Tuesday, December 31, 2019

Know Thyself Essay - 926 Words

Consider the ancient imperative â€Å"know thyself†. How can different ways of knowing help us as individuals and communities to achieve this goal? Shakespeare once said, â€Å"Life is but a stage and men merely players on it.† In order for us to become main characters on this stage, instead of mere extras, we must be able to truly identify who we are as individuals first. After this has been accomplished we can find out how we can benefit our society. When complete self-awareness, self-knowledge, self-confidence, and self-respect are reached, than you can truly â€Å"know thyself.† In all of the Natural Sciences, be it physics, chemistry, or biology, the physical world is dissected and analyzed. Using a language of their own, the Natural Sciences go†¦show more content†¦They are Identity Foreclosure, Identity Diffusion, Moratorium, and Identity Achievement. My sister has passed the Identity Foreclosure state where she accepts everything blindly and does not question her surroundings. She is now in the Identity Diffusion state in which she is still not looking for an identity for herself, yet she is beginning to question her surroundings. In this stage she has a complete lack of self-identity and no commitment to her personal goals. Most teenagers at our age, about 16 or 17, are in a state of Moratorium in which we still do not know who we are, but we are striving to create an identity for ourselves. This is reflected in the clothes we wear, the music we listen to, and the groups we tend to hang out with. The last stage, which many do not even reach, is the Identity Achievement stage, in which the person is happy with their share in life and is committed to their own values and goals. Henry Shaw once said, â€Å"It is not only the most difficult thing to know oneself, but the most inconvenient too.† Many people who lack a clear identity, and therefore feel insecure because of it, may turn to chat rooms or to gangs, where they can portray themselves as anything they want to be. Knowing thyself is extremely important to both the individual and society in general, for it causes the person to become more committed to their goals, and allows them to truly understand others. A society populated by individuals is much moreShow MoreRelatedThe Delphic Interest to Know Thyself613 Words   |  2 PagesSocial therapists and different mortals are entranced by the Delphic interest to Know thyself. Really, it was not the prophet talking, however presumably a pedant sovereign who put these words on the front of the sanctuary of Apollo. He didnt ask that we run quick, get in shape, or win fights. He asked that we know ourselves. Why? What did he mind? Maybe the skeptic sovereign suspected that in the event that we knew ourselves, social order might be fit as a fiddle [which raises the inquiryRead MoreAnalysis Of Know Thyself 1499 Words   |  6 PagesKnow Thyself has always been seen as the fulcrum of the western philosophical tradition. Questions of subjectivity, the self and personal identity continue within the contemporary philosophical discourse to this day. It still remains a key factor connecting western and eastern philosophy and modern with ancient philosophy. When Sartre takes up the question in Transcendence of the Ego, it marks a fundamental shift in the western philosophical tradition. Beginning with Descartes, and continuing upRead MoreSocrates659 Words   |  3 PagesSocrates Socrates was accused of many things in the Athens market. Socrates was accused of being a man who makes the worse argument into the stronger argument. A man who knows about the heavens and earth and therefore any one who believe this must not believe in the gods. Socrates was accused of being an atheist. Most of the people that followed him around his quest were inquisitive. Where as most adults would walk by Socrates with his â€Å"annoying question† the youth stopped to see what heRead MoreThe Unexamined Life Is Not Worth Living Analysis1870 Words   |  8 Pagescareer, or is it all of these things combined? Socrates, often thought of as the father of western philosophy, claimed that knowing one’s self and living virtuously, is what makes life worth living. â€Å"the unexamined life is not worth living† and â€Å"Know Thyself† are both common quotes from Socrates, that help us define his concepts of psyche, and techne, and how these concepts form t ogether to explain virtue and his view of intellectualism or reason over ego. First, let’s look at the word virtue and seeRead MoreEssay about Know Thyself1335 Words   |  6 Pagesâ€Å"Know thyself† – Socrates. Self-awareness is the act of being fully perceptive about one’s innermost self; an essential part to one’s life. However, this self-inquiry is not easily obtained. â€Å"Self-awareness and its accompanying egoism profoundly affect peoples lives, interfering with their success, damaging their relationships with other people, and undermining their happiness.† (Leary) One’s self can become distorted through the influence of society and their beliefs. â€Å"Knowing others is wisdomRead MoreEQ is More Important than IQ1452 Words   |  6 Pagesenabiling- or disabling thought itself. How we do in life is determined by both -It is not just IQ but EI that matters.† (p. 28) Much evidence testifies that people who are emotionally adapt, know and manage their own feelings well are at an advantage in any domain of life. For example people who know how to manage their emotions are people whom we like to be around with because their emotional skills make us feel good. There is growing evidence that fundamental ethical stance in life stem fromRead MoreSocrates : A Classical Greek Philosopher And The Father Of Western Thought752 Words   |  4 PagesIndividual Creative Paper Socrates was a classical Greek Philosopher and the father of Western thought. He was born in Athens Greece, in (c. 470-399 B.C.E.) (Archetypes of Wisdom, 95) Little is known about his life, but what we do know through the writings of his students, especially Plato, is that Socrates had a unique philosophy and charisma. Socrates was born to Sophroniscus a sculptor, and mother Phaenarete, a midwife. Because he was not from a royal family it is assumed that he most likelyRead MorePerseverance772 Words   |  4 Pagesteachings, his word prepares us to face any and everything Satan has planned for our lives. No matter what the devil throws our way our persistence is key to showing the devil our God is an awesome God!! IITimothy 2:15 says 15Study to show thyself approved unto God, a workman that needeth not to be ashamed, rightly dividing the word of truth. When you have perseverance a deep commitment is shown ***Would you all agree that the Christian walk could be compared to a Triathlon, not a quickRead MoreWhy Socrates Were Alive Today?920 Words   |  4 PagesIf Socrates were alive today, how must he feel about the Delphic inscription of â€Å"Know thyself† would still be a relevant question in which our society is still trying to answer in 21st Century living? In today’s fast paced society, the individual can easily get dehumanized by their work, technology, family commitments and the political process. A person is easily swayed by public opinion and not be able to think for themselves in fear of retribution and conflict. Sometimes it is easier to go withRead MoreOedipus Victim Of Fate Essay876 Words   |  4 Pagesstill wevers in fates power. Inscribed on the Temple of Delphi are the words, â€Å"Know thyself.† Can we ever really â€Å"know ourselves†? And if we can, do we want to know what we’ll find? Was Oedipus’ quest for self-knowledge his downfall or his salvation? Explain. We are always pursuing self knowledge about yourself and humane(). Fully knowing ourselves brings the truths of human nature(). You can not truly know thyself due to facts about yourself you disregard and ignore(). His quest for self knowledge

Monday, December 23, 2019

Islamic and Catholic Views on Genetic Engineering

Primary and Secondary sources found that Gene Enhancement had no place in the religions of Catholicism and Islam; both believe it is selfish, unnecessary and unethical. It is an embellishment to human vanity and additionally, insults human integrity when the offspring is affected by the technology. (What is the Catholic view on genetic engineering? - Mary Meets Dolly. 12/ 05/ 2014.) The Catholic Church In 1983, Pope John Paul II mentioned in an address â€Å"genetic enhancement was permissible- indeed, laudable- even from a Catholic point of view, as long as it met certain basic moral rules. Among those rules: that these therapies be available to all. Ensuring equality of care may become inseparable from ensuring equality of opportunity.†Ã¢â‚¬ ¦show more content†¦Ã¢â‚¬Å"2295 Research or experimentation on the human being cannot legitimate acts that are in themselves contrary to the dignity of persons and to the moral law. The subject’s potential consent does not justify such acts. Experimentation on human beings is not morally legitimate if it exposes the subject’s life or physical and psychological integrity of disproportionate or avoidable risks. Experimentation on human beings does not conform to the dignity of the person of it takes place without the informed consent of the subject or those legitimately speak for him.† (CCC; 29/05/14) This paragraph explains that scientific technologies are not permissible if it used for illegitimate or unnecessary means. Ethical frameworks would all agree on rejecting the use of Genetic Enhancement which is used for morally unacceptable purposes to better an individual which already has necessary wellbeing for life. The Catholic Catechism additionally states, â€Å"2292 Scientific, medical, or psychological experiments on human individuals or groups can contribute to healing the sick and the advancement of public health.† The Catechism’s paragraph mentions that experimentation is allowed in the situation that it provides benefit to the greater good. This follows the concepts of Common Good, Social Conscious and interconnectedness. These concepts explain that ethical deliberations, like gene experimentation, are not made in a moral vacuum. GeneShow MoreRelatedTreatments for Infertile Couples Essay1181 Words   |  5 Pagesinfertile couples have children are as follows. Some Roman Catholics believe that God gave us life and no one has the right to give children. The Catholic Church does not allow most treatments the feel as if the sacredness of life is being taken for granted. Catholics do not allow IVF treatment because several eggs are fertilised and some of them are thrown away which is the same as abortion. The Roman Catholic Church condemns all types of surrogacy because it involvesRead MoreCloning Is The Cloning Of Cloning1818 Words   |  8 PagesIntroduction In biology, a clone simply means that an object, cell, or whole organism has the same genetic makeup as the original object, cell, or organism. Cloning means an organism is generated genetically identical from an existing organism through non-sexual means. Cloning simply means to make an identical duplication of genes, fragments of DNA molecules, organs, or cells. There are three different types of artificial cloning. They include gene cloning, reproductive cloning, and therapeuticRead MoreMedical Ethics: an Inclusice History2719 Words   |  11 Pages As long as there has been some form of medical treatment in the world, there has been someone who has voiced their ethical viewpoints on the treatment of patients. It is difficult to trace back the very first ethical thinking in medicine, but Islamic and Muslim traditions have left their footprints in Medi cal and Bioethics since before the medieval and early modern period. The first piece of literature ever dedicated to the field of medical ethics was written in the 9th Century by Ishaq bin AliRead MoreSources of Ethics20199 Words   |  81 PagesETHICS: 6 1- Religion: 6 2- Genetic Inheritance: 8 3- Philosophical Systems: 8 4- Cultural Experience: 8 5- The Legal System: 9 6- Codes of Conduct: 9 2.0- EXPLANATION OF THE SOURCES OF ETHICS: 10 2.1- RELIGION: 10 Teaching business ethics 12 2.11- Impact Of Religiosity: 13 2.12- Ethics Of Islam: 14 Nature of Islamic Ethics 17 The Human-Environment Relationship: 20 The Sustainable Care of Nature: 22 The Practice of Islamic Environmental Ethics: 22 2.14-Read MoreNivea Presentation3606 Words   |  15 PagesInternational Islamic University Chittagong Introduction Country Selection: Germany Objective: This group assignment aims to conduct an international market environment study of Germany trading partners of Bangladesh, mainly export destinations, focusing on the †¢ Foreign trade practices of Bangladesh with those trading partners and †¢ Trade barriers against Bangladesh exports to these countries. Methodology: Specific Product Selection: General Trade area. Discussions Read MoreGp Essay Mainpoints24643 Words   |  99 Pagesproblems i. Power + Responsibility of Media j. Media ethics k. New Media and Democracy 2. Science/Tech a. Science and Ethics b. Government and scientist role in science c. Rely too much on technology? d. Nuclear technology e. Genetic modification f. Right tech for wrong reasons 3. Arts/Culture a. Arts have a future in Singapore? b. Why pursue Arts? c. Arts and technology d. Uniquely Singapore: Culture 4. Environment a. Developed vs. Developing b. ShouldRead MoreHbr When Your Core Business Is Dying74686 Words   |  299 Pages2007 14 Departments 12 COMPANY INDEX 14 FROM THE EDITOR 53 2006 MCKINSEY AWARDS AND 2007 MCKINSEY JUDGES 20 What the Boss Wants from You What should CEOs and their direct reports expect from each other? When Larry Bossidy laid out his views to a group of young executives, they couldn’t take notes fast enough. You don’t have to write down what he said, though, because Larry has done it for you here. And it will be on the exam. 88 STRATEGIC HUMOR 111 TOOL KIT The Process Audit MichaelRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pagesrecent phase of the human experience is usually covered only at the end of a multiterm sequence of world history units has meant that it often ends up becoming a rushed add-on of rather random, abbreviated capsule summaries and general overviews. In view of the fact that no phase of history can begin to match the twentieth century in terms of the extent to which it has shaped the contemporary world, this marginalization is particularly pernicious and has been at times literally lethal. The unmatchedRead MoreInternational Management67196 Words   |  269 Pages trade ministers from around the world met in Seattle to launch a new round of global trade talks. In what later became known as the â€Å"Battle in Seattle,† protesters disrupted the meeting, and representatives of developing countries who felt their views were being left out of the discussion succeeded in ending the discussions early and postponing a new round of trade talks. Two years later, in November 2001, the members of the WTO met again and successfully launched a new round of negotiations atRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesKeep It Close? 438 Case Incident 2 The Persuasion Imperative 439 xvi CONTENTS 14 Conflict and Negotiation 445 A Definition of Conflict 446 Transitions in Conflict Thought 447 The Traditional View of Conflict 447 †¢ The Interactionist View of Conflict 447 †¢ Resolution-Focused View of Conflict 449 The Conflict Process 449 Stage I: Potential Opposition or Incompatibility 450 †¢ Stage II: Cognition and Personalization 451 †¢ Stage III: Intentions 452 †¢ Stage IV: Behavior 454 †¢ Stage V: Outcomes

Sunday, December 15, 2019

Adopting Telemedicine in developing countries Free Essays

ICTs are technologies that have spread widely and are cheaper for use by the general public. Even though information and communication technologies could tackle some of the heath care challenges that face the modern society, the utilization of ICTs is faced by numerous challenges for social as well as historical transformations that are associated with other natural rights. The case is not different in the field of telemedicine. We will write a custom essay sample on Adopting Telemedicine in developing countries or any similar topic only for you Order Now Telemedicine is an example of ICT that has been used in the world for over forty years. Modern telemedicine applications employ high quality image and video in addition to audio capacities. These technologies range form excellent resolution still images to complex teleconferencing apparatus. Recent developments in ICT are encouraging and they include the use of internet, wireless ICT diffusion, and the exchange of medical information electronically in addition to remote consultations. Infrastructure factures that have an effect on the outcomes of telemedicine include: the national ICT infrastructure in addition to the governments preparedness, approach, as well as policies towards information and communication technology. Technically sophisticated telemedicine applications are currently employed across a wide range of healthcare settings. This technology allows medical personnel to transmit images through mobile phones and sophisticated wireless devices (Martà ­nez, Villarroel, Seoane, and Pozo 2005, p. 1). 3.1.2 E-Health Policies Various shareholders of the telemedicine sector have numerous opportunities to become deeply involved in the development policies that affect the industry. Shareholders of this sector include vendors of information technology, manufacturers of medical devices, health care professionals, decision makers and the government. E-health policies are set in such a way as to improve network capacity, enhance ability of transcending geo-political, social, economic and cultural obstacles. Policies should be set in such a way as to allow teleconsultation beyond national borders. Patients in addition to medical care professionals should be offered with a chance of seeking evidence based opinion as well as treatment from overseas through teleconsultation (Lee, Mun, Levine and Ro 2000, p. 28). 3.3 Capabilities of health sector institution The modern health care system has undergone numerous modifications in order to meet the ever increasing heath needs of the population. One of the modifications is the implementation of telecommunication in health care. All modifications in the health care sector are carried out with the patient being the center of focus. Telemedicine and telegraphy are some of the most recent telecommunication strategies that have been incorporated in the health care sector. Currently, digital images of a patient can be sent over a wireless device to a medical personnel and medical consultations carried out over the internet (Tanriverdi and Iacon, 1998, p, 40). 3.4 Analysis of Telemedicine case studies in developing countries The emergence to telemedicine is associated with the search for communication-oriented solutions to make it easy for rural populations to access medical services. Telemedicine is considered as one of the most appropriate ways through which contemporary medical services can reach the underserved regions (Lee, Mun, Levine, and Ro 2000, p. 16). Reality has however, gone in a different direction. Extensive studies with telemedicine in developing nations have not yet demonstrated the potential of telemedicine. There are a number of factors that need to be implemented in order that telemedicine services in rural areas become sustainable. A highly robust organizational strategy needs to be implemented, a radio based system should be erected and resources utilized properly; remote maintenance systems should be implemented; a high technological base should be established; and all information and communication should be satisfied through simple and synchronous systems (Kifle, Salmon, Okoli, and Mbarika 2008, p. 5). Despite the numerous benefits associated with telemedicine, the program has been slow to come into routine use in both rural and urban zones. 4. Evaluation of the current situation of Telemedicine in rural and urban zone Telemedicine holds a great hope for health care and medical centers both in rural areas and urban centers. Rural areas in particular have for long been faced by shortage of medical personnel, scarcity of means of transportation in addition to other access issues such as unfavorable weather conditions. Telemedicine allows for teleconsultation that utilize a variety of technological advancements such as voice over internet, digital images, digital video teleconferencing, in addition to other emergency services (Martà ­nez, Villarroel, Seoane, and Pozo 2005, p. 70). However, there are various issues that affect the implementation of telemedicine in rural areas. These include: poor infrastructure, limited bandwidth availability in network systems, and scarcity of internet providers. Telemedicine is not only about the provision of medical care in the rural areas, but it is very beneficial in linking suburban, urban and inner city medical facilities in a network offering intensive medical care services (Richard 2001, p. 3). 4.1 Advantages of using Telemedicine technologies An increased use of telemedicine would bring about a number of benefits ranging from enhanced medical care, better utilization of health professionals, increased patients compliance, to enhanced delivery of medical care services outside clinics and hospital setting and in rural as well as the underserved regions. Telemedicine allows for frequent monitoring of vital sign information rather than using periodic visit by physicians. It also improves care of the elderly, physically incapacitated as well as the home bound patients, because it reduces hospital visits thereby increasing convenience and compliance for incapacitated patients. As a result it improves general health of the community and population because it reduces exposure to various illnesses from other patients. It also empowers patients in relation to their own health. It is a source of innovative and creative employment in the health care system. It is a significant strategy of tackling likely future scarcity of medical personnel.   It brings down the rate of death, injuries and infections as a result of medical errors due to inaccurate patient information. Presence of telemedicine programs in rural areas enhances care by reducing transportation costs; deploying medical professionals and specialists; and through providing medical care delivery regardless of geographical barriers (Hein 2009, p. 9). 4.2 Challenges of adapting Telemedicine There are numerous challenges to generating dependable evidence concerning the effects of the use of telemedicine. Scrutiny is rarely carried out as a fundamental part of implementation, and as a result resources are not absolutely dedicated to evaluation. However, there are times when resources are dedicated to scrutiny after implementation, therefore prospective gathering of baseline data is impossible. Retrospective gathering of medical data is faced by numerous hurdles in terms of appropriate source identification in addition to collection techniques. These issues make difficult the scrutiny of various interventions, even as the actual nature of evaluation of telemedicine presents further difficulties (Brear 2006, p. 24). Besides evaluation, other challenges that face telemedicine, as indicated by Paul, Pearlson and McDaniel (1999, p 281), include: various social, cultural, economic, technical and organizational hurdles that health care systems must deal with before achieving the full benefits of telemedicine. Other factors that derail the implementation of telemedicine in developing countries are: poor telecommunication and electric power infrastructure; domination in addition to high cost of internet services; lack of government involvement; difficulties in sustaining implementation of telemedicine; substandard organizational strategies; and user discontent   with low band-width as well as delayed response. Patients, medical professionals and decision makers lack essential knowledge on telemedicine services as well as their potential for medical care. Lack of proper funding is the other challenge that faces telemedicine. Despite its recommendation by the world health organization telemedicine is yet to be realized as a technical service in many national ministries of health (Kifle, Salmon, Okoli, and Mbarika n.d, p. 3). 5. Conclusions It can therefore be concluded that telemedicine is one of the most significant modern medical strategies that can be employed in tackling the numerous health care challenges that face populations living in both urban and rural areas.   Various benefits of telemedicine include: improvement of patient care, reduction of patient transfers to tertiary health centers and providing physicians a good access to tertiary consultation. Telemedicine improves the general health of the community because it reduces expose to various illnesses from other patients through reduction of hospital visits. There are however, various challenges that are associated with implementation of telemedicine and these include: evaluation challenges, poor telecommunication, misinterpretation of information, and lack of awareness and commitment by the government and decision makers. Telemedicine is faced by various issues including information technology policies, E-Health policies, and data security policies. Even though there are numerous benefits associated with telemedicine, the program has been slow to come into routine practice both in rural and urban zones. Bibliography: Brear, M. 2006, Evaluating telemedicine: lessons and challenges, Health Information Management Journal, Vol 35, no. 2, pp. 24 Hein, M. 2009, Telemedicine: An important force in the transformation of healthcare, Journal of High Speed Networks, Vol 9, no. 15, pp. 9 –30 How to cite Adopting Telemedicine in developing countries, Papers

Friday, December 6, 2019

Information Technology and Security

Question: Develop an effective research plan considering context, research questions, sources, timeline, and larger implications for writing a formal research report; Also to practice working with the Research Proposal as an academic genre and to provide an opportunity for working on stylistics and effective academic discourse. Answer: 1 Introduction The aim of this report is to present a research proposal on the topic of Information Technology and Security. Today we live in a technological era. Every event of our lives are connected to and affected by technologies, especially information technologies. With the technical advancement of digital technologies and communication technologies, now information technology has become more than computers and internets. So the span of security in information technology has also expanded its span. (Andress, 2014) In the next sections of this report, it will discuss different facets of security in the context of information technology. 2 Why to Study Information Technology Security? We need to study information technology security to grow the awareness about the topic among us and making our lives secure from information security attacks, hackers, theft of information, privacy breaches etc. If we focus on the statistics of cybercrime, we can check how those are increasing day by day. Over the online platforms, through the mobile devices and in many information systems we share our personal and professional details every day. There are important details like credit card number, banking details etc. that are shared through internet also. For example sharing of banking details over online banking platforms. But these data are at high risks. There are several examples of hacking and stealing of the information of individuals, defence of country etc. (Bidgoli, 2006) Study on security in information technology will help to understand these issues in details, it will help to take precautions before sharing data over the Internet. However, it wont make our data over the online platforms fully secure but we can understand the risks and that may reduce the risks to some extent. 3 Definitions Information security or InfoSec is a practice that helps to build defense against unauthorized access, disclosure, inspection, modification, capture, disruption, perusal and destruction of information. The form of data may be physical or digital. (Bishop, 2003) IT security is a part of information security that is mostly focused on computer security and network security. When information security is applied to the information technologies then that is termed as IT security. These information technologies are mostly related to computers and networks. Currently, smartphones and other smart gadgets are also considered in this class. There are IT security specialists who secures information from attacks, thefts and other kind of unauthorized access. (Ciampa, 2011) When data is under some attack already, then it is needed to be assured that the information is not lost due to the attack. This is called information assurance process. There may be different kinds of attack on information like natural calamities to hacker attack, physical damage of storage etc. As data is stored in servers and computers in most of the cases. So, this topic also comes under information security. The possible attacks and risks that can harm data are called threats to the data. There are different kind of threats in information security domain. Some of the threat are, Software based attacks by hackers. Theft of data and intellectual property. Theft of identity of some individual or system. Sabotage Extortion of information. Theft of software Under software based attacks, there are different kind of attacks. Those are, worms, virus, Trojans etc. Under the theft of data and intellectual property type of attack there are issues related to ownership on information. Identity theft issue is related to masquerading some other persons identity to get access to data in an unauthorized way. Sabotage is related to intentional destruction of information belonging to others. Extortion is modifying some information by stealing it and then sending the modified one to the receiver. Theft of software is physical theft of software. 3.1 Sources of Information An attacker can target any kind of information. But generally they tends to target defense, government, financial institutional, universities, businesses etc. as these organizations contains tons of information about individuals and in almost all cases information are collected and stored electronically, transmitted over networks and internet. (Symantec Corporation, 2014) Protection of such information are responsibility of the organization that collects and stores the same. For an individual, loss of any personal information or misuse of any, may become fatal. It is a breach of their privacy. Information security deals with these areas, protecting information and right to that information. It secures information technology infrastructure, databases, networks, etc. 4 Principles of information security The three core principles of information security are, confidentiality, integrity and availability of information. These three are collectively called CIA triad. There are other principles like non-repudiation, atomicity etc. but these three are the basic. Any information technology infrastructure will be called secure if and only if it conforms to these three principles. (Bidgoli, 2006) 4.1 Confidentiality Confidentiality ensures that the data will be kept confidential. No person without proper access privilege will be able to access the information. 4.2 Integrity Integrity ensures, data will be stored in correct format and form. There will be no unauthorized modification to the data. In the context of information security, integrity of data refers to the manitance of the data in a way that the consistency and accuracy of the data will be maintained. Data will not be modified by any kind of unauthorized access. (Bishop, 2003) 4.3 Availability Availability ensures data will be available to the right users always. There will be no interrupt in this case. At the same time data will not be available to the unauthorized or unintended users. Usually some information system or computer will process some kind of data and will store the same. The information security controls must be designed in a ways that those will be able to protect data from unauthorized access at the same time, will be able to differentiate authorized accesses and will make data available to the authorized users. (David Solomon, 2010) A system can be unavailable for various reasons. For example, there may be power failure like issues, also there may be security attacks like denial of services etc. 4.4 Non-repudiation It ensures that no communicating party will be able to deny the instance of communication in future. Cryptography based systems are used to ensure non-repudiation. 4.5 Authenticity It ensures the authorization process. When entered in a system, it checks whether the data is from authentic source of not. This is mostly related to ecommerce and ebusiness platforms. Where confirmation of the transactions and sharing of data are needed to be authenticated about their genuineness. There are technologies and methods like digital signatures to ensure authenticity. 5 Defenses Information security defenses can be of the following types. 5.1 Access controls Setting and implementing access controls ensures security from unauthorized access to some degree. A risk assessment should be done before implementing access control on data. The access controls help in implementation of access to protect sensitive information. There are typically three stages in the access control implantation method. Those are, identification, authentication and authorization. (Benantar, 2006) In the first step, identification helps in ascertaining that who the person who want access to the information is. A typical example is asking about the userid during login process. Then, in the second step authentication process helps to verify the claim in the identification step. For example, if someone has provided his identification as John to the system, the system will check whether the person is john or not. For that purpose, it may ask for password that is supposed to be known by John only. There are other authentication mechanisms like biometrics etc. however, no process is beyond risks and attacks. In the final and third step, the system will authenticate whether the information collected from previous two steps are authentic or not and then it will give permission for access to the information. For example, if the person John has only READ access right to a piece of data , and John has asked permission for WRITE access then the system will reject the request even if the userid and password are correctly supplied. There are different kind of access control mechanisms like mandatory, discretionary etc. 5.2 Cryptography Cryptography is a very useful defense mechanism in information security. Cryptography helps in changing the form of information so that the original information is hidden. The scrambled information will be understandable to the intended user only. So if anyone else receive the information who is not intended user, then the information will not be readable to them. The process of changing a piece of information based on some key is called encryption. The reverse is called decryption. The changed form of information is called cipher text. (William, 2008) Cryptography has a wide range of security algorithms. Information systems can implement those algorithms to implement security features like authentication, non-repudiation etc. 5.3 Software like Antivirus, Firewall There are wide range of antivirus software for dealing with virus issues in computers. These also ensures information security by protecting data from potential damages by viruses. There are systems and software like firewall, IDS etc. that helps in detecting unauthorized access from network to a system. (David Solomon, 2010) 5.4 Awareness and Best practices Implementation of security controls is not enough to ensure information security if the users are not aware of the risks and the consequences. So, the first thing is to increase awareness among the users. Then making them aware of the best practices to avoid risks of security attacks to some degree. 6 Future Research IT security and information security is a vast topic. There are number of sub topics to work on in future. There are enough case studies to uncover reasons behind security attacks over time, also there are scopes to implement new protocols or standards for ensuring security. In future, based on literature and case studies, the IT security will be explored in details. Data for the research on IT security will be collected from different case studies, literatures papers, journals, surveys, statistics etc. available from Internet. 7 Conclusion In the research proposal on IT security, it has described the term from the broader perspective of information security. It will help to understand the role and significance of IT security in the span of information security. In the proposal, it has discussed about basic security principles for information security, different kind of attacks, different kind of defenses, future scope of research etc. References Andress, J. (2014). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress. Beachboard, J., Cole, A., Mellor, M., Hernandez, S., Aytes, K. (2008). Improving Information Security Risk Analysis Practices for Small- and Medium-Sized Enterprises: A Research Agenda. Florida. Benantar, M. (2006). Access Control Systems: Security, Identity Management and Trust Models. Springer. Bidgoli, H. (2006). Handbook of Information Security, Key Concepts, Infrastructure, Standards, and Protocols . John Wiley and Sons. Bishop, M. (2003). Computer Security: Art and Science. Addison-Wesley Professional. Bosworth, S., Kabay, M. E. (2002). Computer Security Handbook. John Wiley Sons. Ciampa, M. (2011). Security+ Guide to Network Security Fundamentals. Cengage Learning.K., Solomon, M. (2010). Fundamentals of Information Systems Security. Jones Bartlett Learning. Symantec Corporation. (2014). Internet Security Threat Report 2014. Symantec Corporation. Vacca, J. R. (2012). Computer and Information Security Handbook. Newnes. Whitman, M., Mattord, H. (2011). Principles of Information Security. Cengage Learning. William, S. (2008). Computer Security: Principles and Practice. Pearson . Xiao, Y., Li, F. H., Chen, H. (2011). Handbook of Security and Networks. World Scientific.