Tuesday, May 26, 2020

Essay about Consumer Behaviour Protfolio - 3830 Words

Introduction Consumers should know their consuming behaviour before purchasing a product. The purpose of this portfolio is to review and evaluate my own consuming behaviour distributed over three categories. Firstly, I will review on my philosophical assumptions and to discuss about my beliefs on the importance of advertising and marketing. Secondly, I will identify a consumer behaviour that I have done recently and to analysis what type of decision maker I am. Finally, I will examine how do I express my complaints to the organisation and my dissatisfaction. These three categories are formed by different worksheets. This portfolio is designed to help and understand how to take advantages from my consumer behaviour when purchasing†¦show more content†¦My group member Ocean who is also from Taiwan, a male and has a similar age as I do responded likely to my opinions. The other girl who is from Hong Kong had slightly different answers to me. Are you surprised by your findings? The results from the group members are not surprising, results are diverse as everyone followed the instruction and answered the above questions by reflecting their own opinions. Part B – Application 3. Using the Engler 2003 reading and consumer behaviour theory in your textbook, explain how your dominant view influences your perception of the relationship between marketing and consumers. My perception between marketing and consumer is that, there must be enough consumers to form a market, which comes up with marketers starting using strategies for â€Å"Marketing†. The relationship between marketing and consumer has always been varying. In the modern society, consumers are tend to be more demanding with their growing affluence, growing complexity of goods and services and also have more leisure. It has become more challenging or the organisations and especially in the service industries sector. (Nair, Suja R, 2009, p.467) How do you think your dominant view influences: i) Your beliefs about the power of advertising Marketing expert Bonura said, â€Å"companies arent always successful simply because they have a valuable product or service.† He believe that organisations should struggle if the

Tuesday, May 19, 2020

In a World of Pay Human Resource Management - 3306 Words

Pay rates have always been an important issue when it comes to hiring workersespecially when dealing with professionals whose talent and experience are highly soughtin the job market. In our case study, we will be discussing the difficulties and challenges of hiring expatriates which in this case will be revolving around pay. The case is about theproblems that arose at a German software Company (Typware) when the managementdecided to hire Anne Prevost whom they consider to be an intelligent careful strategist.Anne is generally agreed to be the perfect match for the job but the rate which Anna isrequesting for the job is causing controversy at Typware because some other workerssuch as Jurgen Mehr (Head of Typware European Marketing) feel†¦show more content†¦Bybroadening the methods by which recruits are sought, applicants can be more readilyfound, no longer leaving Typware with the tough choice of whether to hire just one indi-vidual or not. Typware will likely have several candidates to ll the vacancy, leaving inter-national applicants with less room for bargaining their salary and compensations. Case Study: In a World of Pay3Two methods with which Typware can expand its recruitment sources are via theinternet and through employment agencies. Recruiting electronically would grant Typwarea large source for nding more talented recruits that meet the job specications. Typwarecould place the vacancy on its own website, granting public access to anyone who is in-terested in the company. This method leaves Typware free to give a clear job descriptionso that there is a larger chance to nd suitable applicants for the post. If electronic va-cancies fail to bring the desired results, Typware can recruit through employment agen-cies. A private employment agency would be responsible for lling higher posts, like theone Prevost applied for. The employment agency would look for people who may still becurrently employed and help to maintain condentiality between the employer and thecandidate. Typwares receiving of applicants internationally brings on the added challenge oftrying to formulate a standard for hiring internationally; for example, Schmidt received in-formation indicating that fourShow MoreRelatedCompensation Management : Employee Management Essay1544 Words   |  7 Pages1. COMPENSATION MANAGEMENT In employment contract, the most important term is the remuneration package that goes with labour service. According to International Labour Organization (ILO), describes remuneration as payment system based on effort, productivity and performance. In actual facts remuneration refers to salary or wage and all allowances and financial benefits payable to a worker either in kind or cash in return for his price of labour. In actual facts, employees work or labour to procureRead MoreHuman Resources Management : Human Resource Management835 Words   |  4 PagesHuman Resource Management â€Å"They humanize the brand and help workforce communities thrive† (Who). A human resource management position may be the job for you. Every business and enterprise has a human resource manager, including Starbucks, Disney and even Apple. This job includes planning and coordination, organization, consulting employees and to oversee the work and employees. All the schooling and stress that comes along with this occupation pays off in the end with an enjoyable job. HumanRead MoreEffective Human Resource Planning.1310 Words   |  6 PagesThe key to effective human resource management is human resource planning 1.0 Introduction Human Resources (HR) Management is a multifaceted function. This entity has an important place within companies in helping key personnel decide on the best staff for their needs, among other things. Sometimes, the employees chosen are full-time employees already working for the company or they could be contractors. Regardless, the goal of HR Management is to choose the most qualified person for the job. Read MoreThe Roles and Resposibilies of the Line Mangers in Virgin Atlantics Human Resource Management998 Words   |  4 PagesLONDON SCHOOL OF BUSINESS AND MANAGEMENT NQF level 4: BTEC Higher National – H1 UNIT NO: 21 UNIT TITLE: Human Resource Management ASSIGNMENT NO: 1 ASSIGNMENT TITLE: Human Resource Management UNIT OUTCOMES COVERED: LO 1. Understand the difference between personnel management and human resource management LO 2. Understand how to recruit employees LO 3. Understand how to reward employees in order to motivate and retain them LO 4. Know the mechanisms for the cessation of employment Read MoreThe Human Resource Management ( Hrm ) Position Specific Education1595 Words   |  7 Pageson a human resource management (HRM) position specific education and requirements need to be meet. A bachelor’s degree is the education needed to obtain a job for this occupation. Most bachelor programs for human resource management take four years to complete (Human Resources Management Degree, 2003). With a bachelor’s degree it will give the tools that are expected to enter a variety of business settings (7 Essential Questions, 2015). A bachelor of arts or a bachelor of science in human resourceRead MoreHuman Resource Management On A Global Scale1302 Words   |  6 Pagesto discuss and explain the value of Human Resource Management on a global scale. Human Resources Management is a valuable asset to many organizations around the world. There are several factors that come into play when considering the function s of business on a worldwide scale. Some aspects of Human Resource Management include training, management development, performance appraisal, and compensation. The focus level in individual areas of Human Resource Management may differ between countries, andRead MoreDoes Gender Affect The Ability Of An Individual? Become An Effective Leader?1486 Words   |  6 Pagesgender differences in the corporate world posses several issues for the Human Resource Managers such as management style differences, pay equity, promotion fairness, and work-life balance. Women began entering the workforce in the late 1800s. During that time, women were employed in what society considered female specific careers such as teachers, nurses, and seamstresses and women made up a very small portion of the workforce. This all changed with the on-set of World War II. While the men left to fulfillRead More1. Definition of Human Resource Management Essay749 Words   |  3 PagesDefinition of Human Resource Management: Human Resource Management is the function within an organisation that focuses on recruitment, management and providing direction for the people who work in the organisation. Human resource management can also be performed by line managers. According to the Michael Armstrong â€Å"Human resource management is defined as a strategic and coherent approach to the management of an organisationRead MoreDifferentiate Between Personnel Management And Human Resource Management1500 Words   |  6 Pages1.1. Differentiate between personnel management and human resource management Human Resource Management (HRM) is the purpose within an organization that aims to recruit, manage and provide directions for the people who work in an organization. The HRM department members supply the understanding, training, coaching and management advice, this allows the rest of the organization to operate successfully. The Human Resources (HR) are the people that staff and operate an organization, these people areRead MoreHuman Resource Management For Service Industries1675 Words   |  7 PagesLondon College UCK BTEC HND Diploma in Human Resource Management for Service Industries HNHM 109/ HNTT 118:Human Resource Management for Service Industries Analyze the role and purpose of human resource management in a selected service industry. Justify a human resources plan based on an analysis of supply and demand for a selected service industry business Submitted by: Name: Mary Ann Streling

Friday, May 15, 2020

Corporate Responsibility Stakeholder Perspective Essay

Corporate Responsibility (2) Stakeholder perspective Obesity and fast food Use the stakeholder analysis to look at the impact of fast food (eg MacDonald’s) on each stakeholder group. Should the sale/marketing of fast food be regulated/ restricted? If so why? If not, why not? Childhood obesity has been labeled one of the most serious public health issues if the 21st century. 42 million of the children under five years old are overweight all over the world, in Australia, there is a number shows 17% of the children are deemed to be overweight, which is quite a high figure and a lot public controversy surrounding this issue. Typical ethical issue being identified includes: ↠ Is the consumption of†¦show more content†¦Nutrition and well-being: increased to number of product that are healthier and also offer many ways for customers to learn about the nutrition information of their food 2. Sustainable supply chain: Code of Conduct for Suppliers which describes how McDonald’s expects its suppliers to treat their employees 3. Environmental responsibility: less energy, fewer emissions, and less waste 4. Employee experience: create a diverse and inclusive culture where everyone feels valued and respected 5. Community: the Ronald McDonald’s House Charities and their children’s programs; their local, regional and global partnerships and sponsorships However, people question what they have done is socially responsible from a totally stake holder perspective. First about the charity they set up on Childhood illness, it raises the argument that if this is being socially responsible or just pretending or give them an excuse to label themselves as a socially responsible corporation. Moreover, some employees of this billion valued company still got minimum wage, which means McDonalds are not fully recognising their employee’s interest. However it should be said that if one stakeholder pursues its interest at the expense of all the others then the others will either withdraw their support or look to createShow MoreRelatedOrganizations and Their Ethics and Social Responsiblity Essay733 Words   |  3 Pages Ethics and social responsibility are integral components in developing a strategic plan while considering stakeholder needs. As such, ethics and social responsibility should be deemed as an essential strategic concern within all organizations. Ethics and social responsibility has the capacity to make or break an organization; the success of an organization’s strategic plan is dependent upon it. This paper will explain the role of ethics and social responsibility in developing a strategic plan whileRead MoreEvaluation: Ethical Perspectives on Social Responsibility Essay1143 Words   |  5 PagesEvaluation: Ethical Perspectives on Social Responsibility This paper evaluates Cohen’s article on social responsibility and considers how his perspective and ideas align in comparison with other management experts including Drucker and Friedman. Some key components that are included in the evaluation are: †¢ A definition of the concept of social responsibility. †¢ What Cohen identifies as the social responsibility of a business to the workers, stakeholders, and society as a whole. †¢ How Cohen’sRead MoreStakeholder Theory Of The Firm1423 Words   |  6 PagesEven though the stakeholder theory of the firm served as a comprehensive fundamentally solid concept for corporate social responsibility to branch out of; without the stakeholder theory of the firm there is no corporate social responsibility and vice versa, because business cannot exist without society and society is not sustainable without business, due to advancements in the modern world, business and society have evolved, and traditional business theories have a narrow business scope, while contemporaryRead MoreEthics Reflection Paper818 Words   |  4 PagesReflection Paper Social responsibility and ethics are essential elements in establishing a strategic plan while contemplating the needs of stakeholders. Social responsibility and ethics should be conceived as fundamental strategic concerns within organizations. Social responsibility and ethics have the potentiality to help an organization succeed or fall. The achievement of an organization’s strategic plan relies on it. This paper will examine roles of social responsibility and ethics in establishingRead MoreDifferent Perspectives On Corporate Social Responsibility959 Words   |  4 PagesIntroduction Corporate social responsibility refers to the responsibility that corporate organisations have on those internal and external parties around them. Many influential people have provided different perspectives on what the ideal corporate social responsibility is, two of these people are Friedman and Freeman. However, all perspectives have limitations, and because of this, the Key Gardens principle has been developed to provide a the basis for assessing possible moral minimum for organisationsRead MoreTransparency Is Key Aspect of Corporate Governance1331 Words   |  6 PagesThe boards of directors are responsible for the governance of their companies so there has to be transparency in company reporting. Transparency is key aspect of corporate governance because of implementing corporate governance this will allow stakeholders and shareholders to review and evaluate performance of management and the company this ensures that the board of directors and the executive directors of corpor ations act in the best interest of shareholders and the corporations. It is implementedRead MoreEssay about Social marketing reflects corporate social responsibility1110 Words   |  5 PagesIntroduction This assignment will initially describe social marketing and then indicate how corporations affect stakeholders through companies’ social marketing and responsibility. Following that, the importance and functions of corporate social responsibility (CSR) and social marketing will be demonstrated. Finally, it will explain how organizations reflect CSR and make a short conclusion to indicate the relationship between social marketing and CSR. Social Marketing In the past decades, theRead MoreCorporate Social Responsibility1015 Words   |  5 Pagesa recent time companies are giving more attention to develop a CSR (Corporate Social Responsibility) and mainly their core values. Core values are used in marketing strategies (Berry, 1999) also in customer-retention management in order to create distinctive, long-lasting relationships with customers (Prahald and Ramaswamy, 2004; Normann, 2001) and stakeholders (Pruzan, 1998; Post et a, 2002). The interaction with a stakeholder and concerns a business operation use to understood CSR as the voluntaryRead MoreCorporate Social Responsibility ( Csr )1636 Words   |  7 PagesCorporate Social Responsibility (CSR) has gained a reasonable reorganization in the world of business. Organizations are now voluntarily putting their money in the public cause’s way more than they are required or forced by the law and proud present their doing their annual reports CSR is a form of corporate self-regulation integrated into a business model. CSR policy functions as a built-in, self-regulating mechanism whereby business monitors and ensures its active compliance with the spirit ofRead MoreSouthwest Airlines : Corporate Social Responsibility809 Words   |  4 Pagesrecognized for their corporate social responsibility initiatives is Southwest Airlines. Southwest is a successful organization that perfectly blends operational focus with social obligations which translates into increased revenue and customer support. For several years, Southwest Airlines received recognition as one of the 100 Best Corporate Citizens by Corporate Responsibility Magazine (Corporate, 2015). Analyzing Southwest Airlines’ commitment to corporate social responsibility will demonstrate

Wednesday, May 6, 2020

Service Marketing - 1113 Words

Introduction Lusch et al. (2007) describe as marketing emerged in the beginning of the 20th century, it embraced the goods-dominant (G-D) logic. The concept of the Four Ps of marketing mix – product, price, place and promotion became treated as the basic model at that time. (Grà ¶nroos, 1989) Today, this paradigm is beginning to lose its position. Service marketing is one leading new approach to marketing. Four main characteristics of services defined by Kotler et al. (2009) are intangible, perishable, variability and inseparability (see Appendix A). Thus, Booms and Bitner (1982) turn services marketing into 7Ps by adding people, physical evidence and process. According to Vargo and Lusch (2004), a paradigm shift in the marketing†¦show more content†¦Sheth et al. (1988) believe companies focus from transactional marketing to relationship marketing (RM). Sheth and Parvatiyar (2000) define RM is the process of engaging in cooperative and collaborative activities with customers to create or enhance mutual economic value at reduced cost. One approach to relationship marketing is six markets model (see Appendix D). This model was developed by Christopher et al. (1991) as an instrument for the most comprehensive method to evaluate stakeholder relationships to develop potential successful strategies. (Payne and Holt, 2001) The customer markets are placed in the center of this model to emphasize the relationship with customers and other relevant stakeholders. (Payne et al., 2005) According to six markets model, customer markets are the heart of the six markets model. Galbreath (2002) believes value creation begins with customers as they have true economic value. Bhote (1996) describes the costs of attracting new customers are up to seven times more than maintaining them. However, companies should recognize the cost factors to achieve customer lifetime value and invest the effort in locating and acquiring potentially loyal customers. Loyal customers can be less price sensitive and make market entry difficult for competitors by retaining customer. Today, companies focus onShow MoreRelatedServices in Marketing809 Words   |  3 PagesïÆ'Ëœ Services marketing are crucial compared to product marketing because services are generally produced while serving the prospect and consumed on the spot and it cannot be stored. ïÆ'Ëœ 7p’s of marketing help the company to know and evaluate the interaction between the customers and business, which helps to create successful marketing plan. Telecom service industry: ïÆ'Ëœ Bharti Airtel is and Indian company offering telecommunication services in 19 countries. ïÆ'Ëœ Airtel is market leader in cellular networkRead MoreService Marketing2928 Words   |  12 PagesReview Question (pg. 54, no. 12) The term â€Å"marketing mix† could suggest that marketing managers are mixers of ingredients. Is that perspective a recipe for success when employing the 7 Ps to develop a services marketing strategy? The  marketing mix  is a business tool used in  marketing  products. The marketing mix is often crucial when determining a product or brands unique selling point, meaning that the unique quality that differentiates a product from its competitors, and is often synonymousRead MoreServices Marketing : Marketing And Marketing1846 Words   |  8 PagesService is simply helping someone for profit or nonprofit. Service is intangible product. It means that there is no physical appearance of the object in the process. â€Å"A service is the action of doing something for someone or something. You cannot touch it. You cannot see it. You cannot taste it. You cannot hear it. You cannot feel it. It is largely intangible†. Introduction to Services Marketing - Marketing Teacher. (n.d.). Retrieved November 25, 2014, from http://www.marketingteacher.com/introduction-to-services-marketing/Read MoreMarketing Strategies For The Service Services951 Words   |  4 PagesMarketing Str ategies Our focus and marketing message will be the services offered. We will develop our message, communicate it, and fulfill our commitment to excellence. Websites and Mobile Applications Many hotels have created their own website and mobile applications. It is definitely something to consider if a large portion of our target market uses smart phones and computers. We will therefore customize our hotel mobile application and website. Guests will easily find all important informationRead MoreInternal Marketing in Services Marketing1984 Words   |  8 Pagesimportance of internal marketing in service product development. The first part of this essay will discuss the origin and growth of the concept of internal marketing. Then it will focus on the benefits of internal marketing. In the later part, it will demonstrate a specific case, Mary Kay, which has successfully implemented internal marketing. It shall first briefly introduce fuzzy sets and related concepts. The concept of internal marketing originally emerged from the services marketing literature (BerryRead MoreThe Components Of Service Marketing3122 Words   |  13 PagesTOPIC: MOTAT- MUSEUM OF TRANSPORT AND TECHNOLOGY SUBJECT-SERVICE MARKETING TRIMESTER-1 STUDENTS NAMES-RANJITHA PRAKASH, HARMEET NARANG, SHUBHAM GARG, ASHIMA MAHAJAN, TUTOR-PAUL ROSE â€Æ' CONTENTS: †¢ INTRODUCTION †¢ COMPONENTS OF SERVICE MARKETING †¢ SERVICE MARKETING ENVIRONMENT †¢ INTER-RELATIONSHIP OF THE SERVICES MARKETING MIX ELEMENTS †¢ PRODUCE AND CO-ORDINATE STRATEGIES FOR THE ORGANISATION TO MAINTAIN CURRENT SERVICE MARKET â€Æ' INTRODUCTION MOTAT is a Museum of TransportRead MoreMarketing Healthcare Services1068 Words   |  5 PagesMarketing is concept that helps determine the success of an organizational mission. Essentials of Health Care Marketing (2006) define marketing as, the execution of the conception, pricing, promotion, and distribution of the goods, ideas and services. The author, Berkowitz (2006) goes on to say, â€Å"in order to respond to customers, an organization must develop a product, determine the price customers are willing to pay, identify what place is most convenient for the customers to purchase the productRead MoreService Marketing Mix790 Words   |  4 PagesSERVICES MARKETING MIX I am study of the 7 p’s of KOTAK MAHINDRA BANK in related to marketing research. I also study in details 3 p’s of service marketing like people, process, amp; physical evidence etc. 1) People 2) Process 3) Physical evidence 4) Product 5) Price 6) Place 7) Promotion 1) PEOPLE: - In the people in the service mix in service organization are people assented organization andRead MoreService Marketing Essay1809 Words   |  8 Pageswork in other areas. Since this problem is appeared, service is becoming more important than old days when especially the world always developing fast. As many sociologists believe when the community is developing, the service industries will increase rapidly. Therefore, the more developed countries had higher percentage of service industries. In this essay, it will give the ideas of the description for two marketing theories of flower of service and pricing strategy. By analysing the theories toRead MoreMK2 Marketing Services2746 Words   |  11 PagesMK2 SERVICES MARKETING COURSEWORK ASSIGNMENT QUESTION â€Å"Develop a service blueprint for an organization in the hospitality service industry of your choice† Development Steps; - Decide on the company’s service or service process to be blueprinted and the objective. - Determine who should be involved in the blueprinting process - Modify the blueprinting technique (if required) - Map the service as it happens most of the time. - Be sure customers remain the focus - Track insights that

Is There Pressure On Girls To Have Perfect Bodies. From

Is There Pressure on Girls to Have Perfect Bodies From the time little girls are born, the pressure become a beautiful woman begins. Before they arrive home, baby girls are placed in a beautiful cozy blanket, a beautiful pink hat, a camera from that moment the prepping for a beautiful life begins. Throughout their childhoods young women constantly persuaded to sit up, suck it in and smile to look pretty. As early as their first birthdays women are endowed with societies ideology of beauty in the form of a Barbie. With a perfect figure, perfect hair and long slim legs, Barbie becomes a girl’s first real role model. Barbie never ages and always looks great no matter what. Barbie is beautiful and has a tiny waist and an ever so perfect body.†¦show more content†¦(Weiner 2) Claire Mysko an award winning author and expert on body image, leadership and media literacy explains: â€Å"While social media is not the cause of low self-esteem, it has all the right elements to contribute to it. Social media creates an environmen t where disordered thoughts and behaviors really thrive†. (Weiner 2) For most young women with constant use and easy accessibility social media can become an addiction and the ability to become outlet that can either build up / destroy women’s self-esteem. A recent survey of more than 1000 girls in the United States ages 8-17 sponsored by the dove self- esteem fund, showed that 7 in 10 girls surveyed believed that when it came to issues including beauty and body image they did not â€Å"measure up.† Only 10 percent found themselves to be â€Å"pretty enough.†(Sweeney 3) Among women over 18 looking at themselves in the mirror, research indicates the at least 80% are unhappy with that they see. (Fox 5) We are society literally obsessed with being beautiful. Unfortunately female dissatisfaction with appearance or a poor body image being at an early. The latest survey show that young girls are going on diets because they think they are fat and unattractive. (F ox 5) In one American survey 81 % of ten year old girls had already dieted at least once. (Fox 5) By 13 at least 50% of girls areShow MoreRelatedEffects Of Media On Young Girls1654 Words   |  7 PagesMany young girls are worried about what their body looks like and if they are thin enough to be considered beautiful. Over several years the thin bodies that are promoted through magazines, movies, etc. are displayed as the ‘perfect body’. Very few companies and brands do not use Photoshop or women who are considered plus sized models. The thinness of the models that are promoted is unachievable naturally. Media is a key factor in putting this thought into young girl’s minds that they often carryRead MorePersuasive Essay On The Standard Of Beauty1529 Words   |  7 Pagesthrough a list of everything she hates about her body, â€Å"I wish my stomach was flatter, my chest was bigger, my thighs were skinnier, my arms were more toned, and my waist was smaller.† She looks into the mirror, comparing her body to the bodies of her friends, celebrities and the images she sees in magazines. Alyssa does not look like all those girls and this makes her feel gross, insecure and out of place. Beauty standards are so high they create negative body images and women who hate the way they lookRead MoreSociety s Pressure And Promote A Perfect Body Type For Women1179 Words   |  5 PagesSociety’s Pressure to Promote a Perfect Body Type for Women For centuries, the perfect body for women in society has played a significant role. It is an ongoing issue around the world that is a battle between the forces. Everywhere from television, magazines, cosmetics, gym, diet supplements, nevertheless opinions of family and friends. Every day most women struggle with the idea of society, not viewing them as a beautiful person or sex symbols. While others engage in achieving this goal to fitRead MoreDangers Of Peer Pressure On Girls1345 Words   |  6 PagesDangers of Peer Pressure on Girls As a little girl I had much confidence about myself and felt I looked the best from my school as well as many other girls from my school. Nowadays, many girls are pressured into being perfect in a way they feel they will never accomplish. Little girls such as ten year olds have started to show low self-esteem and hate to their body image because of the models that are being constantly promoted. As 10TV stated, â€Å"When you were 10 or 11, you probably didn’t give muchRead MoreThink Of A Beautiful, Ten-Year-Old Girl Standing In The1281 Words   |  6 Pagesten-year-old girl standing in the mirror, clutching her stomach and tears rolling down her cheeks because she is being teased for not being as skinny as the other girls in her class. She looks at the models on TV and envies their skinniness. She wants to look just like them. At ten years old, she starts running after dinner and not eating as much as she use to eat. That beautiful little girl is just like every woman all o ver the world; she is pressured to by the media to have a â€Å"perfect body.’ Women allRead MoreEffects Of Anorexia And Other Eating Disorders914 Words   |  4 PagesWhen people are surrounded by images of young celebrities who are painfully thin-or very slender with large breasts- girls growing up in todays world feel the pressure of having to meet the standards. While trying hard to look just like their famous idols, a lot of those people will fall prey to an eating disorder, and some will even abuse drugs that will help them lose weight. Also it may lead to self-doubt, depression, extreme dieting and even at the worst an eating disorder. Everywhere you goRead MoreMedia s Representation Of Body Image1532 Words   |  7 Pagesinfluence by the media is body image, large number of young women and girls look up to people in the media and are influenced by the way they look. Now days you’re appraised on your attractiveness, the way you look, the way you dress, and es pecially how thin you are. The media’s representation of body image has contributed to the social trend of an unhealthy lifestyle. Women and young girls today are fixated on trying modify the way they look to achieve the perfect body image set by the standardsRead MoreEssay on The Medias Pressure on Women to Maintain a Slender Figure1552 Words   |  7 PagesToday’s media places an extreme amount of pressure on women to maintain a slender figure. Through childhood to adulthood, women are bombarded with images of stick skinny women, and this is the way almost every woman wants to look. Although there are other factors, the media is the primary source of the obsession with being thin. Why has this become such a popular trend? This is what society says is acceptable. It has been proven that these images of perfect women do affect the normal women whoRead MoreSocial Media And Its Effects On Society1447 Words   |  6 PagesLooking in the mirror and not liking what you see is extremely common, among teenage girls especially, but where does it stem from? Is it human nature to see oneself in a negative light? Perhaps it comes from something more tangible, such as one’s surroundings. Everyday, people are exposed to models and celebrities on social media living unrealistic and uncommon lifestyles. Why does everyone insist on striving for these absurd standards? Perhaps it’s because people, predominantly millennials, prideRead MoreThe Influence Of Media Reporting On Society s Perception Of Beauty1730 Words   |  7 Pagesteenage girls. As such, based upon a macro perspective, the societal roles, status and expectations of young women have been impacted negatively. This paper will analyze how the combination of media reporting, socioeconomics and sociocultural factors contribu te to the development of eating disorders as well as how society s perception of beauty has been distorted. This paper will further support the notion that societies perception of a female’s beauty is determined by their perceived body image

Implementation of IOT in Health Care System-Samples for Students

Question: Discuss about the Implementation Of IoT In Health Care System. Answer: Introduction Internet of things has evolved over the years, thanks to the advancement of various interconnected technologies like IPv6, wireless network and microcontroller and sensor electronics. The evolution of the IoT has heavily influenced various sectors like business, sports, health and many more. IoT in healthcare is an important research topic as the technology has lot of potentials for the sector in terms of bringing more automation and transparency in healthcare administrations (Gope Hwang, 2016 ). However the threats that the technology poses along with the benefits needs careful attentions. The task to control the systems and integrate it with the IoT technology is indeed challenging. Researchers are particularly concern about this, even more than the benefits that the system will provide following the implementation . Different methods have been provided by different researchers to control IoT devices and the topic has managed to get widespread attentions and provides an excellent opportunity to conduct further research in the field to come up with even better solutions (Wu et al., 2017). Data protection is one of the critical issues that need to be considered when dealing with the network devices. Security plays a vital role in the context of IoT technology (Tyagi , Agarwal Maheswari , 2016). In case there is a malicious attack or interference takes place and the attacker becomes successful in hacking the network of the system then they will be able to steal important data that is intended to be kept safe and private for the data is highly sensitive in nature. In order to protect the devices from outside access that is intended for illegal purpose, it is important to have the correct security measure in practise. Authentication has an important role to play to ensure security of the IoT devices. Different researchers have provided different mechanism for authentication for the IoT devices and network (Bhatt, Dey Ashour, 2017). However the mechanisms have certain drawbacks. The mechanisms have not considered the limitations of IoT devices which have often very limit ed resources in terms of memory and processing power. In order to design effective authentication techniques it is important to combine the characteristics of the end devices and a proper balance should be maintained between the available resources so that efficient, secure and suitable authentication mechanism can be designed that suits the need of the IoT environment (Laplante Laplante , 2016). Here the overall introduction of the topic is given. Factors like importance of the topic, justification for the topic selections and the need for the research on the topic have been discussed. The process to ensure the data security in IoT is challenging task. The report will discuss the methods to ensure the data security and how it can be implemented using the ECC authentication algorithm. Background/Literature Review Li et al.,( 2018) have talked about the importance of RFID technology for the device authentication in the IOT environment. RFID or the radio frequency identification technology helps to identify a device remotely with the RFID tag. The authors points out that RFID technology is highly efficient I recognizing devices. The authors further add that in the IOT environment, millions of devices are connected to the internet and with each other as well. Hence it is important to implement techniques that can help to identify the devices amongst the polls of connected devices. RFID technology has lot of potential in this context. RFID tags has the ability to store information and send this information remotely, thus enabling the wireless communication between the devices and the database that store information about this devices. This information can be then used for the identification of the devices. However the authors suggest that there should be proper data monitoring technology in order to derive useful information from the data sent by the devices connected over IP network. Once the data is sent by the smart and RFID enabled devices over the IP network, the data is then processed in the central data base and converted into human readable format. One of the most important features that make RFID tags more efficient than the standard barcode technology is the ability of the RFID tag to support more advanced communication style. In order to read information from the RFID tag it is not mandatory for the device to be in the line of sight which means that the device can be tracked from anywhere. In the IOT environment, wireless communication plays an important role and technology like this, according to the authors, only increase the efficiency of the communication with ease in device identification. Lopes Hilgert (2017) have proposed for two phase algorithm for group authentication: pre authentication phase and group authentication phase In the pre authentication phase the GA of the group who is responsible for creating the group generates a public key and associated private keys. This keys are then used for authenticate the devices in the group. The keys are generated using the threshold cryptosystem. In the group authentication phase the authenticity of every devices in the group is checked using the private and public keys that were generated in the pre authentication phase. The GA in this phase creates another random secret key that is shared among all the devices in the group and the devices need to address the random key to complete the authentication process in the group authentication phase. Jan et al., (2016) have provided a mutual authentication schema for the IoT implementation in health care. This schema helps to validate the identities of the IoT devices. The schema first identifies the devices in the IoT environment before the devices are actually integrated in the real network. In order to perform the authentication in the IoT environment before integrating with the network the authors have proposed for decreased communication overhead. The schema is based on the. Constrained Application Protocol or CoAP. The authentication is performed using the 128-bit Advanced Encryption Standard or AES. The authors suggest claims that due to such high level of encryption value the devices are highly secured in the IoT environment where the security playsa major role for successful implementation of the technology. In the CoAP technique, the identity of the server and the client is first is verified. Based on the identity the system then allows the client to access the server b ased on the conditions that was determined by the protocol in the request made by the client. Thus it is not easy for the user to access the server without performing proper authentication and the verification of the request is also necessary to get access to the server. Hofheinz Jager (2016) have proposed for public key algorithm for the authentication purpose. Data that is collected by the IoT devices is stored in the cloud servers and secured database. However it is important to note that in order to protect the data it is very much important to protect the authenticity and the integrity of the data. The integrity of the data can be maintained by the mechanism called message digest which is a secured hash algorithm. The algorithm produces predefined hash value to secure the digital content. It is not easy to access a digital content and modify it without the proper authentication if the content is secured with a predefined hash value. The authenticity of the data can be maintained by the public key based key based digital signature technique. In the public key based cryptography algorithm two keys are generated known as public and private key. The private key belongs to the owner of the data which needs to be used to prove the claim of the user t hat the user really owns the data. The public key is for the use of other users who wants to access the content. The public key is accessible to anyone who wants to verify the signature of a digital content or data. Stallings (2016) has proposed for hashing algorithm for digital content cryptography. The signature for the data is produced by hashing the digital content and a hash value is produced in this process. The value is attached to the content as the form of digital signature. In order to the read the content the digital content needs to be hashed again and in the second step the hashed value which is reconstructed in the hashing of the content has to matched with the public key along with the signature that is attached with the content. Su, Wong, Chen (2016, May) have proposed for a group authentication technique. The technique is based on the Threshold Cryptography. The scheme is used for the authenticate devices in a group. The authors describe that in the IoT environment lot of devices are connected together. Hence the task of securing those devices is a challenging option. However with the use of the group authentication technique it is possible to authenticate devices in a group. The authors have used the method of releasing the token to perform the authentication. The method is based on the Shamirs secret sharing scheme. The algorithm is implemented in the Wi-Fi environment. Each group in the network constitutes a set of devices and the devices communicate with each other by sharing secret key. There may be any number of groups and the range of the connectivity is decided based on the Wi-Fi standard. The groups can even overlap with each other and one device may belong to more than one group. However there is a primary device in every group which is responsible for monitoring the communication in the group. Each time a new device is added to the group, a new key pairs is generated which is distributed by the primary device within the group to keep the existing devices in the group updated about the inclusion of the new devices in the group. The TCGA algorithm constitutes of five key modules 1. Distribution of key. 2. Updating of key. 3. Generation Group Credits. 4. Authentication of Listener. 5. Message Decryption Moosavi et al., (2015) have proposed for SEA architecture for IoT based healthcare system. The architecture consist of smart health gate-ways. The health related information is captured from the sensors that are either body-worn or implanted. The sensors collect data of the patient and send it to the database for monitoring purpose. The architecture consists of medical sensor network, smart heath gateway and back end system. The medical sensor networks helps in sensing, identifying and communicating the medical related data. Sensors are attached with the patient. The sensors are highly advanced and help to collect necessary information about the patient condition. The sensors measure body temperature and collect data about the bio-medical and context signal. This data are useful to monitor the condition of the patient. The sensors can also supplement the data with the context information like date, time and location which helps toget precise information about the medical condition of the patient. The bio medical and the context signal that is captured by the sensors are transmitted to the gateway. The data is sent to the gateway with the help of wired and wireless communication protocol. the communication protocols include standard communication standards like serial , SPI , Bluetooth technology. Signal can also be sent using the Wi-Fi or IEEE 802.15.4 wireless communication standard. Rahman et al., (2015, January) have proposed for smart health gateway. Smart health gateway which supports the communication protocol serves as a connecting point between the MSN and the local switch or network. Data generated from different sub -networks are received by this gateway. The protocol conversion is also performed by the gateway. The gateway also aggregates the collected data and is also capable in data filtering. The gate way even provides some higher level service like dimensionality reduction of the collected data. The back end system constitutes the remaining part of the architecture. It includes a cloud platform where the data is stored for processing. The system also includes data warehouse and big data analytic servers where data are analyzed to extract the meaningful information from the collected data that helps to find the relevant information about the patient. The back end system also consists of local data base of the hospital where the data is stored tempora rily before it is sent to the cloud server and big data analytics server. The system also consists of web clients which provides the interface for the data visualization and data apprehensions. Porambage et al., (2014) have proposed for two phase authentication protocol to authenticate and secure the IoT devices. According to the authors the protocol is highly efficient for authentication purpose. In the wireless sensors networks that follows centralised architecture consists of a central entity. the sensor nodes in the network collects information from the sensors and send it to the central entity that is responsible tom maintain the centralised network, the fadta is themn proceesed by the central entity and the information is provided over the network. However IOT follows distributed network architecture. There is no central unit that collects and process the information. The mechanism is completely different from the centralised network. Here the sensor nodes are responsible for sensing the data. The data is then processed by the sensor nodes itself and then the information is exchanged with other nodes in the network. However there are certain security concern that need s to be addressed while following such distributive network architecture. There are serious threats of the devices to be hacked and once a node is hacked it is possible to exploit other nodes in the network as well. once the nodes are hacked it is possible to obtain sensitive information from the nodes and based on the field of application the sensitivity of the data varies. When implementing IoT in the context of healthcare it is much more important to secure the information with proper authentication technique. The authors have proposed two phase authentication technique. In this proposed technique the authors describes the mechanism to authenticate the sensor nodes and the devices that are used for end to end communication. In the first phase the nodes generates a authentication key to be used by the communicating devices. In the next phase the communicating devices will generate another key. The key will then be verified by the communicating node and if matches only then the com munication will takes place. The mechanism, as per the authors will enhance the security of the devices and also help to authenticate the devices more securely. Lee, Alasaarela Lee (2014, February) have suggested for a authentication scheme for securing the IoT servers. The scheme is based on Elliptic Curve Cryptography (ECC) based algorithms. The authentication protocol proposed by the authors is applicable for the embedded devices that follow the HTTP protocol. The protocol makes use of the cookies generated by the HTTP protocol for authenticate the devices. The devices need the TCP/IP configuration to be connected with the protocol. The embedded devices are often limited in size and processing power. That is why the algorithm designed for the embedded system has to be efficient and it has to address the constraint that the embedded devices bring in the IoT environment. The architecture that has been proposed by the authors uses HTTP cookies which, according to the author have been optimized so that it fit in the constrained environment of embedded devices. The protocol consists of three phases namely Registration phase, Pre-computed and login phase and authentication phase. In the registration phase the devices register with the cloud servers and upon successful registration the server send back a cookie which is stored by the device. In the next phase or the Pre-computed and login phase, the device has to send a login request to login. Once the login request is accepted the device enters into authentication phase. In the authentication phase the device needs to send the cookie provided by the server during the registration phase. The server then checks if the cookie matches with the cookie provided by the server during the registration phase. The device is authenticated only if the cookies matches, otherwise error message are generated by the server. The authors claim that the mechanism is quite useful and advanced in managing authentication related issues. Solutions Based on the literature review the project finds out the following requirements: Review of the authentication issues in the IoT enabled healthcare system Design of proper authentication algorithm Review of the algorithm Comparison of the algorithms proposed by previous works Suggest the most appropriate algorithm based on the assessment of the strength and weakness of other proposed techniques by previous researchers. Future Research One of the major challenges that make the IOT environment venerable to security threats is the lack of proper security measure for the device authentication. There are lot of security issues in the IOT environment. However the prevent resource exhausting is the most concerning fact that the developers must address in order to maintain the device security intact in the IOT environment. In order to propose the effective security algorithm for the IOT devices the resource constrains must be taken care of. IOT devices are often resources limited. The devices have very limited resources in terms of processing power and storage memory. Hence the algorithm must be optimized in such a way it supports the limited processing power and storage of the IOT devices. The mechanism that has been proposed in the report has been optimized according to the resources available. The mechanism is based on the Constrained Application Protocol (CoAP) [31] and Elliptic Curve Cryptography [32]. The application protocol or is designed in accordance with the IETF working group. It provides overview about the Constrained Restful Environment (CoRE). The knowledge about the CoRE helps to define the implementation architecture that is suitable for the the sensor nodes implemented in the highly constrained environment like IOT. The CoAP protocol is highly efficient to create communication between these constrained nodes. The protocol defines the web interfaces that help to make communication between the nodes to make device communication over the connected network. In the figure 1, different protocol stack has been shown. These protocols are commonly used in the IOT environment. In order to understand the effectiveness of the CoAP protocol for the IOT environment, it is important to have in-depth knowledge about the most widely used protocol that has almost made dominance on the internet communication technology. It is known as The Hypertext Transfer Protocol or HTTP. In order to understand the reason why the HTTP protocol is not chosen for the IOT implementation, despite it being so popular and widely used for the internet communication, the drawbacks of the protocol must be clearly defined and also needs to be carefully analyzed. HTTP is basically a structured text that finds the logical link or the hyper link between the nodes that contains the text. This links are used by the protocol to facilitate communication between the nodes. With the introduction of the Internet of the things or IOT, the definition of the internet has been completely redefined. The internet is not all about the human interaction anymore. With the IOT, machines and the devices are g etting connected to the internet in a rapid rate. With the context of the internet getting redefined, the requirements for the communication are also changing. The IOT communication has some special needs which the HTTP protocol is not efficient to address. In IOT communication, the information generated by one node needs to mapped to all the nodes that participates in the communication. small packets of information must be shared in high volume due to vast amount of data generated by the devices or the communication nodes. HTTP protocol is not efficient in addressing these requirements of IOT communication. the important feature that makes the CoAP appropriate for the IOT communication is that it allow machine to take the roles of both client and server and also allows to switch between these roles whenever it is necessary. It also supports asynchronous message transfer over the protocol which follows datagram orientation. One popular example of such protocol is the UDP protocol. A n optional request or response layer is also included with the CoAP messaging for providing connection that is reliable like the Transmission control protocol or TCP. The CoAp layer has been shown in the figure 2.The operational layer is useful for the dealing with the UDP protocol as well as dealing with the asynchronous interactions between the communicating needs. A 4 byte header file is generated for minimizing the traffic due to traffic overhead. CoAP includes methods like GET, POST, PUT and DELETE which provides codes for the device to response to the communication request. The code is also necessary for reflecting the execution status for the client request. CoAP provides four different types of messages: CON Message: It means Confirmable request. When a CON message is sent by a source node, then it is the responsibility of the recipient to send the response message using the ACK or the Acknowledge message. The message is of high importance and must be treated with importance . NON Message: It refers to the message that is Non-Confirmable. Whenever a NON request is sent by the sending node, the is no need for the recipient to respond to the message. The message is not of much importance ACK Message: It refers to Acknowledgement messages. Once the sending node sends the CON message, it should be acknowledged by the recipient. However it is not sufficient to acknowledge the message by the recipient the sending node must be made aware of the fact that the recipient has received the message and it should be forwarded to the sending node. The recipient must sent the ACK message to the response of the CON message. The ACK message may also contain information about the details about the message processing. RST Message: It refers to the RESET message. Now it might be possible that during the communication there occur errors due to reason like network traffic, internet speed. Now in order to make the communicating node aware of this, the recipient of the message must send RST message. It will help the sending node to understand that error has been occurred in the communication process. in case the recipient does not make the sending node of this communication error, it will continuously send message to the recipient, it will not only increase traffic over the network, a lot of data packet will remain on the network without processing which will affect the communication between other communicating nodes connected to the same network. The RST message will help the sending node to understand that the recipient is not able to understand the message or the recipient is no longer interested in receiving the message which will help to avoid network traffic due to sharing of message without any particular pu rpose. In order to achieve security restrictions of similar level, ECC considers key of smaller sizes. Although there are several other asymmetric cryptographic keys, but the security level provided by the ECC algorithm is much better and improved. Those features provided by the other algorithms considers larger key sizes, for instance a 256-bit symmetric key must be secluded by at least 15,000-bit RSA, on the other hand, ECC uses an asymmetric key size of only 512 bits to ensure equivalent security level. This decrease in the key size makes it possible for significant cost saving and more compacted design execution. Chips that are smaller are able to run cryptographic process in a much faster rate. It also minimizes the power consumption thus increase the efficiency .these features are especially appropriate for environments where there are resource constrain issues. A comparison of key size with equivalent security levels between ECC and RSA has been provided in the subsequent section. Key size ( ECC) Key size ( RSA) Reduction ratio (approximate) 162 1024 1:16 256 3074 1:12 383 7684 1:20 512 15365 1:30 The authentication mechanism proposed here will help to implement ECC authentication mechanism over CoAP connection. These two approaches when combined will help to optimize overhead to the IOT network. It will further help in minimizing the communication as well as the pocessing power that is required to make authentication of the IoT devices. It is also effective in achieving powerful and efficient security for the IoT devices. Authentication mechanism can be passing through multiple stages. Stage1: It is the initialization phase. Here the Control system generates a private key that is used for communication with the ECC. Stage2: It is the device registration phase. It includes the pre authentication process over CoAP where IoT devices are checked if it is already authenticated or not. Control station will then checks the device ID that will help to find out whether there is a corresponding entry for it. If there is no entry of device then an ID will be generated with the help of control private key. Along with it an encrypted password will be generated which will be stored back in the IoT device. Stage3: Mutual authentication stage, IoT device use this password to generate authentication key and send it back to the control system when it is try to connect it. Control system check these key using corresponding IoT entries stored at the control system. Stage4: All traffic pass between IoT devices and control station then will be encrypted and secured against different types of attack. Figure 5 proposed authentication mechanism shows the detailed steps of proposed authentication method between IoT device and control station. Advantages/ Disadvantages (5 marks) Constrained Application Protocol can be referred to as the web transfer protocol that is specially designed in order to make it compatible with constrained devices as well as constrained networks CoAP are specially appropriate for designing protocol that implements a request/response based interaction that is implemented for communication between the endpoints of communicating nodes or the networks CoAP contains some key concepts of the Web including URIs and Internet media types CoAP happens to be very common and at the same highly reliable. It is an effective choice for the application of data transferring, especially for the IoT environment. Elliptic Curve Cryptography refers to asymmetric cryptographic algorithm. It is applied for providing security and that too with the same level as provided by RSA. However the special feature of ECC is the key size as it works with much smaller key sizes. ECC works with much smaller key sizes while providing security of higher level . Due to smaller devices and lower processing power the IOT environment is highly constrained. However ECC works finely with the constraint environment of IOT ECC has the ability to provide encryption that is highly reliable. It also helps to minimize the overhead of the IOT network. Conclusion In this paper, a thorough review has been conducted on the use of IoT in healthcare. Security issues are highly critical when dealing with the healthcare system. In order to overcome the issues authentication mechanism has been proposed. The mechanism is highly reliable. While proposing the mechanism it had been made sure that the mechanism is compatible with the IOT devices. The IOT devices have limited memory and also have limitation in terms of processing power. Hence it has been made sure that the proposed mechanism address the constrains of The proposed reliable authentication mechanism mainly depends on CoAP with ECC algorithms. Proposed method fit the requirements of IoT constrained devices. Small ECC key has reduced the calculation requirements while providing a powerful encryption better than other types of cryptography. References: Bhatt, C., Dey, N., Ashour, A. S. (Eds.). (2017). Internet of things and big data technologies for next generation healthcare. Gope, P., Hwang, T. (2016). BSN-Care: A secure IoT-based modern healthcare system using body sensor network.IEEE Sensors Journal,16(5), 1368-1376. Laplante, P. A., Laplante, N. (2016). The internet of things in healthcare: Potential applications and challenges.IT Professional,18(3), 2-4. Tyagi, S., Agarwal, A., Maheshwari, P. (2016, January). A conceptual framework for IoT-based healthcare system using cloud computing. InCloud System and Big Data Engineering (Confluence), 2016 6th International Conference(pp. 503-507). IEEE. Wu, T., Wu, F., Redout, J. M., Yuce, M. R. (2017). An autonomous wireless body area network implementation towards IoT connected healthcare applications.IEEE Access,5, 11413-11422. Hofheinz, D., Jager, T. (2016). Tightly secure signatures and public-key encryption.Designs, Codes and Cryptography,80(1), 29-61. Jan, S. R., Khan, F., Ullah, F., Azim, N., Tahir, M. (2016). Using CoAP Protocol for Resource Observation in IoT.International Journal of Emerging Technology in Computer Science Electronics, ISSN, 0976-1353. Lee, Y. S., Alasaarela, E., Lee, H. (2014, February). Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system. InInformation Networking (ICOIN), 2014 International Conference on(pp. 453-457). IEEE. Li, C. T., Lee, C. C., Weng, C. Y., Chen, C. M. (2018). Towards secure authenticating of cache in the reader for RFID-based IoT systems.Peer-to-Peer Networking and Applications,11(1), 198-208. Lopes, A.P.G. and Hilgert, L.D.O., 2017. Group authentication protocols for Internet of Things (IoT)QoS and Security Properties Evaluation. Moosavi, S. R., Gia, T. N., Rahmani, A. M., Nigussie, E., Virtanen, S., Isoaho, J., Tenhunen, H. (2015). SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways.Procedia Computer Science,52, 452-459.Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., Ylianttila, M. (2014, April). Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. InWireless Communications and Networking Conference (WCNC), 2014 IEEE(pp. 2728-2733). IEEE. Rahmani, A. M., Thanigaivelan, N. K., Gia, T. N., Granados, J., Negash, B., Liljeberg, P., Tenhunen, H. (2015, January). Smart e-health gateway: Bringing intelligence to internet-of-things based ubiquitous healthcare systems. InConsumer Communications and Networking Conference (CCNC), 2015 12th Annual IEEE(pp. 826-834). IEEE. Stallings, W. (2016).Cryptography and network security: Principles and practice. Pearson. Su, W. T., Wong, W. M., Chen, W. C. (2016, May). A survey of performance improvement by group-based authentication in IoT. InApplied System Innovation (ICASI), 2016 International Conference on(pp. 1-4). IE

Tuesday, May 5, 2020

Copd Care Plan free essay sample

Martin, a Respiratory Therapist with a degree in Elementary Education and over 30 years experience in respiratory care, who promotes understanding of COPD through posting educational materials that are easy to understand, and actively responding to patient posts and questions. BreathingBetterLivingWell. com was also founded by Jane M. Martin. The main patient concern was finding others who understood what they were going through. -Some voiced a sense of loneliness. -Others did not want to scare loved ones or cause worry, but needed someone to talk to. Any many had fears of dying or the unknown that they did not want to express to their family or show weakness. -Some were looking for support or advice from those with similar experiences. -Others wanted companionship. -And a few had a family member or spouse that did not or did not want to realize the severity of their condition or accused them of exaggerating their symptoms. We will write a custom essay sample on Copd Care Plan or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Another common patient concern was what financial resources are available. -How do you qualify for financial help? -How do you apply for SSI benefits and Disability? -Where can you find discounted medication resources? And finally, many patients were looking for their condition or symptoms to be explained. -They wanted to learn more about their diagnosis. -They were curious as to how soon you may experience symptoms after diagnosis. -A few were experiencing panic attacks and wanted to know if others had the same experience and what could cause them. (Albuterol can cause panic attacks) What I found surprising was the overwhelmingly optimistic attitude of many of the members and their desire to share their experiences and new information while offering encouragement. A common phrases was â€Å"COPD is not a death sentence. † Even or especially when some patients would post a negative or depressing comment, it seemed others from their community were right there to lift their spirits and instill hope. I would definitely recommend patients who can navigate the internet to join a blog to increase their support system. Patient Care Plan GOLDs definition of COPD: â€Å"A preventable and treatable disease with some significant extrapulmonary effects that may contribute to the severity in individual patients. Its pulmonary component is characterized by irflow limitation that is not fully reversible. The airflow limitation is usually progressive and associated with an abnormal inflammatory response of the lung to noxious particles or gases. † COPD is the fourth leading cause of death in the United States, but is projected to take the number three position by 2030. It accounts for ~5% of all deaths annually. Cardiovascular diseases 2-Cerebrovascular diseases 3-Cancers 4-COPD The prevalence of COPD is nearly equal among men versus women, but female COPD patients have about three times the mortality rate of their male ounterparts. The reason for this is unclear, but may be due to the increased tobacco usage and decreased smoking cessation in women compared to men. COPD is not curable, therefore it is important to encourage proper treatment to improve the patients quality of life. It is imperative for pharmacists to understand the diagnosis process for COPD and be able to interpret basic pulmonary function tests in order to effectively council patients and recommend a care plan.