StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Socialgy eassy, i will attach the source - Essay Example

Cite this document
Summary
Chapter 3 discusses the different actions taken based on the substance being abused such as alcohol, tobacco and illegal drugs. On a personal opinion, the different strategies discussed can be…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
Socialgy eassy, i will attach the source
Read Text Preview

Extract of sample "Socialgy eassy, i will attach the source"

Substance Abuse and Strategies of Action The paper focuses on the analysis of the different strategies of actionto resolve different forms of substance abuse. This is particularly based on Chapter 3 of the required reference. Strategies for action for fighting substance abuse vary based on implementation. Chapter 3 discusses the different actions taken based on the substance being abused such as alcohol, tobacco and illegal drugs. On a personal opinion, the different strategies discussed can be applied on these substances.

One of the strategies for fighting substance abuse based on the reference is prevention. Although alcohol, tobacco and illegal drugs abuse can be considered very rampant and already hard to prevent, a long term application of preventive measures can positively, on a personal view, affect the statistics. Based on studies presented in the reference, anti-smoking and anti-drinking advertisements are effective. For that matter, more concerted worldwide efforts are needed to be undertaken to intensify this strategy specifically due to the fact that there is a percentage of the nations that ban such advertisements in favor of tobacco and alcohol producing companies.

In addition, there are already government and non-government efforts specifically programs and campaigns to prevent substance addiction and abuse. One of the most important evidence of the effectiveness of preventive action is the study that was quoted in the book conducted by the National Center on Addiction and Substance Abuse at Columbia University if a child reached the age of 21 without taking the habit of drinking, smoking or drug abuse, he or she would most probably not take the habit of at all.

This is a strong proof that prevention really is better than cure. Preventive measures are potentially very effective. The main hindrance to such strategies though is the limit brought about by implementation. If a nation is willing or not to implement such actions to the point of making laws to be able to legalize efforts to prevent substance abuse. The second strategy of action with great potential is the establishment and implementation of government regulations. This is related to the first one since it answers the question of how effective would the government plan and act upon programs and even laws related to the prevention and resolution of substance abuse.

Basically, the ultimate responsibility of ending a nation’s problematic issue depends on the stand of the government. Based on the discussion presented by the reference, there are numerous programs already undertaken by the government. The different levels of government such as the federal, state and local leaders had their own contributions in anti-substance abuse warnings through the years. By increasing the legal drinking age to 21, alcohol related road accidents decreased significantly (Chapter 3).

The clean air laws also positively contributed to anti-smoking campaigns since it prevented smoking in establishments. Other examples include the increased power of the Food and Drug Administration to control sale and production based on the Family Smoking Prevention and Tobacco Control Act of 2009. These are just the few examples of the programs and laws implemented by the government. With full use of such laws, substance abuse solutions can be achieved. The only limitation to this strategy is also with regards to implementation.

The two strategies of action against alcohol, tobacco and drug abuse can be significantly effective but both needs proper and strict implementation. Usually, the main issue with regards to implementation is the absence of manpower that can reach the public. The government has the everything established but the actions do not reach the people. This is a common issue in any other programs or laws which needed a nationwide or worldwide implementation. Specifically, with regards to substance abuse, all the solutions are there, we only needed to know the most effective course of action.

ReferenceChapter 3.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Socialgy eassy, i will attach the source Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/sociology/1624648-socialgy-eassy-i-will-attach-the-source
(Socialgy Eassy, I Will Attach the Source Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/sociology/1624648-socialgy-eassy-i-will-attach-the-source.
“Socialgy Eassy, I Will Attach the Source Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/sociology/1624648-socialgy-eassy-i-will-attach-the-source.
  • Cited: 0 times

CHECK THESE SAMPLES OF Socialgy eassy, i will attach the source

Cyber Security Vulnerabilities and Associated Threats

This paper ''Cyber Security Vulnerabilities and Associated Threats'' discusses that cyber threat has remained a top concern in most nations because of security concerns.... Research and study have found out that cyber security has continued to increase in intensity and sophistication with time.... nbsp;… Cyberspace has dominated human life and man has proved that he cannot do without it....
7 Pages (1750 words) Term Paper

Vulnerabilities of Networks and Internet

The paper ''Vulnerabilities of Networks and Internet'' presents a clear view of the issues involving computer networks and their security.... It tackles the basic networking structure and principle behind it.... The good practice of info- security in the preservation of data and its role in effective network management....
7 Pages (1750 words) Essay

How may one account for the significance that contemporary societies attach to the problem of terrorism

In present times, the debate on terrorism has taken a new turn since the scale of terrorism and terrorist activity appears to have gone from small acts of violence to attacks… To better understand the importance that contemporary society attaches to terrorism, it is necessary to understand both the idea of terrorism as well as how governments, media as well as the Terrorism is commonly used as a term to describe violent acts against civilian targets based on nationalistic, political or religious motivations....
12 Pages (3000 words) Essay

The PC: 35 Years and Computing - Computer Crime

Computers made life easy and gave revolutionary progress to the area of communication, business, education etc.... With the passage of time, they became an evident part of our lives and business.... However, with this technical… Just like everything in the world has two aspects; computer usage has a dark side related to it as well....
6 Pages (1500 words) Essay

Early Radio Headphones Fell Out of Favor

The assignment "Early Radio Headphones Fell Out of Favor " states that Headphone is a device consisting of two earpieces or small-sized speakers that the user can attach with or wear on his ears.... There are three permanent parts of a headphone a voice coil a magnet and a cone-shaped diaphragm....
8 Pages (2000 words) Assignment

Security and Cyber-Attack of a Bitcoin

The paper "Security and Cyber-Attack of a Bitcoin" highlights that recently, the users of Bitcoin have had to halt the transaction of Bitcoin as a result of a huge cyber-attack from unverified sources.... The unknown sources are said to have been spamming the transaction of Bitcoin.... hellip; According to Flitter (2014), a cyber-related attack on Bitcoin is called a distributed denial-of service attack....
5 Pages (1250 words) Essay

The Management of Information Systems with Regards to Securing Such Systems

"The Management of Information Systems with Regards to Securing such Systems" paper looks at the main modalities that hackers use to gain unauthorized access to information systems.... From these unlawful access methods, the paper recommends information management strategies.... hellip; To mitigate the challenges of hacking and unauthorized access, this literature provides a number of strategies....
9 Pages (2250 words) Coursework

Internet-Based Security Risks and Attacks

the source as well as CompuServe Information Services both went online in 1979, proving that internet services could be hosted by commercial service providers.... … The paper “Internet-Based Security Risks and Attacks” is a thoughtful example of coursework on information technology....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us