Saturday, December 28, 2019

Legal - Discretion in the Legal System Essay - 1226 Words

Explain the role of discretion in the criminal justice system. As a society we believe that offenders should be held accountable for their actions but also treated fairly in the criminal investigation, trial process and sentencing. As a result of this, the power of discretion, that is the ability to choose from a range of options, is granted to some authorities ensure some flexibility for decision making within the system, enabling a more holistic outcome for all parties involved. The issues that explore and reflect the role of discretion within our criminal justice system are police discretion, charge negotiation and judicial discretion in sentencing. The first aspect of the legal system in which discretion is used is in the†¦show more content†¦Meanwhile, Don Weatherburn as director of BOCSCAR expressed his concern as he stated; â€Å"it is naà ¯ve to imagine that a young offender, after years of involvement in crime, will suddenly become law abiding†. As a result, police discretion is a very important aspect of prosecuting juvenile crime, as it is clear that in some cases going to court should be the outcome for young offenders. However the role of discretion for police lies in being able to decide which cases and which circumstances warrant the result of court, as opposed to the multiple alternative forms of punishment that police have the power to enforce. A controversial aspect of the criminal justice system is the Crown’s use of discretion when it decides to make charge negotiations. This means that the crown offers the accused a lesser charge should they plead guilty to it. In doing so, the crown benefits from the assured conviction (maintaining peace and security by an efficient means) and the accused benefits from a lesser sentence. However by employing powers of discretion in this case and making a deal with offenders, is seems to be at the expense of victims as there if insufficient retribution. The case of Nannette May (2009) epitomises the concern of victims, as May was not given a chance to give evidence against her attacker due to his acceptance of aShow MoreRelatedLegal Systems : Legal System1037 Words   |  5 PagesLegal Systems Assignment Introduction One cannot deny that although there is an infinite of legal cultures, they are all universally driven to influence societal conduct in accordance not necessarily with morality, rather with the wishes of the lawmakers. Each great legal culture namely common law and civil law express their differences from its history to its political philosophies. Each culture however, were never inflexible nor exclusive and through globalisation, it became inevitable for bothRead MoreClassical Vs. Modern Positivism1371 Words   |  6 PagesThis essay will explore the features of both classical and modern positivism and by critically analysing how Dworkin’s claim that positivism fails to account for the important role of legal principles, is not to a certain extent convincing. Positivist argue that the law and legal institutions depend on depends on its sources, not its merits,’ this is because the law does not exist to depend on the idea of justice or the rule of law. Classical positivist Jeremy Bentham defined law as ‘an assemblageRead MoreThe Public Idea Of Discretion1220 Words   |  5 Pages(2011) describe the public idea of discretion as a very misunderstood aspect of police work, therefore making the public’s opinions of police operations negative in some circumstances. Abdullah and Wells (2011) also highlight Packers crime control model saying that â€Å"A crime control model places high value on efficiency in apprehending and punishing offenders† and â€Å"to operate efficiently the officers must act quickly†. A more concise definition of police discretion is viewed by many law enforcementRead MoreThe Eu And The European Union1385 Words   |  6 Pagesout when the EU has the exclusive competence, while Article 4 explores when competence is shared and it is this idea of competence and the regulations as to when the EU can act which sets it apart from other legal systems. This makes the EU unique in many ways compared to the legal systems of its Member States. The â€Å"British Parliament does not need to have to justify itself† when it makes a decision or new piece of legislation because it has the absolute right to do so. Whereas the EU must haveRead More The Rule of Law Essay1542 Words   |  7 PagesThe rule of law is a difficult concept to grasp and proves elusive to substantive definition. However, the following work considers the attempts of various social and legal theorists to define the concept and pertinent authorities are considered. Attitudes and emphasis as to the exact shape, form and content of the rule of law differ quite widely depending on the socio-political perspective and views of respective commentators (Slapper and Kelly, 2009, p16), although there are common themes thatRead MoreDiscretion And The Criminal Justice1327 Words   |  6 PagesResearch Paper: Discretion and the Criminal Justice Professional Jason Gaffney Saint Leo University Abstract The criminal justice system involve many elements. Some of the major components are the men and women who maintain these as Police Officers, Lawyers, Corrections Officers, and the Judges. For the purpose of this paper, I will be focusing more on Judges. Judges sit upon the bench of the courts and help to ensure that fairness is present during trials. A judge must also enforceRead MoreThe Death Penalty Was Furman V. Georgia Essay1300 Words   |  6 Pagespeople view the death penalty was Furman v. Georgia. This case set up a guide for limited sentencing discretion; this meant that sentencing for the death penalty would become standardized. Essentially in extreme cases, every criminal death qualified would be sent to death row and eventually executed. After disputes after Furman, cases like Woodson v. North Carolina insisted on individualized discretion when discussing the death penalty. Those in favor of Woodson believed that character ad record ofRead MoreCode Of Conduct For Law En forcement Essay1465 Words   |  6 Pages Contents Introduction 2 Police Ethics 2 Corruption 3 Police Corruption 3 Police Discretion in Ethics 4 Code of Conduct for Law Enforcement 4 Types of Police Corruption 4 Ethics in the Courtroom 5 Prosecuting Attorneys 5 Defense Attorneys 5 Ethics in Police Training 6 Closing 6 Introduction Ethics by definition states that it’s the study of morality. Ethics are the basis of our criminal justice system. From the arresting officers who take an oath to serve and protect, to the attorneys andRead MoreExplain What Is Meant by ‘Mechanical Jurisprudence’, and Discuss Hart’s Objections Towards It.1547 Words   |  7 Pagesbefore the law is legislated for in advance, it is just for the judges to apply the relevant law. This concept would insinuate that every case that comes before the courts has been legislated for in advance, leaving virtually no room for judicial discretion. Hart has shed some academic light on the matter. In â€Å"The Concept of Law† he explains that there are two handicaps whenever we seek to legislate in advance. Hart writes â€Å"It is a feature of the human predicament that we labour under two connectedRead MoreDisadvantages Of H. L. Harts Theory1657 Words   |  7 Pages5 Code #316 Jurisprudence is the theoretical study of law1. H.L.A Hart’s version of legal positivism is a legal theory, which describes what the law is, this being the dominant question raised by legal philosophy2. The pivotal tenets of positivism in general are that law is a set of exhaustive rules and the validity of such is due to their method of adoption, not content. This essay analyses the advantages of H.L.A Hart’s theory against Austin’s classical positivism, as Hart’s method brought clarity

Friday, December 20, 2019

Cesare Lombroso s The Modern Criminal Justice System

â€Å"A drug is any chemical entity or mixture of entities, other than those required for the maintenance of normal health, the administration of which alters biological function and possibly structure† World health organisation (1981). Cesare Lombroso’s (1835) proposed that people were â€Å"born criminals† through human development and that criminals could be identified by features such as large ears or slopping foreheads. Although this theory is not used anymore in modern society, Cesare Lombroso’s (1835) is still recognised and credited for positivism and the scientific study of crime. Cesare Beccaria (1738) believed that criminal offences could be deterred by a form of punishment such as deterrence, and that people possessed a free will. Cesare Beccaria (1738) â€Å"theory is the foundation of the modern criminal justice systems† (page 260). â€Å"More people are arrested each year for drug-related offenses than any other type of crime, and ta xpayers spend tens of billions on arresting, prosecuting and jailing offenders for drug crimes† In this essay, I, will be discussing how the criminal justice system responds to drug offenders. Offences under the misuse of drugs act can include: â€Å"possession of a controlled drug, possession with intent to supply to another person, production, cultivation or manufacture of controlled drugs, offering to supply another person with a controlled drug, import or export of controlled drugs and allowing premises you occupy or manage to be used for theShow MoreRelatedCriminological theories - Durkheim, Beccaria, Lombroso1944 Words   |  8 PagesMost of the information explaining crime and delinquency is based on facts about crime (Vold, Bernard, Daly 2002, p.1). The aim of this paper is to describe the theories of crime and punishment according to the positivists Emile Durkheim and Cesare Lombroso, and the classical criminologist Marcese de Beccaria. The theories were developed as a response to the industrialisation and the modernisation of the societies in the 18th and 19th centuries and were aiming to create a rational society and re-establishRead MoreThe Problem Of Crimin al Justice System882 Words   |  4 Pagesof thought that surround the idea of criminal justice. Initially the main goals of these schools of thought were to classify and punish crimes, however in the recent past we are seeing a shift toward the deterrence and prevention of crime. Early classical, biological, and psychological theories helped shape what is today’s criminal justice system. One of the earliest theories that attempted to explain the cause of crime is classical theory. In 1764, Cesare Beccaria published his Essay on CrimesRead MoreStudy Guide/Outline Chapter 11435 Words   |  6 Pagesthe Pennsylvania Quakers in the development of the use of prisons in the United States. 6. Specify the operations of the Walnut Street Jail as the first American prison. 7. Compare the Pennsylvania System with the Auburn System of imprisonment. 8. Explain how the Irish Penal System contributed to the development of the Reformatory Era of prison operations in the United States. 9. List the Acts of Congress and describe their impact on the end to the Industrial Era of prison operationsRead MoreCompare Beccaria and Lombroso Essay2327 Words   |  10 PagesKey Thinkers and Their Competing Ideologies. Criminology is a study of crime, criminals and criminal justice. Ideas about criminal justice and crime arose in the 18th century during the enlightenment, but criminology as we know it today developed in the late 19th century. Criminology has been shaped by many different academic disciplines and has many different approaches. It explores the implications of criminal laws; how they emerge and work, then how they are violated and what happens to thoseRead MoreThe Criminal Man1449 Words   |  6 PagesIn this paper I will discuss the makings of the Criminal Man according to some of the most famous early Criminologists. I will show how they came up with the Criminal Man using their education, professional experiments and ideals as to what causes a person to become a criminal. As I discuss each theory of what they felt made a person become a criminal you will begin to understand the development towards the laws and views of the criminologists we have in today’s era. Througho ut the paper I willRead MoreCesare Lombroso s Role As A Criminology Thinker1115 Words   |  5 PagesCesare Lombroso was a significant contributor the subject of criminology. Some even make stipulations that he is the father of criminologist. His studies at the University of Pavia contributed greatly to his eventual role as a criminology thinker. His works attracted both positive and negative reception, and Wolfgang considers it a name most eulogized and attacked (Marvin. 1960, p.232). He is the flag bearer of biological positivism and was mainly influential in Europe and North America. His propositionRead MoreThe Classical School Of Criminology1485 Words   |  6 Pagescrime and punishment. Throughout history, crime was dealt with in an extremely harsh and inhumane manner. Criminals and suspected criminals were quartered, burnt at the stake, tortured, and subjected to other forms of extreme violence. These methods were used to get a confession or punish people for even minor cri mes such as theft. The people of the Enlightenment period of the late 1600 s paid attention to this behavior and this is why a movement was started to change how human beings dealt withRead MoreTheories Of Criminology And Criminal Behavior952 Words   |  4 PagesIn the early to mid-1800s there were a few perspectives introduced regarding how to determine which individuals were more likely to commit criminal behavior. These perspectives were made to identify and separate the more â€Å"superior† individuals from the â€Å"inferior† individuals. One of the first examples of this belief was brought forth by craniometry. Craniometry is the belief that the size of a person’s brain and the skull can tell a person’s superiority or inferiority in relation to certain racialRead MoreThe Crime Of The Criminal Justice System845 Words   |  4 PagesThe criminal justice policy has many different aspects. This include the different theories of crime and how they hav e an impact the criminal justice system. Some of this theories are the Biological studies, Psychological theories, and last the Sociological theory all are used as different methods of explaining why crime exists. Biological theories are the biological explanations of crime. A famous theorists Cesare Lombroso, founder of the Italian school of Positivist Criminology. His biologicalRead MoreCriminology And The Main Schools Of Thought, Classicism And Positivism971 Words   |  4 Pageschange the criminal justice system with ideas that were quite controversial at the time. Since courts and judges were practically free to punish however they saw fit, justice was mainly a matter of wealth. This resulted in sentences being too harsh and inconsistent, depending on the social class of the offender. The punishments were based on Christian beliefs of revenge and retribution(Newburn 2007: 115). As such, it is no surprise that theorists during the era of Enlightenment found this system to be

Thursday, December 12, 2019

Security Models and Architecture System †Free Samples to Students

Question: Discuss about the Security Models and Architecture System. Answer: Introduction Information technology and its affiliated components are today identified as important capital tools that offer valid information for business success. This outcome has influenced the application of IT components in different aspects of life, which has also contributed to the prevalence of security issues(Teymouri Ashoori, 2011). This report, therefore, offers an assessment of the various security issues experienced in IT and their relation to the existing technological landscape. Furthermore, the existing models and control mechanisms of these security issues are highlighted, together with the commonly experienced threats and risks. In all, the report gives a thorough evaluation of the security elements in IT including system vulnerabilities and mitigation procedures. Technology has always held a common objective despite the advances and inventions that have been seen throughout the years. In essence, the term will outline any element that makes life easier, and none of these elements is more profound and effective as IT. Now, in the past, the technological management landscape focused on mainframe systems that delivered services to users through complicated connections(Kuc, 2015). However, the modern landscape as shown in the diagram below is predominantly user centred including the applications themselves that use cognitive designs to enhance usability. Nevertheless, the same structure that enhances the usability of technological components creates many vulnerabilities that affect the security of modern technological systems(DSTO, 2016). Vulnerabilities and threats Rapid technology evolution: consider new technologies that are always been introduced into the market yet lack established standards to protect the users. For instance, social media was faced with several attacks at its onset propagated by the weak security measures used e.g. water holing attacks. The similar outcome is experienced with malware attacks that are now intensified by rapid advances in mobile technology which facilitate their propagation. Users today have extended access to connections (internet) which facilitates self-replicating malware e.g. WannaCry ransomware that used unprotected access ports(Sherr, 2017). User negligence: most modern day users take security feature for granted including surrendering their information to multiple social network sites. These attributes trickle down to complex applications where organization fail to employ proper security measure exposing their data and users(GU, 2017). Smart system: Technologies such as Internet of things have led to the development of smart devices that automatically connect and share information. They are also facilitated by wireless technology which unlike wired networks lacks physical security, a serious loophole for many forms of attack e.g. malware, denial of service and man in the middle(Antoli, Mievi?, Mili?evi?, 2014). Mitigation and the benefits Encryption of data which facilitates secure connectivity and transfer of information. This security feature enhances communication and increases system productivity. User awareness most attacks are facilitated by poor security measures which can be avoided by user literacy saving on operational cost. Policy enactment which establishes proper security standards(Antoli, Mievi?, Mili?evi?, 2014). In IT, two fundamental elements of operation are used; one, the architecture of the computer systems and two, the security models or techniques that define and implement security procedures in the technological components. Now, an important part of security models is the security policy used which detects the terms for data access, an element that outlines the importance of access control methods(CISSP, 2012). Below is a simple depiction of the overall concept of security models. Threats, vulnerabilities and access control In all the system and technologies used, security models particularly access control methods and management denote the process subjects use to conduct certain actions (operations) to a given object (e.g. files and data). These mechanisms are important when one considers the different vulnerabilities and threats in place e.g. malware attacks that will interfere with legitimate programs as they try to further the course of intruders. In other instances, network vulnerabilities will be exploited to deny users services as a means to disrupt business operations e.g. DOS. Furthermore, there are those threats that intercept data or traffic to earn or benefit from other users work(Thion, 2008). Therefore, these threats and risk affect the systems confidentiality, integrity and availability (CIA), an outcome fixed by access control. Mitigation: Access control models (3 common types) Mandatory access control (MAC)- a static access model that assigns users clearance levels thus improving accountability based on access levels and labels. Therefore, the model is based on policy or matching criteria and not identity. Discretionary access control identity is used in this model where the owner decides who access the content directly based on subject. Access control lists are good examples of tools applying this model and so is the access seen in many operating systems. Rule based access control as the name suggests, access is done based on certain rules that determine if access is denied or allowed(Cicnavi, 2012). Accountability a clear record of those accessing certain systems is given which improves the security. Confidentiality and integrity these models ensure only the authorised personnel and processes accesses IT structures. Cost saving automation of security protocols is done which reduces the man power(Cicnavi, 2012). Now, having established the different threats facing information technology, the mitigation procedures are usually identified and implemented. However, the identification element is critical as it determines the effectiveness of the chosen measures(SANS, 2002). Therefore, in a nutshell, risk assessment can be outlined as the process of identifying threats (risk and vulnerabilities), exposing them and developing appropriate effective countermeasures as outlined in the diagram below. IT risk assessment of threats Considering the threats that face IT systems, no single or specific assessment can be outlined as the best solution to risk evaluation. However, the process of identifying and mitigating threats follows a common approach management and will always start with the identification of the assets. In this case, the assets are the users, IT infrastructure (hardware and software) and information. Thereafter, the threats are identified which outline any element that exploits vulnerabilities or accidents to interfere with an asset. Finally, the vulnerability is identified, which is the security gap in the operational components. Now, using these three items (Assets, threats and vulnerability) the risk is developed i.e. A+T+V=R(TAG, 2010). Examples: Threats (Unauthorised access), asset (digital document), vulnerability (access control not defined). Threat (virus), asset (hard disk), vulnerability (anti-virus is not up to date). Mitigation procedures and benefits After identifying the risk, which in this case can be classified as the probability that a given activity will occur, the user quantifies the problem based on the existing solutions. For instance, in the examples above, the user will in the first instance, define a proper access control procedure including an accurate access policy. This process can be done using access control list or access control applications. In the second instance, the user would simply update their existing antivirus. Now, the benefits of this are reduced operational costs as resources are protected and resource availability. Moreover, the productivity of the user or organization is increased due to lack of interruptions(Kosutic, 2017). Conclusion Information technology is no longer an optional facility but a mandatory component of daily life. This outcome has facilitated its growth in all the industries across the globe which have also facilitated the advances seen today such as wireless communication and smart cities. However, the same technological advances also create many vulnerabilities that facilitate the security threats experienced. Therefore, IT security is dependent on time as there are too many variations and factors to consider. So, the user should update their systems regularly including the IT infrastructure and their literacy levels. This operational procedure will protect the technology landscape, enhance access control models and improve the effectiveness of risk assessment procedures. References Antoli, K., Mievi?, P., Mili?evi?, A. (2014). VULNERABILITIES OF NEW TECHNOLOGIES AND THE PROTECTION OF CNI. Media, culture and public relations, Retrieved 25 August, 2017, from: https://hrcak.srce.hr/file/206704. Cicnavi. (2012). Overview of Four Main Access Control Models. Utilize windows, Retrieved 25 August, 2017, from: https://www.utilizewindows.com/overview-of-four-main-access-control-models/. CISSP. (2012). Security Models and architecture. Chapter 5, Retrieved 25 August, 2017, from: https://media.techtarget.com/searchSecurity/downloads/29667C05.pdf. DSTO. (2016). Future Cyber Security Landscape. A Perspective on the Future, Retrieved 25 August, 2017, from: https://www.dst.defence.gov.au/sites/default/files/publications/documents/Future-Cyber-Security-Landscape.pdf. (2017). Top 10 Threats to Information Security. Reterieved 25 August, 2017, from: https://scsonline.georgetown.edu/programs/masters-technology-management/resources/top-threats-to-information-technology. Kosutic. (2017). ISO 27001/ISO 22301 Knowledge base. 27001 Academy, Retrieved 25 August, 2017, from: https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-how-to-match-assets-threats-and-vulnerabilities/. Kuc, S. (2015). Modern technologies and innovations landscape architecture education at Cracow University of Technology . World Transactions on Engineering and Technology Education, Retrieved 25 August, 2017, from: https://www.wiete.com.au/journals/WTETE/Pages/Vol.13,%20No.3%20(2015)/16-Kuc-S.pdf. SANS. (2002). An Overview of Threat and Risk Assessment. SANS Institute InfoSec Reading Room, Retrieved 25 August, 2017, from: https://www.sans.org/reading-room/whitepapers/auditing/overview-threat-risk-assessment-76. Sherr, I. (2017). WannaCry ransomware: Everything you need to know. Cnet, Retrieved 25 August, 2017, from: https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/. TAG. (2010). Threat, vulnerability, risk commonly mixed up terms. Retrieved 25 August, from: https://www.threatanalysis.com/2010/05/03/threat-vulnerability-risk-commonly-mixed-up-terms/. Teymouri, M., Ashoori, M. (2011). The impact of information technology on risk management. Procedia Computer Science, Retrieved 25 August, 2017, from: https://www.sciencedirect.com/science/article/pii/S1877050911000573. Thion. (2008). Access control models. Retrieved 25 August, 2017, from: https://liris.cnrs.fr/romuald.thion/files/RT_Papers/Thion07:Cyber:Access.pdf.

Wednesday, December 4, 2019

Evaluate How the Nutritional Plan Might Improve the Health of the Chosen Individual free essay sample

In order to avoid that I gave her a breakfast that are high in fiber along with foods that she likes. The tables are both shown below: After Before Being without food during the night, our brain and muscles need energy and fuel to function. And the glucose in the food (as well as the vitamins, minerals, dietary fiber, and protein) is how we get this energy. With this rush of nutrients and glucose to our brains we are better able to concentrate, focus, be productive, and be in better spirits. There are no major health issues by not eating breakfast. I have already listed a few benefits to eating breakfast, but there are more benefits, such as: Eating high-energy foods for breakfast could help to boost short-term memory * People who rarely eat breakfast consume more fat and fewer nutrients like calcium, potassium and fiber than regular breakfast-eaters and often breakfast-eaters * A study in the American Journal of Clinical Nutrition showed that breakfast-skippers are more likely to have worse cholesterol levels and insulin sensitivity than breakfast-eaters * Eating a breakfast thats high in fiber and carbohydrates could help you feel less tired throughout the day, While changing the individuals diet, made a few changes that could make the individuals diet healthier. They were the following: * From fried chicken to boiled or oven chicken * White pasta and rice to brown pasta and rice * I added vegetables, which were streamed to maintain its nutrients While changing the individual’s diet, I also focused on the preparation. When making food, preparation is key, the preparation of the food determines whether the food is healthy or not. By making food that has a lot of vegetable oil; it won’t be as healthy as making food with olive oil, for that reason. The type of preparation I changed was the type of oil being used by the individual and excluding any type of frying. Instead of frying I added other types of methods like boiling, using the oven and steaming vegetables. The preparation differentiates weather the food will be 500 calories or 1000 calories. In order to improve the individual’s diet I made sure to eliminate vegetable oil because there has been recent evidence conducted that any amount vegetable oil, is unhealthy for our body. As it the polyunsaturated fats in vegetable oil can cause many health problems, including heart disease. However by using olive oil within the recommended limit, is healthier to our body as olive oil is nature’s storehouse of many healthful nutrients like vitamins A, E, D and K. Other nutrients found in olive oil are: * Magnesium-rich chlorophyll encourages formation of healthy red blood cells. * Squalene, a precursor to phytoesterols, helps reduce acidity. * Phytoesterols (in the form of beta-sitosterol) assists in preventing cholesterol absorption. * Caffeic and gallic nutrients stimulate the flow of bile which helps alkalise food coming out of the stomach, reducing stress on the pancreas. * Phenolic compounds protect against fermentation of fats and cholesterol, and may promote higher production of fat-digesting enzymes in the pancreas. Cycloartenol lowers the amount of cholesterol in free circulation and increases excretion of bile to mop up excess acidity and increase alkalinity of the food coming out of the stomach. Olive Oil has been shown to have beneficial effects on vir tually every aspect of body function, development and maintenance, including brain development, bone structure, digestion, aging process, the condition of skin and hair, metabolism, and on plaque formation in the blood vessels. There were a number of foods that I introduced to the individuals diet in order to create a healthy balanced diet. Most importantly I added a range of foods and made the tweaked the previous foods the individual had also as you can see below from the before and after: After Before By making simple changes like white pasta and rice to brown pasta and rice, and instead of frying the chicken boiling it or using other methods as suggested. Focusing on the lifestyle, there has been a number of changes they were the following: Days| Exercise| Sitting | Sleep| BMI| Monday | None| 7 hours| 9 hours | 18. 2 | Tuesday| None| 7 hours| 13 hours | 18. 2 | Wednesday| None| 7 hours| 9 hours | 18. 2 | Thursday| None| 7 hours| 9 hours | 18. 2 | Friday| None| 7 hours| 9 hours | 18. | Saturday | None| 7 hours| 8 hours | 18. 2 | Sunday | None | 7 hours| 9 hours| 18. 2 | Before Days| Exercise| Sitting | Sleep| BMI| Monday | Long distance walking| 3 hours | 8 hours| 18. 2 | Tuesday| Long distance walking| 3 hours | 8 hours| 18. 2 | Wednesday| Netball| 3 hours | 8 hours| 18. 2 | Thursday| Long distance walking| 3 hours | 8 hours| 18. | Friday| Football | 3 hours| 8 hours | 18. 2 | Saturday | Long distance walking| 3 hours| 8 hours | 18. 2 | Sunday | Long distance walking | 3 hours | 8 hours | 18. 2 | After Its visible that the individual doesn’t do much exercise apart from walking to and from school, which isn’t much. For that reason I asked her the type of exercise she interested in but she will also do such as: long distance walking which is walking for about 30 min a destinations and other sports that she enjoys like football and netball. They are both the individuals two favourite sport, by giving her these sports she will be more dedicated to exercising because if I gave her two sports she doesn’t like she wouldn’t be as motivated. We also focused on other aspect like the amount of hours she sits down during the day; the recommended amount is 3 hours which I also recommended for the individual however that is not including the time she is at school. The individual sleeps between 8-13 hours and it is recommended to sleep 8 hours a day for that reason I will stick to the recommended amount. By successfully changing the individual’s diet and lifestyle I believe that she will live a healthier life style.