Thursday, December 26, 2019

The Health Care System in US Overview and Challenges

The Health Care System U.S. World Complex Name Institutional Affiliation Date: The Health Care System U.S. World Complex 1. From the video, assess how regulations in the U.S. impact the claims and facts presented in this video. Hypothesize where you think the biggest opportunity will be for pharmaceutical companies. After watching the video, I have realized that intellectual rights protection is based on the foundation of RD investment, which are also the building blocks of the pharmaceutical industry. There is adequate evidence to proof that intellectual rights in the form of trademarks and patents are very significant in the pharmaceutical industry as is compared to any other industry. This may be caused by the fact that copyrights on prescription drugs are a better effective measure for increasing the limitation costs than copyrights on other commodities. The value of copyright protection relies on the duration of exclusivity. Although the lifespan of copyrights is predetermined by international treaty at 20 years from the filing of the copyright application, the actual period between gaining market approval and patenting, the significance of the copyright is much less than 20 years. Evidently, both the EU and the U.S. enacted special provisions legislative, which extended the pharmaceuticals patents life. As is the case with America, the Waxman-Hatch Act increased the copyright protection based on name-brand drugs with up to five years, but still it also putsShow MoreRelatedOverview Of Palliative Care Services1588 Words   |  7 Pageshead: OVERVIEW OF PALLIATIVE CARE SERVICES IN CANADA 1 Overview of Palliative Care Services in Canada Jamie Organ Student Number: 0567596 Professor: Ms. J. Bertoni Lakehead University GERO 2010: Introduction to Palliative Care October 23rd 2015 OVERVIEW OF PALLIATIVE CARE SERVICES IN CANADA 2 Overview of PalliativeRead MoreThe Disaster Of Hurricane Katrina1206 Words   |  5 Pagesthousands of people, with a total of 1,883 fatalities (Hurricane Katrina Statistics Fast Facts, 2015). Hurricane Katrina left many homeless and hospitals unprepared for the challenges posed to the healthcare system as a whole. Some of these challenges included gaining access to healthcare facilities, providing expedited care to those most in need, and preventing spread of disease that commonly occurs during natural disasters. Many facilities did not evacuate in time and many were left stranded inRead MoreDefinitions And Classification Of The American Nurses Association Essay1172 Words   |  5 Pagesby all nurses, to describe care† (p. 1 2). The American Nurses Association (ANA) has 13 recognized standardized nursing terminologies that support nursing practice. The following are the terminologies and the year they were recognized. 1. NANDA-I: nursing diagnosis, definitions and classification : 1992 2. Nursing intervention classification system (NIC) : 1992 3. Clinical care classification system (CCC) formerly home health care classification system (HHCC) : Read MoreAn Overview Of Modern Health Management System1658 Words   |  7 PagesAn Overview of Ubiquitous Health Management System ABSTRACT Author Keywords ACM Classification Keywords I. INTRODUCTION Due to recent advancement in mobile technologies, high-capacity wireless network, sensor system, and wearable technology ubiquitous computing system is no longer a possibility, it is now reality. Ubiquitous computing deals with the idea how we can improve our quality of life by incorporating or interacting with technology in our everyday life. Health care is an ideal applicationRead MoreA Brief Note On The United Kingdom ( Uk ) Essay1134 Words   |  5 PagesOverview of the Healthcare System in the United Kingdom (UK) With over 65 million inhabitants, the United Kingdom (UK) is the 21st most populated country in the world, behind China, India and the US as the top three ranked countries in terms of population (Worldometers, 2016). However, its healthcare system is ranked as 5th worldwide (GBD2015 SDG Collaborators, 2016). The UK health system is financed primarily via general taxation. The system is lauded for providing universal coverage of all peopleRead MoreThe Human Immunodeficiency Virus ( Hiv ) And Acquired Immunodeficiency Disease ( Aids )1366 Words   |  6 PagesIntroduction Over the last three decades, the Human Immunodeficiency Virus (HIV) and Acquired Immunodeficiency Disease (AIDS) epidemic has been a public health concern in the United States (US) and globally. Centers for Disease Control and Prevention [CDC], (2015d) estimates that in the US, over 1.2 million people are living with HIV, of which 12.8% are unaware of their diagnosis. Due to exceptional medical advances in treatment and prevention strategies, a healthier quality of life and longevityRead MoreClinical Decision Support For Best Practice1096 Words   |  5 Pages6450 Decision Support in Health Care Executive Summary An interview with an Assistant Professor at Duke University Health System in the Department of Medicine, Maestro Care Provider Champion and Clinical Content Architect. This physician works to incorporate clinical decision support tools into the electronic health record at Duke Health System. He manages the best practice advisory committee that may provide a way to deploy alerts to clinicians at the point of care. Alerts with order setsRead MoreHiv Prevention Among The Usa1285 Words   |  6 PagesPROBLEM Human immunodeficiency virus better known as HIV, is a virus that attacks the body’s immune system. The virus specifically attacks the CD4 cells (T cells), which helps the immune system fight off infections. Overtime, HIV can destroy so many of these cells that body can’t fight off infections and diseases. HIV cannot be cured but it can be controlled with proper treatment and medical care (â€Å"What is HIV/AIDS?†). According to the Center for Disease Control and Prevention, African AmericansRead MoreThe Benefits Of Telehealth For Personal Healthcare Service1444 Words   |  6 Pagesfields from a military use to a personal healthcare system. Moreover, the development of communication technology, integrated circuit (IC), and microelectromechanical systems (MEMS), wearable technology provides easy accessibility and opens new application regime, such as Internet of things (IoT). In order to maximise the capability of telehealth system, researchers in various field s including computer science, medical science, and communication systems have collaborated cite{chakraborty2013review}. AlthoughRead MoreBismarck Model And Other Universal Health Care1259 Words   |  6 PagesThe United States as compared to Bismarck Model and other universal health care systems is lacking control and so fragmented especially to other nations. Bismarck Model or as stated in the text book â€Å"the insurance model† is known as the oldest health care model (Kovner Knickman, 2011). Although, every employer and employee (payroll deductions) contributes according to income (Kovner Knickman, 2011). Bismarck varies in the â€Å"basic coverage† from one country to another (Kovner Knickman, 2011)

Wednesday, December 18, 2019

Descriptive Essay - Original Writing Essay - 1318 Words

As soon as I said those words he grabbed me and passionatly kissed me so aggressive but sensual all at the same time. I could feel myself melting into him, as if he was sucking my soul right out of my body and into his. All that time exchanging e-mails created a huge build up that was finally released. He backed up and said hmmm your lips taste so sweet. I didn t even have a chance to reply when he pulled me back in for another soul sucking kiss. I start ripping off his clothes as we continued to kiss. Trying the best I could , I felt like I was panicing just grabing and pulling off whatever I could. He then spun me around, grabbed my hips very firmly and pushed himself into me and whispered in my ear, you feel that? hmmm? You want that?. Yes I softy said. He grabbed the back of my hair, gently tiping my head back and said I didn t hear you, say it again. YES! YES! YES!, I shouted. Good girl, he answered how bad do you want me to fuck you he said then ran his tounge do wn my neck , pulling my hips into his even more. Bad, really fucking bad, I said. He moaned a bit , with one hand holding on to me and the other running over my whole body like he was trying to memorize every inch of me and said Yeah? He then bent me right over the end of the bed and pushed himself inside of me. The amount of ecstay I was feeling at that very moment was astounding. I haven t felt like this so long, the excitement, the rush, the pleasure , the lust. AsShow MoreRelatedDescriptive Essay - Original Writing1110 Words   |  5 PagesI don’t know how I got to where I am, but I’m here now, and I have to win if I want to live. I am in a game, and in order to live, I have to escape. That’s the thing, though: I don’t know how to escape. I was running for my life around this old house that looked like it came straight out of a horror movie. I doubled over and held my head in pain as I saw the static, which meant it was coming. I was being ch ased by what looked like a person but in no way acted like one. Just as it was about to appearRead MoreDescriptive Essay - Original Writing1102 Words   |  5 PagesIt is on days like this when we stop to think about our life. Small drops of rain begin to dapple the cobblestone pavement as people whip out their umbrellas for cover. I continue sauntering down the busy street, relishing the feeling of a light shower. Moving with the mass of pedestrians, I stop at a crosswalk where I wait for the stoplight to turn green. A flower shop employee across the street scurries to bring in the numerous bouquets and close the doors as rain starts rolling down the displayRead MoreDescriptive Essay - Original Writing914 Words   |  4 PagesDreamy I thought. Standing on the corner is a young guy with a smile. I see him here almost every day, so I linger for a while. He tells me his name, and I tell him mine. I m Ester, what s your name? I enquired. My names David .,He replied. We end up ta lking for a while and I asked him if he had ever left this city. He tells me of all these stories of the places where he s been, the distant lakes and mountains, and in valleys oh so green. I can see it in his eyes, he really has beenRead MoreDescriptive Essay - Original Writing974 Words   |  4 Pages I was used to moving round, having a mother who liked to travel more than making roots was something I had gotten used to. Still, I had never gotten used to the loneliness of an empty house when she was out exploring, or the feeling of leaving behind someone who could have meant something to me. Our most recent move was Oregon. It was pretty, and I didn’t mind it, but it was much different than Florida. Not only was it opposite sides of the country, it felt as if it were opposite worlds. InRead MoreDescriptive Essay - Original Writing1012 Words   |  5 Pageshave plenty of time in the next month to think about my feeling in regards to Kendrick. I needed to finish up the article and get it off to my editor. I should be able to get it done by tonight and send an email in the morning. I was thinking of writing my next article about the sea life around the Scottish coast. Since our salmon dinner last evening I thought I would do a piece about the commercial salmon farming that began in Scotland in 1969. In 2002 over 145,000 metric tons of farmed AtlanticRead MoreDescriptive Essay - Original Writing1561 Words   |  7 PagesThere’s something I need to say and what follows may not be something that you’d expect, it won’t be heartening or uplifting. If you remember today, I told you about going somewhere I wanted to go to†¦ I’m not sure if you believed and accepted what I now confess as untrue; it is partly. I needed to pull away emo tionally†¦ from you. You must have had fathomed that some degree of formality had seeped between us. Born of habit, formulaic greetings had become a routine. You presume that I’m a close friendRead MoreDescriptive Essay - Original Writing1387 Words   |  6 PagesI was wearing a beautiful blue dress with sapphire gems all around the chest area as I entered the ball with Ciel and Sebastian. I took a good look around here, the hallway was lined with gold. There was a servant ready to escort us to the ball room. Hello, come this way. He said, walking forward. Wow, this place is so fancy! I exclaimed, looking around. It s fake gold. Ciel bluntly replied, bringing my hopes down. I sighed. Ciel sounded like he wasn t in a very good mood. Ciel, lightenRead MoreDescriptive Essay - Original Writing1287 Words   |  6 Pages In the morning, Caireann woke me up. She stood above my bed, shaking my shoulder. I opened my eyes, looking at her. Then I looked across the room to her empty bed. Andy s empty bed sat in the corner. I swallowed, climbing out of bed. Sleep well? Caireann asked me, starting out the door. Yeah, I said, going over to our small dresser. I had the bottom two drawers. Andy had the middle two, and Caireann had the top. I pulled open the drawers, pulling on a colorful tank top and a grayRead MoreDescriptive Essay - Original Writing1345 Words   |  6 PagesLater that night, I was behind the wheel of my G-Wagon with Melissa in the passenger seat. She didn’t feel like driving since she was on the road all day and I understood so I didn’t mind when she asked me to. I had been tight-lipped. She kept eyeballing me as if she detected that something was bothering me but I just kept singing to my India Arie as if I was carefree. â€Å"So are you going to tell me what’s going on or no† Melissa said disrupting my own personal concert. I stopped singing and tookRead MoreDescriptive Essay - Original Writing1085 Words   |  5 PagesI WAS SITTING IN a taxi, wondering if I had overdressed for the evening, when I looked out the window and saw Mom rooting through a Dumpster. It was just after dark. A blustery March wind whipped the steam coming out of the manholes, and people hurried along the sidewalks with their collars turned up. I was stuck in traffic two blocks from the party where I was heading. Mom stood fifteen feet away. She had tied rags around her shoulders to keep out the spring chill and was picking through the trash

Tuesday, December 10, 2019

Review of Real Life Security Incidents

Question: Discuss about the Review of Real Life Security Incidents. Answer: Introduction As mentioned in the previous section, a breach is an accidental exposure of data. There is no malicious intent. The working parties in a breach are insiders to an organisation. This report is limited to a publicly available information on breaches during September-December 2015. Suppose a person visits a sexual health clinic and opts for undergoing a clinical test. In the small community that the clinic serves, many people know each other by name. Now, suppose that the entire list of individuals that chose to take the test mentioned above is broadcast to each other. What would be the consequences? Would the people, most of whom may be acquaintances of each other, now see each other differently? This section explores one such incident. 56 Dean Street clinic, which specialises in family planning and sexual health, also administers HIV (Human Immunodeficiency Virus) tests. HIV test is a way to ascertain if an individual has the till-now incurable and debilitating disease of AIDS (Acquired Immune Deficiency Syndrome). AIDS itself has huge social implications that may make a person suffering from this disease at a significant disadvantage in her day-to-day life, with stigma and discrimination ("Stigma and Discrimination", n.d.), and possibly social isolation (Brown, 2016). The aim of the discussed hacking attack was money. Also, this attack was planted over two years and exploited for months. The attack was coordinated internationally, and novel methods for swindling the money were devised. The new techniques were used to avoid detection and also, the majority of the illegal transactions were of a relatively insignificant amount. All these details have made public by a private security company, which under the restrictions of Non-Disclosure Agreement (NDA), is prevented from naming the banks. Any bank affected itself has not come forward and publicly disclosed the attack. How could the secure banking systems be compromised? How could the planting of the malware go on for about two years without no one or no system detecting it Problem The problem was the fraudulent activities are done in the banking system, which led to the transfer of real money to unauthorised people (the criminals themselves). Additionally, the stealth used by the criminals fooled the individuals and the systems of the banks into letting these transactions pass off as routine. Also, the members of this particular attack impersonated as officers and staff of the banks to "oversee" operations. The failure to detect fake staff was also missed. Review of Two Real-life Security Incidents The most valuable asset of an organisation is intangible - data (Poole, 2007). Anything that is worth stealing will be stolen, and in today's information-based society, data provides a lucrative opportunity for easy ways to make money. In addition to big-name targets (Granville, 2015), smaller companies are also being targeted by attackers (Connolly, Gardiner, 2015). Also, not only are the skills and resources of the attackers increasing with time, the threat landscape itself is evolving (Security, n.d.). Thus the security of computers, networks, and data is a moving target. This report focuses on reviewing two real-life information security incidents. The first part discusses a breach, while the second talks about a successful hacking attack. To begin, let us differentiate between a breach and a hack (Landt, 2016). A breach is an accidental and non-malicious exposure of confidential information from inside the organisation. A hack is a willful and malicious attack from outside to c ompromise the organisation. Computer Security Breach Incident Problem At the 56 Dean Street clinic, as is the case with almost every organisation, newsletters are sent to people who have used their services. Whether or not the people have expressly consented to receive the newsletter when they provided their email address is not relevant to the current discussion. Individuals who opted for HIV test had their data bundled together in a group. This group was sent a regular email newsletter. What happened is that the employee in charge of sending out the email newsletter sent, in addition to the bulletin, details of name and email addresses of every person who had undergone HIV test in that clinic. How and Why the Breach Occurred The breach took place while the employee was compiling the list of HIV tested customers as a name and email pair. This was copied and then supposed to be pasted in blind carbon copy (BCC) field of the email compose screen. The employee pasted it into carbon copy (CC) field of the compose screen (Ford, 2015). Recipients in BCC field are unaware of other recipients, while in CC are aware of all those who have received a particular email message (Hoffman, 2012). This mistake resulted in all the people taking HIV test receiving the names and email addresses of all other such people (Burgess, 2016). The breach occurred because of laxity towards personal and confidential data. Such data is privileged information and not for the consumption of public. The lack of diligence is at multiple levels. At the management level, a stricter, possibly automated procedure, should have been used. At the individual employee level, he should have been alert and exercised care before hitting the send button. Possible Solutions As discussed in the previous section, the reasons for such a breach were not giving private data the respect it deserves, no formal rules, manually touching such data and carelessness of the employee handling the distribution of email newsletters. Keeping these reasons in mind, we propose the following solutions to prevent such a situation. It must be noted that once an email leaves the sending server, there is no way to cancel it. Email is instantaneous and even though the sender and receiver may be sitting on opposite sides of the Earth, still once and email hits even a single external server, it is beyond the point of no return (Hoffman, 2013). Confidential data is confidential for a reason and must be treated with respect, and this should show throughout the hierarchy of the organisation. To this end, comprehensive formal rules are suggested to make everyone clear as to what is at stake - not only the data but also the financial and legal implications, should it be breached. Next, every person touching this data must be logged, so that the actual person responsible for any action on the data can be traced, and handled accordingly. A better process can be to maintain automated lists (which only senior staff and database administrators can access) and then provide software with the newsletter content and the software will BCC the newsletter to every person in the list. No manual contamination of the process will be possible in such an arrangement. If there has to be a manual sending, then the employee in charge of each issue must be logged, and that person must be made aware that in the case of any data breaches occurring du e to her, she will be personally responsible for it. Computer Hacking Incident Hacking is an active process. Someone somewhere is motivated enough to use her skills and resources to attempt to attack, invade, and compromise a computer system. Malicious intent is the hallmark of a hacking attempt. The motivations may be amusement, financial, revenge, or patriotic. This report will select one publicly well-known hacking case between 2012 to 2016, and explore it. Financial and banking systems are tested thoroughly. Various laws and regulations exist which help in maintaining the security of these information systems. These institutions inspire trust in the customers as well as the employees. Still, banks are where the money is, and thus they are one of the evergreen targets. The case study chosen is about attackers infiltrating the banking systems using malware, observing the procedures and routine activities via the data sent by the malware on the computers of the banking systems (Sanger, Perlroth, 2015). Who Were Affected and How In this attacking operation, primarily the banking system was affected. Now, cash was extracted from ATM (Automated Teller Machine) machines remotely by hackers. This money belongs to the bank until some authorised person inserts his card and withdraws some amount. Money was illegally transferred from certain accounts to some fake accounts which were created for this purpose only. Most of the customers can be assumed to be alert of their balances. Now, what these hackers did was inflate (artificially of course) the balance in some account and then transfer the excess to their fake account. The original owner of the bank account which served as the launch pad still had the same balance in his account, thus not triggering any out-of-ordinary suspicion unless the detailed statement was analysed. In any case, the money was transferred. Whose money was it? It was the bank's money. Thus, it is concluded that the banks per se were affected and lost real money. The individual account holders were not affected in that their total balance remained the same. However, this incident showcases that the entire system has been compromised, and any determined and resourced attackers can bend the banking and financial system to their will. How Was the Attack Carried Out This attack too had a simple method - email links. The hackers sent emails to employees which convincingly looked as if they came from colleagues. The clicking of an innocent looking link enabled the hackers to download malware on the computers of the banks. The software then trawled the network to identify the central computers. When the administrator computers were located, a further software was downloaded from the hacker servers, which allowed key-logging, screenshots, screencasts, and then uploaded all these to the hackers. To be fair, the hackers expended a tremendous amount of effort to understand the workings of the banks. Critical to the success of the attackers' mission was mimicking the bona fide operations and staff completely. Once, the internal workings were understood, then the next phase of the attack was simpler. Show up at the right place in the right attire and leave with the cash. Remotely order some fraudulent transactions that real money to some temporary accoun ts. Other novel methods of transferring money were also devised. How Could the Attack Have Been Prevented As explained in the previous section, many chinks in the baking armour have been exposed. The faults begin with the emails that were able to bypass any automated checks and reach the employees' inboxes. Some software should have automatically scanned the emails and the links for malicious code or links. Next, the employee must always be on guard to the slightest suspicion. If necessary, the sender of the email may be personally contacted at his official email address confirming the suspected email message. The firewalls should be sensitive not only to the incoming traffic but also the outgoing traffic. Such an arrangement may have been able to intercept when the key logs, screenshots and videos were being sent back to the hackers. Finally, measures should already have been secure enough, but now need to be updated to prevent any impersonations. Additionally, expending more resources to more frequent cross-checking of accounts is recommended. Conclusion The idea from both the case studies seems to be that the human link of a security chain is often the weakest. Incidentally, both the case studies used emails as their attack medium, and critical to their success was fooling the humans into clicking target links. In addition to security alerts, perhaps logging of the links opened by the employees will serve as a motivation for the employees to exercise good diligence. Also, case-specific measures have been recommended. References Brown, A. (2016). Social Effects of HIV AIDS. LIVESTRONG.COM. Retrieved 30 March 2017, from https://www.livestrong.com/article/19464-social-effect-hiv-aids/ Burgess, M. (2016). London HIV clinic fined 180,000 for 'serious' data breach. WIRED UK. Retrieved 30 March 2017, from https://www.wired.co.uk/article/56-dean-street-fine-data-protection-hiv Connolly, B., Gardiner, B. (2015). Case study: When a hacker destroys your business. CIO. Retrieved 30 March 2017, from https://www.cio.com.au/article/569410/case-study-when-hacker-destroys-your-business/ Ford, N. (2015). Londons 56 Dean Street clinic leaks HIV status of 780 patients. IT Governance Blog. Retrieved 30 March 2017, from https://www.itgovernance.co.uk/blog/londons-56-dean-street-clinic-leaks-hiv-status-of-780-patients/ Granville, K. (2015). 9 Recent Cyberattacks Against Big Businesses. Nytimes.com. Retrieved 30 March 2017, from https://www.nytimes.com/interactive/2015/02/05/technology/recent-cyberattacks.html?_r=0 Hoffman, C. (2012). Whats the Difference Between CC and BCC When Sending an Email?. Howtogeek.com. Retrieved 30 March 2017, from https://www.howtogeek.com/128028/htg-explains-whats-the-difference-between-cc-and-bcc-when-sending-an-email/ Hoffman, C. (2013). Why You Cant Undo Sending an Email (and When You Can). Howtogeek.com. Retrieved 30 March 2017, from https://www.howtogeek.com/161762/why-you-cant-undo-sending-an-email-and-when-you-can/ Landt, K. (2016). Breach vs. HackThe Differences You Need to Know to Protect Your Company. Blog.eiqnetworks.com. Retrieved 30 March 2017, from https://blog.eiqnetworks.com/blog/breach-vs.-hack-the-differences-you-need-to-know-to-protect-your-company Poole, O. (2007). Network Security (1st ed., p. 140). Routledge. Sanger, D., Perlroth, N. (2015). Bank Hackers Steal Millions via Malware. Nytimes.com. Retrieved 31 March 2017, from https://www.nytimes.com/2015/02/15/world/bank-hackers-steal-millions-via-malware.html?_r=0 Security, E. ENISAs Cyber-Threat overview 2015 ENISA. Enisa.europa.eu. Retrieved 30 March 2017, from https://www.enisa.europa.eu/news/enisa-news/enisa2019s-cyber-threat-overview-2015 Stigma and Discrimination. Web.stanford.edu. Retrieved 30 March 2017, from https://web.stanford.edu/group/virus/retro/2005gongishmail/hivsocial.html

Monday, December 2, 2019

Neverland free essay sample

Peter Pan is a favorite book of mine. Everybody knows the story of the child who refused to grow up. That’s me. At least, it used to be. I spent my high school career in a daze, coddled away from harsh realities and future responsibilities, bolstered by praises and confirmations. â€Å"You’re gifted, Emily,† or â€Å"With your smarts, you’ll go far, Emily.† I just nodded and smiled, closing my eyes and letting their words sweep me away. When I opened my eyes again, I found myself alone in a dingy, white dorm room. Somehow, I had stumbled my way into college at sixteen. The reality hit me as soon as my parents closed the door behind them, tears springing to my eyes. Like our storybook fey, I suddenly found myself face to face with the prospect of â€Å"growing up,† and I, too, felt like flying away to Neverland. I treaded timidly at first, reluctantly testing the water with one toe, and then, for lack of fairy dust, dove into my future head first. We will write a custom essay sample on Neverland or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page And it was surprisingly easy. I adjusted almost seamlessly; living alone isn’t hard, classes are interesting, and my grades are satisfactory. It’s even fun. Next semester is looking even better. Not that there weren’t struggles, times I was sad, times it was hard, times I wanted to go home. But those instances grew fewer and fewer. Now I’m looking ahead. That’s what’s so amazing about growing up. It comes naturally, without warning. Adulthood sneaks up on you in the night, stifling childish fantasies and planting practical plans, realistic goals. It alters you little by little, almost imperceptibly, until one day a friend, a relative utters the words, â€Å"You look so grown up!† You can only stare at the mirror in disbelief. I do? They say hindsight is 20/20. Now I can see how in just one semester, I’ve grown so much. Living on campus has exposed me to so many different kinds of people. I’ve been able to explore new fields of study. I’ve learned to hold my own, how to cope, how to succeed, how to live. Away from the security of high school, of home It was painfully apparent how sheltered, how naive, I really was. I was a deer in the headlights back then. It’s funny now that I can look back on it with new perspective, new knowledge, and new maturity. Is it possible to pinpoint the transition from child to adult? Somehow this must be it; however, sometimes I still catch my mind wandering away from my textbook, back to that childish fancy. Of course, if Peter Pan were to offer me his hand tonight, I would have to close the window. Now, to me, there’s something that shines brighter than the second star to the right: the future. So, I won’t say I’m an adult just yet, but I’m certainly on my way.