Saturday, December 28, 2019

Public Policy Analysis For Addressing Antibiotic Resistance

Griffin M. Anderson Professor Johnny Holloway Government-210: Political Power and American Public Policy April 17, 2015 Public Policy Analysis for Addressing Antibiotic Resistance INTRODUCTION: It is hard for us to imagine living a country before modern medicine. Just over one hundred years ago, nearly nine out of every 1,000 women who gave birth died from complications, roughly 40 percent from bacterial infections (CDC, 1999). In some U.S. cities and townships as many as 30 percent of infants passed away before they could celebrate their first birthday (Ibid). About one in every nine individuals who contracted a serious skin infection ended up being killed by it, even from something as trivial as an abrasion or a bug bite (Ibid). Pneumonia killed 30 percent of those who came down with it; and meningitis had a kill rate of 70 percent (Editorial Board, 2014). Surgical procedures were shoddy and often resulted in mortality due to bacterial infection (Ibid). However, the landscape was dramatically changed by the development and implementation of a few major medical breakthroughs: improvements in public health, vaccines, and antibiotics (PCAST, 2014). Over the past hundred year s, deaths from infectious diseases declined incredibly and contributed to a substantial increase in life expectancy. Antibiotics, especially, have preserved millions upon millions of lives (Ibid). However, the scene is changing dramatically once again, and not in our favor. Antibiotic resistant bacteriaShow MoreRelatedIndependent Prescribing Case Study6166 Words   |  25 Pagesresponsibility to ensure the item that they select is the most appropriate to meet the needs of the individual patient and that it is safe and effective (Anderson 2002). To achieve maximum effect for Betty, it is important to ensure that the correct antibiotic is prescribed, at the optimal dose and duration. The Health Protection Agency (HPA 2005) offers advice regarding diagnosing UTI, as do authors Hummers-Pradier and Kochen (2002). They both conclude that ‘dipsticks can be used to examine urine’, andRead MoreSelf Medication Practices in a Rural Filipino Community21296 Words   |  86 Pagesby Ibuprofen, both commercial drugs falls under the classification of analgesics and or antipyretic while the third one was amoxicillin an antibiotics. On the aspect of the accuracy of medication usage, paracetamol, Ibuprofen and loperamide were the topmost correctly used. On the other hand, most of the commercial medications incorrectly used were antibiotics wherein amoxicillin was the leading medication that was wrongly used then cotrimoxazole and cephalexin. Fever is the most common illnessesRead MoreUrinary Tractinfection5962 Words   |  24 Pageshospital epidemiology in healthcare settings around the globe. APIC’s members are nurses, epidemiologists, physicians, microbio logists, clinical pathologists, laboratory technologists and public health professionals. APIC advances its mission through education, research, consultation, collaboration, public policy, practice guidance and credentialing. Look for other topics in APIC’s Elimination Guide Series, including: †¢ †¢ †¢ †¢ Catheter-Related Bloodstream Infections Clostridium difficile MediastinitisRead MoreEssay on E Coli and Salmonella in Swine Finishing Barns1889 Words   |  8 Pagesthe survey responses with 88% of barns reporting delivery through feed, 12% through water, and 74% of barns reporting treatment of individual swine with parenteral antimicrobials. Commensal enteric bacteria containing the blaCTX-M cephalosporin resistance gene were detected in a total of 8 barns (16%); 10 E. coli isolates from 5 barns in Ohio, 12 E. coli isolates from 1 barn in Michigan, and 2 Klebsiella pneumonia isolates from 2 barns in Illinois. The prevalence of blaCTX-M samples within positiveRead MoreGlaxosmithkline18561 Words   |  75 Pagesgenerates 85% of GSK’s sales. The five largest selling GSK products are Seretide/Advair for asthma and Chronic Obstructive Pulmonary Disease (COPD); Paxil/Seroxat and Wellbutrin, both antidepression drugs; Avandia/Avadamet for type 2 diabetes; and the antibiotic Augmentin. Each of these drugs generated above  £800 million of sales in 2003. GSK produces a broad range of products of special importance to developing countries, including: Anti-malaria drugs Zentel (albendazole), for de-worming and the preventionRead MoreGenetically Modified Food and Gm Foods4570 Words   |  19 Pagesoptimization that most ac curately characterizes contemporary America. Undoubtedly, it comes with great costs. As it turns out, optimization is a business, and a profitable one. Thus, the costs and effects of optimization are often hidden from the public by industrial leaders in an effort to maintain profits. They control the businesses they run and protect themselves by dumping millions of dollars into politics. Today, it seems that the gap between nature and technology has been breached with theRead MoreScope of Demography8788 Words   |  36 Pages 5. That attention to large populations, often national ones, explains why demographic â€Å"arithmetic† is political. Often, indeed, its practitioners wanted to gauge the health of the body politic and even to point the direction of improvement. Such policy involvement did not become controversial until the 3 twentieth century when controversy arose, first over focusses on migrants and differential fertility in response to the eugenic s movement, and later over research appearing to support the callRead MoreNursing Essay41677 Words   |  167 Pagespresident of the National Academy of Engineering. The Institute of Medicine was established in 1970 by the National Academy of Sciences to secure the services of eminent members of appropriate professions in the examination of policy matters pertaining to the health of the public. The Institute acts under the responsibility given to the National Academy of Sciences by its congressional charter to be an adviser to the federal government and, upon its own initiative, to identify issues of medical careRead MoreCommunity Health Nursing Final Exam Study Guide Essay15874 Words   |  64 PagesInsulin-dependent diabetic man who lives on the street may sleep in a shelter. His ability to get adequate rest, exercise, take insulin on a schedule, eat regular meals, or follow a prescribed diet is virtually impossible. How does someone purchase an antibiotic without money? How is a child treated for scabies and lice when there are no bathing facilities? How does an older adult with peripheral vascular disease elevate his legs when he must be out of the shelter at 7am and on the streets all day? Read MoreMergers Acquisitions in Pharma Industry21425 Words   |  86 PagesMarket Scenario ((Projected Pharmaceutical Market, 2004-2009)) 2.2.3 New Product Launches underlie market growth 2.2.5 Key Opportunities 2.2.6 FDI in Indian pharma 2.2.7 Strategy and Trends 2.2.8 Research and Development 2.2.9 SWOT Analysis 2.2.10 Mergers and Acquisitions in Pharma 2.2.11 Good Opportunities for ‘big pharma’ References Chapter Three-Merger between Glaxo Wellcome Smithkline Beecham 3.1 Introduction 3.2 Merger rationale 3.2.1 Rapid advances in Science

Friday, December 20, 2019

Exploring Schizophrenia Essay - 1397 Words

Exploring Schizophrenia A disease that leads to more suicide deaths than AIDS, SIDS, and MS combined is present in one in one hundred people globally. Schizophrenia is prone to lead to long-term disability, unemployment, drug and alcohol abuse, and family trauma. Ten percent of all patients commit suicide. Schizophrenia is an infamous disease attacking the American population. What is schizophrenia, how is it caused, what does it do, and who does it effect? One percent of America has schizophrenia, two million in any given year. Although schizophrenia has the same effect on men and women, men have more noticeable symptoms earlier in their life. For men, symptoms start occurring from their†¦show more content†¦A delusion of reference is when you believe that you are trying to be contacted when really you’re not. A great example of a delusion of reference is believing the TV is talking to you, or that singers are trying to get you a message through their songs. Sometimes, when a patient has schizophrenia, they tell themselves they are sick, thus making themselves sick. The most dangerous delusions are that of grandeur. These lead you to think you have superpowers or a very special person. This leads to many ‘suicides’ among schizophrenics (www.schizophrenia.com). The next sign of schizophrenia and most infamous are the hallucinations. They are like delusions, except they affect the senses. The proper names for these hallucinations are as follows: visual hallucinations (seeing things that aren’t there); auditory hallucinations (hearing things or voices others cannot hear); tactile hallucinations (feeling things that other people can’t feel, or having something touching your skin that other people can’t feel); olfactory hallucinations (smelling things that other people cannot smell, or not smelling the same thing that other people do smell); and gustatory experiences (tasting things that aren’t there). The third and fourth signs of schizophrenia are disorganized speech and grossly disorganized or catatonic behavior. A nickname for disorganized speech would be ‘word salad.’Show MoreRelated Exploring Schizophrenia Essay1781 Words   |  8 PagesExploring Schizophrenia Schizophrenia which affects approximately 1 percent of the population, usually begins before age 25 and persists throughout life. The illness is a life long debilitating condition for about 40% of patients and is enormously costly in both social and economic terms. Despite the presence of delusions, hallucinations and cognitive impairment which characterize the illness, overall life expectancy is not altered (although there is a significantly increased risk-of suicideRead MoreEssay about Exploring Schizophrenia4194 Words   |  17 PagesExploring Schizophrenia Schizophrenia is a cruel disease. The lives of those affected are often chronicles of constricted experiences, muted emotions, missed opportunities, unfulfilled expectations. It leads to a twilight existence, a twentieth-century underground man...It is in fact the single biggest blemish on the face of contemporary American medicine and social services; when the social history of our era is written, the plight of persons with schizophrenia will be recorded as having beenRead MoreExploring the Mental Illness of Schizophrenia Essay1530 Words   |  7 PagesMany people have ignored the illness that affects about one percent of the population. Schizophrenia is the mental illness that I’m referring to. Schizophrenia is a psychotic illness which is can be never-ending, severe, and brain distorting. I’ve grown interest in this particular topic for several reasons. One influence came from my interesting aunt. The problem started when I noticed the farfetched information my Aun t relayed to me. â€Å"Hey Aunt, how are you?† I squealed â€Å"I’m not so good, I feelRead MoreSchizophrenia Is A Disabling Brain Disorder858 Words   |  4 PagesSchizophrenia is a disabling brain disorder that has affected many people throughout history. While having this disorder there is many things that goes through a person’s mind. Many people with Schizophrenia may hear voices that other people don’t hear. Also with this disease they believe other people are reading their minds, controlling their thoughts, or plotting to harm them. With those symptoms this can cause people to become ill and make them withdrawn or extremely agitated. Some other effectsRead MoreWhat is Schizophrenia?985 Words   |  4 PagesSchizophrenia is the worst of all mental health disorders because it is many severe disorders all put into one such as mood disorders and psychological disorders. It is a mental health disorder that affects a persons’ reality. When the word Schizophrenia is broken into two, schizo means â€Å"Splità ¢â‚¬  and phrenia means â€Å"mind† (DeWall Myers, 2014, p.562). According to the National Institute of Mental Health (NIMH), about 1% of Americans have schizophrenia. Schizophrenia has many different components suchRead MoreSchizophrenia And Its Effects On People On A Daily Basis808 Words   |  4 Pagesof understanding schizophrenia; normal is anything that deviates from the socially accepted way of conducting one’s self. The person affected by this disorder is drifting away from reality and, at the same time, drifting away from who they have been their whole life. It has been stated that schizophrenia plays a very large role pertaining to who a person is and how that person’s actions are interpreted by the culture they live in. To contain the context of what schizophrenia is, the textbook definitionRead MoreSymptoms And Symptoms Of Schizophrenia1515 Words   |  7 PagesThe term ‘Schizophrenia’ was introduced by Eugene Bleuler in 1908 to describe a set of symptoms previously labelled as dementia praecox. Schizophrenia refers to the splitting of different psychological symptoms within a single personality (Davey, G. 2014). â€Å"Schizophrenia is characterized by delusions, hallucinations, disorganized speech and behaviour, and other symptoms that cause social or occupational dysfunction. For a diagnosis, symptoms must have been present for six months and include atRead MoreMental Disorder And Its Effects On Schizophrenia1131 Words   |  5 PagesAbstract: Schizophrenia is one type of mental disorder .There are three types of symptoms like positive , negative and cognitive. It creates hallucinations, delusions and interacts to thought process of persons. Though it is a treatable but it affects person’s ability in to reality. There are many factors which affect the schizophrenia like biological factors, psychological factors, sociocultural factors. Among them in biological factors, age and sex highly affected to Schizophrenia. The psychologicalRead MoreSymptoms And Symptoms Of Schizophrenia980 Words   |  4 PagesSchizophrenia is a severe brain disorder that disrupts the normal balance of thinking and emotions; thus, sufferers decode reality abnormally. Schizophrenia can result in an amalgamation of delusions, hallucinations (visual or auditory), disordered thinking, chaotic speech, and behavior (Mayo Clinic, 2014). Schizophrenia â€Å"has the highest disability rating (0.53) of all mental illnesses among adults† (Eaton, 2012, p. 19), and as a chronic disorder requires lifetime treatment. The latter serves asRead MoreClinical And Clinical Research Project1344 Words   |  6 Pagescognitive deficits associated with schizophrenia. As the clinical symptoms of this disorder emerge during early adulthood, abnormal developmental processes are thought to contribute to the pathos-physiology of the disorder. It was discovered the the DA intervention of the prefrontal cortex undergoes significant change up until adulthood which leads to Finlay’s hypothesis that the abnormal development of this system may be related to the emergence of schizophrenia. Experimental and clinical research

Thursday, December 12, 2019

Rational Argument

Question: Choose one of the media articles or case studies listed by the lecturer in Interact. Use the title of the article/case study provided in interact as the title of your essay, so that the lecturer knows which article you are analysing. Undertake further research about your chosen case, to assist you in analysing and discussing it in your essay. Answer: Introduction Information and information resources system should be restricted. To restrict information system a main key element is to secure se information system. This process is controlled with the help of high security concepts. An information system is a process where the major and important informations are transferring from one user to another user. During this transmission time both the user do not want to share this data with third party. So they must maintain a proper communication path by which their information is secured and reliable (Trajkovik Mishev, 2014). There are so many information data which need not to secure as they are not reliable or important. Now a days Security is essential for ICT management system. Several threats and viruses are avoided with the help of the security policies. Security also refers a confidential process for an ICT organization where the important informations are transferred from one system organization to another system organization. The confident ially is a process, by which an information is released only to the authorized parties. Information system needs to be secured during the transmission time in between two systems. An ICT security is process which guides small network securities during a proper data transmission from one system to another system. Finally an ICT security is a critical consideration which maintains the major activities during proper information sharing among two communication systems. Step 1 Security is essential for ICT communication system, which provide a safe data transmission Security is the main challenge faced by organizational information system A security policy generally explains the main mechanism of a security system for a safe data transmission The security of an encryption process is guaranteed by secret keys and never by algorithm keys Cyber crime is a major crime that involves computer network due to poor network security Step 2 Security is a major problem to ICT information system during their data transmission. ICT is the main communication provider which provides important data and information from one channel to another channel. To process this system ICT maintain some protocol to transfer information among their main servers (Rhee, 2003). As communication path is the main transaction path for ICT system so each and every system must provide some data or information which is required during a transmission process. This information system should provide a protection key that the third part cannot able to trace the communication path. So ICT communication system must provide a safe and successful data transmission over internet system by maintain the major security protocols. With the help of these protocols communication system can provide a safe data transmission among their entire system. From the above argument it can be concluded that Security system is the main key which provides a safe transaction p rocess for an ICT communication system. In an organization to process a successful information transaction security is the main challenge faced by the particular organization (Quigley, 2011). In an organizational information system the information structure is the key element for the organization. Human factors are the basic requirements for an information process to make the main communication path among their entire servers. With the help of the human factors the security culture of an information system can be significantly enhanced. The organizational informational structure is totally based on public network or internet system. So security is an essential issue for an organizational information system. To process a safe data transmission some security policies are maintained which cover up the entire security mechanism. Encryption is a process to transform data or information from source to destination (Oppliger, 1998). During this process the third party cannot access data or information. Authentication is a security mechanism which is necessary to check about clients authorization to perform the particular action. This process is used to verify the client and server information or authentication with their basic requirements to perform the particular transmission. So encryption and authentication is the main security mechanism to transform data from one system to another system. Auditing is a server toll to trace the clients address against the security threats. With the help of auditing process all threats of server protocol can be avoided during a successful data transmission. So finally it can be concluded that security policy causes a safe data transmission process (Kocarev, 2012). In an encryption process secret key is the main element to protect the entire encryption process. Encryption among two servers refers the entire data transmission process among them without any overlapping or interference. During an encryption process cryptography is the main algorithm to manage the entire process. So to process a safe and secure data transmission encryption is the main secret key to cover up the security policy. The algorithms are not responsible for a secure encryption. Secret key is the main intermediate term to process a secure encryption (Jahankhani, 2010). Now a days cyber crime is a major crime which involves computers information and the entire network due to poor network security. Generally cyber crime can be protected with the help of strong network security policy (Faber Behnsen, 2013). Network security is an essential part to prevent the entire cyber crime. During an online transmission data are not secure due to poor network, which may cause a hacking process in the network. By managing a strong network it can defend the hacking process. So the network security can prevent the entire cyber crime by maintaining a strong network authentication. Conclusion ICT represent a security management process which describes the risk factors of the entire network management system over the internet system. The report concludes that ICT security system is co operating the policy development process including a strong network authentication. Information sharing will also enhance a critical thinking of the organization including critical infrastructure to prevent the major cyber threats. Public Private Corporation is attached with ICT to secure their network by maintaining their flexibility and rapid information sharing. Encryption is the major security process to enable the security policy during an online data transfer from one channel to another channel (Dunsmore, Brown, Cross Cunningham, 2001). Recommendation To process a safe and secure data transmission among the entire ICT servers the cryptography must maintain some protocol which control entire risk management of the system. The ICT revolutions are driven from global environment to enhance their security policy by maintain a strong network security. Some software is used to secure this network to maintain a successful supply chain. The information is secured with a server key during the data transmission that no other party can access this information. After a successful transaction of data transfer the source and destination can able to retransmit the entire pro0cess without any overlapping or interferences. ICT should develop their web application by organizing a strong secure policy which co-operates the flexibility of information sharing. The operating system should be strong to keep the original data during the communication path from source to desti9nation by providing a strong security mechanism (Chapman Zwicky, 1995) References Chapman, D., Zwicky, E. (1995).Building Internet firewalls. Sebastopol, CA: O'Reilly Associates. Dunsmore, B., Brown, J., Cross, M., Cunningham, S. (2001).Mission critical!. Rockland, MA: Syngress. Faber, E., Behnsen, W. (2013).Secure ICT service provisioning for cloud, mobile and beyond. Wiesbaden: Springer Vieweg. Jahankhani, H. (2010).Handbook of electronic security and digital forensics. New Jersey: World Scientific. Kocarev, L. (2012).ICT Innovations 2011. Berlin: Springer. Oppliger, R. (1998).Internet and Intranet security. Boston: Artech House. Quigley, M. (2011).ICT ethics and security in the 21st century. Hershey, PA: Information Science Reference. Rhee, M. (2003).Internet security. Chichester, West Sussex, England: J. Wiley. Trajkovik, V., Mishev, A. (2014).ICT innovations 2013. Cham: Springer.

Wednesday, December 4, 2019

Tort of Negligence The Given Circumstances

Question: Describe about the Tort of Negligence for The Given Circumstances. Answer: A. Parties The parties to this case are Tahir as the plaintiff and Helen / Kim as the defendants. Facts of the case The facts, which have given rise to problems with respect to this case, are Jim is a owner of the used care business Helen has been appointed by Jim as an expert on used car to provide appropriate advice about the value and conditions of the used cars to Jim. Jim had bought a vintage car 196 Bentley S2 model on the advice of Helen form an auction Tahir had offered to purchase the car from Jim Jim had informed Tahir that he was not an expert on used vintage cars Jim had informed Tahir that he believed that the car would make a profit of 10000 after minor repair based on Helen report, which stated confidential to the addressee only. It was later discover by Tahir after the purchase , that the car is in significant bad shape and is will not be able to make a profit immediately Legal issue Whether Helen/Jim are liable for the tort of negligent misstatement or not Relevant laws Negligent misstatement: To determine whether the person has made negligent misstatement on not few tests are applied. Fault: there has to be evidence, which shows that the person had negligently or intentionally committed a tortuous Act (Graham 2015) Actual damage: the plaintiff has the burden of proof with respect to the damages or loss suffered by them because of the tortuous act, which took place (West 2015). Duty of care: a individual must have a duty of care towards another person to be held accountable for the tort of negligence. By duty of care, it is means appropriate care, which a reasonable man would have taken in the same, circumstances (Michaud 2013). Breach of duty of care: the individual who had the duty of care towards another had actually breached such duty of care with respect to the other individual. Further, such breach of duty has resulted in loss or damage to the other individual (Van Dam 2013). Remoteness: whether the person who has committed the wrongful act could reasonably foresee the damages, which have been caused because of his actions (Goudkamp 2016) In the case of SHADDOCK ASSOCIATES PTY LTD V PARRAMATTA CITY COUNCIL [1981] HCA 59; 150 CLR 225 with respect to negligent misstatements the court provided with points of test to determine special relationship between the plaintiff and the defendant (Seiner 2014). It has been realized by the defendant that the plaintiff has sought for their professional skills and based on their advice the plaintiff had made a decision which have caused damage or losses to him The information, which has been exchanged by the parties, is related to serious business transactions. It has also been realized by the defendant that it would be reasonable for the plaintiff to rely of the information provided by him, in certain circumstance (Keating 2015). Application: Applying the elements of the tort of negligent misstatement to this case: Duty of care: In the given circunstances, it can clearly be identified that Helen owed a duty of care towards Jim and Tahir with respect to the information provided by her about the old car. As she was an expert on old cars and had been appointed by Jim to give him appropriate advice based on which he purchased or sold the cars. As the car was sold by, Jim to Tahir based on the information provided by Helen, she is automatically owns of duty of care towards Tahir as well. Breach of Duty: In this case the duty of care which was owed by Helen towards both Tahir and Jim with respect to the information provided by her about the old car has been breached, as the information was not correct. Jim based on the wrongful information provided by Helen, sold the car to Tahir and breached the duty of care he owed to his him. It is irrelevant in this case; that the report was subjected to Jim only because Helen had the knowledge that it would be used by him to sell the car Damages: The wrongful information provided by Helen has caused loss to Jim as he had purchased the car with defects. Further loss had been caused to Tahir as he purchased the defective car from Jim, which had no prospect of making immediate profit. Remoteness: it is appropriate in this case with respect to a reasonable man, that the wrong information provided by the expert could have caused losses to the persons who will purchase the car. Conclusion: Jim is liable to be sued by Tahir for negligent misstatement. However Jim can claim such damages from Helen . B. Parties: The parties to this case are Darius who is the plaintiff and Selina who is the defendant: Relevant facts of the case: Selina was a close friend of Darius Selina was asked by Darius to locate a used car which is not crash repaired Selina had a little experience about used cars but she was not a mechanic. Selina had urged Darius to by a second had VW golf car, which was sold by Jim for $5000, as she liked the car very much. Selina had the knowledge that the car had been repaired as the bonnet appeared to be straightened to her when she inspected the car, but she still referred the car to Darius stating that the car was in a very good condition, and even though she did not know Jim assured Darius that Jim would not cheat her. Darius after buying the car on Selinas had discovered that the car had been previously written off, repaired in a very bad way, was in a very bad shape, and is worthless Issue: Whether Selina is liable for the tort of Negligent misstatement against Darius or not Relevant laws To constitute a case of negligent misstatement there has to be information provided by a person relying on which the other party does an act and ultimately suffer loss or damages. In the case of Donoghue v Stevenson [1932] AC 562, the court provided that to determine whether the tort of negligence has been committed on not there has to be fore elements which as to be looked into (Keating 2014): The defendant must owe a duty of care to the plaintiff; such duty does not have to be a contractual relation or a legal obligation. The duty of care that the defendant owes to the plaintiff had been intentionally or negligently breached by the defendant. The breach in the duty of care, which has been committed by the defendant, has caused loss or damages to the plaintiff. The defendant could foresee that extent of the damages resulting from the act committed by him. In the case of Hedley Byrne Co v Heller[1963] 3 WLR 101 the court provided that the defendant does not own a duty of care towards the plaintiff if he has suffered a pure economic loss. However if the loss have been caused because of a negligent misstatement made by the defendant than the defendant is liable for the losses suffered him (Sperino 2014). Application: Duty of care: In this case, Selina did not have any legal duty of care with respect to Darius, as she was not a professional mechanic and had only little experience with respect to second hand cares. The tort of negligence does not concern the type of duty, which is present between the parties, it considers whether the duty of care is present or not. In this case, it was the moral obligation of Selina to provide Darius with the knowledge to the best of her abilities with respect to the car bought by him. Thus, a duty of care exists between them (Zipursky 2015). Breach of duty of care: Selina had breached the duty of care and not provided Darius with the knowledge to the best of her abilities with respect to the car bough by him. She had seen the car had been badly repaired while she was inspecting the care and solely because she liked the car, she had urged Darius to buy it. Damages: the information provided by Selina had made Darius purchased the car and subsequently he has discovered that the car was a crashed repair car, which had been written off and was worthless. Remoteness: If the rule of remoteness is applied, in this case it could be determined that any reasonable man would assume in these circumstances that the information provided by Selina could result in the loss suffered by Darius. C. Parties: In this case, the plaintiff is Freya and the defendant is Jim. Relevant Facts: Freya is a mechanic who has been employed by Jim She had been injured in the course of employment while hammering a bolt, which was rusty beneath the vehicle. The injury had caused a permanent injury to her only eye and resulted in permanent blindness. Jim has not provided Freya while in the course of employment with basic safety material like Safety Goggles. Issue: The issue in this case is that whether Freya has claim of negligence against her employer Jim or not. Relevant laws As dissuaded earlier in the case of Donoghue v Stevenson [1932] AC 562, there are four main elements, which constitutes the tort of negligence. These elements are Duty of Care, Breach of Duty of Care, Damages, Remoteness of the Damages caused (Blom 2016). The employer has a duty of care with respect to their employee with respect to providing safe working environments along with appropriate safety materials, which are essential with respect to the job of the employees. This concept of was made wider with the provisions of the case of Anns v Merton London Borough Council[1978] A.C where the court gave a tests to determine the existence of the duty of care this test is called the two stage test or the Anns test. The test indentifies that whether there was a duty of care between the plaintiff and the defendant and why such duty between them is deemed to exist (Iacobucci and Trebilcock 2016). The four elements are widely explained by the following cases. Caparo Industries pIc v Dickman[1990] 2 AC 605 House of Lords provided the Capro test to determin the duty of care with respect to physical injuries (Deakin, Johnston and Markesinis 2012) Vaughan v Menlove(1837) 3 Bing. N.C. 467 provided with the objective test to determine the breach of duty of care (Goudkamp and Ihuoma, 2016). Barnett v Chelsea Kensington Hospital[1969] 1 QB 428 provides the but for test for the purpose of determining the damages caused as a result of breach in duty of care (Eades 2015). The Wagon Mound no 1[1961] AC 388House of Lords provided the test of remoteness to determine the foresee ability of the defendant towards the injury (Barker et al 2015). Application: Duty of care: If the capro test is applied in the given circumstances, it can be concluded that Jim as the employer has a duty of care to provide Safety equipments to his employee Freya for the purpose of her job. Breach of duty of care: If the objective test is applied in, the given circumstances it is can be concluded that Jim had infringed the duty of Care he owed to Freya by not providing her the safety equipments with respect to her job. Damages: it can be determined by Appling the but for test in this case that Freya had suffered permanent damages to her eyes resulting in blindness because of the failure of the employer to provide her with appropriate safety materials for safely doing her job. Foresee ability: If the test of remoteness is applied, in this case any reasonable man could conclude that the damages faced by Freya are a direct result of the breach of duty of care by Jim. Conclusion: Freya is entitled to successfully claim negligence against Jim as gym as breach his duty of cares which has resulted in damages with respect to her eyes. References: Barker, K., Grantham, R. and Swain, W. eds., 2015.Law of Misstatements: 50 Years on from Hedley Byrne v Heller. Bloomsbury Publishing. Blom, J., 2016. Do We Really Need the Anns Test for Duty of Care in Negligence?.Alberta L. Rev.,53, pp.895-1031. Deakin, S.F., Johnston, A. and Markesinis, B.S., 2012.Markesinis and Deakin's tort law. Oxford University Press. Eades, R.W., 2015.Torts Involving Personal Property(Vol. 1). Jury Instructions on Damages in Tort Actions. Geach, N., 2015.Law Express Question and Answer: Tort Law (QA revision guide). Pearson Higher Ed. Goudkamp, J. and Ihuoma, M., 2016. A Tour of the Tort of Negligence. Goudkamp, J., 2016. Reforming English Tort Law: Lessons from Australia.Damages and Compensation Culture: Comparative Essays, Forthcoming. Graham, J.C., 2015. Proof of Negligence.Florida Torts,1. Iacobucci, E.M. and Trebilcock, M.J., 2016. An economic analysis of waiver of tort in negligence actions.University of Toronto Law Journal,66(2), pp.173-196. Keating, G., 2014. Tort Liability as Compensation.Jotwell: J. Things We Like, p.208. Keating, G., 2015. Is Negligence Law Less Objective than We Think.Jotwell: J. Things We Like, p.137. Mendelson, D., 2014.The new law of torts. Oxford University Press. Michaud, H., 2013.Tort Law: Concepts and Applications. Pearson Higher Ed. Seiner, J., 2014. Title VII and Tort Law: A New Perspective.Jotwell: J. Things We Like, p.217. Sperino, S.F., 2014. Tort Label, The.Fla. L. Rev.,66, p.1051. Van Dam, C., 2013.European tort law. OUP Oxford. West, R.L., 2015. Gatsby and Tort.Available at SSRN. Zipursky, B.C., 2015. Reasonableness in and out of Negligence Law.University of Pennsylvania Law Review,163, p.2131.