Monday, May 25, 2020

Hiv Prevention And The Prevalence Of Human...

Running head: HIV PREVENTION IN PAPUA NEW GUINEA AND AUSTRALIA 8 HIV Prevention in Papua New Guinea and Australia Diana L. Brown HCM350 – History of Healthcare Worldwide Colorado State University – Global Campus Dr. Evelyn Shinn April 30, 2015 The emergence of Acquired Immunodeficiency Syndrome (AIDS) and the prevalence of Human Immunodeficiency Virus (HIV) in the early 1980s initiated widespread global panic, but not every nation took action to combat the pandemic. Control of this relatively young disease process has been addressed in different ways in countries worldwide. Depending on the cultures of the region or the political system in place, some have made tremendous strides to reduce infection†¦show more content†¦A research specialist for the CDC, Dr. James Curran, stated in July of 1981 that no cases have been reported to date outside the homosexual community or in women (Altman, 1981). That may have been the case in that moment of time, but much changed over the course of only a few months. Between July and December of 1981, another population was identified as suffering from the illness that had no name. This was the population of injecting drug users (IDU) and it was no longer limited to the United S tates, as Great Britain had its first reported case in that same month (AVERT, 2015). With the HIV/AIDS outbreak achieving a trans-continental status, efforts were ramped up to identify the source of transmission. By the end of 1982, reports of cases with similar symptoms were coming from several European countries, Uganda, and Haiti which reflected the widespread nature of the situation (AVERT, 2015). In just one year, the number of cases reported in the United States alone went from 41 to 452 and from just 2 states affected to 23 (CDC, 2015). It became a global health concern due to the wasting effects and rapidity of onset to death. Finally identified as being a blood borne pathogen, AIDS became the name and transmission linked to exposure to blood by sexual relations, needle sharing, and even blood transfusion. By October 1983, the World Health

Thursday, May 14, 2020

The Arab Spring During The Middle East And North African...

The Arab Spring brought revolutionary changes to the Middle East and North African region’s authoritarian republics while bypassing its autocratic monarchies. The monarchical exceptionalism that has allowed these states to remain intact is due to a set of three overlapping factors—crosscutting coalitions, hydrocarbon rents, and foreign patronage. Collectively, these factors explain why most of the royal autocracies never experienced widespread protest. The eight Arab monarchies—Jordan, Morocco, Saudi Arabia, and the Persian Gulf states of Bahrain, Kuwait, Oman, Qatar, and the UAE—hold near-absolute power. According to the Gause article, none of the states qualify as constitutional kingships in which the enthroned incumbent exercises only ceremonial influence while an elected parliamentary government makes policy. The region’s kings and emirs not only reign but they also rule. They are the lead decision makers in naming cabinets, determining major domestic and foreign policies, controlling the state’s coercive apparatus, and allowing parliaments and judiciaries limited authority (Gause). According to Gause, the first element of the strategic explanation for monarchical exceptionalism is one that links the historical legacy of domestic choices with a permissive international environment. The majority of the monarchies have used the tool of crosscutting coalitions thereby linking alliances of different soci al constituencies to the ruling family. In general, dictators cannotShow MoreRelatedWomen And The Middle East And North Africa1148 Words   |  5 PagesThe diversities within North Africa, the Middle East, and Southeast Asia (cultural, religious, political, etc.) play a crucial part in the status of women and the key features of gender roles in these particular geographic regions. The Middle East and North Africa share commonalities through Arabic and Islamic culture. Establishing equalities for women amongst the current social and political changes of Middle Eastern and North African societies stands as a difficult obstacle to overcome, but inRead MoreSouth Africas Policy on the Syria2500 Words   |  10 PagesSouth Africa and Syria 2 South Africa and the Wider Middle East Region 2 Problem Statement 3 Objectives 3 Options 4 Sanctions 4 Military Intervention 5 Support the Actions of the Arab League of Nations 5 Analysis of Options 5 Sanctions 5 Military Intervention 6 Support the Actions of the Arab League of Nations 6 Recommendation 7 Conclusion 7 Bibliography 9 Introduction The wave of Arab unrest that began during the Tunisian Revolution reached Syria in Mid March 2011Read MoreThe Potential Effects Of Democracy On The Middle East1971 Words   |  8 Pages The Potential Effects of Democracy in the Middle East Democracy has often been affiliated with reflective notions such as freedom and liberty, as well as the belief that people deserve a voice to represent their demands and the majority of a population should have its way. The first idea of democracy promotion started with Wilsonian ideas, the democratic peace theorem, and the long-term security interests of all democracies (Huber, 2008). It is often regarded as an abstract concept with varyingRead MoreThe Protection Of Human And Civil Rights3088 Words   |  13 Pagesgovernments are noble, but at what price? Protests and rebellions of international magnitude echo with violence and civilian casualties. A recent example of this â€Å"war† has been the Arab Revolts in 2010, which devolved into the full-fledged rebellions known as the â€Å"Arab Spring.† The already tense situations in the Middle East and North Africa, imploded into protests against unfair governments and pursuit of these corrupt leaders. The international c ommunity, especially those of democratic roots were quickRead MoreSecurity Issues Of The Arab Spring Movement2310 Words   |  10 PagesSecurity Issues in Syria This essay will examine how festering and fermenting animosity between Sunni and Shia factions in the region embroils issues of food security and human security with the security issues found in conflict generally. Security is a looking-glass that puts different things as priorities for whomever in question is looking. The security concerns of Bashar al-Assad are different to those of the Free Syrian Army, Jabhat al-Nusra or the Islamic State. While these actors- and thereRead MoreHomosexuality in Islam3723 Words   |  15 Pagesaccepted for inclusion in Macalester Islam Journal by an authorized administrator of DigitalCommons@Macalester College. For more information, please contact scholarpub@macalester.edu. Kligerman: Homosexuality in Islam: Macalester Islam Journal Spring 2007 page 52 ______________________________________________________ Homosexuality in Islam: A Difficult Paradox Nicole Kligerman ‘10 This paper addresses the complex intricacies of homosexuality in Islam by exploring Qur?anic notions of sexualityRead MoreHistory of Education in Northern Nigeria3189 Words   |  13 Pagesexclusively used for the development of human beings in the cognitive, affective, psychomotor and psycho-productive domains. The Northern region of Nigeria is not left out in this process. History has it that the educational system in the Northern part of Nigeria began with the indigenous or traditional education but has evolved in phases with great influence from the Arabs, and western education promoted by the British administration. However, The Jihad by Uthman Dan Fodio helped to revive, spread andRead MoreRoca Essay5103 Words   |  21 Pagesanother town near Barcelona. In 1974, Roca opened a steel bathtub factory. In the 1980s, the company entered the ceramic tiles sector by acquiring the Spanish-based company Cerà ¡micas del Foix. During the 1980s and 1990s, Roca underwent major international expansion mainly in Europe, Latin America and North Afric a, opening commercial subsidiaries, establishing distribution agreements and acquiring local manufacturers in various countries. In 1999, Roca acquired Keramik Laufen, a Swiss-based companyRead MoreThe War Of The Middle East And North Africa2011 Words   |  9 PagesFrom the inception of the Arab Spring in Tunisia to the most recent round of insurrection in Yemen, vulnerable states in the Middle East and North Africa have undergone waves of debilitating conflict. The chain of events that rapidly spread the revolutionary sentiment from capital to capital was not expected, and surprised the world. Ostensibly bloodless coups intermixed with violent rebellion and created a new Middle East and North Africa. The largest, and arguably most important country embroiledRead MoreForeign Intervention On Democracy And Democratization1939 Words   |  8 Pagesthe growth of democracy in the future or whether or not interventions are needed as a mechanism for democratization at all. II. Literature Review and Analysis Democracy has been in a leading position in the world since it began to gain popularity during the beginning of the 20th century (Fukuyama, 2006). Because it expanded through coercive means, it has meant that democracy continues to extend across the world. When communism began to decline, the West was able to extend democracy into several places

Wednesday, May 6, 2020

Joe Momma - 1542 Words

WEST COAST BAPTIST COLLEGE FOUR-FOLD ANALYSIS OF â€Å"ALL HAIL THE POWER OF JESUS’ NAME† A PROJECT SUBMITTED TO JOHN TYLER IN PARTIAL FULFILLMENT OF TE REQUIREMENTS FOR THE COURSE MU 403 HYMNOLOGY BY GROUP 2 BOX 672 LANCASTER, CALIFORNIA OCTOBER 29, 2015 All Hail the Power Researched Information IMPORTANT: Project Due: Thursday, October 29th, 2015 Email: john.tyler@wcbc.edu Subject Line in Email: â€Å"Hymnology Assignment 2† Save Document Name: mu403_assignment-group2.doc Assigned Roles: Hannah Bee: Primary Role: Typist (Outline the paper, Collect ALL relevant information, Type final paper) Secondary Role: Researcher (Collect relevant data, Cite source with Turabian format) Hannah Fieseler: Primary Role: Typist (Outline the†¦show more content†¦Again, the Americans were still being strongly influenced by the English monarchy when this hymn was written. Although the tune was not written until 1808, the culture was still very English because that is all that the people had known until this time. The tune of â€Å"coronation† is one of the earliest American tunes that is still in continual use today. Even though he was a carpenter, Edward Perronets testimony is almost a jarring contrast with Oliver Holdens in both quantity and quality. Edward Perronet has a lot written about him, but its mostly of how much he angered those he served under and how unkind of a person he was. Oliver Holden doesnt have a lot said about him outside of his published work, but it seems to work to his benefit. In fact, there are arguments that this hymn has survived so long because of Olivers memorable arrangement among a few other versions of the song Tune Title: Coronation Published: 1779 Scripture Reference: Philippians 2:9-11—â€Å"Therefore God exalted him to the highest place and gave him the name that is above every name, that at the name of Jesus every knee should bow, in heaven and on earth and under the earth, and every tongue acknowledge that Jesus Christ is Lord, to the glory of God the Father.† Isaiah 45:23—â€Å"I have sworn by myself, the word is gone out of my mouth in righteousness, and shall not return, That unto me every knee shall bow, every tongue shallShow MoreRelatedTony Kushner s Angels Of Americ A Gay Fantasia On National Themes Essay816 Words   |  4 PagesWhile two of his characters, Joe Pitt and Roy Cohn, both struggle significantly with their sexual orientation and identity, their troubles surface as a result of different aspects of their lives. Joe Pitt, who, as it becomes clear, is a closeted homosexual, holds both political and religious views that do not mesh well with his sexual orientation. Current Reaganite and lifelong republican, Joe was raised on conservative, right-wing values. As if that weren’t enough, Joe is also a Mormon and belongsRead MoreEssay on Angels in America1621 Words   |  7 PagesCohn serves as the antagonist of the play because of his cunning and deceitful ways, which he uses to manipulate and destroy others. Joe Pitt is a Mormon, Republican lawyer at the appeals court who is married to Harper Pitt. Joe is another character in this play who struggles with his inner demons, which proves to be his sexuality. For most of his life Joe has lied about his sexuality to his mother, his wife, and even some of his friends because he is afraid of what they might think of himRead MoreSummary Of I Know Why The Caged Bird Sings 1184 Words   |  5 Pagesshe is a too-big Negro girl with nappy black hair, broad feet and a space between her teeth that would hold a number-two pencil. 2) Mr. Steward, the white former sheriff, comes to warn Momma that the whites were on the path to hurt or kill a black because they say a black man has â€Å"messed with† a white woman. Momma hides Willie in the potato and onion bins in case the mob comes. She views this â€Å"act of kindness† as if the sheriff has done a huge favor on them. She was angry because Marguerite knowsRead MoreI Know Why The Caged Bird Sings1477 Words   |  6 Pagesget better, God descends the scale of responsibility at a consumerate speed. What revolutionary action took place at the revival? The priest gives the people an option of church they would like to join. What was the effect of the Black fighter, Joe Louis victory over his white opponent? The Blacks felt a sense of pride to be able to have had someone prove that they can be as powerful as the Whites. Also, they were cautious about going home that night because they were afraid that some angryRead MoreMaya Angelou s I Know The Caged Bird Sings1836 Words   |  8 Pagesstrengthen the masses of blacks against the racism through scripture and prayer. Angelou states, â€Å"The white folks was going to get their comeuppance. Wasn’t that what the minister said, and wasn’t he quoting from the words of God Himself?† (127). Momma also helped in this effort by raising Maya and Bailey in a strictly religious household to protect them from the outside world. This revival gave the blacks in the Stamps community, the strength and energy to go on with life knowing that white peopleRead More Life Lessons in Maya Angelous Graduation Essay1709 Words   |  7 Pagesimpressive school compared to the white schools in the area but that could not damper the spirit that was filling the air. Parents who were buying or making new outfits for their graduates made everyone including the author the center of attention. Her momma launched out on [hers], (835) and she was swollen with pride that she was going to be a walking model of all the various styles of hand sewing (835). You could see her enchantment of this role in the way she describes the yellow dress down to theRead MoreI Know Why the Caged Bird Sings - Maya Angelou6502 Words   |  27 Pagespotato bin all night while the white men scour the black section of Stamps for a scapegoat. Against the backdrop of such terrifying events, Momma keeps her faith and self-respect, providing an influential example for Maya and Bailey. Her confrontation with the three white girls—another example of the overt insidiousness of racism—becomes a victory for Momma because she refuses to be displaced. While Maya feels apprehension, Momma’s refusal to retreat inside the Store at their approach diffuses anyRead MoreAfrican-American Stereotypes935 Words   |  4 Pagesfemale character who is sexually promiscuous and very sexualized. In Jazz, by Toni Morrison, Dorcas aligns closely with the jezebel description. Dorcas wants to detach herself from her aunt’s protectiveness, and decides to become sexually involved with Joe, who represents the mandingo. The narrator of Jazz describes Dorcas’ physique: High-heeled shoes with the graceful straps across the arch, the vampy hats closed on the head with saucy brims framing the face, makeup of any kind-all of that was outlawedRead MoreAnalysis Of Maya Angelou s Angelou 2396 Words   |  10 Pagesto throw lye on them, to scream that they were dirty, scummy peckerwoods, but I knew I was as clearly imprisoned behind the scene as the actors outside were confined to their roles.† (Angelou 33). 1. In chapter 5, white girls come to the Store of Momma, Maya’s grandmother, and being to taunt her. Maya becomes furious, but is aware of the racism. 2. The narrator expresses that she wanted to hurt these white girls, but she realizes that she shouldn’t do anything stupid. 3. The author tries to showRead MoreEssay on I Know Why the Caged Bird Sings by Maya Angelou2409 Words   |  10 Pagesher to be resentful towards her ethnicity. A local white dentist refused to treat her toothache and told her that â€Å"†¦my policy is I’d rather stick my hand in a dog’s mouth than in a nigger’s† (Angelou 160). Immediately after hearing this, Maya and Momma (Maya’s grandmother) were taken back by this insulting remark and were absolutely speechless. The dentist did not even look Maya in the face when he said this which made her feel as though her race was inferior. This is a clear example of how her childhood

Tuesday, May 5, 2020

Maintaining Human Dignity and Data Privacy

Question- Explain why you believe this (your case study) to be an issue where human dignity is a critical factor? Answer- Introduction: The essay highlights on the given topic Human dignity and data privacy. It discusses some of the key issues such as the need for maintaining human dignity and also privacy of personal data. The given case study focuses on some of the aspects related to the topic, along with three unique perspectives. The essay highlights on each of the perspectives along with their pros and cons. Privacy is considered to be a fundamental human right (Pincock, 2004). It is said to underpin human dignity as well as other values like freedom of speech as well as freedom of association. Privacy is a human right which is most difficult to define. As depicted in the various situations in the case study, each of the cases depict different pictures altogether. Perspective 1: In order to protect the dignity of all human life against forces that may threaten it (eg. terrorism and other threats to public safety), government agencies must collect and store large amounts of otherwise private data. The statement may be complied with to an extent where it concerns security of personal information of the people. Government agencies are quite empowered to resolve such issues. So the perspective may be supported to a great extent. The improved sophistication of the sector of information technology along with its capacity of collection, analyzing, and dissemination of information upon individuals has led to the rise of urgency towards the demand for legislation ('Protectors of privacy: regulating personal data in the global economy', 2009). Computer systems connected together with great speed networks along with advanced processing systems can develop comprehensive dossiers upon any individual without using a single central system. Innovative technologies developed by the industry of defense are on the process of spreading to enforcement of law, private companies, and civilian agencies (Parhiala Simango, 2014). As per opinion polls and that of the depicted cases in the given case study, concern over violation related to privacy has increased greatly more than ever before in the recent times. Also, population of each global nation express their fears regarding encroachment upon privacy, thereby prompting severa l nations to pass laws that particularly safeguard the privacy of the population. As referred to in the case study, it is normal that power, capacity, and that of speed of information technology is increasing at a rapid speed. The level of privacy invasion has increased simultaneously. As per researches, several trends contribute towards privacy invasion such as globalization, convergence, and multimedia. These have impacts upon surveillance within developing nations (Moerel, 2010). In context to information and communication technology, the pace of policy convergence has been compressed. Throughout the surveillance spectrum, wiretapping, data mining, personal ID system, encryption controls all set a proscriptive pace. It has been rightly stated that government agencies must collect and store large amounts of otherwise private data. In fact governments of almost all developing nations nowadays depend upon the first world nations for the supply of technologies of surveillance like digital wiretapping equipment, scanners, deciphering equipment, bugs, computer interc ept systems, and tracking systems (McConnell, 2002). Thus, governments as well as citizens would immensely benefit from the plethora of information technology schemes that are implemented by the public as well as private sectors. Innovative projects of smart cards which bears client information is placed upon a chip in a card can streamline complex transactions. The availability of internet would revolutionize accessibility to basic information upon government services. Here in such cases, encryption may provide security as well as privacy to all parties (Richardson, 2003). In the current environment there is a rising need to protect data. Advancements in the computer technology, biotechnology, and medicine have resulted in the rise of personal data processing within different spheres of social as well as economic activities, imparting challenges of complex technology. On the other side, technological as well as electronic commerce progress renders convenience in the treatment as well as data exchange across international boundaries (Ismail, 2012). So, it is significant to protect every personal data while facilitating the continued information flow, electronic commerce, and advancements in technology. However, these initiatives would demand for a bold procedure having a strong legislative framework. If governments can suitably deliver the required framework would be dependent upon their willingness to attend the call of the emerging world digital economy as well as to recognize the need to incorporate a strong privacy protection (Fischer, 2014). As per some recent information, several schemes of access control have been introduced for controlling unauthorized propagation of data and information within the online networks. However, a need still exists to have a mechanism for evaluation of risk in the social networks. Perspective 2: In our internet connected society, the rise of shamelessness in the online community whereby individuals share personal information (sacrifice privacy) in order to gain fame and the voyeurism that accompanies it, results in a loss of human dignity. Dignity is then further compromised by the collection and storage of this personal data for later use. As per the given perspective stated above, it is the most common phenomenon that is depicted. The trend of using internet among individuals of various ages has led to the excessive use of online social networks. It is true that this kind of social platform drives people towards the craze for being famous with some simple measures. In this process, often people tend to share their personal information (Shin, Ma, Kim Kim, 2013). The information is further collected by various anonymous entities for respective gains. This is a form of harm to human dignity. The dominant persuasive role of social networking in the web has been turning human relations to conduits of data as well as information flow. This refers to the fact that the manner information which spreads within the web is determined to a great extent by human activities and decisions (Durante, 2011). As a result, information security rests upon the quality of the collective decisions taken by the users. As per some recent infor mation, several schemes of access control have been introduced for controlling unauthorized propagation of data and information within the online networks. However, a need still exists to have a mechanism for evaluation of risk in the social networks. However, not always people provide personal information to the data processors. During online purchases, customers are inevitably required to provide some personal information even if they are reluctant. So, the perspective cannot be supported completely. With increased number of online customers and association with social media requires them to share their personal information. This allows potential hackers to access as well as leverage the information to get financial benefits. It is very important that online customers adhere to a plan of cyber-security which involves the use of system restore as well as application control technology(Di Valentino, n.d.). The convenience of online purchases resulted in the rapid expansion of the market of e-commerce. Every time customers provide their credit card information and hence their financial security is at danger. This allows the hackers to get transactions occurring for stealing cardholder information and make illegal charges (Vorster, 2012). One of the key problems with the online communities is the lack of trust about any sort of personal or professional information relating to the question of identity or information reciprocity. Many a times, when information is shared with any user o f an online community, one expects similar thing to occur by sharing equal information back ('Demographics: a guide to methods and data sources for media, business, and government', 2006). Normally, all online social networking sites require users to provide their personal data and information for accessing the services. Users are generally comfortable in sharing with their data in order to seek services. It is common phenomenon that for attaining fame, users tend to provide their personal information to the data processors (Vlkel Haller, 2009). This is a form of loss of dignity. Human dignity is further compromised when the shared information is utilized by firms and organization for financial gains. Perspective 3: It is vital to ensure the protection of personal data online, and that internet users are aware of how accessible their posted information is. The collection of individuals personal data could result in a loss of dignity, through personal profiling, pre-emptive judgments and the possible loss of presumed innocence. The perspective depicted in the above statement refers to the need to protect personal data on the web. The internet users must be aware all the time that their personal information that is posted on the online social networking site is easily accessible by others. When the information are collected by others, it results in the loss of dignity by means of personal profiling, possible loss of innocence, and pre-emptive judgments (Whitman, n.d.). Protection of data is regarded as a right to privacy which individuals possess against illegal use of personal data by any data processor. The main purpose of such a policy or regulation is to safeguard the human dign ity of any nation, and prevent any sort of misuse of personal data. On one side, protection of data enables individuals to have greater control over the manner they share their personal information with data processors(Wong, n.d.). On the other side, it creates the obligations of data processors. The processors need to get the consent of the people prior to processing. They must also ensure measures to safeguard the integrity as well as confidentiality of the personal data obtained. In case of information share, it needs to ensure similar compliance from the third party regarding protection level. In the present situation, identity theft has become a concerning area among customers in the recent years. With increased number of online customers and association with social media requires them to share their personal information. This allows potential hackers to access as well as leverage the information to get financial benefits (Yu, 2005). It is very important that online customers adhere to a plan of cyber-security which involves the use of system restore as well as application control technology. The convenience of online purchases resulted in the rapid expansion of the market of e-commerce. Every time customers provide their credit card information and hence their financial security is at danger. This allows the hackers to get transactions occurring for stealing cardholder information and make illegal charges (Zanfir, n.d.). Several businesses nowadays provide ability of storing payment records so that customers can make purchases quickly without giving card numbers and addr esses again and again. This is helpful in providing greater effortless experience of online shopping though vulnerabilities also exist. Cybercriminals often infiltrate organizational databases to steal information. With consideration of increased cost of payment as well as identity information theft with increase of frequency of breaches, it is quite common that businesses as well as individuals need to take greater pains in securing their personal data. As per a recent survey of 1000 Australians, it was found that almost 55% of them could not remember how many websites had their personal information. Only 27% users of social networking said they were aware of sharing personal information. In the current environment there is a rising need to protect data ('Data Watch: Most Youths Post Personal Information Online', 2007). Advancements in the computer technology, biotechnology, and medicine have resulted in the rise of personal data processing within different spheres of social as well as economic activities, imparting challenges of complex technology. On the other side, technological as well as electronic commerce progress renders convenience in the treatment as well as data exchange across inte rnational boundaries. So, it is significant to protect every personal data while facilitating the continued information flow, electronic commerce, and advancements in technology. However, the significance of personal life and that of the source of right to privacy of an individual vary as per policies of one nation to another (Cheung, n.d.). Hence, different rules as well as regulations are an urgent necessity to utilize personal information for ensuring involved fundamental rights. The level of privacy invasion has increased greatly. As per researches, several trends contribute towards privacy invasion such as globalization, convergence, and multimedia. These have impacts upon surveillance within developing nations. In context to information and communication technology, the pace of policy convergence has been compressed. Throughout the surveillance spectrum, wiretapping, data mining, personal ID system, encryption controls all set a proscriptive pace. References Cheung, A. Revisiting Privacy and Dignity: Online Shaming in the Global E-Village.SSRN Journal. doi:10.2139/ssrn.2010438 Data Watch: Most Youths Post Personal Information Online. (2007).Pediatric News,41(5), 9. doi:10.1016/s0031-398x(07)70299-0 Demographics: a guide to methods and data sources for media, business, and government. (2006).Choice Reviews Online,44(03), 44-1294-44-1294. doi:10.5860/choice.44-1294 Di Valentino, L. Medical Shadow: On the Privacy Protection of Personal Health Information Online in Canada.SSRN Journal. doi:10.2139/ssrn.2091855 Durante, M. (2011). The Online Construction of Personal Identity Through Trust and Privacy.Information,2(4), 594-620. doi:10.3390/info2040594 Fischer, J. (2014). Diskussion: Human Dignity and Human Rights.Zeitschrift Fr Evangelische Ethik,58(1). doi:10.14315/zee-2014-58-1-40 Ismail, N. (2012). Selected issues regarding the Malaysian Personal Data Protection Act (PDPA) 2010.International Data Privacy Law,2(2), 105-112. doi:10.1093/idpl/ips005 McConnell, C. (2002). LEGAL BRIEF: Personal data protection.The Computer Bulletin,44(6), 32-32. doi:10.1093/combul/44.6.32-c Moerel, L. (2010). The long arm of EU data protection law: Does the Data Protection Directive apply to processing of personal data of EU citizens by websites worldwide?.International Data Privacy Law,1(1), 28-46. doi:10.1093/idpl/ipq004 Parhiala, P., Simango, G. (2014). Diakonia and Human Dignity.The Ecumenical Review,66(3), 330-340. doi:10.1111/erev.12115 Pincock, S. (2004). Hospitals still don't do enough for patients' privacy and dignity.BMJ,328(7442), 730-0. doi:10.1136/bmj.328.7442.730-b Protectors of privacy: regulating personal data in the global economy. (2009).Choice Reviews Online,46(10), 46-5861-46-5861. doi:10.5860/choice.46-5861 Richardson, R. (2003). Human dignity.BMJ,326(7398), 1077-1077. doi:10.1136/bmj.326.7398.1077 Shin, S., Ma, S., Kim, S., Kim, B. (2013). Research on Factors Efecting Online Service Loyalty : Mediating Efect of Perceived Personal Information Protection.Journal Of Security Engineering,10(6), 695-710. doi:10.14257/jse.2013.12.02 Vlkel, M., Haller, H. (2009). Conceptual data structures for personal knowledge management.Online Information Review,33(2), 298-315. doi:10.1108/14684520910951221 Vorster, N. (2012). THE RELATIONSHIP BETWEEN HUMAN AND NON-HUMAN DIGNITY.Scriptura,104(0), 406. doi:10.7833/104-0-180 Whitman, J. The Two Western Cultures of Privacy: Dignity versus Liberty.SSRN Journal. doi:10.2139/ssrn.476041 Wong, R. Data Protection in the Online Age.SSRN Journal. doi:10.2139/ssrn.2220754 Yu, J. (2005). Electronic government and its implication for data privacy in Hong Kong: Can Personal Data (Privacy) Ordinance protect the privacy of personal information in cyberspace?.International Review Of Law, Computers Technology,19(2), 143-163. doi:10.1080/13600860500131564 Zanfir, G. The Right to the Protection of Personal Data (Dreptul la ProtecÃ…Â £ia Datelor cu Caracter Personal).SSRN Journal. doi:10.2139/ssrn.1852623