enormous no. of people is accessing data. Sometimes organizations share too much data over the internet. Too much data sharing is also as harmful as too less data (Kenneth McBride, 2014).
7.2 Corporate governanceThe set of the policies, regulations and rules on the basis of which management implements directorate and control of an enterprise for lining up with objectives constitutes corporate governance (Lize-Marie & Rudman, 2016). As a part of corporate governance, IT governance is responsible for verifying that IT investments are controlled by secure mechanisms (Lize-Marie & Rudman, 2016).

One of the serious vulnerability for corporate governance could migrate from the governance of mobile technology. Therefore, it is important to include security of mobile devices to corporate governance to make sure that the whole process complies with company’s governance strategic policy (Lize-Marie ; Rudman, 2016).

Organization should formulate and apply proper mobile strategy with the corresponding policies in the framework of governance to ascertain that the strategy is sufficiently understood (Lize-Marie ; Rudman, 2016).

7.3 Security policyA company ought to develop a written policy shaping the right use of communication systems, inform staff of the timeframe to observe them, inform staff concerning the corporate system that not invariably ensures privacy, and think about the potential prices i.e. low morale, potential law suits, etc. of excessive observation. Nykodym ; Ariss (2006)  planned many ways in which to fight the crime, and indicated the management of crime has to be attacked from 3 levels: (1) management has to be control in charge of handling issues together with hiring screenings, firing practices and web use contracts, (2) education and learning on the prevalence of crime for corporations and their managers, and (3) the problem ought to be prohibited on a really grand scale. this implies as an example, fitting workplace to develop international standards and punishments for cybercriminals, standardization for web security, and investigation into criminal activity on the net. Another major drawback of multiple policies is  consistency. it is important you have a single policy form which other sub-policies can be developed by making this possible thus ensuring consistency in governance of all technology elements (Cisco IBSG, 2012; Sybase, 2011).

 Attributes of productive executable mobile strategies and required policies are simple and easy to implementation, flexibility in order to adapt to changes in stakeholder requirements and reliability under abnormal circumstances. According to ISACA (2010) there are certain considerations that enterprises need to take in to account when developing a mobile polices (Oracle, 2014; Gartner, 2012a; Ernst ;Young, 2012; Wright et al., 2011; ISACA, 2010).

Specifying necessities resembling outsourcing or the in-house development and maintenance of mobile technology; practicability analyses per enterprise division; deciding the resources necessary to migrate existing systems onto mobile systems; and allocating specific responsibilities and decision-making authorities.

Constantly observance and change policies through performance measures for each outsourced and in-house services, collection and reviewing external service level agreements and evaluating internal IT workers performance regularly; the continual observance of recent and rising threats in mobile platforms; maintaining and change existing ways or developing new ways to adapt to new mobile technology.

Distinguishing all technology parts in use by taking the total device life cycle into account; shaping approved devices and applications and crucial the configuration specifications; distinguishing and classifying each authorized or unauthorized uses of mobile technology; and specifying the storage and transmission procedures for enterprise data.

Developing mobile policies sought to embrace spare training: certain specific coding needs to trained under certain platform like application developers using certain coding. similarly IT employees needs regular courses to be refreshed on new packages and checking for security risk .regular updates of package and awareness of the suitable channels for news issues and requesting IT support (Ernst ; Young, 2012; GAO, 2012; Wright et al., 2011).

ConclusionMobile computing has become an important aspect of business (Lakhdissi, M., El Habi, R., Semma, A., ; Bounabat, B. (2013) no matter which business it is that means entertainment, enterprise, education or commercial (Weng, 2015). Banks are also influenced by mobile computing such as Kiwi banks, ANZ bank which helps to reduce the work load of the organization employees as well as end users. Mobile computing is used for education by students to reference the books, sharing information, connecting with the people and getting access anytime, anywhere (Robinson ; Burk, 2013). Although in the survey held in USA AAMC schools no student reported there is need of tablets and mobile computing in their studies but the addition of the mobile devices helped them a lot in improving their scores. Mobile computing’s first challenge is the security and privacy of the information where it offers accessibility of the information to anyone. Organizations should take care about all the possible risk of the mobile computing before creating a strategic IT plan as such for information security the first step for organization should take by stopping access of unauthorized users. (Lakhdissi, El Habi, R., Semma, A., & Bounabat, B. 2013). Second is apply security policies for information security. These are all the responsibilities of corporate governance of the organization. The challenges which are could be faced by organization in mobile computing is pace of the evolution of the technology where companies are confused which technology to adopt.

ReferencesBaddeley, R. (2014). Mobile computing : isn’t there an app for that?. In Practice, 36(1), 43-45. doi: 10.1136/inp.f4675
Bhatia, P. (2016). Racing ahead with technology: Digital HR through smartphones.IUP Journal of Information Technology, 12(4), 36-47. Retrieved from http://ezproxy.eit.ac.nz/login?url=https://search-proquest-com.ezproxy.eit.ac.nz/docview/1895701419?accountid=39646
Chan, Y. E., ; Reich, B. H. (2007). IT alignment: What have we learned? Journal of Information Technology, 22(4), 297-315. doi:http://dx.doi.org.ezproxy.eit.ac.nz/10.1057/palgrave.jit.2000109
Chen, Y., ; Kamara, J. M. (2008). Using mobile computing for construction site information management. Engineering, Construction and Architectural Management, 15(1), 7-20. doi:http://dx.doi.org.ezproxy.eit.ac.nz/10.1108/09699980810842034
Chen, Y. (2011). A Conceptual Framework for a BIM-Based Collaboration Platform Supported by Mobile Computing. Applied Mechanics And Materials, 94-96, 2144-2148. doi: 10.4028/www.scientific.net/amm.94-96.2144

Hong, E. K. (2009). Information technology strategic planning. IT Professional Magazine, 11(6), 8-15. doi:http://dx.doi.org.ezproxy.eit.ac.nz/10.1109/MITP.2009.126
Jim Boomer. (2012). The Changing Role of the IT Professional. CPA Practice Advisor, Vol.22(7), p.55

Johnson, D., ; Maltz, D. (1996). Truly seamless wireless and mobile host networking. Protocols for adaptive wireless and mobile networking. IEEE Personal Communications, 3(1), 34-42. doi: 10.1109/98.486974

Kang, S., ; Lee, K. (2013). Emerging materials and devices in spintronic integrated circuits for energy-smart mobile computing and connectivity. Acta Materialia, 61(3), 952-973. doi: 10.1016/j.actamat.2012.10.036

Lakhdissi, M., El Habi, R., Semma, A., ; Bounabat, B. (2013). Adapting IS strategic planning methodology to define mobile strategy. International Journal of Computer Science Issues (IJCSI), 10(5), 64-70. Retrieved from HYPERLINK “http://ezproxy.eit.ac.nz/login?url=https://search-proquest-com.ezproxy.eit.ac.nz/docview/1477204746?accountid=39646” http://ezproxy.eit.ac.nz/login?url=https://search-proquest-com.ezproxy.eit.ac.nz/docview/1477204746?accountid=39646

La Porta, T. (2002). Introduction to the IEEE Transactions on Mobile Computing. IEEE Transactions On Mobile Computing, 99(1), 2-9. doi: 10.1109/tmc.2002.1011055

Lize-Marie Sahd, ; Rudman, R. (2016). Mobile technology risk management. Journal of Applied Business Research, 32(4), 1079-1096. doi:http://dx.doi.org.ezproxy.eit.ac.nz/10.19030/jabr.v32i4.9723
Luo WenHong. (2010). Research on key technology of mobile computing based on GIS J. Today KeYuan. (02)
Kahle-Piasecki, L., Miao, C., ; Ariss, S. (2012). Managers and the mobile device: M-learning and M-business-implications for the united states and china. Journal of Marketing Development and Competitiveness, 6(1), 56-68. Retrieved from http://ezproxy.eit.ac.nz/login?url=https://search-proquest-com.ezproxy.eit.ac.nz/docview/1019047686?accountid=39646
Kenneth McBride, N. (2014). ACTIVE ethics: an information systems ethics for the internet age. Journal Of Information, Communication And Ethics In Society, 12(1), 21-44. doi: 10.1108/jices-06-2013-0017

Prentice, J., ; Dobson, K. (2018). A review of the risks and benefits associated with mobile phone applications for psychological interventions.

Raguseo, E., Paolucci, E., ; Neirotti, P. (2015). Exploring the tensions behind the adoption of mobile work practices in SMEs. Business Process Management Journal, 21(5), 1162-1185. doi:http://dx.doi.org.ezproxy.eit.ac.nz/10.1108/BPMJ-12-2013-0155
Robinson, R., ; Burk, M. (2013). Tablet Computer Use by Medical Students in the United States. Journal Of Medical Systems, 37(4). doi: 10.1007/s10916-013-9959-y

Tarasewich, P., Gong, J., Nah, F. F. H., ; Dewester, D. (2008). Mobile interaction design: Integrating individual and organizational perspectives. Information Knowledge Systems Management, 7(1, 2), 121-144.

Transport, A. (2018). Technology strategy. Retrieved from https://at.govt.nz/about-us/transport-plans-strategies/technology-strategy/Transport, A. (2018). Mobile services. Retrieved from https://at.govt.nz/bus-train-ferry/more-services/mobile-servicesWeng, W., ; Lin, W. (2015). A MOBILE COMPUTING TECHNOLOGY FORESIGHT STUDY WITH SCENARIO PLANNING APPROACH. International Journal of Electronic Commerce Studies, 6(2), 223-231. Retrieved from http://ezproxy.eit.ac.nz/login?url=https://search-proquest-com.ezproxy.eit.ac.nz/docview/1717485637?accountid=39646
Wong, K. (2010). Cell Phones as Mobile Computing Devices. IT Professional, 12(3), 40-45. doi: 10.1109/mitp.2010.46

IS DR

IS DR. JOSE P. RIZAL A MARTYR OR TRAITOR?
The youth is the hope of our country, this is one of the famous line of Dr. Jose P. Rizal. We all know that Dr. Jose P. Rizal was been declared as a national hero because of his loved in our country and love for his nationality. We Filipinos considered him as one of the greatest hero because he serves as a key and inspiration for awaken for the Filipinos from the violence or cruelty of the Spaniards and he wrote some books that described the life of Filipinos under Spaniards as well as the innocent of the Filipino during that time. But I consider Dr. Jose P. Rizal as traitor of revolution.
Reading through the Constantino’s “Veneration without Understanding” really change my discernment about Jose Rizal. But when I was in my lower years and haven’t read that thesis, I give the impression of being “a strong man that has a strong fighting spirit for his own motherland.” It is much more analysis behind the life of Rizal and his being a hero, the factors that made him condemn the idea of the revolution and the facts that we do not usually see and read around history books. My beliefs were unexpectedly changed. My point of view about Dr. Jose P. Rizal suddenly changed after reading that thesis because I knew that Rizal fight for liberty only, not the freedom that inhabitant sought for. Dr. Jose P. Rizal is weak, to the point that he didn’t join the Revolution. Yes, we know that because of his novels, El Filibusterismo and Noli Me Tangere, the minds of people were set off. But I think Rizal’s idea is more of dream, “a dream without an action is useless” –Ryan Namia. Rizal’s two novels, in reality, arouse the Revolution and peoples mind. But how come Rizal didn’t join?

Drug abuse has been a major social issue in Ghana

Drug abuse has been a major social issue in Ghana. Various initiatives have been taken to curb this social problem by governments, non-governmental organizations, individuals and many others.one may ask what drug abuse is. The simplest definition is the use of drugs without a qualified doctor’s prescription .It can also be defined as the patterned use of a drug in which the user consumes the substance in amount or with methods which are harmful to themselves.
Obviously, one of the ill plaguing Ghana today is the misuse of drugs specifically “Tramadol” and other forms of substances which are either poorly regulated or banned for use in the country. Like a strike of light to petrol or a smoker puffing cigarette smoke in the sky, illegal use and abuse of drugs has engulfed our society so much that most of these young men and women are suffocating to death under its intense canker.
It is in the light of this unfortunate situation that I’ll carefully examine the menace, causes, and effects of using the un-prescribed drugs and suggest ways to ameliorate it.
First and foremost, any substance (with the exception of food and water) which, when taken into the body, alters the body’s function either physically and/or psychologically is referred to as drug. (Wikipedia 2018). Drugs may be legal (e.g. alcohol, caffeine and tobacco) or illegal (e.g. cannabis, ecstasy, cocaine and heroin).
CAUSES OF DRUG ABUSE
Everybody knows bad things can happen to drug users. They become addicted. They can have serious or even fatal health problems. They can ruin their personal, social and professional lives. They may even end up in jail. But why do young people start taking drugs in the first place? What are the causes of drug use among young people?
The first cause is simple curiosity. Many teens have heard about drugs, and they are curious to experience them for themselves. They have heard that drugs can be fun, or make a person feel and act different. Maybe they have seen their friends or family members behave differently while on drugs, and they want to see how it really feels. We see drugs on TV and movies every day. Many young people encounter them at school, at home or in their neighborhood. It is not unusual to be curious about something you see and hear about so often, so many people first try drugs because they are curious about them.
Another reason young people take drugs is to escape their reality. Maybe their home life is not very happy. Maybe they have a boring job, are not doing well in school, or are just not happy with their life for whatever reason. For many people, drugs are a way to escape that unhappy reality. They can feel a little braver, stronger, a little smarter, more beautiful or more important. Of course this doesn’t last long, but that doesn’t matter. For the brief time that the drugs are taking affect, the user can forget about the problems, responsibilities and limitations of everyday life and escape to a fantasy world. It is no secret that drugs change the way you feel; this is why they are so attractive to young people despite their dangers.
Young people also take drugs to feel cool and impress their friends. If your friends all smoke marijuana, you will probably be expected to smoke it, too. If they snort cocaine, they will offer it to you. They may tell you that you are scared or acting like a baby if you don’t want to try it. This push to do what your friends are doing is called peer pressure, and it has a very strong effect on young people who don’t want to appear uncool to their friends. Some kids will do whatever their friends do, just to fit in and follow the crowd. They don’t want to be the only one not doing something, even if it is something dangerous, like taking drugs.
Unfortunately, many young people become involved in drugs before they are fully aware of the health risks and the power of addiction. They need to understand the ways young people first become involved with drugs so they can beware of them. Many curious teens have died the first time they tried certain drugs, like ecstasy. Others have found their temporary escape became a permanent addiction. Was it worth it?
Another cause of drug abuse is the lack of self esteem .Most young people are led to abuse drugs due to low self esteem. Low self esteem is characterized by the lack of confidence and feeling badly about oneself .People therefore tend to abuse drugs which in their mindset will make them ”high” .This in their perspective makes them do things which their low self esteem would have prevented them from doing.
Majority of people in Ghana who abuse drugs do so to help release stress. According to a research conducted recently by the Ministry of Health in Ghana, 41% of young people reported that their incapability to manage their stressful routine is their incapability to manage their stressful routine is their major reason for abusing drugs. A perfect example is the recent abuse of tramadol in Ghana by young people who claim that the drug(tramadol) helps them to be stress free.

EFFECTS OF DRUG ABUSE

. Most environmental pollutants are produced by human production and living activities. Some substances are originally useful substances in production, and even essential nutrients for humans and living things. They are discharged in large quantities due to underutilization, which not only causes waste of resources, but also may become environmental pollutants.
With the rapid development of human economic activities and production, while consuming large amounts of energy, it also discharges a large amount of exhaust gas and soot into the atmosphere, seriously affecting the quality of the atmospheric environment, especially in densely populated cities and Industrial area. The so-called dry clean air refers to the air in the natural state (composed of mixed gas, water gas and impurities) to remove water vapor and impurities, the main component is nitrogen , accounting for 78.09%; oxygen , accounting for 20.94%; Rare gases account for 0.93%; other kinds of trace gases (such as helium, neon, carbon dioxide, helium, etc.) with less than 0.1%

The following substances are the different primary types of pollutants:
1. Sulfur dioxide (SO2): emitted by certain industrial processes (especially in the paper industry or refining) and especially by the use of fossil sulfur fuels. It is one of the main contributors of acidic deposition due to its transformation in the atmosphere into sulfuric acid (H2 SO4);
2. Nitrogen oxides (NOx), in particular nitrogen dioxide (NO2), the emission of which mainly results from the combustion of fossil fuels, in particular by vehicles, which have the effect of contributing to the formation of ozone in the atmosphere;
3. Polycyclic Aromatic Hydrocarbons (PAHs), emitted by the incomplete combustion of fuel oils or coals and which are generally in the air, bound to particles. Some of them are recognized as very carcinogenic;
4. Volatile organic compounds (VOCs), which include hydrocarbons (including benzene, toluene and xylenes). They are issued by many sources, including various industrial processes and vehicles. Methane, a greenhouse gas that is rapidly increasing in concentration in the atmosphere, is a volatile organic compound.

Secondary pollutants . Secondary pollutants refer to new atmospheric pollutants formed by chemical interaction or photochemical reaction of primary pollutants in the atmosphere, which are completely different from the physical and chemical properties of primary pollutants. Their toxicity is stronger than primary pollutants. The most common secondary pollutants such as sulfuric acid and sulfate aerosols, nitric acid and nitrate aerosols, ozone , photochemical oxidants OX, and many active intermediates (also known as free radicals) of different lifetimes, such as HO2, HO, etc
SOLID POLLUTANTS:
Fine particles. From a health point of view, these particles deserve special attention. Indeed, they may serve as vectors for other substances, such as carcinogenic polycyclic aromatic hydrocarbons (PAHs), which is particularly worrying given the capacity of the finest particles (less than 1um) to develop in the pulmonary alveoli, or even to enter the blood.
Effective solutions to combat this particulate pollution are now well known: the synthesis of the main standards and recommendations identified to date in the tertiary sector is clearly pointing towards filtration levels well above the requirements of the work code.

MacBeth’s Push Over The Edge In the book Macbeth you see the main character

MacBeth’s Push Over The Edge

In the book Macbeth you see the main character, Macbeth really showing how much he wanted and really just how overly ambitious he is. There is many reasons why he did what he did but the main driving factors were the prophecies, Lady Macbeth and his overall greed. This inevitably led to hid death and his image as an absolutely terrible king and a brutal tyrant.

One of the most important things that drove Macbeth to lie cheat and murder was the prophecies. This is so important because of the way that they made him think that he’s invincible and that everything that he is doing would lead to his inevitable success. One place where you see the prophecies having a major effect on macbeth is when he decided to kill Duncan despite his morals telling him that doing it was wrong and that really he should just be happy with the things that he does have. “Stay, you imperfect speakers, tell me more: By Sinel’s death I know I am thane of Glamis; But how of Cawdor? the thane of Cawdor lives, A prosperous gentleman; and to be king”(1,3,72) This shows that despite this far fetched crazy prediction that in Macbeth’s eyes at this moment could never be true is still hooking him in and really forcing the idea through his mind that he is destined for much more than what he has. This shows how he could start to think about doing bad things to get ahead and achieving what he really wants and also does a good job of fueling his ambition. Another place where the prophecies have a major effect on macbeth is when they originally tell him that him that he can not be killed by someone born of women and that he would lose until a forest marched to his gates. “Who can impress the forest, bid the tree Unfix his earthbound root? Sweet bodements! Good! Rebellious dead, rise never till the wood Of Birnam rise, and our high-placed Macbeth Shall live the lease of nature, pay his breath To time and mortal custom.” (4,1,98) This is one of the things that really motivates MacBeth to continue doing the terrible things that he does because of how it really convinces him that there are no repercussions to anything that he does and that he is so powerful that he can have anything he could ever want regardless of what he had to do to get it.

Another major thing that really started Macbeth’s tyranny and spree of horrible choices was Lady Macbeth. She is so important to MacBeth’s actions because of the way that she was the person who originally convinced him that it was a good idea to kill Duncan and that doing this terrible thing would really have a strong positive effect on them. “We fail? But screw your courage to the sticking-place, And we’ll not fail. When Duncan is asleep— Whereto the rather shall his day’s hard journey Soundly invite him—his two chamberlains Will I with wine and wassail so convince That memory, the warder of the brain, Shall be a fume, and the receipt of reason A limbeck only: when in swinish sleep Their drenchèd natures lie as in a death, What cannot you and I perform upon The unguarded Duncan?” (1,7,59) This shows that before this point Macbeth had always thought about the way that their actions could have major consequences and that a lot of the time doing something bad, even if it might help you is still bad in the long run. Despite these thoughts she still convinces him to go through with it which he definitely wouldn’t have otherwise done. Another huge place where Lady MacBeth really has a strong effect on MacBeth is the way that at the start of the play she is far more ambitious and willing to do bad then MacBeth is but though her manipulation and threats about his manhood and strengths he really about half way through the play seems to take on the ambition from her and adopt it himself. I say that because you see the development of his character throughout the play where by the end he would decide to do things that the original first MacBeth that we meet who is scared to take action and doesn’t want to cause problems would never do. He would never have changed this much and done the things that he did if he didn’t have the constant pressure of his wife to not only do the things that he did but be the way that she wanted him to be. “What beast was ‘t, then, That made you break this enterprise to me? When you durst do it, then you were a man; And to be more than what you were, you would Be so much more the man.” (1,7,47) This is one of the places where you can see Lady MacBeth manipulating him and the start of his own ambition and tyranny.

Lastly you see the greed that is deep rooted in MacBeth’s character having its own place in making him Murder lie and cheat.

Abstract

Abstract:
Objectives: Osteoarthritis (OA) is a joint failure and OA is the most frequent chronic joint disease causing pain and disability. Where all the structures of joints have undergone pathological changes and they are hyaline articular cartilage loss which may be focal or non-uniform, initially it will be focal then spread all over non-uniformly. Non-Steroidal Anti Inflammatory Drugs are the mainstay of medical management of OA. Increased in reports suggests that GIT adverse effect with old NSAID’s and cardiovascular effects with selective cyclooxygenase-2 (COX-2) inhibitors had precipitated to chase for better NSAID’s with minimal adverse effects. The current study compares the clinical effectiveness and safety of newer NSAID’s, Etoricoxib, Lornoxicam, to Diclofenac which has been standard therapy in patients of OA of the knee joint.
Material ; Methods: The current study was randomized, prospective, open-label, parallel group study conducted in 120 patients with OA of the knee joint diagnosed according to American College of Rheumatology criteria. After obtaining the informed consent, they were randomized in three groups of 40 patients each who received tablet Etoricoxib 120mg BID, tablet Lornoxicam 16mg BID, tablet Diclofenac 50mg TID respectively. The duration of the study was 12 weeks. Data were calculated, tabulated and analyzed using analysis of variance (ANOVA) test, and level of significance was determined by its P value.
Results: After 12 weeks of treatment, the severity of pain and functional indices in terms of visual analog scale and Western Ontario and McMaster Universities Osteoarthritis score were significantly better (P ; 0.05) in Etoricoxib group as compared to Lornoxicam or Diclofenac group along with a lesser rate of adverse effects.
Conclusion: It was concluded that Etoricoxib was more effective and tolerated NSAID than Lornoxicam and Diclofenac in the treatment of knee joint OA.
Keywords: Etoricoxib, Lornoxicam, Diclofenac, VAS, WOMAC Score.

The NSPCC ‘Child protection in England 2018’ states that serious case reviews should be inquired either after a child has died

The NSPCC ‘Child protection in England 2018’ states that serious case reviews should be inquired either after a child has died, is urgently injured which could be the impact of serious abuse or neglect or has “died from a suspected suicide”. Additionally, inquiries and serious case reviews are required to understand the lesson that the case shows, the failure of communciation in the serious case review, the negligence of either the multiagency team or the carers of that child and how we can learn from the serious care review and use it in order to prevent it from happening in the future. Therefore, sharing the finding helps inform practise about either how communication was successful or unsuccessful (depending if it was resolved or not), whether different professionals have worked individually or in union with each other in order to ensure the safety and welfare of the child. Also it helps inform those in practise who to go to if a serious issue arises considering a child.
An example of a serious case review is the Victoria Climbe case. Victoria Climbe was born 2nd of November 1991 and lived with her parents in Abobo, Côte d’Ivoire until she left for ‘a better life’ to the UK with her auntie in 1999, at the age of 8. According, to authorities she was Victories mother. Overall Victoria suffered 128 injuries majority from being physically beaten by sharp or blunt items and after examination of Victoria Climbe’s lifeless body , her cause of death was from hypothermia which was brought from malnourishment and having to live in a damp environment with the restriction of movement. On the 25th February 2000, Victoria’s auntie was arrested on suspicion of neglect.
As hard as it is to believe Victoria was a part of a multi-agency child protection team and visited by multiple hospitals and social services team before she passed away on the 25th of February 2000. However, when she was seen more attention was brought upon her auntie “incontinence, possession and behavioural problems” rather than following up the sexual abuse that Victoria suffered from. However,

This can be said for both service users and care staff

This can be said for both service users and care staff. Therefore, although how we feel and our emotions control much of psychological well-being, it is not enough. In order to have very fulfilling lives and to feel good, we must experience purpose and meaning, alongside positive emotions. Psychologist Carol Ryff created the “Psychological Well-being Model” which details psychological wellbeing as having six significant parts:
• Self-acceptance
• Positive relations with others
• Autonomy
• Environmental mastery
• Purpose in life
• Personal growth

Practice should be reflective of these factors to promote social, emotional, cultural, spiritual and intellectual well-being. Psychological wellbeing is about providing service users with an experience which is balanced and well-rounded and the emotions to go with this. “The application of Ryff’s model, both in terms of assessment and treatment, thus suggests that optimally balanced well-being differs from person to person: there is no single right way to be well (people have differing combinations of strengths and vulnerabilities and one has to work with what is available). The cross-cultural implications of the model are thus considerable and should integrate Vaillant’s framework. Further, Ryff emphasizes that personality assets should be combined with contextual variables (work, family life, social ties and socioeconomic conditions). The central message is that personality, well-being and distress come together in different ways for different people.” https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3363381/

MNU11004 Introduction to General Nursing in the Acute Care Setting Introduction Throughout this assignment I will discuss the case study given of a patient named Mary

MNU11004 Introduction to General Nursing in the Acute Care Setting
Introduction
Throughout this assignment I will discuss the case study given of a patient named Mary. I will distinguish a care plan that is appropriate for Mary, including patient safety and relief of pain
I will discuss what I understand about her EWS and in response I will discuss the nursing interventions required.

Question 1: Care Plan and Pain
Mary has returned to the ward from an oophorectomy as she was present with a 9cm ovarian cyst in which she was under general anaesthesia. I am aware that she is currently conscious and stable.

An oophorectomy is when one or two ovaries are taken out by surgical procedure. Can be completed by either a Laparotomy or laparoscopic surgery. CITATION May17 l 6153 (Staff, 2017)Marys Care Plan:
Airway: Mary may return with a cough as she would have been extubated before returning to the ward. As Mary smokes 20 cigarettes a day her cough may last longer and may contain sputum (mucous secretion coming from the lungs). For less pain when Mary is coughing advise her to hold a pillow against her stomach to prevent as much impact from the cough on the stomach. Make sure to sit Mary in an upright position as this will allow her to cough. Mary may require pain relief due to the coughing affecting her abdomen. When Mary is asleep make sure she is at a slight tilt to prevent her from lying flat on her back as her tongue can become an obstruction to the airway path. CITATION Pau18 l 6153 (Paul K. Mohabir, 2018)Breathing: Mary should take part in breathing exercises to prevent her getting a chest infection. Ensure that Mary is coughing sputum soon after the operation. As Mary is a smoker she may suffer from dyspnoea therefore she may get breathless quicker. Exercises can include; sitting up straight either in her bed or chair, make sure Mary eases her shoulders and to not be tense. Mary should slowly take in a deep breath and hold for 3 seconds. Tell her to slowly release after this time. Mary should repeat the same breath 3 more times and then return to regular breathing pattern. If Mary has shortness of breath and her oxygen saturations are below 95 allow her to use the oxygen mask which can be controlled by an air flowmeter depending on how breathless she is. The nurse can then turn it off when Mary is back to normal. Make sure to recheck oxygen saturations. CITATION Nor16 l 6153 (Trust, 2016)Circulation: Mary should be advised to mobilize soon after surgery as this can also prevent a chest infection occurring. Mobilization will also help with recovery because lack of mobilizing Mary may become stiffer.Physiotherapy will help Mary with the following; walking to begin with, for ankles bend the foot down and bring back up, can be done ten times each ankle. Legs, bring one knee up and push the other against the bed tightening the upper thigh, repeat with opposite leg. Another includes raising one leg up straight in front of you repeat with other leg. Mary can relieve pressure from the buttocks by squeezing them in. Abdominal, lay back and breath in deep and hold. Knee rolling will also help her abdomen strengthen. All these exercises will also help with the prevention of any clots forming especially in the legs as they are now being moved and blood is flowing freely. Air compression leg wraps can also be used if Mary is not willing to mobilize with exercises. The movements will also help with the prevention of any pressure sores as blood flow can get to these areas now. CITATION Chu18 l 6153 (Team, 2018)Pain:
Pain Assessment – Asses Mary for any pain that she might have it may be noticed by physiological factors, immobility or behavioural factors may appear anxious or just an overall change in behaviour. Make sure to assess the area that the incision happened as this area could get infected causing Mary pain. Signs may include swelling to the area, colour getting more red, uncontrolled bleeding or even discharge from the wound. Marys age may also have a contribution to the pain as normally patients who are older will just think they have pain due to getting older and will not associate it with the pain they have from a surgery in Marys case. A pain questionnaire such as the McGill questionnaire can be used to asses Marys pain. Make sure to check the intensity of the pain and whether the pain influences Marys ability to carry out any of her ADL’s (activities of daily living). Use patient language not medical. CITATION DrA18 l 6153 (Paderla, 1997-2018)Pain Management – Pain medication may be given to Mary to relive her from any pain. Start by giving paracetamol and check back with her if any pain has been relieved. If Mary is still in pain a stronger pain relief may need to be given. A PCA (patient-controlled analgesia) can be used as it has a ‘lockout’ affect, only giving the patient a certain amount at a time. Assessment should be made in case Mary has any side effects to the medication. When coughing after returning from surgery give Mary an extra pillow to hold against her stomach to prevent too much expansion of the abdomen. This can also be done by using a towel if no pillows available or if Mary has a preference. CITATION DrA18 l 6153 (Paderla, 1997-2018)Patient Education – Ensure Mary knows the possible reason for her pain. Notify her that there could be a possibility of an infection to site of her incision and allow her to know that her doctor can be called to look at it. If Mary takes any medication to relieve her pain always notify her of what pain relief she is taking and if she would like to know how many she can have a day if necessary.

Reporting/Recording – Record any pain that Mary is having and report to her doctor that you would like them to come down and review Mary as there could be a chance of infection to the site of the wound.

Question 2: Marys Early Warning Score (EWS): Vital Signs Showing the Past 2 hours
What I observe from Mary’s EWS is that;
Mary began scoring 0 on her EWS and within two hours she now scores 11.

Respiratory rates: Normal range for an adult respiratory rate is between 12-20 breaths. A breath in and out is counted as one. Mary began scoring 14 therefore in normal range until most recent where she scored 25, five above normal range. Total of 3 on the EWS.

Oxygen Saturation: Normal range is 96 and above. Mary first scored 96 and then most recently scored 90. Scoring a 3 on the total EWS.

Blood pressure (bp): Normal range is between 120/80 (highest) 90/60 (lowest). Mary first had a bp of 140/80 and most recently was 80/50, also immediately scoring a total of 3.

Heart Rate: Normal heart rate is 60 to 100 bpm for an adult. Below 60 is bradycardia and above 100 is tachycardia. Mary first scored 80 and then went up to as high as 120 meaning tachycardia.

AVPU: Mary is alert and knows what is happening and able to communicate.

Temperature: Normal range 36.5-37.3?C. Mary has stayed within the range but has just dropped but still staying within normal range. CITATION ADA18 l 6153 (A.D.A.M, 2018)Nursing Interventions Required
Goal: Is to make sure it is distinguished as to why Marys EWS score has increased greatly over the past two hours, and to come up with a solution to get her back to normal ranges on her EWS chart.

Intervention: Single score triggers should be checked half hourly or depending on the patient’s condition. Those who should be notified include; the nurse in charge and the team/on-call SHO. The procedure that should be followed will include the SHO to review Mary immediately, if no change and there are still concerns the Registrar should be contacted and consider activating ERS. CITATION HSE11 l 6153 (HSE, 2011)Rationale: This procedure should be done as Mary scored 3 in some of the observations on the EWS meaning single triggers.

Goal: To make sure that Mary is not getting sepsis as this is a clinical suspicion of infection.

Intervention: The nurse on charge should perform a sepsis screening pathway as Marys score is ?4. Within 1 hour the nurse should take three; cultures, bloods and urine output and give three; oxygen, fluids and antimicrobials. Within three hours then the nurse should review Mary and how she reacted from treatment, review the test results (blood test) and diagnose Mary if sepsis or septic shock has occurred. CITATION HSE11 l 6153 (HSE, 2011)Rationale: This procedure should be done as Mary showed tachycardia and had 25 breaths/minute.

Goal: To assess if Mary is having Hemorrhagic Shock (Hypovolemic Shock).

Intervention: A physical examination can be done. Marys blood pressure had dropped drastically. Watch her respirations. Look at the site to ensure no bleeding. CT, MRI, blood tests, X-Ray and ultrasound can also be done for more information. CITATION Apr15 l 6153 (Kahn, 2015)Rationale: This examination should be done on Mary as her blood pressure dropped drastically and her respirations scored 25. The wound may be bleeding meaning lack of oxygen to surrounding organs causing shock.

Conclusion:
It is important to follow the EWS as it can identify change in a patient’s health. It can show normal baseline and when change occurs either drastically or overtime. In relation to the care plan each patient should be given a holistic approach as it needs to suit that individual person for it to be beneficial.

References
BIBLIOGRAPHY A.D.A.M. (2018, November 13). Medline Plus. Retrieved from medlineplus.gov: https://medlineplus.gov/ency/article/002341.htm
HSE. (2011, December). Health Services Executive. Retrieved from www.rcsi.ie: http://www.rcsi.ie/files/facultyofnursingmidwifery/20160811103824_5.2%20NEWS%20Training.pdf
Kahn, A. (2015, December 17). healthline. Retrieved from www.healthline.com: https://www.healthline.com/health/hemorrhagic-shock
Paderla, D. A. (1997-2018). MeD India. Retrieved from www.medindia.net: https://www.medindia.net/surgicalprocedures/ovary_removal_oophorectomy_postoperative_preparations.htm
Paul K. Mohabir, M. (2018, April). Merck Manual Professional Version . Retrieved from www.merckmanuals.com: https://www.merckmanuals.com/professional/special-subjects/care-of-the-surgical-patient/postoperative-care
Staff, M. C. (2017, April 7th ). Mayo Clinic. Retrieved from www.mayoclinic.org: https://www.mayoclinic.org/tests-procedures/oophorectomy/about/pac-20385030
Team, C. S. (2018, March). Oxford University Hospitals NHS. Retrieved from www.ouh.nhs.uk: https://www.ouh.nhs.uk/patient-guide/leaflets/files/11733Pabdominal.pdf
Trust, N. B. (2016, May). North Bristol NHS. Retrieved from www.nbt.nhs.uk: https://www.nbt.nhs.uk/sites/default/files/attachments/Post-operative%20breathing%20exercises%20following%20abdominal%20surgery_NBT002395.pdf

Saad Daouil AP Literature Third Period 10/17/18 5

Saad Daouil
AP Literature
Third Period
10/17/18
5.1
Roderigo and Iago are waiting outside for Cassio to come out, so they can take him out. Iago gives Roderigo a sword and goes off to hide. Roderigo says, “I have no great devotion to the deed, And yet he hath given me satisfying reasons.’Tis but a man gone. Forth, my sword! He dies.”
Iago tells us that If Roderigo lives, then he’ll want to be compensated for all the jewels and gifts he was giving to Iago, that were intended for Desdemona. If Cassio lives, then his good nature will serve to remind all the other characters, just how evil Iago really is. Iago just wants them both dead.
“Now, whether he kill Cassio,
Or Cassio him, or each do kill the other,
Every way makes my gain. Live Roderigo,
He calls me to a restitution large
Of gold and jewels that I bobbed from him
As gifts to Desdemona.
It must not be. If Cassio do remain,
He hath a daily beauty in his life
That makes me ugly(5.1.13-21).”
Iago portrays Bianca as the perpetrator to this terrible situation. He does this to get the attention off of himself. He doesn’t want anyone to find out he was there. Also, he knows that Bianca was mad at Cassio earlier, so he’s trying to make it seem like she committed this horrible crime. Iago points to the fact that she looks pale and guilty. “Look you pale mistress?
Do you perceive the gastness of her eye?
Nay, if you stare, we shall hear more anon. Behold her well. I pray you, look upon her. Do you see, gentlemen? Nay, guiltiness will speak Though tongues were out of use(5.1.125-130).”

5.2
The allusion to Prometheus refers to the time when Prometheus defied the gods by stealing fire and giving it to humanity. This allusion is basically telling us that if Othello takes Desdemona’s life, then he’s taking away God’s power. He’s acting like an agent of justice.
Othello smothers her with a pillow. He uses this method, so he doesn’t have to look at her face when he’s killing her.
Desdemona says, “Nobody. I myself. Farewell. Commend me to my kind lord. O, farewell. She dies.” She says that she has killed herself. Even in her dying words, she continues to prove her loyalty and love to Othello. She demonstrates how faithful she is to Othello.
“O, the more angel she, and you the blacker devil! Thou art rash as fire to say 165 That she was false. O, she was heavenly true!” These two quotes show Emilia’s protestant values. She talks about how pure Desdemona was and how foul Othello is. “Do thy worst! This deed of thine is no more worthy heaven Than thou wast worthy her.” This quote shows Emilia’s humanistic values. She believes in justice and equality. She won’t stop until she gets justice for Desdemona.
Brabantio died due to the heartbreak of his daughter marrying Othello. Gratiano says that it’s good that he has already died because if he was still alive, he would have committed suicide. He would have damned himself if he found out that Othello killed Desdemona.
Othello wants to pay for his sins in hell. He feels that he deserves this punishment because of the murder he has just committed.”Whip me, you devils,From the possession of this heavenly sight!Blow me about in winds, roast me in sulfur,Wash me in steep-down gulfs of liquid fire!”
Othello compares himself to the base Judean. Othello is comparing himself to the base Judean who throws away a precious stone because he can’t see it’s true value. He’s telling us that he’s a fool. Desdemona was his precious pearl and he killed her because he thought she wasn’t loyal to him. He didn’t realize that she was always telling him the truth until it was too late. Othello then stabs himself. Since he has committed suicide, he automatically condemns himself to damnation. This redeems Othello as well because the audience feels sympathy for him when he kills himself.

x

Hi!
I'm Lillian

Would you like to get a custom essay? How about receiving a customized one?

Check it out