Blog

David Maldonado in his article, Hispanic Christianity within Mainline Traditions

David Maldonado in his article, Hispanic Christianity within Mainline Traditions

David Maldonado in his article, Hispanic Christianity within Mainline Traditions, highlights the seismic shift of Hispanic Americans from Catholicism to Protestantism in America. In the last 15 years, about one million Latinos have left the Roman Catholic and joined other Evangelical Protestant churches. The author tries to explain the reasons behind the major religious migration by comparing Catholicism, conservative and mainline Protestantism. Socioeconomic factors greatly influence the shift since human beings seek material and spiritual compensation from the church; thus, they shift to a low-tension community that will meet their needs accordingly and flexibly.

The author gives two possible causes for the shift. Firstly, Catholic churches are unresponsive in that they fail to meet the needs and expectations of the followers particularly the poor. Conversely, the sectarian groups fill in the vacuum by providing enthusiastic, community fellowship, culturally accessible and sensitive leadership to the worshipers. Secondly, the sectarian groups offer the platform for the Americanization of the Latinos who seek to be part of the mainstream society and break from their archaic traditions. However, the author considers the second explanation more credible than the first because Latino Protestants have decent jobs and lifestyles. Transfer of loyalties to Protestant religious groups has been an essential tool for Westernization and modernization, and the Latinos utilize it for assimilation and accommodation into the mainstream society, in America.

The possible discussion questions derived from this article could be as follows. Why are people drifting from Catholicism and joining Protestant groups? What are the social factors that influence this religious phenomenon? What will be the future of Catholic Latino churches in America in the next 10 years?

The article is quite convincing and detailed because it attempts to unravel the reasons behind the massive movement of Latinos from Catholicism to Protestantism. The empirical approach that the author uses to answer tentatively some of the questions related to the Hispanic shift is satisfactory. From a personal opinion, I would concur with the thoughts of the author because Protestant churches are more flexible in interacting and communicating with the followers than Catholics. Therefore, they attract Christians because they meet their spiritual and material needs, which is what a majority seeks by attending church.

Posted in Uncategorized

David Keirsey four personality types preferences

David Keirsey four personality types preferences

Personality Type

Name:

Institution:

Step one

David Keirsey’s four personality types’ preferences include: the HYPERLINK “http://www.personalitypage.com/html/four-prefs.html” l “EI” Extraversion and Introversion; the HYPERLINK “http://www.personalitypage.com/html/four-prefs.html” l “SN” Sensing and Intuition; the HYPERLINK “http://www.personalitypage.com/html/four-prefs.html” l “TF” Thinking and Feeling; and the HYPERLINK “http://www.personalitypage.com/html/four-prefs.html” l “JP” Judging and Perceiving. A personality type is included in the temperament categories which is a combination of any two personality types. From the Humanmetrics Jung Test I took, my personality type is ESFJ which reflects that I have a 1% preference of extraversion over introversion, a 1% preference of sensing over intuition, a 38% moderate preference of feelings over thinking and a 22% slight preference of judging over perceiving (Fischer, 2209).

Validity of my personality type

The ESFJ is a personality type who is described as a caregiver. According to David Keirsey, an ESJF is a warm hearted, popular and conscientious individual. They usually have a strong sense of duty and responsibility in which case they put others’ needs over their own.

E- Extraverted

An ESFJ has a primary mode of living whose focus is externally. An ESFJ personality type reacts to things in the manner he feels about them or in relation to what his/ her value system is. Apparently an ESFJ secondary mode is internal in which case he/she perceives things using the five human senses. Extraverted feelings mostly dominate their personality. They usually consider their values and morals and weigh them against the world that surrounds them. What defines their morality is the world that surrounds them rather than their internal values (Fischer, 2209). They have the ability to give a confident opinion without shying off.

S-Sensing

This aspect indicates how we acquire the information on which we base our decisions. ESFJs have an introverted sensing in which case the primary means in which they acquire information is through perceiving the underlying meaning of what people say or. They usually consider the implications of particular courses of actions before making decisions (Fischer, 2209). ESFJs are most satisfied with structured environments since they enjoy doing things that involve theoretical concepts, impersonal analysis or abstract. They also tend to enjoy creating structure and order (ESFJ personality page).

F- Feeling

People can also make decisions based on two criteria which include thinking and feeling. Thinkers make decisions based on logic and reason. On the other hand, individuals who make decisions based on their value judgment are perceived to be using their feelings in reasoning. Relying more on thinking establishes guidelines for performing tasks and having clear preferences on certain issues, decisions are also made on logic and reason. ESFJs have an extroverted feeling dominating their personality. They usually weigh their values against their morals (Fischer, 2209).

J- Judging

This preference refers to individuals’ attitude towards the external world. One is either have a judging preference or a perceiving preference. When one has a judging preference, it implies that one forms and expresses judgment on issues in life more often. ESFJs believe in rules and laws of authority in which case they expect the same from others. They also prefer doing things in established conventional ways. (ESFJ personality page) (Fischer,2209).

Relationship between E, S, F, and J

The four preferences, ESF and J which form the ESFJ temperament are distinct but interact closely with each other to give my personality type. Apparently, the proportions in terms of percentage indicate the preference relationships with each other. This is illustrated by their dominant extraverted feeling, their introverted sensing, their extraverted intuition and their introverted thinking. However, the ESFJ personality type has a number of weaknesses which manifest in such individuals. For instance, their respect for authority may make them accept rules blindly without questioning them. In addition, their lack of intuition may prevent them from seeing the bigger picture of an issue. Moreover, they usually seek approval from others and are always hurt by indifferences. Usually, they have do not understand unkindness at all cost which ends up disappointing them. It is argued that ESFJs incorporate many traits which are present in women (Fischer, 2209).

Step two

From the personality test, as an employee, I have learnt the importance of understanding the various personality types of various individuals within an organization. In addition, it is also important to appreciate the fact that the characters and behavior of various persons differ according to the extent of a particular preference in their respective temperament in which they belong. As a manager, I have also learnt how to handle different workers in their respective duties and in relation to their personality types. In understanding the personality type of a worker, one is capable to identify the organization in which he/ she fits best and in the place he/ she will acquire the most satisfaction (Fischer, 2209).

Moreover, I have learnt that in order to achieve the best worker and co-worker relationship in an organization, it is paramount to adjust some of the dominant traits which portray more of a personality weakness. Furthermore, it enables me to improve my awareness of others’ personality types thus identifying the best way to communicate to fellow workers and my manager when it comes to various issues. Finally as a manager, it enables me to find appropriate strategies of training and counseling different employees by identifying their strengths and weaknesses in relation to the task at hand (Fischer, 2209).

References

Fischer, K. (2009). “Summer Session”. BMAL 500. Lesson 1: Worldview.

PowerPoint: Lesson 1 (in Module/Week 1).

The HYPERLINK “http://www.humanmetrics.com/cgi-win/JTypes2.asp” www.humanmetrics.com/cgi-win/JTypes2.asp website

The HYPERLINK “http://www.personalitypage.com” www.personalitypage.com website

Type Talk at Work

Posted in Uncategorized

David Grants article Top 9 Reasons Congress is Broken

David Grants article Top 9 Reasons Congress is Broken

Name:

Tutor:

Course:

Date:

David Grant’s article “Top 9 Reasons Congress is Broken” outlines a number of reasons why Congress is not just ineffective, passing a paltry 106 bills compared to the Congress of 1947-1948 which had passed 906 bills, but also why it is so poorly viewed by the public, achieving an approval rating of 10percent. According to the author, a gathering of scholars at the Woodrow Wilson International Center came up with a number of valid reasons for the level of dysfunction crippling the functioning of Congress. These reasons varied from insufficient presidential leadership and a lack of institutional knowledge to the Congress being back to the future by following a historical trend, all in all the author argues the current state of events cannot be allowed to play out.

According to Grant, one of the key reasons behind Congress’ failures thus far, is the lack of sufficient leadership from the presidency. Giving the example of President Clinton, the author argues that the president must know how to “work the system” in order for Congress to work effectively; for instance, the President should be able to motivate Congress to look beyond partisan interests. Secondly, Grant argues that in concurrence with the views of Thomas Mann in the Washington Post, the newcomer Republicans are at fault, as they have brought with them ideological extremes and are scornful of compromise, this has made it difficult for Congress to work in effectively. Perhaps also related to this, is the third reason: which is that members of Congress are less institutionally knowledgeable, and as a result find it difficult to be effective in deciding between policy alternatives.

Another key reason provided by Grant, is the increasing control that bmoney is having in ppolitics, as a result, members of Congress are actually forced to spend more time fundraising than is ideal, resulting in less time for Congressional functions. These changes have according to the author also spilled into the media industry, which has become significantly more vigilant, making deal cutting quite difficult, further hampering functioning of Congress. The sixth reason provided by Grant, is that of what the author refers to as the “Senate filibuster” a piece of legislation that allows a single senator to halt legislation that does not have sufficient votes (60) to overrule their disapproval. The provision has over the last two Congressional terms been abused further choking Congress’ ability to carry out its functions. Some of the other reasons provided are the electorate’s tendency to elect hardliners, the advent of strong interest groups that have usurped roles previously played by political parties and finally the advent of a partisan Congress interested in putting the interests of their parties above institutional effectiveness.

The author’s argument for Congress increasingly putting other interests above institutional effectiveness is in my opinion the most significant reason for the dysfunction currently being witnessed. This can however be intertwined with the initial reason; a lack of leadership. There is no doubt that a strong president capable of setting the agenda of Congress that cuts across partisan interests, would result in a more functional Congress, not to mention their ability to lobby a majority support for their bills, leading to greater functionality. These arguments by the author, are definitely the strongest, as they explain the shift in Congressional culture, as well as the greater Congressional functionality usually witnessed under specific presidents compared to others. I therefore agree with a majority of the reasons provided, but particularly feel that these two stand out and perhaps even encompass a number of the other reasons provided.

Posted in Uncategorized

Dating Violence among Adolescents

Dating Violence among Adolescents

Dating Violence among Adolescents

Name

Institution

Introduction

Unlike violence in adult intimate partners, violence among adolescent partners who are dating is phenomenon that is understudied. Although most teenagers do not experience violence when dating, for one out of every ten teenagers have abuse as an integral part of their dating partnerships. Youth Risk Behavior Survey in 2007 reported that 10% of teenagers countrywide reported having experience abuse or physical violence from their dating partners in the previous year (Mulford, & Giordano, 2008). This is just an indicator of how violence is taking root in our teenagers. Violence in dating adolescent may take various forms the way it occurs in relationships among adults. According to Varia (2006) these forms include emotional violence, such as jealousy behaviors and controlling behaviors; physical violence characterized by punching, slapping, hitting etc; and sexual violence characterized by rape on nonconsensual sexual activity. Violence in dating teenagers has various effects on the teenagers. These effects are usually physically, emotionally and psychologically detrimental. Heterosexual females take much of the violence compared to male. On the other hand little studies or insignificant number of studies have been conducted on gay, bisexual, lesbian and transgender youths, however, research conducted on same gender relationships among adults show identical patterns as those done on the youths of heterosexual nature. As Varia (2006) notes the health implications of the violence is also costly to those on the receiving end. They include contraction of HIV/AIDS and other sexually transmitted infection, pregnancy, mental illness, drug abuse, and suicidal thoughts. Programs that prevent violence among dating youths can be very instrumental in helping reduce the violence and the effects associate with it. It must be understood that the violence may be a sign of other deep rooted problems that may interest counselors. The counselors may also be interested in the prevalence and the effect of the violence.

Scope

This research paper looks at literature on the trends and prevalence of violence among dating youths. It also looks at literature on the causes of this violence, its effects on the teenagers and the programs that aim at reducing the violence. It also explores the outcome of the programs.

Developmental theory

Violence among adolescents in may be a product of the teenage stage of development and may also have effects on their development at this stage. According to the developmental theory postulated by Piaget and other, teenagers fall in two development stages, early teenagers are in the concrete operational stage characterized by increase in body volume and mass, increased intelligence and ability to systematically and logically manipulate symbols in relation to actual objects. They also exhibit operational thinking and reduced egocentrism. Those in mid and late teenage fall in the formal operational stage, which is characterized by exhibition of intelligence through use of symbols connected to abstract concepts. The teenager may also exhibit geocentricism.

Literature Review

This section is a review on of literature on dating violence among youths. The section will explore trends and prevalence of violence among dating youths. It also looks at literature on the causes of this violence, its effects on the teenagers and the programs that aim at reducing the violence. It also explores the outcome of the programs.

Trends and Prevalence of violence among dating youths

Youth dating violence cuts across gender, race, and socioeconomic boundaries. Both girls and boys are victims; however girls and boys abuse each other in different ways. In most instance girls are like to yell, slap, pinch, kick scratch or threaten to cause harm on themselves. On the other hand, boy cause injury on girls more frequently and severely. Some teenagers experience violence occasionally, while others may experience more often, even daily. The prevalence of intimate partner violence is high in teenagers than in adults. A comparing of the rate of intimate partner relationship violence by Silverman et Al (2001) reveled that teenagers are at a higher risk of abuse by intimate partner than adults. According to the U.S Department of Justice, Bureau of Justice statistics (2001) girls of ages between 16-24 years are more susceptible to violence from intimate partners that any other age group. Prevalence of violence to girls in this age group is triple the national average. Silverman et Al (2001) also observes that in every five girls, at least one girl has been abused by an intimate partner . These ladies have either been abused sexually or physically by their partners. The U.S. Department of Justice (2001) also noted that 94% of those victimized by their present or former boyfriend were women of the ages between 19-16. In the last decade of the 20th century most homicide against girls of the ages between 16-19 were conducted by their intimate partners. Gay, bisexual, and lesbian youths also experience violence similar to their opposite sex counterparts (Young, 2004). Also more than a half of sex offenders commit their first offense before they attaint the age of 18 years. 58% of rape victims are normally of the age between 12 and 24 years while half of date rapes occur among teenagers. Intimate partner violence in the youths is closely linked with risk of abuse of drugs, poor weight control manners, risky sexual behaviors, suicide and pregnancy.

Causes of intimate partner abuse in youths

There are various factors that contribute to intimate partner violence among young people. An examination of 1,600 juvenile sexual offenders in the state of California indicated that about 33% of the offenders perceived sex the best way to demonstrate love and care to their partners; 23.5% felt that sex is the best way of feeling powerful and exercising power and control over their partners; 9.4% use sex as the method for dissipating anger; while 8.4% used sex as a means of punishment (California Coalition Against Sexual Assault, 2002). Some victims and abusers blame the violence on the victims dating behavior such as provocation by the girls, communication problems, provocation the personality type of the victim, influence by the peers, and the girl’s desire for affection. A large percentage of teenager in high school (67% of males and 77% of females) endorse some level of sexual compulsion from intimate partners such as unwanted hugging, kissing, sexual intercourse or genital contact. Violence by male on their female partners is most fueled by peer influence especially in educational institutions. In this regard, intimate partner violence can be perceived as a product of negative societal and psychological ideologies, influence of drugs, provocation and peer influence.

Effects of intimate partner violence on youths

Intimate partner violence has numerous effects on the partners, especially the victims. Females in relationships that are abusive have a higher risk of get infect by sexually transmitted infections and HIV/AIDS (Mulford & Giordano, 2008). They are also at risk of getting unwanted pregnancies since the power dynamics in such partnerships deny them the ability to negotiate for the use of condoms or other contraceptives. They are intimidated by the violence and are often forced to engage in unsafe sex. The depression resulting from intimate partner violence lead to a feeling of hopelessness and sadness, and victims have an increased inclination to take part in risk sexual activities due to reduced concern about self.

Disclosure

Most victims of intimate partner violence among the youth do not report the incidences or seek assistance. The longer the victim has been dating with the abuser the lesser he/she is likely to report an abuse. Victims are more likely to report abuse if it occurs within the first five dates. Many teenagers continue hanging in abusive relationships due to various reasons. These reasons include self-blame, love for their partners, fear of their partners, loyalty, religious and social stigma, embarrassment, denial, privacy and lack of understanding (Varia, 2006). In a survey among high school students, 86% of students stated that they would confide cases of abuse on their close friends while only a small percentage 7% stated that they would look for assistance from the police if confronted by violence from their partners (Silverman, 2001). A large number of youths prefer seeking help from their peers rather than get help from a counselor, teacher, a caring adult or parent. Also a large number of teenagers prefer keep the incidences to themselves. Silence and seeking ineffective avenues of help present a great dilemma to counselor and adults interested in reducing and preventing intimate partner violence among teenagers.

Prevention programs

Despite numerous cases of intimate partner violence among the youths going unreported, there are numerous efforts geared towards eliminating this kind of violence. However, such programs are few as compared to those catering for intimate partner violence among the adults. Knowledge of the efficiency of the programs targeting the youths also limited since only a few programs have undergone evaluation (Hickman, 2004). Most of the prevention programs are school-base and aim at influencing attitudes and enhancing the knowledge held by the student about intimate partner violence and its consequences. The programs hope to influence behavior through knowledge and attitude change. Limited evaluations make it almost impossible to determine the effect of the prevention programs. However, the few evaluations indicate an improvement in post program knowledge, but there varying effects on the participants’ attitudes. According to Hickman (2004) long term programs show more positive results on the participants’ attitudes than short term programs. Also, girls report more positive change in attitude than boys. Program that targeted the participant self esteem, proper communication, assistance seeking and other personal strengths also proved to be effective at shaping attitudes. Other approaches such as reducing victim acceptance of violence and male use of violence and conflict resolution approaches have not receive mush evaluation and most information about their outcome is mere speculation. Programs delivered through the community settings proved to be effective than those delivered through school settings. It is, however, difficult to determine whether both the changes realized through the programs targeting boys, girls or mixed groups, delivered in school setting or community social setting were permanent and would persist through adulthood or not.

Relevance to Adolescent Development

The information present is various pieces of literate have varied relevance to teenage development. Teenagers are at a transition stage from childhood to adulthood and any negative attitudes picked or exhibited during this stage can as well be brought along into adulthood. Such adults may tolerate abusive relationships or be abusive in their feature relationships. As stated earlier, a large percentage of people who committed sexual offenses, abused their spouses or conducted any other violent deeds had done so once or consistently during their teenage. On the other hand, the victims of such violence and abuse can carry along the desperation, helplessness and sadness that they experienced during their teenage to their adulthood consequently affecting their future relationships. This is a clear indication that what happen to the youths during this transition stage of growth is very influential to their future behaviors. In this regard, tolerating violence or accepting it should be discourage. Also perpetrators of violence should be discouraged either through counseling or through punishment. Prevention programs should be encouraged to shape the thoughts and knowledge of the teenager. The youth should be enabled to seek help from appropriate avenues whenever they experience violence from their intimate partners. Youth should be made aware of the consequence of keeping quiet when their friends are abused or abuse their partners. As brothers keepers youths should look out for each other to avoid consequences such as sexually transmitted infections and HIV/AIDS, despair, unwanted pregnancies and even homicides.

Implications for Counselors

Counselors on the other hand must understand that they are dealing with a great problem with perpetrators, victims, and onlookers who like the perpetrators and the victims never disclose what takes place. This can pass for youth syndicate! Counselors must take into account of the statistic of the abuse activates in order to access as many victims and perpetrators as possible. It is not only victims that need counseling; perpetrators too need counseling to help them to desist from repeating their violence activities. For the victims it is important that the counselors deal with the effect of the violence while for the perpetrators the counselors must deal with the cause of the violent behaviors. As noted above, girls are the form the largest category of youths who suffer violence at the hand of their intimate partners. In most cases most of the girls accept the violence as a natural male behavior. Counselors should deal with this acceptance and other factors such as fear, royalty, and self-blame that affects the ability of the victims to stand against the violence. Counselors should seek to bolster the confidence, perception of self worth by the victims (Pipher, 2005). This way the counselors can empower the victim to stand against the violence.

In addressing the perpetrators the counselors have an even more difficult task of addressing deep rooted believes or attitudes that encourage violence. Perception of sex as the best way of expressing love to ones partner is the greatest violence encouraging attitude that counselors have to deal with. They also have to address other notions about sex such as expression of power and dominance, handling hunger, and punishment. The counselor must address communication issues among the youths whenever they get an opportunity to talk to them (Edgette, 2006). With proper communication skill and confidence, the would-be victims will be able to talk their way out of violence or seek help when it occurs and perpetrators will be able to communicate and express themselves instead of using violence to get their way. Perpetrators should also be made to appreciate the desires of their partner and not force their will on them. Counselors should also address the youths who keep quiet when they have information about their friend who are being violated and friends violating their partners. This group of youth is very instrumental in shaping the future of victims and that of perpetrators. They should have the courage to report violent incidents when they occur.

Summary

In sum, incidents of intimate partner violence in youths are becoming numerous. The incidents are a product of many factors both from the victims and the perpetrators. Perpetrator are violent their partners dues to attitudes that are based fallacies. On the other hand these ideologies, alongside fear, self-blame alongside a myriad of psychological reasons and fallacies encourage victims to tolerate the violence and even encourage it. The violence has numerous negative implications on the development on the adolescents such as psychological problem, physical injury and infection by STIs and HIV/AIDS. The available literature on findings on intimate partner violence among the youths and the available preventive program present and informational resource that is valuable to counselors. The preventive strategies have positive outcome. However, I believe that with knowledge about these strategies, counselor can combine several approaches and crate on powerful strategy to address victims, perpetrators, and witnesses.

References

California Coalition Against Sexual Assault (CALCASA) (2002). 2002 Report: Research on Rape and Violence. Retrieved from http://www.uasasonoma.org/teensite/statistics.htm#Child/Teen%20Vicitmization

Edgette, J. S. (2006). Adolescent therapy that really works: Helping kids who never asked for help in the first place. New York: W.W. Norton

Hickman, L. J. (2004). Dating Violence Among Adolescents: Prevalence, Gender Distribution, And Prevention Program Effectiveness. Trauma, Violence, & Abuse, Vol. 5, No. 2, 123-142

Mulford, C. & Giordano, P. C. (2008). Teen Dating Violence: A Closer Look at Adolescent Romantic Relationships. National Institute Journal of Justice No.261. Retrieved from http://www.nij.gov/journals/261/teen-dating-violence.htm

Pipher, M (2005). Reviving Ophelia: Saving the selves of adolescent girls. Ingram Book Company

Silverman, J. G. et Al, (2001). Dating Violence Against Adolescent Girls and Associated Substance Use, Unhealthy Weight Control, Sexual Risk Behavior, Pregnancy, and Suicidality.” Journal of the American Medical Association, Vol. 286, 572, 576-577.

U.S. Department of Justice, Bureau of Justice Statistics. (2001). Special Report: Intimate Partner Violence and Age of Victim, 1993-99

Varia, S. (2006). Dating and Violence among dating youths. Retrieved from http://www.advocatesforyouth.org/datingviolence

Young, M. L. (2004) Prevalence of Partner Violence in Same-Sex Romantic and Sexual Relationships in a National Sample of Adolescents. Journal of Adolescent Health, Vol. 35, Issue 2, Pages 124-131

Posted in Uncategorized

Dating and God a comparison

Dating and God a comparison

Dating and God a comparison

Student’s name

Unit code

Lecturer’s name

Date submitted

Religion contributes to most of the aspects of human life and people associate religion with spiritual and social growth. God governs the society mode of behavior ensuring the society refrains from some actions and encouraging certain behavior in the society. Christianity is a combination of culture and social beliefs of the community and the global views on the given region and the community tends to follow what God wants according to the bible. God is the creator thus governs the behavior of his creation. Their different religions in the globe due to different cultural beliefs, Christianity and Muslims are a common in the globe having a wide range of believers globally. Gods intended dating to be mans way of selecting a partner and mating a way of reproduction. The secular world uses dating to socialize and understand potential mates. Mating is also used as a display of affection in the secular world apart from reproduction.

Dating and matting is an important aspect of human life. This are the fundamental processes in nature present in all animals that ensure continuity in animal life. According to the bible, God created man in his own image and after some time he noticed he was lonely and needed a companion. This lead to the creation of woman, the woman was created as a companion to man. The religious and secular nature of the religion in the society has different effects on dating and mating (Horton, 2009).

The secular world is a liberal world allowing the people in the community to diversify in their thoughts and act according to personal opinion. The secular world does not restrict the individual to some beliefs but encourages the person to experiment and learn from nature. With respect to dating, the secular world does not govern the individual or guide the person to a specific path of life but allows the person to choose what is best for him. The bible acknowledges the need for courtship and mating in the society but the restriction way. The presence of a commandment against adultery, is Gods way of preventing experiments I relationships.

The secular world experiences diversity in the society as no restriction to the belief of people. With little restrictions to dating, the secular world experiences a range of practices allowed by the community. Such communities practice same sex marriages and marriage to object with objections as the personal values are respected. The issue of mating thus becomes complicated among such couples and a danger to the community. Sex before marriage is prohibited by God according to the bible. The main purpose for dating and mating in the religious world is to ensure that the person have found a suitable partner with whom they would spend their life’s with. The traits of the partners should be compatible and with love growing in them mating is the second step where the Lord guides the couple towards population of the world (Goshen-Gottstein, 2001).

Most people go about their mate selection through evaluation of the physique. This is usually what leads to attraction leads to communication between the couple and understanding is built. The better suited the couple the better the relationship and with a prolonged relationship mating will occur. God created two genders; the Christian culture encourages understanding between the couple. The couple should understand each other for some time before courtship. The Lord encourages selection of a mate with the same religious beliefs to ensure religious growth. The bible acknowledges marriage where a man and woman unite, the bible states that God created man and woman thus for every man there is a woman, the Lord has made a match for every man in the world.

References

Goshen-Gottstein, A. (2001). God The Father In Rabbinic Judaism And Christianity: Transformed Background Or Common Ground?. Journal of Ecumenical Studies, 38(4), 470.

Horton, D. J. (2009). Discerning Spiritual Discernment: Assessing Current Approaches For Understanding God’s Will. Journal of Youth Ministry, 7(2), 7-31.

Posted in Uncategorized

Dating And The Single Parent Book Review

Dating And The Single Parent Book Review

Dating And The Single Parent Book Review

Student’s Name

Institution

Dating and the Single Parent Book Review

Introduction

Single parent dating is an exciting and at the same time a very complex topic that most single parents, at one point, face either with palpitation apprehension or devout joy (Phillips & Phillips 2006). Regardless of the circumstance surrounding single parents in their singlehood life, they tend not to spend their time lonely live. Whenever they plan to begin dating, the questions that dominates their minds is; are there rules and regulations that govern single dating? At what time do they bring the children into their lives?In an attempt to answer these questions, when individuals date other single parent like themselves, the most things that they are required to discover is the custody of their arrangement. This will enable both of them to schedule their dating time without interfering with their children, who are priority in their life. It is always advisable for partners to introduce their children to the other dating partners as friends during initial stages (Deal, 2012). One should always be focused on his children than dating, so that the children feel secured.

Summary of the Book

In the case where kids predate dating, the couple’s relationship will inherently produce competing adherence. Choosing to be with children or one’s partner automatically calls for omission of the other. In this case, the children will feel left out of the new move (Deal, 2012). In addition, children usually feel unsafe with their mother’s or father’s relationship. Wise singles will always recognize this crucial dynamic and tend not to take for granted that being couples not necessarily yield to a family. They will always serve both parties and take more time evaluating how the potential stepfather or stepmother relationships are evolving.Parents, who plan to date quickly after the end of a relationship (maybe as a result of death or separation) or those who make a quick decision to marry after a shorter dating period, more often than not find their children opposing their marriage plans. Smart single parents always take a good wider look of themselves in the mirror before initiating a date (Deal, 2012). They analyze their need for dating, awes (like their children being fatherless), solitariness, and dissonant heart (particularly after divorce)Long before dating, single parents usually initiate a series of conversation with their children especially those who usually conjecture a lot about their relationships. They think of many ‘what ifs?’ questions that surround their lives and the perception and reactions attached to their children concerning their intended date. They will always engage in the questions like, what if I get married, how would my children feel? Mature single parents will never allow their children to dictate their dating progress, but will always listen and give consideration to their children attachments. Engaging in these types of conversations with single parents throughout their dating period is welcomed as they anticipate the development in each stage of the relationship.Whenever individuals fall in love, they should never abandon their family by spending much free time with their new lovers. Even though it is very tempting, doing so instills fear in their children. This is because they lose the one they love, and this gives a wrong impression about their new dating partners. As a result, they should try never to lose balance amidst your new dating (Deal, 2012).If individuals love their relationship, they should always advise your partners to go home and have some time with their children. This act will yield so many benefits; it helps to lower the fears in children regarding your relationship, at the same time, keeps perspective in their relationships. One should always remember that the relationship is as more important to the other partner’s children as it is important theirs. To the kids, liking their parent dating partner sometimes produces a problem. They are sometimes not well equipped with skills of embracing other people and accepting their feelings without hurting them. Since most children are commonly caught in royalty of conflicts, they sometimes give a warm reception to the parent’s partner, but later may develop cold reception (Deal, 2012). One should not rush to judge the children harshly, but to relax and be comfortable with what they are giving.

Potentials for ‘Dating and the Single Parent’ Book for Christians Premarital Couples

This book is not a surface-feel-good book, after flipping through all the pages, it makes one to look at him realistically. Every page is found relevant and significant to all Christians especially the single parents who are opting for dating. The author is always up front in one’s face with real issues facing single parents who are already dating and are just about to cement their relationship. The author first of all asks his readers to seek God‘s blessings in everything they do include dating (Deal, 2012). He goes further and list discussion questions so as to prevent users from repeating the same mistakes they have made in life (Phillips & Phillips, 2006). These issues are listed at the end of each chapter some with biblical supports that hammer home information and make a reader look realistically as a Christian currently dating or planning to initiate a date.The author of the book encourages the readers always to seek for God’s wisdom needed to make the best dating decisions. The Christians single parents should always be ready to follow God’s guidance even when they seem difficult. The readers should keep in mind their perspective in relationship is limited and on the other hand God’s decision is perfect, therefore, it is always important to trust in God (Phillips & Phillips, 2006). Christians should be able to understand what motivates dating and kinds of goals they have in the dating relationship. If both dating partners can walk humbly in God guidance and share common values, and both dating partners sacrifice to love each other with full hearts, then the partners’ children will be truly blessed by God. Additionally, God’s goal for single parents dating is to form a healthy marriage and a happy family.Quick dating or marriage can sometimes harm your romantic life or family relationship. Christian should take an ample time to truly get to know the ability of their spouses and their family in details before making a final decision that will entirely change their entire life and the life others concern. It is usually good to wait for at least two years after the death or divorce of the spouse before one begin to date. This is coupled with another two years after dating before deciding on marriage. The book advises the readers to be focus on becoming spiritually and emotionally healthy as they look for the right person to date. This is what God wants a single parent to practice before he begins another relationship (Phillip & Phillips, 2006). In addition, one should heal fully from trauma of divorce or death of a spouse and always lay confidence in God alone for the future prosperity. Single parents should understand that the loss of the previous marriage has brought a permanent change in their lives and their kids. They should, therefore, remain stronger and believe in Jesus Christ.

Ideas that can be Highly Criticize in the Book are as Follows

Even though the author of the book hails more reasons as to why single parents should take more time and also gives the guidelines on single parent dating, there are some of his ideas that open weakness necessary enough for critics. Some of the ideas can be criticized as follows:It usually makes sense that some men with kids always schedule and have fixed time with them. Whether they are in full custody of the children, they will always devote little time to leisure that they would have enjoyed together with dating partner. These men will tend to avoid most outings since for them to go, they may require carrying babysitters or looking for some people to take care of their kids. Some dates may be forced to be postpone or canceled in case there are no babysitters or when there are no people to take care of the kids (Munroe & Levine, 2009). This can proof tedious and sometimes bring inconvenience in the relationships.In some cases, where the single mother is in a relationship with a man with kids, the woman should know that she is in a relationship with his children, his kids’ mother, his own mother and his relatives. She should remember that his family was there long before she came into his life. The man will always take his kids and families more seriously than the dating partner. Under normal circumstances, the woman will feel she is of less priority in that relationship (Munroe & Levine, 2009).

In conclusion, the author of the book has captured most touching issues affecting single parents who are dating. His book is found relevant to modern society full of divorce cases as it gives divorcee hope of beginning another word of love. Single dating rules that are outlined in this book are found relevant even to the modern Christians because the author had used biblical references in supporting his facts. The dating rules outlines here give the do and don’ts in dating. Even though there can be critics to the ideas conveyed by the author, the positive reactions that the book has received from readers supersedes the negative critics. The book is therefore found very relevant to dating and single parents.

References

Deal, R. (2012). Dating and the single parent: Are you ready to date?, talking with your kids, avoiding a big mistake, finding lasting love. Minneapolis, Minn.: Bethany House.

Munroe, E., & Levine, I. (2009). The everything guide to stepparenting: Practical, reassuring advice for creating healthy, long-lasting relationships. Avon, MA: Adams Media.

Phillips, R., & Phillips, S. (2006). Holding hands, holding hearts: Recovering a biblical view of Christian dating. Phillipsburg, N.J.: P & R Pub.

Posted in Uncategorized

Date Rape Literature Review

Date Rape Literature Review

Date Rape Literature Review

Date rape is facilitated by certain predisposing factors one of them being the psychological state of the victim or the alleged rapist. According to Taslitz (2005) self deception leads to wrong interpretation of the intentions of the other party eventually resulting to rape. The author labels this form of deception “self deception” since it is actually done consciously but at a wrong interpretation of the willingness of the aggrieved party. In most date rapes, variously referred to as acquaintance rape, it is possible for the alleged rapist to assume willingness of the victim since it usually happens at less than the expected conscious state of the victim’s awareness. The author’s paper applies an illustration of the case involving Kobe Bryant. The investigations into the former NBA superstar’s case are reported to have made sufficient findings pointing to the fact that the alleged rape resulted from self deception that amounted to wrong interpretation of willingness.

In support of the psychological interpretation of the willingness threshold in a rape case, perhaps consciousness levels for the parties need to be established in a date rape case. In a separate study, Taslitz (2006) reckons that forensic linguistics studies need to form a large fragment in decision making for unclear date rape investigations. The author presents a perspective that highlights the need for an understanding of the various communication barriers that may mislead the jury in making decisions in a case.

One of the forensic linguistic facts is the apparent use of “female language” that is perceived to be ambiguous and can result in such interpretations as would place them in the danger of being rape victims. It is demonstrated in the paper that subconscious communication biases exist against women thereby displaying them as imprecise in their expression of important information such as consent in rape cases. These biases arise from the general gendered narrative phenomenon that is depicted in various circumstances of subconscious level communication. It therefore follows that the application of forensic techniques to reveal the actual intention and willingness of a victim in disputed sexual intercourse could be resolve the uncertainty. Judgment touching on a rape case with unclear circumstances such as a date rape must therefor be made on an informed perspective that allows judges to confront prejudice and bias on consciousness of the involved parties.

In a separate account of the intricacies surrounding the psychological perception that offenders are exposed to, it is important that investigations unearthing mediators of rape. According to Langley et al (1991), it is clear that there are several factors that determine the applicability of event attributes that lead to amount to a date rape. Despite the general provision that offenders may apportion blame on the victims in their defense must be backed by enough support which details on the other factors that exonerate them. For instance, however willing a victim may appear to be, the influence of force and application of violence could be used to formulate the judgment. Detail of the degree of violence and forceful indulgence of the alleged rapist could be used to resolve uncertainty in such cases. It may appear that gender roles and interpretation of events could be applied in general biases held with regard to date rape (Gillen and Muncer, 1995). Perceptions between males and females with regard to the magnitude of date rape could be a huge contributor of the actual occurrence of such rape cases. Since rape has increasingly become a sensitive criminal law element, establishing the genuineness of the facts presented by the parties should also highlight gender perceptions against use of violence or its magnitude and the intentions of the alleged criminal. In some instances, rape cases reported before the court could be as a result of a misunderstanding between the involved parties as contributed to gender perceptions.

Besides the consciousness test required in resolving a date rape case, it is important that further psychological assessment of the scenario leading to a rape are established, especially when the rape involves aggression and supportive behavior (Bouffard and Bouffard, 2010). When details of a rape case point to a possibility of existence some link between rape-supportive tendencies that culminate in a violent attack on a rape victim, there are chances that perceptions predetermine the outcome of the encounter. The alleged rapist must display certain attitude towards the crime long before it happens due to the some risks and rewards perceptions held in advance. The author reports on a particular observable pattern that links attitudes of the alleged rapist towards possibility of being involved in an intimate relationship with the victim and the perceived rewards of being involved in the same. In light of the psychological exposure and preparedness that an alleged rapist has regarding date rapes, it is clear that there is a strong relationship between the behavior and possible rewards. Personal attitudes of the accused can be used to determine the perception of risks and rewards that rapists use to perpetrate date rapes. It is therefore clear that most crimes of this nature depend on attitude held by the offenders long before a crime is committed.

It is a very interesting case when generally and normally aggressive men get involved in cases of date rape since it gets difficult for the defense to demonstrate how natural behavior plays part in sexual violence. In future, the will be need to apply psychological mechanisms that establish the impact of natural aggression to intentions other than those facilitating perpetration of crime. According to Bryden & Sonja (1997), it is important that naturally aggressive males are protected by law from false accusations of rape. Apparently, there should be a balanced justice system that takes care of false allegations, since there is a chance of acquaintances solving problems using bizarre methods (Jennifer and Jody, 2009; Klippenstine and Schuller, 2004).

References

Bouffard, J. A. & Bouffard, L. A. (2011) “Understanding Men’s Perceptions of Risks and Rewards in a Date Rape Scenario,” International Journal of Offender Therapy and Comparative Criminology, 55(4):626-645 Doi: 10.1177/0306624X10365083

Bryden, D. P. & Sonja, L. (1997) “Rape in Criminal Law Justice System,” Journal of Criminal Law and Criminology, Retrieved from: HYPERLINK “http://findarticles.com/p/articles/mi_hb6700/is_n4_87/ai_n28696221/” http://findarticles.com/p/articles/mi_hb6700/is_n4_87/ai_n28696221/

Gillen, K., & Muncer, S. J. (1995) Sex Differences in the Perceived Causal Structure of Date Rape: A Preliminary Report. Aggressive Behavior, 21(2):101-112.

Jennifer, M. & Jody, C. (2009) “Rape Reporting: Classic Rape and the Behavior of Law,” Violence and Victims, 24(6):723-43

Klippenstine, M. A. & Schuller, R. (2004) “The Impact of Complainant Sexual History Evidence on Jurors’ Decisions: Considerations,” Psychology, Public Policy, and Law, 10(3):321-342. Doi: HYPERLINK “http://psycnet.apa.org/doi/10.1037/1076-8971.10.3.321” t “_blank” 10.1037/1076-8971.10.3.321

Langley, T., O’Neal, E. C., Taylor, S. L., & Yost, E. A. (1991) Models of Rape Judgment: Attributions Concerning Event, Perpetrator, and Victim. Journal of Offender Rehabilitation, 17(1-2):43-54.

Taslitz, A. E. (2005) “Willfully Blinded: On Date Rape and Self-Deception,” Harvard Journal of Law and Gender, 28:381-413

Taslitz, A. E. (2006) “Forgetting Freud: The Courts’ Fear of the Subconscious in Date Rape (and other) Cases,” Public Interest Law Journal, 16:145-195

Posted in Uncategorized

Date Rape

Date Rape

Date Rape

Literature Review

Date rape is facilitated by certain predisposing factors one of them being the psychological state of the victim or the alleged rapist. According to Taslitz (2005) self deception leads to wrong interpretation of the intentions of the other party eventually resulting to rape. The author labels this form of deception “self deception” since it is actually done consciously but at a wrong interpretation of the willingness of the aggrieved party. In most date rapes, variously referred to as acquaintance rape, it is possible for the alleged rapist to assume willingness of the victim since it usually happens at less than the expected conscious state of the victim’s awareness. The author’s paper applies an illustration of the case involving Kobe Bryant. The investigations into the former NBA superstar’s case are reported to have made sufficient findings pointing to the fact that the alleged rape resulted from self deception that amounted to wrong interpretation of willingness.

In support of the psychological interpretation of the willingness threshold in a rape case, perhaps consciousness levels for the parties need to be established in a date rape case. In a separate study, Taslitz (2006) reckons that forensic linguistics studies need to form a large fragment in decision making for unclear date rape investigations. The author presents a perspective that highlights the need for an understanding of the various communication barriers that may mislead the jury in making decisions in a case.

One of the forensic linguistic facts is the apparent use of “female language” that is perceived to be ambiguous and can result in such interpretations as would place them in the danger of being rape victims. It is demonstrated in the paper that subconscious communication biases exist against women thereby displaying them as imprecise in their expression of important information such as consent in rape cases. These biases arise from the general gendered narrative phenomenon that is depicted in various circumstances of subconscious level communication. It therefore follows that the application of forensic techniques to reveal the actual intention and willingness of a victim in disputed sexual intercourse could be resolve the uncertainty. Judgment touching on a rape case with unclear circumstances such as a date rape must therefor be made on an informed perspective that allows judges to confront prejudice and bias on consciousness of the involved parties.

In a separate account of the intricacies surrounding the psychological perception that offenders are exposed to, it is important that investigations unearthing mediators of rape. According to Langley et al (1991), it is clear that there are several factors that determine the applicability of event attributes that lead to amount to a date rape. Despite the general provision that offenders may apportion blame on the victims in their defense must be backed by enough support which details on the other factors that exonerate them. For instance, however willing a victim may appear to be, the influence of force and application of violence could be used to formulate the judgment. Detail of the degree of violence and forceful indulgence of the alleged rapist could be used to resolve uncertainty in such cases. It may appear that gender roles and interpretation of events could be applied in general biases held with regard to date rape (Gillen and Muncer, 1995). Perceptions between males and females with regard to the magnitude of date rape could be a huge contributor of the actual occurrence of such rape cases. Since rape has increasingly become a sensitive criminal law element, establishing the genuineness of the facts presented by the parties should also highlight gender perceptions against use of violence or its magnitude and the intentions of the alleged criminal. In some instances, rape cases reported before the court could be as a result of a misunderstanding between the involved parties as contributed to gender perceptions.

Besides the consciousness test required in resolving a date rape case, it is important that further psychological assessment of the scenario leading to a rape are established, especially when the rape involves aggression and supportive behavior (Bouffard and Bouffard, 2010). When details of a rape case point to a possibility of existence some link between rape-supportive tendencies that culminate in a violent attack on a rape victim, there are chances that perceptions predetermine the outcome of the encounter. The alleged rapist must display certain attitude towards the crime long before it happens due to the some risks and rewards perceptions held in advance. The author reports on a particular observable pattern that links attitudes of the alleged rapist towards possibility of being involved in an intimate relationship with the victim and the perceived rewards of being involved in the same. In light of the psychological exposure and preparedness that an alleged rapist has regarding date rapes, it is clear that there is a strong relationship between the behavior and possible rewards. Personal attitudes of the accused can be used to determine the perception of risks and rewards that rapists use to perpetrate date rapes. It is therefore clear that most crimes of this nature depend on attitude held by the offenders long before a crime is committed.

It is a very interesting case when generally and normally aggressive men get involved in cases of date rape since it gets difficult for the defense to demonstrate how natural behavior plays part in sexual violence. In future, the will be need to apply psychological mechanisms that establish the impact of natural aggression to intentions other than those facilitating perpetration of crime. According to Bryden & Sonja (1997), it is important that naturally aggressive males are protected by law from false accusations of rape. Apparently, there should be a balanced justice system that takes care of false allegations, since there is a chance of acquaintances solving problems using bizarre methods (Jennifer and Jody, 2009; Klippenstine and Schuller, 2004).

References

Bouffard, J. A. & Bouffard, L. A. (2011) “Understanding Men’s Perceptions of Risks and Rewards in a Date Rape Scenario,” International Journal of Offender Therapy and Comparative Criminology, 55(4):626-645 Doi: 10.1177/0306624X10365083

Bryden, D. P. & Sonja, L. (1997) “Rape in Criminal Law Justice System,” Journal of Criminal Law and Criminology, Retrieved from: HYPERLINK “http://findarticles.com/p/articles/mi_hb6700/is_n4_87/ai_n28696221/” http://findarticles.com/p/articles/mi_hb6700/is_n4_87/ai_n28696221/

Gillen, K., & Muncer, S. J. (1995) Sex Differences in the Perceived Causal Structure of Date Rape: A Preliminary Report. Aggressive Behavior, 21(2):101-112.

Jennifer, M. & Jody, C. (2009) “Rape Reporting: Classic Rape and the Behavior of Law,” Violence and Victims, 24(6):723-43

Klippenstine, M. A. & Schuller, R. (2004) “The Impact of Complainant Sexual History Evidence on Jurors’ Decisions: Considerations,” Psychology, Public Policy, and Law, 10(3):321-342. Doi: HYPERLINK “http://psycnet.apa.org/doi/10.1037/1076-8971.10.3.321” t “_blank” 10.1037/1076-8971.10.3.321

Langley, T., O’Neal, E. C., Taylor, S. L., & Yost, E. A. (1991) Models of Rape Judgment: Attributions Concerning Event, Perpetrator, and Victim. Journal of Offender Rehabilitation, 17(1-2):43-54.

Taslitz, A. E. (2005) “Willfully Blinded: On Date Rape and Self-Deception,” Harvard Journal of Law and Gender, 28:381-413

Taslitz, A. E. (2006) “Forgetting Freud: The Courts’ Fear of the Subconscious in Date Rape (and other) Cases,” Public Interest Law Journal, 16:145-195

Posted in Uncategorized

Database Systems

Database Systems

Database Systems

Author

Institution

Introduction

System documentation refers to written materials describing the functionality of a computer system so as to ease the performance of business operations. Varied sorts of documentation may be used in SMEs. Administration documentation targets project managers and system administrators. It gives an overview of the system while defining the requirements and prerequisites for use. Installation documentation, on the other hand, would target installers and administrators. It defines the installation and configuration processes through varied scenarios. On the same note, there is procedure documentation which shows the day-to-day users how to carry out system tasks with step-by-step instructions (Yadav, 2006). Reference documentation, on the other hand is alphabetized by command name and component, offering a succinct definition of every component of the system, thereby allowing for quick access to information by experienced technical users. While documentation may be effective in varied aspects, the most effective feature would be functionality and security. These allow the applications or systems to be used for their appropriate functions, while ensuring that the information is not used by unintended or unauthorized individuals to cause havoc to functionality (Yadav, 2006). However, documentation comes with a number of problems including too high costs, time consumption, hard to read and understand, vagueness, and being built on the assumption that readers have certain levels of knowledge which they may not have.

Applications must be tested so as to determine their reliability, usability, as well as safety with regard to the functionality of the entire system. It is imperative that the specialist determine the functionality of varied features of the application. The following checklist would be used in testing applications.

Mandatory fields are shown using an asterisk symbol.

Correct positioning of validation error messages.

Display of all error messages using similar CSS style.

Display of general confirmation messages using CSS style.

Meaningfulness of tool tips.

Delete functionality asks for confirmation.

Dropdown filed have their first entry with a text such as “select” or simply blank.

Amount values are shown in the appropriate currency symbols.

Availability of the default page sorting.

Properly formatted numeric values

All fields have their default values set by the reset button functionality.

Input values are within the accepted limit.

Functionality and applicability of special characters.

Configuration capacity of the timeout functionality.

Page sorting functionality following delete, edit, or add operations.

Grammar and spelling functionality.

Redirection of application crash to the error page.

Proper validation message capabilities.

Functionality of buttons that are available in every page.

However, as much as there is a checklist for testing an application, it is noteworthy that testing never ends. Nevertheless, an application is deemed as having been sufficiently tested in instances where a maximum number of test cases have been executed and passed, budget depleted, deadlines reached and fundamental functionalities determined as functioning appropriately (Yadav, 2006). The optimistic or hopeful stopping rule is followed in instances where reliability of an application meets the requirements, or in cases where the benefits emanating from further testing would not justify the testing cost.

As much as meeting deadlines in making applications is imperative, it is imperative that time is reserved for testing the application. Software testing involves a trade-off between quality, time and budget (Yadav, 2006). Upper manager would be persuaded to set aside time and money for testing applications in spite of the deadlines through outlining its importance and dangers of not carrying out tests. The tests are usually carried out so as to assess the capabilities and attributes of a system and program, thereby determining whether it meets the required parameters and results (Yadav, 2006).

References

Yadav, D. S. (2006). Foundations of information technology. New Delhi: New Age International (P) Limited.

Posted in Uncategorized

Database Security for 21st century business

Database Security for 21st century business

Database Security for 21st century business

Introduction

Most companies have servers for different purposes; however, the most critical servers any company has is the database servers. Data such as client details, financials, and human capital are the data that support any business in operations. For this reason, there is an increasing concern about the general protection of databases. Any breach of security would lead to either loss of data, exposure of sensitive data, unauthorized access to sensitive information or access to classified files. As companies develop, so is the need to secure the data stored within the databases. The benefits of controlled, protected access to the classified files as well as the preservation of the general integrity, standards and consistency of these data is much more expensive (Shamimabi, & Nicholas, 2008).

The concept of database security is much more focused on the, physical security, network security, encryption and authentication. The main constructs that the concept of database security thrives on includes confidentiality or protection from informal disclosure, integrity or prevention from illegal data access, and availability of equipment for identifying and recovering errors that might cause a denial of access to information. In the process of ensuring that the data stored are secure, most companies try to restrict access using software, reduce vulnerability, eliminate interference as well as upgrade their database auditing mechanisms.

Database security problems

Physical Commuters are becoming physically accessible to unauthorized users

Personnel Organizations are becoming more involved in system administration and database security

Procedural Most organizations have same people manage various operation of the database. This exposes the organization and its data to various risks, which necessitates the need for background checks.

Technical Storage, manipulation, and transmission of the data stored in the database. This needs safeguarding by technology that can enforce particular information control policies.

Database securities current and future trends

Database has undergone a number of metamorphoses; the main metamorphosis is the security lay out. Amongst these is the activity monitoring and blocking, classification, Encryption, consolidation, and configuration. However, organization can achieve these using various software. In this light, most companies dealing within database security have tried to developed software and application, but the most effective one is the product of oracle. it has solution for activity monitoring and blocking protection of databases irrespective of the platform is important, however, it should also be cost effective. Most companies use firewalls for windows based databases forgetting the vulnerability of their databases if open source software are used to hack into these databases (Shamimabi, & Nicholas, 2008).

The activities of the database on any network need monitoring to prevent any form of unauthorized access. Oracles have achieved this by preventing SQL injection and role escalations. Any database security system must prevent these in real time. The SQL grammar technology is an effective platform for reducing millions of SQL statement to few SQL characteristics. It has a high level of accuracy, performance and flexibility (Sandhu, 2008).

The system should be able to enforce white; lists and blacklists (positive and negative security model to provide protection without costly false positives. It should be able to allow for addressing SOX, PCI, HIPAA/HITECH, any other regulatory requirement. This should be easy to achieve without necessarily changing the existing databases.

Privileged User and Multi-Factor Access Control:

The cost of protecting corporate data should not be hefty therefore; organization should seek ways of protecting their data cheaply. The most trusted is the Oracle Database Vault; oracle database vault is an effective way by which organization can address regulatory directives. Organization also needs to secure their existing application, as is a mandatory requirement by some regulation of which Gramm-Leach-Bliley Act (GLBA) is the key. They call for separation of the duties from the any other activities related to data management with the aim of securing data and make certain that the veracity of data is managed. Organization face increased challenge of proactively safeguarding of their application data kept in their databases. In this way, organization will use data for the intended purpose and not adversely. Only Privileged database clients should only access data. This requires the need for multifactor policy within the organization that can control the level of access by use of any built in factor. This may include instance, IP address, application record, application bypasses as well as the authentification methods.

Data Classification:

Shamimabi, & Nicholas, (2005), argue that industry leading application software is important. The bottom line of any database security is to classify data effectively in order to mediate access to organization data stored within the databases irrespective of the classification. A good database security system should be seamless to meet all the level of security. Organizations specifically design these systems to meet the requirement of the multilevel security requirements. Organization need systems that can classify data to allow access based on need to know. In this way, organization can protect the privacy of their data and realize the regulatory compliances.  Label security should be integrated with identity management to enable centralized definition of the organization policy. The database systems should be able to support parent Data Encryption and offer hold up for PKI, Kerberos, and any other RADIUS-based well-built validation systems.

Sandhu, (2008), argues that database security should be cost effective and comply with various privacy and regulatory requirement such as the Sarbanes-Oxley, or the Payment Card Industry (PCI) and even the latest Data Security Standard (DSS). However, the Health Insurance Portability and Accountability Act (HIPAA), is a new regulatory mandate, which might require constant upgrading necessitating the need for flexibility and compatibility of systems. Customers should be able to transparently encrypt any of their application data and other sensitive columns like their credit card numbers social security and PIN numbers while in the database as well as in back up devices or even over then networks. The systems need to be cost effective.

Consolidated Auditing And Reporting:

There are many insider threats that most organizations phase. However, databases security systems need to automatically collect and consolidate the audits that the organization carries out in search of quality and total security. Organization are in need of systems that offer them secure and scalable audit warehouses that also enable simplified recording and automating the collection and final consolidation of audit data. Organization need to control database audit centrally and managed from within the database security system to reduce the cost related to IT security.

Secure Configuration Management,

According to Baker, et al, (2009), organization should be ready to increase the level of the database security and compliance with the IT control frameworks. This includes frameworks like Control Objectives for Information and related Technology: (COBIT), global directives require internal control, database security configuration management global directives. It should enhance discovery, and vulnerability scanning while ensuring compliance benchmarking, including any other functionality such as central management of database configuration. Organizations require this to detect and prevent configuration drift in the databases. Organizations should also have systems that can alert them in case of critical patches issued by various security framework developers. This, might help in invoking a patch wizard that automatically deploys patches and ensure that application databases within organizations are always updated and secure from unauthorized access (Bertino, Byun, & Kamra, 2007)..

Data Masking

There is increasing need for marking of sensitive information by replacing them realistic values. In this way, organization can use production data for the purpose of analysis, development, and even sharing with the out-sourced partners. Organization can also share these data with offshore partners as well. This might apply the use of templates readily available in libraries and the format rules. This consistently transforms data with the view of maintaining referential integrity for all application used within the organization.

Conclusion

While protecting the database from intrusion is important, it is also important to underscore the need for management restrain and controlled access. This will go a long way in ensuring that the company has the best protection from espionage, hacking, data leaks and data theft. The main database protraction platforms include oracle.

References

Baker, H., Hutton, A., Hylender, D., Novak, C., Porter, C., Sartin, B., Tippett, P., & Valentine, (2009). The 2009 data breach investigations report. Verizon Business. Retrieved January 31, 2010,

Bertino, E., Byun, J., & Kamra, A. (2007). Database security. security, privacy, and trust in modern data management (Data-centric systems and applications) (pp. 87-102).New York: Springer-Verlag.

Sandhu R., (2009). Database security concepts, approaches, and challenges: IEEE Dependable secure computing

Shamimabi P., & Nicholas R., (2008).Protocol engineering for web service conversations: journal of Engineering Applications of Artificial Intelligence, Special Issue on Agent-oriented Software Development

Posted in Uncategorized