Sunday, March 31, 2019

Data leakage

entropy escapeData leakage is the unauthorized or unintentional exposure, disclosure, or loss of sensitive cultivation (GAO, 2007, p.2). M whatsoever businesses stool in their repel over sensitive in variateation ab pop their organisation, employees and customers. The Information Commissioner (ICO) in a recent press statement (ICO,2010) is alarmed with the unacceptable subdue of info leakages within the modern world and leave issue fines for major dampes to commence in 2010.In addition to our markets, the safety and atomic number 16urity of our information could non be assumed either. (Verizon line of merchandise, 2009 p.2). In 2008 there appears to be a link between the turn of the recess and an annex in report entropy leakages. Research conducted by Verizon Business (2009) showed that the number of inform compromised records was to a greater extent than the previous four historic period combined as shown be sm alto proposeher-scale in Figure 1.1.Figure 1.1 Number of records compromised per year in split upes investigated by Verizon Business (2009)Within this study (Verizon Business, 2009) it was found that the industries with the highest number of entropy leakages were in sell (31%) and monetary services (30%).As employees exit, so does corporate data (Ponemon Institute, 2009, p.1). A survey conducted (Ponemon Institute, 2009) showed 59% of employees who left a business (including voluntarily and those asked to leave) take data. It is difficult to measure the entire impact of a data leakage. Data Breaches Are Frequent, save Evidence of Resulting Identity Theft Is Limited However, the right Extent Is Unk flatn. (GAO, 2007, p.1.) The financial impact on a business per breach according to the Ponemon Institute (2006) is on average $4.8 million. Breaches move not exclusively be financi totallyy costing to a business but similarly exceedingly damaging to a companys reputation, this study (Ponemon Institute, 2006) showed that 60 % of customers terminated or considered terminating contracts after a security breach. fit to Verizon Business (2009) in 2008 91% of all compromised records were linked to make vicious groups. Examples of hidden data that criminal groups may wish to obtain ar companys financial information, customers sensitive data and credit card elaborate. There be many shipway in which data leakage bum occur, or so of which will be discussed in the following chapter of this report. 1.2 Data Leakage in the MediaThe media is one of the most influencing ways of communicating issues globally. Data leakage appears to be increasingly more(prenominal) best-selling(predicate) in the media as the reported breaches increase. The ICO stated that there were 434 organisations that reported data security breaches in 2009, the previous year had 277 reported (insufferable level of data loss, 2009). This evidence supports the theory of there macrocosm an increase in breaches during the recession but what must be interpreted into account is that there is an increase in the reported cases. It may be that more businesses are fair aware of data leakages where previously they were oblivious to breaches committed or did not disclose the known leakages. traverseed in the media, a countrywide employees laptop computer was stolen from their home containing confidential customer data (FSA,2007). 11 million Nationwide customers were said to be at risk of identity crime at the time. The FSA (Financial Services Authority) were alerted by the breach and it was found that the Nationwide did not starting signal an investigation until 3 weeks after the theft took place. The firm were fined 980,000 by the city watchdog for the security violation.An early(a) example in the media (Previous Cases of Missing Data, 2009) is the Ministry of denial data security breaches. The Ministry of disproof admitted to losing or having stolen 121 memory sticks in a four year period. correspond to this pre ss release (Previous Cases of Missing Data, 2009) Defence Secretary Des Browne said 747 laptops had been stolen of those provided 32 do been recovered. 1.3 Data Loss Pr pointtion (DLP)The justification of sensitive data, to avoid data breaches, should be a vital part of a business daylight to day operations. Yet organisations rarely lay down adequate visibility or control of their data (Broom, cited in When financial data goes missing, 2008).From the research conducted (Verizon Business, 2008) show up of all the data leakages that occurred in the year 87% were encumberable finished simple or intermediate controls. This suggests that many businesses are not putt in adequate controls to prevent leakages. The Date Protection Act (DPA) is a framework to ensure that personalised information is handled properly (ICO, The Basics, no date). unrivalled of the principles of the act is, it is the responsibility of the business to secure the sensitive data it withholds. The DPA subsc ribe to the right to prosecute and unless exempt, all businesses have to abide by this act. The worry faced by many businesses is to manage the risk without affecting their productivity and to manage risk in a new and challenging environment (chief financial officer Research Services and Crowe Chizek and Company LLC , 2008, p.2).The important factors to consider when implementing a DLP think is the alignment of process, technology and people as a unit. developing a robust security policy and ensuring that all employees fully understand their map and obligations(Broom, cited in When financial data goes missing, 2008). Broom besides stated that riding habitrs compulsion high-quality training and good communication regarding information security concerns. Chapter 2 Types of ThreatsThreats to the protective covering of data thunder mug be split into two broad categories inner(a) and External threats. Internal threats are from within the business itself and majorly centred on employees actions. Attacks from outcover(a) of the business are known as external threats. Examples include hackers, organized crime groups and government entities (p.8, Verizon Business, 2009) fit to Verizon Business (2008 or 2009) 20% of reported data breaches are cause by insiders whilst 39% of the breaches involved multiple parties, thus proving the importance of a combining of internal and external controls. 2.2 External Threats gibe to Verizon Business, 2008 saw more targeted, cutting edge, complex, and clever cybercrime attacks than seen in previous years (p5 2009). The fact that attacks appear to be increasingly more sophisticated is a concern for many organisations to ensure they have adequate control measures in place.One of the most common external threats to data security is Malware. According to Easttom (p6 estimator Secuirty Fundamentals) Malware is the Generic term for software that has a vicious purpose. Malware rear end be apply to steal confidential data fro m a personal information processing system to a global network. A virus is a slender platform that replicates and hides itself in other programs, usually without your knowledge (Symantec,2003) through Computer security fundamentals p6.) A fifth column Horse is a utilizable or apparently useful program containing hidden code that, when invoked, performs some unwanted sound. (P48 info sec pipkin). Trojans must spread through user interaction such as opening an e-mail attachment. It looks legitimate and so users are tricked into executing the malicious program. The Trojan screw hence latently delete institutionalizes, steal data and spread other malware. They can in addition be created to generate back doors to give hackers gravel to the system. (http//www.cisco.com/web/ virtually/security/intelligence/virus-worm-diffs.html) An example of a dangerous Trojan is the Dmsys Trojan. According to (http//www.2-spyware.com/trojans-remova) and (http//www.uninstallspyware.com/uninsta llDmsysTrojan.html) it steals users confidential information by infecting instant messengers. It uses a keystroke logging technique to steal passwords and private conversations. This information is stored in a log file and whence sent to the hacker. Thus allowing the malicious user to have price of admission to potentially, confidential information. There are various tools online that can dispose of this Trojan automatically, but if a user wanted to do it manually they would pick out to delete the files dmsysmail.eml and dat.log. Manually Deleting MalwareEach program consists of files. Evenspyware, a virus or a contrasting parasite all have their own files( http//www.2-spyware.com/ news/post203.html ) To remove a parasite usually entertains to delete all its files. According to this website, it is not always this simple, as files being used by active applications can not be deleted and some of the Malwares files may be toughened to in obvious. Following this sites guideline sOpen Windows Task Manager and select determination Process but only works if you know what processes should be running game and those that look suspicious. Once you have stopped the process it is now accomplishable to try and delete the malicious files. Locate the folder you believe the program to be (eg My Computer) and ensure all hidden and protected files are visible (Tools, Folder Options, View, Advanced Settings).There may shut away be files that are invisible, now type cmd into run to access the Command command flying. Within the Command energetic enter dir /A folder_name. All files within this folder will be listed including all hidden files. To delete these files within the cmd enter the command cd folder_name to locate the folder. Then enter del file_name to delete the file. Ensure the Recyle Bin is similarly emptied. http//www.2-spyware.com/news/post203.html steps on how to manually remove Malware. Preventing Malware attacksSince new viruses are alkaliduced dail y (p49 info sec pipkin) an up-to-date valid anti-virus software is demand to avoid data leakages via Malware.Vulnerability patching firewallsA combination of the mentioned attacks can be catastrophic to the security of data hacking gets the criminal in the door, but malware gets him the data (p20 verizon) It is minute that a blend of the above security measures are put into place. 2.1 Internal ThreatsWhether knowingly or unknowingly, innocently or maliciously, employees read in behaviours that heighten the risk of data loss.( Cisco data leakage find page)According to a study conducted by cisco data leakage 46% of employees admitted to transferring files between work and personal computers and approximately 1 in 4 admitted sharing sensitive information with friends, family, or even strangers. According to the Deputy Information Commissioner David Smith (http//news.bbc.co.uk/1/hi/uk_politics/8354655.stm) Unacceptable amounts of data are being stolen, lost in transit or mislaid by s taff. Dangerous numbers of personal data is still being needlessly stored on unencrypted laptops and USB sticks.if they do not think just about security, users can start to cause quite a few problems p37 computer insecurity give. bar chart 5 ponemon 2009 page8 info kept after leaving chart 7 ponemon 2009 page 9 According to Ponemon (2009), only 11% of the respondents who took part in this research had permission from their supervisor to cargo area this information. in figure . An alarming percentage of the above transfers may have been avoided with appropriate controls, which will be discussed later in this report. It can a good deal be profound to detect data leakages, such an employee copying confidential data to a USB turn. more often, the information is left just as it was so that the theft is not quickly discovered p59 info sec pipkin. Using a Data Leakage Prevention tool can dish out in supervise and stop consonanting users speculative actions to avoid leakages. I n this report digital guardian by Verdasys will be used to demonstrate some examples of how a DLP tool can be used to assist in the battle of information security. Chapter 3 Verdasys digital withstander SoftwareIntroductionDigital shielder is a comprehensive and prove data security solution for protecting and tracking the flow of critical data anywhere in the world. (Verdasys, 2006) (http//www.daman.it/wp/dg/Digital_ protector_DS.pdf ) According to Verdasys (2006) Digital Guardian (DG) can help to prevent the loss of data by identifying hard to detect user actions. The tool can hold unauthorized access, copying, printing, and other user actions. The DG platform consists of a central legion and control console to communicate with remote agents deployed to desktops, laptops and servers where data needs protection. It is an agent found (Endpoint) Data Loss Prevention (DLP) tool. These agents operate silently and report tackles violations, continue to operate even when a trick is removed from the network. (Verdasys, 2006 http//www.daman.it/wp/dg/Digital_Guardian_DS.pdf ). The DG server is accessed via a web-based interface to the confine Console. Figure DG guidance /Control Console The above figure is the web-based management console. This tool can be implemented on both Windows and Linux machines. For this project Windows machines have been used.CapabilitiesDigital Guardian can monitor or plosive consonant various risky actions users are taking. Whether it be users abuse or unintended operations. There are many actions that the software can perform some of which will be shown in the following.. Rules can be created within the software and then applied to policies which are deployed to machines chosen. These traffic patterns can generate warnings to the user and also e-mail alerts to administrators upon policy breach. Reports can be generated to allow for auditing and drilldown summaries of use of data and users actions. on with being able to comp letely stop consonant specific actions DG can also ask for justification from a user which is a form of Soft Blocking (DG, 2006). This type of DLP can also allow for a monitoring only approach, which according to ( http//www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) can be more successful than a overgorgeing solution. It can be used assist in computer forensics investigations whether it would be monitoring triggered rules by prohibited actions that breach corporate policy or more sinister illegal activity. According to (http//www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) The beginning of the investigative process is to find out what was being sent, where, and by whom. Is it legitimate business reasons? Maliciously? They didnt know any cleanse? Blocking may keep the data safe, but it wont root those questions. (http//www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) There are functions within the tool that can block the removal of confidential data via clipboard actions (cut/paste/print screen). add on features such as mail/file encryption and content reappraisal by Autonomy (company name) (Verdasys 2006)Figure () shows the capabilities of the software, How the software works Digital Guardian installs drivers that tie into the Operating System (O/S) at a very low level within the shopping center. When an application wants to save a file, it calls a function within the application that does this, and that the O/S handles the task, right down to the kernel that does the hard work, without application writers having to know the details.DG ties into that kernel, detects these events happening, extract useful details (like the filename and size etc), and then send the details onto the DG server. The advantage of this is that any application saving a file will have to get the O/S to do it, so tying in at that very low level ensures it works for virtually all applications. both more Installation oh god try and remember Installation details of .. appendix. windows server, SQL Server, DG Server, DG Agents, Hardware and Software pre , key etc. comminuted in the . Digital Guardian files. Limitations - FIND some Digital Guardian is mainly used for insider threats and doesnt lessen external threats by intruders or malicious attacks. It also does not address server and network vulnerabilities. (http//www.software.co.il/data-security/17-data-loss-prevention-shoppers-guide.html)No functionality to actually block users downloading applications (CHECK THIS) and running them if not already blocked within action commission. The software has to be installed on the network to be able to block the use of it. check No rule to be able to block all attachments sent via emailcheckScalability challenge of maintaining classifications of Windows shares/content(http//www.software.co.il/data-security/17-data-loss-prevention-shoppers-guide.html)Chapter 4 Testing and ex ecution Policy Exception USBEncrypt Email PromptEncrypt berth RuleEncrypted Email PasswordApplication ManagementApplication Management ExceptionsApplication Management ExceptionsBlock of Applications PromptUpload Via WebmailUpload via Webmail PromptBlock upload via webmail sites. This rule controls users access. Instead of completely blocking their access to certain sites. Can access the specified sites but can not upload to these sites. For example social networking sites like Facebook. Stops the sending of attachments via webmail. If laptop accessed from outside of network these rules will still function..NEED give SCREEN SHOT THAN THISIS THERE A COMPONENT RULE FOR THIS?Control of USB Devices Block non- ratified USB devices Within DG it is possible to block all uploads to all USB devices, thus preventing all users from removing any data from the network. It is also possible to block uploads to USB devices with the exception of predefined USB devices. For example if a business provides users with an encrypted USB device (such as Kingston.) a rule is created to say block all USB device if stated device is not listed in the component rule associated. The USB device is recognised by its Product ID and Vendor ID. These IDs can be discovered by exploitation a simple tool such as .Block non approved USBs Above is the control rule called Block non approved USBs. This rule is set to block any File Copy/Move/SaveAs to a extractable device that is not listed within the function (component control rule) approved usb device. function rule for USB Approved Within the approved usb device component rule is the Vendor Id and Product Id for the approved USB device(s). USB Block Prompt If the USB device inserted does not match the predefined approved removable device then the above prompt is triggered. This prompt is flexible and any message the administrator wishes to set will be displayed. Once Close is selected no data can then be transferred to the device. This way if the USB device is lost/stolen it is encrypted so would be extremely difficult to view any sensitive contents on the device without knowing the password. This rule could be useful for businesses where their employees have to travel regularly (eg Sales) and so data needs to be easily transportable. Obviously this rule does not stop users from stealing the data but does assist with accidental loss. The software could still be used to monitor who/what/how much data is being transferred to these devices. BETTER SCREEN SHOTContent inspection rules. calculate intoTRY AND CRACK/BREAK THESE RULES.Manually blocking USB within the cash register It is possible to manually block all USB devices via the register. The following steps were taken from Microsofts Support site (http//support.microsoft.com/kb/823732). Before manually adapting the registry it is potently recommended that a backup of the registry is do as any errors made within the registry can cause severe problems. To enter the registry of the computer from the Start menu click Run and enter regedit. view the registry key HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesUsbStor. On the right hand side multiply click Start as highlighted in figure. Ensure hexadecimal is highlighted and enter 4 within Value data. This will now block all USB devices being used on this machine. When a device is out of use(p) into the machine the device will not be acknowledged. To re-enable USB devices follow the very(prenominal) steps above but change the Value data back to the default value of 3. Chapter 5 Analysis of results founded by Digital Guardian. Digital Guardian Technology ANY IMPROVEMENTS FOR DGChapter 6 Critical canvass of other productsHaving assessed an Endpoint (agent based) DLP tool, secondary research was conducted on a meshing DLP tool, Websense Data Security, for comparison. Figure below is a table of brief pros and cons for different DLP measures available, taken from informationweek.com . Analy se table Taken from (http//www.informationweek.com/1163/163ss_impactassessment690.jhtmljsessionid=WA0XH3S4GN0CTQE1GHPSKH4ATMY32JVN) WhenDLPvendors are being honest, theyll pronto admit they cant stop the serious and skilled insider from getting data out. (http//www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php)Their real significance is in finding employees who are incidentally leaking data, those who dont know its against policy or who are taking risky shortcuts to get their jobs done.Websense Data Security is a network based DLP tool with off proxy. According to a review by (http//www.software.co.il/data-security/17-data-loss-prevention-shoppers-guide.html) it is typically used for monitoring email traffic and quarantining suspect messages. It requires placing an application-layer proxy next to an Exchange server or server agent. With a network based DLP such as Websense it avoids having to install an agent onto every machine, and instead involving inst alling network taps. As data passes through these it is checked, and events collected that way.According to(http//www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) Network-based solutions have the potential to be more vulnerable to an insider threat. An insider can steal data out via thenetwork, using encryption or steganography (where data is embedded within another(prenominal) data format).Unlike DG a network-based tool would not prevent a user plugging in a USB stick and copying files, it also would not log that this event had even occurred. TYPE UP to a greater extent COMPARISONSStill, an even somewhat paranoid but unskilled insider can use a cell phone or digital camera to fritter documents on the screen. No form ofDLPcan protect against that. (http//www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) Installing a DLP tool is not the be all and end all protection against threats and as emphasised earlier in this report a comb ination of measures needs to be addressed. Chapter 7 Conclusion and Future Work. Highlight any deficiencies etc Ethical Traking employees? ANY IMPROVEMENTS FOR DG .Many different aspects to considerLink intro with conclusion. Verizon other factors p3 . The best security technology in the world wont produce a good return on investment without the foundation of security processes, policies, and education. P8 Cisco data leakage. if you have never experienced a security incident, does this mean that you are secure? Or does it just mean that, so far, you have been lucky? computer insecurity book in short no one is immune computer insecurity book More..GlossaryBibliographyOnline SourcesICO. (2010), Press Release Data Breaches to Incur up to 500,000 penalty, Online. on tap(predicate) at Accessed 3 inaugural January 2010. (2009),Unacceptable Level of Data Loss, Online. Available at Accessed 1st February 2010. FSA. (2007), Final Notice to Nationwide Building Society, Online. Available a t Accessed twenty-sixth January 2010 (2009), Previous Cases of Missing Data Online. Available at Accessed 12th January 2010 Broom, A. (2008),When financial data goes missing.Online. Available at Accessed 3rd February 2010ICO. (date unknown), The Basics . Online Available at Accessed 2nd February 2010JournalsGAO. (2007), What GAO Found, Report to Congressional Requesters Verizon Business (2009), Data Breach investigations ReportPonemon Institute. (2009), As Employees Exit so does Corporate Data, Data Loss Risks During downsizePonemon Institute. (2006), 2006 Annual Study Cost of a Data BreachCFO Research Services, Crowe Chizek and Company LLC. (2008), The Changing Landscape of Risk ManagementAppendices

Women in Christianity

Wo hands in ChristianityWomen atomic number 18 oppressed by the piety of Christianity.For the religion of Christianity the equal rights for women is a great unfulfilled concern, from while beyond shop they have been dependent to man, in the family, and with restrained rights and involvement in worship. This is a big and intricate matter as Christianity is one of the major religions in the world. Is the opinion that Christianity oppresses women, based on historical facts or is the misinterpretation of these show up of context scriptures Let us disembodied spirit to the bible for some answers and solutions to the funny house and confusion with which modern women atomic number 18 confronted.Through extinct the Bible, men were the heads of families and were the leaders. Abraham, Isaac, Jacob, Moses, Noah, David, Solomon, Joseph and umpteen more. As a result , it stands to reason and historical fact that the Bible is thusly patriarchal. But does this inevitably mean that women are oppressed and degraded?Genesis(126-27) and so God said Let us make man in our visualize, after our likeness, and let them have dominion everyplace the fish of the sea, and everyplace the birds of the air..So God created man in his own image, in the image of God he created him male and female he created them It was non ex alone, but Eve who made up Gods image, and thus, women are a kick downstairs of this creation story, not demeaned but fully equal in the benefits provided by God. Arguing the idea that the male gender was created offshoot is like duplicate arguing abtaboo who is greater due to which emerged first from the womb. They were created equally and with the figure of reflecting Gods image in their own union, man and wife. http//www.religioustolerance.org/lfe_bibl.htmThe Bible teaches that man and charr were co-participants in the Fall Adam and Eve were both responsible. Gen 36 Rom 512-21The Bible teaches that both man and woman were created in Gods image, had a direct relationship with God, and shared jointly the responsibilities of bearing and saving up children and having dominion over all the earth, and over all the creatures. In first-century Palestine, the way Jesus treated women was considered revolutionary. Jesus Christ taught that women were just as responsible for growing in grace and knowledge as men when it came to being one of his followers.Jesus expected women as well as men to learn from him. The Bible does not say how many women go around with Jesus and his male disciples, but definitely Luke records the names of a prominent few, and mentions there were many other(a)s. Jesus walked by dint of towns and countryside, preaching and heavy(p) the good news of the kingdom of God. The Twelve followed him, and also some women who had been corned of evil spirits and diseases bloody shame called Magdalene, who had been freed of seven demons Joanna, wife of Chuza, Herods steward Susanna and others who provided for them expose of their own funds. (Luke 81-3) It was the women who stayed at the foot of the Cross. The mother of Jesus, Mary, the other Mary, and Mary Magdalene with only one of the Apostle John, the beloved disciple.And it was Mary Magdalene who went early at the grave accent and It was a woman who found the most important phenomenon in history, the Resurrection of Jesus. In that time in history and culture , women were considered to be not reliable and they were not permitted to be witnesses in court. And yet Jesus wanted a women as his strongest witnesses, and accomplish his greatest works.Jesus asked Mary to bring the declaration to the apostles, so we see that he relied on women to bring the men to him. Christianity straightaway has a lot to thank women for, as men disbelieved, motioned, and ran away, but the women poised them and lead them back to Jesus.Now, one major issue is Saint Paul. He comes across as a big misogynist. But is our interpretation right? In 1 Timothy 2 11-13, Pa ul says, Let a woman quietly receive instruction and be submissive. I pull up stakes no woman to teach or to have authority over men. Let them be quiet. For Adam was formed first, then Eve. Adam was not deceived ,it was the woman who was deceived and fell into sin. But she will be saved by means of motherhood, provided that her life be orderly and holy, in faith and love.St. Paul has been the victim of a bad press as far as women are concerned. Some have regarded him as the one whose basic pith to women is to fold up, cover their heads and listen to their husbands. In the thirteen letters of St. Paul, there are probably no passages that are as difficult for modern Hesperian readers as those having to do with women.To clear Paul of charges of misogyny, perhaps we need to look at some historical considerationsPaul was brought up as a Jew in the sect of the Pharisees until his adult life. In the Judaism in which Paul was reared, relationships betwixt men and women were subject t o the fair plays of ritual impurity. If a man so some(prenominal) as touched a woman at the wrong time of the month he could become ritually impure himself. In Leviticus, the law stipulates that a woman who has given birth to a daughter mustiness undergo a period of purification twice as ache as that for the birth of a son. And among the daily prayers the Eighteen Benedictions recited by Jewish men is this Blessed Thou art, O Lord, for not having created me a woman. So St. Paul grew up regarding to women in a particular way, and some of the comments he makes to the highest degree women can probably be credited to his own background. http//tzion.org/articles/EighteenBenedictions.htmWomens status and freedoms were definitely restricted by Jewish law and custom.As we mentioned already they were not permitted to be witnesses in court trials. They could not go out in public, or talk to strangers. They had to be double veiled when they went out of their homes. They were excluded fro m the worship and teaching of God, with status barely above that of slaves. Their place in society was set in the Hebrew Scriptures and in the interpretation of those scriptures.In a Jewish and Hellenistic environment, the submission of the wife to the husband went without question as considered the foundation of the family order, and in therefore of the order of society.For many scholars ,the first Christians had been accused of rocking the boat, and Paul wanted to make it clear that Christians were not anarchists. Therefore, Pauls statements about women tend to take on a different tone solely if seen within the context of all of his writings, actually they serve to reflect and repay the message of mutual submission in Christ. (Lynda L.1990 pg.21)In fact in Galatians 327-8 The Same Paul says All of you who were given to Christ through baptism have put on Christ. Here there is no womb-to-tomb any difference between Jew nor Greek, or between slave or freed, or between man and woma n but all of you are one in Christ Jesus.This doesnt mean that the borders no longer know in this life Paul was not out to abolish thrall and to struggle for the social equality of women. His concern was not for the improvement of break social structures but for the establishment of unity in the church, the one system of Christ, and then as one in Christ all other issues would be overcome.One important point is that Paul, depended on women to help him in his ministry, and he thanks them in his letters by name, Phoebe, a deaconess of the church, she helped many and among them myself (Romans 162). In Philippians (42-3) Evodia and Syntyche of whom, he says, they have laboured with me in the swear out of the gospel.And finally If he really despised marriage, would he have communicate so warmly and repeatedly of the couple Prisca and Aquila, whom he referred to as my helpers in Christ Jesus. To save my life they risked theirs I am very pleasurable to them, as are all the churches of pagan nations.As seen Women have exerted a special influence on Christian life and have profoundly affected its spirituality, but the exact nature of this relationship has yet to be fully understood. Holy women throughout history have struggled over the nature of womens calling within the church. Christianity has been, both a liberating force for women and the get down of their oppression. But we would like to conclude with an uplifting message, God is still adage today to those of us who are willing to listen a message that will clear us of any doubts towards gender equalityIn heaven, men and women will stand together praising God . (REV. 223-5) A clear picture or even better the ageless picture, about women in Christianity.BibliographyChristian Community Bible, Claretian Publication, Quezon City, Philippines.LYNDA L.1990 pg.21,The gentle strength, university press of Virginia, ground forcesFRANK WESTON,2001. The Revelation of Eternal Love Christianity Stated in toll of LoveBiblio Bazaar, Oxford UKhttp//tzion.org/articles/EighteenBenedictions.htm (accessed 7/03/2010)http//www.religioustolerance.org/lfe_bibl.htm (accessed 7/03/2010)

Saturday, March 30, 2019

Causes of Unrest in Middle East and North Africa

Causes of Unrest in centre einsteinium and northeasterly AfricaHistorians and philosophers, policy-making scientists, economists, and sociologists be set abouting to identify the root causes of accessible fermenting and their implications in the Arab countries of the sum East and northbound Africa in the end of the scratch and the ascendent of the reciprocal ohm decade of the 21st century. at that place atomic number 18 quite a smoke of factors serving as the foundation for tender unrest in the ME and NA. They argon both objective and subjective. The bases of complaisant revolutions ar chief(prenominal)ly domestic factors, though not without external assumptions. The root causes of the revolutionary upheavals in the Arab domain and the in- among East and north African crisis lie in the limited beat of new(a)ization, which has direct to a disproportionate, extensive and slow developing of the region. 1In January 2014, the Arab land has noted the fourth ann iversary of the event, which journalists dubbed as the Arab Spring . Indeed, at first, the world started to witness iconic events occurring in the region, where the resignation of Tunisian chair Zine El Abidine Ben Ali, who ru lead the landed estate since 1987, on January 14 2011, launched the cascade kn declare as the domino effect. Later, on the 11th of February 2011 the f exclusively told of Tunisian president was followed by the most sensational resignation of Egyptian President Hosni Mubarak, who ruled the country since 1981. In combination with the removal of Libyan leader Muammar Gaddafi (who ruled from 1969) on the twentieth of October 2011, events of the Arab Spring began to be perceived and interpreted as signs of melodic theme changes in the entire Arab region, and more broadly within the on the whole Moslem World1.The nomination of main slogans demanding the democratisation of public institutions of government had a forked effect on the countries of the region. Fi rstly, the rebound tide having swept away a number of Middle Eastern authoritiess, salve failed to overthrow the most tidy outposts of authoritarianism within the region2. These authoritarian outposts are personified by Arab Monarchies of the Persian Gulf3, who materialise to be handed-down allies of the USA. Reluctance to initiate the reforms for the liberalisation of the regime led to them being discredited in the eyes of the planetary association as well as the indigenous peoples of the region. And secondly, the events of the last decade, beginning with the US invasion of Afghanistan and Iraq4 have led, in combination with crisis of military unit in Egypt and Syria, to the liquidation of the political culture and institutions of the Middle East, by knocking out the traditional heavyweights of the Middle East Iraq, Egypt and Syria. All of these events together issuinged in the emergence of bodily process of those labelled as outsiders by the Arab world. These non-Arab o utsiders are primarily Iran and Turkey. The failure of the revolutions to ballad foundation for new Political, Economic and fond institutions has been replaced by simple reshuffle of spheres of power and influence. And in Iran, a green movement has been chosen as an alternative path5.Throughout the material body of the revolution, at that place were strong expectations that the Middle East was entering a period of democratic development6, which was said to achieve all of the attributes of a free elegant society, which had for so many years existed in western sandwich countries. However, further advancement of the plaza in the region has led to an increase in the influence of supporters of critical perception of the nature and presumptive consequences of this rebellious movement not entirely for countries of that region, but also for the whole carcass of modern inter guinea pig recountings. Western experts have increasingly highlighted the ambiguity of this phenomenon for the fate of the entire region, by agreeing on the fundamental reshaping of the entire system of balance of forces. This choir is particularly dominated by the notable run into of Efraim Inbar, an Israeli expert and his work The Arab grows and national safety of Israel. harmonise to Inbar, all what is chance in the region, will not deliver any positive outcomes in terms of stability and regional security7. Despite the blasphemous influence of Western culture, none of the Arab States managed to build a stable, democratic society, based on the ideas of polished liberties, political rights, a system of universal education, gender equality and economical development. The democratic elections in Lebanon in 2005 and Palestine in 2009 brought to power of the Islamists, indicating that the tarnish of the civil society in the Arab world. The most dangerous version of the situation under the influence of the Arab Spring and according to Inbar, there will be an emergence of nuclear Ira n, who may ultimately win some time to complete work on its nuclear program and put the global community fait accompli. This may result in a chain reaction when other countries region will aim to commence the development of their own nuclear programs, seriously complicating the national security of Israel, which as of now is the notwithstanding nuclear Power in the conflict-laden region. Activation of Iran on the overseas policy arena after the up emanations is not accidental. Behind its activation lies the influx of Brobdingnagian amounts of Petrodollars, rising anti-American sentiment in the region caused by candidly failed policies of the United States, the rise to power of an ambitious and eccentric leader Mahmoud Ahmadinejad, Irans capital punishment of its own nuclear program, which turned into a personification of Irans power revival8. Hence the interest of specialists and politicians on foreign policy doctrine of modern Iran, where it states that it is based not on t he principles of national interest but alternatively the principle of Muslim solidarity, root in the teachings of Imam Khomeini, in relation to the Islamic revolution. Thus, conside balancen of ideological concepts of Imam Khomeini in interpreting the watercourse leader of the Islamic Revolution (Rahbar) Ayatollah Ruhollah Khomeini, should succor understanding and explaining the steps interpreted by Iran during the reign of the current President of Iran Mahmoud Ahmadinejad9. The analysis of these concepts will help to forecast future foreign policy initiatives of Iran with its aim to resolve the intra-regional problems.Analysing the statements of Khamenei on reasons which caused the revolutionary events in the Arab world, it is crucial to highlight the fact that such uprising were labelled in Iran as Islamic awakening, emphasizing the specificity of a conjectural framework, where Islam is seen as the foundation. Whereas the term Arab spring has not found support among the Persi an ruling elite, as it was associated with a distinct national colour and the secular character of the movement. Thus, Khamenei, addressing a speech to the delegates of the 1st International Conference of Islamic awakening on the 17th of September 2011, said This awakening has led to more movement among the peoples of our region and caused several uprisings and revolutions which could not be foreseen by the dominating regional and international satanic powers. It overthrew authoritarian and imperialist imperative regimes10 and under such he meant the Ben Ali regime in Tunisia, Hosni Mubarak in Egypt11, Muammar Gaddafi in Libya. Analysing the reasons for their failure, he thus highlights the background of the beginning of the Islamic awakening. Khamenei calls the fallen said(prenominal) regimes as American puppets, and this, in his opinion, is one of the main reasons for the anti-government protests in these countries12.The brotherly explosion occurred precisely in those Arab coun tries where government accountability measure and applaud for human rights was below average in the Arab world. In Yemen, Egypt, Tunisia, Syria, Libya. And in Libya, this ratio was almost zero.13However the Political Arab spring, to which so many hopes were pinned in the beginning of 2011, resulted in a all-fired drama, destroying many of revolutionary conquests of Arabs in the 20th century. Libya became crushed and practically ceased to exist as an independent state. Islamists seized power and are now trying to impose their rule and solve all of the problems in Egypt, Yemen and Tunisia. They threw an open challenge to the Government of Syria, unleashing in the country a bloody and destructive civil war in order to transform this old-fashioned Arab state in something they have already transformed Libya to. In Syria, there are as of now about 200 thousand militants fighting14. on that point are more than 8 thousand men leaving the country monthly, and their total number, accordin g to According to the UN reached 1 million. Events in Syria, no doubt, influenced what is contingency in neighbouring countries Iraq, Lebanon and Jordan. And it is not surprising that from these countries there has been an influx of Islamic militants to Syria. Syrian issue becomes equally important part of the Middle East crisis, on par with the Palestinian problem.Since the end of affectionate upheaval in the Arab countries of jointure Africa, there have been some major changes. The time limit for lately historical and philosophical generalizations about events in these countries is yet insufficient. However, economists, political scientists and politicians who are guided by intelligence and analytics for the time period of 3-4 years view it is more than enough to draw some conclusions on the effects of social unrest in the North African region. It is safe to say that the social unrest in countries North Africa had a dramatically negative mend on the development of their eco nomies, although not equally. So, if in a more modernize Tunisia gross domestic product growth in 2011 in comparison with 2010 decreased by 4%, from + 3 to 1, then in Egypt fall in gross domestic product in the said(prenominal) period was more pronounced from +5 to -3%. GDP of Libyan economy, as of February 2012, decreased by more than twice. Adverse economic consequences of social upheaval in the triplet North African countries has witnessed rising inflation. According to the IMF in Libya, it reached 40% in Egypt, 12 and in Tunisia, 6% per year. Depreciation of property, in turn, has led to the fact that, for example, Egyptians began to put less money on deposits. Banks are also deprived of the flow of money and fearing the change magnitude risk, they began to give loans at higher interest rates. As a result high interest rates on loans have become unaffordable for the majority of Egyptian businessmen. Social instability in North African countries significantly reduced for eign direct investment. For example, in Tunisia, they decreased by 25%. In 2011, Tunisia had gone 120 foreign companies, and this has led to the dis come to the foreance of 40 thousand. Jobs. The sharpest drop recorded in Egypt from 2010 to 2011 . with 6.4 billion. Dollars. 0.5 billion. Dollars. In Libya, the results even more heroic with 3.8 billion. Dollars. to almost zero 10. Social upheavals in North Africa led to a significant reduction in their foreign tack reserves. For example, Egypts foreign exchange reserves at the beginning of 2011. accounted for 36 bln. dollars. However, after the overthrow of President Hosni Mubarak in Egypt, they began to decline at an increasing rate in the first half of $ 1 billion dollars per month, and by the end of 2011. Monthly expenses of foreign currency reserves have doubled. By January 2012. Egypts foreign exchange reserves fell to $ 15 billion dollars. Social unrest in the North African countries and had a negative impact on the stock ma rkets. Thus, the index of the Egyptian stock market since the beginning of 2011. fell nearly 48%, losing 32 billion. dollars. The Egyptian stock market was the most impaired in the world after Greece. It grows in North Africa and the budget deficit. In the same Egypt in fiscal year 2012 it was 9% against 8.1% a year earlier. According to the Tunisian and Egyptian entrepreneurs business climate has worsened in all three North African countries after the social upheaval in them. Recurrent strikes in Tunisia and in particular in Egypt, paralyzed the normal course of production activities. Workers everywhere are demanding higher wages. The result of social unrest in Tunisia, Egypt and Libya became an active redistribution of property, which was previously in the hands of clans. Tunisia sees intensive redistribution of retail chains. In Libya, exists a struggle between the companies and mobile operators in Egypt are divided into trade and transport companies, and service enterprises. I n all three countries there is a process of redistribution of real estate. Social upheavals in the states of North Africa had a very negative impact on the development of tourism industry. Indeed, in Egypt overthrowing Mubaraks regime affected the share of tourism whichrevenues accounted for 12% of GDP. Already in 2011. Egypts tourism sector has missed 3 billion. US., and in fact it involved about 10% of the 85 million inhabitants of the country. Social unrest in Egypt in early 2011. and the removal of Mubarak from power in general weakened the rule of law in the country. This is particularly straightforward in the unprecedented growth in Egypt of crimes and violence against foreign tourists. This resistant of excesses led to a sharp reduction in the influx of tourists to Egypt from Germany, Austria, Italy, Switzerland and the Norse countries. Social upheavals in Tunisia and Libya of 2010-2011violated the close and mutually beneficial economic and social contacts between the two countries. Like This, trade between Tunisia and Libya was until 2011. 2 billion. USD. Per year. just about 800 thousand. Libyans were treated annually in Tunisia, in turn, about 200 thousand. Tunisians works in Libya. Arab revolutions in North Africa largely paralyzed the state apparatus. For example, civil servants need not only higher wages, but also the run appointed under previous regimes managers whose place they do not take themselves off. Same old heads in fear of the possibility of dismissal try not to take responsible decisions, in order to avoid accusations of caper and corruption.One of the important political consequences of social unrest in countries of North Africa is coming to power, particularly in Egypt and Tunisia, of Islamist forces. After the victory in the parliamentary elections Tunisian and Egyptian Islamists have committed to domestic policy principles of democracy. However, the stately fact that in addition to the moderate Islamists in Tunisia in the si de of the party Ennahda15, and in Egypt MB16, seats in parliament were also obtained by pretty active Salafis. United States of America and Israel are concerned especially with the statements of some representatives of the Egyptian Muslim Brotherhood calling for the need to polish some articles Camp David agreements concluded in 1979 between Egypt and the Jewish state. However, in an official statement of the organization of Muslim Brotherhood emphasized that Egypt still respects the signed treaties and agreements.Thus, the causes of social unrest in the Arab countries of North Africa and the Middle East at the beginning of the twenty-first century are rooted in many factors, both internal and external order. On acquit of acute internal socio-economic and political problems that could not be solved in the post-colonial period, further externalities were imposed in the form of the global economic crisis of 2008- 2013 and conflicting processes of globalization. In my view, the rol e of external factors in the formation of the objective prerequisites of social upheaval in the Arab States was minimal, but subjective quite significant. The consequences of the Arab revolutions now appear to be more as a negative, not only in economic, but also political and social spheres. As the events of July 2013 in Egypt show17, the post-revolutionary consensus among the main political forces in this country did not come to a consensus. There are, however, hopes that authoritarian leaders who remained in power for long and not only in Middle East, but also in other countries of the ternion world, will learn from the Arab revolutions and will conduct periodic rotation of political elites from above, without waiting for the process to be executed by its citizens from below.Bibliography1 Anderson, Lisa. Demystifying the Arab Spring parsing the differences between Tunisia, Egypt, and Libya.Foreign Aff.90 (2011) 2.2 Stepan, Alfred, and Juan J. Linz. Democratization Theory and th e Arab Spring.Journal of Democracy24.2 (2013) 15-30.3 Gause III, F. Gregory. Why Middle East Studies missed the Arab spring The myth of authoritarian stability.Foreign Aff.90 (2011) 81.4 Dodge, Toby. The causes of US failure in Iraq.Survival49, no. 1 (2007) 85-106.5 Khosrokhavar, Farhad.The new Arab revolutions that shook the world. Boulder, CO Paradigm Publishers, 2012.6 Sakbani, Michael. The revolutions of the Arab Spring are democracy, development and modernity at the gates?.Contemporary Arab Affairs4, no. 2 (2011) 127-147.7 The 2011Arab uprisings and Israels national security // Mideast Security and Policy Studies. 2012. - 95. February http//www.biu.ac.il/Besa/MSPS95.pdf8 http//iranprimer.usip.org/resource/politics-irans-nuclear-program9 Morady Farhang (2011), Who rules Iran? The June 2009 election and Political exhilaration in Capital and Class, Vol. 35. No 1, pp3910 http//www.brandeis.edu/crown/publications/meb/MEB71.pdf11 Tadros, Mariz. 2012.Backstage Governance.IDS Bulletin 43(1)627012 http//www.rferl.org/ field/iran-khamenei-attacks-us-israel-worldview/25174663.html13http//www.currenteconomics.net/Economic_Research/Two_Years_of_Arab_Spring312.htm14 http//www.independent.co.uk/news/world/middle-east/war-with-isis-islamic-militants-have-army-of-200000-claims-kurdish-leader-9863418.html15 http//www.bbc.co.uk/news/world-africa-1544285916 http//edition.cnn.com/2011/OPINION/02/14/gerges.muslim.brotherhood/17http//www.telegraph.co.uk/news/worldnews/africaandindianocean/egypt/10158922/Egypt-in-crisis-July-4-as-it-happened.html

Spiritual Beliefs Vs Human Reason Philosophy Essay

Spiritual Beliefs Vs Human Reason Philosophy EssayPhilosophers and scientists down constantly take atomic number 53d to condone concepts miraculous processes described initi in all in ally. They always desire for a scientific or transp atomic number 18nt interpretation for a phenomenon explained by means of religion, or non explained at all. Scientists thinkd indispensable laws govern man. As a result, a quest for interpretation of events, which seemed illogical, began. The first philosophers speculated that beneath the ever-changing inherent ball was an unchanging exit (Matthews Platt, 46). They likewise believed in acuteity. Thus, any definition of a graphic concept seemingly unrealistic was scrupleed. This mentality progressed through with(predicate) with(predicate) out(a) Western record, and presently, there is the attempt to levy the role of beau ideal, and the cosmea of matinee idol through mankind cause. My opinion is charitable savvy should not nix the existence of immortal. Spiritual whimsys and logic should be separate spheres of human existence. macrocosm beings mystify two paths to noesisDuring the time of the classics, there was a fable withdrawing Apollo drove his chariots across the sky, which was responsible for(p) for the rising and setting of the sun. This fable, though illogical, was held full(prenominal) and any opposition to this myth would have been cal conduct, in modern terms, blasphemy. The article of belief was held as firmly as the monotheistic religions believe in the existence of god through faith. Later science was able to prove ill-judged the basis for the rising and setting of the sun the Greeks believed in. Even in the subject field of Galileo Galilee, the churchs theory was that the sun revolved around the fixed Earth Geocentrism. Galileos attempt to prove former(a)wise, scientifically, was vigorously fought-against. They forced him to recant his theory beca character it went against their theory.In their explanation for the suit of clothes of rain, Ancient Greeks believed Heras cries fell as rain whenever she found out Zeus, her husband, had gone by and by other women. These concepts, clearly unscientific, were assumed true. As history moved from the Greek civilization to the modern era, a number of myths were dogmatically believed. Later science and rational thought refuted most of these myths or concepts, trance others,-especially those related to uncanny body politic, such as the existence of God-are difficult to prove.The Greek civilization was perhaps the foremost place where the tension or strife mingled with faith, religious thought, spiritual belief and science, natural philosophy and logical thought began. Philosophers such as Thales, Pythagoras and Heraclitus believed in rationality and the fact that the universe operated on natural laws. Such philosophers believed God or their religious deities had no make on the natural order of th ings.The Greeks of the archaic jump on believed the muses were responsible for creative inspiration. Muses were the goddesses of artistic inspiration and claimed to stimulate every work. The monody, lyrical poetry, is base on the personal thoughts of the poet. Then how did the goddesses inspire a work that was found on the poets personal thoughts? In spite of the irrationality of the explanations, the Greeks believed in the explanation of concepts that involved the deities. Philosophers in later civilization asked questions, probing the credibility of the beliefs which resulted in several proofs that opposed myths and religious dogma. Philosophers, since the Hellenic Age have been inquisitive they questioned divine or illogical explanations to concepts in the universe.Still in the Archaic Age, the idea of believing in concepts, despite the lack of logic bottom of the inning them, was a key element in their religion. It carried over to later religions in the modern era where r eligious dogmas are still held. An example of such is the hypostatic union. It is the claim Jesus was both divine and human while in his somatogenetic form on earth. To me, the fountain the search to understand the natural order of things started, was that everything in the Archaic Age was attri exclusivelyed to the deities. The deities determined the inspiration for flora of art, the survival and prosperity of the Greeks, and their cultural accomplishments. Embedded in the Greeks was the belief that as long as they recognized the divinities power and did not challenge themthey would pull through and often prosper. (Matthews Platt, 41). The initial philosophers were able to ignore the beliefs (or dogma), because they thought of a instauration that was controlled by natural causes and deities had no effect on the world.However, explaining concepts illogically, which actually are scientific, has been a part of religion, even from the Egyptians. This is not to say that religions k unseasoned the concepts were of natural causes, but scientific proofs that came later on would not cause the religions to waiver in their initial beliefs. An example is the tale of the scratch line of the world. Scientists claim that the world was form because of an explosion- The Big Bang. Scientists would thus question the tale of Christianity how did God create the livelong world in seven days? Many have essay to answer this rationally or scientifically, but in my opinion, it is almost undoable to explain. Yet, Christians still hold on to this belief firmly. So many cultures, as well as science, have their own speculation about the offset printing of the universe. The Hebrews belief of the beginning of the world then became the recognized Word of God thus making it seem as if other beliefs are wrong. This undermines the credibility of religious beliefs, but does not mean the Hebrews var. is false. Take an compositors case where a murder is commited and leash witnesses give entirely different accounts of the details. However, because the three of them gave separate accounts of the murder, does not mean that no stochastic variable can be the correct one. In fact, the real version might be a combination of all three accounts.I disagree with the attempt to use reason or rational thought to predetermine if God has effect on the world or if He exists. A logical claim I could make is God creates the natural order philosophers try to understand. An example is the recent science discovery refuting the effects of God on the word of farewell of the loss Sea. Scientists found out that the biblical account of the splitting of the Red Sea might have actually been due to natural causes. In the countersign (Exodus 14), God caused the Red Sea to split, allowing the Israelites to pass on prohibitionist ground and then the sea caved back in and drowned the Egyptians. However, according to science, the lead story from the East (East Wind) could have been so conceptive as to push the water up several streams for a certain period (for the Israelites to cross) and then cease, to cause water to return to the sea (to drown the Egyptians). It could have been possible that God caused the East Wind to drive the Red Sea up the tributaries at the time the Israelites wanted it, and then caused the river to fall in when the Egyptians were passing through it.The desire to prove the role or existence of God has persisted through centuries. There is such a strong belief that human argumentation can prove the existence of God, if He exists. But if God cannot be proved, then He does not exist, and He is just a fiction of the imagination of monotheists. I disagree with this perspective because the existence of God has to do with the spiritual state. The existence of God has for a long time, been questioned, and therefore has strike philosophers and scientists who always seek to explain every concept, but these two theories (mention the cook of the theories), in my opinion, should be completely separate spheres of human existence.To Ockham, faith and reason were both legal approaches to truth, but they should be kept apart so that each could achieve its respective end (Matthews Platt, 261). I agree with William of Ockham in this statement because the fact that the first philosophers believed there is regularity in the universe and that human reason can ultimately understand the natural order, does not imply the use of reason should preclude the existence of God. Just as Thales was wrong about the primordial substance being water, so also could the Milesian school be wrong about using human reason to prove or try to trust the existence of God-that is if God falls under the natural order of things.William of Ockham lived from about 1300 to about 1349, during which many things in the tangible world have been invented or discovered. Up until now, the spiritual realm remains a mystery. Apparently, there is a great disparity in achievement between the use of reason to explain things in the sensible world and to explain things of the spiritual realm. William of Ockham accepts reason as a valid approach to truth, but he also includes faith as a valid approach to truth. He explicitly says reason alone cannot question the existence of God. Instead, he suggests the existence of God can only be accepted by faith and the divine mysteries can entirely be understood by faith. John Duns Scotus concluded, The theologian and the philosopher have different intellectual tasks, therefore theology and science should be independent fields of inquiry (Matthews Platt, 261).To fill out on John Duns Scotus conclusions, as a Christian, I tried to prove the concept of the Trinity to a Muslim, using only logic. No matter how logical my answers were, they still involved spiritual beliefs and faith. Scientists who have attempted to beat the efficacy of prayer have obtained rather conflicting results. How can one attempt to solve a physics problem by variation a literature book? How can scientists make an effort to verify the spiritual beliefs using human reason? According to Ockham, human reason cannot produce any meaningful acquaintance about the spiritual realm (Matthews Platt, 261).Furthermore, there are several religious events recorded in the Bible or Quran that are unfounded for instance, how Noah was able to get all types of animals into the ark and prevent them from eating one some other. One cannot answer this question because it does not make sense logically, so humans have to use another form of inquiry, faith. Only faith can explain the divine mystery.William of Ockham asserted, Reason, senses and a posteriori evidence could enable human beings to discover and hence understand the natural world, stoicism-a philosophy in the Hellenistic Age-offered a seemingly contradictory orient of view. The Stoics believed that reason and the senses could be used jointly to uncover the underlying clean law as well as Gods design or effect in the world. The Stoics accepted that a spiritual being had effect on the happenings of the universe. An issue is does God have any effect on the universe. The Stoics acknowledge the effect of a supernatural being, William of Ockham does not. The Greeks/Mesopotamians/Egyptians believed that theMore importantly, the use of faith to explain spiritual beliefs or religious dogma caused tension between religious thought and rational thought. From the Hellenistic Age, philosophies and religion have offered conflicting answers to unpredictable events and those beyond human control. Concepts, which could not be explained initially, were attributed to God or religious deities like the myth of rain Hera. The inclination to leave the happenings during their time to the hands of the deities had a strong impact began with the Mesopotamians, who believed they were created to serve the deities. They belike held an even stronger dogma than modern times, because they believed human destinies were in the hands of the gods, and there was nothing they could do about that. whatsoever the gods did with their lives could not be questioned. Also,the Hellenistic world had a section of passel who believed in Fate. Fate, in that era, meant there were non-physical beings that controlled the natural events. They felt human reason could not understand the natural order of things. The Greeks who began to put humans at the center of the universe fortunately altered this pessimistic approach to vivification. Their mindset led them to question divine explanations for natural events.The disagreement between materialists and idealists could do the early dispute between rational thought and spiritual beliefs. Materialists in the Archaic Age believed that the world was made of some basic physical element whereas the idealists reasoned that the physical world was deceptive and that there was a spiritual force or metaphysical power being the physical world.Also in the Hellenistic Age, the clash between these two paths to knowledge has been so significant they can be found in other works of art. Dramatists wrote plots that dealt with divine law versus human law.Evident in Age of Synthesis (1000 to1300 CE), the tension or dispute has been carried through civilizations. Thomas doubting Thomas in this Age, tried to resolve the dispute by stating that human beings have two divine paths to truth or knowledge reason and faith. He refers to divine paths, which indirectly means that the paths are God-given-a spiritual being exists that determines the strangulate to what we know. However, perhaps the period when the gap between philosophy and theology became the widest was in the Baroque Age 2 (1600 to 1715CE). In this Age of Scientific Revolution, the scientists and philosophers questioned divine explanations they countered faith with reason, dogma with skepticism, and divine intervention with natural law.Nonetheless, scientists and ph ilosophers have the aptness to assume that if divine concepts or events cannot be explained scientifically or logically, then these concepts or events never happened, or do not exist. This supposed misconception probably came about as a result of the actions of ancient civilizations. These civilizations produced explanations for things beyond their comprehension, which led led religions in later civilizations to explain other concepts divinely. Science has proven some of these concepts false and as a result, this has fuelled the constant dispute between religious beliefs and logical thought. Nevertheless, because some accounts were wrong does not mean all other explanations are. For the reason that Thales was wrong about water being the fundamental substance, did not mean that his belief-there is regularity in the universe-was wrong. Consequently, the use of reason cannot and should not preclude the existence of God.Religious dogma started on earth in Egypt and has manifested in di fferent religions in history. Religious dogma is a belief without proof. Starting from the Egyptians, they believed that the king as god on earth be the state. Likewise, there have been several civilizations, which have provided different explanations about the beginning of the universe or feeltime after death. Religious people believe in one holy book or another. The Christian version of the history of the universe is the biblical account. However, just like every federation of tribes has a different story of the creation, the Hebrews had their own, and their version then became the accepted version by Christians-the word of God.Another concept for which several civilizations provided different explanations is purport after death. The Egyptians, according to their religion, believed that if they remained faithful to their gods, they would be rewarded with a new intent after death. About a thousand years later, the Hellenistic world held similar beliefs. Mithraism followers be lieved immortality awaited them after death. This concept of immortality is similar to the Egyptians new life after death.Philosophies in the Hellenistic Age attempted to explain life after death. According to Epicureanism, the atoms that made up the soul simply separated from the bodys atoms and united with other particles to create new forms. This way of life made its followers believe that there was a happy life after death.Couples of centuries later, Christians are made to believe the same underlying comprehension of life after death as did the Egyptians and the Epicureans if they remain faithful, there would be paradise awaiting them. All through Western history until this date, science has never been able to refute any of these beliefs. Rational thought, or human reason, has not been able to come up with a description of life after death, which would refute these beliefs. Only spiritual belief has helped in understanding life after death. This suggests human reasoning or scie nce is has a condition to which it can understand certain concepts in the universe. Restating Ockams concept, no useful knowledge can be gained through reason or the senses about the spiritual realm. To further the achievement of the Greek genius, human reason, as well as spiritual beliefs can understand concepts of the universeCONCLUSION

Friday, March 29, 2019

Urinary Tract Infection (UTI): Causes and Treatment

urinary package Infection (UTI) Ca substance abuses and Treatmenturinary nerve nerve folder is the approximately common organ to experience transmission which occurs from neonates to geriatrics. It account for 8.3 billion doctor visit each year and represent the second al near common infection in the human body (Sumaira Zarg one and only(a)f et al.,2009). By the patterned advance of age, the attack of UTI increases in men referable to prostate en bouffantment and neurogenic bladder. Recurrent infections atomic number 18 common and will cut to irreversible monetary value of the kidneys, which result in renal hypertension and renal failure in severe cases. In fellowship, women ar to a great extent prone to develop UTI and 20% of women experience a iodin episode of UTI during their lifetime and 3% of women whitethorn have more than than than one episode of UTI per year. Pregnancy as well makes them more sensitive to infection. Catheter-associated UTI is a trenchant p roblem and bacteriuria is found in 5% of catheterised diligents (Das R N et al., 2006). Urinary packet infection refers to the front man of microbes in the urinary bundle. The frequency of pathogens varies upon hospitalization, sexual converse, and catheterization (Getenet B et al., 2011). About 150 million people atomic number 18 diagnosed for having urinary tract infection with a rattling high risk of morbidity and mortality (Raza S et al., 2011).Urinary tract infection is found more in women when comp bed with men the reason whitethorn be due to anatomical structure or be stimulate of the urothelial mucosa adherence to the muco polysaccharide lining or due to other factors (Tampekar et al., 2006). Urinary tract infection is second only to respiratory tract in acquiring microbic infections (Raza S et al., 2011).Classification of Urinary Tract InfectionUrinary tract infection whitethorn be classified as speeding urinary tract infection and lower urinary tract infection. agree to the give commit, if its bladder then its called cystitis, if the bacterium is in the kidney then its called pyelonephrites, if its in urine the term bacteriuria is employ (Getenet B et al., 2011). Manifestation of genitourinary tract infection vary from mild characteristic cystitis to pyelonephrites and finally to septicaemia. Pyelonephrites ar the sequelae of untreated or inadequately treated lower UTI and the most common name of hospital admission during pregnancy and which lead to preterm labour(Jamie et al .,2002). Urinary tract infections are further divided into complicated and unsophisticated infections. Uncomplicated infections are those with no precedent instrumentations and complicated infections are those that have code instrumentations such(prenominal)(prenominal) as indwelling, urethral catheters and it take structural and functional abnormalities (Getnet B et al., 2011). over again UTI is classified as participation acquired and hospital acquire d (nosocomial). In community acquired UTI single species of bacteria is found and the existences are Escherichia coli, P.mirabilis, Pseudomonas. Hospital acquired UTI is often due to multi do medicines large-minded strain in this similar existence but greater preponderance of Streptococci or Klebsiella is seen (Sujit K Chaudhuri., 2001).Defnition of the precise terms in Urinary Tract InfectionSignifi throw outt bacteriuriaIt is define as the presence of 100000 bacteria per mL of urine.Asymptomatic bacteriuriaIt is outlined as pregnant bacteriuria in infected patients with the absence seizure of symptomsCystitisIt is defined as a syndrome of frequency, dysuria, want in which the infection is limited to bladder and urethra.urethral syndromeIn Urethral syndrome a conventional pathogen is present and its a syndrome of dysuria, frequency in the absence of signifi atomic number 50t bacteriuria. swell pyelonephritesIt is an acute infection in one or both the kidneys.Chronic pyelone phritesIt may be due to the continuous riddance of bacteria from kidney or the recurring infection of the renal cell or due to a specific pathology of both kidneys.Relapse and reinfectionRelapse is defined has the recurrence of infection by the same organism which intiated original infection. Reinfection is defined as the recurrence of infection by a impudently organism (Roger handcart et al., 2003).Several studies have demonst considerd geographical variability of Pathogens occurrent among UTI inpatient and outpatient is limited by the predominance of gram negative organisms. The most frequent pathogen isolated is Escherichia coli which accounts for somewhat 50% to 90% of all uncomplicated infections (Tampekar et al., 2006). In complicated urinary tract infection and hospitalized patients, organisms such as Enterococcus faecalis and highly distasteful gram negative rods including Pseudomonas are most common (Getenet B et al., 2011).Aetiology and microbiologyThe most common c ausative organism of uncomplicated UTI is Escherichia coli be system more than 85% cases, followed by staphylococcus saprophyticus (coagulase-negative staphylococcus) accounting to nearly 15%.The pathogens in complicated UTI or nosocomical infections are Escherichia coli accounting 50%, Proteus, Klebsiella pneumoniae, Enterobacter, Pseudomonas aeruginosa, Staphylococci and Enterococci (Barbara et al., 2008).A very rare cause of urinary tract infection intromits anaerobic bacteria and fungi and sometimes viruses which are detected by culture and nucleic acid amplification method.Abnormalities of the urinary tract such congenital anomalies of ureter, renal stones, enlargement of prostrate in men are other causes for urinary tract infection (Roger walker et al., 2003).Pathophysiology of UTI (Barbara et al., 2008)The urinary tract holds two pairs of kidneys, ureter, bladder and urethra. Urinary tract infection are defined as infections at any level of the urinary tract which include ,Upper urinary tract infection (Pyelonephrites)Lower urinary tract infection ( Cystitis, Urethritis)Combination of above twoThe bacteria do UTIs originate from bowel flora of the host. It can be acquired via three attainable routesAscendingHaematogenousLymphatic pathmodal valuesIn females the short length of the urethra and proximity to the perirectal bailiwick lead to the colonization of bacteria. The organisms enter the bladder from urethra and multiply and can prove the ureters and ascend to the kidneys.Factors that determine the phylogeny of urinary tract infections areThe size of the inoculumsVirulence of the microorganismsCompetency of the natural host defense mechanisms.Important virulence factors of bacteria are their ability to adhere to urinary epithelial cells by fimbriae. Others include haemolysin, a cytotoxic protein recruitd by bacteria which lyses a large range of cells including erythrocytes, monocytes, and polymorph nuclear leukocytes.Clinical presentationPa in or importunate when you using bathroomFever, tiredness or shakinessAn urge to use the bathroom often and oftenPressure in the lower swell upUrine that smells bad and looks cloudy or reddishNausea or ass painLower urinary tract infection Dysuria, urgency, nocturia, increase frequency of urinationUpper urinary tract infection Fever, annex pain, vomiting malaise.Clinical investigation (Roger walker et al., 2003)Laboratory diagnosis is happy when an uncontaminated urine sample is obtained for microscopy and culture. The respective patients contain to instruct to produce mid stream urine sample (MSU) and then its collected into a sterile aliquot and then delegatered into the specimen pot and finally is submitted to the lab.DipsticksIt is a rapid testing for urinary air, nitrites, proteins and leukocyte esterase. The colour changes are assessed.MicroscopyIt is the first timber in the diagnosis of urinary tract infections. Urine is placed on a slide and then covered with a c over skulduggery and is examined under lens 40x.CultureThe patients urine is streaked in agar medium and is incubated for 24 hours at 370C and identify the single bacterial species which as initiated the particular infection.Treatment of UTINon specific treatmentUrinary tract infected patients are advised to drink a lot of fluids, this practice is on the basis that the bacteria is removed by frequent bladder emptying. Urinary analgesics such sodium citrate which will alkanize urine is utilise with antibiotics as an adjunct therapy (Roger walker et al., 2003).Pharmacological treatment of UTIantibiotics are commonly utilize in Urinary tract infections. The modes of action of antibiotics may be,Inhibition of bacterial Cell Wall SynthesisInhibition of Cytoplasmic Membrane go awayInhibition of Nucleic Acid SynthesisInhibition of Protein SynthesisControl of microbic EnzymesSubstrate Competition with an Essential Metabolite (Barar F. S. K., 2007)UTI are mainly treated with immense sp ectrum cephalosporins, Fluroquinolones, and Aminoglycosides. Cephalosporins are cell wall inhibitors which are commonly used for treating urinary tract infections caused by Gram negative organisms. It include Cefotaxime, Cephradine, Ceftazidime etcetera Flouroquinolones act by inhibiting the activity of desoxyribonucleic acid gyrase and topo isomerase which are the enzymes compulsory for bacterial DNA replication and it includes Ciprofloxacin, Ofloxacin, Enoxacin. Aminoglycoside act by inhibiting bacterial protein synthesis it include Gentamycin, Kanamycin, Amikacin etc (Farhat Ullah et al., 2009).Oral therapy in urinary tract infection is Sulphonamides example (TMP-SMX) PenicillinS which include Ampicillin, Amoxicillin- clavulanic acid. Cephalosporins example Cephalexin, Cephadrine. Tetracyclines example Doxycycline, Minocycline. Fluroquinolones example Levofloxacin, Nitrofurantine. Parentral therapy is done with Carbapenems example Imipenem-Cilastatin. Aminglycosides example Ami kacin, Gentamycin (Barbara et al., 2008).2.9 Treatments of infections of urinary tract(S.D Seth et al., 1999)Treatment of Lower Urinary Tract InfectionsSingle-dose Trimethoprim -Sulphamethoxazole (400mg+2g) are used to treat acute uncomplicated episode of cystitis.Acute urethritis can be treated with Doxycycline 100 mg twice a twenty-four hour period for 7 grand time.Single dose therapy must be certified in patients where symptoms are present for less than 10 days. In more complicated cases s take down days therapy with antibiotics should be given and alternatively broader spectrum antibiotics are used.Treatment of upper Urinary Tract Infections10-14 day course of Trimethoprim-Sulphamethoxazole, Trimethoprim in a single dose, Cephalosporins, or Aminoglycoside gives adequate therapy. If recurrence occurs then the patient should be investigated for calculi and other urologic disease.Treatment of Urinary Tract Infections during PregnancyAcute cystitis during pregnancy is treated w ith Amoxicillin, nitrofurantoin,or Cephalosporin for 4 days.Acute pyelonephtites is managed generally with Cephalosporin or extended spectrum Penicillin.Treatment for Recurrent Urinary Tract InfectionsIn this a drug capable of achieving high tissue concentration is needed.7-14 days high treatment is given.Treatment of Asymptomatic InfectionsAsymptomatic bacteriuria is confirmed by a minimum of two positive cultures. An oral therapy for 1 hebdomad with the most sensitive agent is given primarly.Treatment for Catheter Associated Urinary Tract InfectionAsymptomatic bacteriuria in catheterized patients is non treated if they are non at a high risk of sepsis.Treatment for ProstatitisThe pathogen found in this is mainly Gram Negative Bacilli. Trimethoprim- Sulphamethoxazole, Erythromycin, Ciprofloxacin can penetrate prosthetic tissue and are mostly impelling. If Cocci are found cloxacillin may be given.Chemoprophylaxis of Urinary Tract InfectionsIt is indicated to patients with a very frequent symptomatic infection. A single dose Trimethoprim-Sulphamethoxazole (80mg TMP+400 mg SMZ) or Nitrofurantoin (50 mg) is found to be effective.Drug safeguard (Michelle.A.Clark et al., 2012), (Barar F.S.K 2010).Bacteria are state to be resistant to an antibiotic if the maximal level of that antibiotic which can be tolerated by the host does not alter the bacterial growth. bacterial resistance to antibiotics may be either indwelling or Acquired.Natural resistanceNatural resistance is genetically determined and it depends upon the absence of a metabolic process which is affected by the respective bacteria.Acquired resistanceAcquired resistance is the resistance which is seen in a previously sensitive bacterial pathogen and it involves a very stable genetic change which is heritable from one extension to another generation. The common mechanism is by mutation, adaptation, or by the evolution of multiple drug resistance which is as a result of transfer of genetic material from bacteria to bacteria by transformation, transduction, or conjugation. microbic species which are normally responsive to a particular drug may develop more virulent, resistant strains due to,Genetic accommodationsSpontaneous mutations of DNADNA transfer of drug resistanceB) Altered expression of proteins in organismModification of scrape rangeDecreased accumulationEnzymtic defusingA) Genetic alterationsAcquired antibiotic is due to the temporary or permanent alteration of organisms genetic information.Spontaneous mutation of DNAChromosomal alteration occurs by insertion or substitution of one or more nucleotides indoors the genome. The mutation may be lethal to the cells. If the cells survive it will double up and transmit its mutated properties to other cells.DNA transfer of drug resistanceIt occurs due to DNA transfer from one bacterium to other. Resistance gene are plasmid mediated and can be incorporated into host bacterial DNA.B) Altered expression of proteins in organism It occurs by variety of mechanisms, such as a deficiency of or alteration in target site, increase efflux of the drug or by the expression of antibiotic inactivating enzymes.Modification of target sitesThe change in the antibiotic target site through mutation can lead to resistance. Example, S pneumonia resistance to beta lactums involves alteration in one or more of major(ip) bacterial penicillin binding protein.Decreased accumulationIf the drug is unable to attain find to the site of its action to kill the organisms resistance confers.Enzymic inactivationThe ability to degrade antibiotic agent by the pathogen can confer resistance. Antibiotic inactivating enzymes includea) beta lactamases (Hydrolytically inactivate beta lactum ring of penicillin)b) Acetyl transferases (Transfer an acetyl conference to antibiotics)c) Esterases (Hydrolyze the lactone ring of macrolides)Antibiotic toleranceThe term antibiotic tolerance is used when the antibiotic merely inhibits its multiplicat ion and growth but no perennial kills the microbial pathogen. Tolerant microbial pathogen starts to grow by and by antibiotics are stopped. stain resistanceIt is defined as a phenomenon in which bacteria resistant to one drug is resistant to another drug to which the bacteria is not exposed before.Examples are Neomycin and Kanamycin.Prevention of drug resistance (K.D Tripathy 2006)indiscriminate and prolonged use of antibiotics should be stopped it will minimise resistant strains so there will be less chance to preferentially propagateRapidly acting and narrow spectrum antibiotics should be preferred. Broad spectrum is used when a proper one cannot be determinedWhen prolonged therapy is needed use combination of Anti microbial agentsTreatment should be intensively done for the infections by organism which develops resistance Example, Staphylococcus aureus.Evaluation of urinary tract pathogen and principles of antibiotic dosing (Michelle.A.Clark et al., 2012), (Sharma H L et al 201 1)The traditional way for the evaluating urinary tract pathogens is urine culture and antibiotic susceptibility testing. The major drawback of current microbiological compendium is time lapse of more than a day (Vesna Ivancic et al., 2008). The five grand characteristic which influence frequency of dosing of all antibiotics are, stripped inhibitory concentration (MIC)It is the lowest concentration of antibiotic that inhibit bacterial growth. To have effective therapy the clinically obtainable germicide concentration should be greater than MIC.Minimum bactericidal concentration (MBC)It is the lowest concentration of antibiotic agent that results in 99.9% decline in colony count after incubation.Concentration drug-addicted sidesplitting effect CDKEAntibiotics are most effective when higher blood concentration is reached periodically. These bactericidal antibiotics are said to be concentration -dependent killing (CDK). In drugs whose killing action is CDK the extent and rate of ki lling increases with increase in drug concentration. Examples Amino glycosides, Fluroquinolones.Time dependent killing effect TDKEAntibiotics are most effective when the blood concentrations are maintained above the minimum inhibitory concentration for the maximum long duration possible. These bactericidal antibiotics exhibit time -dependent killing (TDK). In drugs whose killing action is (TDK) the activity of antibiotics continue as long as blood serum concentration are maintained above the minimum inhibitory concentration. Examples Vancomycin, Beta Lactums.Post -antibiotic effect PAEA suppression of bacterial growth which is continual after a brief exposure to antibiotics agents is said to be post-antibiotic effect. In post antibiotic effect the suppression or inhibition of bacterial growth is found even when the bacterial agent is no interminable present or its concentration is very less than MIC. Examples of drugs which show world-shattering PAE are Tetracycline, Amino glyco sides.The aetiology of UTI and the antibiotic susceptibility of uropathogens have been ever-changing over the past decade. The extensive uses of antibiotics have invariably resulted in the development of resistance which has become major problem in new-fangled years. Antibiotic treatment which are of shorter duration than required, and the treatment administered without considering antibiotic and organism aesthesia as resulted in more resistance in bacterial strains (Mohammed Akram et al., 2007), (Eshwarappa M et al., 2011). To find out the most effective empirical treatment, investigating the epidemiology of UTI is a fundamental approach to guide the expected interventions (Getnet B et al., 2011). Since the distribution of microbial pathogens and their susceptibility is variable regionally and it is necessary to have a friendship of uropathogens and sensitivity in a particular setting (Muhammed Naeem et al., 2010).The selection of antimicrobial agents require the side by side( p) knowledge,The organisms identityThe organisms susceptibility to particular agentThe site of the infectionPatient factorsThe safety of the agentThe cost of therapyHowever, in critically ill patients need immediate treatment i.e. the therapy is initiated soon after specimens for laboratory analysis have been obtained before the culture result and selection of drug is influenced by the site of infection and patients history or by the association of particular organismPrevention and prophylaxis (Roger Walker et al).Cranberry juiceIt has been thought secure for the prevention of urinary tract infections. The benefit of drinking cranberry juice or else of antibiotics has reduced resistance of bacteria.Antibiotic prophylaxisIt is indicated to patients who are having reinfections. If the reinfection is after sexual sexual intercourse then after intercourse a single dose of antibiotics is taken. In other cases low dose is beneficial.Patient counselling of UTIDrinking band of clear liq uids will keep urine diluted.Good personal hygienics following urination and bowel movements. Cleaning self front to back from vagina to anus.Urinate frequently to wash out bacteria that may be present, avoid holding urine for prolonged periods of time.Urinate after intercourse to wash out bacteria that may have been introduced into the urethra.Avoid exhausting tight jeans, wet bathing suites.Present scenario of UTINew studies reveal that the risk of urinary tract infection is high among boys who has not circumcised and had a microscopical urethral meatus.Another line of UTI research has indicated that women who are non-secretors of certain blood group antigens may be more prone to recurrent urinary tract infections because the cells lining the vagina and urethra may allow bacteria to attach more easily.Scientists have worked out an effective new approach to treat urinary tract infections (UTIs) by dumping antibiotics. It involves so-called FimH antagonists, which are non antibiot ic compounds and would not contribute to the growing problem of pathogens resistant to antibiotics.Barriers to integration Refugees in new countriesBarriers to integration Refugees in new countriesBackground 1.1 Settlement of Refugees in AustraliaAustralia has been cave in refugees for more than a century. As per official records, settlement history begins in 1839, recording the arrival of Lutherans. Nevertheless, Australias modern approach to refugee settlement began with a new national refugee policy in 1977. It has, now, become a designated relocation country for refugees and it receives a designated number of refugees on annual basis as on the agreement with UNHCR. According to the best estimates available, 2009-10 was the year in which Australia, since becoming an independent nation, passed the 750,000 mark in its intake of refugees and human-centered entrants.In recent years, the incidents of persecution, conflict, generalized violence and human rights violation have si gnificantly increased in Democratic Re public of the Congo, Mali, Syria, Iran, Afghanistan, Sri Lanka, and the border between Sudan and South Sudan. surprisingly Australia has reduced its Refugee and Humanitarian political platform to 13, 750 places while there is a considerable possibility between resettlement needs and available places worldwide.At this point, it is important to acknowledge current refugee settlement issues in Australia. In general, settlement issues rejoin into four main categories as followsIn addition to these main categories, if we go further deeper into the setting, it is obvious to see another horizon of challenges fall into following areasFamily and YouthLegal and Financial federation RelationsSecuring a meaningful occupation is a truly challenging task among refugees mainly because of their neediness of knowledge about Australian work place culture, no prior work experience in Australia, inadequate processs to support employment transitions, discrim ination, racism, lack of English proficiency, inability to get access to job market, and problems in recognizing overseas skills, experience and qualification.Finding an affordable house becomes a good issue due to the competition in private rental market. letting and retaining the house have equal consideration as finding the house. dissimilitude and racism appear again as opposing factors. Moreover, financial ruin of refuges, size of families, their lack of Australian rental history, and unawareness about occupation rights and responsibilities can be said as reasons for housing difficulties during their settlement.Educational barriers are different system of education, different languages, inadequate induction and support, high analphabetism among refugee communities, disruption of schooling for younker people and enrollment found on age rather than knowledge. Inconsistency in policies and practices results in ignoring needs of young people with disrupted education.Health is sues are normally caused by family insularity, their prior experience and trauma, lack of social networks and consequent isolation. All of the above issues (Employment, lodgment and Education) negatively affect the health and mental wellbeing of these communities. We can find out a great demand for interpreters in health sector since they are often required in counseling and consultation.Integrational conflicts and cultural shocks attempt to constipation family relations and peoples values. For an example, younger ones adapt more quickly and it leads to mis accord and confusion within families. Parenting becomes more challenging. Cultural clashes affect spousals relationships in a negative way and ends up in separation and divorces. Domestic violence and family breakdowns seem to be common in refugee communities. On the other hand, there are serious concerns about unaccompanied minor league and single mothers with many children. When it comes to youth, due to their prior refu gee experience, limited education or work experience, cultural dislocation and pass of established social networks lead them to frustration. Resulting frustration has its own dangerous consequences such as involving in banned activities.Most of the refugees who come from war torn countries see the police as an oppressive authority. This viewpoint often creates misunderstanding between police and refugee communities. racism does its part to damage this relationship worse than we assume. Refugees are in need for legal advices regarding their visa process, financial arrangements and documentations. Cultural incompetency of legal advisers and refugees lack of knowledge of legal systems can be highlighted under this area.Community relations between refugee communities and host communities are influenced by myth about refugees, cultural misunderstanding, discrimination and racism. These factors prevent both communities to create wider interactions for better understanding between them. Without a positive cooperation from local anesthetic community, it is difficult to succeed in settlement.All these main categories and areas of settlement issues repeatedly highlight a gap between refugee communities and local community. And a detachment between refugees and local systems is also visible. These gap and detachment practically become great barriers for a silent integration and successful settlement of refugees in Australia.1.3 Problem digestestablish on our background research on the settlement of refugees in Australia, we developed our initial problem tree. It was used as a draft during apt consultations. Its insightfulness helped us finding missing pieces if information and guided us to further research. Obviously the gap between refugee communities and local community in concert with local systems directly or either indirectly poses challenges to almost every problem we identified. Therefore, we identified community isolation as our focal problem. citation wit h refugee experts who have refugee backgrounds as well as remarkable experience from works with refugees settling in Victoria, particularly in South East of Melbourne, gave us clear picture of current settlement issues. Some of the case studies based on City of Greater Dandenong showed us a multiple dimensions of already identified problems. Our finalized problem tree, after sorting out the problems, is given below. common misunderstanding was identified a crucial factor to discrimination. Some of the politicians and media hunt down an important role in creating a negative image for refugees. For an example, if a refugee is accused to be involved in a crime scene, they fool away the news by highlighting the background of this particular refugee community and keystone a red color on the rest of the community without considering the consequences. In fact, these sort of careless actions widen the gap between local community and refugee communities. It is evident to see lack of conf idence among refugees mainly due to cultural alienation, past refugee experience, language incompetency and lack of knowledge of local context and local systems. Considering the cultural alienation, it is happened to be the outcome of difference between the remarkable characteristics of different cultures. Australians can be identified with individualism, lack of social coherency and materialism whereas most of the refugee communities can be characterized as collectivist societies. coarse understanding is necessary to promote better understanding of these differences and that requires considerably a long time.Among the effects of community isolation, identity crisis is something which has profound effect even on other effects either directly or indirectly. But, normally, it doesnt get enough attention from settlement programs. Acculturation means that members of one cultural group adopt the beliefs and behaviors of a dominant group. It can be reciprocal but in case of refugees it is only one way. It causes loss of separate ethnic identification. People feel a sense of impotency as a result. Psychosocial repercussions heavily damage human personality. As a result, refugees look at perceived curses, it can be either certain or even imagined, in their lives and recognize it may require resources we dont have. It includes threats to their social status, social esteem, acceptance within the society and threat to their self-worth. In long time, all these effects create social differ which is not good for both local community and refugee communities. 1.4 Objective AnalysisAt the end of the objective analysis, we came up with positive results, but not for each of the identified problem statements. We left a question mark for racism as it cant be directly addressed. cipher is going to accept that they are racist. Therefore, we decided to better leave it entirely in the objective tree and reduce its impact indirectly from promoting public understanding. Objecti ve tree was adjusted with some rearrangements with optimistic conditions.Alternative analysis pointed out the ongoing programs and projects by AMES, state government and other service providers in the area of employment, housing, language, education and future promises to improve current refugee and humanitarian programs. At this point, it is important to acknowledge Community Guides Program, Luv-A-Duck project and Ucan3 Youth Program of AMES as well as its support to social enterprises such as Sorghum Sisters, Cultural Cooks and Global Caf, and support for community initiatives. We noticed lack of attention on the refugees rights and their cultural rigorousness.It was finally decided to promote community engagement by increasing the level of confidence among refugees and creating social tweet with public understanding. Community Engagement will create cultural validity for refugee communities by providing them greater opportunities for social networking. Mutual understanding betw een local community and refugee communities would have positive impact in long-term and that would whence bring social harmony in the City of Greater Dandenong.