Retrieved de https://studentshare.org/management/1480202-annotated-biblography-assignment
https://studentshare.org/management/1480202-annotated-biblography-assignment.
Researchers asserted that the Malaysian government, in its vigorous effort to uphold community health care for mentally ill patients, must also ensure that those who are proving services be formally educated on how to implement integrated mental community-based health care by addressing the need to immerse them with knowledge on the use of traditional multicultural belief systems especially in “family caregivers, mental health service users and service providers.” With the dearth of mental health facilities especially in rural regions of Malaysia, family caregiving for mentally ill patients became the primary resort amongst a significant number of family caregivers.
Researchers further argued that notwithstanding numerous scholarly studies on family caregiving services for mental illness under Western medical healthcare practices but these are not sensitive to the eastern culture of Malays. The need to have a sensitive approach to mental health care delivery pose a challenge for healthcare providers in Malaysia and indeed, the multi-dimensional ways of caregiving should be utilized for both traditional and scientific approaches to healthcare. The researchers likewise asserted that studies should likewise be expanded to include concern to mental health social work practices.
Further, it was noted that while the government recognize the role of the family in according responsible healthcare for their members as part of its culture and tradition, but mental illness care require a multidisciplinary approach too to respond to the behaviours of the patient and professional or institutional support should be highly regarded too, especially when patients are in a dire need of professional medical attention.Severely ill patients necessitate not only the traditional or customary way of mental healthcare but also professional support because mental illness is a broad illness that cannot be simply regarded as simple possession of evil spirit or a moral weakness of a patient or God’s formidable punitive way for human being’s excessive immersion to sins.
There are scientific bases on mental illness and there are also specific medications that can be optimized to normalize the behaviour of a mentally ill person. Medical expert intervention is also necessary to address symptoms, effects, and impacts of mental illness to persons, especially those that have a tremendous tendency to inflict harm to themselves or those that are possessing violent capacities. Psychiatric help is also essential in understanding the sociological context of mental illnesses.Alpar, G., Hoepman, J-H.
, Siljee, J. (2011). The Identity Crisis: Security, Privacy and Usability issues in Identify Management, Radboud University Nijmegen: The Sentinels, pp, 1-14.This research is focused on the ‘identity crisis emerging from “substantial security, privacy and usability shortcomings encountered in existing systems for identity management (Alpar, Hoepman, & Siljee, 2011, p. 1).” Substantial research is deemed essential to resolve issues arising from the utilization of information technology where substantial risks are associated with the use of multiple identities in accessing information and studies online.
Researchers recommended the need for a comprehensive study to deescalate the problems associated with the uncontrollable processes and use of digitized identities especially that there are numerous hackers or information technology users who are engaged in illegal phishing activities to access remote systems. Researchers further argued that those who are involved in the “creation, management, and digitized identities” among users are fundamentally targeting accessing databases and other online information.
With the demand to increase the security management in identity management, researchers opined the need to improve the security of internet and website providers to sustain trust among subscribers. While identity management is undoubtedly subject to varied approaches and systems, as fundamental systems have varied features, but the potential confusion can be simplified depending on the nature and kinds of ICT platform that will be utilized with anent authentication processes to ensure identity security among application subscribers.
In their conclusion, the researchers proposed that identity and access management issues and problems can be resolved by opting for the user-friendly platform but must have embed security systems for identity security especially for “high-valued customer services such as automated banking services (p. 13) where access to accounts can be done now online. They recommended that (a) right model for identity management be developed and enforced for IdPs and RPs; increasing the trust and confidence using the adopted model of identity security management; prevent phishing and hacking using RPs and IdP authentication processes in identity management amongst subscribers; increasing privacy security for subscribers by sustaining the use of pseudonyms and anonymity or the use of identities that are not linked to transactions of all RPs altogether in accordance to the 8th Law of Location Independence; sustain the right of the subscribers to use identity management system that is transparent and acceptable to them; and, the identity management system should immediately provide the required credential in the use of specific services, including the minimum roles of users that they can optimize under their credentials (Alpar, et al.
, 2011, pp. 13-14).Researchers likewise opined the urgent need for an identity management system that allows users to be in control of the system as well as permeate them to use their profiles in a controlled way especially in domains where business thrived and where financial transactions or exchanges are undertaken. They also admitted that further information technology researchers must be undertaken to standardize identity management solutions (Alpar, et al., 2011, p. 14).
Read More