Thursday, October 31, 2019

Ebusiness Research Paper Example | Topics and Well Written Essays - 1250 words

Ebusiness - Research Paper Example II. Competitor assessment The nearest competitor of the business is Dell Computers that also allow customization of personal computers to some extent. Dell Computers however rely too much on its own brand and suppliers that charge premium prices which is its disadvantage. This is where the business will position against Dell Computers to gain market share. The company will customize computers at a much lower cost because the parts that will make up the assembled computers will be coming from different suppliers affording customers greater latitude in terms specification and price. Other popular brands that sells online are also competitors but serves a different niche of customers who are not into customization of budget computers and such, not direct competitors. The traditional brick and mortar computer stores are also competitors only that the company can readily beat them in terms of price due to company’s lower overhead cost. III. Online marketing strategy The best way to gain market share is to differentiate from other competitors and serve a particular niche. In case of the proposed company, the product will cater to two types of customer. First, the technical users who would like to customize the performance of their computers. Second, the budget conscious users or business that are looking for ways on how to save on their computer purchase To be able to reach this target customers, the company must be able attract their attention. This can be done in several ways. First, the company can post ads in technical websites such as PC magazine, or even business websites such as The Economist where a link in such sites can land to the company’s homepage. It can also advertise with Google and even Amazon. Initially, it may suffice that the target customers has been informed of the company’s presence. But succeding marketing efforts should translate these product awareness into sales. Second, the company can sponsor popular blogs for review of certain computer parts that would lead the customers to visit the company’s website in their effort to know more about the product. If they are interested with the particular product, they can order it right there and then increasing the company’s sales. The company can also offer free online publication to those who would visit and register in the website to keep in touch with these potential customers. IV. Search Engine Optimization (SEO) Strategy There are several methods to optimize SEO for the site that would increase traffic and eventually to an increased sales. First, key words that is best associated with the company such as customized computers, computers, pc etch that would link popular search engines such as google, yahoo, bing etch to the site due to the usage of spiders that associate certain words to certain website. V. Social media integration Social media integration is now a need for business especially for online businesses where it has to make its presence felt by the customers. It also serves as a free advertisement of the company and can be taken as an extension of its official website where customers can inquire or look for information. Facebook would be an ideal venue because of its universal appeal. Twitter can be used for short

Tuesday, October 29, 2019

Cold Blood and Frankenstein Essay Example for Free

Cold Blood and Frankenstein Essay Compare how Capote and Shelley use different techniques for characterisation and their use of emotive, figurative language with the use of repition to show the theme of wasted lives In Cold Blood was written in 1966 when screenplays were very common. Authors such as Shakespeare wrote traditional plays so it was unpredictable that the readers of In Cold Blood would respond to the novel well as it was the first non fiction novel Capote wrote. Capote wanted to experiment with his writing using narrative techniques of the novel to depict real life events. Capote believed that the narrator should not interrupt in novels; but the characters should tell the story themselves. Capote was able to write a novel which displayed the real events surrounding the murder of the Herb Clutter family and shaped it into a storyline. In Cold Blood is based on a true story of the murders of a family- something which would be wrote about in todays society. The novel is an account of the events but also contains elements of Capotes creativity therefore it is hard to tell whether it is fictional or factual. Frankenstein on the other hand is a non fictional novel which is still read and appreciated today as it is of a gothic genre. Frankenstein was written in 1818 when science was seen as exciting but also dangerous as it was trespassing on the territory of God. The early 19th century was a time which generated exceptional events and ideas therefore it must have been quite interesting to read Frankenstein. The danger of science was a great classic theme and Shelley provided her gothic genre as a framework to tone the horror of failed science- the famous experiment gone wrong. Frankenstein is still a very popular novel today because of its fascination in science which is still explored. Capote portrays his character Bonnie as being a very timid and shy character. She has a heart faced shape which is symbolic to her personality and it suggests that she is a likeable character. The significance of this is that it makes the readers engage with her and they want to know her story in order to feel sympathy for her. Bonnie has bony hands and is quite petitie which suggests that she is quite vunerable- like the creature in Frankenstein. In Frankenstein, we get the creatures perspective, and what was I? this is similar to Capotes character Bonnie with both the characters looking for reassurance from someone. Both the writers make it easy for the reader to discover new aspects of the characters personalities. Capote uses emotive language in repition to suggest that Bonnie may have had a wasted life which makes the readers have sympathy for her. Capote uses the term spinster aunt which is a type of semantic change known for an unmarried woman. Even though the novel was written in 1966, the language is still easily read and understood. Unlike In Cold Blood, Frankenstein contains language which may cause a barrier if read today. Shelley uses words like loathsome and squalid which would rarely be used today however the novel is still effective at portraying the gothic horror through emotive and figurative language. In the extract of the dialogue between Jolene and Bonnie, Capote portrays the significance of the difference between Bonnie and Jolene. Jolene is a very confident character whereas Bonnie constantly panicks and stutters when she speaks; this shows that she may feel worthless and may feel that she is not noticed by others. Capote emphasizes Bonnies wasted life indirectly by comparing her to Jolenes character who comes across as very confident. The comparison of the two characters is quite significant as it shows the importance of emotion that Bonnie has felt. Capote brings a child like quality to Bonnie through the dialogue between Bonnie and Jolene, They dont need me, this shows that Bonnie may be looking for reassurance from Jolene. Capote makes the reader feel sorry for Bonnie in order to like her character as she may have had a bad past. The repition of they dont need me reinforces the sadness of Bonnie. It is also suggesting how she may not be very close to her family. Capote makes us aware of the sadness and timidness of Bonnie for the readers to sympathise with her and hope that she succeeds later in the novel. The insecurities that Capote brings out in his character can resemble the characters of todays famous novels. Shelley makes the readers realise that even though the creature is deformed, he is still a character who underneath his flaws should be treated the same as any other person. I was not even of the same nature as man, this shows that Shelley wants the readers to sympathise with the creature and almost feel his emotion. The creatures life is empty if not more than Bonnies as all he longs for is companionship. Shelley makes the readers feel quite sad for the creature as he is deprived of love. With the use of figurative and emotive language, I saw and heard of none like me, Shelley introduces feelings to the reader which can only be seen as human. The readers see that the creature is still an outcast even though he has tried helping people and tried being humane. Its unfortunate for the creature to have an empty life, one which he didnt really ask for and like the one Bonnie almost wished she didnt have.

Sunday, October 27, 2019

how to make a justification report

how to make a justification report Justification Report 1. Introduction I have been appointed as a project manager of MPAG (Mostper Park Automobile Group Ltd) which is a fast growing campany formed by the merger of a number of garages who sell used cars. As the newly formed MPAG, the garages then became dealers for the Average Autos Car manufacturer. Subsequetly, as the business of each garage has expanded to cover the sale of new vehicles, the parts and servicing side of the business has also developed. The primary business of each garage is currently considered to be in car sales; each garage deals in both new and used cars. The used cars held at a particular garage come from a variety of sources; some from customer trade-ins at that garage, some from exchanges with other MPAG garages. Each garage aims to keep a limited number of second-hand cars in stock, depending on current trends within the group as well as local sales patterns. Cars are frequently moved between the five MPAG garages in the Mostper Park Automobile Group to avoid any car remaining on a forecourt for any great period. In addition to used cars, each garage keeps a limited supply of new cars. These are available for customers to test drive or purchase. A record is maintained of all new cars on stock within the MPAG. If a customer requires a particular car and the local garage does not have the desired model or specification, the sales staff can check if another garage in the MPAG has one in stock. If one can be located then a transfer/exchange between garage is aranged by the manager. If not, in the case of a purchase requirement, they can place an order with the Average Autos manufacturer. Although members of the sales staff can take bookings for test drives, the final authorisation rests with the manager of the garage. Each garage has a number of other departments; parts, servicing and administration. The primary purpose of the parts department is in supplying the service department and supporting car sales if any optional extras are required which are not factory fitted. The parts department can also trade with customers directly. The service department at each garage has a variety of functions such as basic car servicing and valet service. A number handle MOTs. The small admin department takes care of staff administration functions. The admin department may also handle booking in cars for the service department and switchboard activities. The company decided to develop an online service and appointed a project manager to control the project. So my first tasks as a project manager would be; choose appropriate agile method in order to develop the solution and manage the project, guide the systems analyst to produce analysis and design documents which help to visualise the project well before the development, and Guide the developer to produce the software which meet all the user requirement. Comparing with last couple of decades, todays Information Technology (IT) manager is under ever-increasing pressure to deliver results in the form of applications that drive improvements to the bottom line even while IT budgets are being significantly slashed. Meanwhile, despite the fall of the Internet economy business environments continue to change at a rapid pace leaving many IT shops struggling to keep up with the pace of change. These changes have led to an increased interest in agile software development methodologies with their promise of rapid delivery and flexibility while maintaining quality. Agile methodologies such as extreme Programming (XP), SCRUM and Feature-Driven Development strive to reduce the cost of change throughout the software development process. So after the discussion of requirement gathering, the methodology will be decided to the above mentioned case study scenario. 2. List of Requirements This is the list of requirements for MPAG written below. The first sets of requirements can be considered as the main/ general requirements for every user without specifying their need. 1. The users should be able to create an account using Sign Up process. 2. Once a customer opens an account, he should be able to login using his user name and password. 3. The customer should be able to see online where the nearest garage is (The geographical location). 4. Then the user requirements are going to be categorized according to their major requirement of the time. After the main requirements, I have categorized the user requirements according to their wants and needs stated below. Service Department 1. Once signed in, the customers should be able to do a booking for their car service. 2. When the car(s) are garaged, the car owner should be able to see the progress online. 3. The customer should be able to store private data, such as VIN or license info, for easy access online. 4. The customer should be able to retrieve the history like the last time a repair was performed, with searchable repair forms. 5. The online profile should allow them to display their vehicle in virtual showroom. Sales Department 1. Once signed in the customers can search for used/new cars using advanced search options like manufacture, made, color, etc for the purpose of purchase before they visit the garage. 2. Once signed in the customers can search for used/new cars using advanced search options like manufacture, made, color, etc for the purpose of test drive before they visit the garage. 3. If the customers choice of car is not available in the nearest garage for purchasing or test drive, they should be able to send a request to the garage to get the specific car as soon as possible. 4. If the garage received the customer requested car from another branch, the customer should be acknowledged by sending an email. Parts Department 1. Customers should be able to search for a specific car part online in general (In the entire garage network) 2. Customers should be able to see a list of garages where a specific car part is available for purchasing. 3. They should be able to order it online, if they wish, as an online transaction so the goods will be delivered to him. Administration Department 1. Administration Department should be able to communicate with all the branch administrations as a network. 2. Handle booking in cars for the service department and switchboard activities. 3. The customers should be able to reach the main administration department for inquiry and customer service purpose. 3. Justification Report on Development Customer service is the best customer retention investment organizations can make. Customers expect immediate response and if dissatisfied can disappear. Therefore I am concluding my decision about the development stage of MPAG as I go in below written explanations considering those key facts. Investment in Business Outsourcing is the most effective way to ensure your customers are getting the response they require without a huge capital investment. The right partner adds value to your customer service program. Managing customer services takes special skills training, administration, systems, sales, creative work, legal assistance, and response and tracking technology. A service bureau, with its large volume of work and varied client base, can attract and retain the top specialists in the field. PROVEN PROCESS The outsourcing approach to customer service solutions is a powerful business model because it allows our clients to focus on their core competencies while allowing EMS to focus on ours customer service. You can concentrate on your business while we maintain and enhance your client base through the management of all types of electronic communications without the expense incurred by in-house, customer care programs. SCALABLE OPERATIONS Its hard to build as you go. The flexibility of a modular and scalable environment allows seamless support of your programs and grows with your needs. A service bureau already has the infrastructure and management team in place, so companies can buy the capabilities they need right now, without paying for what might be needed down the road. TECHNOLOGY PRODUCTIVITY MANAGEMENT Many companies look to outsourcing because its just too expensive to keep up on todays technology treadmill. As a result, powerful new products and services are made available to our clients way before such solutions would be possible under an internal development environment. FLEXIBLITY Outsourcing solutions are ready to be deployed very quickly, providing our clients with a clear advantage in time to market. Outsourcing allows clients to manage the growth of their business and improve customer contact, while we respond to, route and track customer electronic communications. 4. Justification Report on chosen Methodology After doing few research studies, I am coming to the conclusion of using SCRUM as the methodology. The main reasons for my choice of SCRUM can be stated as: Scrum delivers value to the business Scrum helps form high performing teams Scrum helps motivate and focus team members So giving an explanation note to each one of those above motioned facts I would like to start with the most important fact for the project manager: delivering values to the business. Scrum delivers value to the business through: Every iteration the product is ready to ship. Adapt to changing requirements: Short iterations mean that the Product Owner provides frequent feedback. As result there are frequent small course corrections as opposed to massive changes late in the project. Visibility of progress: delivering a working product at the end of every iteration means that the customer, executive sponsors and other interested parties can see the product take shape. They are not surprised six weeks before release. Accurate tracking of how much work is left before release: the combination of the product backlog and the teams velocity means that you tell how much the team will get done by the release date. Lightweight requirements: Since the team is in frequent (preferably daily contact) with the Product Owner, she spends less time writing detailed requirements. Instead she is able focus on making decisions and answering questions from developers. Process improvement mechanism to meet business needs: As business needs change SOX, FDA compliance, through the retrospective the Scrum process can be improved and adapted to meet goals and needs in changing environments. Apart from SCRUM, XP was also a considerable option for this project until I came across that XP is geared toward a single project, developed and maintained by a single team and it is particularly vulnerable to developers who are actually not very good at team working. Because in this project where I am going to be the project manager for MPAG, I would really appreciate the team spirit and gathering around for one motivation. And especially XP will not work in an environment where a customer or manager insists on a complete specification or design before they begin programming and it will not work in an environment where programmers are separated geographically as well which I think is one of the crucial reasons for this project where we definitely have to deal with different geographical locations of garages. And XP has not been proven to work with systems that have scalability issues (new applications must integrate into existing systems) which I think will be a drawback for the future development. So in conclusion, scrum provides a way for the business to maximize its ROI by using iterative development to rapidly create working software. It ensures that the team is always working to deliver the highest priority features which concludes any decision of using SCRUM for this project. Motivation Conclusion Concluding this justification report, so far I have gathered the requirements of MPAG, categorizing them to appropriate departments. Then I have finalized the methodology that I am going to apply for this project and how the development should be carried on. In this stage activities like last debugging, marketing and promotion havent taken place yet as this is the very initial stage I am reporting for. By finishing this activity the project will not be closed. But because of the unpredictability of the software development process its not possible to define exactly when this activity will take place and so the project may take shorter or longer than planned. But by using the controls given by Scrum, the project is now of course in the right route.

Friday, October 25, 2019

Internet - Ethics of Publicizing Security Vulnerabilities :: Free Essays Online

The Ethics of Publicizing Security Vulnerabilities   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚   Abstract:   In 1988, Robert T. Morris Jr. released the Internet Worm Virus, which essentially shut down the entire internet for a day.   Morris wrote the virus using known vulnerabilities in the UNIX operating system.   When these vulnerabilities are discovered, should they be publicized or kept secret to prevent further attacks?   These issues relate closely to the concepts of open source versus proprietary software development.    In 1988, Robert T. Morris Jr., a Cornell graduate student, released a computer virus.   The goal of this virus was to propagate itself across the Internet and to infect as many machines as possible in as little time as possible.   The Internet Worm, as it came to be known, was very successful; it infected millions upon millions of machines and essentially shut down the entire Internet for roughly twenty four hours. As a result of his creation and release of the Internet Worm, Robert Morris spent years in courts and paid significant amounts of money in lawyer and court fees, but never went to prison for his actions.   The Internet Worm case brings up an extremely important issue that increases in importance each year as the world becomes increasingly networked via the internet and through other means; should people have access to information about vulnerabilities in computer systems, or should these vulnerabilities remain secret?      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   At the time that Robert Morris wrote the Internet Worm, there were known vulnerabilities in the UNIX Operating System's Finger command, and in the Sendmail Daemon, the program responsible for transmitting electronic mail from one machine to another.   Anyone who had some amount of expertise in the UNIX Operating System knew of these weaknesses, yet no one had made an attempt to fix the problem.   Robert Morris apparently viewed this situation as a matter that needed attention, which many people speculate as his reason for creating the Internet Worm.   His ingenious virus used these vulnerabilities to attack systems and to propagate itself across the internet.   One fact is definitely known.   This is the fact that the Internet Worm gave many thousands of computer experts a strong reason to fix these vulnerabilities.    It is necessary to realize one important fact about the internet worm virus; it was not totally malicious.   That is, Morris did not write the virus so that it would try to do any damage to the hardware or software of the machines it infected.

Thursday, October 24, 2019

Cognitive and psychodynamic approach to psychology

The Difference Between The Cognitive Approach And The Psychodynamic Approach To PsychologyPsychologists introduced a figure of diverse attacks in order to understand human nature and behavior. There are different ways of explicating phenomena, which is why there are different attacks. These different attacks include Cognitive and Psychodynamic. The Cognitive attack began to revolutionize psychological science in the late fiftiess and early 1960s.Piaget is the best known cognitive development research worker who suggested that, believing progressed through qualitative alterations due to the increasing adulthood of encephalon. He is remembered for his surveies of cognitive development in kids ( 1896-1980 ) . The cyberspace site, quotes.net quotation marks Jean Piaget as stating â€Å"The chief end of instruction is to make work forces who are capable of making new things, non merely of reiterating what other coevalss have done† Cognitive psychologists are interested in how people understand, diagnose and work out jobs. Cognitive research chiefly focuses on how our encephalons procedure information and the research tends to take topographic point in the research lab than in real-life scenes. The cognitive attack provinces that cognitive upsets have been learned, and so can be unlearned. Harmonizing to Albert Ellis, when we think positively and do determinations based on grounds, we behave rationally, and as a consequence we are happy, competent and effectual. On the other manus, prolonged irrational thought can take to psychological jobs and unnatural behavior. Attribution theory suggests that when we are disguised with person ‘s behavior, we try to work out in our heads why the individual is moving Wyrd. Harmonizing to Kelley ( 1967, 1973 ) , when we are doing these ascriptions, we work out in phases, First, we try to make up one's mind whether the person is to be blamed for his actions, secondly, whether person else is responsible and thirdly, whether the state of affairs itself has influenced the individual to act in such a manner. Unlike cognitive attack, the psychodynamic attack focuses on the three parts of head which are witting, unconscious and preconscious and the three constituents of personality which are id, self-importance and superego. Conscious are ideas and perceptual experiences while unconscious are wants and desires formed in childhood. It was chiefly initiated by Sigmund Freud, a Viennese physician who specialised in neurology. All psychodynamic theories stem from depth psychology. Freud foremost developed the basic thought that understanding behavior requires insight into the ideas and feelings which influence our actions. Hill ( 2001 p.72 ) quotes Sigmund Freud as stating â€Å"I set myself the undertaking of conveying to illume what human existences maintain hidden within them† . Freud ‘s apprehension of the head was mostly based on interpretative methods. Freud argued that, childhood experiences play a important portion in grownup development including the development of grownup personality. Every kid must go through through the alleged psycho-sexual phases ; how a kid experiences these phases plays a important function in the development of his/her personality.Methods Of ProbeCognitive developmental psychologists have used methods such as observation eg Piaget day-to-day observation of kids playing and experimentation eg experiments comparing the ability of two different age groups to go through preservation trials. Piaget was looking at the sort of errors that kids of different age group make. Piaget ‘s theory provides elaborate description of development but does non truly explicate decently. By concentrating on the kid ‘s errors, he might hold overlooked more of import abilities that kids do possess. Psychodynamic psychologists nevertheless used clinical instance surveies, dream analysis and free association to research their theory. Freud used to look into his patients in item and deeply analyse and interpreted all they said and did. Carl Gustav Jung ( 1875-1961 ) was the first favorite adherent of Freud. Jung disagreed with Freud that dreams are ever disguised wish fulfillment ensuing from the past fortunes alternatively Jung suggested that dreams reflect current pre-occupations.Strengths And Failings Of Psychodynamic ApproachStrengths:Psychodynamic attack reminds us that, early childhood experience can hold an impact on people throughout their live without them being cognizant that it is go oning. Therefore, the attack accepts that everyone can endure mental unwellness through no mistake of their ain. It besides offers a ‘cure ‘ for abnormalcy through depth psychology by explicating the implicit in causes in the unconscious, doing them witting, and let go ofing the patient from the emotional hurting caused by the childhood injury. Many people would hold that, unconscious procedures do hold an consequence on human behavior, and Freud ‘s work on how defense mechanism mechanisms protect the self-importance is particularly utile. Freud instance surveies like `Little Hans` and `Anna O` detailed aggregation of informations provided scientific support for his theory and depth psychology has tremendous explanatory power and has something to state on a immense assortment of of import subjects. The failings of psychodynamic attack are that, it can non be scientifically observed or tested. In fact, it has ne'er been disproved by any trial. There is no manner of showing if the unconscious really exists and verify if a pent-up memory is a existent or false memory unless independent grounds is available, in that context, most of psychodynamic theories are taken on religion. Freud over emphatic sexual causes and harmonizing to Breuer, Freud was prone to â€Å"excessive generalisation† . A healer must analyze and construe any grounds recovered by a psychoanalyst from a patient, this leaves open the possibility of serious misunderstanding or prejudice because two healers may construe the same grounds in wholly different ways. Finally, the psychodynamic attack ignores possible account of unnatural behavior by other psychological attacks. As for the cognitive attack, it concentrates on current information-processing by the encephalon, it does non depend on the past history of the client, and for illustration, retrieving pent-up memories from the unconscious. It besides had practical applications and deductions for the society. Cognitive research workers normally conduct scientific and nonsubjective research to back up their theories, nevertheless, it has been accused that the cognitive psychologists ignored the immense complexness of human operation by comparing to computing machine working. It besides ignores the emotional life of worlds.ComparisonThe psychodynamic attack provinces that, behaviour is non learned but caused by forces in the unconscious unlike the cognitive attack which states that behavior is learned as we process information and mental alterations in of import ways over clip. Psychodynamic attack considers behaviour as predetermined. They point out that different parts of the head are in changeless d ynamic battle with each other, so persons have no control over their behaviors but the cognitive attack see behavior as non predetermined. It states that we ever have power to alter knowledge. Psychodynamic attack is regarded as unscientific because it can non be measured or manipulated, whereas cognitive attack is regarded as scientific since it considers the encephalon is similar to a computing machine where information can be manipulated. Unlike cognitive attack, psychodynamic attack chiefly focuses on early childhood behaviors. The chief differences are the attack in which each theory takes in finding the cause of mental unwellness or mal adjusted behaviour eg psychodynamic position focuses more so on unconscious procedure while cognitive position focuses more so on mental procedures.SimilaritiesEach theory is used to specify the outlook of work forces, explain mental unwellness and find a manner to command if necessary. Each theory on its ain manner focuses on the human head and its reaction to its environment. They both have trouble in corroborating their research.Mentions · Hill G. 2001 As Level Psychology through Diagrams Oxford University imperativeness. hypertext transfer protocol: //en.wikipedia.org/wiki/Psychology hypertext transfer protocol: //www.associatedcontent.com/article/21688/psychodynamic_humanistic_and_cognitive.html? cat=58 hypertext transfer protocol: //www.ngfl-cymru.org.uk/vtc/ngfl/psychology/psy_1.doc â€Å" Jean Piaget. † Quotes.net. STANDS4 LLC, 2009. 14 November. 2009. hypertext transfer protocol: //www.quotes.net/quote/16376

Tuesday, October 22, 2019

Hcs 245 Culture and Disease Paper

Culture and Disease Paper – Malaria Erin E. Nelson HCS 245 September 5, 2011 Andrea Dale Culture and Disease Paper – Malaria It tropical and sub-tropical climates temperature, humidity, and rainfall work together to create a breeding ground for mosquitoes. Mosquitoes are a host for communicable diseases one in particular is called malaria. Malaria is a parasitic disease that infects a particular type of mosquito, Anopheles mosquitoes, which feeds on humans. People who get malaria are typically very sick with high fevers, shaking chills, and flu-like illness. Although malaria can be a deadly disease, illness and death from malaria can usually be prevented (Global Health – Division of Parasitic Diseases , 2010) Individuals living in climates that support the life cycle of these mosquitoes are more at risk than those who do not. If temperatures fall below 68 degrees Fahrenheit the mosquitoes cannot complete their growth cycle. Africa, parts of South America and Asia have incurred the majority of the malaria epidemic (Global Health – Division of Parasitic Diseases , 2010). I this paper I will cover: populations vulnerable to malaria, factors that make these populations vulnerable, modes of transmission, methods used to control the spread of malaria, the role of social/cultural influences and share community health promotion and wellness strategies. In particular young children and pregnant women are more at risk for contracting malaria. Young children have not built up or acquired immunity to the disease and without immunity infections are more severe and life threatening (The World Health Organization Staff, 2010). More than 40% of the world’s children live in places where malaria is a constant threat. Most children die from malaria because they do not get effective treatment† (Episcopal Relief and Development Staff, 2009). Pregnant women have compromised immune systems due to the pregnancy leaving them at risk. Also individuals suffering from other diseases such as HIV, malnutrition and anemia are vulnerable (Global Health – Divis ion of Parasitic Diseases , 2010). The parasite that causes malaria infects two hosts: the female Anopheles mosquitoes and humans (Global Health – Division of Parasitic Diseases , 2010). The mosquito is essentially unharmed, unscathed, from the parasite but acts as a vector and transmits the disease from human to human each time it feeds. The parasites are found in the mosquitoes’ salivary glands; it injects the saliva when feeding, and passes the parasite on to its â€Å"meal†. While the parasite is in humans it moves through the blood where its transferred to the liver. The parasite makes a home in the human’s liver and in the red blood cells it grows. The life cycle continues in each red blood cell, destroying them and creating daughter parasites (Global Health – Division of Parasitic Diseases , 2010). In order to control the spread of malaria scientists created antibiotics to cure the ailment to help minimize the spread of the disease. Chloroquine was the first antibiotic created by german scientist, Han Andersag, in 1946. A German chemistry student, Othmer Zeidler, synthesized DDT (Dichloro-diphenyl-trichloroethane) in 1874 but the insecticide properties were not discovered until 1939 (Global Health – Division of Parasitic Diseases , 2010). It was used by soldiers to keep mosquitoes away so they would not contract typhus and malaria will on the battle field. The CDC (Communicable Disease Center) was created as a new component of the U. S. Public Health Service and has been working to combat Malaria since 1946. The new center was the direct successor of the Office of Malaria Control in War Areas, an agency established in 1942 to limit the impact of malaria and other vector-borne diseases (Global Health – Division of Parasitic Diseases , 2010). Another mode of prevention is proper medication and insecticide while traveling in areas that are highly saturated in mosquitoes and reported cases of malaria. † Every year, millions of US residents travel to countries where malaria is present (Global Health – Division of Parasitic Diseases , 2010). About 1,500 cases of malaria are diagnosed in the United States annually, mostly in returned travelers† (Global Health – Division of Parasitic Diseases , 2010). Malaria risk is not distributed homogeneously throughout all countries. Some destinations have malaria transmission occurring throughout the whole country, while in others it occurs in defined pockets so the traveler should be weary of areas whose climate is conducive to mosquitoes. The WHO Global Malaria Programme is responsible for evidence-based policy and strategy formulation, technical assistance, capacity building, malaria surveillance, onitoring and evaluation, and coordination of global efforts to fight malaria. WHO is also a co-founder and hosts the Roll Back Malaria partnership, which is the global framework to implement coordinated action against malaria (The World Health Organization Staff, 2010). The CDC participates actively in global malaria efforts through work with the WHO, Roll Back Malaria Part ners, UNICEF, and more in the fight to keep the epidemic at bay (Global Health – Division of Parasitic Diseases , 2010). Conclusion Malaria is a very contagious parasite transmitted through mosquitoes to humans. Those at risk are individuals living in areas conducive to the breeding of mosquitoes, especially those that allow the mosquitoes to complete their growth cycle. Everyone is at risk especially with the numbers of travelers increasing the risk of the traveler bringing it home to the states is probable. Preventable measures have been created such as DDT in insect repellant and antibiotics. The epidemic has ceased in the States but continues to be a problem in Africa and Asia. References Episcopal Relief and Development Staff. (2009). Malaria FAQs. Retrieved September 3, 2011, from NETSFORLIFE: http://www. netsforlifeafrica. org/malaria/malaria-faqs Global Health – Division of Parasitic Diseases . (2010, February 28). Malaria. Retrieved September 3, 2011, from Centers for Disease Control and Prevention: http://www. cdc. gov/malaria/about/disease. html The World Health Organization Staff. (2010, April). Malaria Center. Retrieved September 3, 2011, from World Health Center: http://www. who. int/mediacentre/factsheets/fs094/en/index. html