Wednesday, July 31, 2019

Evidence-Based Policing Essay

The police work of fighting crime is not on easy tack and requires many strategies, techniques and skills. To find the way to a certain problem police use their evidences to conduct a research to try to solve it. By experimenting their ideas they can find out if the curtain approach to the problem does work or doesn’t. The one of the advantages of evidence-based policing is that it design to help fight crime. Evidence-based policing is design to find the best available solution to the problem and give other police officers in other reagents the information on how to deal with that problem. It creates certain rules and guidelines for the low enforcement agencies. There are defiantly some disadvantages to the evidence-based policing. One of them is usage of opinions, because evidence-based policing is strictly based on evidence it takes away importance of people involvement. If people can not express their opinion they lose interest and involvement. Another two disadvantages of evidence-based policing in mi opinion that police experiments are expensive and might take a long time to conduct. One of the examples that I was able to find on line is called The Flint Experiment. That experiment was conducted in 1977 and the goal of that experiment according to the National  Center for Community Policing was to decrease the amounts of criminal activities and to increase the citizen’s perception of personal safety. The process of that experiment consisted of police officers patrolling the streets and not only fighting crime but also involving themselves in a community programs. That act of involvement in the community has resulted in decrease of the crime rates by 8.7 percent. Another result of Evidence-Based Policing that experiment is that citizens has started to handling minor problems by themselves which resolved in less calls of the citizens to the police. That allowed police to concentrate on more major problems. The second experiment that I found is called Kansas City Gun Experiment. The goal of that experiment was to reduce crime by seizures of illegal guns. The result of the experiment has shown according to US Department of Justice crime in those areas was reduced by 69 percent which shows the effectiveness of the experiment. References National Center for Community Policing,The Impact of Foot Patrol on Black and White Perceptions of Policing .Robert C. Trojanowicz, Retrieved on January 27, 2010. From : http://www1.cj.msu.edu/~people/cp/impact.html Office of Justice Programs. Kansas City Gun Experiment — Kansas City, MO Retrieved on January 26, 2010. From:http://www.ojjdp.ncjrs.gov/pubs/ gun_violence/profile20.html Schmalleger, F. S. (2009). CRJ100: Criminal justice today: An introductory text for the 21stcentury (10th ed). Upper Saddle River, NJ: Pearson/Prentice Hall.

Tuesday, July 30, 2019

Does Technology Always Improve Quality of Life Essay

In today’s globalised and modernised world, advancement in old technology resulted in modern technology and many discoveries have been made and quality of life of the people have improved as a result of availability of modern technology. Undoubtedly, modern technology has became a crucial and prominent aspects of our life. Although it has led to complications, it is actually reasonable to say that modern technology has very much improved the quality of life of people. Thus, I opine that modern technology does sometimes improve quality of life. Firstly, modern technology has improve quality of life through the improvement of healthcare services. Researches and development in the healthcare sector of society are conducted to find ways to make further improve quality of life. With the help of modern technology, for example, many different types of drugs and vaccines have been created and developed for disease prevention. The American medical announced that it is possible to vaccinate against brain cancer and perhaps more cancers can be vaccinated in a similar way. The chances of people contracting various illnesses are slim and thus, they live a healthier life. Some surgical procedures that were deemed extreme and dangerous in the past were made easier with modern surgical technology and the chances of succeeding was almost for sure, and one example is heart transplant. Hence, modern technology has lower the chances of us falling sick and increased the chances of recovering. Considering how modern technology has raise and increase life expectancy, allowing people to live healthier lives than before, it has proven to improve quality of life adversely for many people. Secondly, modern technology has improved transport and communication. In many countries, international trade is very important, as no one country can be self-sufficient in providing goods and services. This is especially so for a country like Singapore whereby we do not have a lot of natural resources and thus, our dependence on trade is large. Trade is heavily linked with transport and communication technology as they are vital for trade operations. For example, as a trading hub, Singapore has utilised modern technology to built cargo transportation cranes and in addition, communications between cargo ships and PSA improved and also position locating have became more accurate with the availability of modern technology. Hence more goods and services can be obtained and the people have more choices to consumed from, and they will be able to choice whatever is best for themselves, improving the quality of life. Thirdly, modern technology has increase productivity and made life easier for people as modern tools of production and industrialisation created by modern technology have enabled many countries to enjoy economical growth and create more wealth for the people and consequently creating better live for the citizens. For example, robots are used by many firms in Japan’s packing industries instead of human labour, and this robots such as the RF87 tokyo, are able to produce more output in a shorter period of time compared to human labour. This bring about increase productivity and consequently allowing success for the firms, and economic growth for the nation. Modern technology has also increase our access to information. Now, information technology is so advanced that we are able to find almost any kinds of information on the Internet just by typing certain key words in the search engines. With the increased efficiency and access to knowledge, society is able to identify opportunities for economic growth and with economic growth, quality of people’s lives can be improved. Furthermore, improving communication improves quality of life as information can be disseminated to everyone easily. Natural disasters in a certain country can be made known to the world almost immediately, thus allowing help to be provided quickly. For example, the earthquake that struck Haiti few years back was immediately reported to the rest of the world and countries like singapore were able to provide aid swiftly, so as to improve the quality of life of the victims. The needs of the people are catered to with the availability of modern technology, and has improve quality of life. Lastly, modern technology relieves global hunger. In the world, there are many people living in countries where they are faced with problems of lack of food, which may lead to starvation. This is especially so in developing countries where they are economically not stable and are not able to provide sufficiently for the people. Hence, with modern technology, for example, genetically modified food was developed whereby seeds of crops are injected with certain substances so as to develop traits that are favourable for a specific climate so as for the crop to grow well. Bacillus Thuringiensis(BT) bacteria is injected into corns to increase its resistivity to pests, and allowing them to grow in warmer environment. This allows more crops to be harvested. This is especially useful in third world countries such as Ethiopia whereby they live in regions that experience unpredictable climate, increasing food supply for the people, allowing them to stay nourished. Being more nourished, people will be less prone to falling sick as their daily nutritional requirements are met. Thus, they would live more healthy lives, improving their quality of life. Some people may argue that some of the certain substance used in the foods may cause allergic reactions to occur as some people maybe allergic to the substances. This may in turn lead to health problems, lowering quality of life. However, the efforts of developing GM food has largely improved the problem of hunger around the world, and as for the problem of allergies, this only affects very little amount of people, which can be solved for further advancement with technology. Hence, modern technology has improved quality of life’s. Modern technology does not always improve people’s quality of life, however, the benefits that modern technology has brought upon us greatly outweighs the limitations it carries. In our quest for development, we have no choice but to depend on and embrace modern technology, as the solutions for many problems in the world is dependant on modern technology. Modern technology has radically change the way we live and modern life will be greatly disrupted with technology.

Monday, July 29, 2019

BVC Company Law Assignment Essay Example | Topics and Well Written Essays - 3000 words

BVC Company Law Assignment - Essay Example Tyler from the directorship of the company was valid or otherwise. 3. Winding up proceedings, based on a statutory demand in proper form, have been commenced against the company. The petition has already been advertised and the company’s bank accounts have been frozen. The company wrote to the creditor, when underlying debt was first demanded, stating that the agreement was that the creditor’s invoices were payable after 60 days. I have been informed that the petition was given to a junior employee, who did not understand what it was, and it was not until very recently that Mr Henderson heard of it and immediately contacted the instructing solicitors. They also contend that since the bank accounts are frozen, it is not possible for them to pay off the petitioning creditor. Summary of Advice 4. As a director, Mr. Tyler owed a duty to take reasonable care and caution when dealing with the company’s assets. By misusing the credit cards of the company, he had breache d his duty. The removal of Mr. Tyler can be justified on the basis of his mismanagement of the company’s funds and his general conduct during the period of his directorship. The only problem in this regard is Article 11 of the Articles of Association of the company, where it requires the passing of a special resolution for the removal or appointment of a director. Under CA 2006, a director can be removed by simple majority but with special notice. The brief is silent about the special notice. Thus, a special notice and a chance of hearing to defend against the removal is mandatory before taking the decision of removal Mr. Tyler. Thus, his removal without these prerequisites can be invalidated. In my opinion, although the current directors have a prospect of getting a court decision in their favour, if a claim is brought under unfair prejudice Mr. Tyler can stake a personal claim or derivative claim or a claim for the just and equitable winding up of the company. In my opinion , the best option available to the company and its directors is to offer to buy Mr. Tyler’s shares at a fair rate. 5. With respect to the winding-up petition, Mr Henderson would like to dispute the petition on the basis of his letter to the creditor, when they first demanded the payment explaining that under the company’s standard terms and conditions it has 60 days time lag after receipt of invoices. The petition can be disputed, as the company has a policy to pay its debts within 60 days of receiving the invoice, which can be discerned from the company’s previous transactions. The company can apply for an injunction or an application for the rejection of the insolvency proceedings, but there are chances that the court may issue an order against the company, which will result in additional costs being incurred by them. In my opinion, the best option available to the company is to make an application to the court for the assurance of a validation order so that t he company can pay its outstanding debts. As the company’s accounts are held at one branch and the bank has frozen the bank account, the company can ask for a validation order to allow it to use its accounts to pay off the debts. Removal of Mr Tyler from the Directorship 6. Mr. Tyler was removed from his capacity as a director of the company during the last year, when the other directors decided that Mr.

Sunday, July 28, 2019

Your task is to use a range of such perspectives to analyse the Essay

Your task is to use a range of such perspectives to analyse the management and decision making at cadbury using several these viewpoints - Essay Example PRICE- should the products be priced higher or lower than those ÃŽ ¿f competitors? In local areas, most corner shops sell Cadbury chocolate at the same price as competitor e.g. Cadbury whole nut costs 35 pence, while a Mars bar and Galaxy bar cost 35 pence as well. PLACE- where will customers want to buy the products? Cadbury sells its products to shops (business) that deal with beverages and confectionery e.g. corners shops, super stores (Iceland, Sainsbury, Kwick Save, Tesco, Asda, Safeway), petrol station etc. these business are usually visited by customers on a daily bases. PROMOTION- where should the products be advertised, to suit the needs ÃŽ ¿f the businesss target market? Cadbury advertises its products on television, Internet, billposter, in beverages and confectionery business by hanging posters. This would help Cadbury to achieve ones ÃŽ ¿f its objectives, which is "to be the Number one product in a given market". By achieving this objective it would lead them to achieve the other objective, such as "maximising profit etc. (refer to objective on page 4). The research and development department is the department that researches new products and develops the old products. To remain successful, business must constantly work to create new and better products and processes. Development- this involves turning the findings ÃŽ ¿f the research into useful products or processes. If Cadbury had a mishap with a chocolate, the research and development department would try to correct the mishap. The research and development department must work closely with the marketing and production departments in particular this is because marketing and production are the beginning and end ÃŽ ¿f producing a product. Cadbury has more than one management style. This is so it has the best management. This is in terms ÃŽ ¿f efficiency, training, and knowledge and to focus more on the loyalty ÃŽ ¿f the workers in Cadbury. Cadbury has three management styles, which are: Democratic

Saturday, July 27, 2019

Argument Essay Example | Topics and Well Written Essays - 2500 words

Argument - Essay Example This paper begins with the basic argument that organizations are forced to deploy surveillance mechanisms in their workplaces because of unethical behavior of employees during work. However, personal confidentiality could be defined as a right of an individual to freely live his life without the interference from anyone else until he permits someone to do so (Bagdanskis & Sartatavicius, 2012). Organizations are bound to follow ethical code of conduct by the laws prevailing in the US. The basic purpose of this research is to decide whether these surveillance systems used by companies to monitor job activities of their staff are ethical or not. They do not appear to be as such from the first glance. However, final conclusion will be made after having analyzed available literature on ethical perspective of organizations’ employee surveillance systems. Fundamentally, organizations are paying their employees for the work they do, so they have every right to monitor them in the offi ce because, while employees are working, they are considered as an intellectual property of the organization; therefore, organization possess every right to ensure that they are duly working on the tasks assigned to them. On the other hand, organizations must pay their employees on time, provide them friendly and healthy environment to work in and should take the responsibility of providing health insurance. Once an organization fulfills its side of the contract, then it wins the right to engage its employees within the boundaries of their job description. The above argument may appear to be vicious. However, scholars must attempt to understand the basic goal of the organization that is to maximize the shareholders’ return. In order to fulfill this promise, organization cannot allow its employees to waste organizational resources on wishful internet surfing, for instance. At the same time, this paper urges its readers not to take this literary effort as an attempt to issue a free license to organizations to violate human rights through enslaving the workers by intruding on their privacy. On the contrary, it is highlighting a basic right of organizations to direct the professional endeavors of their employees. According to Evens (2007), more than eighty percent of American organizations installed mechanisms to monitor employees’ activities, which include close circuit cameras and other similar devices. In reaction to this trend many of the scholars rose voices in order to eliminate this practice. But they are not willing to appreciate the positive impact of this practice on employees’ productivity. Additionally, employees are saved from old fashioned scolding from their bosses as due to technological interventions the latter can monitor the former ones remotely. At the same time, covert surveillance motivates empolyees to keep on working because of constant monitoring in their offices. However, nowadays polite management is a norm, but this humbleness thrives on the concept of paycut due to any professional deficiency on the behalf of employees. On the other hand, organizations are expected to communicate the workplace management rules in order to keep their employees well informed about the mechanism of control, which firms tend to deploy (Dillon, Hamilton, Thomas, & Usry, 2008). However, there is a statistically inverse relation between workplace surveillance and job performance measures

Financial essay Example | Topics and Well Written Essays - 1500 words

Financial - Essay Example (Experian Plc. 2010) This company, in its history, has acquired numerous other corporations allowing it to expand its products and services. By 2009, Experian, Plc. declared in its annual report that its business now covers the provision of information, analytical tools and marketing services to organizations on a global scale which helps their clients manage risks, find and retain customers as well as automate decision-making. Experian, Plc. has a long history of mergers and acquisition. The main player in Experian’s development, however, was TRW. In 1996, TRW sold its Information System & Services Division to an investor group which in turn sold it to the British General Universal Store PLC (GUS PLC), which later merged the division with CCN. (Jentzsch 2007, p. 73) This conglomerate became what is now known as Experian and has an accumulated 240 million consumers in its file with a strategy guided by an aggressive acquisition around the world. (p. 73) Experian’s Information Solutions alone works with over 50,000 clients across industries including financial services, telecommunications, healthcare insurance, retail, catalog, automotive, manufacturing, leisure, utilities, property, e-commerce and government. (Plunkett 2006) As previously mentioned, Experian, Plc. follows an aggressive acquisition strategy around the world, successfully penetrating many European countries and as far as South Korea and South Africa. The latest of its overseas foray involved the acquisition of the full license to operate a credit bureau in India. This emphasis on merger activity is driven by the aim to gain competitive advantage by acquiring a wide range of services. According to Jenzsch, Experian has two other big rivals and that the competition is fierce with the high volume of credit reports needed by industries and consumers. (p. 74) All in all Experian’s range of merger activities reflect a vision which involved: The

Friday, July 26, 2019

Research Proposal Essay Example | Topics and Well Written Essays - 4000 words - 1

Research Proposal - Essay Example There are various rationales for why a prison inmate harms the self, ranging from psychological disturbances to even attempts to manipulate the prison officers to elicit change to their incarceration circumstances. Self-harm is a phenomenon that occurs with both male and female prisoners, thus it is not a gender-specific problem within the prison system. Statistics indicate that female prisoners, in 2003, represented only six percent of the total prisoners incarcerated in the entire UK prison system, but female self-harm constituted 46 percent of all national reports of self-harm in the country (Borrill, Snow, Medlicott, Teers and Paton 2005). Self-harm in prisons is costly to the prison system, taxpayers, and the health care system for those that require psychological counselling and, oftentimes, recurring medical treatment for this activity. The severity of the problem justifies conducting a research study to analyse the catalysts of self-harm, especially with female inmates that represent nearly half of all national reports of self-harm. Prison officers and medical practitioners have multitudes of responsibility for ensuring prisoner safety, ensuring the integrity of the prison system, and providing health care services to a broader population. Self-harm recurrences and its prevalence in the UK add significant burdens to the health care system and for prison officers that must develop documentation of these events and provide supplementary mental health services to recognised problem prisoners. Examine socio-historical instances of negative lifestyle scenarios that might exist in female prisoners, including, but not limited to, previous childhood or spousal abuse, mental health conditions, or stunted cognitive/developmental growth during various phases of child and adolescent development. The broader purpose of the study is to identify and categorise, statistically, the most frequent and common catalysts of

Thursday, July 25, 2019

Global virtual sales team Research Paper Example | Topics and Well Written Essays - 750 words

Global virtual sales team - Research Paper Example They are functioning to better comprehend the competencies that defines their global leadership strengths. Another challenge lies in the numerous strategies they are implementing. They are unsure which strategy would lead to successful outcomes in attempts to form global teams. Thus, it is a trial and error practice (Virtual teams, 2). The final challenge revolves around the issue of getting those in remote areas engaged. Most remote areas cannot enable the installation of technologies that global team’s use. Hence, people in the grassroots are constantly being left behind regarding virtual team recruitment and training. Accurate information from the rural areas has been rendered useless because it cannot be presented to the top management. The ultimate result is that investors besides some stakeholders cannot access the information. Recruitment and training of virtual teams can be done using online advertisement. One can be recruited when he or she clicks on the website. Ther eafter; they are trained on how to use virtual tools like teleconferencing or video tapes. With each member of the virtual team being in a position to use virtual tools, they can easily be managed by logging in and participation during virtual meetings. Enhancement in information technology eases data to easily avail in virtual teams. This step made it easy to train and educates virtual teams. For example, software for analytical presentation has made it easy for data to be easily availed (Sarah, 1). The software allows data to be presented instantly by using either the web or an intranet. This software also allows complex analyses to be calculated. This software is very useful during recruitment and training of people within the virtual team. Sales in virtual teams are achieved by the use of telemarketing. With a sales team that is effective, evaluating sales is made much easy. This is because the teams have experience on how to manage data related to sales despite their geographic al location. This is done with constant links with the top managers. When to hold virtual meetings among virtual team is an open issue. This is because it depends on the team characteristics. This includes the nature of sales and so on. Virtual meetings can be held at least once a month. However, if there is an urgent issue that needs to be addressed; the frequency increases... This is because there are a lot of uncertainties in the business environment which should be addressed as they arise (Marian, 2). Teleconferencing is one way in which virtual meetings can be held. Teleconferencing offers many advantages. One of them is that people participate regardless where one is. This means that travel expenses are not incurred. With efficient planning, virtual meetings have turned to be successful. The use of video feeds to conduct virtual meetings is also useful. All these methods of virtual meetings need a proper plan to ensure that all succeeds. The same skills that are used in non vi rtual meetings are applicable in virtual meetings. This also demonstrates that conducting virtual meetings is such a simple task. The first and most important step when leading a virtual team is to adequately equip them with the desired tools and skills. Thereafter, building interaction among the team members would be necessary. The rights skills are useful in creating balance between the social skills and technology interface... As a

Wednesday, July 24, 2019

Essay Questions Example | Topics and Well Written Essays - 250 words - 4

Questions - Essay Example The government can address this by penalizing through the imposition of high taxes those companies who are subcontracting or exporting jobs abroad. This will in effect discourage companies to export jobs because it will become expensive to subcontract jobs. This arrangement is still possible because the government did not prohibit companies to relocate work but only formulated a strategy that does not give business incentive to export jobs. 2. Explain the importance of East Asia as an economic powerhouse. Is economic or political power shifting from North America (and specifically the United States) toward East Asia? Explain. Which historical and economic reasons might prevent East Asia from acting as a unified region in world politics? In economics, US economy is about eight times bigger than China and has also massive industrial and technological complex that can sustain the output and growth of its economy.   Its currency is still used as the worlds  reserve currency and it is not likely that the US dollar will be replaced by other currency soon (Business Monitor International, 2009 pg. 23).  China on the other hand lacks multinational corporations and does not  even  have its own industrial complex making its economy heavily dependent on Western enterprise Also, the huge  size of US economy enables it to allocate a military budget equaled by none.   It only allocates 4% of its total GDP on defense but due to the sheer size of its economy, this translates to a $600 billion military budget (Jinghao, 2008).   US has also the most advance weaponry in the world.   US military arsenal is already capable of stealth combat with its F22 fighters and B52 long range bombers.   To date, US has already completed the informationalization of its military that is leading to the  Ã¢â‚¬Å"no man†, networking orientation which is a powerful global combat strength (Pastor, 2001).   United States is also capable of projecting power beyond its border.   Its 12

Tuesday, July 23, 2019

A Reader's Response to Gilman's If I Were A Man in Gilman's Short Essay

A Reader's Response to Gilman's If I Were A Man in Gilman's Short Story - Essay Example However, she also feels the animosities of men against women. She tries to defend women’s abilities and sensibilities. Most especially, in the ending, Mollie questions how religion attacks women. I can relate to Mollie’s feelings as man, where she awakens to the possibilities of being a human being who has rights and responsibilities. â€Å"If I Were a Man† is about a woman who understands the beauty of being a man. I have not exactly experienced what Mollie felt, because in my family, women are respected as equals of men. Nevertheless, I know women who are treated as chattel. It is the modern times, but some men can be so Neanderthal when it comes to their women. I know men like Gerald, who treat their wives shabbily, because they are women per se. In my experience, some women like Mollie have turned into men, because their men have been debilitated by disease or accidents. As a result, they have to be the breadwinners of their family. I understand how Mollie fe els, because I have also heard about women’s experiences in being figuratively a man and how they felt happier and stronger. As men, these women begin to understand the frivolities of women. Chrissie, a relative of ours, used to love buying the latest fashionable attire, but when her husband becomes paralyzed, because of an accident, she works three jobs to make ends meet. Talking with her no longer revolves around fashion, but around practical matters. Mollie sees hats as silly as a man does: â€Å"And all that money just for hats--idiotic, useless, ugly things!† (Gilman). Chrissie also finds fashion as fleeting and unessential to a woman’s essence. She also cuts her hair, which makes her manlier too, and yet in a vital sense, it has freed her. Chrissie says: â€Å"I cut my hair and I feel and think like a man. I feel so free to do everything I want.† She states that she understand now that a woman’s place should never be in a home only, unless th eir husbands value their contribution and never make them worry about financial conditions. She is a classic example of a woman who has changed her perspective about being a woman. More importantly, these women-turned-man feel tired from each day’s work, but less stressed; in short, they are happier because of the freedoms they have. â€Å"Talking† is a motif in the story. As people came and â€Å"talked† to Gerald, it stands for the political and social empowerment of men. Men can easily interact with other men and talk about political and social issues anytime. They have a â€Å"voice† in society. Marie, a woman whose husband died because of lung cancer, also feels the same way. She says that before, she does not care about social and political affairs, but now she does. She says: â€Å"As a taxpayer, I deserve to know where my money goes.† I realize how being a woman can limit their participation in the public space. Furthermore, Mollie reveals man’s economic power and its role in their self-confidence: â€Å"†¦she felt what she had never felt before in all her life--the possession of money, of her own earned money†¦hers† (Gilman). This statement underscores how a woman feels to have money of her own. She does not have to beg, tease, or wheedle to have money given to them by their husbands. Bills suddenly do not have to be something to be stressed of, but something that can be rid of through hard work and perseverance. These women are stronger, because they have acquired a man’

Monday, July 22, 2019

Title IX Essay Example for Free

Title IX Essay Introduction Title IX, the first comprehensive federal law that prohibits discrimination in educational institutions on the basis of gender was passed in 1972. It was modeled after the Title VII of the 1964 Civil Rights Act. It states that, â€Å"No person in the United States shall, on the basis of sex, be excluded   from participation in, be denied the benefits of, or be subjected to discrimination under any education program or activity receiving Federal financial assistance† http://www.american.edu/sadker/titleix.htm Before its enactment, American colleges and universities were accused of discriminating against female students. Women were discouraged from pursuing higher level course work, especially mathematics and the sciences. This was done by setting rules that automatically benefited men and ruled out women. As a result, admission opportunities for women were low. This necessitated the drafting and passing of the Title IX to stem these tendencies.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Application   It was a law designed to protect students and employees of educational institutions against discrimination based on their sex. Under this law, education institutions are required to observe policies, practices and programs that do not discriminate. This means that in any educational institution, males and females are expected to receive fair and equal treatment in all spheres of public schooling, recruitment, admissions and educational programs and activities. In addition, fairness should be observed in the courses being offered, counseling, financial aid towards these activities, employment assistance, housing health and insurance benefits. Furthermore, other areas like marital and parental status, scholarships, sexual harassment and athletics should be equally considered for both sexes. http://www.american.edu/sadker/titleix.htm The law applies to students, faculty and staff in federally funded education programs, th the elementary, secondary, college and university levels. It also covers affiliated programs and activities that receive federal funds like internships, correctional facilities, health care entities, unions and businesses. To be compliant to the law, you need to observe at least one of these things; demonstrate proportionate athletic opportunities for both sexes, have a history and continuing practice of expanding opportunities for under-represented sex, or full and effective accommodation of interests and abilities for the underrepresented sex. Another facet of the law requires that the total amount of athletic aid must be substantially proportionate to the number of male and female athletes. . http://bailiwick.lib.uiowa.edu/ge/aboutRE.html Further on, other programs should be taken into consideration; including equipment and supplies, scheduling of games and practice time, travel and per diem allowances, opportunity to receive academic tutoring and in addition receiving coaching, assignment and compensation. This is not all; Title IX requires that the institution provide quality locker room, practice and competitive facilities, medical and training facilities, housing and dining facilities, publicity, support services and equal opportunities for recruitment of student athletes. http://bailiwick.lib.uiowa.edu/ge/aboutRE.html   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The Gains and Losses Title IX has had both negative and positive effects depending on how it has been enforced. The benefits include the increase of opportunities for female students in both academic and extra-curricula activities. An example is where, in 1972, 44% of bachelors degrees were earned by women, whereas in 2000 they increased by 57%. About Title IX, Retrieved on 17th Dec, 2007, from  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://bailiwick.lib.uiowa.edu/ge/aboutRE.html In another instance, the number of girls’ athletics team has shown a marked increase from 1981 to 1999, with a 66% increase. However, in spite of these gains, Title IX has come under criticism for various reasons: According to Jessica Gavora, the law has had negative effects on the men’s sporting teams. She argues that following the Cohen versus Brown ruling in 1995, Title IX has been interpreted to guarantee that schools have the same proportion of male and female athletes, as well as representation in the students’ body. As a result, many schools have had to cancel some men’s programme in order introduce new women’s programme so as to fulfill the law’s requirements.(Gavora, 2002) She gets support from other quarters that claim that the law actually discriminates against males, with girls’ teams prospering at the expense of the boys teams. To most of them, Title IX equates to women’s sports. According to the Independent Women’s Forum, between 1992 and 1993, 42 wrestling teams, 53 golf programs, 16 baseball teams, 23 swimming programs and 39 tennis squadrons were cancelled in order to meet Title IX requirements. It is claimed that while this is going on, the coaches have the difficult job of going around scouting for female athletes, and have had to give the scholarships to just anyone, as long as it a female.   (Gavora, 2002) However, the proponents counter that the reduction in male teams is a product of other factors, and not Title IX. According to Amanda, the reduction in men’s teams is a result of declining interest, liability considerations by the colleges, financial constraints and choices about budget allocation among the sports teams that the school would wish to sponsor, rather than considerations of Title IX. (Amanda, 2004) In a court ruling in the Cohen versus University of Chicago the court stated that the call for relative interest tests, in which funds would be allocated according to the interest in sports among the sexes, could not withstand legal or policy scrutiny, because it disadvantages women and undermines the purposes of Title IX. Furthermore, the perceived lack of interest on the side of the women is actually a manifestation of women’s historical lack of opportunities, and not lack of interest. (Amanda, 2004) Another area of contention has been the Standardized tests. Here, the Federal Courts and Office of Civil Rights used the law to modify standardized tests so as to include writing section and double the weight of the verbal section in order to cater for the females who take the test. (Epstein, M, 2003) Title IX has also had some negative consequences in the social life at the institutions. Here, many instances of witch hunting have been taking place, with claims of sexual harassment and date rapes. In some cases, although the offence has been committed an individual, blanket accusations follow, whereby the whole institution is designated a Hostile environment, and can be sued for sexual discrimination. According to Gavora, the most extreme case is where a six year-old boy was suspended for kissing another student on the cheek. (Gavora, 2002) In another case, the National Women’s Law Centre filed a suit which claims that the New York City school board discriminates against female because the engineering classes are male dominated. (Epstein, M, 2003) On June 27, 2002, Rod Paige, the United States Secretary of Education set up a commission called the Secretary’s Commission on Opportunities in Athletics. In the findings, the general feeling among the people was that the law had good intentions but i but wrong enforcement. College administrators have complained that the United States Department has failed to provide clear guidance on the how post secondary institutions can comply with Title IX Standards and policy interpretations, as a result, the institutions have been left to their own devices on how to enforce it. There is also a feeling of failure on the part of the Department Office for Civil Rights to enforce the law. The way in which the department enforces the law also leads to undue elimination of men’s teams. (Secretary of Education Commission on Opportunity in Athletics, 2003)   Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Conclusion It is apparent that the current controversies about Title IX are not going to end soon, depending on which side one looks at it from. Many women than men seem to support the law. For the opponents, it is feared that in future, more problems are going to emerge in other circles of school life, like drama, dance and mathematics. People are going to use their own interpretation of the law to suit their own ends, which are not the original intentions of the law. But for the proponents, this is an opportunity to give girls the opportunity they have been historically denied. However from the discussion, it is imperative to review the law to get rid of its vague language, to make it more acceptable and objective.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  References About Title IX, Retrieved on 17th Dec, 2007, from  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://bailiwick.lib.uiowa.edu/ge/aboutRE.html Amanda, H. (2004) Counter point: Title IX , â€Å"A Healthy Start, Still a Long Way to go† The Docket. Retrived on 17TH Dec. 2007, from www.docketonline.com Epstein, M (2003) Title IX, Retrieved, on 17th Dec.2007 from LewRockwell.com Gavora J. (2002) Tilting the Playing Field: Schools, Sports, Sex and Title IX http://www.american.edu/sadker/titleix.htm Kathryn J.L (2002), Spoiled Sports. Tilting the Playing Field: Schools, Sports, Sex, and   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Title IX book review, Retrived on 17th Dec. 2007 from BNET.com United States Department of Education, (2003)† Open to all† Title at Thirty:   Secretary of   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Education Commission on Opportunity in Athletics

Energy Drinks as an Emerging Social Problem Essay Example for Free

Energy Drinks as an Emerging Social Problem Essay It seems like there is a new drink on the markets that I beginning to stir some questionable issues on health issues. It does not contain alcohol, but simply is packed with sugar and caffeine. Energy drinks are â€Å"in† right now thanks to the media advertising and trying to sell their products. Debate has been stirred on whether anyone should be drinking these drinks, especially young adults and children. The stimulants contained within energy drinks can disrupt the hearts rhythm, elevate heart rates, cause hypertension, anxiety, headaches, interrupted sleep patterns and in some rare cases can lead to seizures. All of the combined ingredients in energy drinks and their effect are still not fully researched and unknown of the consequences, but definitely it has been figured out that energy drinks are NOT good for the body. What is now just an issued because â€Å"according to doctors† ; might later turn into laws where there has to be an age limit to be able to buy energy drinks. More than likely they won’t become illegal, but there will be a restriction on them for the safety of the younger population in the United States. As mentioned earlier drinking energy drinks is started to become a problem because doctors played the role of claimsmakers. Right now they are trying to convince the general public that something is wrong and something needs to be done about it. To them, consuming energy drinks is a â€Å"troubling condition†. Because of this discovery that energy drinks are bad for the body, the media began to cover this issue. It is not a big issue right now and cannot be described as a social problem because this emerging social problem has really only gotten to the media coverage stage. Time will still tell what the public reaction is going to be. Right now it seems like there has been no reaction to this issue. There are still 3 stages this emerging social problem need to go through; policy making, social problems work, and policy outcome. The claimsmakers have used typifying examples to try to show that energy drink consumption really is a problem. Natural News. com mentions that a 15 year-old boy with ADHD went to the hospital and was suffering from a seizure after drinking two bottles of Mountain Dew and his pill, but energy drinks have 3 to 5 times the amount of caffeine that sodas do. The claims warrants here are simple; something needs to be done to protect the younger population from troubling and unhealthy choices. In conclusion, claimsmakers want restrictions on energy drinks to make it harder for young adults to consume; thus a healthier America. Energy drink consumption seems to be the cigarette of their generation for a lot of young people. Just how cigarettes ended up with laws being made for them, it is very possible that energy drinks will get some kind of restriction on them. This debate on energy drink consumption has begun to get heated and forecasting a big change in policies for energy drinks are very possible in the near future. http://www. devonbate. com/energy-drinks-that-big-of-a-deal/ http://www. foxnews. com/health/2011/02/15/energy-drinks-harming-kids/ http://www. naturalnews. com/032786_energy_drinks_side_effects. html.

Sunday, July 21, 2019

The real-time transport protocol

The real-time transport protocol Abstract This paper describes the Real-time Transport Protocol (RTP) with the emphasis on the securities, confidentiality and authenticity. This system takes a media file as input, encrypt it and create a message digest on the encrypted data then transmit it to the user. On the other side the receiver again calculate digest and compare it with the received one, if match occurs then decrypt and play it in the real time player. In current specification of RFC1889, only the confidentiality is described and authenticity is left for lower layer protocols. This work made experiment both on authenticity and confidentiality. For authenticity MD5, SHA-1 and SHA-2 hash algorithms can be used and for confidentiality AES-128 and Triple DES cryptographic algorithms can be used. In fact, SHA-2 is better than other hash algorithms in terms of security but SHA-1 is better than SHA-2 in terms of time efficiency. On the other hand, AES-128 is better than Triple DES in terms of time efficiency and security. So SHA-1and AES-128 is chosen for authenticity and confidentiality respectively for the security of RTP. The experiment is performed on J2SDK1.5. Keywords: Real-time transport protocol; Transport control protocol; Cryptographic algorithm; Hash algorithm. 1. Introduction: In recent days Computer and Internet has become essential part of human life and people demanding more and more access and use data over the Internet in Real-time with efficient secure manner. A new protocol Real-time Transport Protocol (RTP) and its associated Protocols helping people to use data over the Internet in their real-time applications. In this paper, the analyses of the securities of RTP, an approach to modify RTP for authenticity are presented. Also the position of RTP in Computer Network Layers, its usage scenario and the importance of time consideration to transmit streams using RTP are discussed and shown their analytical results. RTP is intended to be malleable to provide the information required by a particular application and will often be integrated into the application processing rather than being implemented as a separate layer. RTP is a modular protocol. The usage of RTP for a specific purpose requires an application area specific RTP profile. RTP profiles are used for refining the basic RTP protocol to suit for a particular application area. RTP profiles define how and by which formats data is encapsulated to RTP packets. RFC 1889 defines basic fields for the transportation of real time data. It also defines Real-time Transport Control Protocol (RTCP), whose purpose is to provide feedback on transmission quality, information about pa rticipants of RTP session, and enable minimal session control services. RTP is an application level protocol that is intended for delivery of delay sensitive content, such as audio and video, through different networks. The purpose of RTP is to facilitate delivery, monitoring, reconstruction, mixing and synchronization of data streams. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data. RTP is a protocol framework that is deliberately not complete. RTP dose not provide quality of service means that it has no flow control, no error control, no acknowledgement and no mechanism to request retransmission. It does not do so because if a missing packet is retransmitted then it might happen that the retransmitted packet reach to the user too late to use which may hamper real-time use of streams. If some packets are lost during transmission (it is very common for Real-time protocols) then the lost packets are generated by interpolation rather than retransmission. However to improve performance of RTP another protocol; Real-time Transport Control Protocol is used with RTP. It handles feedback on delay, jitter, bandwidth, congestion, and other network properties. RTCP also handles inter stream synchronization. The problem is that different streams may use different clocks, with different granularities and different drift rates. RTCP can be used to keep them in synchronization. RTCP is also supports the use of RTP level translators and mixers. The paper is organized as follows. In section 2, RTP use scenarios are discussed. In section 3, position of RTP in computer network is discussed. In section 4, time consideration in RTP is discussed. In section 5, RTP packet format, its data transfer protocol and Real-time Transport control Protocol (RTCP) is discussed. Section 6 details the hash and cryptographic algorithms for RTP security while section 7 shows the result and performance analysis. Lastly, section 8 points out the conclusion inferred from the work. 2. RTP use scenarios: The following sections describe some aspects of the use of RTP. The examples are chosen to illustrate the basic operation of applications using RTP. In these examples, RTP is carried on top of IP and UDP and follows the conventions established by the profile for audio and video specified in the companion Internet-Draft draft-ietf-avt-profile. 2.1 Simple multicast audio conference: A working group of the IETF meets to discuss the latest protocol draft, using the IP multicast services of the Internet for voice communications. Through some allocation mechanism the working group chair obtains a multicast group address and pair of ports. One port is used for audio data, and the other is used for control (RTCP) packets. This address and port information is distributed to the intended participants. If privacy is desired, the data and control packets may be encrypted, in which case an encryption key must also be generated and distributed. The exact details of these allocation and distribution mechanisms are beyond the scope of RTP. The audio conferencing application used by each conference participant sends audio data in small chunks of, say, 20 ms duration. Each chunk of audio data is preceded by an RTP header; RTP header and data jointly form a UDP packet. The RTP header indicates what type of audio encoding (such as PCM, ADPCM or LPC) is contained in each packet so that senders can change the encoding during a conference, for example, to accommodate a new participant that is connected through a low-bandwidth link or react to indications of network congestion. The Internet, like other packet networks, occasionally loses and reorders packets and delays them by variable amounts of time. To cope with these impairments, the RTP header contains timing information and a sequence number that allow the receivers to reconstruct the timing produced by the source, so that in this example, chunks of audio are contiguously played out the speaker every 20 ms. This timing reconstruction is performed separately for each source of RTP packets in the conference. The sequence number can also be used by the receiver to estimate how many packets are being lost. Since members of the working group join and leave during the conference, it is useful to know who is participating at any moment and how well they are receiving the audio data. For that purpose, each instan ces of the audio application in the conference periodically multicasts a reception report plus the name of its user on the RTCP (control) port. The reception report indicates how well the current speaker is being received and may be used to control adaptive encoding. In addition to the user name, other identifying information may also be included subject to control bandwidth limits. A site sends the RTCP BYE packet when it leaves the conference. 2.2 Audio and Video Conference: If both audio and video media are used in a conference, they are transmitted as separate RTP sessions RTCP packets are transmitted for each medium using two different UDP port pairs and/or multicast addresses. There is no direct coupling at the RTP level between the audio and video sessions, except that a user participating in both sessions should use the same distinguished (canonical) name in the RTCP packets for both so that the sessions can be associated. One motivation for this separation is to allow some participants in the conference to receive only one medium if they choose. Despite the separation, synchronized playback of a sources audio and video can be achieved using timing information carried in RTCP packets for both sessions 2.3 Mixers and translators: So far, it is assumed that all sites want to receive media data in the same format. However, this may not always be appropriate. Consider the case where participants in one area are connected through a low-speed link to the majority of the conference participants who enjoy high-speed network access. Instead of forcing everyone to use a lower-bandwidth, reduced-quality audio encoding, an RTP-level relay called a mixer may be placed near the low-bandwidth area. This mixer resynchronizes incoming audio packets to reconstruct the constant 20 ms spacing generated by the sender, mixes these reconstructed audio streams into a single stream, translates the audio encoding to a lower-bandwidth one and forwards the lower-bandwidth packet stream across the low-speed link. These packets might be unicast to a single recipient or multicast on a different address to multiple recipients. The RTP header includes a means for mixers to identify the sources that contributed to a mixed packet so that corr ect talker indication can be provided at the receivers. Some of the intended participants in the audio conference may be connected with high bandwidth links but might not be directly reachable via IP multicast. For example, they might be behind an application-level firewall that will not let any IP packets pass. For these sites, mixing may not be necessary; in which case another type of RTP-level relay called a translator may be used. Two translators are installed, one on either side of the firewall, with the outside one funneling all multicast packets received through a secure connection to the translator inside the firewall. The translator inside the firewall sends them again as multicast packets to a multicast group restricted to the sites internal network. Mixers and translators may be designed for a variety of purposes. An example is a video mixer that scales the images of individual people in separate video streams and composites them into one video stream to simulate a group scene. Other examples of translation include the connection of a group of hosts speaking only IP/UDP to a group of hosts that understand only ST-II, or the packet-by-packet encoding translation of video streams from individual sources without resynchronization or mixing. 3. Position of RTP in computer network: As a consequence it is decided to put RTP in user space but should run over User Datagram Protocol (UDP, it is connectionless transport protocol). RTP operates as follows. The multimedia (streams) application consists of multiple audio, video, text and possibly other streams. These are fed into the RTP library, which is in user space along with the application. This library then multiplexes the streams and encodes those RTP packers, which it then stuffs into a socket. At the other end of socket (in the operating system kernel), UDP packets are generated and embedded in IP packets. If computer is on an Ethernet, the IP packets are then put in Ethernet frames for transmission. The protocol stack for this situation is shown in Figure 1. Since RTP runs in user space not in OS kernel and in the Ethernet it packed by UDP, then IP and then Ethernet, so it is difficult which layer RTP is in. But it is linked to application program and it is generic, application independent protocol that just provides transport facilities, so it is a transport protocol that is implemented in the application layer. The packet nesting is shown in Figure 2. The main goal of RTP is to make the transmitting streams real-time applicable. On the other hand if security is provided to the transmitting streams, then some extra time is needed to encrypt the streams or to make signature such as making digest from entire movie or audio files. So in concern of time, security is added with some overheads to the RTP. The goal of this paper is to choose algorithms and procedures that make RTP reliable in term of time and security. 4. Time consideration in RTP: Let a video or audio file over the Internet in real-time is intended to access, then here the most important parameter is bandwidth of the Network. And the next important parameters are minimum clip size and its duration as well as processors speed of both server and client. At first let it be assumed that files are accessing without security consideration. Then let review the following mathematical calculations for audio or video clip to access in real-time. One second file clip size = oneSecFileSize bits, Time duration of each clip = cSec seconds, Upload Transmission rate = uRate bits per second, Download Transmission rate = dRate bits per second, Time to upload, tUpload = oneSecFileSize *cSec/uRate, Time to download, tDownload = oneSecFileSize If the time to upload or download a clip is more than the time to play a clip, the player will wait and the receiver will see a break, i.e. max (tUpload, tDownload) >cSec. For the continuous playing of clips, the following condition must be true: Max (1/uRate, 1/dRate) > 1/ oneSecFileSize Min (uRate, dRate) > oneSecFileSize According to the equation, the waiting time between clips at the receiver does not depend on clip size. The only variable that matters for a continuous playback is the size of a one-second file and that the provided upload and download rates meet the above condition. Lag time between playing and capturing is: cSec + tupload + tdownload From the above equation, the maximum lag with no break in the feed is 3*cSec and the minimum lag is cSec. To get the clip as close to real time as possible, cSec should be reduced. Next, apply the above analysis to the following cases: 4.1 Both sender and receiver have a low bandwidth modem connection: Lets assume the uRate = dRate = 20K bits/sec. In this case, the one-second file size should be less than 20Kbits. If the clip size is 10 seconds, the maximum playback lag will be 30 seconds. It is observed that the minimum file size for transmitting a one-second video (with no audio) is 8Kbits using H263 encoding and 12896 pixels video size. It is also observed a minimum file size with the video and an 8-bit mono audio with an 8000Hz-sampling rate to be 80Kbits. 4.2 Either the sender or the receiver has a low bandwidth connection: Lets assume that the lower rate is 20Kbits/sec and the other rate is much higher. In this case the one-second file size should be less than 20Kbits, but the maximum playback lag is about 20 seconds if the clip size is 10 seconds. 4.3 Both sender and receiver have high bandwidth: It is noted here that the one-second-clip size may vary from the format to format of the file, that is, how the file is encoded. For example the one-second-clip size of MP3 is less than in WAV file. But the important point here is that when cryptographic algorithms are applied in the clip then an extra time is added to the processing of clip with each side. So if applied strong encryption algorithms to the clip then extra more time is needed to both sides and upload or download time will be affected and time lag between them will also be changed. So real time access of data is also affected. Therefore, providing security in RTP the considered parameters are bandwidth of the network, file format of clips, upload and download of the clip, processor and memory speed and applying cryptographic and hash algorithms. 5. RTP packet format and data transfer protocol: RTP packet formats and its Data Transfer Protocol is as follows: 5.1 RTP fixed header files: Whenever data are transferred with RTP, it always add a fixed header with the payload. The RTP header has the following format shown in figure 4: The first twelve octets are present in every RTP packet, while the list of CSRC identifiers is present only when inserted by a mixer. Version (V) is 2 bits wide. This field identifies the version of RTP. The version defined by this specification is two (2). Padding (P) is 1 bit wide. If the padding bit is set, the packet contains one or more additional padding octets at the end which are not part of the payload. The last octet of the padding contains a count of how many padding octets should be ignored. Padding may be needed by some encryption algorithms with fixed block sizes or for carrying several RTP packets in a lower-layer protocol data unit. Extension (X) is 1 bit wide. If the extension bit is set, the fixed header is followed by exactly one header extension. CSRC Count (CC) is 4 bits wide. The CSRC count contains the number of CSRC identifiers that follow the fixed header. Marker (M) is 1 bit wide. The interpretation of the marker is defined by a profile. It is intended to al low significant events such as frame boundaries to be marked in the packet stream. A profile may define additional marker bits or specify that there is no marker bit by changing the number of bits in the payload type field. Payload type (PT) is 7 bits wide. This field identifies the format of the RTP payload and determines its interpretation by the application. A profile specifies a default static mapping of payload type codes to payload formats. Additional payload type codes may be defined dynamically through non-RTP means. An initial set of default mappings for audio and video is specified in the companion profile Internet-Draft draft-ietf-avt-profile, and may be extended in future editions of the Assigned Numbers RFC [9]. An RTP sender emits a single RTP payload type at any given time; this field is not intended for multiplexing separate media streams. Sequence number is 16 bits wide. The sequence number increments by one for each RTP data packet sent, and may be used by the rece iver to detect packet loss and to restore packet sequence. The initial value of the sequence number is random (unpredictable) to make known-plaintext attacks on encryption more difficult, even if the source itself does not encrypt, because the packets may flow through a translator that does. Time stamp is 32 bits wide. The timestamp reflects the sampling instant of the first octet in the RTP data packet. The sampling instant must be derived from a clock that increments monotonically and linearly in time to allow synchronization and jitter calculations. The resolution of the clock must be sufficient for the desired synchronization accuracy and for measuring packet arrival jitter (one tick per video frame is typically not sufficient). The clock frequency is dependent on the format of data carried as payload and is specified statically in the profile or payload format specification that defines the format, or may be specified dynamically for payload formats defined through non-RTP mean s. If RTP packets are generated periodically, the nominal sampling instant as determined from the sampling clock is to be used, not a reading of the system clock. As an example, for fixed-rate audio the timestamp clock would likely increment by one for each sampling period. If an audio application reads the blocks covering 160 sampling periods from the input device, the timestamp would be increased by 160 for each such block, regardless of whether the block is transmitted in a packet or dropped as silent. The initial value of the timestamp is random, as for the sequence number. Several consecutive RTP packets may have equal timestamps if they are (logically) generated at once, e.g., belong to the same video frame. Consecutive RTP packets may contain timestamps that are not monotonic if the data is not transmitted in the order it was sampled, as in the case of MPEG interpolated video frames. SSRC is 32 bits wide. The SSRC field identifies the synchronization source. This identifier i s chosen randomly, with the intent that no two synchronization sources within the same RTP session will have the same SSRC identifier although the probability of multiple sources choosing the same identifier is low, all RTP implementations must be prepared to detect and resolve collisions. If a source changes its source transport address, it must also choose a new SSRC identifier to avoid being interpreted as a looped source. The CSRC list contains 0 to15 items, 32 bits each. The CSRC list identifies the contributing sources for the payload contained in this packet. The number of identifiers is given by the CC field. If there are more than 15 contributing sources, only 15 may be identified. CSRC identifiers are inserted by mixers, using the SSRC identifiers of contributing sources. For example, for audio packets the SSRC identifiers of all sources that were mixed together to create a packet is listed, allowing correct talker indication at the receiver. 5.2 Multiplexing RTP sessions: For efficient protocol processing, the number of multiplexing points should be minimized. In RTP, multiplexing is provided by the destination transport address (network address and port number), which defines an RTP session. For example, in a teleconference composed of audio and video media encoded separately, each medium should be carried in a separate RTP session with its own destination transport address. It is not intended that the audio and video be carried in a single RTP session and demultiplexed based on the payload type or SSRC fields. Interleaving packets with different payload types but using the same SSRC would introduce several problems: If one payload type were switched during a session, there would be no general means to identify which of the old values the new one replaced. An SSRC is defined to identify a single timing and sequence number space. Interleaving multiple payload types would require different timing spaces if the media clock rates differ and would require different sequence number spaces to tell which payload type suffered packet loss. The RTCP sender and receiver reports can only describe one timing and sequence number space per SSRC and do not carry a payload type field. An RTP mixer would not be able to combine interleaved streams of compatible media into one stream. Carrying multiple media in one RTP session precludes: the use of different network paths or network resource allocations if appropriate; reception of a subset of the media if desired, for example just audio if video would exceed the available bandwidth; and receiver implementations that use separate processes for the different media, whereas using separate RTP sessions permits either single- or multiple-process implementations. Using a different SSRC for each medium but sending them in the same RTP session would avoid the first three problems but not the last two. 5.3 Profile-Specific modifications to the RTP header: The existing RTP data packet header is believed to be complete for the set of functions required in common across all the application classes that RTP might support. However, in keeping with the ALF design principle, the header may be tailored through modifications or additions defined in a profile specification while still allowing profile-independent monitoring and recording tools to function. The marker bit and payload type field carry profile-specific information, but they are allocated in the fixed header since many applications are expected to need them and might otherwise have to add another 32-bit word just to hold them. The octet containing these fields may be redefined by a profile to suit different requirements, for example with a more or fewer marker bits. If there are any marker bits, one should be located in the most significant bit of the octet since profile-independent monitors may be able to observe a correlation between packet loss patterns and the marker bit. Addit ional information that is required for a particular payload format, such as a video encoding, should be carried in the payload section of the packet. This might be in a header that is always present at the start of the payload section, or might be indicated by a reserved value in the data pattern. If a particular class of applications needs additional functionality independent of payload format, the profile under which those applications operate should define additional fixed fields to follow immediately after the SSRC field of the existing fixed header. Those applications will be able to quickly and directly access the additional fields while profile-independent monitors or recorders can still process the RTP packets by interpreting only the first twelve octets. If it turns out that additional functionality is needed in common across all profiles, then a new version of RTP should be defined to make a permanent change to the fixed header. 5.4 RTP header extension: An extension mechanism is provided to allow individual implementation to experiment with new payload-format-independent functions that require additional information to be carried in the RTP data packet header. This mechanism is designed so that the header extension may be ignored by other interoperating implementations that have not been extended. Note that this header extension is intended only for limited use. Most potential uses of this mechanism would be done better another way, using the methods described in the previous section. For example, a profile-specific extension to the fixed header is less expensive to process because it is not conditional nor in a variable location. Additional information is required for a particular payload format should not use this header extension but should be carried in the payload section of the packet. If the X bit in the RTP header is one, a variable-length header extension is appended to the RTP header, following the CSRC list if present. Th e RTP header extension is shown in figure 5: The header extension contains a 16-bit length field that counts the number of 32-bit words in the extension, excluding the four-octet extension header (therefore zero is a valid length). Only a single extension may be appended to the RTP data header. To allow multiple interoperating implementations to each experiment independently with different header extensions, or to allow a particular implementation to experiment with more than one type of header extension, the first 16 bits of the header extension are left open for distinguishing identifiers or parameters. The format of these 16 bits is to be defined by the profile specification under which the implementations are operating. This RTP specification does not define any header extensions itself. 5.5 Real-time Transport Control Protocol (RTCP): RTCP is a coordination protocol of RTP. It provides some tasks to increase the performance of RTP. The RTP control protocol (RTCP) is based on the periodic transmission of control packets to all participants in the session, using the same distribution mechanism as the data packets. The underlying protocol must provide multiplexing of the data and control packets, for example using separate port numbers with UDP. RTCP performs four functions: The primary function is to provide feedback on the quality of the data distribution. This is an integral part of the RTPs role as a transport protocol and is related to the flow and congestion control functions of other transport protocols. The feedback may be directly useful for control of adaptive encodings, but experiments with IP multicasting have shown that it is also critical to get feedback from the receivers to diagnose faults in the distribution. Sending reception feedback reports to all participants allows one who is observing problems to evaluate whether those problems are local or global. With a distribution mechanism like IP multicast, it is also possible for an entity such as a network service provider who is not otherwise involved in the session to receive the feedback information and act as a third-party monitor to diagnose network problems. This feedback function is performed by the RTCP sender and receiver reports. RTCP carries a persistent transport-level identifier for an RTP source called the canonical name or CNAME. Since the SSRC identifier may change if a conflict is discovered or a program is restarted, receivers require the CNAME to keep track of each participant. Receivers also require the CNAME to associate multiple data streams from a given participant in a set of related RTP sessions, for example to synchronize audio and video. The first two functions require that all participants send RTCP packets; therefore the rate must be controlled in order for RTP to scale up to a large number of participants. By having each participant send its control packets to all the others, each can independently observe the number of participants. This number is used to calculate the rate at which the packets are sent. A fourth, optional function is to convey minimal session control information, for example participant identification to be displayed in the user interface. This is most likely to be useful in loosely controlled sessions where participants enter and leave without membership control or parameter negotiation. RTCP serves as a convenient channel to reach all the participants, but it is not necessarily expected to support all the control communication requirements of an application. A higher-level session control protocol, which is beyond the scope of this document, may be needed. Functions (i)-(iii) are mandatory when RTP is used in the IP multicast environment, and are recommended for all environments. RTP application designers are advised to avoid mechanisms that can only work in unicast mode and will not scale to larger numbers. 5.6 RTCP transmission interval: RTP is designed to allow an application to scale automatically over session sizes ranging from a few participants to thousands. For example, in an audio conference the data traffic is inherently self-limiting because only one or two people will speak at a time, so with multicast distribution the data rate on any given link remains relatively constant independent of the number of participants. However, the control traffic is not self-limiting. If the reception reports from each participant were sent at a constant rate, the control traffic would grow linearly with the number of participants. Therefore, the rate must be scaled down. For each session, it is assumed that the data traffic is subject to an aggregate limit called the session bandwidth to be divided among the participants. This bandwidth might be reserved and the limit enforced by the network, or it might just be a reasonable share. The session bandwidth may be chosen based or some cost or a priori knowledge of the available network bandwidth for the session. It is somewhat independent of the media encoding, but the encoding choice may be limited by the session bandwidth. The session bandwidth parameter is expected to be supplied by a session management application when it invokes a media application, but media applications may also set a default based on the single-sender data bandwidth for the encoding selected for the session. The application may also enforce bandwidth limits based on multicast scope rules or other criteria. Bandwidth calculations for control and data traffic include lower- layer transport and network protocols (e.g., UDP and IP) since that are what the resource reservation system would need to know. The application can also be expected to know which of these protocols are in use. Link level headers a

Saturday, July 20, 2019

Narrative of the Life of Frederick Douglass Essay -- Narrative Life Fr

Narrative of the Life of Frederick Douglass   Ã‚  Ã‚  Ã‚  Ã‚  The tone established in the Narrative of the Life of Frederick Douglass is unusual in that from the beginning to the end the focus has been shifted. In the beginning of the narrative Douglass seems to fulfill every stereotypical slavery theme. He is a young black slave who at first cannot read and is very naà ¯ve in understanding his situation. As a child put into slavery Douglass does not have the knowledge to know about his surroundings and the world outside of slavery. In Douglass’ narrative the tone is first set as that of an observer, however finishing with his own personal accounts.   Ã‚  Ã‚  Ã‚  Ã‚  When first introduced to Douglass and his story, we find him to be a young slave boy filled with information about those around him. Not only does he speak from the view point of an observer, but he speaks of many typical stereotypes in the slave life. At this point in his life, Frederick is inexperienced and knows nothing of the pleasures of things such as reading, writing, or even the rights everyone should be entitled to. Douglass knowing hardly anything of his family, their whereabouts, or his background, seems to be equivalent to the many other slaves at the time. As a child Frederick Douglass sees the injustices around him and observes them, yet as the story continues we begin to see a change.   Ã‚  Ã‚  Ã‚  Ã‚  With the progression of time we find Frederick Douglas begin to shift the tone to a focus within himself. The story begins to c...

Friday, July 19, 2019

The Development Of Desire :: essays research papers fc

The Development of Desire The development of the male warrior, throughout literature, has a direct relationship with the development of western civilization. The attributes a warrior holds, fall respectively with the attributes that each society held as valuable. These characteristics, started by societies ideals, become the warrior's only reasons for continuing their heroics. The ideals however do change with each warrior. At the beginning we have a warrior with one mission, which later the warriors become more challenged and have to change ideas and concepts to continue. The evolution of the warriors desires becomes the complex ideals that western civilization develops over time. With this progression of civilization, from simple to complex ideals, so will the evolution of the ideals and desires of our heroes change from simple to complex.   Ã‚  Ã‚  Ã‚  Ã‚  Odysseus is a man who is both strong and smart, but most known not for the brawn of his body, but the wits of his brain. A man who is loved in every country, but Trojan, and could stay where ever he chooses, his sailors knew this to be true as one bench mate to the next, â€Å"It never fails. He is welcome everywhere: hail to the captain when he goes ashore!† (Homer 166). The irony falls as Odysseus only desires his homeland. †Begin when all the rest who left behind them headlong death in battle or at sea had long ago returned, while he[ Odysseus] alone still hungered for home and wife† (Homer 1).   Ã‚  Ã‚  Ã‚  Ã‚  Odysseus has many opportunities to end his journeys and start a new life. For instance, if he desired, Odysseus was able to stay with Kalypso who wanted him forever, â€Å"Her ladyship Kalypso clung to him in her sea-hollowed caves- a nymph, immortal and most beautiful, who craved him for her own† (Homer 1). Kalypso knows even though she has Odysseus in her home, he is not hers to have. â€Å" Son of Laertes, versatile Odysseus, after all these years with me, you still desire your old home? Even so I wish you well†( Homer 87). To which Odysseus replies, â€Å"...Yet, it is true, each day I long for home, long for the sight of home...† (Homer 87). Another chance for Odysseus to start a new life is offered by the king of the Phaecians to marry his daughter and live there; â€Å"...seeing the man that you are, seeing your thoughts are my own thoughts-my daughter should be yours and you my son-in-law, if you remained. â€Å"( Homer 120). In each case, Odysseus, only wants to return to his wife Penelope, his son, and most of all his homeland.

Howards End :: essays research papers

Young, pretty Helen has left her London home to visit the Wilcox family estate, Howards End. (Helen and her sister Margaret met Mr. Wilcox and his wife while traveling in Germany.) Margaret was also invited to Howards End, but stayed home to care for their 16-year-old brother Tibby who has hay fever. From Howards End, Helen sends Margaret several letters describing the beautiful estate and the energetic, materialistic Wilcoxes. Her last letter sends a shock through Margaret when she reads it: Helen has fallen in love with Paul the youngest Wilcox son. When Mrs. Wilcox dies not long afterward, she leaves a handwritten note behind asking that Howards End be given to Margaret. But her pragmatic husband,Henry, a prominent businessman, and her greedy son Charles, a struggling businessman, refuse to act on the matter and never mention it to Margaret. One night, Margaret and Helen run into Henry, and they discuss the case of Leonard Bast; Henry warns them that Leonard's insurance company is doomed to failure, and they advise him to find a new job. But poor Leonard, who associates the Schlegels with all things cultural and romantic--he reads constantly, hoping to better himself--resents this intrusion into his business life and accuses them of trying to profit from his knowledge of the insurance industry. Margaret and Henry develop a halting, gradual friendship. When the lease expires at Wickham Place, the Schlegels begin looking for another house (their landlord wants to follow the general trend and replace their house with a more profitable apartment building). Henry offers to rent them a house he owns in London, and when he shows it to Margaret, he suddenly proposes to her. She is surprised by her happiness, and after considering the proposal, she accepts. Shortly before Margaret and Henry are scheduled to be married, Henry's daughter Eviemarries a man named Percy Cahill; the wedding is held at a Wilcox estate near Wales. After the party, which Margaret finds quite unpleasant, Helen arrives in a disheveled state, with the Basts in tow. She declares indignantly that Leonard has left his old company, found a new job, and been summarily fired; he is now without an income. Helen angrily blames Henry for his ill-considered advice. Margaret asks Henry to give Leonard a job, but when he sees Jacky Bast, he realizes that he had an affair with her 10 years ago, when she was a prostitute in Cyprus. Margaret forgives him for the indiscretion--it was before they even met--but she writes to Helen that there will be no job

Thursday, July 18, 2019

Practical Education vs Theoretical Education Essay

Nepal is backward in education system till today’s modern times due to the theoretical knowledge and rote learning. Theoretical education is based on text books and Practical education is based on various types of skills and technique. In Nepal, most priority is given to the theoretical education rather than practical as curriculum is based on it. Some of schools has adopted the practical approach of teaching-learning activities but majority are lacking. Theoretical education priorities only on the texts books and it is exam-oriented as well. Most of the contents or topics of our curriculum is not useful in our very life. Moreover, one of my friends told me that Nepal can never make a progress until and unless this (theoretical) education system is modified. I’m too totally agree with my friend view that if the curriculum or education pattern is not alter, country would be in same condition as it is, for more few years. Till now, we are adopting traditional approach of educational practice based on theory. Likewise, Rote Learning is an technique which avoids understanding of a subject and instead focusing on memorization. Rote learning is often view as a bad practice which is not good for the students. It makes students dull, unskilled, less creativity and many more. In Nepal, If the students don’t understood the topic, teacher encourages students for rote learning rather teaching the contents thoroughly from the first. In addition to, Practical education supports students’ to grab up skills which helps them to stand independently in any jobs and works. They will able to learn by understanding and doing practically in their life. Teachers also must use the practical methods of teaching day to day which helps to bring creativeness to students and make the students provide suitable logic and understanding about the subject matter. Rote Learning is practiced in subjects like Science, Social and Nepali. However, the new trend has been discovered which involves the rote learning  of subjects like Math. Students couldn’t understand the methods taught by teacher because of less practical method. So, they rote learn them by mathematical methods. To conclude, it seems that the necessity of the practical based education in Nepal is a must. For that, the main role that our government can play is to change present curriculum and bring about changes which includes 80% practical knowledge and remaining as theoretical. Also, there can be a class where students are taught on the international and national issues.

Wednesday, July 17, 2019

The Need for Information Security Management to Medium Size

The get for study bail counseling for dainty to intermediate size of it Enterprises ICT 357 In rollation protection Management Leong Yuan Zhang 31741147 Trimester 1 Murdoch University table of contents Abstract2 Introduction2 Justifying The Need for Sound training guarantor in Any establishment2 Linking line of reasoning Objectives with protective coering3 fortuity response Management and disaster Rec everywherey4 wide awake Device gage Managment5 Biometric hostage Devices and Their Use6 respectable Issues in breeding credential Management7 protective cover gentility and Education7Def eat uping Against Internet-Based Attacks8 Industrial Espionage and Business parole Gathering9 Personnel Issues in reading security department9 physiological credentials Issues in breeding tribute10 Cyber forensic misadventure Response10 Conclusion11 References11 Abstract Sm each to moderate Size Enterprises (SMEs) contribute greatly to the parsimoniousness in legion(pr edicate) a(prenominal) countries despite the m both(prenominal) ch entirelyenges that they face. Lesser budgeting, resource readiness and time heed be just whatsoever of the limitations that they baron encounter.Comparing this to a monolithicr effort or g every gravelnment body, SMEs get togetherms to pass on polar approaches with regards to randomness shelter measures, onetime(prenominal)s belowstating the vastness collect to the constraint mentioned. This paper functions to study the issues relating to launching and implementation of selective selective info protection regimes in SMEs comp atomic number 18d to larger geological formations. Introduction Small and median(a) enterprise ar delimitd by the number of personnel working for the comp whatever, virtuallywhat the upper limit of 250 to the lower of 50. They greenly lack resources, competencies and watchfulness to implement strategies outwardly and internally for their operations.This paper go forth point on the implementation of schooling credentials regimes of SMEs and contribute a comparison to large enterprises. The paper explores the multiple categories of information certification, feat to list the disadvantages faced by SMEs and how al just about(a)time large enterprises atomic number 18 unable to concord a SME in the cap cogency to suffice to gage threats Justifying The Need for Sound Information Security in Any Organisation The internet age brought upon cutting challenges to the seam world, twain SMEs and large put inment argon continuously investing substantial resources to prep argon their nominal head on the internet.With increasely virtualized trans accomplish entanglements and expanding corporate ecosystem, more than than information pick out been created or converted into digital format. Digitalized information cig bet be saved in variant terminal maneuvers and transmitted over a plethora of interconnected network both in ternally and externally (Radding, 2012). Understandably, abomination and tribute threats to information are seemly more rough-cut entrust as the reliance on Internet in short letter sector activities increase .Threats oftentimes(prenominal) as hackers, championship competitors or veritable(a) foreign governments give the axe employ a host of different manners to obtain information from any organisation (Symantec). Yet no utile vocation would totally isolate themselves from development digitalized info to prevent much(prenominal)(prenominal) pass onings competitiveness or success of these organisations is linked to repair information delivered on time. At its worst preposterous info whitethorn result in serious firing of potential internet and damage to the organisations brand(Juhani Anttila, 2005).A bell ringerifi send awayt broker of information tribute are the represent and personnel expertness required with the designing, victimisation and implementa tion of an effective aegis system. in that respect is a need for major investiture to be invested to build and maintain reliable, authoritative and responsive aegis system (Anderson, 2001). Since closingly SMEs persist to deport to operate under tight budgeting, extreme restrain custody and many different necessarily competing for limited supply of resources, thus placing information tribute down the priorities list (Tawileh, Hilton, Stephen, 2007).Additionally, the lack of cognizance to the negative consequences of info aegis issues and threats and the scholarship of less strict regulatory shape requirements, information and communications infra coordinate at bottom these SMEs remain highly un effectived. Despite that, closely organisations do at least dupe round form of basic protection in the form of anti-virus bundles. Other signs of security software analogous firewall or stylemark software/ onerousware are advantageously less popular perhaps ref erable to the additional complexity of having to install and configure them for the organisation utilization (ABS, 2003).Linking Business Objectives with Security Security arouse impact a companys profitability in both absolute or negative ways. It fully depends on how it is be controlled, too unretentive impart non be enough time too much may get to bottlenecks within the company internal processes. champion example would be background checks on possible new employees. At times, the while of the check may take all-night than the period of meshing, especially when hiring temp mental faculty to cover short term. In their book, Christian Byrnes and Paul E.Proctor argues that to eliminate the last 20% of risk that might occur would mutually required 80% more currency to implement which tail be seen in Figure 1. Figure 1 It is common practice in large organisations to align com put toge in that locationr security round technologies, with a give department running the tape alongside the IT department. However computer security should be more line of products orient as it is easier to master the security charges if considerably business practices are being followed. For SMEs, it is in addition far easier to utilise xisting employees who specialize in specific business roles to take up security positions. In the same book, Christian Byrnes and Paul E. Proctor excessively provided a table which list down the common security roles and the brainl personnel to treat it Table 1 Linking security with business visions is also important as it would throw overboard for infract persuasion to the top managements to pass or push with with security purchases, master plans or policy changes. To achieve this, the motion put forth essentialiness(prenominal) undergo a 5 standard structured framework assess, analyse, strategize, align and communicate.Assess the companys online and future security role so as to achieve a better understanding of the legitimate security model. flesh out on the security capabilities within the employees, processes and current technologies should be documented properly for the future(a) step to be carried out with more accuracy. After collecting the raw selective information, utilise analytical tools and method to conduct a security gap analysis get out show the differences between the current security model and the preempted requirements. With a stupefy free overview of what needs to be do, next phase proviso plenty be done to dapple together to form a feasible and strong strategy.Executives and managers at all levels moldiness understand the new steps that are to be underinterpreted for the new strategy. Such communications may be more effective in SMEs than larger organisations as the members of the security plan may be detect personnel that are required to act rather than a separate IT security team up (Pricewaterho practice sessionCooper). Incident Response Management an d Disaster Recovery Incident re resultant role management is the process of managing and responding to security contingencys. As organisations may encounter plenty of incidents end-to-end the day, it is important that incident rejoinders are conservatively anaged to reduce wastage of manpower and resources. The about conquer level of consequence should be appoint to on any security incident to increase efficiency there is no merit in involving higher-ranking management in a receipt to an incident that has minimal impact on business (BH Consulting, 2006) Disaster retrieval is the process use to recover entree to an organisations software, data and hardware that are required to resume the work of normal, precise business functions. Typically this will happen after either a natural disaster or manmade disaster. (Disaster Recovery)Incident reply management utilise to be disjointed into different entities, natural disasters , security breaches and secretiveness brea ches were handled by risk management, information security department and legal department. This change magnitude the apostrophize of incident management and reduce tangible exercise of existing resources and capabilities. By merging the 3 into one overarching incident management methodology specified with an incident response team and a charter, cut back cost and streamlined usage of resource fecal matter be achieved (Miora, 2010) In larger organizations, incident response team may contain both employees and third party observers from vendors.External vendors may provide the expertise to manage an incident that could be overwhelming to the current employees. This however may non be feasible for SMEs referable(p) the financial constraints. Most likely, the incident response management team would be create use current employees and a senior management personnel would lead the team. The response team would be the ones who do the planning scenario for each different types of incident and the type of responses required, control that derive processes and procedures are in place so that responses to incident are coherent.Communications between members are usually interchangeable be it for large organisations or SMEs method of contact much(prenominal) as emails and non-email like phone calls or messages are used to inform team members (BH Consulting, 2006). Disaster retrieval exceedingly important as well, more so for SMEs. A survey from US Department of Labor provided an estimation that around 40% of business never reopen after a disaster and of the remain around 25% will close down within 2 long time (Zahorsky). Unfortunately, not many SMEs have a disaster recovery plan in place to protect themselves.This is due to the idea that disaster recovery is costly and requires alot of resources and expertise to put in place one. This is true to a certain extend as large organisations normally spend dos to put in place backup servers and removed(p) ho t recovery sites. However with increasing cloud-establish technologies and availability of server virtualization, disaster recovery mountain become affordable even for SMEs. Up and coming cloud solution and renting space in unshakable data center via colocation are some of the solutions that SMEs can consider.Even without any or little IT staff, by paying the colocation provider they can assist to manage the setup and victuals operate (Blackwell, 2010). Mobile Device Security Managment The increasing sophisticated wide awake devices together with high bandwidth network is creating a fearful security management challenge for CIOs and former(a)(a) IT professionals. Proprietary and mystic data can now be moved external of the secure perimeter of the enterprise and onto roving devices that can be brought anywhere in the world by employees.These devices have a descriptor of data communication and storage technologies, such(prenominal)(prenominal)(prenominal) as email/PIM sy nchronising software, infrared data transmission, Bluetooth and removable data storage. As a result, it is easy for busy devices to become strongholds of enterprise information ( pricy applied accomplishment, 2009). Of public life with that brings additional threats to an organisation as spry devices are susceptible to attacks as well. In both SMEs and large organisations, there is a definite need to regulate the use of mobile devices to prevent information leakage.As they can used in a variety of locations outside the organizations control, such as employees homes, coffee shops, hotels, and conferences, this cultivates them much more likely to be lost or stolen than different devices, so their data is at increased risk of compromise (Souppaya & Scarfone, 2012). The most extreme operation of mobile device management can be see within government bodies, specifically in the defense sector where secondary functions of such devices such as cameras are to be disable. However, thi s method would not be comfortably applied to SMEs as employees may descry it to be too restrictive.Rather, having a clear policy on the usage of mobile devices and prohibiting employees from attaching their devices to the work displace would be a better selection to enforce. Biometric Security Devices and Their Use Biometric devices identifies an individual through physical or behavioral characteristics such as fingerprints, palm geometry or retina. It is extremely secure as it cannot be borrowed, stolen or forgotten (Liu & Silverman, 2001). The table below shows the respective(a) type of biometric devices and their advantages/disadvantagesThe table, as seen in the plow from Dell explains clearly some of the limitations of biometric devices. Size for example essential be taken into consideration as well, hand geometry scan devices are bulky and therefore not suited for say unlocking your workstation as compared to using it to unlock a door. However, not many organisations are adopting biometric as part of their security plan. Those that do use biometric are mostly geared towards physical security of secure areas where access are to be restricted.Conventional trademark methods are still much like with regards to virtual access like emails, workstations and applications. The higher(prenominal) cost of using biometric devices as a security solution is also another(prenominal) concern for SMEs that wishes to utilise them. They would need to valuate their nature of business, how and where biometric would fit in to maximize value for money. Ultimately, aligning the need for biometric security devices as a security solution to business objectives is a must, else cheaper alternatives would have to be examine and evaluated instead.Ethical Issues in Information Security Management Some professions such as law and medicine have in place a codified set of ethics that its practitioners are required to prize to protect the retirement of their clients. Violations are dealt with in the harshest possible terms, and even minor lapses can result in significant penalties. For IT however, there are no such codification. Technology professionals generally abide by ad hominem codes of conduct and are essentially self-policing. Additionally, engine room stand ups complexities that go beyond typical questions of whats right or whats fair.Areas such as data access and capture, touch speed, tracking and monitoring, and line of descent redesign are just a few examples of IT capabilities with respectable considerations. (Relkin, 2006) Both SMEs and large organisations have to be able to cope with good issues such as privacy of private information, intelligent property and cyber crime. In an effort to precaution company secrets, many employees can be exposed to electronic or other forms of surveillance. Email screenings and monitoring internet usages are just some of the methods that can be employed.There is a need to clearly define policies tha t involve such practices and the boundary must be draw and communicated to all employees so as to safeguard the organisation from breaching privacy laws and from being sued by employees. (Tiwary, 2011) Security teach and Education Security training and reproduction is becoming increasing important for employees due to emergence of end- user computing as an vituperative component of information security. A typical end-user has access to most vital information that an organisation has in its ownership.They have cognition of how protection systems put in place to secure information work and a small amount of more gifted users may even know how to ticktack those systems. Most users however lack the noesis that is required to divine service protect the organisation information and it is in this area that they should be educated in hunting lodge to make better decisions when facing with threats and vulnerabilities that can be discovered during the course of work. (Hight, 2005) Sec urity Education, Training and Awareness design otherwise cognize as SETA is designed to set the security tone to the employees of an organisation. do it part of a new employees orientation will ensure that all employees know and understand the reasons of the security policies that are in place at any organisation. Implementation of such a program can be done at any organisation, requiring exclusively properly create verbally security policies and outlining guidelines that have to be followed. A good security program ensures that end user mistakes can be reduced and that employees understand the consequences of their actions when using their work stations or insert unauthorised USB devices into them. support Against Internet-Based AttacksWith an increasing reliant upon the internet, internet based attacks have been slowly increasing. Organsations that has a presence over the internet or utilizes weather vane based technologies are more prostrate to such as attacks. Internet wor ms, viruses, malware and distributed demur of service are just some of the types of threats that could occur. Organisations should look to prevent such incidents from occurring by securing applications that are made available over the internet and securing organisation infrastructures exposed over the internet (Klein, 1999).To apply out an attack, the assaulter must first obtain capable control over a target system. They would most likely do some reconnaissance on the target, performing a number of scans to looked for weaknesses. Areas like remote loving network services in disregard OS kinds, sendmail, sshd, RPC and Windows file sharing are some of the services exploited. Ports that are unsecured, computer storage handling, targeting applications like meshwork web browsers and plug ins are also some of the methods that attackers can use.The web browsers in particular are see a rising trend of being targeted as browsers are extremely flat to having exploitable vulnerabili ties. The internet distribution model also allows attackers to attack a users web browser without even coordinately connecting to the cilent planting malicious coding at specific websites where the user normally visits will achieve the aim as well (Moshchuk, 2000). Prevention of such attacks are extremely important, firewall and anti viruses are just the tip of an iceberg when it comes to methods that can protect an organisations information.Many firewalls being sold at once are considered application aware and can understand protocols and commands that are being used. This allows them to pick up whether or not incoming merchandise to any applications or network services are malicious or not. aright set up application aware firewall would be able to prevent common attacks thru telnet, SSH, HTTP, FTP, SMTP, drink and applications which can be vulnerable. Additionally impingement Detection systems (IDS) and Intrusion Prevention systems (IPS) can also be used against application or network based attacks.When diametrical together with an application aware firewall, some intrusion detection systems have the ability to thwart off attackers by talk of the town directly to the firewall to block the source IP address. There are no right or wrong solutions to defending an organisations network, it all boils down to which products would be suited to the organisations needs. SMEs typically would use more of off the ledge type of applications and intrusion detection legal profession system (integrated data processing) would be a better fit for such applications.Off the shelves applications uses alot of common protocols such as FTP, HTTP etc that should adhere to RFC standards and IDP is configured to block malicious or dealing that does not comply with RFC standards automatically. For larger organisations, they tend to have third party or home grown applications which developers may or may not have complied with RFC standards, IDP solutions may not have much of an effect for them. Industrial Espionage and Business comprehension GatheringEvery organisation in the world will have collected some form of information regarding their competitors, through market scanning, industrial profiling or even direct hire of employees from their competitors. Such perception collection are definitely part and computer software activities used for market research and benchmarking. However, there are uncertain boundaries separating competitive experience multitude and industrial espionage. The laws in place at times are unable to set such limits and it would seem apt to define industrial espionage as intelligence practices of questionable ethics instead (Crane, 2005).Be that as it may, industrial espionage is a very critical threat against SMEs. A succesfully SME breaking in saturated markets would have attained some form of breakthrough in order to stand out. Regardless of whether it is a formulae or business process, competitors would wish to obtain such noesis in order to raise their own profiles. To safeguard their secrets, SMEs would have to ensure that their security system in place are adequate and their employees educated on the topic. SMEs have to identify that information that would critically harm the company and the value of such information to the company and its competitors.Access to such flower jewels must be controlled and employees must be educated on security consciousness programs. Despite that, employees are still the strongest and weakest link. populace tend to react better to carrots than sticks and most of the time competitors would aim for that. Hiring professionals to perform fond engineering, blackmailing, lure of monetary gains are hard to prevent. (Podszywalow, 2011) Personnel Issues in Information Security Human related security issues are extremely problematic and complex in organizations.They involve all the individuals who make up the organization, from top-level managers to clerical staff. It is crucial that the top management recognize that for security management to in the end succeed, not only the technical belongings must be taken into account, the military mans aspect of security must not be ignored as well. pack issues within an organisation can have an impact on its ability to effectively manage security. Uncommitted and un knobbed senior managers unqualified, untrained and careless employees former dissatisfy employees and organizational members resistance to change are just some of the potential issues ertaining to human resource that might occur. Hence, to achieve security effectiveness, these issues must be addressed as a whole (Goh, 2003) For SMEs, when hiring an new employee, the employment contract should expressly emphasize the employees certificate of indebtedness to reserve certain types of information confidential both during and after the employees tenure. The language and structure of the contract should be made clear so as to prevent any p otential misunderstanding or any loopholes that can be exploited. The employee must sign the organisation before he or she begins to work.The contract can also be included with an employees personal file to keep track. Even when exiting, care must be taken to ensure that documents, records and other information concerning the company proprietary assets in the possession of the leaver must be surrendered and returned to the company. Conducting a exit interview will help to refresh the terms of employment agreement and trade secret law with the leaver. The employee should be acknowledge in writing that he or she is aware of the obligations and will not disclose any trade secrets of the former employer.Physical Security Issues in Information Security Physical security breaches can sometimes be more devastating than technical breaches like worm attacks. The loss of data, loss of availability either from systems being closed in(p) down or by washout or arson must be considered when de aling with physical security. With the invention of easily concealable USB drives or bombs, coupled with unauthorized access is makes physical security becoming more important. Data transfer speeds have increased as when, allowing for transferring of a large amount of data in a relativity theory short period of time.As with any other security planning, physical security must be included to ensure that the risk of above mentioned are reduced. Access to areas such as server rooms or routers or where documents are kept and archived must be control, just locking the doors doesnt seems to be enough now. Access control cards, biostatistics system can ensure that only authorised personnel be allowed in. Securing the personal computer of employees, especially if they are using laptop is equally important. Laptop locks and OS hardening to prevent unauthorized usage of USB devices are not allow (Giannoulis & Northcutt, 2007).Cyber rhetorical Incident Response electronic computer forensics is the science of acquiring, retrieving, preserving, and presenting data that has been processed electronically and stored on computer media. When paired with incident response, their job becomes more challenging. They would have to find where a breach occurred, plug the hole, then croak to get the affected server or servers back into service, and then if possible, gather proof on the intruder for further action and analysis (Daniel & Daniel, 2009)SMEs unfortunately with their limited resources may have to compromise. instead of having a dedicated team to deal with incident response, they might consider getting current employees involved within IT such as server, networking or on site support engineers to carry out such a role. If they have supernumerary budget however, it would work to their wellbeing if they send their resposne team for courses pertainning to cyber forensic. The additional knowledge will allow the response team to perform more effectively should a threat occu r ConclusionSmall and medium enterprises typically faces the same the type of threats that will happen to larger organisations, however their approach and response to the same threat may differ greatly due to the limited resources human, technical, physical available to them. SMEs will have to sometimes think out of the box and be very careful in planning resources for security within the company. The type of hardware, software used for security may be similar to larger organisations however, the setup and configuration may be miles apart as well. SMEs, will have be extra vigilant against information security threats.References (n. d. ). Retrieved march 10, 2013, from Symantec http//securityresponse. symantec. com/avcenter/security/Content/security. articles/corp. security. policy. hypertext markup language ABS. (2003). Business Use of Information Technology (2001 02). capital of Australia Australian Bureau of Statistics. Anderson, R. J. (2001). Why Information Security is Hard A n Economic Perspective. in Proceedings of the Seventeenth computing device Security Applications Conference (pp. 358-365). IEEE Computer Society Press. BH Consulting. (2006). Incident Response White Paper. Dublin BH Consulting. Blackwell, G. 2010, whitethorn 25). Disaster Recovery For Small Business. Retrieved walk 13, 2013, from Small Business Computing http//www. smallbusinesscomputing. com/biztools/article. php/10730_3884076_2/Disaster-Recovery-For-Small-Business. htm Crane, A. (2005). In the company of spies When competitive intelligence gathering becomes industrial espionage. Nottingham International Centre for incorporated Social Responsibility. Crist, J. (2007). sack Based Attacks. SANS Institute. Daniel, L. E. , & Daniel, L. (2009, kinfolk 30). How Is Computer Forensics Different from Incident Response?Retrieved meet 13, 2012, from ExForensic http//webcache. googleusercontent. com/search? q=cachehttp//exforensis. blogspot. com/2009/09/how-is-computer-forensics-differen t. hypertext markup language Disaster Recovery. (n. d. ). Disaster Recovery. Retrieved display 13, 2013, from Disaster Recovery http//www. disasterrecovery. org/ Giannoulis, P. , & Northcutt, S. (2007). Physical Security. Washington Security Laboratory IT Managers Safety Series. Goh, R. (2003). Information Security The Importance of the Human Element. Singapore Preston University. Good Technology. (2009). Mobile Device Security. Good Technology.Hight, S. D. (2005). The importance of a security, education, training and awareness program. Householder, A. , Houle, K. , & Dougherty, C. (2002). Computer attack trends challenge Internet security. IEEE Computer , 35 (4), 5-7. Juhani Anttila. (2005, surround). Retrieved March 13, 2013, from QualityIntegration http//www. qualityintegration. biz/InformationSecurityManagement. html Kelly, L. (2011, November). The top five SME security challenges. Retrieved March 13, 2013, from ComputerWeekly. com http//www. computerweekly. com/feature/The-t op-five-SME-security-challenges Klein, D. V. (1999). reason against the wily surfer Web based attacks and defense. California The USENIX Association. Liu, S. , & Silverman, M. (2001). A mulish Guide to Biometric. IT Pro. Miora, M. (2010). Business Continuity. Los Angeles, California, USA. Moshchuk, A. N. (2000). Understanding and Defending Against Web-borne Security Threats. Washington University of Washington. Podszywalow, M. (2011, November 29). How to Detect and pointedness Corporate Cyber Espionage. Retrieved March 13, 2013, from The Data mountain range http//www. thedatachain. com/articles/2011/11/how_to_detect_and_stop_corporate_cyber_espionagePricewaterhouseCooper. How to align security with your strategic business objectives. PricewaterhouseCooper. Proctor, P. E. , & Byrnes, F. C. (2002). The Secured Enterprise Protecting Your Information Assets. New Jersey Prentice Hall. Radding, A. (2012, January 04). Retrieved March 10, 2013, from Brainloop http//www. brainloop. com/f ileadmin/assets/PDFs/White_Papers/brainloop_white_paper_info_sec_options. pdf Relkin, J. (2006). 10 ethical issues raised by IT capabilities. CNET Networks Inc. Souppaya, M. , & Scarfone, K. (2012). Guidelines for Managing and Securing Mobile Devices in the Enterprise.National Institute of Standards and Technology. Tawileh, A. , Hilton, J. , & Stephen, M. (2007). Managing Information Security in Small and Medium Sized Enterprises A Holistic Approach. Information Security Solutions Europe Conference, (p. 11). Warsaw. Tiwary, K. D. (2011). Security and ethical issues in it An organisation perspective. International daybook of Enterprise Computing and Business . Zahorsky, D. (n. d. ). About. com. Retrieved March 13, 2013, from Disaster Recovery Decision Making for Small Business http//sbinformation. about. com/od/disastermanagement/a/disasterrecover. htm