Monday, January 27, 2020

Data Anonymization in Cloud Computing

Data Anonymization in Cloud Computing Data Anonymization Approach For Privacy  Preserving In Cloud Saranya M Abstract—Private data such as electronic health records  and banking transactions must be shared within the cloud  environment to analysis or mine data for research purposes. Data privacy is one of the most concerned issues in big data  applications, because processing large-scale sensitive data sets  often requires computation power provided by public cloud  services. A technique called Data Anonymization, the privacy  of an individual can be preserved while aggregate information  is shared for mining purposes. Data Anonymization is a  concept of hiding sensitive data items of the data owner. A  bottom-up generalization for transforming more specific data  to less specific but semantically consistent data for privacy  protection. The idea is to explore the data generalization from  data mining to hide detailed data, rather than discovering the  patterns. When the data is masked, data mining techniques  can be applied without modification. Keywords—Data Anonymization; Cloud; Bottom Up Generalization; Mapreduce; Privacy Preservation. I. INTRODUCTION Cloud Computing refers to configuring, manipulating,  and accessing the applications through online. It provides  online data storage, infrastructure and application.which is  a disruptive trend which poses a significant impact on  current IT industry and research communities [1]. Cloud  computing provides massive storage capacity computation  power and by utilizing a large number of commodity  computers together. It enable users to deploy applications  with low cost, without high investment in infrastructure. Due to privacy and security problem, numerous potential  customers are still hesitant to take advantage of cloud  [7].However, Cloud computing reduce costs through  optimization and increased operating and economic  efficiencies and enhance collaboration, agility, and scale, by  enabling a global computing model over the Internet  infrastructure. However, without proper security and  privacy solutions for clouds, this potentially cloud  computing paradigm could become a huge failure. Cloud delivery models are classified into three. They are  software as a service (saas), platform as a service (paas)  and infrastructure as a service (iaas). Saas is very similar to  the old thin-client model of software provision, clients  where usually web browsers, provides the point of access  to running software on servers.Paas provides a platform on  which software can be developed and deployed. Iaas is  comprised of highly automated and scalable computer  resources, complemented by cloud storage and network  capability which can be metered ,self-provisioned and  available on-demand[7]. Cloud is deployed using some models which include  public, private and hybrid clouds. A public cloud is one in  which the services and infrastructure are provided off-site  over the Internet. A private cloud is one in which the  services and infrastructure are maintained on a private  network. Those clouds offer a great level of security. A  hybrid cloud includes a variety of public and private  options with multiple providers. Big data environments require clusters of servers to  support the tools that process the large volumes of data,  with high velocity and with varied formats of big data. Clouds are deployed on pools of server, networking  resources , storage and can scale up or down as needed for  convenience. Cloud computing provides a cost-effective way for  supporting big data techniques and advanced applications  that drives business value. Big data analytics is a set of  advanced technologies designed to work with large  volumes of data. It uses different quantitative methods like  computational mathematics, machine learning, robotics,  neural networks and artificial intelligence to explore the  data in cloud. In cloud infrastructure to analyze big data makes sense  because Investments in big data analysis can be significant  and drive a need for efficient and cost-effective  infrastructure, Big data combines internal and external  sources as well as Data services that are needed to extract  value from big data[17]. To address the scalability problem for large scale data set  used a widely adopted parallel data processing framework  like Map Reduce. In first phase, the original datasets are  partitioned into group of smaller datasets. Now those  datasets are anonymized in parallel producing intermediate  results. In second phase, the obtained intermediate results  are integrated into one and further anonymized to achieve  consistent k-anonymous dataset. Mapreduce is a model for programming and Implementing  for processing and generating large data items. A map  function that processes a key-value pair,This generates a  set of intermediate key-value pair. A reduce function which  merges all intermediate data values associated with those  intermediate key. II. RELATED WORK Ke Wang, Philip S. Yu , Sourav Chakraborty adapts an  bottom-up generalization approach which works iteratively  to generalize the data. These generalized data is useful for  classification.But it is difficult to link to other sources. A  hierarchical structure of generalizations specifies the  generalization space.Identifying the best generalization is  the key to climb up the hierarchy at each iteration[2]. Benjamin c. M. Fung, ke wang discuss that privacy preserving  technology is used to solve some problems  only,But it is important to identify the nontechnical  difficulties and overcome faced by decision makers when  deploying a privacy-preserving technology. Their  concerns include the degradation of data quality, increased  costs , increased complexity and loss of valuable  information. They think that cross-disciplinary research is  the key to remove these problems and urge scientists in the  privacy protection field to conduct cross-disciplinary  research with social scientists in sociology, psychology,  and public policy studies[3]. Jiuyong Li,Jixue Liu , Muzammil Baig , Raymond Chi-Wing Wong proposed two classification-aware data  anonymization methods .It combines local value  suppression and global attribute generalization. The  attribute generalization is found by the data distribution,  instead of privacy requirement. Generalization levels are  optimized by normalizing mutual information for  preserving classification capability[17]. Xiaokui Xiao Yufei Tao present a technique,called  anatomy, for publishing sensitive datasets. Anatomy is the  process of releasing all the quasi-identifier and sensitive  data items directly in two separate tables. This approach  protect the privacy and capture large amount of correlation  in microdata by Combining with a grouping mechanism. A linear-time algorithm for computing anatomized tables  that obey the l-diversity privacy requirement is developed  which minimizes the error of reconstructing microdata  [13]. III. PROBLEM ANALYSIS The centralized Top Down Specialization (TDS)  approaches exploits the data structure to improve  scalability and efficiency by indexing anonymous data  records. But overheads may be incurred by maintaining  linkage structure and updating the statistic information  when date sets become large.So,centralized approaches  probably suffer from problem of low efficiency and  scalability while handling large-scale data sets. A  distributed TDS approach is proposed to address the  anonymization problem in distributed system.It  concentrates on privacy protection rather than scalability  issues.This approach employs information gain only, but  not its privacy loss. [1] Indexing data structures speeds up the process of  anonymization of data and generalizing it, because  indexing data structure avoids frequently scanning the  whole data[15]. These approaches fails to work in parallel  or distributed environments such as cloud systems since  the indexing structures are centralized. Centralized  approaches are difficult in handling large-scale data sets  well on cloud using just one single VM even if the VM has  the highest computation and storage capability. Fung et.al proposed TDS approach which produces an  anonymize data set with exploration problem on data. A  data structure taxonomy indexed partition [TIPS] is  exploited which improves efficiency of TDS, it fails to  handle large data set. But this approach is centralized  leasing to in adequacy of large data set. Raj H, Nathuji R, Singh A, England P proposes cache  hierarchy aware core assignment and page coloring based  cache partitioning to provide resource isolation and better  resource management by which it guarantees security of  data during processing.But Page coloring approach  enforces the performance degradation in case VM’s  working set doesn’t fit in cache partition[14]. Ke Wang , Philip S. Yu considers the following  problem. Data holder needs to release a version of data that  are used for building classification models. But the problem  is privacy protection and wants to protect against an  external source for sensitive information. So by adapting the iterative bottom-up generalization  approach to generalize the data from data mining. IV. METHODOLOGY Suppression: In this method, certain values of the  attributes are replaced by an asterisk *. All or some values  of a column may be replaced by * Generalization: In this method, individual values of  attributes are replaced by with a broader category. For  example, the value 19 of the attribute Age may be  replaced by ≠¤ 20, the value 23 by 20 A. Bottom-Up Generalization Bottom-Up Generalization is one of the efficient kanonymization  methods. K-Anonymity where the  attributes are suppressed or generalized until each row is  identical with at least k-1 other rows. Now database is said  to be k-anonymous. Bottom-Up Generalization (BUG)  approach of anonymization is the process of starting from  the lowest anonymization level which is iteratively  performed. We leverage privacy trade-off as the search  metric. Bottom-Up Generalization and MR Bottom up  Generalization (MRBUG) Driver are used. The following  steps of the Advanced BUG are ,they are data partition, run  MRBUG Driver on data set, combines all anonymization  levels of the partitioned data items and then apply  generalization to original data set without violating the kanonymity. Fig.1 System architecture of bottom up approach   Here a Advanced Bottom-Up Generalization approach  which improves the scalability and performance of BUG. Two levels of parallelization which is done by  mapreduce(MR) on cloud environment. Mapreduce on  cloud has two levels of parallelization.First is job level  parallelization which means multiple MR jobs can be  executed simultaneously that makes full use of cloud  infrastructure.Second one is task level parallelization  which means that multiple mapper or reducer tasks in a  MR job are executed simultaneously on data partitions. The  following steps are performed in our approach, First the  datasets are split up into smaller datasets by using several  job level mapreduce, and then the partitioned data sets are  anonymized Bottom up Generalization Driver. Then the  obtained intermediate anonymization levels are Integrated  into one. Ensure that all integrated intermediate level never  violates K-anonmity property. Obtaining then the merged  intermediate anonymized dataset Then the driver is  executed on original data set, and produce the resultant  an onymization level. The Algorithm for Advanced Bottom  Up Generalization[15] is given below, The above algorithm describes bottom-up generalization. In  ith iteration, generalize R by the best generalization Gbest . B. Mapreduce The Map framework which is classified into map and  reduce functions.Map is a function which parcels out task  to other different nodes in distributed cluster. Reduce is a  function that collates the task and resolves results into  single value. Fig.2 MapReduce Framework The MR framework is fault-tolerant since each node in  cluster had to report back with status updates and  completed work periodically.For example if a node  remains static for longer interval than the expected,then a  master node notes it and re-assigns that task to other  nodes.A single MR job is inadequate to accomplish task. So, a group of MR jobs are orchestrated in one MR driver  to achieve the task. MR framework consists of MR Driver  and two types of jobs.One is IGPL Initialization and other  is IGPL Update. The MR driver arranges the execution of  jobs. Hadoop which provides the mechanism to set global  variables for the Mappers and the Reducers. The best  Specialization which is passed into Map function of IGPL  Update job.In Bottom-Up Approach, the data is initialized  first to its current state.Then the generalizations process are  carried out k -anonymity is not violated. That is, we have to  climb the Taxonomy Tree of the attribute till required Anonymity is achieved. 1: while R that does not satisfy anonymity requirement do 2: for all generalizations G do 3: compute the IP(G); 4: end for; 5: find best generalization Gbest; 6: generalize R through Gbest; 7: end while; 8: output R; V. Experiment Evaluation To explore the data generalization from data mining in  order to hide the detailed information, rather to discover  the patterns and trends. Once the data has been masked, all  the standard data mining techniques can be applied without  modifying it. Here data mining technique not only discover  useful patterns, but also masks the private information   Fig.3 Change of execution time of TDS and BUG   Fig 3 shows the results of change in execution time of  TDS and BUG algorithm. We compared the execution time  of TDS and BUG for the size of EHR ranging from 50 to  500 MB, keeping p=1. Presenting the bottom-up  generalization for transforming the specific data to less  specific. Thus focusing on key issues to achieve quality  and scalability. The quality is addressed by trade-off  information and privacy and an bottom-up generalization  approach.The scalability is addressed by a novel data  structure to focus generalizations.To evaluate efficiency  and effectiveness of BUG approach, thus we compare  BUG with TDS.Experiments are performed in cloud  environment.These approaches are implemented in Java  language and standard Hadoop MapReduce API. VI. CONCLUSION Here we studied scalability problem for anonymizing the  data on cloud for big data applications by using Bottom Up  Generalization and proposes a scalable Bottom Up  Generalization. The BUG approach performed as  follows,first Data partitioning ,executing of driver that  produce a intermediate result. After that, these results are  merged into one and apply a generalization approach. This  produces the anonymized data. The data anonymization is  done using MR Framework on cloud.This shows that  scalability and efficiency are improved significantly over  existing approaches. REFERENCES [1] Xuyun Zhang, Laurence T. Yang, Chang Liu, and Jinjun Chen,â€Å"A  Scalable Two-Phase Top-Down Specialization Approach for Data  Anonymization Using MapReduce on Cloud†, vol. 25, no. 2,  february 2014. [2] Ke Wang, Yu, P.S,Chakraborty, S, â€Å" Bottom-up generalization: a  data mining solution to privacy protection† [3] B.C.M. Fung, K. Wang, R. Chen and P.S. Yu, â€Å"Privacy-Preserving  Data Publishing: A Survey of Recent Developments,† ACM  Comput. Surv., vol. 42, no. 4, pp.1-53, 2010. [4] K. LeFevre, D.J. DeWitt and R. Ramakrishnan, â€Å"Workload- Aware  Anonymization Techniques for Large-Scale Datasets,† ACM Trans.  Database Syst., vol. 33, no. 3, pp. 1-47, 2008. [5] B. Fung, K. Wang, L. Wang and P.C.K. Hung, â€Å"Privacy- Preserving  Data Publishing for Cluster Analysis,† Data Knowl.Eng., Vol.68,  no.6, pp. 552-575, 2009. [6] B.C.M. Fung, K. Wang, and P.S. Yu, â€Å"Anonymizing Classification  Data for Privacy Preservation,† IEEE Trans. Knowledge and Data  Eng., vol. 19, no. 5, pp. 711-725, May 2007. [7] Hassan Takabi, James B.D. Joshi and Gail-Joon Ahn, â€Å"Security and  Privacy Challenges in Cloud Computing Environments†. [8] K. LeFevre, D.J. DeWitt, and R. Ramakrishnan, â€Å"Incognito:  Efficient Full-Domain K-Anonymity,† Proc. ACM SIGMOD Int’l  Conf. Management of Data (SIGMOD ’05), pp. 49-60, 2005. [9] T. IwuchukwuandJ.F. Naughton, â€Å"K-Anonymization as Spatial  Indexing: Toward Scalable and Incremental Anonymization,† Proc.  33rdIntlConf. VeryLarge DataBases (VLDB07), pp.746-757, 2007 [10] J. Dean and S. Ghemawat, â€Å"Mapreduce: Simplified Data Processing  on Large Clusters,† Comm. ACM, vol. 51, no. 1, pp. 107-113,2008. [11] Dean J, Ghemawat S. â€Å"Mapreduce: a flexible data processing tool,†Ã‚  Communications of the ACM 2010;53(1):72–77. DOI:  10.1145/1629175.1629198. [12] Jiuyong Li, Jixue Liu , Muzammil Baig , Raymond Chi-Wing  Wong, â€Å"Information based data anonymization for classification  utility† [13]X. Xiao and Y. Tao, â€Å"Anatomy: Simple and Effective Privacy  Preservation,† Proc. 32nd Int’l Conf. Very Large Data Bases  (VLDB’06), pp. 139-150, 2006. [14] Raj H, Nathuji R, Singh A, England P. â€Å"Resource management for  isolation enhanced cloud services,† In: Proceedings of the  2009ACM workshop on cloud computing security, Chicago, Illinois,  USA, 2009, p.77–84. [15] K.R.Pandilakshmi, G.Rashitha Banu. â€Å"An Advanced Bottom up  Generalization Approach for Big Data on Cloud† , Volume: 03, June  2014, Pages: 1054-1059.. [16] Intel â€Å"Big Data in the Cloud: Converging Technologies†. [17] Jiuyong Li, Jixue Liu Muzammil Baig, Raymond Chi-Wing Wong,  Ã¢â‚¬Å"Information based data anonymization for classification utility†.

Sunday, January 19, 2020

The Evil of the Age :: Short Stories Papers

The Evil of the Age August 26th, 1871, was a humid, busy Saturday at the Hudson River Depot in New York City. Sweat and fatigue had crept in by mid-afternoon, when a porter suddenly smelled the stench of decaying flesh. Along the wooden platform lay hundreds of trunks and bags, piled haphazardly, ready for loading onto a Chicago-bound train. During rough handling in the baggage room, the lid of an ordinary, 2'8" by 18" packing trunk had cracked open, releasing the foul stench. The porter immediately called Robert Vandeward, the baggage-master. Vandeward deliberated for a moment, then moved the trunk, bringing it out of the public eye and into a nearby, open railway building. He wrenched loose the thin rope and flimsy lock that secured the lid, popping it open. First he saw an ordinary quilt. He tossed it aside, and stared at a soiled, bloodstained army blanket. The growing crowd of railway attendants leaned in. As he pulled away the blanket, the attendants gasped and covered their mouths. Doubled up in fetus position was the naked corpse of a young woman, her thin shoulders draped with thick, golden curls. Her body had been crushed into the trunk, her head forced over her breasts and her limbs drawn in tightly. Her mouth hung open in awkward distortion and her bright blue eyes stared blankly from their pale, discolored sockets. The pelvic area was bloody and decomposed. In minutes, railroad officials rushed up and down the tracks in search of the trunk's owner. Police questioned onlookers. Voices rose across the station, as a frenzied chaos spread. Young Alexander Potts, known as "Paddy," spoke up. The twelve-year-old boy helped passengers with their bags, making a living scrambling for spare change. He had helped check the trunk just a half-hour before. According to his testimony, an 18- or 19-year-old woman arrived at the station at 2:30 p.m. in a one-horse coupà ©. She wore a common calico dress and a thin shawl. She beckoned Paddy, saying "Sonny, can you tell me where the ticket office is?" When a truck arrived with the trunk, she paid him to help lift it. She urged him to be careful - it contained glass. She would never be found. Earlier that day, she'd hired the truckman to transport the trunk. Paddy had young, keen eyes. He remembered the small inscription on the truck's cab - "Tripp" - which became, for a brief time, a holy grail of sorts.

Saturday, January 11, 2020

Article Summary Read-Only Participants: a Case for Student Communication in Online Classes

UNV-501: ARTICLE SUMMARY Read-only participants: a case for student communication in online classes Lavelle Figueroa Grand Canyon University Title: UNV-5: Article Summary This is a summary of the article titled â€Å"Read-only participants: a case for student communication in online classes† argues that the value of communication in online modules and the purpose of the success a scholar experiences when they pass an online module.The main purpose of this article is find explanations, to some interests mentioned beforehand, the researchers conducted an eight week analysis of scholars of an online module. This analysis integrated the following strategy to observe online communication and classroom activity amongst scholar’s cultural diversity, geographical location and maturity both are the most important primary causal dynamics. Furthermore, the substantial data gathered by Nagel et al (2009) in their research describe the potential consequences of success and failures were documented.Therefore, a successful completion of a online module they concluded the following: foremost, modules that had discussion forums allows a scholarly proactive interaction with fellow scholars and the professor. Subsequently, this type of module facilitates and /or enriches the online learning environment of the scholars by generating queries and replies (e. g. , in the form of posts, assignments, etc) of high critical thinking skills.Furthermore, the third aspect we must consider when improving communication on our online module forums to enhance the online environment is creating rapport as well as wholesome interaction. Last but not least important of all, is the supportive and wholesome interaction with the instructor that is enhanced within the online environment provided substantial responses to the inquiries formulated by the instructor and fellow scholars with substantive answers. Finally, the lack of communication within the online module experience will resul t in serious repercussions, toward successful completion of the module.Last but not least important, the researchers also concluded that a scholar does not successfully achieve their goal; of completing their module due to the lack of communication amongst both scholars and the instructor greatly impact our overall performance. The aim of this article is the responsibility of proactive communication and rapport within the online module environment like described in the article written by Nagel et al (2009) titled â€Å"read-only student†.This kind of learner decides no proactively contribute to the online modules (e. g. discussion forums, teamwork, individual assignments as well as quizzes). For instance, this type of learner, only borrows the almost the same point of view of their fellow scholars and instructor without quoting their respective responses or reactions or restraining their responses. Finally, the causal elements of this unhealthy attitude are â€Å"procrastina tion, isolation, and/or unfamiliarity with technology† (Nagel et al. 2009). Briefly this research has concluded that proactive communication is a crucial element to successfully complete an online module. As a result, not participating proactively on the online module makes them read-only scholars. Bibliography Nagel, L. L. , Blignaut, A. S. , & Cronje, J. C. (2009). Read-only participants: a case for student communication in online classes. Interactive Learning Environments,  17(1), 37-51. doi:10. 1080/10494820701501028

Friday, January 3, 2020

The Causes And Prevention Of Africa - 942 Words

Poverty in Africa Africa is the only continent that is economically getting worse over the last three decades (Houston). Even though Africa is a land full of natural resources, there are too many conflicts and other causes that the people cannot utilize these resources to improve their economy. The most poorest parts of Africa is located at Sub-Saharan area, where most people live in extreme-poverty and they have trouble feeding themselves. It is important to understand the causes of poverty in those areas in order to set up aids to help those people because the aids can be easily shipped into the poor areas after identifying and analyzing the causes and problems. The causes and possibly recovery ways will be the main aspect of this paper. All of the reviewed articles focused on the causes of Africa s poverty. Dr. Houston (2009) pointed out that Africa has enormous amounts of minerals. Africa has world s most bauxite, cobalt, industrial diamond, phosphate rock, platinum-group metals, vermiculite, and zirconium. Why can t the Africans take advantage of these natural resources and increase the quality of life by utilizing and selling these precious minerals? It is the corrupted governments that prevent these minerals from being used by the Africans. All the authors agreed that in Africa, only the elite controls the resources. The upper-class people make profits from these resources, while the poor receive nothing. Also, many African countries are either going to wars orShow MoreRelatedMalari How It Affects Children997 Words   |  4 PagesJessica Anderson Professor Davis Malaria Paper November 19, 2014 MALARIA: HOW IT AFFECTS CHILDREN IN AFRICA Have you ever been bitten by a mosquito? Almost everyone has been bit by a one, so you know how annoying they are. During the summer they re constantly out looking for a source to feed from. Sometimes you don t even know you were bit until a red bump appears and you begin to itch. They can even bite through clothing! Most times these bites are harmless but some mosquitoes can carry aRead MoreHow Schistosomiasis Is A Parasitic Disease Caused By Trematode Flatworms1156 Words   |  5 Pagesfound in 76 countries around the world. In under developed countries of Africa Schistosomiasis, is second only to malaria as a cause of morbidity. Schistosomiasis affects approximately 240 million people globally (Hotez, 2013). The main areas affected are the regions near the equator, parts of the Middle East, Asia, South America, and the entire continent of Africa. The mortality rate of Schistosomiasis in Sub-Saharan Africa is approximately more than 200,000 each year. Based on my research, Schis tosomiasisRead MoreHiv in South Africa1136 Words   |  5 Pagesemphasis  placed by policy-makers, in S.A.  on prevention as opposed to treatment  of HIV. One of the major problems affecting the South African country is the spread of HIV. The country is believed to have the most number of HIV victims than any other country. As seen on the diagram, South Africa has the highest adult HIV prevalence. (GRAPH) Only 10% of the children who need treatment are able to have the benefit of undergoing treatment; this causes the country’s life expectancy to decrease furtherRead MoreMalaria in Sub-Saharan Africa Essay851 Words   |  4 PagesPlasmodium. This disease occurs widely in poor, subtropical and tropical regions of the world. One subtropical region that has been greatly affected by this disease is Sub-Saharan Africa. According to Olowookere, Adeleke, Kuteyi, and Mbakwe (2013) malaria is one of the leading causes of death and illness in sub-Saharan Africa. It is important to be aware of the impacts this disease carries and how it has greatly affected millions of people. This paper will explain the impacts of Malaria and discuss,Rea d MoreMalari A Treatable And Preventable Disease Essay1525 Words   |  7 Pagesmalaria cases and more than 430,000 malaria related deaths. Sub-Saharan Africa accounted for 88% of the new cases and 90% of the deaths, with pregnant women and children under five being at the highest risk of infection. Malaria is a devastating disease that accounts for about 10% overall disease burden in Africa and more than 40% public health expenditure (Ntonifor Veyufambom, 2016). The high malaria incident rate in sub-Saharan Africa is attributed to high transmission rates from highly efficient vectorsRead MoreThe Epidemic Of Ebola And Hiv / Aids Essay1363 Words   |  6 Pagescases include the emergence of HIV/AIDS in the 1970s and 1980s, and the more recent 2014 outbreak of Ebola in Western Africa. Examining the distinctions between the two can give us a better understanding of how to combat potential outbreaks in the future. Ebola and HIV/AIDS are two infectious diseases with many similarities. Both diseases are caused by viruses, originating in Africa, with no approved vaccines available, leading to mass casualties. Even with their similarities, the two outbreaks hadRead MorePublic Health Campaign For Fight Hiv / Aids864 Words   |  4 PagesCore question: Imagine you are a fledgling medical anthropologist in Africa. What are the key points in your public health campaign to fight HIV/AIDS? HIV is a virus that causes the disease of AIDS that damages your immune system. HIV is manageable, but cannot be cured. There are many ways to prevent HIV from happening. Some of the ways to prevent HIV is to be tested, being tested is the safest way not to transmit the virus and it can prevent infection to others. Another way is to get educated, gettingRead MoreHiv / Aids : A Huge Complication Around The World1562 Words   |  7 PagesHIV/AIDS in Russia versus South Africa HIV/AIDS is becoming a huge complication around the world. More and more countries that are not commonly known to have an issue with AIDS/HIV are developing epidemics. It is common knowledge that South Africa struggles with an HIV/AIDS epidemic, but a lesser known country affected would be Russia. The epidemic spread in Russia because of drug users, prostitutes, and cultural shame. It spread in South Africa because of African men’s refusal to use condoms andRead MoreThe Issue Of Aids And Hiv1726 Words   |  7 Pagestransmitted disease) but can also be spread through blood. HIV kills T-cells, a type of white blood cell, which leads to a person not having an immune system. The lack of an immune system means they are no longer able to fight off infections, which causes them to constantly getting sick. HIV is an incurable disease that a person has for life. However, just because someone has HIV and will have it for the rest of their life, does not mean that they are going to ge t AIDS. AIDS, or Acquired ImmunodeficiencyRead MoreCollaborative Learning Community : Case Study1097 Words   |  5 Pagesand many women have said before that they don t believe that there s HIV in Africa HIV in Africa Most of them have passed away cause they refused to hear the voice The voice of warning, voice of warning Cause the voice of warning said If you really want to play you better play it safe It’s better not to play but if you want to play Use a condom so you ll never go wrong (Stay alive (HIV theme song), 2003) In Africa, music is an effective form of â€Å"edutainment† (Barz Cohen, 2011, p.185). Barz