Saturday, December 28, 2019

The Body Of Knowledge Regarding Adolescent Sleep Deprivation

Sleep deprivation or the ability to get adequate sleep is a social issue. Persons in a sleep deprived state raise concerns such as performance and safety. Social issues affecting safety and performance are addressed by our society through policies, regulations, and laws. For example, the Federal Aviation Administration has strict guidelines regarding circadian rhythms and sleep for pilots (FAA, 2012, p. 5). Hundreds of thousands of adolescents in the United States face issues of reduced performance, physiological effects, psychological problems, and safety issues every school day as a result of sleep deprivation. The body of knowledge regarding adolescent sleep deprivation is growing and the surprising results are beginning to result in new thinking and policies regarding school start times. Fairfax County in Northern Virginia and its policies regarding school start times is the focus of this paper. Adolescent Sleep Deprivation in Fairfax County: Changing Times Inadequate sleep in the United States has been declared a â€Å" public health epidemic† by the Centers for Disease Control and Prevention (CDC) (Health Epidemic, 2014, p. 1). The CDC further states that sleep deprivation may lead to â€Å"†¦difficulty performing daily tasks†¦ may contribute to †¦ hazardous outcomes. Persons experiencing sleep insufficiency are also more likely to suffer from chronic diseases such as hypertension, diabetes, depression, and obesity, as well as from cancer, increased mortality, andShow MoreRelatedBecoming An Intellectual And Competent Nurse1600 Words   |  7 Pagesthe knowledge I have obtained from class lectures and personal experiences and apply what I have learned into my nursing practice. In March 2013, I was rushed to Overlake Hospital due to experiencing a tonic-clonic seizure during my 7:30 A.M. English class. Spending a few hours at the hospital with my parents felt like a waste of time because we were never given any details about the incident. According to a study, â€Å"Being a safety advocate implies that nurses have the skills and knowledge requiredRead MoreMultitasking Is An Efficient Method Of Increasing Productivity While Conserving Time1653 Words   |  7 Pagessecretion is decreased by fat cells, which cause an increase in hunger stimulation when an individual is sleep deprived. I now understand why sleep deprivation leads to weight gain, due to the fact that your metabolism slows down and your appetite increases. This is just one of the very many reasons why sleep is an important factor in your overall health, and to prevent irregular eating habits. The body may also â€Å"learn† the different times at which you usually eat, and will signal a hunger response toRead MoreScientific Thinking And Research Methods Essay2031 Words   |  9 PagesGroup: The experimental group was the group that was told that they had no more tasks that they needed to complete. Control Group: The control group was the group that knew they had to do the tedious task again. Independent Variable: Participants knowledge of negative stimulus. Dependent Variable: Effects of negative stimulus. Article Two: Uhr, L., Vossler, C., Uleman, J. (1962). Pattern recognition over distortions, by human subjects and by a computer simulation of a model for human form perceptionRead MoreThe Postpartum Depression ( Ppd )1466 Words   |  6 PagesSymptoms may include depressed mood or severe mood swings from the first few weeks, to up to six months after birth. While hormonal changes is just one of the many factors that contribute to PPD, sleep deprivation, lifestyle, and environment may also affect any new parent (Smith, Segal, 2016). Although our knowledge about PPD has greatly advanced in recent years, many aspects of pregnancy and the postpartum depression process are not understood and could be contributing to the high prevalence and low treatmentRead MoreEssay on Text Messaging and the Negative Effects on Teens2750 Words   |  11 Pagestomorrow and by the way you’re the greatest† is shortened and becomes â€Å"H2CU2M N BTW YTG.† Text messaging has surely given our society a quick means through which to communicate, taking out the need for capitalization, punctuation, the use and knowledge of sentence structure and the detail that make good statements great. The purpose of the shorthand text messaging style is to say as much as you need to in the shortest way possible and some educators are suggesting that this new formed languageRead MoreThe Sleeping Habits Among University Student3602 Words   |  15 PagesI. Introduction The amount of sleep is important for one’s mental and physical health, for cognitive restitution, processing and memory consolidation. In order to stay healthy, a person requires 7-8 hours of sleeping in adult age. One study reported the college students are among the most sleep-deprived age group. Sleep deprivation can have detrimental effects on daily performance, including academics and driving, and it has been linked to depressed mood and behavioural problems. The similar researchesRead MoreBehavioral Addictions : Exploring Internet Addiction1643 Words   |  7 Pagesneurotransmitters especially â€Å"the dopaminergic and endogenous opioid systems.† These men go on to state, that behavioral disorders are evidenced to be a â€Å"neuropharmacological addiction rather than a pharmacological,† meaning while no substance is added to the body, there is a definate shift in the innerbody networks that cause the reinforcement of certain behaviors, and like other ad dictions this reward pathway gets hijacked (2012). As cited by Wei-na et al., Kimberly Young, author of the book Internet Addiction:Read MoreEffects of Eating Habits2768 Words   |  12 Pages1 The problem and its BACKGROUND Introduction â€Å"Lifestyles have changed considerably over the years. With the hurried lifestyles of today’s families, quick and nutritional meals have become typical, and adolescents are adopting these unhealthy eating habits. Consequently, these adolescents pose greater risk to all aspects of development, including cognitive development. Due to the demands of the rush-day-to-day living of individuals, it is now but natural for them to prefer foods offered byRead MoreThe Overall Effects of Staying Up Late on University Students10276 Words   |  42 PagesSubmission- 20.12.2011 Acknowledgement The reason for choosing this particular topic was because of my parents, especially my mother who has taken care of me for all these years. My mother has always ensured that I have proper sleep. Hence, I ended up writing a research paper regarding sleep. I would also like to thank all my respondents for filling up my questionnaire with patience. Abstract The topic for this particular research paper is â€Å"The Overall Effects Of Staying Up Late On University Students†.Read MoreCase Study About Pneumonia10478 Words   |  42 PagesMedical-Surgical Nursing so we wanted to use this knowledge to the real-life setting and get used to it. We are willing to do this case to challenge our mind in analyzing the problem and to enhance our hidden knowledge, and also to gain new experiences which would bring new learning for the members of the group. We want to be able to achieve our objectives for this case study. * Objectives of the Case Study A. Client-Centered Objectives a. Knowledge * To understand more the disease process

Friday, December 20, 2019

Slavery And The Black Race - 1526 Words

Slavery and the black race in America cannot be separated since slavery is a big part of the history of African Americans from the 18th century to early 20th century. There are many issues to consider about slavery and the lives of the slaves at the period. One of those issues is the role played by women slaves in the societies of the time. Deborah White writes about how women slaves had a different life compared to the other white women and compared to the male slaves. However, it is the statement that White made that suggested that when it came to black women, then it was impossible to separate their race and sex from them that is of much concern. In that, perceptions of a black woman were based on the fact that she was a woman and at†¦show more content†¦What the above acts meant was that the white men saw black women slaves as just women who did not have what their white counterparts had and that they were more of a ‘subspecies’ to the other women. All the b lack women slaves were was just sexual instruments and women who were willing to be taken advantage of with no questions asked. On the same note, in the Antebellum South, Black women slaves were the assurance that slavery will continue since they were made to act as the incubators for future children who would be slaves for the generations that would follow. The Mammy According to White (17), the mammy was the paternalistic ideology given to the black women slaves who were willing enough to serve their masters’ each and every whim. They were grateful for the generosity of their masters and were ready to show their gratitude in any way possible. According to White (22), the Mammy was either very wise or also very stupid in the eyes of the white individuals. But the commanding myth about these women was that they were foolish and their actions at many times led them into comic situations. The caricatured nature of the black slave woman was more of a fictitious character since the white individual needed it to look like they were generous to the black women for making them their slaves and thatShow MoreRelatedThe Slavery Of The Black Race1508 Words   |  7 PagesTocqueville anticipated the future these three races. For the Native Americans, Tocqueville anticipated that they were bound to vanish. With a specific end goal to survive, they should be acculturated or begun a fight were one of the two races could vanish. What s more, Tocqueville anticipated that they will be secluded by the whites. For the Negros, he anticipated the racial blend will extend Negros race everywhere throughout the country. Additionally, they will be more acknowledgeable of theirRead MoreThe Civil War Of The United States1270 Words   |  6 Pagesbecome divided down the middle over slavery, a mainstay that helped the economic growth of this country? As the northern states population grew and expanded westward their anti-slavery beliefs began to spread faster than the pro-slavery beliefs of the southern plantation owners. This influx of an anti-slavery population began to use the senate as a platform to question the use of slavery, causing the southern elitists to strengthen their defenses in support of slavery. Many southerners feared theirRead MoreThe Science Behind Race1185 Words   |  5 PagesComplicity: The Science Behind Rac e â€Å"And thus in the Land of the Color-line I saw, as it fell across my baby, the shadow of the Veil. Within the Veil was he born, said I; and there within shall he live, - a Negro and a Negro’s son. Holding in that little head- ah, bitterly! - the unbowed pride of a hunted race, clinging with that tiny dimpled hand – ah, wearily!- to a hope not hopeless but unhopeful, and seeing with those bright wondering eyes that peer into my soul a land whose freedom is toRead MoreSlavery in America941 Words   |  4 PagesSlavery in America Does anyone know who really started slavery? Slavery first took place in North America, 1619 at a British colony of Jamestown Virginia† (Boles, John). This caused slavery to spread throughout the American colonies. Slavery had a huge impact on America and still does till this day. Slavery was nothing new when it came to America. It’s been going on since before the 1400’s.†Slavery had existed in Europe from classical times and did not disappear with the collapse of the Roman Empire†Read MoreEssay1003 Words   |  5 PagesEssay #3 Throughout history many races and cultures have been discriminated against for various reasons and there have been many different methods used to discriminate against them. To focus on one race in particular the African American race was discriminated for a long period and was discriminated in various ways throughout this time. The longest and most prominent method used was slavery, then after slavery ended segregation was another method, and lastly African Americans not being treatedRead MoreDemocracy in America by Alexis de Tocqueville1300 Words   |  6 PagesConsideration of Democracy, Blacks, and Slavery Tocqueville, in Democracy in America, dwells on the strengths and weaknesses of American democracy. When discussing race relations, he recognizes that the presence of the black race in America and the occupation of blacks in slavery could threaten the continuation of the United States as a Union and a republic. As a Union, the United States could be torn apart by the disparities between the North and the South and tensions between blacks and whites. As a republicRead MoreMiranda Fleming. Word Count: 1,674. 3/16/17. Defending1674 Words   |  7 PagesMiranda Fleming Word Count: 1,674 3/16/17 Defending Slavery: Religion and Race The history of slavery in the United States divided people by the color of their skin. During the 16th thru 18th century, people of African ethnicity were automatically considered slaves. This not only created a parceling between races but also the demarcation of the northern and southern states of the America. The northern states had asseverated their opposition of slavery while the southern states upheld their concordanceRead MoreRace And Slavery During The 18th And Early 19th Century1522 Words   |  7 Pages RACE AND SLAVERY Timothy Smeja History 103 Professor Ricciardi 3/20/2017â€Æ' During the 18th and early 19th century, race and slavery were contested subjects in the U.S. The definition of race during this era was not static, and one can find it in the essays written by such individuals as Thomas Jefferson, Samuel Cartwright, and Benjamin Rush. People supporting slavery used race as their main argument by highlighting the differences between Whites and Blacks. Works of Jefferson, CartwrightRead MoreAbraham Lincoln And Stephen Douglas1674 Words   |  7 Pagesspeeches with the topic of race, then Lincoln would have to defend himself. A week after these debates Lincoln was welcomed to Dallas City with a banner that read â€Å"Equality.† According to Miller, Lincoln was arguing in favor of â€Å"Negro Equality,† and was arguing that he saw slavery as a monstrous injustice and a huge moral wrong. He was against slavery in the territories but Douglas did not see slavery to be an evil. A senate seat was at stake for these two men and race was a key fo cus of debate.Read MoreAnalysis Of Virginia Plantation s The Slave Relationship 1321 Words   |  6 Pagesshows luxuries related to sex and power. That is, a white master, having sexual relations with black female and discipline African American man without any impediments. It can be inferred that that white master or white overseer is in complete control. In Document #2, Alex de Tocqueville, a French lawyer and statesman traveling through the United States examining the prison system describes race relations in the United States during the early part of the nine-tenth century. He notes that

Thursday, December 12, 2019

Review of Literature on Internet of Things (IOT)

Question: Discuss about theReview of Literature on Internet of Things (IOT). Answer: Introduction IOT (Internet of Things) is an ideology that various stakeholders in the business world are increasingly supporting. The idea behind the concept is to connect different things/objectives using wireless and wired connections. The model also uses unique addressing schemes and creates a universal environment in which one can interact with the digital and physical worlds at any time. The IOT concept also incorporates virtual machines and objects with digital characteristics and dynamic personalities. The ideology opens a new and exciting opportunity. However, the concept has also brought in new questions in regards it the interaction of people and businesses that operate in the digital world (Abu-Elkheir, Hayajneh and Ali 2013; Patel, Naringrekar and Desai 2014). Almost all these questions relate to the governance, security and privacy elements of IOT, which cannot be separated from ethical issues (Atzori, Iera and Morabito 2010). How IOT is Managed Considering the rate at which the IOT ideology is growing, it is necessary to ensure that there are adequate management systems in place to control the concept. Although most of the literature and research on IOT focuses on specific applications and technologies, there is a new opportunity in the management of IOT services (Suo, et al. 2012). One of the greatest barriers to the development of IOT is the lack of sufficient skills to evaluate, acquire, and integrate all the relevant parts required for the formation of an IOT department. Various sensors, systems, networks and software are required to successfully develop and manage an IOT department (Wakunuma and Stahl 2014). Therefore, the first step in the management of IOT is finding qualified IT professionals who can understand how various components of the network function. Management of IOT involves the securitization of data and maintenance of the devices used in the system. For purposes of this paper, the focus will be on the ad ministration of data in IOT (Gubbi, et al. 2013). In most cases, the system is fitted with real-time sensors, which help identify, classify and report anomalies in the data being processed via the networks. In most instances, the IOT secure architecture subdivided into four broad levels, which makes it easy to manage the whole system (Patel, Naringrekar and Desai 2014). The figure below shows the four levels in a secure structure of the IOT model. Figure 1: IOT Security Outline (source: Suo, et al..2012) The perceptual layer commonly referred to as the recognition level is the most fundamental in the architecture. It collects all sorts of information through physical gadgets and helps identify issues within the physical world. The information gathered in this level includes data on device properties, environment conditions, and real instruments in the system. The physical tools used in this layer include RFID readers, GPS systems and other kits. The primary components of this tier are the detectors, which identify and characterize the physical realm in digital communication (Suo et al.2012). The second most basic layer is the network level. The layer is responsible for transmitting information gathered in the perceptual layer, processing such data, classifying it, and later polymerising the information. In the segment data is transferred to several rudimentary linkages, which include mobile communication networks, the Internet, wireless networks, communication protocols, and network infrastructure (Suo et al.2012). The support layer is the third tier in the architecture. It sets up a dependable back-up program for use in the application phase. It is also the stratum that all types of logical computing systems are organised through the network framework and cloud technology systems. The support layer plays the role of connecting the application level which is above to the lower network layer (Guha 2013). The fourth layer in the architecture is the application layer. It is the top most and last layer in the secure architecture used to manage information in IOT. The layer provides personalised services that are based on the various needs of the users of the IOT system. Users can easily access the IOT through the users interface found in this section using various technology devices among them television, PCS or mobile communication gadgets among others (Elkhodr, Shahrestani and Cheung 2016). Security and privacy of information is of great significance in each these levels. Overview of Issues Faced in Management of IOT It is understood that privacy and data security in IT are closely linked. At times, there are overlapping requirements in the two IT management areas. There are several privacy and security issues faced by the management if data in IOT systems. As defined by Yan, Zhang and Vasilakos (2014) IOT is "a worldwide network model that links tangible and cybernetic equipment through the use of IT communication and capture abilities. The setup comprises complex internet and net advancements. The system also involves capturing if highly sensitive, autonomous, and confidential data." The nature of the data shared through the IOT systems is the cause of the major privacy and security issues faced by IT managers tasked with the duty of ensuring such data is safe and protected from access by people other than the users of the information (Elkhodr, Shahrestani and Cheung 2016). Unfortunately, many people do not understand the need to secure their data from online intruders. With the use of IOT exte nding to peoples homes, millions of people across the world risk losing their privacy as a result of the IOT infrastructures. Moreover, there are five primary visions of IOT infrastructures which are listed below (Singh, Tripathi and Jara 2014). Worldwide identification and addressing, processing, networking and sensing of data and devices. Communication to occur between equipment and also between objects and people/users. To increase the amount of information gathered and processed for individuals and the rate at which such information is processed through the system continually. Make information and communication within the IOT system automatic (technology-based). Have a wide array of objects connected to the same infrastructure, each with different functionality. Based on the features listed above, researchers have identified significant challenges in regards to information privacy and security within the IOT system. The main assumption is that privacy and security are of major concern in any IOT system. In particular, information security refers to protecting data that is confidential in nature from being accessed by other people other than the intended users of such information. Therefore, in regards to the five visions of IOT mentioned above, the main challenges and risks in the management security and privacy are as listed below (Singh, Tripathi and Jara 2014). Ensuring continuity and availability of IOT based services Design issues in the development of IOT systems Context-aware and situational risks Unlawful processing of data and repurposing of information among others (Singh, Tripathi and Jara 2014). Detailed Explanations of IOTs Privacy and Security Management Issues It is possible to argue that in regards to information security, general information security requirements in information technology should apply; however, IOT is a special case and in most cases perceived as more of a vision than a stable and concrete technology. It is difficult to define all the requirements of a secure IOT Infrastructure as there is still more research that needs to be carried out in regards to the privacy and security management issues in IOT (Weber 2010). Nonetheless, researchers in various studies have provided a list of several privacy and security concerns, issues and risks in IOT (Balt, Kashid, and Patil 2015). These issues are discussed in details in the paragraph that follow, further; the section also reviews what various scholars of IOT have argued about the potential risks. The first major challenge in the management of privacy and security issues within IOT systems is ensuring the continuity and availability of IOT-based services. Given that there are many serious adverse effects associated with the use of IOT systems, yet at the same time, the advantages are also numerous. It is necessary to ensure that the potential risk to the privacy and security of information transferred through IOT infrastructures does not affect the continuity it the services. The challenge is directly linked to the structural representation used in the delivery of IOT functions; it is necessary to have an airtight model that ensures maximum data protection. According to researchers, the challenge has led to the debate of centralised versus decentralised systems (Weber 2010). For instance, considering a case of smart grids or meters; it is possible for an attacker to program the meters remotely. Such an incident can cause massive blackouts, which would make it impossible to reg ain power supply in homes. That implies that some functions could affect the availability of the grid in future. It is also important to note that private data does not only relate to information intended for use by a certain individual. But also information available in individuals such as hospital records, tax details, and any other data that could indicate one's personal address, phone numbers and names among other details (Sarma and Giro 2009). The fact that attackers can hack into the infrastructures and control them remotely, which would make it possible for them to get such private data in the users of such systems, threatens the very existence of IOT. In this regard, the main challenge is to protect users data from attackers while at the same time ensuring that the operation of such infrastructures is not interrupted. To ensure that there is the maximum protection of data in the IOT; developers of such systems should ensure that they systematically address issues of privacy and security at the design stage. Unfortunately, in most cases, the hardware specialists do not understand certain elements of software required to run such networks. Therefore, privacy and security provisions are often added after the systems have been fully developed. Adding privacy and security features after determining the functionality of the infrastructure not only limits the effectiveness of the added elements but also is also less efficient regarding the implementation costs (Sicari, et al. 2014). Moreover, research suggests that in most cases, IOT objects lack the adequate estimation capabilities to execute all the required functionalities simultaneously. The variety of IOT tools also makes it extremely difficult to safeguard all forms of data. Likewise, the differences in IOT objects and functionality is yet another challenge that should be handled (Bandyopadhyay and Sen 2011). Other concerns include the fact that there are many involved in the data processing, which increases the risks of unlawful processing, repurposing of data and low-traceability of perpetrators of most attacks. The increased collection of information raises questions of authentication and trust in the objects. Moreover, due to the proliferation of the kind of data transmitted through the networks, there is an existing challenge of data being used for other purposes other than the originally intended purpose (Federal Trade Commission 2015). The issues of repurposing of data and unlawful processing should be handled by law enforcement authorities and intelligence agencies. The issue of data repurposing and unlawful use does not only relate to the violation of human rights to privacy but also likely to affect the society and public in large (Weber 2010). To ensure that users of IOT infrastructures are protected from unlawful use and repurposing of data, which affects their privacy and sec urity, developers and experts in the field need to work hand in hand with law enforcement officers to implement the pre-existing laws on data safety and privacy. Reference List Abu-Elkheir, M., Hayajneh, M. and Ali, N.A., 2013. Data management for the internet of things: Design primitives and solution.Sensors,13(11), pp.15582-15612. Atzori, L., Iera, A. and Morabito, G., 2010. The internet of things: A survey.Computer Networks,54(15), pp.2787-2805. Balte A, Kashid A, Patil B. 2015. Security Issues in Internet of Things (IoT): A Survey. International Journal of Advanced Research in Computer Science and Software Engineering. 2015; 5 (4). Bandyopadhyay, D. and Sen, J., 2011. Internet of things: Applications and challenges in technology and standardisation.Wireless Personal Communications,58(1), pp.49-69. Elkhodr, M., Shahrestani, S. and Cheung, H., 2016. The Internet of Things: New Interoperability, Management and Security Challenges.arXiv preprint arXiv:1604.04824. Federal Trade Commission, 2015. Internet of things: Privacy security in a connected world.Washington, DC: Federal Trade Commission. Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): vision, architectural elements, and future directions.Future Generation Computer Systems,29(7), pp.1645-1660. Guha, R., 2013. Benefits and Challenges of Mobile Cloud Computing.International Journal of Simulation--Systems, Science Technology,14(4). Patel, A., Naringrekar, S. and Desai, V., 2014. The Internet of Things: The Reality of Tomorrow.The International Journal of Science and Technology,2(11), p.155. Sarma, A.C. and Giro, J., 2009. Identities in the future internet of things.Wireless personal communications,49(3), pp.353-363. Sicari, S., Cappiello, C., De Pellegrini, F., Miorandi, D. and Coen-Porisini, A., 2014. A security-and quality-aware system architecture for Internet of Things.Information Systems Frontiers, pp.1-13. Singh, D., Tripathi, G. and Jara, A.J., 2014, March. A survey of Internet-of-Things: Future vision, architecture, challenges and services. InInternet of things (WF-IoT), 2014 IEEE world forum on(pp. 287-292). IEEE. Suo, H., Wan, J., Zou, C. and Liu, J., 2012, March. Security in the Internet of things: a review. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 3, pp. 648-651). IEEE. Wakunuma, K.J. and Stahl, B.C., 2014. Tomorrows ethics and todays response: An investigation into the ways information systems professionals perceive and address emerging ethical issues.Information Systems Frontiers,16(3), pp.383-397. Weber, R.H., 2010. Internet of ThingsNew security and privacy challenges.Computer Law Security Review,26(1), pp.23-30. Yan, Z., Zhang, P. and Vasilakos, A.V., 2014. A survey on trust management for Internet of Things.Journal of network and computer applications,42, pp.120-134.

Wednesday, December 4, 2019

Drug Enforcement Essay Example For Students

Drug Enforcement Essay What we Prohibit We Cannot Control: Restriction Before Education?There is a definite problem regarding the laws that enforce drug use in the United States today. Think about this question. Why are some of the most injurious, addictive, and mind altering substances in the worldtobacco and alcohollegal, while other drugs are illegal that potentially cause no harm and have very little abuse? The United States has declared 178 substances illegal. These substances are believed to be so dangerous that they are controlled at the highest level for medical use or forbidden outright, even for medical research. Remarkably many of these substances are not physically harmful and have never caused a death. Every year, legal drug use results in about fifteen percent of all hospital admissions, with one hundred thirty six billion dollars in medical costs. It seems odd, then, to make such a big distinction between legal and illegal drugs regarding the law. A startling fact, Congressman Newt Gingrich, the Speaker of the House, proposed legislation that would impose the death penalty for people caught carrying as little as two ounces of marijuana. He excused his own past marijuana use by explaining that pot smoking was a sign that we were alive and in graduate school in that era. Prison sentences for being caught with a large amount of marijuana are ten years, mandatory minimum, with no parole allowed. A prison sentence for murder six point three years. That is the average served, with parole allowed. The average sentence for a first time, non-violent drug offender is longer than for rape, child molestation, bank robbery, or manslaughter.(Gahlinger 2) This is an appalling statistic. The government is enforcing harsher punishment on a marijuana smoker compared to a murderer! The government is filling prisons with drug offenders that will not learn anything while there. Most likely when their term in prison is over they will go back to the same thing that they were doing before they went in to the system. Billions of tax payer dollars are keeping these drug offenders behind bars when a drug treatment program could be helping them to correct current addictive behavior and how to curtail their thoughts and actions to a more positive lifestyle. While the government puts one drug offender away another one is ready to step up to the plate and replace him or her. This is a never ending cycle. Why do we not speak of ski abuse or a chain saw problem? Because we expect people to familiarize themselves with their use, and avoid injuring themselves or othersThomas Szasz, Our Right to Drugs 1992. This statement is true regarding drugs. The War on Drugs has been a failure. Drug supply interdiction and the imprisonment of over one million Americans have not been effective in reducing drug use. Drugs can cause a lot of harm in foolish hands, but this does not mean that they have no use or should be made illegal. Clearly drugs have a potential for both great benefit and great harm. The best solution to the drug problem begins with education not restriction. As President John F. Kennedy so plainly put it, It should be our earnest intention to insure that drugs not be employed to debase mankind but to serve it. Everybody that I know that has been in trouble with the police for a drug offense often gets put on probation and has a set guidelines that they have to follow through with or a more harsh punishment will be set forth. My point is, people do not like to be told what to do so in essence the laws imposed on drug offenders make them even more upset with the way the government rules are set forth and so they rebel, c ausing even more problems with law enforcement. Not to imply, let the neighborhood drug dealer supply your loved ones with meth or heroin. Instead let the government regulate the drug trade and have more programs focused on the education and not punishment. .uf8016f95352b63583333b4b02dabed2a , .uf8016f95352b63583333b4b02dabed2a .postImageUrl , .uf8016f95352b63583333b4b02dabed2a .centered-text-area { min-height: 80px; position: relative; } .uf8016f95352b63583333b4b02dabed2a , .uf8016f95352b63583333b4b02dabed2a:hover , .uf8016f95352b63583333b4b02dabed2a:visited , .uf8016f95352b63583333b4b02dabed2a:active { border:0!important; } .uf8016f95352b63583333b4b02dabed2a .clearfix:after { content: ""; display: table; clear: both; } .uf8016f95352b63583333b4b02dabed2a { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uf8016f95352b63583333b4b02dabed2a:active , .uf8016f95352b63583333b4b02dabed2a:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uf8016f95352b63583333b4b02dabed2a .centered-text-area { width: 100%; position: relative ; } .uf8016f95352b63583333b4b02dabed2a .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uf8016f95352b63583333b4b02dabed2a .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uf8016f95352b63583333b4b02dabed2a .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uf8016f95352b63583333b4b02dabed2a:hover .ctaButton { background-color: #34495E!important; } .uf8016f95352b63583333b4b02dabed2a .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uf8016f95352b63583333b4b02dabed2a .uf8016f95352b63583333b4b02dabed2a-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uf8016f95352b63583333b4b02dabed2a:after { content: ""; display: block; clear: both; } READ: Atomic Bomb EssayRight now drugs are looked at like a forbidden fruit not meant to be tried unless you are ready to face the consequences, but why are they looked at in this way? Some drugs are illeagal largely for historical or political reasons and there is little or no evidence of their abuse or of any use at all. Peyote for example, has no history of significant abuse, and igobaine is virtually unknown in the United States. The government should regulate sales on some of these drugs and place a tax on them to eliminate the organized crime element of illegal drug sales. The United States is afraid that regulating drugs will cause a sharp rise in drug use and abuse, howe ver their are no statistics stating that this is true. United Nations agencies estimate the annual revenue generated by the illegal drug industry to be at over four-hundred billion dollars, or roughly eight percent of the total international trade. This industry has empowered organized criminals, corrupted governments at all levels, eroded internal security, stimulated violence, and distorted both economic markets and moral values. These are the consequences not of drug use per se, but decades of failed and futile drug war policies. The harsh restriction of drugs have failed to control their use in the United States. Let us begin with education over restriction. Works CitedGahlinger, Paul. Illegal Drugs: A Complete Guide to Their History, Chemistry, Use and Abuse. New York: Plume, 2004. (Gahlinger 2)