0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Young Women with Unplanned Pregnancies in Bangkok, Thailand (Paperback): Zhen Jiang, Yi Pan Young Women with Unplanned Pregnancies in Bangkok, Thailand (Paperback)
Zhen Jiang, Yi Pan
R1,042 Discovery Miles 10 420 Ships in 12 - 17 working days

Objectives: This book examined the decision making process and health seeking patterns of low-income young women with unplanned pregnancies who opted for abortion, putting baby up for adoption, or keeping the baby. Methods: Research methodology in this book focused on formative research utilising qualitative data. The study was conducted covering all five shelters and low-income communities in Bangkok, Thailand. The data collection was through Focus Group Discussions, and in-depth interview. Forty-five cases were purposively recruited into the study. The data were analysed using content analysis. Results: From the qualitative research, the results indicated that the majority of the young women tended to select abortion as their first choice, while a few cases continued their pregnancies to term without any attempt to terminate the pregnancy. These women tended to delay seeking assistance once they found out their pregnancy situation. Majority of the low-income young women were more likely to resort self-medication as their first alternative, which was sometimes hazardous to their health. Decision on self-medication or abortions with unskilled personnel sometimes resulted in serious and life-threatening complications. Many pregnancy-termination situations resulted from self-medication. While most of these women made the important decision themselves, they still sought advice, guidance, and support from their partners, peers and parents. When the first attempt failed, they would seek a second or third attempt until they felt it was not possible to achieve what they had planned. Most women with unplanned pregnancies knew that they had options regarding termination of their pregnancies but their main concern was confidentiality. Consequently, the women who wanted to terminate their pregnancies adopted three patterns of action, i.e., 1) visiting drugstores / grocery stores, 2) visiting private clinics or hospitals, and 3) using physical pressure or vigorous actions. Most of the women realised that private clinics provided effective methods for terminating pregnancy, but due to its high cost, they would first resort self-medication or self-management. If they were not successful, they would then visit a private clinic and asked others to support the cost. Understanding the women's decisions making process and their health seeking patterns utilisation allows us to understand their decision and course of actions. The program managers, implementers, providers, partners, parents/relatives, and friends should do as much as possible to support the decision of the women in order to provide better information and services to reduce the impact, both physical and mental, of their selected choice.

From Problem to Solution - Wireless Sensor Networks Security (Hardcover): Zhen Jiang, Yi Pan From Problem to Solution - Wireless Sensor Networks Security (Hardcover)
Zhen Jiang, Yi Pan
R3,036 R1,992 Discovery Miles 19 920 Save R1,044 (34%) Ships in 12 - 17 working days

Reserving data authenticity in a hostile environment, where the sensor nodes may be compromised, is a critical security issue for wireless sensor networks. In such networks, once a real event is detected, nearby sensors generate data reports which are subsequently forwarded to the data collection point. However, the subverted sensors, which have access to the stored secret keys, can launch attacks to compromise data authenticity. They can act as sources for forged reports and inject an unlimited number of bogus reports that fabricate false events "happening" at arbitrary locations in the field. Such false reports may exhaust network energy and bandwidth resources, trigger false alarms and undesired reactions. The authors explain such attacks and that which can be roughly categorised as isolated attacks by each individual compromised node or colluding attacks by a group of collaborating impostors.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Tears Of Hercules
Rod Stewart CD R58 Discovery Miles 580
Omhels - 100 Oordenkings om te weet God…
Lysa Terkeurst Hardcover R249 R210 Discovery Miles 2 100
Everlotus CD DVD wallet, 72 discs
 (1)
R129 R99 Discovery Miles 990
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Sony PlayStation 5 DualSense Wireless…
R1,799 R1,679 Discovery Miles 16 790
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter Paperback R160 R125 Discovery Miles 1 250
Carbon City Zero - A Collaborative Board…
Rami Niemi Game R641 Discovery Miles 6 410
Bestway Heavy Duty Repair Patch
R30 R24 Discovery Miles 240
Nintendo Labo Customisation Set for…
R246 R114 Discovery Miles 1 140

 

Partners