Tuesday, December 31, 2019

Increasing Cultural Competence in the Field of...

â€Å"Raise your hand on the side that you hear the sound. Now open your mouth and stick out your tongue for me. Close it and then make an ooo sound, like a ghost.† This is what a brief clip of a speech and language evaluation might sound like if someone were to be observing. But imagine that the test that was just observed was over and now the clinician must speak to the parents; however, they can only speak to one: the father, due to the strict Muslim culture that the family comes from. What should be done since typically the most important person to inform is the mom and speaking to her is not acceptable? (Cara). This is a dilemma that a Missouri State University- Communication Sciences and Disorders, Speech and Language pathology graduate student recently encountered. One in which she was unprepared for because while Missouri State Communication Sciences and Disorders professors, teach students how to be aware of different cultures, they don’t necessarily teach stud ents how to handle them as they come. This lack of cultural competency poses a problem and in turn hinders a speech-language pathologist’s ability to provide equal, appropriate and accessible services for groups affected by speech and language impediments. Therefore, speech-language pathologists must increase their cultural competence in different cultures and be better prepared to provide services for patients who may not be primarily English speakers or hail from a different cultural background that is not asShow MoreRelatedSpeech : Increasing Communicative Competence3821 Words   |  16 PagesRunning head: INCREASING COMMUNICATIVE COMPETENCE 6 Running head: INCREASING COMMUNICATIVE COMPETENCE The Use of Emoticons to Increase Communicative Competence in Non-Fluent Aphasics. Amberlynn Fenner Loyola University Maryland The Use of Emoticons to Increase Communicative Competence for People with Aphasia. Language is an essential component of life that drives human interaction and facilitates social connections (Brown, Davidson, Worrall Read MoreAdvancing Effective Communicationcommunication, Cultural Competence, and Patient- and Family-Centered Care Quality Safety Equity53293 Words   |  214 PagesAdvancing Effective Communication, Cultural Competence, and Patient- and Family-Centered Care A Roadmap for Hospitals Quality Safety Equity A Roadmap for Hospitals Project Staff Amy Wilson-Stronks, M.P.P., Project Director, Health Disparities, Division of Quality Measurement and Research, The Joint Commission. Paul Schyve, M.D., Senior Vice President, The Joint Commission Christina L. Cordero, Ph.D., M.P.H., Associate Project Director, Division of Standards and Survey Methods, The JointRead MoreMulti-Skilling â€Å"Jack of All Trades Master of None?†3052 Words   |  13 Pagesthe medical field when this model is used and how the healthcare industry can implement this process to help it with downsizing and reorganization issues. My research found few studies that explicitly or specifically considered the affects of multi-skilling on the healthcare industry and its affects on patient care. Consequently, general management literature was reviewed with the aim of identifying the model used; generic issues and lessons learned that can be applied across the field of resourceRead MoreThesis About Call Center Agents14127 Words   |  57 Pagesunemployed graduates of nursing almost exclusively resort working for these companies. Armed with your English language literacy, this work will not need so much of your math skills nor theoretically inclined whatsoever which are related to your degree. If you have been very comfortable using the language then you should be fine with it. Nurses who have been very dedicated to their fields is left with no choice but to work for companies that give them a good offer. Nurses too are very capable of workingRead MoreDeveloping Management Skills404131 Words   |  1617 PagesAttempts Observer’s Feedback Form 321 321 6 MOTIVATING OTHERS 323 SKILL ASSESSMENT 324 Diagnostic Surveys for Motivating Others 324 Diagnosing Poor Performance and Enhancing Motivation Work Performance Assessment 325 SKILL LEARNING 326 Increasing Motivation and Performance 326 Diagnosing Work Performance Problems 326 Enhancing Individuals’ Abilities 328 Fostering a Motivating Work Environment 330 Elements of an Effective Motivation Program 331 Establish Clear Performance Expectations 332Read MoreMedical Tourism22177 Words   |  89 Pagessubstantial research on other health related markets such as wellness tourism has been completed (Eg. Goodrich and Goodrich, 1987, p217), little academic research has been done on this particular niche market beyond the exploratory stage. There is an increasing availability of literature in the mainstream media i.e. print, electronic media and the Internet, illustrating the growth for this form of tourism. However, the lack of academia interest in medical tourism both necessitates and validates this studyRe ad MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesManagement Roles 6 †¢ Management Skills 8 †¢ Effective versus Successful Managerial Activities 8 †¢ A Review of the Manager’s Job 9 Enter Organizational Behavior 10 Complementing Intuition with Systematic Study 11 Disciplines That Contribute to the OB Field 13 Psychology 14 †¢ Social Psychology 14 †¢ Sociology 14 †¢ Anthropology 14 There Are Few Absolutes in OB 14 Challenges and Opportunities for OB 15 Responding to Economic Pressures 15 †¢ Responding to Globalization 16 †¢ Managing Workforce Diversity 18Read MoreProject Mgmt296381 Words   |  1186 Pagesto understand the role of a project in their organizations and to master the project management tools, techniques, and interpersonal skills necessary to orchestrate projects from start to finish. The role of projects in organizations is recei ving increasing attention. Projects are the major tool for implementing and achieving the strategic goals of the organization. In the face of intense, worldwide competition, many organizations have reorganized around a philosophy of innovation, renewal, and organizational

Monday, December 23, 2019

Evaluating the View that Poverty is Caused by Economic...

Evaluating the View that Poverty is Caused by Economic Inequality Rather than Cultural Attitudes and Lifestyles There is much debate in sociology that poverty is caused by structural factors such as economic inequality and those who state that it is caused by cultural factors such as attitudes, values and lifestyles. The first group say that the poor are made to be poor by the economic and political systems, they state that the poor are prevented from achieving a good standard of living by the actions of the more powerful in society and that those with the least power are poor. In contrast, the second group say that the poor cause their own poverty and that this poverty is a result of some individual†¦show more content†¦He said that poverty will only be tackled effectively by radical state policies which redistribute resources from rich to poor and by investment of state money in education. Townsend stated that state intervention it is argued can change the system of social inequality. His Weberian view sees a number of powerful groups who gain rewards at the expense of others and he argued that the state can alter this as an independent force. However, Townsend is often criticised by the Marxists as they argue that the state is an instrument of capitalists and will therefore only represent their interests. Marxists argue that poverty is caused deliberately by the economic system and that money is the motivation for work. They state that the unequal monetary rewards motivate workers to compete for higher wages and that capitalism requires highly motivated workers. One sociologist, Jack Kincaid stated that the low wage sector is an inevitable feature of capitalist society and that it benefits the employer in many ways. It creates a reserve army of labour, it divides the working class (therefore there is no united working class which could threaten to overthrow the bourgeois and it drives down benefit levels and thus increases theShow MoreRelatedCorruption and Globalisation Essay5195 Words   |  21 Pageschannel for the biggest problems in the world with 52% saying the US and globalisation. (BBC NEWS, 2004) Why is there so much attention nowadays on corruption? Did people ignore corruption in the past? Or is it because there is more corruption than in the past? Some of the main reasons could be: - As countries trade more with each other, fair trade is expected and unfair business or political practices are being paid more attention. - The media is reporting much more about corruptionRead MoreBusiness Opportunities14520 Words   |  59 PagesKirznerian entrepreneur is considered to be a discoverer of opportunities, which are found in the environment because they arise from market disequilibria. This form of entrepreneurship is considered to be non-novel and not a major contributor to national economic well-being. The sources for Schumpeterian opportunities have been so well-studied that the field has a typology for them. Schumpeterian opportunities can be found in technological changes, political/regulatory changes and socio-demographic changesRead MoreSociology Essay20437 Words   |  82 Pagesthat the question is worth two marks, so only a short explanation of approximately one to two sentences is required. Refer to pages 24–25 in Unit 1.2 as well as textbook, pages 59–60. The term ‘expressive role’ is associated with the functionalist view of the nuclear family whereby it is argued that women are more suited to a nurturing or caring role—that is, women look after the emotional needs of the family. (b) Identify and brieï ¬â€šy explain Parsons’ two functions of the nuclear family. (4 marks) Read MoreOrganisational Theory230255 Words   |  922 Pagesand provides an advanced introduction to the heterogeneous study of organizations, including chapters on phenomenology, critical theory and psychoanalysis. Like all good textbooks, the book is accessible, well researched and readers are encouraged to view chapters as a starting point for getting to grips with the field of organization theory. Dr Martin Brigham, Lancaster University, UK McAuley et al. provide a highly readable account of ideas, perspectives and practices of organization. By thoroughlyRead MoreStrategic Marketing Management337596 Words   |  1351 Pages4 4.5 4.6 4.7 4.8 4.9 4.10 Learning objectives Introduction: the changing business environment (or the new marketing reality) Analysing the environment The nature of the marketing environment The evolution of environmental analysis The political, economic, social and technological environments Coming to terms with the industry and market breakpoints Coming to terms with the very different future: the implications for marketing planning Approaches to environmental analysis and scanning Summary 5Read MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pages2011038674 10 9 8 7 6 5 4 3 2 1 ISBN 10: 0-13-283487-1 ISBN 13: 978-0-13-283487-2 Brief Contents Preface xxii 1 2 Introduction 1 What Is Organizational Behavior? 3 The Individual 2 3 4 5 6 7 8 Diversity in Organizations 39 Attitudes and Job Satisfaction 69 Emotions and Moods 97 Personality and Values 131 Perception and Individual Decision Making 165 Motivation Concepts 201 Motivation: From Concepts to Applications 239 3 The Group 9 10 11 12 13 14 15 Foundations of GroupRead MoreFundamentals of Hrm263904 Words   |  1056 Pagesyou your students need to get started www.wileyplus.com/firstday Student support from an experienced student user Ask your local representative for details! Collaborate with your colleagues, find a mentor, attend virtual and live events, and view resources www.WhereFacultyConnect.com Pre-loaded, ready-to-use assignments and presentations www.wiley.com/college/quickstart Technical Support 24/7 FAQs, online chat, and phone support www.wileyplus.com/support Your WileyPLUS Account ManagerRead MoreDeveloping Management Skills404131 Words   |  1617 PagesSelf-Awareness 57 The Enigma of Self-Awareness 58 The Sensitive Line 58 Understanding and Appreciating Individual Differences Important Areas of Self-Awareness 61 Emotional Intelligence 62 Values 65 Ethical Decision Making and Values 72 Cognitive Style 74 Attitudes Toward Change 76 Core Self-Evaluation 79 SKILL ANALYSIS 84 Cases Involving Self-Awareness 84 Communist Prison Camp 84 Computerized Exam 85 Decision Dilemmas 86 SKILL PRACTICE 89 Exercises for Improving Self-Awareness Through Self-Disclosure 89 ThroughRead MoreLeadership for Health and Social Care and Children65584 Words   |  263 Pages228 231 233 Support individuals with multiple conditions and/or disabilities (SS 5.6) 236 Support children s speech, language and communication (EYMP5) 239 Understand the needs of children and young people who are vulnerable and experiencing poverty and disadvantage (CYPOP 17) 243 Providing Independent Mental Capacity Advocacy (ADV 305) 246 Independent Mental Health Advocacy (ADV 306) 253 Providing Independent Advocacy Management (ADV 307) 259 Providing Independent Advocacy to adults (ADV 308)266

Sunday, December 15, 2019

Suicide and Adolescent Psychology Free Essays

Adolescent Psychology is a difficult specialty within the field. Many of the normal phases of adolescent development look like pathologies, and perhaps would be classified as such if the patients were adults. Thus, it is difficult, even for a trained professional, to tell the difference between a true pathology, and a â€Å"normal† mood or personality pattern associated with adolescent development. We will write a custom essay sample on Suicide and Adolescent Psychology or any similar topic only for you Order Now An area where this deficiency can lead to grave circumstances is the realm of adolescent depression and suicide. Although true suicidal tendencies can be difficult to spot in adolescent behavior, timely identification and proper treatment are important goals of Adolescent psychologists. Although causal theories differ, the treatment of teen suicide attempts and depression is fairly consistent across adolescent theorists. Typical symptomology of suicidal tendencies in adults has several features. (Symptoms†¦2007) The underlying psychological cause of such ideations is usually depression. (Symptoms†¦2007) Symptoms of depression include sleeping pattern disruptions, feelings of low self-worth, loss of interest in pleasurable activities and lack of energy. (Symptoms†¦2007) One of the key indicators that a depressed adult is contemplating suicide is self-report. (Symptoms†¦2007) Often, adults are not treated for suicidal depression until after they had made an attempt on their own life. (Symptoms†¦2007)   Treatment for long-term depression in adults typically consists of medication and extensive therapy. (Symptoms†¦2007) They type and length of therapy is contingent on many factors. (Symptoms†¦2007) These include the specialty of the therapist, the diagnosed underlying condition, and the severity of the depressive state. Similarly, the medical regime for adults with suicidal depression varies as a function of the underlying psychological cause for the depression. (Symptoms†¦2007) Typical depressive mood disorders are treated with anti-depressants, while personality or perception disorders, which can lead to a secondary depressive condition, are better treated with medication targeted to the underlying disorder. (Symptoms†¦2007) As complicated as the diagnosis and treatment of suicidal depression is in adults, it is even more so in the adolescent population. (Teen Suicide†¦2005)   Suicide is the third-most common cause of death among individuals between the ages of fifteen and twenty-four. (Teen Suicide†¦2005)   There are large gender differences in accounting for teen suicide, but they are explained more by the methods used, than any particular predilection toward the act. (Teen Suicide†¦2005)   83% of adolescent suicides are males, whereas females make more attempts at suicide. (Teen Suicide†¦2005)   The discrepancy can be explained by the fact that males are far more likely to use a gun in their attempts, while the method of choice for females is pills. (Teen Suicide†¦2005)   Of the two, the chances for success are much higher among those who use a gun. (Teen Suicide†¦2005)   According to the National institute of Mental health, successful suicides among adolescents number about 8 in 100,000. (Teen Suicide†¦2005)     Attempts at suicide are estimated to be much higher. (Teen Suicide†¦2005) The National Youth Violence Prevention Resource center found that about one in five teens think about suicide, one in six have actually planned for it, and one in twelve had attempted suicide in the past year(Teen Suicide†¦2005)   . As is the case with adults, most (about 90%) of adolescent suicide victims have an underlying mental disorder. (Teen Suicide†¦2005) One moder theory of suicide in adolescence is espoused by Dr. David Elkind. He posits that there is a gap between physical and psychological development, which causes stress in the adolescent. (Elkind, 1998) Dr. Elkind theorizes that teenagers, who are often treated as adults at home and in schools, are not as complete in their psychological development as they are in their physical development. (Elkind, 1998) This results, opines Dr. Elkind in a stressful dissonance that can lead to suicidal ideation. (Elkind, 1998)   Additionally, exposing an adolescent to adult-type stressors, such as deadlines, appointments and specific goal-driven activities can cause stress. (Elkind, 1998)   This stress can lead to depression and suicide. (Elkind, 1998) On the other side of the coin, Dr. Elkind believes that over scheduling a young child may leave him or her bored when the structure surrounding the child disappears in their teen years. (Elkind, 1998) This subsequent lack of direction can also lead to depression. (Elkind, 1998) This theory suggests a preventative viewpoint on teen suicide. (Elkind, 1998)   Once an adolescent articulates a desire for suicide, or makes the attempt, Dr. Elkind recommends the standard psychological treatment, and medication, if warranted. (Elkind, 1998) A more environmental viewpoint is espoused by Dr. Bronfenbrenner. (Paquette Ryan, n.d.)   He views human development as an interaction between individuals and a system of bioecological systems. (Paquette Ryan, n.d.) He views any psychopathology, including teen depression or suicide as a dysfunction whose development is engendered by deficiencies in the mesosystem (immediate social surroundings) of the individual. (Paquette Ryan, n.d.) This approach to development does not lend itself particularly well to the treatment phase of suicide in adolescents, rather, it offers a socially-constructed theory for the phenomenon. (Paquette Ryan, n.d.) Preventative â€Å"treatment† in this paradigm would consist of fostering a healthy, positive mesosystem around the individual, so that they might develop in a psychologically healthy manner. Again, one is forced to conclude that an already-depressed or suicidal teen would be best served by therapy and possible pharmaceutical remedies. (Paquette Ryan, n.d.) A more cognitive approach to adolescent behavior is espoused by Dr. Robert Selman. (Selman’s†¦2002) His theories, which are derived from those of Piaget, rely on modeling and other cognitive methods to explain behavior. (Selman’s†¦2002) As such, he would explain the phenomenon of adolescent suicide as a response to a social context where such behavior is observed to have a positive outcome. (Selman’s†¦2002) Rarely would the cues be direct, but cultural stimuli such as music, television, and movies could inadvertently (or blatantly) glamorize the practice of suicide, and compel an adolescent, especially one who already suffers from depression or some other psychological ailment to attempt suicide. (Selman’s†¦2002)   Of these theories, the one whose suggested treatment appears to be most effective is Selman’s. Cognitive therapy has been found to decrease repeated suicide attempts by 50%. (Asher, 2005) While this particular study focused on adults, there is little reason to think that the results would be demonstrably different with adolescents. (Asher, 2005) Interestingly, the same cannot be said of pharmaceutical treatment options. (DeNoon, 2002) It has been shown that teens who take antidepressants actually have an increased rate of suicide than those who do not. (DeNoon, 2002) Recent evidence suggests, however, that the same studies prove that the conclusion drawn from the data was erroneous, as the scientists failed to control for other variables such as severity of the depression, and other factors. (DeNoon, 2002)   Despite these conflicting findings, or perhaps because of them, a therapist should be cautious about â€Å"throwing drugs at the problem† and dismissing a patient with a prescription. (DeNoon, 2002)   In addition to the pitfalls of possible adverse effects of the drugs themselves, this kind of treatment is far more vulnerable to negative outcomes hinged on misdiagnosis. (DeNoon, 2002)   If a closely monitored patient is found to have another type of disorder, to which depression is merely a secondary characteristic, that therapist can make the appropriate pharmacological and therapeutic revisions. (DeNoon, 2002)   If, on the other hand, an underlying condition is missed, and the patient dismissed with antidepressants, the results could be tragic. (DeNoon, 2002) Owing to the nature of serotonin-stimulating drugs, which most antidepressants are, an effect of a non-depressed person taking this medication is the onset of severe depression. (DeNoon, 2002)   This would result in the therapist causing the very symptoms he or she is attempting to relieve. (DeNoon, 2002) The main commonality of all of these perspectives is the need to monitor closely the disposition of the patient. The only way to differentiate true depression from a phasic anomaly of normal adolescent development is to observe the behavior and responses over a long period of time. For example, behavior that might be characterized as bipolar, buts of high energy and enthusiasm contrasted with lethargy and depression may be the normal reaction to hormone development in an adolescent. Without context, it is almost impossible to tell the difference Thus, the best preventative measure would be to treat any suicidal ideation as a serious symptom and have a therapist interact for a long period with the adolescent. References Asher, J. (2005). â€Å"Cognitive Therapy Reduces Repeat Suicide Attempts by 50 Percent.† Retrieved October 28th, 2008 from The National Institutes of Health (NIH) website: http://www.nih.gov/news/pr/aug2005/nimh-02a.htm   DeNoon, D. (2002) â€Å"Teen Suicide, Antidepressant Link Questioned.† Retrieved October 28th, 2008 from WebMD website: http://www.webmd.com/depression/news/20041215/teen-suicide-antidepressant-link-questioned Elkind, D. (1998) All Grown Up and No Place To Go. Peresus Publishing, Cambridge, MA. Pp. 1-290. Paquette, D. Ryan, J. (n.d.) â€Å"Bronfenbrenner’s Ecological Systems Theory.† Retrieved October 28th, 2008 from National-Louis University website: http://pt3.nl.edu/paquetteryanwebquest.pdf â€Å"Selman’s Five Stages of Perspective Taking,† (2002) Retrieved October 28th, 2008 from Everything-2 website: http://www.everything2.com/index.pl?node_id=1275038 â€Å"Symptoms of Depression†. (2007) retrieved October 28th, 2008 from Psychology 24Ãâ€"7 website: http://www.psychiatry24x7.com/bgdisplay.jhtml?itemname=depression_symptoms â€Å"Teen Suicide Statistics.† (2005) retrieved October 28th, 2008 from Teen Depression website: http://www.teendepression.org/articles1.html How to cite Suicide and Adolescent Psychology, Papers

Saturday, December 7, 2019

Wireless Technologies Stationary Wireless Applications

Questions: 1.Compare and contrast three data encryption standards for WiMAX networks?2.Research the security challenges for any two examples of WPAN technologies. Answers: 1. WiMAX is a developing wireless technology based on IEEE 802.16 standard (Alzaabi1, Ranjeeth Alukaidey Salman 2013). WiMAX has been designed to work with mobile, immobile or stationary wireless applications (TechTarget, 2010).Security is particularly critical in wireless networks such as WiMAX (Alzaabi1 et al., 2013). Security mechanisms in WiMAX are defined in IEEE 802.16e (Alzaabi1 et al., 2013).One of the mechanism used to secure data in WiMAX is data encryption. Data encryption is the process of converting a message into a scrambled structure for security purposes (Forouzan, 2013).AES, 3DES and RSA are some of the data encryption mechanism used in WiMAX networks. Advanced Encryption Standard (AES) is a new encryption standard commended by National Institute of Standards and Technology (NIST) in 2001. AES procedures works with 128 bits and can use keys with lengths of either 128, 192, or 256 bits. For 128 bits the process takes 10 rounds, for 192 bits it takes 12 rounds and 256 bits takes 14 rounds to decrypt a message (Youssouf, Othman, Siraj Nkiama, 2016). 3DES stands for Triple Data Encryption Standard. It was designed to look into weaknesses in Data Encryption Standard (DES).DES uses a 56-bit key and is not adequate enough in offering enough security.3DES lengthens the key size of DES by implementing thrice(56*3) making it longer and more secure. The RSA encryption standard is named after Ron Rivest, Adi Shamir, and Leonard Adleman the people behind its development in 1978(Rani1, Anil Chawla, 2011a).RSA standard is based on a public-key cryptography and is fit for authentication and encryption. RSA adopts three steps including generating keys, encryption and decryption (Rani1, Anil Chawla, 2011b). Some similarities in AES, 3DES and RSA include Keys are based on mathematical characteristics After a period of time, key strength decrease Faster computation time, if the algorithm has many Table 1 below compares encryption mechanism used in WiMAX in terms of their key length, cipher type, block size, encryption speed and level of security. FACTORS AES 3DES RSA Key length 128bits 168 bits(n1,n2,and n3) 112 bits(n1 and n2) Dependant on the number of bits Cipher Type Symmetric code Symmetric code Asymmetric code Block size (bits) 128bits 64bits variable Encryption Speed fast Very slow slowest Level of Security Excellent security Adequate security Least secure Table 1: Comparison of AES, 3DES and RSA (Gurpreet Supriya 2013) 2. WPAN stands for Wireless Personal Area Network. WPAN is designed to cover short-distances and supports mobile computing devices including mobile phones, Personal Digital Assistants (PDAs),barcode readers, sensors, printers, desktop computers and handheld computers.( Mallick, 2008).Some examples of WPAN technologies include: Blue Tooth Bluetooth is a technology designed to connect both mobile and immobile electronic devices. It covers between thirty feet or ten meters. Devices including cell phones, PDAs, desktop computers and other portable devices can connect together without cable (Niem, 2002a). Figure 1 below shows a simple illustration of Bluetooth WPAN technology. Figure 1: Blue tooth WPAN (Niem, 2002b) Some security challenges in blue tooth technology include: Blue bugging is a process whereby intruders remotely gain unauthorized access to cell phones and manipulate its features without the owner realizing whats happening. This usually results in depletion of phone resources and make phone bills expensive for the user (Jennings, 2016a). Denial of Service (DoS) attacks - A DoS is an attack that holds system resources and blocks optimal user access. Attackers can intrude devices connected with Bluetooth and drain their system resources (Jennings, 2016b). ZigBee ZigBee is a developing standard for devices that use low-power (Dini Tiloca, n.d.). It allows control of remote devices and sensor applications especially in isolated locations (Radio Electronics, n.d.). Applications implementing this technology comprise of electrical meter systems, wireless switches, some traffic systems, and other wireless components (Wikipedia, 2016). ZigBee security challenges Difficult to achieve procedures including encryption, key management, and key exchange since they use a lot of power. System vulnerabilities due to low power consumption It is possible to access if no proper protection measures Firmware can be accessed and analyze and manipulated including cryptographic keys, digital certificates and application particulars making the standard a vulnerability References Alzaabi1, M., Ranjeeth, R, D., Alukaidey, T Salman,K. (2013). Security algorithms for WiMAX. International Journal of Network Security Its Applications (IJNSA), Vol.5, No.3, May 2013 Bhanot, R Hans, R. (2015). A Review and Comparative Analysis of Various Encryption Algorithms. International Journal of Security and Its Applications Vol. 9, No. 4 (2015), pp. 289-306 https://dx.doi.org/10.14257/ijsia.2015.9.4.27 Dini,G. Tiloca,M.(n.d). Considerations on Security in ZigBee Networks Forouzan, B, A. (2013) Data Communications and Networking, 5th Edition, McGraw-HilI Jennings, R. (2016), A Review of Bluetooth Attacks. Retrieved from https://www.webroot.com Mallick, M. (2008). Mobile and Wireless Design Essentials. Retrieved from www. https://etutorials.org/ Niem, T. (2002). Bluetooth And Its Inherent Security Issues. Retrieved from www. https://www.sans.org Radio Electronics. (n.d).Retrieved from https://www.radio-electronics.com/info/wireless/zigbee/zigbee.php Rani1,M., Anil, R Chawla, R(2011).Review of public key cryptography on WiMAX using RSA algorithm. E-ISSN0976-7916. JERS/Vol. II/ Issue IV/October-December, 2011/219-222 Singh, G Supriya.(2013). A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications (0975 8887) Volume 67 No.19, April 2013 Stalling,W.(n.d).Cryptography and Network Security chapter-9. Retrieved from https://en.wikipedia.org/wiki/RSA Tech Target (2010).WiMAX (Worldwide Interoperability for Microwave Access). Retrieved from https://searchtelecom.techtarget.com/ Wikipedia. (2016).Retrieved from https://en.wikipedia.org/wiki/ZigBee Youssouf, M., Othman, S., Siraj, M Nkiama, H (2016). Comparative Study of AES, Blowfish, CAST-128 and DES Encryption Algorithm. IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 06, Issue 06 (June. 2016), ||V1|| PP 01-07