Wednesday, October 30, 2019

How military was the medieval castle Essay Example | Topics and Well Written Essays - 2250 words

How military was the medieval castle - Essay Example However, its main purpose was to house the private residence of its owner, family and dependents. The first castles were built around 1066 and were a product of medieval history during the Age of Feudalism. Feudalism refers to the military society that was created in Europe during the 9th and 10th centuries AD. The structure of feudalism resembled a pyramid. At the top was the king, who owned all the land in his kingdom. Immediately below the king was a group of major landholders that held their land directly from him, his tenants-in-chief.1 These were the lords and magnates of the kingdom. They swore to give the king military service in return for their land. They would fight for the king when and where he chose. The tenants-in-chief rented the land to their tenants, the barons and lords. This process repeated itself all the way down the pyramid to the knights, who were the local lords of the manor. The amount of land held was directly related to the amount of military service he co uld give the king. The first castles, called motte and bailey castles, were built of wood in the 10th and 11th centuries. They consisted of an enclosed yard called a â€Å"bailey.† Right next to that was a man made mound of dirt called a â€Å"motte.† A ditch protected the bailey and a wooden fence called a palisade.2 The palisade contained stables, workshops, and sometimes even a chapel. This was connected to the motte by a bridge. The motte was a 15 to 30 foot high structure and the main tower was built on top of it. The tower was the residence of the lord’s family, and served as a strong hold and lookout during an attack. Some early Norman castles had never been motte-and-baileys but were formidable stone castles from the start. The Tower of London and Colchester Castle are early examples, dating from the 1070s, which were conceived as defensive palaces. The Crown and the greater barons spent an enormous amount of money on castles during the third quarter of the 12th century.3 As well as being a defensive structure, castles were also offensive tools, which could be used as a base for military operations in enemy territory. Norman invaders of England established Castles for both purposes. Toward the end of the Middle Ages castles tended to lose their military significance due to modern innovations in medieval warfare. A castle could be seen as a stronghold and prison but it was also a place where the knights and lords could entertain their peers. The castles began to be designed to reflect the prestige and power of its occupants. Comfortable homes were established within the fortified walls. As time went on, castles were replaced with country houses as high status residences. However, castles were still used to provide low level protection in later periods. The first castles were constructed of timber and wood but they were very susceptible to fire, which came as a disadvantage when attacked. The main defense of a castle was its numerous walls. The walls were usually thick stone and very tall, depending on who and how it was built. The towers were built with slits so that archers could easily shoot arrows at the enemy. From the towers and alleys archers became the main defenders of the castles. Later on fire weapons were the most effective forms of castle defense. The height benefit and battlements allowed archers to fire up to 12 arrows per minute, and then take cover while the enemy fired back. Many castles also had other counter-offensive weapons such as

Monday, October 28, 2019

Warren Buffet Case Study Essay Example for Free

Warren Buffet Case Study Essay Executive Summary: On May 24, 2005, it was announced that Berkshire Hathaway would acquire PacifiCorp. from parent, Scottish Power, for $5.1 billion in cash and $4.3 in liabilities and preferred stock (Bruner, Eades, Schill). After the announcement of the acquisition, the market responded very positively the same day. Berkshire’s stock price had increased by 2.4%, PacifiCorp.’s parent, Scottish Power’s by 6.28% and SP 500 closed up 0.02%. Berkshire Hathaway’s 2.4% shares increase was equivalent to $2.55 billion. Since this is not consistent with results of other acquisitions of the same order, it must be Warren Buffet’s â€Å"cult†-like following that allows this to happen. Rather than rationally studying the market information of the acquisition, the general public puts their trust in Warren Buffett as an investment guru. Berkshire held many different types of industries in their portfolio, but prior to the acquisition of PacifiCorp., Berkshire did not have significant investment in the energy sector. The now more diversified investment portfolio of Berkshire after the acquisition was expected to provide more stable returns. Often throughout the case study, Buffett’s view on a company’s â€Å"intrinsic value† was spotlighted as one of his predominate investing strategies. Book value and the investment outline are the two alternatives to intrinsic value. Buffett rejects them because these alternatives neither can give clear and accurate information about the expected profit in the investment. A company’s intrinsic value, though, is a company’s value relative to the present value of its discounted future cash flows (Bruner, Eades, Schill). And this is how Buffett evaluates his investments, asking will future cash flows provide an acceptable return on investment. Problem: The primary problem in the Warren Buffett case study would be whether or not the intrinsic value of PacifiCorp. justifies Berkshire Hathaway’s bid price? Secondary problems presented include how does the PacifiCorp. acquisition stand up against Berkshire’s â€Å"elephant only† approach to investing? Thus, whether or not PacifiCorp.’s acquisition would be able to further Berkshire’s already staggering annual growth rate of 24%? Analysis: Drawing from the financial statements in the text’s exhibits, PacifiCorp.’s annual operating cash flows equaled $1.76 billion. Given this calculation, it would seem as though it would be a relatively short time before Berkshire Hathaway would accumulate enough value on the acquisition for them to receive an expedient return on their investment. â€Å"The cost of lost opportunity† is a philosophy of Warren Buffett’s that also applies to this case (Bruner, Eades, Schill). By entering into the energy market with the acquisition of PacifiCorp., the firm can hopefully continue on their incredible growth rate trend. Without it, Berkshire would likely have eventually plateaued. Recommendation: It is advised that Berkshire Hathaway follow through with the acquisition of PacifiCorp. The firm will continue to cycle large sums of cash flows through their company with this deal, therefore inducing growth and also adding intrinsic value to their firm. The firm also has a lot to gain by entering into the energy market, which already has a stronghold on American interests and adds diversity to their portfolio.

Saturday, October 26, 2019

The Globalization of Anime Essay -- The Merging of Cultures

Anime is an art form as it expresses cultural phenomena about Japan and its people. Like most other countries, cartoon has existed in Japan throughout the 20th century and onward, which began with traditional drawings and comics that dealt with political, social, and historical themes. However, what separates anime from the rest is that the anime included a huge portion of Japanese culture within it. In every series that aired, they include special holidays like Natsu Matsuri—summer festival, tea ceremony, traditional clothing such as kimono, etc. One could, from watching anime, notice the characters’ behavior are different and food and customs are different from American or western cartoon. Strangely, these differences in the anime, eastern media features, appeared in the philosophy of Confucius. Confucianism has played an important role in creating and maintaining the social values and order such as forgiveness, manner, respect, loyalty, and honesty since the sixth century. While Japanese society has become so much different since the early postwar era, these same principles are still highly valued as they are in some other forms. Recent shà ´nen anime, anime for pre-teen and teen-age boys like Naruto and Bleach, is hooking their viewer with interesting storylines and action scenes while Confucian values spread. As this culture value mixed in, anime became interesting and seem to attract a wider audience every day because of its ability to make its audiences to see themselves in the show. The success of anime began with the famous Japanese artist Osamu Tezuka, one of the founding fathers of Japanese anime and manga. In the 1960s, Tezuka became a famous manga artist and was given the credit of creating Japan's modern anime i... ...r. Ed. Frank J. Lechner and John Boli. 4th ed. New York: Wiley-Blackwell, 2012. 88-94. Print. Focus on the idea of both the global and the local are affecting the world at the same time while globalization process keep spreading. Sen, Amartya. "How to Judge Globalism." The Globalization Reader. Ed. Frank J. Lechner and John Boli. 4th ed. New York: Wiley-Blackwell, 2012. 17-21. Print. Analyze more a better way to understand what actually globalization is while making a point that globalization is also beneficial to the whole world. Wang, Georgette and Yeh, Emilie Yueh-yu. Globalization and Hybridization in Cultural Production: A Tale of Two Films. Hong Kong: David C. Lam Institute for East-West Studies, 2005. LEWI Working Paper Series no 36. Illustrate the processes of hybridization, and the conclusion on the debate on the globalization of culture.

Thursday, October 24, 2019

The Effectiveness of Cognitive Behavioral Therapy on Treating Depressio

In this assignment I will introduce my research project and examine some of the issues surrounding my topic, take an initial look at the research papers I have chosen for my literature review and consider the wider context that the research took place in. I have chosen to look into the effectiveness of Cognitive Behavioural Therapy(CBT) on treating depression in primary care. I am interested in this particular area of counselling as my impression is that it is currently the favoured form of counselling that is offered when people approach their GP for help. Currently the National Health Service (NHS) in the United Kingdom recommend CBT as the best talking therapy for treating a wide range of conditions (Barret, 2009). As part of the UK government’s Improving Access to Pyschological Therapies (IAPT) scheme there is an emphasis on using CBT to help(Barrett, 2009). As I am interested in pursuing a career in counselling I want to find out more about CBT to see if this is a career path I wish to follow. There seems to be a logic in training in a field of counselling with good employment prospects but I would only want to do this if I also believed in it’s effectiveness. Therefore I would like to see if CBT is the best therapy for the NHS to use to help people, specifically those with depression. I have chosen depression as focus as I am aware of how many people are affected by depression and think that it is important that the NHS provides the best kind of help to these people. Through my job as debt counsellor and experiences of volunteering for the Samaritans I have spoken to many people with depression and am curious about what is the best way to help them. I want to look at how CBT compares to other alternatives avail... ... It is worth adding that to only look at the situation from a cost perspective does not consider the human suffering angle. It could be argued that it would be immoral to withdraw the option of therapy from the elderly because there is no economic incentive. In practice, however, Hebble (2004) found that old people do not receive the same level of help as those of working age. Holman’s study will provide an interesting insight into whether therapy should be provided more to the elderly. Having looked at the world surrounding the IAPT scheme and introduced the specific studies we have concluded this part of the literature review. Having gained an understanding of the political and social issues that influence the research. The next paper will look into the research methods used and consider what effect these methods may have had on the outcome of the studies.

Wednesday, October 23, 2019

Chemistry IA design format Essay

1.0.0- Introduction 1.0.1- Focus Question- If the mass of magnesium reacted with hydrochloric acid is changed will the temperature of the solution increase and the total mass decrease. 1.0.2- Hypothesis- If the mass of magnesium that is reacted with hydrochloric acid is changed the temperature of the solution will increase and the total mass will decrease. 1.0.3- Theory- The reaction between magnesium and hydrochloric reaction is written as follows, Mg(s)+ 2HCL (aq)—— (MgCl2(aq)+H2 (g) (Ng, 2008, pg 1). This reaction goes through two distinct changes that both have an effect on the energy change in the reaction. Enthalpy refers to changes in energy in a compound (Assut, 2008, pg 1). Two distinct changes can occur. An endothermic change occurs when the energy being absorbed is grater then the energy being released whereas and exothermic change is when the energy being released is greater than the energy being absorbed. Energy is absorbed when bonds are broken and energy is released when they are formed (Newton, 2008, pg1). Energy change cannot be directly measured. However energy change affects the physical force of heat. Therefore a heat change is indicative of an energy change. If the heat increase in the solution the change will be exothermic and if the heat decreases the reaction will be endothermic. In respects to the formula Magnesium forms an ionic bond with chlorine to form the salt magnesium chloride. When this bond is formed energy is released in the form of an endothermic change, this energy drop would be quite small however because the bond is ionic and does not take much energy to create since magnesium and chorine bond easily. However the second change is that hydrogen breaks off from chlorine in the hydrochloric acid and hydrogen is released as a gas. The breaking of bonds would absorb energy therefore forming an exothermic reaction. Hydrogen and chorine however form a very strong covalent bond. Covalent bonds form between atoms with similar electronegative forces and are there for take a lot of energy to break ( Anissimov, 2008, pg 1) Since the endothermic change is weak and the exothermic change is strong it can be predicted that the overall change will be exothermic and therefore the solution will heat up. Temperature change in a chemical reaction can be measured with a device known as a calorimeter. A calorimeter measures the heat of the solution before the reaction has occurred and then again after the reactant has been added (Whel, 2008, pg 1). These two values can be mathematically manipulated to find the relative change in temperature. If two of the same substance have different masses it means there is more of the one substance. In a mass of a substance there is a certain amount of material that can be reacted. By increasing mass the amount of substance that may be reacted increases. Therefore if mass increased the amount that of substance reacted will increase as well providing there is enough of the reactant. This will in turn increase the energy change. Also if more of the substance reacts with the reactant more of the reactant will be used up. This means that if the magnesium is increased there will be more reaction with hydrochloric acid; this means that more hydrogen will be released as gas and the total mass of the solution will decrease. Henceforth the change in heat should be greater if their entire solution is lighter as more of the hydrochloric acid has been reacted and hydrogen lost as a gas. How the reaction works (Figure 1) Mg(s)+ 2HCL (aq)—— (MgCl2(aq)+H2 (g) 1.1.0- Controlling variables 1.1.1- Variables (Table 1) Variable Type of variable Method for control Mass of magnesium Independent Mass will change for each sample, sample range will be 2g, 4g, 6g, 8g and 10g Heat change Dependent This will be calculated by subtracting the final heat of the solution by the initial heat of the solution. The data will be gathered by using a calorimeter Change in mass in solution Dependent This will be calculated by measuring the weight of the solution and subtracting the weight of the calorimeter and the magnesium. The original mass not including calorimeter and the magnesium will then be subtracted by this value to mind the change of mass in the solution. Initial temperature Controlled The temperature of the solution will be heated to 25c and the reaction started immediately. External temperature Controlled The room temperature will be controlled at 24c Volume of hydrochloric acid Controlled The volume of hydrochloric acid will be 40mls per sample. Measuring apparatus Controlled A 50ml calorimeter with electronic thermometer and a scale with milligram accuracy. Time of experiment Controlled The experiment will be ended when reaction is fully complete and reaction will be given 10 seconds to calibrate before results are taken Replications Controlled Standard 5 replications of each sample will be performed. 1.1.2- Control used in comparison- The reacted samples will be compared against hydrochloric acid with no magnesium that is also 25 degrees Celsius. Since the temperature remains constant there should be no energy or mass change, this would mean that on a graph this would represent a straight line which others samples with energy changes (heat changes) could be compared to. – Bibliography Ng, H.N, 2008, Acid reactions, Vat.Gov.Un, Accessed 21/08/09, http://vat.maharashtra.gov.in/communicationcenter/QueryAnswerSubjectwise.php?start=3090&subId=0000000007. Asset, M.A, 2008, Chemical Enthalpy, Nasa.gov, Accessed 21/08/09, http://www.grc.nasa.gov/WWW/K-12/airplane/enthalpy.html Newton, R.N, 2008, Energetics and bonding, Unknown sponsor, Accessed 21/08/09, http://www.webchem.net/notes/how_far/enthalpy/enthalpy_diagrams.htm Anissimov, T.A, 2007 Chemical bonding, Simon Frasier University, Accessed 21/08/09, http://www.chem1.com/acad/webtext/chembond/ Whel, L.W, 2006, Calorimeters, Stanford University, Accessed 21/08/09, http://www2.slac.stanford.edu/vvc/detectors/calorimeters.html Acknowledgments The procedure of this experiment is a adaption of a previous class experiment. The source of the procedure is unknown, so thanks to Miss Crook for the inspirations for this design.

Tuesday, October 22, 2019

beethoven4 essays

beethoven4 essays Keep your eyes on him; some day he will give the world something to talk about-Wolfgang Amadeus Mozart (Orga 27). Beethoven was considered the greatest composer who ever lived, but all the truths lie deep inside his music. Beethovens symphonies were extraordinary. His innovative style was unheard of throughout the world during his time. There are three major symphonies that take beyond the Immortal Beloved referring to Beethoven, to his grave. Well-written and magnificent in the ears of every person who appreciated Beethovens works of art. Symphonies numbers 3, 5, and 9 were probably the best symphonies ever composed by a human being. Beethovens technique was unique in creating slow to fast tempos during the beginning of every piece. Each of his pieces had a meaning behind it. The mood of the music will tell it all just by listening to the joyous harmony each instrument played and the excitement whenever the tempo moved to a faster beat. Symphony number three in B-flat major, Op.55 titled Eroica was then the largest symphony at the time, and the first great symphony of the 19th century. In 1798, General Bernadotte, the French ambassador to Austria, suggested to Beethoven that he might write a symphony in honor of Napoleon. So Beethoven agreed to write the symphony for the great commander. But on May 18th, 1804, Napoleon crowned himself Emperor, and upon hearing the news Beethoven tore the title page in half, screaming that Napoleon would become a greater tyrant than anyone! (Orga 85). When the symphony was finally published, it was listed as a Heroic symphony, composed to celebrate the memory of fallen soldiers. The Eroica is important because it was Beethoven's first truly Romantic composition. Symphony No.3 uses a wide variety of tonality and the use of themes and motifs. The Eroica ...

Monday, October 21, 2019

DBQ bubonic plagues of the 14t essays

DBQ bubonic plagues of the 14t essays The plague that struck Europe in the late 14th century not only killed 25 million people, but also struck fear into hearts of families everywhere. This disease would push colonies into a harsh and limiting lifestyle. Classes though were affected in different ways. The higher class fled infected areas and left peasants and slaves to be feasted upon by the plague. Children died off, as others were held from schools by parents afraid of contracting the highly contagious disease. The people of the affected areas had no idea how the disease was formed, but there guesses were based upon filth in streets and animals. Today we know that their guesses werent far off. Rats that ran around towns were infested with fleas that carried the devastating plague. Coming in contact these filthy animals was common and what they didnt know, Contagious. After one contraction the plague spread threw towns and soon countries all over. The European trading nation in terror cut off all contact with Rome. All exportation had been terminated. This led to a severe decrease of manufactured goods and trade in general among nations. Everyone holding on to religion as one of their only forms of comfort took many hardships into play. To them the bubonic plagues meant three words: Death, Gold, and Gallows. The expense of gold came from the hired pest control, which would board families that carried the disease up in there homes leaving them to starve or die from infection. The word gallows stood for any person who violated the health regulations set. As the plague spread nurses became short leading to death in massive numbers. For everyone of the 15th to the 18th century the bubonic plague brought nothing but death. I believe that the phrase survival of the fittest must have come from this era where a plague devastated societies and took many lives. ...

Sunday, October 20, 2019

Matthias essays

Matthias essays The colonization of New England by English colonists sparked many changes throughout an environment that was already inhabited by the local Native Americans. This change occurred at many different, correlated levels. Both the economical and environmental states of this area, as well as all of North America would change forever. The most dramatic change occurred on an ecological level that can still be observed today. Ecologically, the coming together of both the Native Americans and the English colonists within such a rich and naturally abundant environment sparked an enormous decimation. The result is the exploitation and overall destruction of an ecosystem that existed untainted for thousands of years. As stated by Cronon, Whereas the natural ecosystem tended toward a patchwork of diverse communities arranged almost randomly on the landscape-its very continuity depending on that disorder-the human tendency was to systematize the patchwork and impose a more regular pattern on it (Cronon 33). By analyzing the two contrasting views of nature, by both the Native Americans and the colonists, it is possible to claim that the cause of this demise in the New England ecology was a direct effect of the labeling of the ecosystem as a commodity by the European colonists. In order to completely understand the cause of the destruction of the New England wilderness, a person must look at the manner in which both the Native Americans and colonists viewed nature as a whole. These two conflicting views allow for the ecological changes that occur after the colonization of New England in the 1600s. The Native Americans treated nature as a source of life and were solely dependent on it for survival. This dependence sparked a great respect that the colonists lacked. With this respect came a greater understanding and usage of the abundant ecosystem they strived on. The natives viewed nature as a...

Saturday, October 19, 2019

LGBT High School Students Research Paper Example | Topics and Well Written Essays - 1250 words

LGBT High School Students - Research Paper Example Basically, there are several factors behind support groups working for LGBT. To start with, such groups enhance comfort to the students through the provision of the necessary help in terms of guidance and counseling. To some extent, this promotes self-confidence and in that manner creating an atmosphere through which the learners do not feel discriminated by their fellow colleagues as well as teachers (Baur, 2008). Through guidance and counseling, the support groups ensure that students understand more in relation to LGBT and the way forward towards achieving success in life. A comparable reason as to why support group work for LGBT is to develop a sense of equality among all people. From a broad perception, it is agreeable that different support groups aim at helping LGBT in order to ensure that the standards of life are raised accordingly. In that case, working for the LGBT considerably determines the manner through which the lives of those people will be in future (Ramified & Deicer, 2003). Through encouraging them on their significance in life as human beings, support groups endorse approaches through which they establish a benchmark critical for learning and living. With the different support groups that exist in the present day, each has a role to play towards enhancing safety and equality in terms of the provision of education and other essentials in life (Hurst, 2001). A comparable reason as to why support group works for the LGBT is to in order to mingle with other youths and in that way making sure they share their secrets and emotions. On the whole, this considerably helps to avoid being isolated from the straight humans. Support groups as well deal with discrimination and recognition of LGBT students. Based on the support groups, an emphasis based on the fact that people should recognize LGBT as people with the human rights is enhanced accordingly.

Friday, October 18, 2019

Activity 6_16 Coursework Example | Topics and Well Written Essays - 500 words

Activity 6_16 - Coursework Example This paper evaluates different programs and their success in reducing unsafe conditions and acts. The first technique is promulgating and enforcing safety standards to reduce the hazards. This seeks to enhance safer working conditions for the workers. Most researchers recognize that a well-designed safety program with proper management can help reduce accidents and resultant costs. Ideally, safety concerns decline once an organization adopts an operative safety management system. The safety management programs involve training and motivation of employees through incentives, inspection and investigation of accidents, reinforcement of safe behavior, as well as safety committees (Verney, 2004). This defines a bottom-up approach that is worker-friendly and ensures effective involvement of all stakeholders to enhance organizational safety. The second technique relates to the use of personal protective equipment while working within an organization. Ideally, workers come across different hazards that may include toxic chemicals, sharp objects, machines, polluted air, and radiations that lead to long-term adverse effects. As such, it is important for all workers to put on personal protective equipment. This is for the safety of the workers, their families, and the working environment. Use of personal protective equipment also enhances workers’ motivation since they reduce the risk of contracting any potential infection (LaMontagne, Oakes, & Lopez Turley, 2004). Such employees develop the courage to carry out their responsibility without fear of unknown hazards. The third technique relates to hazard communication that offers relevant information to all workers in an organization. This is significant since it helps workers to beware of potential hazard so that they can be cautious. Communication is important in health and safety management

Ethical Issues During Louis XIV Research Paper Example | Topics and Well Written Essays - 1000 words

Ethical Issues During Louis XIV - Research Paper Example Spitting or scratching oneself at a table especially during meals is strongly discouraged but if at all one has to then he or she should do it politely and unnoticed. The above-mentioned laws are not immutable, they can be changed. For example in ancient times one could yawn, provided he or she did not speak in the process but nowadays it could be shocking to a person of rank. Spitting frequently is very much disagreeable but when there is need one should conceal it as much. When one spits he has to cover the saliva with the foot. When in the house a handkerchief should be used instead while turning aside. Care should be taken especially when spitting so as not to spit on one's clothes or those of others (Corey 78). One should not only spit in a handkerchief while in the house but also when in church and in places where cleanliness reigns. It is an inexcusable habit for children to spit in their playmates’ faces. Too it is a bad habit to spit out of windows, on furniture and o n walls. A series of quotations on spitting clearly shows that there has been a change in behavior towards a particular direction since the Middle Ages. Frequent spitting is still being viewed as unpleasant behavior and lack of â€Å"cleanliness† unlike it was seen almost four centuries ago. This clearly demonstrates how the civilization process has taken place (Hernandez 89). Taboos and restrictions of different kinds view ejection of saliva not as any other natural process but as a â€Å"primitive† and â€Å"uncivilized†. The distinguishing fact between the former and the latter is that the former views this as an external constraint while the latter sees it as an internal constraint (Lama 89). Elias asserts that even Louis xiv, who mostly is seen as the supreme among the omnipotent absolute monarch, proofs when scrutinized as a person whose rank as a king was in a certain network of interdependencies (Barrat 101). He preserved his power by a carefully calcula ted strategy which was under a peculiar structure of court society and by the society at large. Elias understood Louis xiv in the sense of light-recentre-thinking on the nature and structure of the French absolute monarchy. The personal rule of Louis xiv started in 1661, a time of great weakness when all the opposition was crushed. Louis xiv seemed to use the old Roman adage as the simplest strategy for his rule but he did not. From the experienced of the Fronde, the king knew that his ruler was under pressure of threats from below. Barrat asserts that to maintain his rule and avoid the unification of the court society against him, Louis had to exert more pressure (100). His genius, from Elias, was that he rose to perfection as a result of the careful assessment of the relationship of power at the court and the balancing of tension that was within it. He, therefore, succeeded by creating organizations which not only maintained the tension and the differences but also facilitated sup ervision. Louis xiv calculated strategy was implemented during his close to fifty-five years of personal reign. During the period he succeeded in maintaining his rank as a king and instilling the need for it in the French nobility. The king had to use all means at his disposal to maintain and enhance his power. The court and the etiquette as understood by the king were the most important instruments for his reign and power distribution.

Thursday, October 17, 2019

Answer question Essay Example | Topics and Well Written Essays - 250 words - 1

Answer question - Essay Example al banks, finance companies or asset management firms and determine the stableness of the organization by asking for the length of time in business; who the owners or major stockholders are; where are their other bank locations; and a preview of their financial performance (which is usually available through online sources). The number of credit cards that a person should have actually should depend of the person’s requirements and the capacity to pay. If a person needs credit cards for personal use only, then, one card should suffice. If the person needs a credit card for other purposes like to make credit availments for one’s small business, then, another card that could support and sustain the requirements could be availed in additional to the credit card for personal use. An expense which can reduce one’s tax burden is charitable contributions. According to the IRS (2011), the rules to be considered in cases of charitable contributions are that â€Å"charitable contributions are deductible only if you itemize deductions on Form 1040, Schedule A. To be deductible, charitable contributions must be made to qualified organizations. Payments to individuals are never deductible† (IRS, 2011, pars. 1 &

Business in Literature Essay Example | Topics and Well Written Essays - 1500 words

Business in Literature - Essay Example In the novel The Ladies Paradise, the new recruit Denise is not used to displaying her salesgirl charm and feel violated, defenseless and naked because she is treated like a machine for modeling clothes. The job requirement was that the women had â€Å"to be attractive for the sales rooms† she consents to be attractive according to the stores standards to the leering men and the unethical Monsieur Jouve who would harass the girls that worked in the store by forcing them to buy into his good-will and making sexual advances towards them which was seen as a privilege given his position as the owner. This goes against the moral concept of the market as the Monsieur is only seeking to maximize his profit in this case his sexual gratification. The fulfillment of self-interest will contribute to the common good in the market according to John Stuart Mill; the Mauss theory acknowledges that the market cannot ignore the ethics of self interest in the market. His anthropology is based o n the aspect of giving and receiving in the market as a basis for social integration that is important in the economic interactions. Honesty and respect acknowledges the morality of exchange and interdependence of social relations in the market. Mauss anthropology emphasizes that responsibility is a fundamental constituent of ethical subjectivity therefore responsibility for other human beings legitimizes economic actions. Tono Bungay novel offers an ethical critique of the impact of the late nineteenth century capitalist modernization in the homeland. The story also traces the effects of the accelerated economic transformation to the social arrangements and classes in the society. The ethical dilemma arises where the aristocrat society subjects the bourgeoisie to exploitation and machinations in entrepreneurship. There is a struggle of capital and labour. This also describes the modern

Wednesday, October 16, 2019

Answer question Essay Example | Topics and Well Written Essays - 250 words - 1

Answer question - Essay Example al banks, finance companies or asset management firms and determine the stableness of the organization by asking for the length of time in business; who the owners or major stockholders are; where are their other bank locations; and a preview of their financial performance (which is usually available through online sources). The number of credit cards that a person should have actually should depend of the person’s requirements and the capacity to pay. If a person needs credit cards for personal use only, then, one card should suffice. If the person needs a credit card for other purposes like to make credit availments for one’s small business, then, another card that could support and sustain the requirements could be availed in additional to the credit card for personal use. An expense which can reduce one’s tax burden is charitable contributions. According to the IRS (2011), the rules to be considered in cases of charitable contributions are that â€Å"charitable contributions are deductible only if you itemize deductions on Form 1040, Schedule A. To be deductible, charitable contributions must be made to qualified organizations. Payments to individuals are never deductible† (IRS, 2011, pars. 1 &

Tuesday, October 15, 2019

A Doll's House Essay Example | Topics and Well Written Essays - 500 words - 1

A Doll's House - Essay Example Torvald deals Nora as a father figure as he calls her with different names to indicate towards her inequality in the relationship such as â€Å"little sky-lark†, â€Å"little squirrel†, â€Å"little spendthrift been†, â€Å"little pet†, â€Å"little one†, little Nora†, â€Å"little song-bird† and many more. In every word used for Nora, little is used necessarily and indicates towards the fact that Nora is considered as a child like character who needs training and is in no way equal to her husband. Nora never minds such names and considers her a playful character for her husband’s pleasure and is always ready to amuse him. She acts like her husband’s puppet. She is like a kid who wants her elders to be happy with her. Nora takes some loan for the life of her husband and conceals this from him and when Torvald knows about her doing, he loses his temper. Torvald doesn’t realize that whatever Nora has done was for his own safety. He only sees his reputation and social status. He is unable to realize Nora’s love for him. He only blames her for injuring his reputation. At seeing the reaction of Torvald after reading the letter, Nora says: Nora has an increase in her knowledge related to her husband and herself. Here an increase in knowledge can be sensed. She knows that her condition is shameful in her marriage. Nora is able to see the true nature of Torvald by his reaction towards Nora’s doing. He calls her a â€Å"hypocrite, a liar, worse than that, a criminal† (Ibsen 75). Torvald’s abusive attitude towards Nora makes her understand her status as an individual in her household. She informs Torvald, She identifies her existence as a doll as she has no recognition of her own. She comes to know that she is unable to acquire her right as an individual by her husband and her father who are both highly domineering and authoritative. At the end when she wants to leave the

William Todhunter- Wartime letters Essay Example for Free

William Todhunter- Wartime letters Essay The whimpers of horses continued long after the firing had stopped. Those poor creatures- sent by fat old men to do their bidding. This great war. This perfect waste. Wipers November 8th Dearest Mamma, Your letter arrived on Thursday, but already that seems an age ago. Day and night seem to fall into one and at the moment we are under almost constant bombardment. The shells tend to fall behind us but you are never sure whether one might not have your number on it. It is difficult to get used to, but we are so tired that we fall into our dugouts as soon as we come off duty, snatch a mug of tea, and sleep in our damp clothes. I have been over the top several times now, but every time we have only got so far as the wire, and had to fall back under heavy German fire. It is simply ghastly out there in no-mans land, and the gung-ho patriotism we once felt has dissipated among the smoke and the stench of corpses. I feel particularly sorry for the poor horses, it is not their war. Still keeping hopeful for Tommys return. I am sure he will be back with us soon, as they have only been missing for a few days now, and scouting parties often go missing for several days. Still raining, and dark, heavy clouds are rolling in from the west. However we are bearing up and at least the falling rain and the heavy grey mud seems to constrain enemy activity, although we still have to watch out for sniper fire. It is terribly cold at the moment, in spite of our best efforts at putting small fires, even candles, in every nook and cranny to keep warm. And we have a hard time sleeping between the look out duties witch are two hours in every six. I am sorry this letter is a bit depressing, my mood matches the weather. Your Loving Son, William November 25th Gas. Cruel green hands of twisted nature. Grasping at the lives of innocent men. What can I do though? All I am able to do is stand. Wiped of emotion. Watching contorted faces of those whose masks had failed, I cannot even breathe on these occasions. Not out of being scared, but from utter helplessness. All is numb. How can I tell mother about this? How can I even write to her? Our letters are being censored anyway, so even if my hand could write, it would be snatched up, and I would be on duties. During the battle at Wipers we suffered many losses- far greater than those of the Germans. But more men are sent. Why do they come? Do they truly believe in the old lies? They remind me of how I was once- nai ve, patriotic and simply, blissfully ignorant. The mud is always up to our knees. Corpses often find their way into the dugout entrances. Supplies are shortening, and home is far away. Oh mamma, what if I am to die here? I cannot, could not, tell you of the possibility. God has left this place. Left it to rot in Hell on Earth. December 26th Dearest Mamma The strangest things have been happening over the past few days. I do not think there had been a single shot fired since the early hours of the morning of Christmas Eve, when the first carols were heard. After a while, the sound of German singing floated back over no-mans land and met our ears. In the afternoon, after we had had Holy Communion, a few foolhardy Germans appeared and exchanged some of their songs with us. It was the strangest thing. We had been blowing each other up for weeks, and then I suddenly found myself shaking hands with a sniper, who spoke a bit of English, and seemed nice enough. He must have been the same age as me, if not younger, but they may have different regulations for signing up there, and I forgot to ask him his real age. A few fellows followed them back, but returned safe and sound, missing only buttons and cigarettes, which they had traded for similar souvenirs. On Christmas Day, I had just finished morning service, and was heading down to our dugout, when I realised that a game of football was being played out in no-mans land against the Germans! I couldnt believe it, but climbed out and joined in. We lost, but it was good fun, and well played by the Huns! It was the queerest thing! Our dinner party was well enjoyed. It started with fried bacon and dip-bread; followed by Christmas pudding. But you can guess that we all were thinking of home. I think that it has been the most memorable Christmas I have ever spent, or likely to spend. I never expected to be shaking hands with Germans in enemy trenches on Christmas day, and I do not suppose you thought of us doing so either. So after a fashion I have enjoyed my Christmas. But who knows what the New Year will bring. Looking forward to hearing from you. Kind regards to all. Your loving son, William P. S. Dont forget to feed the rabbits! December 29th Dear Mrs. Todhunter, I regret to inform you of the death in action of your son, William. He was killed yesterday by sniper fire. The mood in the camp last night was solemn. I cannot stress how well the men regarded William. Always cheerful, always ready to lend a hand, always ready to share his rations. He will be much missed. His personal effects will be returned through the usual channels. Yours sincerely, Hugh Lonsdale (Lieut. ) Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Miscellaneous section.

Monday, October 14, 2019

Biometric Applications for Information Security

Biometric Applications for Information Security Chapter 1 1 .0 Introduction In recent times, the use of computer towards accessing information has increased and this has made our lives simplified in different ways, whereby easing people around the globe to communicate and share information. Due to this growing computer technology, the need for an improved network service which involves public accessing these devices is to be put in place. Generally, this advancement in knowledge towards the use of modernised technology has lead to the investigating and unveiling of new threats to computer system security which affects the todays organisations. From my research carried out it has been noticed that most organisations are in search of better means of improving their information security system, and also a cost effective means towards safeguards against fraud and impersonation .As we all know that data protection is a valuable resource which must be kept strictly, controlled and managed properly in an organisation. In the nutshell, the term security basically referred to as the protection and guidance of a system from unauthorised access, be it intentional or accidentally, irrespective of the service provided by the database management system. This work will generally involve the use of keystroke dynamics as a means of establishing a unique identity, which will be used as an additional measure towards enhancing information/data security in an organisation (e.g. Banks, Institutions, legislative departments, finance houses, production firms etc). This unique identity will help present a safeguard towards authenticating the acces s to computers by recognizing an individual based on his stored features i.e. mouse movement, keyboard application, typing rhythm etc. The protection of an information database system at all level in an organisational system, has over the years become an essential concern, this is as a result of different type of threats and unauthorised advances made by malicious individuals. Many organisations, over the years gone ahead towards the development and adoption of a stronger web-based services of computer controls, because from my research I gathered that information and transaction worth fortunes are been dealt with on a daily basis and the organisation has to ensure its protection by all means. Because any breach of security will lead to fatal destruction of the system. During my report it was noticed that in most organisational application, the access to information database system where usually restricted through the use of a login ID/password protection scheme. This has been in place for years and if by any means this scheme is breached, and then the organisations information is generally exposed towards any possi ble fraudulent misuse. During my research work I gathered that, hardware based security managed systems has a positive impact towards the reduction of unauthorised access by imposter. According to â€Å"David Zhang and Anil Jain† 2006, in there book â€Å"Advance biometric† it stated that acceptance rate is still study dependent and the results indicate that the false acceptance ratio (FAR) is still on the order of 5%, beyond the acceptable risk level of many organizations, considering the costs in terms of hardware and training time. In the nutshell it will be said that security and database plays an important role in all areas where computers are used, including business, electronic commerce, engineering, medicine, law, library science and many lot of more fields. I would like to give a brief definition of what database is all about and its surrounding topics on which we will deal with as we proceed on the project work. Generally, database can be said to be a cart where information are stored, updated and retrieved, it is a very important part of everyday life, and has to be secured from utterances. The term Biometric said to be gotten from the combination of the Greek words ‘Bios, which means life, and ‘Metrikos which is said to be measuring. This technology is said to be the ability to identify an individual based on their unique characteristic, which can either be physiologically (passive) or behavioural (active) characteristic mode of identification. Over the years it has been notice that one of the most secured and effective means of authenticating and identifying an individual involves the verification of their personal unique characteristic. This is sometimes usually done in conjunction with a PIN or token (known as multi-factor authentication) also by users name and password. One of the proper ways of managing biometric secured information database includes its registration, storage, and verification which is known as â€Å"Biometric Identity Management†. However, from research Information security is known to be one of the fastest growing areas in the IT world, and its efficiency is to be assured by minimising exposure to external and internal attacker. â€Å"Enhancing information security using keystroke dynamics (Behavioural Biometrics) as an additional measure in organisations† as my research topic was brought to light. This research report is basically aimed at reviewing information database security system and the use of keystroke biometric towards security enhancement, where by reviewing the effective implementation, design and management of information system in organisation, and protecting it from intruder. Also it will clearly highlight on the pros and cons of traditional means compared to biometrics means of application. I will strictly focus on keystroke biometrics, which is a human behavioural biometric whereby need for any form of physiological attribute, is not needed. This study (Information security and biometric application) will be place into the following stages: (Nanavati. S, (2002), Von Solms S.H (2000)) Identification and authentication An individual been identified and authenticated; Authorisation Being authorised to use certain resources; Confidentiality Ensuring confidential information i.e. data or software, stays confidential and accessible only to authorised individuals; Integrity Making sure only authorised individuals can change the content of data or software; Non-denial Ensuring that an individual cannot deny the authorisation of a transaction (e.g. in Banks), like changing the content of data. The deployment of Biometrics and the above stages will require a solid understanding of the technology and why it is been deployed, its mode of function, performance and accuracy will be looked into and analysed. Also the choice of which biometric application to use depends highly on the intended application of the system, here are some of the biometric applications in existence today: finger print; face recognition, hand geometry and iris recognition etc. Some of these biometric features are applied in areas like, time and attendance systems, voters registration, immigration and border control, access control, computer security, and financial firms. This project research work will involve a practical part of the application and to achieve the aims successfully, the following objective will be put into consideration. Objectives: Presenting details of biometric applications for information security purposes. Comprehensive review on information security threat, breaches, awareness solutions and discussing case studies on its effect on organisational system. Building / implementing a keystroke access database application. Critically analyse and evaluate the impact of the design keystroke enable database(Pros and Cons) To conclude on findings and recommendation for future developments of information security system. 1.1 Why the Study and Goals The scope of this study is to present, review and analyse problems which are been faced in organisations information security, where by been able to create and suggest a means of securing sensitive information from external sources and mostly internal sources. In recent times from information gathered it has been found that most security breaches /threat in organisations have been linked to internal sources. Here I will recommend a keystroke biometric application in organisations which are known to have a friendly environment between member of staff and the easy of sharing personal details, are on the high side. Generally I am not saying there are no securities measures in organisations to curb these intrusions, but as earlier mentioned most of these leakages are carried out by internal sources. But most organisations make use of traditional login process (user names and password, chip and pin). Alternatives to password-based authentication, keystroke biometric can either be used as an additional measure or replace the traditional method, this can help identify intruded and access are denied. A special focus will be on keystroke dynamics, in which firstly, the goal is to verbalize requirements which these alternative authentication schemes need to satisfy. After reviewing the alternative methods from a security and usability point of view, the result should be to answer the question whether the presented schemes is capable of being alternatives to password-based authentication mechanisms or not. 1.2 Related Studies. In the past and at present a lot of studies and researches is been carried out, in regards to users identification, verification and authentication, with their respective ways of securing information system. Keystroke dynamics was first introduced in the early 1980s as a method for identifying the individuality of a given sequence of characters entered through a traditional computer keyboard (R. Gaines, W. Lisowski, S. ). Keystroke dynamics originated from studies of the typing patterns exhibited by users when entering text into a computer using a standard keyboard. Researches in this field focused on the keystroke pattern in terms of keystroke duration and keystroke latencies. Evidence from preliminary studies indicated that typing patterns were sufficiently unique and easily distinguishable from one another, much like a persons written signature (R. Gaines, W. Lisowski, S., R. Joyce and G. Gupta ).Here are some studies which have been carried out towards information security such a s that conducted by â€Å"Arwa Al-Hussain (2008)†, â€Å"Biometric-based Authentication Security†, â€Å"Saleh Bleha†, â€Å"Charles Slivinsky†, and â€Å"Bassam Hussein†: â€Å"Computer-access security systems using keystroke dynamics†, â€Å"R. Joyce and G. Gupta†: User authorization based on keystroke latencies. And also â€Å"Revett, K. and Khan, A†, 2005, carried out a research on Enhancing login security using keystroke hardening and keyboard griddling. But In my research work I will look into all aspect of biometric applications in regards to keystroke dynamic application and it suitability towards detecting intruders trying to gain access into a database information system. 1.3 Problem Statement In this research which is to attempt the implementation of keystroke biometric and mouse application as a security measures towards preventing the gaining of access to sensitive data from unauthorised individual in organisation, also to prevent password sharing and identity theft from within and outside the organisation. To be able to achieve this, I will be looking into the different types of biometrics and the added advantage presented by keystroke biometrics in relation to cost and easy of application. Finally I will not neglect the difficulties that may be encountered towards the successful achievement and completion of this research, also all necessary steps will be taken to have a conclusive project work. 1.4 Outline of Dissertation Topics and Organisation The other part of this paper work is organised and subdivided in the following pattern. Chapter 2 will focus more on the in-depth of Biometrics application, the benefits of biometrics compared to traditional authentication methods, advantages and disadvantages of the different identification mechanism ,it challenges and effect on todays society and finally the different types of biometrics. Chapter 3 will concentrate on the information security issues, social engineering and security solutions presented by biometrics enhanced system. In Chapter 4 an in-depth analysis of the keystroke biometrics will be look into and its application towards information security. Chapter 5 will concentrate mainly on implementation of keystroke biometrics, a demonstration of its design application and functions, towards security enhancement and also user acceptability survey on the application mode will be analysed. Finally in chapter 6 I will conclude on findings and recommendation for future developme nts of information security system. Chapter 2: 2.0 Introduction: From my research it has been gathered that access to most organisation‘s computer systems which content various information are done by using authentication and identification means. The commonly used security approach towards identification and authentication is by â€Å"login process†, which involves the users ID and password. This has been in use for years towards the verification of a person trying to gain access to a computer information system. This mode of security approach has over the years been a big problem to most organisations security management system, as a result where workers could routinely share passwords with one another, sometimes forgetting their passwords or stored them in places which they could be easily seen by other people. This has lead to the level of security breaches, threats and fraudulent transaction increasing to a disturbing state, due to this the need for highly secure identification and personal verification technologies is being sear ched for. From researches carried out it has been found that biometric authentication can solve some of these problems, whereby help in reducing this growing security threat to a minimal level. Another importance of biometrics is its ability to improve the usability of a system since the person in use does not need to remember his or her passwords when trying to gain access to the information system. Biometrics as we know is not a new discovery to the world at large this has been in existence, during the BC and AD, just that of present more attention is been shown towards biometrics and its applications. 2.1 Why Biometrics Applications In the application of biometrics towards security setting is â€Å"Ten times† the security for that of traditional means and also cost effective in the long run. Due to issues relating to Identity theft, terrorism and increase in the general level of crime which have also combined to heighten the need for a just technology security approach.( Security Seminar K. Tracy 1998) Biometrics application over the years has been the recommended solution choice for many organisational systems towards information security, both privately owned and government companies are in use of biometric application towards maintaining secured environmental system for information sharing and distribution. Lets imagine the ability to unlock the door, obtain money from a machine, authenticate a credit card, retrieve information from a system or even start a car with just a glance at a camera or a touch, that is what bio application is all about and has helped to improve users security application by there uniqueness. 2.2 Introduction to Biometrics What Is Biometrics: The word biometrics is known to be gotten from a combination two words from Greek origin meaning (bios =life, metrikos (metrics) =measure).The terms Biometricshave been in existence since the 20th century and was used to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences (Nanavati. S. 2002). In the nutshell biometrics can be said to be an automated method in science and technology which is used in recognising, measuring and statistically analyzing biological data of an individual. These bio measurements are done based on ones physiological or behavioural characteristics, which can be used to verify the identity of the individual. Some of the examples of biological characteristic include DNA, blood group genes, whereby physical characteristics include fingerprints, eye retinas and irises, facial patterns and hand measurements, and behavioural characteristics include signature, v oice, gait and typing patterns (keystroke). One of the greatest important advantages of biometrics lies in the fact that physical or behavioural traits cannot be transferred to other individuals, or can they be forgotten. (Wikimedia Foundation, Inc, (2006),) 2.3 How does biometrics work? Biometrics can be classified in two main types, which are as follows: â€Å"physiological biometrics†, this involves the use of physical trait, such as a fingerprint, iris, hand or face for recognition of an individual. Here the physical traits are collected, then analyzed, measured and stored for use. In the case of fingerprint, it is automated through a numeric encryption of its ridges, splits, dots, valleys, furrows and minutiae points. This encryption is called an algorithm, creating a binary encoded template. The iris is also digitally stored using an algorithm in the same way. (Wikimedia Foundation, Inc, (2006)) The other type of biometric solution is â€Å"behavioural biometric†. This mainly involves the use of a persons behavioural trait or pattern, such as a voice, signature or key stroke. These traits are stored in the same way to that of the physiological traits except that they are updated regularly to be able to cope with the ever changing patterns in the trait. The both type of biometrics are relevant to different situations and circumstances. Naturally it has been gathered that physiological biometrics has proved to be more reliable than that of behavioural biometric, in the sense that physical traits generally stay the same all time irrespective of the age, while that of behavioural trait changes due to one or two situation which can be caused by advancement in age, learnt habit or accidental causes. 2.3.1 Mode of biometric operations: Identification: In biometrics operations, when the device/networked server hold a database of registered users and when these traits are presented, it is then authorizes the searching of the database so as to establish a match with the presented trait. In theory the device is asking â€Å"Do I know you?† This method of identification is called one too many (1: N) according to â€Å"www.posid.co.uk†. Authentication: The theory here is that the device is requesting â€Å"Are you who you claim to be†? By presenting a user id number or a Smartcard (containing the biometric algorithm) you then prove who you claim to be. In order to prove that this id number or Smartcard belongs to the user, one is requested to present his /her biometric trait directly to the device. You are authorized if they match and denied if they do not match. This method is called one to one (1:1) â€Å"www.posid.co.uk†. Authorization: In the nutshell this is known to be the last stage of a biometric system function, after identification the system search for a match and then confirms it authentication where by requesting unique feature and if matched with the stored details, you are then authorized. (Wikimedia Foundation, Inc, (2006)) 2.4 Importance Of Biometrics Over Traditional Authentication Methods:- In present times most organisation, make use of Login passwords, PINs, and token towards verification and authentication for gaining access to there information database system. This are mainly designed to help protect and secure the organisations computer information network and its applications. However in most cases these technologies have been discovered to having some problems associated with them, mostly when faced with modern technology applications, like online transactions, which could involve the accessing of sensitive information such as medical reports, financial or income support information. In order to reduce these increasing problems, biometrics features are been introduced in some of these computer information applications areas. As earlier stated, â€Å"Biometrics† is known to be an automated methods of recognizing and identifying an individual based on their physical or behavioural characteristics.†(Samir Nanavati, Michael Thieme, Raj Nanavati 2002) Ev ery individual different biometric characteristic which are unique and peculiar to them, no two person have or share the same biometric features. Some of the commonly known used biometric applications in todays society are facial, fingerprint, iris, hand scan, voice and dynamic signature. Biometric data application as a means and methods of identification is well preferred by organisation due to its several advantages over the known traditional method, which have been highlighted earlier in this chapter. Some of the major reason for the preference of bio data for information security system is that the individual to be identified is required to be present physically during the identification process, and this identification process does not require the need for password remembrance in any form. With the present increasing integration of computer, as well as internet usage in our day to day activities towards information accessing, this has called for a growing need to use a more pro tective method on information system assessing. This could be done by either replacing the PINs (traditional method) totally with biometrics or combining the both towards effective security measures whereby prevents unauthorized access to computer information system. As stated in previous chapter, one of the biggest issues with the use of PINs or passwords as a security measure is that it could be forgotten, likewise tokens such as passports and drivers licenses may be forged, stolen, or lost which is unlikely in biometric traits. Basically biometric applications can be used for real-time recognition, and the most popularly used is face, voice, signature, iris and fingerprint. (S.Nanavati, M. Thieme, R. Nanavati 2002) In view to biometric application compared to the traditional application, a biometric system is basically known to be a pattern of recognition of an individual by determining the authenticity of a specific physiological or behavioural characteristic possessed by the pe rson. Several important issues are put into place during designing a functional biometric system. Basically all biometric systems consist of three (3) basic elements, which are as follows: Enrolment: It is known to be the process which involves the collecting of biometric samples from an individual, and this is captured and stores in a secured template in a central database or a smart card issued to the user. Templates: This is a storage cart where all the data or information representing the individual/enrolees biometric features is stored. The template is usually been retrieved when identification is to be carried out on an individual.Biometrics system can operate using either verification (authentication) or identification mode. Matching: It is a process which involves the comparing and analysing of individual biometric details which has been stored in the database system templates. Mainly the enrolment is the first stage during authentication, in which a template is then generated and will be used towards matching of the users authentication. 2.4 Types of Biometric Technologies Biometric can be classified into two main classes which are Physiological and Behavioural biometrics, this involves two main modes of applications, which can be said to be contact and contactless biometric applications. The main function of biometric technology system is to assist in the controlling of access to a network system, and also helping to authenticate an individual by establishing there identity by comparing it with already stored details, which are unique to the individual. The most significant factor which enable the implementation of a biometric towards authentication is it uniqueness, i.e no two person can have same bio data and can not be lost or guessed. Looking at the recent increase in the breach of information system, biometric authentication system is a more reliable, efficient and effective to reduce this increasing threat compared to the traditional password based authentication process. 2.4.1 Physiological Biometrics:- In this type of biometric application, the individual is required to have biometric features stored in the bio data storage device (scanner).This device is where the users details are collected and stored for feature use. Due to reason that a person or individual stores their bio-data and need to make direct contact when needed to gain access to an information system, has made many people have to consider this to be a technology which invades on ones personal privacy .Below are some examples. Fingerprint Evaluation: This is the most commonly used biometrics and the most advanced of all the biometric technologies and it is highly accurate. The challenges lies in varying quality of fingerprints across individuals and in dealing with wear in the defining irregularities in the ridges and valleys of ones finger (Nanavati. S, (2002),). New technologies have recently employed the use of pattern matching and ultrasonic scanning rather than evaluation of the irregularities which has increased the accuracy of fingerprint scanning and reduced the risk of misidentification. By scanning the geometry of an individualshand, including height, width, shape and proportion, security systems can accurately recognize and identify individuals. This method is primarily used for physical access control and is considered the most useful in terms of durability and application. In fact, hand scanning is used effectively where other biometrics technologies cannot work due to frequency, volume, or environmental disruptions. Here is a finger print sample from Wikipedia. Retina Scanning: is considered among the most accurate of the biometric technologies through its evaluation of the shape and make-up of inner surface of the back of the eye. This method, while highly accurate, is also fairly costly and often perceived as difficult to use. Other complications include interference from foreign objects such as eye glasses or contact lenses. Further, scanning of a sensitive area such as ones eye decreases receptivity and willingness to use. Even so, the accuracy of retina scanning and the minimized risk of imitation make it useful in extremely high security areas where accountability is of utmost importance (Nanavati. S, (2002),) . Hand/Finger Geometry Hand or finger geometry is an automated measurement of many dimensions of the hand and fingers. Neither of these methods takes actual prints of the palm or fingers. Only the spatial geometry is examined as the user puts his hand on the sensors surface and uses guiding poles between the fingers to properly place the hand and initiates the reading. Hand geometry templates are typically 9 bytes, and finger geometry templates are 20 to 25 bytes. Finger geometry usually measures two or three fingers. Hand geometry is a well-developed technology that has been thoroughly field-tested and is easily accepted by users. (Nanavati. S, (2002),) See example below of a typical hand geometry. Iris scanning: This is similar to retina scanning in method and level of accuracy. However, its application is considered less intrusive and is thus becoming more common. Recently, it has been introduced into the airline and banking industries and while system integration remains a challenging part of implementation, improvements are continually being made (5). Facial Scanning: These applications are most often used in conjunction with other verification methods such as identification cards systems or with existing security cameras and monitors. This method utilizes high resolution images of distinct facial features such as eye sockets, shape of the nose, and/or the position of certain features relative to each other (1). Problems arise with this application if the subject is not properly positioned for the camera or if environmental changes such as lighting changes prevent an accurate read. (Nanavati. S, (2002)). 2.4.2 Behavioural Biometrics: Behavioural biometrics is said to be the ability for a system to be able to recognizing, identifying and authenticating a users based on there behavioural characteristic, which are unique to them. Basically this type of biometric can be learnt or developed over a period of time, and may follow a particular pattern of usage by the individual. Example of some behavioural traits used in biometrics is as follows: handwriting, speech, keystroke, walking pattern, e.t.c. In the nutshell, this type of biometric identification over a certain period can be changed due to some factors like age, weather etc. As a result of the changes in this type of biometric application, for the system to still maintain a secured system training or registering repetitions is to be carried out from time to time. Some of the behavioural biometrics are stated here below and will be explained further as we proceed in this research work.( Nanavati. S, (2002)) Signature Verification: This verification means has been existing for a long time, they are mostly used in the banking sectors to identify individual who make use of there services. They are used mostly to give authorisations to documents like cheques, contracts and sensitive documents. Despite its long time existence, automating the recognition process remains a challenge because peoples signatures are not always identical and can change drastically over time. These changes could be as a result of some factors like old age, mental or physical state e.t.c Voice Recognition: Is a behavioural biometrics which is mainly based on an individuals speech pattern. Here a persons voice is compared or recognized based on its previously recorded stored voice output. Voice verification is a sensitive biometric type of approach because of its acceptability by a lot of user and also high rated error could be significant since it is not really invasive like the physiological biometrics, an example of its use is in â€Å"telephone transactions†. (Nanavati. S, (2002)) Keystroke Biometrics: This type of behavioural biometrics is an automated method of examining and monitoring the typing patterns of an individual on a keyboard. The technology examines and determines the dynamics characteristic rhythms, speed, and pressure, also calculating the total time used in typing a particular word, the time the individual or user takes to hitting certain keys. This technique could be combined with the traditional password system to improve security when accessing sensitive information on computer systems using keyboards or mouse .Basically this method of verification is quite new and still in it development stage, but not to say it has not been in use. Also the â€Å"keystroke biometrics is of high flexibility† because it can accommodate the changing of password over a time when users observes behavioural changes. The keystroke biometrics as it has advantages so does it have its disadvantages as well. In the nutshell these said biometrics applications (Keystroke biometrics) will be talked about more as we proceed in the research work. 2.5.0 Advantages and Disadvantages of the Different Identification Mechanisms. The pros and cons associated with specific devices are highlighted below: Fingerprint Readers Pros  · Not much storage space is required for the biometric template Cons  · Has traditionally been associated with criminal activities and thus users could be reluctant to adopt this form of biometric a

Sunday, October 13, 2019

Mantras Essay -- Mantra Spiritual Ancient Asia Essays

Mantras The Mantras are very spiritual things used by the ancient in Asia, now a days this form of meditation has expanded and everyone has access to it. A Mantra can improve your life style by teaching you the art of meditation, by bringing peace to your soul and by helping you control difficult situations. A Mantra is a form of meditation that has existed for a long time; it is used in the whole world and you don’t need to be religious to use it. A Mantra is a word of wisdom that brings you strength when going through a hard time; this word could be related to your religion but this isn’t obligatory. The most common Mantra is the â€Å"OM† which means God in an impersonal way but now days almost any holy word no matter what religion can be used as a Mantra. For example; the Catholic can...

Saturday, October 12, 2019

Graduation Speech :: Graduation Speech, Commencement Address

Betty Lou is right -- Our achievements of the past four years have been an honor. And so I offer my congratulations to each of you for achieving the honor that comes with high school graduation. Up to this point, high school may be the most exciting and difficult experience of our lives. We've enjoyed the carefree and happy times with WWF-style pep assemblies, dances, Junior T-P nights, and classes with friends. We've had our bad days too, though. The days when we forgot our semester project for C.I. at home, or when we couldn't stop falling asleep and Mr. Gnome made us get up to "open a window." But far worse were the times when we felt alone. We've all had days of personal crisis when we've felt rejected by those around us or alienated from them. Hopefully, we were fortunate enough to have had a friend come rescue us from isolation, but perhaps not. As senior year comes to an end and we walk away from high school into a much bigger and more complicated world, we should not leave our years at Tree without reflecting on time spent here together and remembering what we have observed across the country, especially in the last year. There is certainly no simple answer to the tragic events that have occurred at other high schools recently. We look at the tragedies of Jonesboro, Pearl, Fayetteville, Springfield, Edinboro, West Paducah, Moses Lake, Jacksonville, and Littleton and question the reason behind the violence that occurred. While finding an answer may be impossible, it is still wise for us to look for causes and most appropriate, to search for solutions. Many of the contributing factors are likely beyond our control and there is no way for us to prevent them. There are, however, plenty of little things that we do or can do that affect others more than we realize. For example, all of us should be quick to distinguish between what is friendly teasing and what teasing torments our peers. It may have lost some significance, having been repeated so often on the news and in health classes, but it is important to treat others with respect. We never know when we may cross the line and, though not meaning to, be a source of torment to someone else. We all need to become more sensitive to what crosses the line when interacting with others. It is for our benefit, as well as others, that we do this.

Friday, October 11, 2019

Range of sports injuries and their symptoms Essay

Physiological responses: damaged tissue, eg primary damage response, healing response, the clotting mechanism; the importance of scar tissue control in the re-modelling process; specific to injury, eg sprain/ strain (signs and symptoms of first, second and third degree), haematomas (inter/intra) Psychological responses: response to injury, eg anger, anxiety, depression, frustration, isolated from team mates; response to treatment and rehabilitation, eg anxiety, frustration, need for motivation, use of goal setting Marking Scheme Criteria P3 and P4 aim to address the issue of occurrence of sports injuries and the resulting symptoms, both physiologically and psychologically, as identified within the related content of the unit. If an explanation of both issues is detailed and contextualised sufficiently to the concept of sports injury then it is possible that grading criterion M2 and D1 (analysis) may also be achieved. It may be possible to assess this via the booklet  mentioned previously, or for learners to give a presentation on the issues, supported by a tutor witness statement/observation record to confirm achievement. Describe, explain and analyse the Physiological and Psychological responses common to sports injuries INTRODUCTION INJURY: Broken leg , (tibia and fibula) 1. David Buust 2.SPORTSPERSON: David Buust is a retired player who used to play for Coventry city football club from 1992-1996 he made 50 appearances for Coventry before getting tackled in the game against Manchester united two minutes into the game. Bussts injuries were so bad that there was a risk of his leg being amputated. But contacted MRSA which caused further damage to the muscle and tissue in his leg. After having 26 operations he was advised to retire by doctors. PHYSIOLOGICAL RESPONSES: (What are they) How the body responds when injury occurs it aims to repair and protect damages bones , muscles and tendons from further injury. For example if you had a cut it wold be the time it takes to heal. PSYCHOLOGICAL RESPONSES (What are they) The mental response of how an athlete deals with their injury and the way they respond to treatment and how the athlete copes with stress and possible depression that could result from the injury. Physiological responses Damaged tissue Describe, explain and analyse: A tissue can be damaged in many ways for example a athlete could be running and damage some tissue when they are running. The will then experience symptoms such as pain in the area where the tear is and the area would become red and could swell. An athlete could also damage tissue by overworking a particular area in the body for example if a person was in the gym and they overworked their biceps they could damage their tissue in their arm. Then they would have to rest until the tissue repairs itself. A damaged tissue would be treated by the RICE treatment method. David Busst response David Busst damaged his tissue in his right leg in a premier league match against Manchester united while playing for Coventry city on the 8th April 1996. The injury occurred when Busst went up for a corner and was sandwiched between to players who tackled him this left him with the bone in his leg ripping through his sock and effectively splitting his leg in two. This caused the Manchester united goalkeeper to throw up on the pitch. Busst`s tissue in his right leg was damaged even more while in hospital as he contracted MRSA which meant he risked having his leg amputated. This would mean that David Busst would have been in a lot of pain in the first few weeks of having the injury. The symptoms that David Busst would have had around his leg is redness and his leg being very painful to touch. Picture: The clotting mechanism Describe, explain and analyse: The blood clotting mechanism starts to work when we bleed. The blood clots start the healing process. Platelets are released by a chemical response when trauma such as a cut or a graze causes blood loss. The platelets clot quickly to as they stick to the blood vessels as the blood is sticky because of the platelets. The clotting mechanism is important as it is one of the parts of the healing phase. David Busst response The clotting mechanism would have started the moment David Busst broke his fibula and tibia. It would have started again to help him recover from his MRSA infection as it damaged his muscle and tissue so the blood clots from the blood mechanism would of got to work as quick as they could on David Bussts injury to limit the amount of injury that he would of suffered. Picture: This is blood clots forming The importance of scar tissue Describe, explain and analyse: The scar tissue restores the tissue on the exact spot of the injury for example if you had a deep cut like the diagram below where there has been a deep cut to the arm and the tissue has been restored as close a possible to its original state. Which leaves in a scar where the cut happened. Scar tissue will form as soon as an injury takes place . The repair phase occurs after a few hours of the injury occurring. David Buust response For example David Busst would have a significant scar tissue from where he broke his fibula and tibula as when he did break those bones they ripped through his skin meaning it was a compound break. It is likely that he would have a scar from where they bone went through the skin and a scar from where his leg was re straightened and put into his leg again. For example he may have a scar similar to the scar tissue in the diagram below but it may be very deep due to the extent of his injury. Picture: http://www.pennmedicine.org/encyclopedia/em_PrintPresentation.aspx?gcid=100098&ptid=3 The diagram highlights that the arm has been cut but has heal to the best of its ability. Specific to injury: (Haematomas (inter/intra)181 177 Describe, explain and analyse: There are two types of haematoma. The first type intramuscular haematoma this is where bleeding occurs within the compartment of the muscle but does not seep into any surrounding tissue. The second type intramuscular haematoma is where blood escapes into surrounding areas such as muscles or tissue and stays in that muscle or part of the body. David Bussts response David Busst would have had a Haematoma around the same size as the Haematoma in the diagram below as the injury was so severe it caused a lot of swelling and bruising causing a lot of internal bleeding as his leg was broken compundly meaning that blood would of seeped out of his leg meaning that he had a intramuscular haematoma since he was bleeding out and also a intramuscular haematoma as there would have been significant haematoma in his muscles. Which would of made it very uncomfortable for him to bear during the early stages of his injury. Picture: http://ic.steadyhealth.com/signs_and_treatment_for_hematoma.html David Buust would of suffered similar Hematoma due to the size of his injury. http://www.bmwmoa.org/forum/showthread.php?28029-Show-us-your-scars! Psychological responses 177/178 Describe, explain and analyse the response to injury, treatment and rehabilitation, including; anger; anxiety, depression; frustration;  isolation, need for motivation and goal setting. You could use a famous sports person and address all these issues from their perspective. When injury occurs the psychological response is divided into three stages. The first stage is when the injury actually occurs the second stage is then the recovery period where the injured individual begins rehab to get them back into sport. Then finally the third stage is where the athlete starts training and is able to play their sport again competively. Stage one 1. When David Busst experienced his injury the first thoughts he would of experienced the trauma of having such a horrific injury being inflicted on him and the shock of actually seeing his leg in a bad state and he would be very scared as he would be concerned as they injury was very serious and career threatening. David would also be very angry with the players that tackled him as the fact both players went for the same leg (as seen in the picture below) causing a serious injury. He would also be very frustrated that the injury has occurred to him since he it happened in a top flight game where he would have looked to show off his ability. http://www.goal.com/hk/slideshow/1630 http://www.taringa.net/posts/deportes/16564778/Un-tipo-con-mala-suerte-David-Busst.html Due to the nature of his injury David Busst would have been very traumatised by the state of his leg and obviously worried about his future in football. Stage two 2. The second stage is the recovery period this would have been very lengthy for David Busst due to the severity of his injury it his rehab would have been around 6 months to make sure that he was in the right frame of mind to try and get back into football. He will be scared and anxious as he had little chance of making a full comeback to football meaning that if he didn`t his career would be over. David Busst would have been of been isolated due to the fact that his team mates were training and he wasn`t. He could of become depressed while waiting to get back into football.As he was  waiting on the sidelines Stage three 3. This is where the player makes their comeback into the sport for example a footballer would make their recover back to football by training with the team and then playing for the reserve team and then being eased on by the manager of the team by playing as a substitute then starting the game the following week. David Busst would have lacked motivation to get into football as he knew that there was little chance of him making a full comeback to due to severity of his injury. When making his full comeback David Buust was approached by his doctor and advised to retire as because of the injury he suffered was so severe he would of risked not walking unaided again as the injury made his the leg very weak. There would have been goals for him to slowly achieve if the injury wasn’t as bad but since he was at risk of becoming disabled he retired so he could save the use of his leg. When he retired Coventry would had a psychiatrist helping me through coming to terms with his career being over and helping him avoid depression and help plan his future after football.

Thursday, October 10, 2019

Machiavelli vs. Thoreau (Compare and Contrast Essay) Essay

The way one should govern and the way for one to be governed will always be an ongoing struggle. How can a government maintain order and the safety of its people yet at the same time preserve its citizens’ natural right to be free? The ideas from Niccolo Machiavelli, an Italian aristocrat, who published â€Å"The Prince† in 1513 for a Medici prince as a guideline on how to rule a country, gives a conservative approach to how one should govern. Henry David Thoreau’s â€Å"Civil Disobedience† published in 1849, offers a liberal approach on how one should be governed. Machiavelli stresses the importance of maintaining order while Thoreau suggests reform. Although their views are different both men approach their positions in an aggressive manner. Machiavelli’s approach for his audience would be through fear and power while Thoreau’s approach for his audience would be through nonviolent acts, such as being a nuisance to the government. Machiavelli’s audience would be any person in a position of power, particularly that of a prince. Machiavelli uses aphorisms and historical references when introducing his argument. Not only would he present his argument but he also presents an opposing point of view and discredits it. Thoreau’s audience would be people who share his views on a less controlling and a moral government. Thoreau appeals to his audience through the use of aphorisms as well as analogies with which people would be able to identify. Machiavelli insists that a ruler must do whatever is in his power to rule his people regardless of whether his actions are moral or immoral and that â€Å"†¦it is safer to be feared than to be loved when one of the two must be lacking†¦.For one can generally say this about men: that they are ungrateful, fickle, simulators and deceivers, avoiders of danger, greedy for gain, and while you work for their good they are completely yours, offering you their blood, their property, their lives, and their sons†¦Ã¢â‚¬  (Jacobus 44). These comments support the pessimistic views that Machiavelli has about mankind. He theorizes that man is immoral therefore justifying a ruler being immoral. He states that in return for a ruler’s protection that a man must give his life. Contrary to Machiavelli’s views on morality, Thoreaus states, â€Å"That government is best which governs not at all† (Jacobus 145) and that â€Å"It is truly enough said that a corporation has no conscience; but a  corporation of conscientious men is a corporation with a conscience† (Jacobus 146). Thoreau believes that it is a man’s moral beliefs that would make a moral government. He believes that a man, if left at his own will, will do what is right and in return, if in government, will do what is right for the people. When governing a country, a ruler must have an army. In that aspect, Machiavelli states â€Å"A prince, therefore, must not have any other object nor any other thought, nor must he take anything as his profession, but war, its institutions, and it’s discipline†¦Ã¢â‚¬  (Jacobus 37) and that â€Å"†¦between an armed and unarmed man there is no comparison whatsoever, and it is not reasonable for an armed man to obey and unarmed man willingly, nor that an unarmed man should be safe among armed servants† (Jacobus 38). These statements suggest that a ruler must always prepare for war and military strength is more intimidating than any other type of force. In order to maintain a country, a ruler must have a strong army to defend it. Thoreau’s opinion on the military seems to differ in which he describes an army as â€Å"†¦small movable forts and magazines at the service of some unscrupulous man in power† (Jacobus 147). He clearly describes men as machines of a ruler lacking morals, rather than men protecting country. Machiavelli emphasizes a ruler maintaining order and control while Thoreau emphasizes on the citizens ruling or having an impact on their government. For example, Machiavelli’s approach on how this order can be established would be through appearance. When Machiavelli states, â€Å"And men in general judge more by their eyes than their hands; for everyone can see but few can feel. Everyone sees what you seem to be, few perceive what you are, and those few do not dare to contradict the opinion of the many who have the majesty of the state to defend them; and in the actions of all men†¦Ã¢â‚¬  (Jacobus 47), he is stating that what a ruler does that his citizens do not know about should not affect his reputation, as most people will follow the majority if the majority believes that their ruler is just and fair. He then continues to explain how this can be accomplished. Machiavelli continues to explain how a ruler can be deceiving when need be but can also be depicted as â€Å"†¦merciful, faithful, human, forthright, religious†¦Ã¢â‚¬  (Jacobus 47),  leader yet at the same time, he states, â€Å"†¦in order to maintain the state he is often obliged to act against his promise, against charity, against humanity, and against religion† (Jacobus 47). In these statements, Machiavelli is arguing that in order for a leader appear moral he is often subjected to immoral acts. Thoearu’s views seem to disagree with Machiavelli’s reasoning as Thoeau states, â€Å"A minority is powerless while it conforms to the majority; it is not even a minority then; but it is irresistible when it clogs by its whole weight† (Jacobus 155). Thoreau believes in the good in men and that every man will do what is right for himself and if he believes a government to be immoral then it should be a man’s duty to rebel for what is right. Although one might be a part of the minority, an impact can still be made if the group stands together. The power struggle between government and individual freedom has been and always will be a never-ending battle. Comparing Machiavelli’s standpoint, which would be order and control, and Thoreau’s standpoint, being individual freedom, would give one an idea of this conflict. Even though both men were from different countries and lived during different times in history, their contrasting ideas still live through people in societies today and will echo into the minds of others in societies to follow.

Wednesday, October 9, 2019

Module 4 - Case Business Ethics and Corporate Social Responsibility Essay

Module 4 - Case Business Ethics and Corporate Social Responsibility - Essay Example Further, society as a whole expects that the behavior of all the citizens should be such that society advances on its own rather than regress due to actions and behaviors. During the recent times, high profiled failures of large organizations, unethical behavior being associated with the senior executives of the firms as well as fraudulent business, and accounting practices have highlighted the need for emphasizing more business ethics. The current financial crisis has also highlighted the vulnerabilities of the financial sector of the world and how senior executives used the money given for bailout purposes as their own bonuses. The hue and cry by the public, therefore, has been mostly directed towards the unethical behavior of organizations towards different stakeholders. This paper will discuss ethical behavior of two organizations, i.e. Primark and Anglo American, and will explore costs and benefits involved as well as discussing one component from Svennson & Woods’ model. What is Ethical Business Behavior Every business has a responsibility towards the society, and ethical behavior outlines the rules and regulations which actually govern the ethical behavior of the firms. ... It is also important to understand that society expects from the businesses and as such, businesses have to correspond to the basic rules of the society. This, therefore, requires that firms should not engage any such behavior which can effectively go against the values and norms of the society. Some of the critical areas where firms often face critical choices in terms of ethical business behavior include finance, accounting, supply chain management, human resource management, and marketing. These are the areas where firm often engage into behavior which may not be entirely considered as ethical in nature. There have been incidents where firms have engaged into actions which were not considered as ethical. Incidences such as falsification of information presented in financial accounts, insufficient and inadequate working conditions for the workers, unjustified bonuses and high compensation levels of senior executives, etc., are some of the issues which have come under heavy screener of unethical business practices (Dowling, Festing, & Engle, 2008). How Primark Applies Ethics One of the key concerns for Primark is to source ethically because it has to deal with variety of third party sources. Considering the overall nature of business of the firm, Primark has to procure its merchandize from different suppliers scattered all over the world. Ethical issues, particularly with regard to the supply chain of the firm, arise due to adverse labor situation in suppliers’ countries. Although Primark is committed to provide excellent value to its customers, it is clear on the issue of not delivering such value on the expense of those who actually produce for the firm. As such, Primark attempts to balance

Tuesday, October 8, 2019

Social Media & Public Relations Essay Example | Topics and Well Written Essays - 1750 words

Social Media & Public Relations - Essay Example As the Internet has transformed into a sophisticated hub for ‘netizens’ so as to the nature of online communication and exchanges of propaganda, campaigns, and information drive (Duhe, 2007).These changes are obviously referring to the significant changes in the way Facebook, Twitter, and blogs provide means of communication outlets that are not available in the early 20th century. For this research, we will focus largely on the use of Facebook in revolutionizing the conduct of public relations in recent times. The Value of Social Media to Public Relations In the past, press releases were an integral component of public relations until online news releases agencies began to appear in the 1990s, creating a halt from too much reliance on fax machines and e-mails. As the years passed, press releases continued to exist but were also modified to fit the changes in the medium used. Press releases are now exchanged at a fast pace and in the most convenient way: using embedded m ultimedia. Green (2010) calls this as a creativity aspect of public relations that is driven by the swift breakthroughs in Internet programming and online software available as open source. Being creative is part of the trend in public relations, and according to Green (2010), this is an important component in being successful in public relations. According to Grunig (2009), the age of digitalization prompts a turnaround of events in the way public relations is conducted. However, with the greatest help that social media partake to the field of public relations, it is high time to shift the way things are conducted in this kind of specialization. Grunig (2009) mentioned that there is a need to â€Å"reinstitutionalize public relations as a behavioral, strategic† field rather than being an obsolete â€Å"symbolic, interpretive† field. Social media is regarded by many public relations professionals as an effective tool in â€Å"communicating with strategic publics† (Lewis, 2010, p. 1). Lewis (2010) further stated that the use of social media in public relations is also needed in teaching even college students to contribute to the growing success of the renewed public relations in the 21st century. With the latest applications and social media sites available for product branding and advertising, it is also a must to get acquainted with the wise use of social media, which is popularly known as â€Å"media literacy† (Lewis, 2010, p. 1). Even Facebook, for instance, has been widely suggested by PR instructors for their students to utilize in order to create an online community (Sutherland, 2011). Furthermore, the study conducted by Wright and Hinson (2008, p. 1) regarding the use of social media in public relations revealed that Facebook is considered the most important social media followed by â€Å"microblogging sites Twitter, search engine marketing, YouTube, electronic forums, and podcasts.† The study that started in 2005 was conducted to measure the impact of social media and other communication technologies in public relations. The results of the study show that social media â€Å"have brought dramatic changes† to the many aspects of public relations (Wright & Hinson, 2008, p. 2). The developments in terms of the