Wednesday, October 30, 2019

Cryptography Application Methods Research Paper Example | Topics and Well Written Essays - 500 words

Cryptography Application Methods - Research Paper Example This led to the emergence of debit and credit cards whose applications have since become widespread. This age of information has witnessed the emergence of cryptography a major protection method of applications. This paper will investigate some of the application methods of cryptography together with the systems application in a college university. In a university setup, cryptography has applications in ensuring secrecy in storage, integrity in transmission, authentication of identity and integrity in storage. The maintenance of the secrecy in storage requires a one key system whereby the user is responsible for the provision of the computer key at the start of the session. After this, the computer takes care of the decryption and encryption during the entire course of its normal use. Indeed, there are numerous hardware devices for automatic encryption of personal computers of all the information that the disk stores. Upon turning on a computer, a user must provide the encryption hardware with a key. Otherwise, the information will be meaningless even in the event that the hard disk is stolen. However, secrecy in storage is not without problems. In an event that the user forgets the key, then the encryption information become unusable. Apparently, encryption only occurs while the information is in storage and not when it is in use. The electronic money transfer has the danger of invasion by criminals who can tap a system and make false transfers. However, to realize integrity in the transfer of funds, there is need to perform an information checksum before submitting it in the form of encryption. Upon the receipt of this encrypted information, another checksum takes place for comparison after decryption. An agreement of the checksum is an indication that an alteration had occurred to the message. Forging this kind of information is easy. Since a lot of publications and intellectual works occur in universities, integrity in the

Monday, October 28, 2019

A Good Man is Hard to Find Essay Example for Free

A Good Man is Hard to Find Essay The grandmother identifies herself as a southern lady based on appearance, money, and background. She is the main character in this short story and also the only character that the narrator actually shows into the mind of. The grandmother is the reason for the title of this story because she repeats throughout the story about a â€Å"good man†, when there really is no good man in this whole story. The grandmother also is used in many ways to foreshadow the upcoming events in the story; such as â€Å"In case of an accident, anyone seeing her dead on the highway would know at once that she was a lady† (O’Connor 354) The grandmother is identified by appearance in that she compares the way she is dressed to the way the mother is dressed. The mother is told to be dressed in â€Å"slacks and still had her green kerchief† and the grandmother describes herself as having â€Å"on a navy blue straw sailor hat with a bunch of white violets on the brim and a navy blue dress with a small white dot in the print† (O’Connor 354). She wanted to make sure that â€Å"anyone seeing her dead on the highway would know at once that she was a lady† (O’Connor 354). Money is something important to the grandmother that we can also identify her by. The grandmother thought very highly of Mr. Teagarden because she says that June Star â€Å"would have done well to marry Mr. Teagarden because he was a gentleman and had bought Coca-Cola stock when it first came out and that he had died only a few years ago, a very wealthy man† (O’Connor 355). Red Sam is a â€Å"good man† in the grandmother’s eyes, which is probably because he is a wealthy owner of his own store (O’Connor 356). Where the grandmother is from and how she is raised is also a big part in identifying her. In the beginning of the story, the grandmother describes how she wants to go to Tennessee for their vacation instead of Georgia. When John Wesley says something about it, the grandmother gets defensive over where she grew up, she says to him â€Å"I wouldn’t talk about my native country that way† (O’Connor 354). Later in the story, the mother goes to a jukebox and plays â€Å"The Tennessee Waltz† kind of just to rub it in to the grandmother  that they were not, in fact, going to Tennessee. Another time in the story, the grandmother says that she recognizes where they were while on the way to Georgia. But it turns out, she was just recalling when she was in Tennessee â€Å"when she was a young lady† (O’Connor 357). Flannery O’Connor is such a good author, and that shows especially in this piece. She identifies the grandmother through appearance, money, and background. Appearance, such as the way she compares herself to the mother, how she talks about how Mr. Teagarden was â€Å"very-good looking†, and talking about the Misfit’s crew and their attire. Outline I. Introduction: The grandmother identifies herself as a southern lady based on appearance, money, and background. She is the main character in this short story and also the only character that the narrator actually shows into the mind of. The grandmother is the reason for the title of this story because she repeats throughout the story about a â€Å"good man†, when there really is no good man in this whole story. The grandmother also is used in many ways to foreshadow the upcoming events in the story; such as â€Å"In case of an accident, anyone seeing her dead on the highway would know at once that she was a lady.† II. Appearance: The grandmother is identified by appearance in that she compares the way she is dressed to the way the mother is dressed. The mother is told to be dressed in â€Å"slacks and still had her green kerchief† and the grandmother describes herself as having â€Å"on a navy blue straw sailor hat with a bunch of white violets on the brim and a navy blue dress with a small white dot in the print.† She wanted to make sure that â€Å"anyone seeing her dead on the highway would know at once that she was a lady.† III. Money: Money is something important to the grandmother that we can also identify her by. The grandmother thought very highly of Mr. Teagarden because she says that June Star â€Å"would have done well to marry Mr. Teagarden because he was a gentleman and had bought Coca-Cola stock when it first came out and that he had died only a few years ago, a very wealthy man.† Red Sam is a â€Å"good man† in the grandmother’s eyes, which is probably because he is a wealthy owner of his own store. IV. Background: Where the grandmother is from and how she is raised is also a big part in identifying her. In the beginning of the story, the grandmother describes how she wants to go to Tennessee for their vacation instead of Georgia. When John Wesley says something about it, the grandmother gets defensive over where she grew up, she says to him â€Å"I wouldn’t talk about my native country that way.† Later in the story, the mother goes to a jukebox and plays â€Å"The Tennessee Waltz† kind of just to rub it in to the grandmother that they were not, in fact, going to Tennessee. Another time in the story, the grandmother says that she recognizes where they were while on the way to Georgia. But it turns out, she was just recalling when she was in Tennessee â€Å"when she was a young lady.† V. Conclusion: Flannery O’Connor is such a good author, and that shows especially in this piece. She identifies the grandmother through appearance, money, and background. Works Cited: O’Connor, Flannery. â€Å"A Good Man is Hard to Find.† Backpack Literature: An Introduction to Fiction, Poetry, Drama, and Writing. X.J. Kennedy and Gioias eds. Pearson: New York, 2012. 352-365. Print.

Saturday, October 26, 2019

Greek And Roman Art Essay -- essays research papers

The Greek Theater: "The arts of the western world have been largely dominated by the artistic standards established by the Greeks of the classical period" (Spreloosel 86). It is from the Greek word theatron, meaning a place for sitting, that we get our word theater. According to James Butler, "The Greeks were the first people to erect special structures to bring audiences and theatrical performers together" (27). "The theaters were normally located near a populated area at the bottom of or cut out of a carefully selected, sloping hillside overlooking a seascape, a plain, or a city" (Butler 30). "They eventually with few exceptions consisted of three distinct parts: theatron (viewing place) for spectators, orchestra (dancing place) where the chorus and actors performed; and a later addition, a skene (scene building), which provided a scenic backing" (Butler 30). The theatron was the place where the audience sat. At first the spectators sat on the ground, later on wooden bleachers and finally on tiers of stone seats which followed the circular shape of the orchestra and the natural contours of the countryside. The theatron surrounded the orchestra on three sides. Describing the theater of Dionysus, David Taylor writes, " The spectators seats were in a curving area, a little more than a semi-circle and slope down to the center" (Taylor 19). Even though all classes of people attended the theater there were reserved areas for the more prestigious, such as the king. " The audience arranged in rows, looked out across a rounded orchestra" (Kennedy 1102). Because most of the early dramas were religious and required a sacrificial ceremony, a thymele (an altar or sacrificial table) was located in the center of the orchestra. The orchestra was where the chorus and actors performed. Arnott states, " the nucleus of the drama was the chorus" (Arnott 9). David Taylor comments, " The theater actually did start without any separate actors; there was only the chorus" (15). Later actors were added, but the chorus still remained the center of attention. The audience sat at a considerable distance from the orchestra and looked down on the performance. Although the amount of detail perceived was limited, they of... ... cook it and the figures would still show up as red, while the background would come out black. This allowed for more attention to detail as well as the ability to use foreshortening and shadowing. The use of shadowing is more than obvious on the Kylix with the figure of a youth sitting on a stone surrounded by large apatropaic eyes. The ability to foreshadow is shown in many other red-figured works that were done during and around that time. The differences that are found between these four pieces of art can be traced back to the differences that existed between the two cultures. Even though there are similarities, the differences outweigh them by far. The purpose of the Roman Mummy Portrait of a Man and the Mummy Portrait of a Young Woman differ completely from that of the Greek Black-Figured Psykter and the Red-Figured Kylix Depicting a Young Athelete. The styles of the paintings are also very different as well. The amazing thing that is to noticed is that regardless of the differences that exist, both the Greek and the Roman pieces are considered to be masterpieces of art. The differences that are found add to the uniqueness that each one entails.

Thursday, October 24, 2019

Regions Chart

PoliticalAs a result of the growth of industry and social change, political views often clashed. Labor unions formed first in the Northeast. Miners and steelworkers were some of the first workers to use the strike as a bargaining tool against business owners. Laws that allowed segregation and discrimination made it hard for southern African Americans to enjoy the improved transportation of the Second Industrial Revolution. Discriminatory laws and riots due to increased tension between immigrants and white settlers. Labor unions were active in the cities. Social reform movements arose in Ohio and Illinois. In rural areas, farmers were also politically active. It was a region in which social and political campaigns took root. SocialThe growth of industry highlighted the gap between rich and poor. Wealthy entrepreneurs wanted to increase profits. Workers wanted better wages and working conditions. The post-Civil War South continued to have problems related to race. New laws regarding se gregation made it hard for southern African Americans to enjoy the improved and rebuilt transportation. The willingness of the immigrants from China to work for lower wages and the cultural differences between them and the white settlers led to friction. Like the Northeast, the Midwest had waves of immigrants come to its cities. The gap between rich and poor was a source of friction. Economic orType of EconomyThe Northeast remained the leading industrial region in the Second Industrial Revolution. New York, Massachusetts, and Pennsylvania produced more than 85 percent of all U.S. industrial products in 1890. The war ended slavery, which took away the South's main source of labor. Although it remained mostly agricultural, the South began developing its timber industry. Coal and iron deposits in the southern Appalachian Mountains gave rise to steel  production in Birmingham, Alabama. Agriculture became more efficient in the Midwest and also encouraged settlers to obtain land in the West. However, the sparse population of the West did not support much industrial growth, and the economy continued to be based on natural resources. This region experienced economic growth in both farming and manufacturing. The upper Midwest states became centers of industry and a hub for shipping and transport.Population ChangeThe rapid growth of a manufacturing economy created a need for workers. Cities in the Northeast became destinations for the immigrants that came to the United States. By 1870 about 15 percent of the U.S. population was foreign born. About one of every five industrial workers was an immigrant. Most of these immigrants settled in the Northeast. Many African Americans left the South to work in new factories in the North and Midwest. There they had a better chance of earning good wages and improving their economic and social standing. Immigrants from China arrived in the West looking for jobs on the expanding railroads. The thinly spread population of the West di d not support much industrial growth. Cities grew rapidly, attracting large numbers of immigrants. Chicago, Illinois became one of the nation's largest cities during this period. In 1860, the city's population was about 110,000. In 1890, more than one million people lived there.TransportationAlmost 200,000 miles of railroad line connected cities in the Northeast by 1900. Most industry and rail transportation were destroyed during the Civil War. By the 1880s, however, the South had begun to rebuild. The completion of the Transcontinental Railroad in 1869 linked the coasts of United States. Railways transported natural resources like timber and gold from the West to the East The development of railways made Chicago a gateway between the East and West. Trains carried goods from eastern manufacturers, to be shipped north to the Upper Midwest and west across the Great Plains.Explain how the Second Industrial Revolution affected the North, South, West, and Midwest. Which region would you have preferred to live in during this period? Why?The Second Industrial Revolution affected the North, South, West, and Midwest with changes such as population, transportation, and economy changes. The rapid growth of the manufacturing economy in each region created a need for workers attracting many immigrants. By 1870 about 15 percent of the U.S. population was foreign born and, about one of every five industrial workers was an immigrant. In addition, each region also developed and improved their transportation system, usually, by railroads. These railroads connected cities and were used to transport natural resources and goods from manufacturers to other places.Moreover, each region had their own type of economy. The northeast remained the leading industrial region and the south and west maintained a developing agricultural economy but, the west’s sparse population did not support much industrial growth. Also, the Midwest experienced economic growth in both farming and man ufacturing.Furthermore, if I had to live in a certain region during the Second Industrial Revolution period I would prefer to live in the northwest region which was the leading industrial region in both the First Industrial Revolution and Second Industrial Revolution. The rapid growth of the economy begged for more workers so it would have been easy for me to find a job and provide for my family. The northeast region benefited, improved, flourished more than any other region in both Industrial Revolutions and I would have wanted to be a part of that experience.

Wednesday, October 23, 2019

Descriptive Writing

Though not very big, my home is a place where my heart is. My home is the most comfortable, warm and cozy place where I live with my family and spend most of the time in. Entering the east facing wood paneled front door of my home, I am welcomed by my pseudo German Shepherd. An off-white shoe cabinet in the foyer is neatly arranged with everyone’s shoes. In the foyer there is a gilded mirror which is placed above a half moon console table which is decorated with a bowl of colorful blooms and little round. Interior decoration being our forte, we still are thrilled to step into the living room and see our artistic touch. The tray ceiling designed with lights faces down on our Lorenzo leather armchair and divan sofa which we have saved hard to buy. Square shaped cushions quilted with floral designs are well arranged on the divan sofa. The polished wooden floor tiles, feels so cool under my feet. In front of the sofa, lays a Persian rug, a gift from my much travelled aunt on which the unique Kenshoma style coffee table lends a contemporary look. A collage of all my artwork from kindergarten to standard 6 takes pride of place above the flat screen Samsung TV. Across on the opposite wall is the window overlooking the park. As we enter the doorway on the west wall, we pass into a well lit hallway leading to the bedrooms one on the right and the other on the left, each with its own en suite. My sanctum sanctorum is on the left, with a pad of my very own in pastel colors of Nippon-Lemon Drop and Golden Buff. Against the south wall by the window is my four poster mahogany bed with Laura Ashley sheets and quilt. The parted Laura Ashley curtains open onto a balcony which is opposite my bed. From the balcony, I can see and hear the rippling sea rolling away to the horizon. On the far wall of my room is the bathroom on the left and almost a bare walk-in wardrobe on the right. My few but elegant clothes from Nicole MNJ, Soda and Padini hang in the closet. My two pairs of Jimmy Choo shoes sits forlorn at the bottom shelf. My Prada handbag, not original of course sits proudly on display by the floral upholstered chair next to the period-style dressing table and mirror. Incidentally my walk-in wardrobe has a connecting door to the bathroom. Now let me take you through my bathroom, my second best place of refuge, away from the heat. It is a small marvel of glass marble and modern fitting like rain shower. My toothbrush and toilet paper holders are from IKEA. My Johnson Suisse square vanity is above the off-white marble counter. Above the vanity, I have a dark wooden framed mirror which was given by my grandfather. On the counter, I have placed three scented candles on ornate candle stands of wrought iron which I bought from SSF, the home deco store. My room constantly smells of fresh lavender. It has soothing and calming effects on me, especially on days when I have tough assignments. Light floods this small cubicle from a frosted glass window and two white down lights from the ceiling. To me, my home is the most relaxing place to stay. Almost all of my tensions become extinct just when I place my first foot in my home. My home is a place where if I had a chance, I would not want to leave for awhile. Finally I would like to quote John Howard Payne’s 19th century song â€Å"Mid palaces and pleasures though we may roam. Be it ever so humble, there’s no place like home. † (John Howard Payne, 1823)

Tuesday, October 22, 2019

How To Write Business Essay, with Topics List

How To Write Business Essay, with Topics List What is business essay? Business essays are meant to present an argument about a topic within the business field. It should be narrowed down to a specific issue. Â  They are meant to help the writers convey their professional views on different issues arising from the businesses. Business writing helps readers in adopting different viewpoints about issues in the business world. These essays contain writers stand on the issue. List of topics for business essay: Marketing strategies Fund and asset allocation strategies E-commerce Narrowing the gap between the skills required by the industry and those currently available in college graduates How much does it cost to start a small business Who are the real businessmen? Employee social media privacy laws: dream or necessity Feminist economics Can African economies survive without the western influence? Surviving the world of uncertainties Marketing strategies Advertising Influence of Chinese on African business environment Would online companies be more successful than the regular ones Life savings Foreign currency fluctuation Life insurance Example of outline for business essay Outlining helps the writer to plan for writing the essay. Outline contains three paragraphs. The first paragraph is the introduction. The second and third paragraphs contain the first and second supporting points respectively. The last paragraph of the essay contains the conclusion. The outline serves as an essay draft. Who are the real businessmen? Introduction A large percentage of people living in this world are involved in some businesses. Without doubt it is universally agreed that successful businesses require a businessman. This therefore begs the question that who is a real businessman. A good businessman is an honest person. This is crucial in winning customers trust and therefore customers are able to conduct business with them. He is straightforward and true to his words in his dealings resulting in a long successful business. A good businessman is well knowledgeable in the business he is involved. He is knowledgeable in handling the business transactions and understands his customers. This helps him in earning respect and admiration among his peers and customers. Conclusion Among other qualities, these are some of the recognizable qualities of a real businessman. He earns the respect, trust and admiration among his peers and customers. In the long term these help in ensuring that his business is successful, a quality only attributed to real businessmen. How to start business essay Clearly define your topic. You need to show your reader the meaning of what you are talking about in order for them to tell whether it is meaningful. Show the direction of your topic or point of argument. You need to show the readers which direction you are taking in arguing your points. Outline the extent of coverage. Clearly show what you are going to cover and if possible what the essay will not cover. Give background information. Give the readers background information that necessitates the writing of the essay or the origin of your arguments. Tips on Thesis Writing Create a schedule. Create a time suitable for writing your thesis, so that it doesn’t interfere with your daily life; Develop an applicable thesis statement. The statement should be able to improve the readers ideas on the subject discussed; Don’t criticize. Avoid criticizing companies or its policies; Research thoroughly on the topic; Properly structure your business essay; Proof reading. Revise and correct the paper severally to make it sound and look good. Tips on body paragraphs The body of the essay makes up the largest portion of perfect assignment. The length or the number of paragraphs will depend on how much the writer writes about the topic chosen. The tips for writing the body include: The topic sentence. Defines what the paragraph is all about. Introduce the sources or data. Outline the data, or sources supporting the mini thesis. Use facts. Use proven facts in the area you are writing on. Explain the facts and quotes. Explain the meaning of the facts and show how these support your stand and contribute to the topic under discussion. Relation to thesis. Explain the facts in relation to the overall thesis statement and to the topic you are discussing. Ensure that the facts are relevant and related to the topic. Transitional sentence. Use transitional words to transit from one paragraph to the next. Tips on writing the conclusion Conclusion summarizes the writer’s views. It is the last part of the business essay writing steps. Arrive at the final conclusion through logical reasoning and pulling the discussion made in the body of the essay concisely. State your viewpoint explicitly. If possible, express the recommendations for further activity and future actions. Summarizing Outline for the essay provide the writer with a work plan on how to plan for the writing. It introduces the readers into the writers thinking and help in introducing the points. The body contains the findings of the writer. The writing guide provides writers with a way of sharing their thoughts with readers. Following this guide is crucial in ensuring that the writer has a complete and logically organized work in the end as such business essay conclusion is an important part of the essay.

Monday, October 21, 2019

Essay on Amazons Vertical Integration

Essay on Amazons Vertical Integration Essay on Amazons Vertical Integration Essay on Amazons Vertical IntegrationThe marketing mix includes four essential components: product, price, promotion and place. Place denotes the approach to distribution and pertains to the methods of delivering the product or service to the target customers. The methods of distribution are shaped by the nature of the product or service, by technological factors, by the strategies of competitors, by the strategies of other participants of the supply chain or distribution chain, etc.In particular, there exist several distribution methods which include integration. The most frequently used methods are horizontal integration the inclusion of companies or business activities pertaining to the same level of the value chain, and vertical integration the integration of different levels of supply chain in one company or one union. The purpose of this paper is to analyze backward integration in publishing undertaken by Amazon, to review the facts of the battle between Amazon and Barnes and Noble, to discuss Amazons decision to get into publishing and to consider the perspectives of signing contracts with Amazon from the position of a well-known and a novel author.Key facts on the battle between Amazon and Barnes and NobleAmazon was one of the pioneers of e-commerce, and its department dealing with online sales of print books quickly became successful. Amazon paid a lot of attention to its book business and started investing into e-books and devices for reading e-books in order to attract the audience. Although Amazon clearly chose to focus on the segment of electronic books, it also entered the publishing segment and offered exclusive publishing services to the authors.Besides the bold decision on backward integration, Amazon also undertook several predatory marketing campaigns which were focused on directing customers from other book stores such as Barnes and Noble. In particular, Amazon offered an $15 discount for those customers who visited traditional bookstores and used Amazon price check app to purchase print versions of the necessary books in Amazon (instead of purchasing the books at the store they were visiting) (Hertner, 2012).Although Amazon managed to drive customer interest, publishers and book retailers united in a protest against such practices (Hertner, 2012). The companies also protest against Amazon tax protection: the company is allowed not to pay taxes across the United States because it has no physical presence in the states with sales tax (Hertner, 2012). Furthermore, Barnes and Noble made a public statement calling authors to avoid agreements with Amazon since such agreements strengthen Amazons monopoly and threaten to undermine the whole publishing industry (Turner, 2012).Despite the united efforts of publishers and book retailers, Amazon is clearly winning the game. Barnes and Noble reports that the sales of electronic and printed books are decreasing as well as the sales of electronic devices and accessories (Gelles, 2 014). The revenues of Barnes and Noble are declining, and the Nook department of Barnes and Noble is no longer able to compete with Amazon Kindle devices and the variety of tablets and smartphones available at the market. Barnes and Noble is planning to use the services of third-party manufacturers to upgrade its Nook line of e-readers or to sell the department to G Asset Management (Gelles, 2014). Although Barnes and Noble managed to optimize costs and therefore increase the overall profits despite the drop in revenue, the prospects of brick-and-mortar bookstores are not very optimistic. At the same time, Amazon is actively pursuing its vertical integration strategy and growing the market of electronic books and e-readers.Assessment of Amazons entry into publishingAmazon started as online retailer and its major competitive advantage was formed by the benefits caused by early entry into the industry (Krug, 2012). At the same time, Amazon quickly expanded its presence in innovative m arket segments. One of these segments was the publishing segment. Amazon started offering publishing services to authors and focused on selling both printed and electronic versions of books. From the authors perspective, such idea is fruitful as it allows to gain access to a large audience and helps to target both the fans of printed books and the new generation of readers who prefer e-ink devices for reading.Amazons conditions are exclusive and the authors might be unable to publish their books with other publishers. In this way, Amazon manages to eliminate intermediaries and therefore decrease publishing costs. Furthermore, Amazon receives the opportunity to capitalize on publishing books and strengthens its supply chain. At the same time, Amazons exclusive publishing conditions result in the weakening of other publishers and book retailers and in the strengthening of Amazons market position. Therefore, vertical integration is highly beneficial for Amazon as it helps the company t o expand the market of e-books and at the same time to retain its leadership in selling printed books.Author choices in different situationsFrom the perspective of a popular author of childrens fiction, it might be not very beneficial to sign a contract with Amazon since this company requests exclusive rights, and a popular author might want to choose more beneficial contracts with other publishers in the future. Furthermore, book retailers and publishers often boycott Amazons printed books and therefore signing a contract with Amazon might limit access to readers audience for a popular author. Therefore, it would be reasonable for a popular author to reject Amazon offer and to retain the relationships with the traditional publisher.In the case of a new author working on a first book it is best to accept Amazons offer because of several reasons. First of all, it is difficult for beginning authors to attract the attention to traditional publishers because of numerous procedures and r equirements as well as competition in this sphere. Every publisher also targets a particular audience and it is hard for a new author to choose the right publisher and to win the contract. In Amazons case, the risks for a new author are lower and the author can quickly gain access to a worldwide audience (especially in the case of electronic books).Conclusions and recommendationsThe development of technology has dramatically changed distribution channels in the publishing industry. The dynamics of the recent decade shows that the sales of e-books are increasing and the sales of print books are declining (Trachtenberg, 2014). Amazon is the global leader in selling e-books while the sales of Barnes and Noble are declining (Trachtenberg, 2014). However, there are specific categories of print books the demand for which is growing or keeps at the same level: these are textbooks, books for entertainment (detectives, fiction), books for children and illustrated books such as recipe books ( Herther, 2012).The major strategic advantage of Barnes and Noble is its brick-and-mortar chain of stores. At the same time, this chain of stores incurs significant costs. It is recommended for Barnes and Noble to track the categories of print books the demand for which is still high, and to optimize its store layout to offer only these categories of books available for instantaneous purchase. Other categories of books should be sold in online store of Barnes and Noble.Furthermore, to stay in the publishing business, Barnes and Noble needs to keep in touch with technology. In this context, acquisitions of new technologies might be helpful for the company if these technologies can enhance reading experience. Currently Barnes and Noble can improve its market position if the company focuses on delivering ultimate reading experience and empowering it with technology. The company made a bold move by introducing Nook reader, and it would be efficient to empower this device with break-throu gh technology. In any case, Barnes and Noble should focus on online distribution of print and electronic books, and use its brick-and-mortar stores in combination with its digital strategy.

Sunday, October 20, 2019

Minor v. Happersett - Womens Voting Rights Denied

Minor v. Happersett - Women's Voting Rights Denied On October 15, 1872, Virginia Minor applied to register to vote in Missouri. The registrar, Reese Happersett, turned down the application, because the Missouri state constitution read: Every male citizen of the United States shall be entitled to vote. Mrs. Minor sued in Missouri state court, claiming her rights were violated on the basis of the Fourteenth Amendment. Text of Fourteenth and Fifteenth Amendments After Minor lost the suit in that court, she appealed to the state Supreme Court. When the Missouri Supreme Court agreed with the registrar, Minor brought the case to the United States Supreme Court. Fast Facts: Minor v. Happersett Case Argued: Feb. 9, 1875Decision Issued: March 29, 1875Petitioner: Virginia Minor, a female U.S. citizen and resident of the state of MissouriRespondent: Reese Happersett, St. Louis County, Missouri, registrar of votersKey Questions: Under the 14th Amendments Equal Protection Clause, and the 15th Amendments assurance that voting rights must not be denied or abridged ... on account of race, color, or previous condition of servitude, did women have the right to vote?Majority Decision: Justices Clifford, Swayne, Miller, Davis, Field, Strong, Bradley, Hunt, WaiteDissenting: NoneRuling: The Court ruled that the Constitution  did not grant anyone, specifically female citizens of the U.S., the right to vote. The Supreme Court Decides The US Supreme Court, in an 1874 unanimous opinion written by the chief justice, found: women are citizens of the United States, and were even before the Fourteenth Amendment passedthe right of suffrage the right to vote is not a necessary privilege and immunity to which all citizens are entitledthe Fourteenth Amendment did not add the right of suffrage to citizenship privilegesthe Fifteenth Amendment was required to be sure voting rights were not denied or abridged ... on account of race, color, or previous condition of servitude in other words, the amendment was not necessary if citizenship conferred voting rightswomens suffrage was explicitly excluded in nearly every state either in the constitution or in its legal code; no state had been excluded from joining the Union for lack of womens voting rights, including states re-entering the Union after the Civil War, with newly written constitutionsthe US had made no objection when New Jersey explicitly withdrew womens suffrage rights in 1807arguments about the need for womens suffrage were irrelevant to their decision s Thus, Minor v. Happersett reaffirmed the exclusion of women from voting rights. The Nineteenth Amendment to the US Constitution, in granting suffrage rights to women, overrode this decision. Related Reading Linda K. Kerber. No Constitutional Right to Be Ladies. Women and the Obligations of Citizenship. 1998

Saturday, October 19, 2019

Ethical analysis on a contemporary issue in the news Essay

Ethical analysis on a contemporary issue in the news - Essay Example Goldman Company is not an exception to this because; it has been in several occasions engaged in shoddy business. The company is seen as a greedy, with the sole intention of making money, and allowing its managers to acquire large wealth in the process leading to the creation of a negative image. The company is among other companies on Wall Street that are engaged in several business operations, and managed to overcome the storm of the financial crisis, and still doing well despite the challenges facing the company in relation to ethics. The role of the company in ensuring that it collects a lot of money is visible from the inception. The company, Goldman Sachs began in 1869 as a humble company with the sole purpose of clearing for commercial paper. The company founded by Marcus Goldman, and his son in law Samuel Sachs began as a loan provider for small banks. Later the company was influenced with the market environment thus moved from the set idea of the founders to start of the one-on-one loans. The company due to the method of operation led to the market crash of 1929. Despite the negative contribution, the company managed to overcome the negative image and continued to become a greater company with increased revenue and capital. The company engaged customers in making money leading to the development of a new strategy of operation, which created a chance for the company to raise more capital. The approach employed in the system was to create an investment company buys 90% shares. In buying 90% of the investment company shares, Goldman drives the share prices up, and because the shares have been bought by the company. In response, the buyers rush to buy the shares of the company which the Goldman sells at a price higher than the initial buying price. In such case, the company becomes a broker and has defied the honesty issue in business ethics. Goldman by conducting such businesses raises a lot of money. The money

Friday, October 18, 2019

The determinants of the rate of interest and the significance of Essay

The determinants of the rate of interest and the significance of interest rates to policy makers and other economic actors - Essay Example It is described as interest in percentage of the amount of funds borrowed. This is a simple explanation of the rate of interest. Let's review some definitions of the rate of interest to comprehend the concept (Unit 3). Bannock et al has defined the rate of interest as the price a borrower has to pay to enjoy the use of cash which he or she does not own, and the return a lender enjoys for deferring consumption or parting with liquidity (1998:346). According to Mike Moffatt, "The interest rate is the yearly price charged by a lender to a borrower in order for the borrower to obtain a loan. This is usually expressed as a percentage of the total amount loaned". (http://economics.about.com/cs/economicsglossary/g/interest_rate.htm). Thus, interest rate is the annually charged in percentage on the principal. Interest is derived by dividing the amount of interest by the amount of principal. Inflation and the government policies play a crucial part in bringing fluctuations in the interest rates (www.investorwords.com/2539/interest_rate.html). It is pivotal to know that although each bank decides its interest rates by its own on the loans sanctioned but actually local rates are almost same in different banks. When there is inflation, interest rates go up because of increased need of credit, tight money market, or for the reason that banks' need to maintain a higher reserves. Any of the reasons affect the business activity and the stock market as well. Businesses in need of funds have to pay more for the same amount of borrowing and the investors would prefer to invest in bank deposits or newly launched bonds than purchasing shares (http://www.businessdictionary.com/definition/interest-rate.html). Determinants of interest rate levels Parameters of interest rates (Upton, 2009) are defined by supply and demand when the supply of money is equal to the desire of economic entities to borrow. Further, it is important to know the factors that affect supply and demand. Since interest is a pay back for delaying consumption, a higher rate of interest will accrue in more supply of funds. We can say that in different circumstances an interest rate may not result in same supply of funds. In different countries people don't have the same concern for consumption, as one can perceive that there are different savings rates. When economic conditions are not stable, people are more induced to save, as seen in their behaviour during "depression generation". Demand (Upton, 2009) on the contrary, depends on the availability of investments. At the low interest rates investments provide more margins. With the positive growth environment and technological advancement, demand for investment will boost. Other things that impact future growth are rate of increase in population, labour force, and education and skill standards. On the whole economic environment and production environment determine the level of demand for funds. The interest rate is (Upton, 2009) determined by the economic and other factors causing increase in the capacity of consu

The relationship between work and life has become a key feature of Essay

The relationship between work and life has become a key feature of much current government, practitioner and academic debate - Essay Example However, issues revolving around the work – life phenomenon have recently achieved a wider social implication since the unconstructive consequences that culminate on account of the augmented incapacity on the part of the employees, which restrict their quest of striking a perfect balance between work and life, are becoming more and more palpable within the highly industrialized Western societies. In order to achieve a work life balance it is mandatory for organizations and individuals concerned to affirm that strategies and policies concerning organizational working needs of the employees be more comprehensive and must include the need to assimilate diverse perspectives such as principles, approaches and values held within and by organizations, individuals and societies and of the manner in which their interaction envisages the capability to accomplish a personal work - life balance. The pursuit for an idyllic means of combining the habitually contradictory spheres of work and private life has engaged scholars and practitioners for decades. However, the debate has deepened and gained momentum over the years to become a "hot topic" under the banner of work - life balance. The concepts of work life balance and work life boundary have gained wide spread popularity in the recent times and have been widely defined by a range of authors, researchers and theorists. Some of the key definitions of the two terms are mentioned below. Clutterbuck, (20031) defines work life balance as: "A state where an individual manages real or potential conflict between different demands on his or her time and energy in a way that satisfies his or her needs for well - being and self - fulfillment" It also refers to the state of being aware of the different demands on an individuals time and energy, the ability to make appropriate choices in terms of the manner in which one choose to allocate his or her time and energy, knowledge of the values

Thursday, October 17, 2019

Multiphoton Excitation for organic complex Essay

Multiphoton Excitation for organic complex - Essay Example wo photon absorption active; but, it is not guaranteed that they will exhibit interesting and useful three photon absorption properties such as frequency up-converted lasing [10]. Based on this reason, our University Department of Chemistry Prof Ricky Wong Man Shing and his student Dr.Xin Jiang Feng have developed and synthesized a new set of organic complexes p-PhN-OF(n)-TAZ n = 2 to 6 from deep investigation and collection of fundamental information and applications such as multi-photon properties and multi-photon cavityless lasing etc. The most important aspect is that it can let us explore and understand the more Physics behind the discovery. In this chapter, am going to analyse the use of p-PhN-OF(n)-TAZ series for a set of nonlinear optical experiments to verify the multi-photon properties. The p-PhN-OF(n)-TAZ series are type of D-ï  °-A using oligofluorenes (OF) as a ï  ° conjugated core end capped in which D is the end capped with the electron – donating diphenylam ino group and the unconventionally employed electron-deficient 1,2,4-triazole (TAZ) derivates as an acceptor designed and synthesized for multiphoton absorption investigation [10]. The electron was pushed from Donor (D) to pull side of Acceptor (A) in the ï  °- conjugation system which is called intramolecular charge transfer. In addition, the size of length of conjugation is related to enhance the cross section value of two-photon absorption and three-photon absorption [11]. Unless, the value of cross section is reach to saturation level. Under fig 4.1, the linear absorption spectra of the organic materials p-PhN-OF(n)-TAZ series (n = 2 ~ 6) was dissolved in Toluene solution, the series exhibits the two absorption peaks characteristics. The weak absorption peak appears around 300-310 nm attributed to the nï‚ ®Ã¯  °* transition of triarylamine moieties and the broad absorption band spanning from 378-415 nm corresponds to the ï  °Ã¯â€š ®Ã¯  °* transition of fluorene-based ï  °-conjugated core. The

Strategic Management in Tourism, Sports and Event Case Study

Strategic Management in Tourism, Sports and Event - Case Study Example Sports industry has grown considerably due to the growing interests related to games, health and fitness. Focusing on this aspect, the case study intends to reveal ways of doing business in light of increased environmental concerns for a popular sport organisation namely Manchester United Football Club. Besides, the case study also discusses various growth strategies that can be used for Manchester United to expand the business. Corporate Social Responsibility In the context of strategic management, corporate social responsibility (CSR) is significantly influencing the business at an alarming rate. CSR is linked with core business objectives and core competencies and it can provide positive financial yields for Manchester United along with facilitating it to create a positive environmental impact in the world (McElhaney, 2009). New Ways of Doing Business In current business context, environmental problems such as climate change create an impact on every aspect of the economy and sports industry is no exception. Sports business is potentially an environmentally sensitive segment and is likely to be impacted by climate change. In present days, there is an increasing awareness about certain environmental issues such as greenhouse gas (GHG) emission, carbon emission, energy consumption and waste management among others (The Higher Education Academy, 2008; Carroll & Shabana, 2010). CSR Initiative Optimal for Manchester United The corporate trend towards CSR signifies substantial prospects for Manchester United to capitalise on pervasive demands of sports along with the financial strength of the business (Manchester United Limited, 2011). In order to understand the most optimal CSR initiative for an organisation, first there is a need to make an internal analysis such as SWOT. Appendix 1 and 2 shows the SWOT analysis of Manchester United and the SWOT analysis with the aid of Weighting/Ranking System. Concerning the internal aspects of Manchester United, it can be stated that the organisation possesses a number of ways for positioning the CSR strategies. For instance, it can make progression towards accomplishing profit objectives by of its involvement in sport related or spectator services along with developing partnerships with other organisations in an attempt to advance CSR programs (Smith & Westerbeek, 2007). Clear CSR Leadership Position In order to be comp etitive in present day’s business environment, organisations must constantly innovate and observe the activities of the competitors. Manchester United has corporate responsibility to ensure safe and healthy atmosphere and is committed to maintain sound environmental performance by constant maintenance of environmental management system (Akesson, 2010; Breitbarth et al., 2011). Strategic Group Analysis of Sports Industry Strategic group is a concept which is used to classify groups of organisations within similar industry, having similar business models (Reger & Huff, 2010). The following figure will show the strategic groups in the United Kingdom sports industry with reference to football segment. Aspects such as extent of branding and number of market segment served have been used for demonstrating the strategic group of Manchester United. According to the above figure, the key competitors of Manchester United in the Asian market are Arsenal Holdings plc, Chelsea and Liverpo ol Football Club (Henry, 2008). Arsenal and Chelsea have focused on Asian participation being through academies and programs while Liverpool is focusing on Indian market for opening of its own academy (Chelsea, 2013; The Arsenal Football Club Plc, 2011; Eurosport, 2013) Growth Strategy for 2014 to 2015 Business growth for an organisatio

Wednesday, October 16, 2019

Multiphoton Excitation for organic complex Essay

Multiphoton Excitation for organic complex - Essay Example wo photon absorption active; but, it is not guaranteed that they will exhibit interesting and useful three photon absorption properties such as frequency up-converted lasing [10]. Based on this reason, our University Department of Chemistry Prof Ricky Wong Man Shing and his student Dr.Xin Jiang Feng have developed and synthesized a new set of organic complexes p-PhN-OF(n)-TAZ n = 2 to 6 from deep investigation and collection of fundamental information and applications such as multi-photon properties and multi-photon cavityless lasing etc. The most important aspect is that it can let us explore and understand the more Physics behind the discovery. In this chapter, am going to analyse the use of p-PhN-OF(n)-TAZ series for a set of nonlinear optical experiments to verify the multi-photon properties. The p-PhN-OF(n)-TAZ series are type of D-ï  °-A using oligofluorenes (OF) as a ï  ° conjugated core end capped in which D is the end capped with the electron – donating diphenylam ino group and the unconventionally employed electron-deficient 1,2,4-triazole (TAZ) derivates as an acceptor designed and synthesized for multiphoton absorption investigation [10]. The electron was pushed from Donor (D) to pull side of Acceptor (A) in the ï  °- conjugation system which is called intramolecular charge transfer. In addition, the size of length of conjugation is related to enhance the cross section value of two-photon absorption and three-photon absorption [11]. Unless, the value of cross section is reach to saturation level. Under fig 4.1, the linear absorption spectra of the organic materials p-PhN-OF(n)-TAZ series (n = 2 ~ 6) was dissolved in Toluene solution, the series exhibits the two absorption peaks characteristics. The weak absorption peak appears around 300-310 nm attributed to the nï‚ ®Ã¯  °* transition of triarylamine moieties and the broad absorption band spanning from 378-415 nm corresponds to the ï  °Ã¯â€š ®Ã¯  °* transition of fluorene-based ï  °-conjugated core. The

Tuesday, October 15, 2019

Poverty Essay Example | Topics and Well Written Essays - 1000 words

Poverty - Essay Example e has been an on-going debate as to the actual poverty numbers in the past with many experts claiming there as many as one billion people who fall and live below the poverty line. Most of these poor are in developing countries of the world. Sub-Saharan Africa has the highest numbers of persons living below the poverty line. According to the World Bank, studies by Bhalla (2002) and Sala-i-Martin (2002) claim that the â€Å"number of people living in extreme poverty has fallen more sharply than as indicated by World Bank estimates†. The duo suggests that first World Bank’s Millennium Development Goal (MDG) of halving the poverty rate by 2015 had in fact reached in 2000. In contrast other studies have stated that there has been no such decline as claimed by the World Bank. Reddy and Pogge (2002) and Wade (2002), in their assessment states that â€Å"the rate of decline in poverty is overstated by World Bank estimates.† These varying views are based on the various definitions or just understanding of what global poverty really is. The methods of measuring and assessing poverty data around the world also contributes to this differing school of thoughts. According to the World Bank (2008a) the world’s population living under extreme poverty dropped from 28 percent to 21 percent from 1990 to 2001 in developing countries around the world. The regions of East and South Asia witnessed most of the decline. In East Asia, the rate of poverty is said to have only dropped from 69 percent to 27 percent from 1990 to 2006. The same report suggests that the situation in Sub-Saharan Africa got worse as the number of people living under extreme poverty jumped from 231 million people in 1981 to 318 million in 2001, a 5 percent increase over 10 year period. Other regions of the world have not had dramatic changes in their poverty statistics. The economies of Eastern Europe and Central Asia which experienced a sharp drop in income in the early 1990’s have seen poverty rates

Monday, October 14, 2019

Computerized Sales Inventory System Essay Example for Free

Computerized Sales Inventory System Essay By having a plan of widening the Cunderdin-Quairading Road , conservation is still involved because the management involved in the operation were able to conserve the old and big trees. They are able to protect and enhance the environmental values of road reserves. By consulting to the Department of Environment and Conservation for a clearing permit gave them permission what trees to cut and remind them to be responsible enough on how to conserve nature despite of the more industrialized world for convenience. The study also increased the employees’ and community’ s awareness of roadside conservation. It can provide safe and efficient road access while balancing best practice environmental management. It only shows that conservation is not a hindrance to save nature even though we want to improve our community or to build business. It is just a matter of planning and remembering the environment. The study about Shire of Cunderdin: Cunderdin-Quairading Road is just an example of conservation issue that must be given attention. It shows that people are still aware of the conservation issues and trying to promote goodwill to save the planet for our future generation. II. Case Study Shire of Cunderdin: Cunderdin-Quairading Road The Shire of Cunderdin undertook road upgrade works along the Cunderdin-Quairading Road during 2011. This upgrade was in response to the state government decision to close Tier 3 grain-freight railway lines which would result in increased grain freight traffic on local roads such as the Cunderdin-Quairading Road. The road works The road works included formation works, shoulder works, drainage works, overlay and widening. The object of the upgrade was to: * clear grass, some small vegetation and minimal trees * reform and improve drainage * box out shoulders to a depth of 10 centimetres * overlay old pavement 10 centimetres * widen the pavement to 9 metres with a seal width of 7 metres Grader, loaders and trucks were used for clearing and formation works. Where the major clearing was required, such as the removal of salmon gums, skid steers and a 3-ton excavator was used to manoeuvre in places where the large plant equipment couldnt go. The road reserve along the Cunderdin-Quairading Road consists of open roadside vegetation dominated by salmon gum, york gum, acacia and sheoak species in a degraded condition, with a predominantly introduced under storey of agricultural weeds. There are no declared rare flora or threatened ecological communities along the Road. Clearing was selective and only to the extent needed. When applying to the Department of Environment and Conservation for a clearing permit, each tree or area to be cleared was recorded on a GPS, with a view to minimizing the number of trees to be cleared, and to preserve as many large trees along the road, while creating a safe and effective road for users. The amount and diversity of roadside vegetation was taken into account when widening the road, and where one side of the road was less diverse than the other, the road was widened on that side. Agricultural weeds were cleared from undergrowth, and low vegetation was cleared on two s-bends to create a better line of sight, which reduced the need for a complete s-bend realignment and subsequent major clearing. Other works along the Cunderdin-Quairading Road were carried out under exemption, as specified under Item 22 of Regulation 5 (and Schedule 2) of the WA Clearing Regulations which specifies clearing within the road maintenance zones. Future plans Although no conditions were placed on the permit, the shire plans to put in place a strategic offset program where tree planting and revegetation of degraded areas and exhausted gravel pits will be undertaken annually to offset any essential clearing of native vegetation along roadsides. Future offsets will include planting low lying native shrubs along cleared road reserves to maintain aesthetics, for weed control, and to join vegetation corridors. Offset plans for 2011-12 include the revegetation of an old road reserve that was left after the realignment of an s-bend on Doodenanning Road. Agreements have been made with the adjacent property owner to allow room for farm machinery access. The revegetation will link up with a small pocket of remnant vegetation on the landholders property and existing roadside vegetation.

Sunday, October 13, 2019

Forensic Analysis of Personal Data Leakage on Android Phone

Forensic Analysis of Personal Data Leakage on Android Phone Sheriff Drammeh  Ã‚   RESEARCH STATEMENT The proposed research will explore personal data leakage on the android mobile application platform through forensic analysis of volatile and non-volatile memory. PROPOSAL SUMMARY The proposed research will employ both volatile memory forensic techniques and traditional disk forensic techniques to the android platform in order to identify privacy breaches primarily in android mobile applications [1]. The proposed research also aims to demonstrate that forensic artifacts can be found both in the disk drive (non-volatile) and memory (volatile). AIMS AND OBJECTIVES OF THE PROPOSED RESEARCH 1. Acquire non-volatile data from an android device using the traditional forensic approach and the memory dump, analyse the acquired data for any forensic artifacts and make a comparative analysis of both approaches. This will be achieve by conducting an experimental simulation of both approaches. 2. Develop an effective methodology to improve the detection of personal data leakages and sensitive information from android mobile applications. RESOURCES The major part of this proposed research will be conducting an experiment, hence few equipments are essential to be in place in order to carry out the experiment. The proposed research is mainly memory dumping and disk drive imaging for forensic analysis. Some open source tools will be highly utilize during the course of this proposed research, such as android studio SDK, Odin, ADB and mem. Additionally, books on android forensics, mobile forensics, journals and YouTube video tutorials will also be utilize. As the research progresses more resources might be needed. The following is a non-exhaustive list of resources currently available for use: à ¢-  Window 10 OS with processor Intel (R) Core(TM)i7, install memory of 16.0GB is the host operating system and forensic workstation for disk image analysis à ¢-  Linux Ubuntu 15.10 x32 with kernel v2.6 is our forensic workstation for memory analysis à ¢-  VMware Virtual Machine v11.1.2: Will be used to install guest operating system à ¢-  Physical android phone Samsung galaxy S3: Is the subject of the experiment à ¢-  Android SDK developer tool for Linux x32: Is a software development tool used for application development and analysis. à ¢-  mem is an open source tool for dumping running process on android phone à ¢-  Odin3.-v3.10 is open source tool that enable us to rooted android phone à ¢-  Samsung usb drive for mobile phone used to enable debugging bridge between android phone and forensic workstation à ¢-  CF-Auto-Root-2dcan-2dvl-sghi747m is used to update firmware during rooting process. à ¯Ã¢â‚¬Å¡Ã‚ · AccessData Forensic tool kit version 3.4.2 ( Download FTK Imager 3.4.2) is forensic software tool used to analysis disk image file 3 | P a g e CONNECTION TO THE COURSES OF MISSM PROGRAM This proposed research is closely related to Digital forensic course (ISSM536), which is one of the course we had covered in our Information Systems and Security Management program. The proposed research used the techniques learned from this class and applied them in the android environment to reveal several types of personal information such as username, password, date of birth, postal addresses contact, photos, account number, messages etc. The comparative analysis method used covers the principles of digital evidence collection learned in Information Technology Security Laws and Ethics course (ISSM561). The proposed research has a beginning and ending, as a result it need to be managed in order to deliver the end result. Therefore, the knowledge learned from (ISSM545) System Development and Project Management. REVIEW OF RELATED RESEARCHS Fuchs, et al., [2] presented the first analysis tool for android called SCanDroid, a framework for Android to perform information flow analysis on applications in order to understand the flow of information from one component to another component. Consider a case where an application request permission to access multiple data stores i.e., public data store and private data store. The application requires permission for reading the data from the private store and writing data to the public store. SCanDriod analyzes the information flow of the application and reports whether the application will transfer the information in the private store to the public store or not. However, SCanDroid also suffers from the same limitation of security policy expressibility. In order to consider some information flow to be dangerous, the policy writers must define certain constraints prior to executing the policy. Similarly, if an information flow is not explicitly added to the set of constraints the f ramework will consider it to be safe. In 2012, C. Gibler, et al., presented AndroidLeaks, a static analysis framework for automatically finding potential leaks of sensitive information in Android applications on a massive scale[4]. It informed the user if applications are leaking their personal information. AndroidLeaks drastically reduces the number of applications and the number of traces that a security auditor has to verify manually. To secure privacy information, they set up a mappings between Android API methods and the required permissions as the sources and sinks of private data for data flow analysis. However, AndroidLeaks does not yet analyze Android-specific control and data flows. This includes Intents, which are used for communication between Android and application components, and content providers, which provide access to database-like structures managed by other components. Sasa Mrdovic et al., [3] proposed a combination of static and live analysis for memory image, which is obtained by hibernation mode (power management feature that exists in most portable computers). After they obtained the physical memory image, they used it to boot the investigated system in the virtual machine (live view) to resume the system to the same state before it went into hibernation mode. Their proposal of using hibernating feature was to obtain the memory contents without violating the evidence integrity, but during their analysis they found out that they lost all the information about network connections because hibernation mode terminates the network connections before it starts in Windows environment. As one of best well-known analysis approaches, Taint Droid detects privacy leaks using dynamic taint tracking [5]. Enck et al. built a modified Android operating system to add taint tracking information to data from privacy-sensitive sources. They track private data as it propagates through applications during execution. If private data is leaked from the phone, the taint tracker records the event in a log which can be audited by the user. In 2015,Young ho Kim et al., proposed a methodology and an architecture for measuring user awareness of sensitive data leakage, which features runtime application analysis over timing distance between the user input event and actual privacy data leak[6]. 4 | P a g e Nai-Wei Lo, Kuo-Hui Yeh, and Chuan-Yen Fan present a user privacy analysis framework called LRPdroid[7]. LRPdroid has been proposed for an Android platform to offer a user privacy management model. In the LRPdroid framework, they defined required models to achieve user privacy management: App execution data flow, user perception, leakage awareness, information leakage detection, privacy disclosure evaluation, and privacy risk assessment. To support the proposed privacy analysis model, two information capture modules for LRPdroid were designed to acquire incoming data inputted by a mobile user and outgoing data transmitted from a targeted App. A system prototype based on the LRPdroid framework was developed to evaluate the feasibility and practicability of LRPdroid. Two general App usage scenarios were adopted during the usage of Line App to evaluate the effectiveness of LRPdroid on user privacy disclosure by social engineering attack, user information leakage from normal operations o f a running App, and privacy risk assessment of targeted running App. In 2015[10], Pasquale Stirparo, Igor Nai Fovino, and Ioannis Kounelis developed a novel methodology called MobiLeak, for analysis of security and privacy level of mobile applications, which focuses more on user data instead of application code and its architecture. Their research work addressed and solved the problems related to the following three research questions for mobile environment and applications: (1)what are data and where can such data exist? (2) How is personal data handled? (3)How can one properly assess the security and privacy of mobile applications? They start their research work with a fundamental prerequisite in order to be able to properly treat them, which is studying and identifying every possibility state at which data can exist. After this step, they analyzed how real life mobile applications and operating systems handle users personal data for each of the states previously identified. Based on these steps they developed MobiLeak, which also combined concepts and principles from the digital forensics discipline. DESCRIPTION OF PROPOSED RESEARCH THE FOCUS OF THE RESEARCH The aim of this proposed research is to examine user data storage mechanism on a mobile application in a context of android platform. Analyzing mobile application for personal data leakage require extensive analysis and in-depth understanding of both the OS and application architecture. The analysis is expected to be conduct to data at rest and data in motion. The result of this proposed research will help to create awareness to both application developers and the android community that users personal data information such as username, password and other sensitive information are at risk both in volatile and non-volatile memory. Finding user sensitive data on android smart phone could be in three (3) locations: disk drive, memory and app server. Our research is limited to two out of the three application data store which is disk drive and memory, both storage areas could prove strategic locations for finding vital information for android smart phone users. The motive of this research is to examine whether applications encrypt user sensitive information both in the memory and the disk drive. This pose the following questions: 1. Does user credentials are encrypted on a memory ? 2. Among the two method which one is more forensically sound? 3. What information could be found in disk drive and not in memory? During the experimental phase of the proposed research certain applications will be examining, such as VOIP applications, social media applications, financial applications and telecom applications. I chose this samples of android application from various categories. Because these applications are fairly popular and are used by millions of people around the globe. For each application I will look at how user sensitive data, such as user name, password, date of birth and account number are store both in the disk drive and the memory. 5 | P a g e The rest of the proposed research section is divided into 4 parts: First I am going talk about my methodology, next I will present the series of preliminary result both in the memory analysis and disk analysis, third I give the highlight of the expected result and finally, I will discuss about certain obstacles that may arise. METHODOLOGY The method used in carrying out the experiment of the proposed research consist of four phases. Phase One: Gather the require tool both in term of hardware and software As the proposed research required memory dump and disk drive imaging analysis a physical android phone is needed to conduct our experiment. 1. Window Host OS and Ubuntu Guest OS as our forensic workstation 2. Android phone Samsung Galaxy S3 3. Installing Odin3.-v3 which will allow us to root our android phone 4. Install android SDK tool for using ADB(Android Debug Bridge) to get shell access on our android Phone 5. Mem application software loaded into our android phone through ADB which allow us to dump the running process from the Phone Phase Two: Installation and configuration of experimental environment At this phase all the required tools, such as the hardware and software are installed and configured. Pre-experiment of memory dump and disk imaging is performed, and tools are verified. Phase Three: Acquisition of disk image and memory dump At this phase the disk image drive is acquired using dd command tool from the internal memory to internal SDcard of the phone and ADB pull is utilize to pull/copy the disk partitions to our forensic work station. Mem program software is utilize, this allow us to dump the running process. We used ADB to install mem application into our phone in order to dump the desired running application process. Phase Four: Preservation and analysis of acquired data The purpose of this phase is to examine acquired application data both in the memory and disk drive. For example, we will check if the application is encrypting users credential both data at rest and data in transit? MEMORY DUMPING ANALYSIS This section provide detail steps taken to analysis the dumped memory of certain applications selected for this proposed research. The result shows that users credential are not properly handle by the application, which can result in personal data leakage. A program called mem was used to facilities the process dump, ABD was also used to install mem program into our android phone. List the running process and dump them into the internal SDcard and finally pull it to our forensic workstation for further analysis. Strings and sqlite3 command were utilized to look for ASCII text format from the dumped memory to understand the output result. Interestingly, the result showed that users credential are not encrypted at all. The applications analyse in this proposed research are as follows: A) Africallshop App Africallshop is a VOIP application which allows customers to buy credit online to make national and international calls and send text message worldwide to friends and family at a cheap rate. The application is 6 | P a g e rated about 4.4 in the android play store and was downloaded by five thousand (5000) customers during the time of this proposed research. The prominent outcome of this application are as follow: The username, password, caller id and user account balance are not encrypted. We ran the sqlite3 and string command on the dumped memory, which produce the result below: sip.africallshop.com XXXXXXX 0017802986780 CANADA 12590 xxxxxxxxx yes CAD proxy.africallshop.com:443 574b690276bc5 [emailprotected] 0,434 B) EHarmony App EHarmony is an online dating site for singles. Those using this app can communicate freely, share picture, video and text. During the time of this proposed research the application was downloaded by five million people and rated 3.1 in the app store. The prominent outcome of this application analysis are as follow: The user credential, such as username, password and device information are all in plaintext. The result below: POST /singles/servlet/login/mobile HTTP/1.1 j_username=sdramme1%40student.concordia.ab.caj_password=123qazplatform=androidj0r1D7fg4ArJ2uSVPgSti5zcEnltO919mHUV88E%2FKUWcan9NEMgT820MygiKsWf0Sg1147vdZbXIo tLS HTTP/1.1 User-Agent: eHarmony-Android/3.1 (SGH-I747M; Android OS 4.4.2; en_CA; id f9d8a2acfec7b901) X-eharmony-device-id: f9d8a2acfec7b901 X-eharmony-device-os: Android X-eharmony-device-os-version: 19 X-eharmony-device-type: 1 X-eharmony-client: eHarmony X-eharmony-client-version: 3.1 Accept: application/json lBxp c_te j_username=sdramme1%40student.concordia.ab.caj_password=123qazplatform=android 8KTB stevedocwra on 7 | P a g e C) Virgin Mobile My account App Virgin mobile is GSM mobile application that allow user to manage their account features and usage. Users can make payment and add a buddy to their list. This application was downloaded by five hundred thousand (500,000) people during the time of this proposed research and was rated 3.4 in the app store. The prominent outcome of this application are as follow: Sim sequence number, cell phone number, UMTS number, activation date, user data of birth, subscribe date, user e-mail address, initial password, pin unlock code and account number. all this information are not encrypted. [emailprotected]:~/android-sdk-linux/platform-tools$ strings virginmobile | grep [emailprotected] We run the ps and string command on the dumped memory, which produced the result below: imeioriginal:null,simsequenceNumber:174392323,esnequipmentType:null,imeiequipmentType:{value:LTEDevice,code:T},simequipmentType:{value:USimVal,code:U}},telephoneNumber:7802356780,networkType:{value:UMTS,code:85},language:{value:EN,code:E},isBillSixty:false,isTab:false,commitmentStartDate:null,commitmentEndDate:null,commitmentTerm:0,contractType:{value:OFF_COMMITMENT,code:O},paccPinStatus:{value:NOT_ENROLLED,code:78},padPinStatus:{value:NOT_ENROLLED,code:78},initialActivationDate:1463112000000,accountCommPref:{value:BILL_INSERTS,code:66},isAccountSMSPerm:true,birthDate:512197200000,lastUpdateDate:1464062400000,lastUpdateStamp:9863,lastHardwareUpgradeDate:null,daysSinceLastHWUpgrade:null,subscriberEstablishDate:1463112000000,daysSinceActivation:16,nextTopupDate:1465704000000,cancelledSubStatusDate:1463371200000,initialPassword:5069,isCallDisplayAllowed:false,pricePlan:VHV226,portInidicator:null,primeMateInidicator:{value:UNKNOWN,code:R},primeSubNumber:null,subMarket:{value:UAC,code:UAC },telcoId:MOBL,pinUnlockKey:[36761817,63094923],manitobaIndicator:O,thunderBayIndicator:O,portabilityIndicator:O,serviceArea:N,hasOrderInProgress:false,isWCoCSubscriber:true,hasDomesticDataServices:false,hasRoamingDataServices:false,domesticDSBlockedUntil:null,roamingDSBlockedUntil:null,isAccessible:false,promotionGroupCode:null,emailAddress:[emailprotected],wcoCDate:1463112000000}]},emailAddress:[emailprotected],arbalance:{name:{http://bside.int.bell.ca/customer/profile/types}ARBalance,declaredType:java.lang.Double,scope:ca.bell._int.bside.customer.profile.types.MobilityAccountType,value:0,nil:false,globalScope:false,typeSubstituted:false},ebillInfo:{isEBillEnrolled:true,isEBillNotifyEnabled:true,ebillStartDate:1463112000000,ebillEndDate:null},siowner:{value:BELL_MOBILITY,code:MOBL},arpuamount:19.13}]},wirelineAccounts:null,internetAccounts:null,tvaccounts:null},activeHouseholdOrders:null,emailAddress:[emailprotected]},username:7802986780,guid:SCP9O0ELLDDUN2J,profileType:BUP,savedT imeStamp:2016-05-29T01:30:38.458-04:00,profilebanNumbers:[{accountType:Legacy,ban:527566075,profileSaveTime:1463945744000}],accountType:,paymentData:[[{paymentInfoList:{billAvailable:true,lastPaymentAmount:40.18,totalAmountDue:40.18,lastPaymentDate:2016-05-22T00:00:00.000-04:00,paymentDueDate:2016-06-06T00:00:00.000-04:00,billEnddate:2016-05-14T00:00:00.000-04:00,balanceForward:0,bankAccountNumber:null,creditCardNum:null,customerId:null,ban:527566075,mdn:52756607UAV580,eligibilityInd:Y}}]]}` DISK IMAGING ANALYSIS This section provided detail steps taken to conduct traditional forensic technique for non-volatile memory acquisition and analysis. During this phase the acquired memory will be examine and the primary concern will be user data stored, in particular share_pref folder. Share_pref folder is a storage location for key-value in side application database. Android application store user data within /dev/block[8]. With the use of common forensic command, such as dd, will be utilize to image disk drive partition. For this proposed research the following partitions are imaged for analysis: System file Cache file 8 | P a g e User data Persist But our proposed research experiment will be focus on user data folder, as it is consider to be the storage location for application data. To image disk drive, shell access is need through android SDK, we then look for mount file on the disk drive before executing dd commands to copy the partition from the internal memory to internal SDcard and finally pulling it to our forensic work station using adb pull command. 1. Checking the mounted file on the disk drive mount /dev/block/platform/msm_sdcc.1/by-name/userdata /dev/block/platform/msm_sdcc.1/by-name/cache /dev/block/platform/msm_sdcc.1/by-name/system /dev/block/platform/msm_sdcc.1/by-name/persist 2. Copying the user date partition and pull it to forensic work station dd if=/dev/block/platform/msm_sdcc.1/by-name/userdata of=/mnt/sdcard/test1 17399538+0 records in 17399537+0 records out 8908562944 bytes transferred in 1934.464 secs (4605184 bytes/sec) adb pull /mnt/sdcard/test1 3. Imaging the cache partition to internal SDcard dd if=/dev/block/platform/msm_sdcc.1/by-name/cache of=/mnt/sdcard/cachefile1.img 1720320+0 records in 1720320+0 records out 880803840 bytes transferred in 118.669 secs (7422358 bytes/sec) 4. Copying the system partition dd if=/dev/block/platform/msm_sdcc.1/by-name/system of=/mnt/sdcard/systemfile.img 3072000+0 records in 3072000+0 records out 1572864000 bytes transferred in 255.874 secs (6147025 bytes/sec) [emailprotected]:/ # 5. Copying the persist partition dd if=/dev/block/platform/msm_sdcc.1/by-name/persist of=/mnt/sdcard/persist.img 16384+0 records in 16384+0 records out 8388608 bytes transferred in 0.865 secs (9697812 bytes/sec) The above command will image each partition of the mounted file of dev/block with the default block size of 512 byte during bit-by-bit copy of the file and direct the output file to internal SDcard. Finally, copy it to our forensic workstation, Which can be analysis using forensic tool called AccessData FTK imager version 3.4.2. FTK is recommended forensic tool for disk image analysis by both forensic and legal community for its powerful carving capability, stability and ease of use. AccessData FTK ANALYSIS 1. PayPal App PayPal is an online payment system that allows its member to transfer funds locally and globally. Members can receive, send money and buy or pay for goods and services online. The application was downloaded by 10 million people at the time of this research and rated as a good app in the app store. We added evidence item to 9 | P a g e FTK navigate to data and com.paypal.android.p2pmobile then share_pref folder. The folder share_pref/PresentationAccount.RememberedUsersta../ reveal user data information such as user first and last name, cell phone number, and email address. 2. AfricallShop App Africallshop is a VOIP application that allow the users to make cheap international call worldwide, user can purchase credit online to communicate with peer by text message and voice call. After adding user data partition to FTK imager, navigate to com.v2.africallshop folder, expand the folder view share_pref folder. In sher_pref folder an xml file called com.v2.africallshop-prefrences.xml was view and contain user sensitive data such as app domain name, caller ID, country, ID, user password, username and account balance all in plain text. 10 | P a g e 3. Keku App Keku is a VOIP application which facilitate call or text through Wi-Fi or mobile data. User buy credit online to make local and internationally calls. The package of the application contain probative information about the user. App database store was reveal through FTK analysis and the share_pref folder contain sensitive information about the user. In share_pref folder a file called Org.keku_preferences.xml, this file contain users sensitive data and device information such as, password, username, device-mac address and user phone number. 11 | P a g e EXPECTED RESULTS During the experimental phase of the proposed research, aim and objective of the experiment is to demonstrate or show that users personnel data information are at risk during application data process in transit and at rest. The research has observe the dumped process and disk drive imaged to reveal personal data leakage and has successfully uncover vital information about App users, such as username, password, date of birth etc. OBSTACLE The obstacles encountered during the experimental phase of the proposed research as follow: 1) Lack of enough material regarding android forensic as the field is immature 2) Unable to image the whole memory of the actual phone, as the system configuration file is missing and couldnt be found to compile it with LiMe in order to acquire the whole memory. 3) Lack of enough analysis tool to cross examine or evaluate both the dumped and disk drive memory, Ubuntu Linux tool was used to do our analysis. CONTRIBUTION TO KNOWLEDGE The proposed research show that application developers are far less careful with user sensitive data when it being stored both in the disk drive and memory in running applications. Using very simple forensic investigation techniques running strings and sqlite3 on dumped memory and disk drive imaging analysis on FTK show quite a lot of private information. OUTLINE OF FINAL RESEARCH PAPER ISSM 580/581 The final research document will be structure as follows [9]: Section 1, will be the abstract then the Introduction to the paper. Section 2, will discuss memory analysis technique. Section 3, will discuss disk imaging analysis 12 | P a g e technique. Section 4, will discusses the forensic artifacts unveil during the analysis . Section 5, related work. Section 6, the result summary. Section 7; conclusion and future work. . RESEARCH DELIVERABLES This research will be conduct in Fall Semester 2016, from September 2016 to December 2016. Nevertheless, some major preliminary steps have already being taken. Most of the required tools both hardware and software for the proposed research have already being obtained and implemented. Spring 2016 April Researching the Topic of Interest Week 1 2 Finalize the Topic with Primary Advisor Week 3 4 Read the Area/Topic of Interest May Week 1 2 Read relevant Journal or Article related to the topic of interest Week 3 4 Gathering and installation of test Environment, Conducting and Experiment. June Week 1 Writing First Draft proposal and submit Week 2 -3 Edit and Improve proposal based on advisor guidance, Further Experiment and literature review read. Week 4 Final Proposal and Submit.

Saturday, October 12, 2019

My Brain Tumor :: Personal Narrative Essays

My Brain Tumor "I am not an animal, I am a human being!" - The Elephant Man I am different, so accept me. Even though I have physical disabilities I am still a human being. When I was four I had a brain tumor. The surgery left me with a paralyzed arm, crossed eye and a deaf ear. To make matters worse, the paralyzed arm was also my writing hand and I had to learn to be right-handed. When I was transferred from North Shore Hospital to Rusk Institute for Rehabilitation in New York City, I learned to use a wheelchair and was fitted for a brace that extended from my hips to my ankles. After a year of that imprisonment, I started school. At school, I saw the other kids walking and I knew that I had to be able to walk also. My therapist, Phil Koch, gave me a walker and cut the bars that connected the brace to my hips to enable me to walk. Over the years, I became a rebel and often disagreed with my elders. If I didn't like something, I fought against it until I won. One example, when I started Stewart School, I had to wear a helmet for protection. I hated it because I knew I could walk without it. From second to fourth grade, I protested wearing the helmet. I kept fighting, but I knew I needed an event that would show others the injustice of having to wear a helmet. That occurred on my fourth grade field day. I was about to run the one hundred yard dash when my aide, Mr. Maddan, insisted we had to go inside to get my helmet. When I came back, the race was over and I was mad. I refused to participate in the rest of the events in protest. When I got home, I called my neighborhood friends and asked them to come over to help me destroy the helmet. For twenty minutes we played baseball with the helmet and my metal crutch. We simply destroyed it. Events like this helped me to show people that I can be normal. I'm now entering my tenth year since the surgery, but its effects still live on. After eleven surgeries, I still look strange and my walk is affected, but I always try to be normal.

Friday, October 11, 2019

A Story About My Mother

Vu Lan celebration is coming, on websites there are many written works about mother. They are simple but meaningful and reminded me of my mother. Accordingly, I want to share with everyone my story-a long one to tell†¦ When I was a child, I always imagined my mother as a serious and frightening woman. She was constantly forcing me to stay at home whereas my friend can freely go out and enjoy their childhood. That’s not fair!!! There was a question that kept haunting my mind â€Å"Is she exactly my mother? † . I think that I found the answer after that story.One time, being too passionate about games with my friends, I forgot to come back home, making my parents extremely worry and find me everywhere. Finding out me in the yard with my friends, she furiously shouted at me and hit me in front of all my friends including the boy that I liked. It is too ashamed! I did not have dinner and kept myself in my room on that day. During that night, instead of sleeping, I plan ned to revenge my mother in the next days. In the following day,as usual she went to work and left me alone at home .However, this time I decided not to stay alone in that boring house. Fortunately, I came across a tiny hole in the window, which was small enough for my little friends to creep into. Being too happy, we play many games one by one. Suddenly, I had an accident while I was playing skipping with my mother’s scraft, leading to my chin’s blooding. I was very afraid no matter how much my friends encouraged me. I cried so much my friends had to find the help of my neighbor. He immediately informed my mother. â€Å" This time surely my mother will hit me seriously† I thought that.Especially when I heard the sound of her motorbike, my heart beat faster to wait my mother’s punishment. Nevertheless, everything was totally unexpected. Right after the door had been opened, the scene I saw was not her furious eyes but her eyes with continuously dropping t ears. My mother hurriedly ran to me and embraced me tightly. I could not forget those eye. I feel that my mother was also painful like me. That was the moment I realized her invaluable love for me. Until now I learned that mother’s love is not just pampering but the strict as well and that mother is the one love us the most.

Thursday, October 10, 2019

Rich World Poor World

Debt is made when one party owes party money (Sofas, 2005). Just like people, governments of both developed and developing nations borrow money in order to function well and to maintain their economies (George, 1994). Debt is the economic mode that promotes economic activity in the global market (Lombard, 2004). The acquisition of debt comes through loans, grants and aid that are provided to developed and developing nations by multilateral creditors and bilateral lenders George, 1994).These creditors are international institutions such as the International Monetary Fund (MIFF), the World Bank (WEB) and other banking institutions (Millet & Toasting, 2004). The international community with their neo-liberal approach and capitalist notions of eradicating poverty was through, economic growth and development (Schaeffer, 2009). Due to increased profits (petrol-dollars) made off increased oil prices developing countries were encouraged and some even coerced to borrow money from developed na tions in the sass's and sass (George, 1994).Although their profits were invested in Western banks it did not yield impressive returns thus encouraging the global South to acquire debt (George, 1994). The global South grasped the opportunity and borrowed money to advance their infrastructure (roads and dams) and also fund industrial projects in their countries Airman, 2006). Some countries even borrowed more money what they needed. So keen the developed nations were to borrow money that they disregarded any moral and ethical standards they might have had, and granted loans knowingly, to corrupt governments and military regimes (George, 1994).Unfortunately like everything else this spending spree did not last and came to a sudden halt in the sass's, which even left the United States economy in a recession (Study Guide, 2012). Developing countries had borrowed so much money that domestic currency and macro- economies collapsed, paralyzing everything Airman, 2006). This created the firs t international debt crisis of the inalienable era (George, 1994). When Mexico announced their inability to make debt repayments in 1982, it shocked the financial community (Ambition, 2004).The impact of the debt crisis affected the entire global racket, causing interests to rise, commodity prices to fall, and income earnings to fall (Lombard, 2004). All this eventually made it difficult for developing nations to make debt repayments. The Western nations acted quickly and gained control of their economy and for them the debt crisis was soon over (George, 1994). Unfortunately the debt crisis and the nightmare for the poor developing countries were far from being.In fact it had only Just begun when they found themselves faced with much bigger debt than they initially acquired this despite having made repayments since the sass's (George, 1994). Even though Mexico was the first to default on their debt panic (Lombard, 2004). Growing concerns for the financial stability of the lending in stitutions, major creditors, and international financial institutions, sought new strategies to address the lending criteria in order to bring debt relief (Millet ; Toasting, 2004).This resulted in the implementation of the Highly Indebted Poor Countries Initiatives (HIP), and the Multilateral Debt Relief Initiatives, under the supervision of the World Bank and the International Monetary fund (Sofas, 2005). According to the MIFF and the World Bank these organizations were the answer to the bet crisis (Sofas, 2005). The notion that the debt crisis is over, is purely a myth and we will see. This essay will reveal the causes and impacts that resulted from these debt relief organizations, and incinerate the myth of the debt crisis having been addressed.The debt crisis affected the lives and dreams of many people living in developing countries Airman, 2006). Debt is nothing new but as the debt crisis grew the gap between the rich and poor widened Airman, 2006). A country debt is not just measured by the size of their particular debt, but also clearly how it impacts or effects that nation's economy Airman, 2006). A country GAP (gross domestic product) per capita is also a clear indication of a countries capacity to not only service their debt, but to also ensure that the health and well-being of their citizens are met (George, 1994).If this does not happen then clearly there is a problem, not Just a financial one but a humanitarian one (George, 1994). This was the result for many poor developing countries that led to the debt crisis Airman, 2006). But it was not only developing nations that had debt, United States is the world's biggest debtor tit $6 trillion being owed at 2002 Airman, 2006). The total debt owed by developing nations in the world came to 2. 5 trillion dollars in 1999 Airman, 2006). In Nicaragua (Latin America) their debt repayments in 2004 consumed 43% of their total earnings Airman, 2006).Many commentators argued that the debt crisis was also due t o irresponsible lending by the Western Nations (Millet ; Toasting, 2004). Like the Bhutan nuclear power station in the Philippines, that was built on a volcano in 1974 Airman, 2006). A clear indication where misleading advice caused poor developing overspent to make wrong decisions Airman, 2006). A nuclear power plant that had never ever been used, but a debt that was incurred with interest are expected to still be repaid Airman, 2006). What exploitation of the poor!The Jubilee 2000 (social justice group) lobby's that debt crisis be recognized and that unjust debt like the Philippines be cancelled Airman, 2006). They argued that poor countries cannot afford to make repayments without meeting the basic needs (education, food, healthcare) of their citizens (Cheer, 2002). They maintain that debt was conducted on unfair terms and contracted illegally (Cheer, 2002). Jubilee argues that all debts be forgiven because it perpetuates a balance of power Voluble Debt Campaign, 2007).The soluti on for the debt crisis was restructuring the debt of developing and developed countries (Millet & Toasting, 2004). The International Monetary Fund and the World Bank formed Structural Adjustments Programmed (SAPS), to provide debt relief and bring it to sustainable levels in order to maintain repayments (Millet & Toasting, 2004). SAP's were conditionality's set up specifically for poor developing countries to meet their debt repayment obligations (Cheer, 2002).They squired that poor developing countries raise interest rates, cut government barriers on trade, increase their export production and even cancelled subsides on local food production and healthcare (Cheer, 2002). This was met with criticism and caused outrage in the world. Critics argued that the West used controlling measures to control the economic policies in the poor developing counters Voluble, 2000). When Jamaica signed up with the MIFF and SAP conditionality's, they experienced catastrophic impacts Airman, 2006).Soci al service spending dropped 50% between 1980 and 1986, unemployment rose, living conditions deteriorated, infant illumination, poverty levels increased and even school pass rate dropped by 50% Airman, 20060) Not only poor developing countries had conditionality's imposed but even developed nations like New Zealand experienced the wrath of the Miff's Airman, 2006) SAP's were abandoned and the MIFF and World Bank launched the Highly Indebted Poor countries Initiative (HIP) in 1996 (Cheer, 2002).The HIP was implemented to act as an international relief mechanism, in order to reduce bilateral, multilateral and commercial debt to a â€Å"sustainable level† in poor developing counties (Cannot & Mammogram, 2009). The principle objective was to reduce debt burdens and to ensure that no poor country through restructuring was compromised, that would cause them to default on their debt repayments (Cannot & Mammogram, 2009). In other words, their mission was to assist to a certain point and then ensure that the creditors and lenders still got their money!Just like the SAP's, the Hip's initiative came with conditionality's (Cohen, 2000). The eligibility criteria required that a country be very poor, have no unsustainable debt burden and have a reformed policies track record, all under the guidance of the MIFF and the World Bank, of course (Cohen, 2000). This eligibility process was further imposed with more conditionality's until a country came to the â€Å"completion point† (George, 1994). The HIP was met with criticism because only 30 countries benefited under the HIP intuitive, and that the eligibility process took too long causing further danger to poor developing countries (Cohen, 2000).The â€Å"one size fits all† notion was unfortunately not working, because they failed to address the real issues of the inability of countries being able to provide for the basic needs of their citizens Airman, 2006). Jubilee activists pressured the MIFF and the W orld Bank with a petition at the 68, with the mission to write off all debt completely (Cohen, 2000). The enhanced HIP initiative was then launched and implemented. The enhanced HIP initiative was to provide stronger, faster, deeper and broader debt relief (Cohen, 2000). The 67 and bilateral creditors promised 100% debt relief for highly indebted poor countries (Cohen, 2000).This was unfortunately empty promises. Further protests and pressure to â€Å"drop the debt† led to Millennium Development Goals (MEG) being launched in 2000, as a benchmark for measuring the reduction of poverty (Sofas, 005). Meg's were goals set to eradicate extreme hunger and poverty, to achieve universal education, promote gender equality and empower women, reduce child mortality, improve material health, combat HIVE/AIDS, malaria and other diseases, ensure environmental sustainability and develop a global partnership for development (Sofas, 2005).In conjunction to this the Multilateral Debt Relief In itiative (MIDI) was launched in 2005 at the â€Å"Make Poverty History campaign in the UK (Sofas, 2005). MIDI was about granting debt relief and their requirement was Although many countries benefited from debt relief, only 23 countries reached implosion point and 10 reached the decision point. The HIP initially promised to cancel $63. 4 billion, but only $45. 4 billion delivered in April 2008 Airman, 2006). In April 2008 MIDI promised $50 billion cancellation, but cancellation delivered only $42. Billion Airman, 2006). All this structures and organizations that were set in place only looked to help poor developing countries on a superficial level (Cheer, 2002). The impacts of the debt crisis led to devaluation of local county currencies as inflation increased. Import costs rose, debts increased proportionally and there were he rise in export (Cheer, 2002). Employment opportunities were not enough to offset these losses. Poor developing countries made loans on the notion that their export taxes would be able to repay or maintain their loans (Cheer, 2002).Government's commitment to pay their debt came with conditionality's that exhausted their economies, unemployment increased due to income and living standards declined. When health care and food subsidies were cancelled by international creditors it forced food prices to soar causing families not able to feed themselves. This led to malnutrition and poor health. According to Jubilee Campaign (2000) Just like debt, Aids is a ‘killer† and although sickness and diseases adversely affected men, it hurt both women and children (Cheer, 2002).The burden of meeting their debt repayments caused some to compromise on the health status of their citizens (Cheer, 2002). South Africa has the largest HIVE/Lads infected population 4. 2 million) more than 12% of its people and this affects their employment market (Cheer, 2002). A health crisis that caused the health of lawyers, doctors, ordinary workers and teache rs unable to be active in their Job market, further affecting the countries social economy (Cheer, 2002). Teachers that had HIVE/AIDS are unable to work, then unable to buy medication which ultimately leads to ill-health and even death (Cheer, 2002).Disease, epidemics and pandemics places a huge burden on a countries health sector (Cheer, 2002). Children from these families suffered too because when one parent was affected some were kept home so the other could go work. If both suffered from Hides it often left children orphaned (Cheer, 2002). Girls in unemployed families were often kept home, while boys were sent to school because the cost of education was too dear. This increases the gender inequality in developing countries (Cheer, 2002).Due to unemployment, rise in prices and taxes most people in developing countries were living well below the poverty line (Thrall, 2008). According to Thrall (2008), the economic and social development of the world's poorest countries is perhaps the greatest challenge facing society at the present moment (Thrall, 2008). Over 1 billion of the 6 billion populations live in absolute poverty and suffering malnutrition (Cheer, 2002). The MIFF and the World Bank entrapped highly indebted poor countries with foreign debt that far exceeded heir entire national yearly income (Cheer, 2002).In 2000, the debt repayments of sub-Sahara African countries were about 38% of their individual country budgets (Cheer, 2002). This is unreal and even immoral, that a country earnings through import and export, is overshadowed by an unbearable burden of debt repayments (Cheer, 2002). When debt repayments affects the basic needs of any country, and a country is unable to maintain their social obligations of providing health, education by the window society survival is really slim. Hughes (1999) argues that debts hooked not be forgiven because the debt crisis is the developing nations own fault.Corrupt governments caused their countries to be in this situations and conditionality's are they only way to maintain control (Hughes, 1999). There are too many flaws in the so called economic model, and we have created a society where material gain supersedes moral and ethical commitments and standards. I believe an erosion of trust erupted, because of the exploitation of the poor by the rich colonists. The fallacy of promoting poverty reduction and debt relief had surfaced, ND exposed that the Western strategies was built on greed and power.So has the debt crisis been addressed, unfortunately not? If the international community is serious about the Hip and the MIDI initiatives then their design needs to be improved in favor of developing countries. The focus should be less on filling the coffers of the West but, instead maximize burden sharing. Have a heart and share in the burden of the developing nations by ensuring that projections are more realistic. The HIP and the MIDI could maybe become responsible for ensuring that the interna tional community commit to reducing poverty and reach their millennium goals.The mission to transform societies, improve the lives of the poor, eradicate poverty, encourage and enforce the right to healthcare, education and economic growth, is what true development is all about. By completely writing off, deleting all foreign debt gives all countries an opportunity to start afresh. This then could be the start of bridging the gap between the wealthy West and the poor South. The creation of a new world order where there is no suffering and the right to live is not questioned, but encouraged, the way it should be.