Friday, November 29, 2019

Problems And Preventions Of Ebola And AIDS Essays - Ebola, RTT

Problems and Prevention's of Ebola and AIDS Research Paper #4 Thursday, April 18, 1996 Viruses have become of great concern all across the world in the last few decades. The most common and the most talked about killer virus is AIDS, a virus that starts out as HIV and then proceeds to develop into a immune breaker that ultimately kills its human host. So far, there is no cure for AIDS, and most unfortunately the numbers of deaths from AIDS only continues to grow. However, another virus has gained much public and national attention. That virus is called Ebola. It is thought that Ebola's effect on humans is restricted to Zaire, Africa. Viruses that kill people in large masses is a major threat to mankind; the only hopes of destroying the viruses is dependant upon technology. AIDS is a deadly disease that most people understand as a sexually transmitted disease. In fact, the virus can be transmitted sexually, but it can also be transmitted through blood transfusions. The fact that it can be transmitted sexually causes a great problem. Everyday, enormous amounts of people have sex--some people with different partners. People may have less sex than before because of the threat that the virus poses, but it has already started, and cannot be stopped until a cure is found. Unlike Ebola, AIDS was not detected as early as one would have hoped. The AIDS virus can stay dormant for over a decade before it is noticed as a real problem (Shenon 8). During that decade, the virus can spread like a wild fire. One person contracts the virus, transmits it to another, and another, and so on. As Shenon explains, AIDS became recognized as a real problem in the early seventies and was mostly concentrated in the United States and in Africa, but surprisingly it reached Asia a decade afterward. He goes on to explain that AIDS has spread exponentially in Asia. Thailand, recognized for its proliferation of prostitutes and illegal promotion of sex with children, could be held responsible for the tremendous outbreak of the virus in Asia, explains Shenon. He also points out that now that the virus has already broken out, Asia has the best AIDS prevention agenda in the world (8). For now the best prevention of AIDS that is available is education and protected sex. Until a cure is found for the ruthless virus, this is the only means of prevention that is available to the public. Ebola is one of the most rapidly fatal viruses on the planet and is believed to have begun somewhere in Zaire, Africa (Altman 3). There is no positive explanation as to how the virus is spread. When the virus is contracted by humans it causes hemorrhagic fevers and becomes extremely transmittable (A Case of Deadly Virus 4). Like the AIDS virus, Ebola has no cure. The only advantage of prevention that Ebola has over AIDS is that it does not stay dormant for decades therefore, it can be isolated much quicker. Being able to isolate the virus in one town or country makes the termination of it much easier. It seems inevitable that the two most deadly viruses in the world are contracted by the idea of self preservation. As stated earlier, AIDS is transmitted sexually, and Ebola is widely spread through the consumption of chimpanzee meat that is a common delicacy in Asia (A Case of Deadly Virus 4). Just as sex is an act that is very widespread all around the world, eating chimpanzee meat in Asia is som ething that is very common. It is very hard to stop the spread of a disease when it is spread by something that seems "second nature" to a person. The action that probably ultimately stopped the virus from spreading to neighboring countries is the fact that the CDC (Center for Disease Control) and the WHO (World Health Organization) were prompt to go the scenes of outbreak and begin studying the virus (A Case of Deadly Virus 4). When just one man became infected with the disease in the western Ivory Coast, the WHO were on the case to examine the problem (A Case of Deadly Virus 4). Unfortunately, the people that are trying to stop the spread of the virus and those who are close with the victims are those people that have the greatest chance of being infected (Altman 3). After a great deal of studying the ways that the virus is spread, it became evident that there are other ways to become

Monday, November 25, 2019

Take Public Transportation - Save Money, Save The World

Take Public Transportation - Save Money, Save The World If you want to help reduce global warming, air pollution, and your monthly living costs, one of the best things you can do is to get out of your car. By walking or riding a bicycle for short trips, or taking public transportation for longer ones, you will significantly reduce the amount of pollution and greenhouse gas emissions you generate each day. The Rising Environmental Cost of Driving Alone Transportation accounts for more than 30 percent of U.S. carbon dioxide emissions. According to the American Public Transportation Association (APTA), public transportation in the United States saves approximately 1.4 billion gallons of gasoline and about 1.5 million tons of carbon dioxide annually. Yet only 14 million Americans use public transportation daily while 88 percent of all trips in the United States are made by car- and many of those cars carry only one person. Added Benefits of Public Transportation Cutting back on carbon emissions and costs usage isnt the only added benefit of using public transportation. It also helps increase the energy independence of the country overall. Although an increasing amount of our oil is produced in North America, the majority of it still comes from across the pond. Public transportation is also safer, a lot safer, in fact. Riding a bus is 79 times safer than riding in an automobile, and riding a train or subway is even safer. Its also healthier, studies have shown that people who use public transportation regularly tend to be healthier than people who do not, because of the exercise they get walking to and from bus stops, subway stations and their homes and offices. And of course, theres the reduction of costs overall. According to an APTA study, families that use public transportation can reduce their household expenses by $6,200 annually, more than the average U.S. household spends on food every year. The Heart of the Debate Over Public Transportation So why don’t more Americans use public transportation? Transportation experts and social scientists may argue about which came first, America’s attachment to the automobile or the urban and suburban sprawl that makes long daily commutes in at least one and often two cars a requirement for many American families. Either way, the problem at the heart of the debate is that good public transportation systems are not available to enough people. While public transportation is readily available in many major cities, the majority of Americans in smaller cities, towns and rural areas simply do not have access to good public transportation options. So the problem is twofold: People with access to public transportation has to be persuaded to use it more often. Additionally, more affordable public transportation options in smaller communities need to be created for use. Trains, Buses, and Automobiles Train systems are the most efficient in many ways, typically emitting less carbon and using less fuel per passenger than buses, but they are often more expensive to implement. Also, the traditional advantages of trains can be mitigated to a large extent by using hybrids or buses that run on natural gas. Another promising alternative is bus rapid transit (BRT), which runs extra-long buses in dedicated lanes. A 2006 study by the Breakthrough Technologies Institute found that a BRT system in a medium-sized U.S. city could reduce carbon dioxide emissions by more than 650,000 tons during a 20-year period. If you live in an area with good public transportation, do something good for the planet today. Park your car, and take the subway or the bus. If you don’t, then talk to your local and federal elected officials about the benefits of public transportation and how it may help solve some of the problems they’re wrestling with right now.

Friday, November 22, 2019

Art Museum Assignment Essay Example | Topics and Well Written Essays - 750 words

Art Museum Assignment - Essay Example It captures a man by a boat at the river and the tranquil surroundings. Analyzing the elements of the painting shows that horizontal lines dominate the painting indicating the calmness of the scene. The colors used are mostly tones of blue and green with hues of brown, red and yellow. The painting simulates the textures of the textile and the reeds at the river and the artist created an illusion of proximity by using the varying values of the colors. The boat and the man appear nearer to the viewer since the artist used darker values of green, brown, blue and red. In contrast, the trees and the house on the right part of the composition appear to be distant because of the lighter values of green, yellow and blue used on the forms. A River in Normandy exhibits the fine technical skill of Bonington. The artist’s precision and mastery of techniques earned the respect of his colleague Eugene Delacroix. The painting is also one of the examples of en plein air artworks at the time that artists were usually inside studios to paint. Another painting from the Dallas Museum of Art is the Sheaves of Wheat by Dutch painter Vincent van Gogh. The oil on canvas work is 50.483 centimeters x 100.965 centimeters and was completed in July 1890, the same year that van Gogh died. The piece was painted during the period that the painter was experiencing physical and mental health problems. It was also during this time that van Gogh was assumed to develop problems with his eyesight thus the colors he used were lighter in value. The Sheaves of Wheat is a non-representational painting showing bundles of freshly harvested wheat. Typical of a non-representational painting, van Gogh’s artwork does not fully resemble the heaps of wheat because of the color and daubs of paint that make up the form of the wheat stacks. Diagonal lines are prevalent in this painting, signifying movement and suggesting

Wednesday, November 20, 2019

The Future of Drinking Water Essay Example | Topics and Well Written Essays - 1500 words - 1

The Future of Drinking Water - Essay Example The primary sector comprises the primary production of raw materials or food, while the secondary sector concerns on the processing or refining of the produced goods or raw materials. As to the distribution of the finished products, the whole concern of it lies on the tertiary sector. However, all of these sectors require the availability or abundance of quality drinking water for them to function smoothly as possible. For instance, a quality and abundant drinking water source is necessary to ensure the sustainability of the basic needs in life, and consistency in the achievement of human health, and other related human needs. Furthermore, the availability of quality drinking water is necessary in order to successfully produce food or raw materials for the production of other products in the secondary sector. For example, a quality drinking water is necessary in the livestock industry so that there will be quality produced products that can be readily used in the processing industry. The processing industry on the other hand would require availability of clean and excellent water supply as integral component of the production of high quality standard processed foods. The above illustrations just simply depict the importance of drinking water in the production of raw materials and down to the processing and production of secondary product offerings.

Monday, November 18, 2019

Electronic financial transactions over the Internet Essay

Electronic financial transactions over the Internet - Essay Example Technological innovation in terms of developing security software aided this process and so did the process of globalization. As a culmination of these parallel but complementary processes, e-commerce in general and electronic financial transactions in particular has firmly taken root in mainstream global economy. While this kind of progress in such a short span of time is an impressive achievement, there is much work to be done in terms of creating robust security systems for the Internet. This essay will look into the various types of security threats facing electronic financial transactions, the potential damage they could inflict, the remedial measures to counter these threats and the effectiveness of such measures. The architecture of the Internet is such that it is inherently difficult to ensure security. Alongside this, the concept of user anonymity makes the Internet â€Å"an attractive medium for extortion and crimes involving theft of personal information for illicit financial gain† (Misra Scherer et al, 2004). As per a report released by IDG News Service, many organized crime groups avail of the services offered by hackers to implement complex and sophisticated financial schemes to swindle money from unsuspecting participants. According to the Internet Crime Complaint Center, as much as $200 million was lost in the year 2006 alone. And each year this sum seems to increase, since financial institutions like banks and insurance companies are lucrative targets for cybercriminals. A FBI report released at the beginning of the new millennia has confirmed the nexus between computer hackers and organized crime groups. Many of these organized crime groups are said to operate from Eastern European countries that were part of the erstwhile Soviet Union. In such cases, the hackers first crack the security systems in place and gain access to vital data. The organized

Saturday, November 16, 2019

Okonkwo As A Tragic Hero

Okonkwo As A Tragic Hero Essay Question. Is Okonkwo a tragic hero? To answer this question, one must first know the definition of the tragic hero. A tragic hero, as defined by Aristotle is a character who is noble in nature, has a tragic flaw and discovers his fate by his own actions. In Things Fall Apart, a novel by Chinua Achebe, Okonkwo can be considered a tragic hero because he meets all of Aristotles criteria by being a tragic hero by being a successful and respected leader in Umuofia, having a tragic flaw, and discovering his fate soon after his action. The first Aristotles criterion of the tragic hero requires that the character must be noble or a man of high status. In that sense, as described by Achebe, Okonkwo was well known throughout the nine villages and even beyond. His fame rested on solid personal achievements (Achebe, 3). Starting as a sharecropper with no inheritance from his father, Okonkwo works very hard and makes his way to a wealthy and respected man of titles in Umuofia. From his hard work, Okonkwo has 3 wives with many children, a large compound with obi for each of his wives and a large stock of yams. Okonkwo earns himself respect from people both inside his clan and outside his clan through many of his achievements. When he is a young man of eighteen, he brings honor to his village by throwing the Amalinze the Cat, a wrestler who is undefeated for 7 years. In addition, Okonkwo is one of the nine Egwugwu, a respected judge in the community who is believed to be the spirit of the ancestor. Furthermore, Okonkwo is also chosen by his village to be their representative to negotiate with Mbaino village about the murderer of an Umuofia girl in Mbaino market. With ease, Okonkwo successfully brings back a boy and a virgin as compensation and ends the conflict peacefully, without any confrontation. Similar to other tragic heroes, Okonkwo also has a tragic flaw, which is a fear of weakness and failure. While the fear of failure and weakness drives Okonkwo to work hard and helps him earns his fame and achievements, on the other hand, it also causes him many problems. Many times throughout Okonkwos life, his fear of failure and weakness leads him to act harshly, violently and impulsively toward other people, including his family members. Okonkwo is always harsh and violent with his family members because he doesnt want to be seen as a weak person. Okonkwo solves his problems only by the use strength and violence and it is this attitude that leads Okonkwo to several conflicts within his family, his failings and ultimately, his downfall. For instance, Okonkwo violates the clan rule and beats his youngest wife during the week of peace and almost shoots his second wife who comments on his gun skill. Moreover, Okonkwo kills Ikemefuna, Nwoyes close friend whom Nwoye calls brother who as ks for Okonkwos help because He was afraid of being thought weak (Achebe, 43). By trying to be a strong person and deciding to kill Ikemefuna and beats his wives, Okonkwo not only weaken his relationship with his wives and Nwoye, but also hurts himself mentally. Most important, his violent and impulsive characteristics lead him to kill a court messenger from the British during the clan meeting which soon after leads Okonkwo to the discovery of his own tragic fate. The last Aristotles criterion for being a tragic hero requires that the character must discover his fate by his own actions. Okonkwos self-realization starts when he comes back to Umuofia after his seven years exile with a great plan. However, after his arrival, he realizes that Umuofia is much changed and he is not as important and famous as he used to be before his exile. His arrival doesnt attract as much as attention as he expect and he loses his place in the Egwugwu to the another man as soon as he leaves the clan. Moreover, he also has to wait for another two years to imitate his two sons into the ozo society. But most important, Okonkwo discovers that the white men have settled down in the village. The white men establish a church and a school in the village, and then start converting Igbo people into Christian and attacking Igbo customs and faith. Okonkwo is strongly unhappy with this situation and by his violent nature; he persuades his clan to use violence to drive the whit e men out of the village. However, the clan disagrees and reminds Okonkwo that the white men also have some of the clan members supporting them. Although there is no war between white men and Igbo people, the conflicts between these two groups still often occur, including the unmasking of Egwugwu, the burning of the church and the deceptive meeting held by the white men which results in the capture and humiliation of the five clan members, including Okonkwo. However, despite these failings, it is not until when Okonkwo kills one of the five British court members, who are sent to stop the clan meeting that he discovers his tragic fate. When Okonkwo beheads the messenger during the clan meeting and sees that none of his clan members go after the escaping white men, He knew that Umuofia would not go to war (Achebe, 144). He realizes that he will never be able to drive the white men out of Umuofia because his clan will not fight with him. Realizing that he is defeated and cannot save hi s village from the white men influences, Okonkwo decides to hang himself, which is consider as an abomination in Igbo culture. Okonkwos character greatly fits the Aristotles definition of the tragic hero. From nothing, he rises to the honorable and successful leader of Umuofia. He also has a tragic flaw of a fear of weakness and failure that leads to him to several failings and ultimately, his suicide. Finally, he discovers his own tragic fate because of his impulsive murderer of the British court messenger during the clan meeting. Although Okonkwo starts his life as a successful man of Umuofia but because of his violent and impulsive characteristics, even the most successful man like Okonkwo can still falls from his grace. Work Cited Achebe, Chinua.  Things Fall Apart. Oxford: Heinemann, 1996. Print.

Wednesday, November 13, 2019

Christopher Columbus :: Christopher Columbus Essays

Christopher Columbus is an amazing figure of past history. He was known as the discoverer of America and the first true American. Recent studies have brought up a question if maybe Christopher Columbus is not the â€Å"hero† we where thought to believe in elementary school. Its is proven that Columbus’ methods of beginning colonies and taking land where cruel and barbaric. Christopher Columbus has turned out to be a different man from what I grew up believing. The first change that was brought to mind was the fashion in which Columbus ascertained the funding and supplies for his initial trip around the other side of the world. Mr. Columbus was quite a sales pitch expert. He wanted to find a passage to China, through unmarked waters. He had to receive funding for the great adventure, which had to be covered by the richest of the rich. The only place he could go would have to be the king of Spain. The fact that Columbus was Italian (a foreigner) he had to definitely make an impression on the king. Another problem was the fact that Columbus had never actually been a captain on a ship, only a passenger. There was also not a huge market for a Trans-Atlantic voyage. The fact that the idea of the world being round was a somewhat new aspect. It was amazing that this trip had started at all. The price of this trip included several boats, manpower, and survival supplies. This was all he needed to do the trip. This was not enough. Christopher wa nted 10% commission on all commerce between his discoveries and the mother country, the title of Admiral of the Ocean Sea, permanent position of governor of all new territories, and a long list of other personal demands. Columbus understood the importance of helping others get what they wanted. He presented the royalty with dreams of wealth and glory. He even appealed to their desire to spread their

Monday, November 11, 2019

Real Juice Analysis

Market With an annual consumption of more than 300 million litres (Source: Tetrapak India Study), fruit juice is not an alien concept for the Indian market. However, a very large part of the Indian consumer today feels alienated when fruit juice is packaged. Perhaps, that is why packaged juice accounts for only between 15% and 20% of the total juice consumption in India. Compared to the West, packaged fruit juice penetration, at just 4%, is still very low (Source: NRS 2005). Symbolised by the orange fruit, packaged juices and nectars are driven by fresh juice made at home and popularised by the street-side juice vendor. Dabur Foods Limited (DFL) has always taken an uncompromising stand on these consumer barriers and has consistently been thinking out of the box for the last nine years, with a resolve to innovate and evolve new products. The Real concept of sweetened juices grew from the insight that Indian consumers preferred juice sweetened – not bitter as is commonly available in the West. It innovated variants like Litchi and Guava and also introduced the latest packaging technologies in the Indian market. These innovations, driven through Real and its sub-brands, have become accepted paradigms for the industry. Innovations, coupled with rising affluence and the justarrived consuming class have injected new life into this Rs. 300 crore (US$ 66. 7 million) market – today growing at 40% per annum. Achievements With an innovative range, Real has driven the growth of the packaged fruit juice market in India. Along with its sub-brands, Real commands a market share of more than 50% in the packaged juices and nectars market (Source: ACNielsen, December 2005), achieving for itself a position of an undoubted category leader. The most important achievement of Real has been introducing the taste dimension into a category traditionally driven by health and dogood properties. With Real, DFL was also able to segment the market early, thus effectively creating a differentiated niche in the no-added sugar juice category with its sub-brand, RealActiv. The success of this variant was demonstrated in numbers, when Real-Activ garnered two-thirds share in the no-added sugar juice category within six months of its re-launch in 2005 (Source: Tetrapak India). Today, Real and its sub-brands retail across 100,000 retail outlets and 4000 food-services accounts, selling approximately 4. 5 million packs every month to more than one million consumers. Testimony to Real’s achievements has come from various quarters. While a host of brands – domestic and international – have entered this high growth market in the last few years, Real continues to be the brand consumers trust the most. In this context, Real won the Platinum award in the 9th Reader's Digest Trusted Brands Survey in the Juice category, for the year 2006. A Platinum award means that Real achieved a rating score of more than three times its nearest competitor. Since 2002, Real has been consistently winning the award for the Highest Sales Growth achieved by a brand in a non-dairy product category, at the National Dairy and Beverage seminar – Innovation for Growth – organised by Tetrapak. History The introduction of Real fruit juices and nectars was triggered by a personal unmet need of Amit Burman, the CEO of DFL who, on returning to India after working in the US, found the absence of packaged fruit juices frustrating. Traditionally, drinking fruit juices in urban India has been a social indulgence or consumed for seeking health benefits. DFL foresaw the imminent inflection point in this consumer behaviour, glimpses of which were already being witnessed in rapid urbanisation, growth in income and lifestyle changes. Also Dabur was in an ideal position to grow on the potential of the processed foods category. Its understanding of the Indian consumer, experience in managing natural foods and expertise in creating and marketing successful consumer brands was a rare mix that gave it a cutting edge. Acknowledging these positive indicators, DFL introduced the Real range in 1996 as India’s first completely natural, healthy, packaged fruit juice with no preservatives. The value add-ons revolved around several factors – ready availability of great tasting, natural, preservativefree juices in a range of fruit variants, availability in all seasons; convenience of open-pour-anddrink packaging; complete hygiene; and a healthy beverage option that gave consumers more choice. Recognising the trend that an increasing number of Indians were eating out, DFL also identified the institutional opportunity much earlier. In fact as early as 1998, Dabur became the first fruit juice company to set up a separate food services division to cater to the institutional segment. This division also partners and develops customised solutions for hotels, 156 SUPERBRANDS airlines, restaurants, caterers and hospitals. However, the road to success for Real was not a smooth one. It had to understand the very special Indian nuance of adding sugar to fruit juice extracted at home. The second learning was the fact that Indian consumers believe that packaged juices are inferior and become stale over time and that chemicals are added to extend shelf-life. Dabur invested considerably in convincing consumers that Real fruit juice was natural, preservativefree, healthy and convenient. But perhaps, the biggest challenge was developing a food-sensitive warehouse-management training programme at all levels of the channel to ensure that the freshest product reached the market. Recent Developments In recent times, Real’s single most important endeavour has been to drive relevance through segmentation and widen brand appeal. With a view to attract consumers of fruit drinks into Real’s portfolio, Real Mango Twist was launched in 2005. Mango Twist is a unique blend of mango nectar with other fruit juices. It is available in two variants – Mango Orange and Mango Papaya. In the no-added sugar category, Real-Activ offers a range of healthy fruit variants like Orange and Apple and fruit-vegetable blend juices such as Orange-Carrot, Mixed Fruit-Beetroot-Carrot and Mixed Fruit-Cucumber-Spinach. Coolers, a range of summer fruit drinks is an occasion-led variant of Real, which offers variants made from fruits known for their cooling properties. It is currently available in four variants – Aampanna, Watermelon-Mint, Lemon-Barley and Rose-Litchi. Product Targeted at the family, Real offers the largest range of fruit variety in its juice and nectar range. It has consistently innovated to re-define and strengthen its position in the Indian market. Real not only offers the most basic and generic-to-category variants like Orange and Mango, but also an assortment of varieties like Pineapple, Mixed Fruit, Grape, Tomato and fruit nectars like Guava and Litchi. On the more exotic side, Real also has Cranberry nectar. Research conducted by Blackstone Market Facts found that Real was preferred by over 50% of the respondents. Real was liked for being the better tasting juice – a category where likeability is primarily driven by taste. Ensuring that batch after batch of the right taste is delivered to the end consumer, DFL has instituted an internal taste panel, which evaluates every new product before it is sent out for product test or test marketing. DFL also recognised very early that packaging was the cornerstone of innovation in this category. This was even more critical in today’s environment where packaging has become so integral to the whole product experience and marketing communication. DFL was the first company to introduce cap on-pack. This enabled consumers the flexibility of re-use even as the cap helped retain freshness. Real uses the Tetrapak spin cap, cold fill technology and spill-proof double seal cap for packaging. This technology protects the juice and keeps it fresh longer. The spin cap also makes it convenient to pour the juice without spillage. In introducing Real-Activ, Dabur became the first juice brand in India to offer the Tetra Prisma packaging format, which is easy-to-open and has better pouring control. ability to effectively use innovative merchandising opportunities and promotions at a local level – for example, merchandising Real at fruit kiosks – to draw out the association with fruits strongly and communicate the key brand benefit of ‘As good as eating a fruit’. Promotion At DFL, the belief is that brand equity can be developed by promotions that are strategic. The advertising campaign for Real communicates the key brand benefit of ‘As good as eating a fruit’. While the family consumes the brand, the child is always at the centre of any communication. Besides the mainline communication, Real has also accomplished some innovative consumer promotions. Real Taste Challenge, for instance, was an interesting way to communicate the core benefits of Real and reinforce the brand’s core position. It involved asking consumers to identify the fruit by tasting the juice. When consumers guessed correctly, they were offered a trial discount on purchase of a onelitre Real juice pack. The ‘Real Fruit ka Juice’ offer was an innovative national promotion in which consumers were invited to contribute fresh fruit in exchange for a pack of Real. The fruits collected at various centres were donated to local NGOs working for the cause of underprivileged children. With Real, DFL is also actively involved in conducting consumer education programmes to promote nutritional awareness. These programmes are conducted at various levels – schools, doctors, nutritionists and corporates. In schools, the communication is centred on the concept of Power of 5, which conveys the importance of a well balanced, nutritious packed lunch for school kids. The doctors and nutritionists' programme is focused around the role of a septic technology in fruit juices, the benefits of packaged juices and about nutrition and safety. The corporate programme, on the other hand, addresses the role of fruit juices in building a healthy lifestyle and importance of a nutritious diet in disease prevention. One of the biggest assets for Real has been its teams’ Brand Values A housewife has succinctly put the essence of Real during a focus group session – â€Å"Real naam se hee lagta hai real juice hoga. † In the consumers’ mind, Real stands for authentic fruit juice, which defines the standard of taste and quality. As a brand, Real radiates originality; it offers the most novel products, fruit variants and a taste that the consumer is familiar with. The core essence of the brand is Original Goodness tangibly displayed by delivering healthy juices through tasty fruit variants. www. daburfoods. com THINGS YOU DIDN’T KNOW ABOUT Real Fruit Juice Real is India’s first packaged fruit juice brand. Real and its sub-brands served more than 140 million juice helpings last year. 75% of all mocktails served in India are made from Real juices. The number of packs sold by Real last year, laid side-by-side, would exceed India’s coastline of 7516 kilometres. Evolution of the Real packaging SUPERBRANDS 157

Saturday, November 9, 2019

Students’ Perception on the Use of Google+

Running Head: Using Google+ 1 IIUM Students’ Perception on the Use of Google+ in Improving Communication Skill Siti Natrah Bt Bactiar (0918444) Kulliyyah of Human Science (Communications) International Islamic University Malaysia Instructor: Mdm Norazah Md. Idrus English for Academic Writing Section 14 6th December 2012 Using Google+ 2 AbstractFor this study, its purpose is to examine whether social networking site such as Google+ can really be used effectively by students in improving their communication skill by employing quantitative research where a sample of 25 respondents consisting of undergraduate IIUM students from the main Gombak campus for survey were used where respondents were given questionnaires which were distributed through email and Facebook.The questionnaires were done in order to answer two research questions in terms of what benefits can students gain from using Google+ as a way to improve communication skills and how can IIUM implement Google+ as a way fo r students to improve their communication skills and results from the study found that majority agreed that Google+ can help improved students’ communication skills and that they are positive that IIUM will implement this method by introducing Google+ as part of learning material, similar with e-learning.Thus, through this study, it can aid researchers who want to study on the usage and impact of social networking sites especially Google+ on the development of academic communication among university students in Malaysia and also for IIUM on ways to expand the learning environment by tackling on new ways that can aid the learning process by integrating education and social networking sites resulting in an interactive and fun way of learning between lecturer and students.Using Google+ 3 IIUM Students’ Perception on the Use of Google+ in Improving Communication Skill After the introduction of Internet in 1960’s (Brown, 2008, p. 30), the world saw a transformation i n how societies interact with each other and with the birth of Facebook in 2006 (pp. 32), it has changed how people in the 21st century would communicate with each other as more and more people are communicating and developing their relationship online.Majority of youths today spend their time communicating with their friends in social networking sites (SNS) as compared to other online communication tools such as emails, discussion forum and chat rooms as it enables the users to gain instant feedback with its realtime message capabilities and a higher respond rates, allowing them to improve their communication between each other (Goddard & Geesin, 2011, p. 51).Even though most youths especially students nowadays are communicating online with their friends and families daily through various channels of communication such as personal computers, laptops, Smart phones, mobile phones and so on, it does not indicate that their communication skills are improving. Instead, many of them show ed a lack of confidence and persuasiveness during class presentation and in public speaking as most shows signs of nervousness and lack of understanding and knowledge about their topic especially when they have to present it in front of their class.Moreover, some of them displayed poor team-player image by not participating actively in group discussion and freeriding other group members in doing their assignment. For this research, the purpose of this study is to examine whether social networking site such as Google+ can really be used effectively by students in improving their communication skill. Thus, two objectives are generated from this, which are to examine how students devote their skills, time and willingness in using their social networking site Using Google+ 4 Google+) in improving their communication skills especially in a team or group based discussion in order to prepare them for the working world and to examine factors affecting their use, which leads to the developme nt of two research questions (RQ): 1. What benefits can students gain from using Google+ as a way to improve communication skills? 2. How can IIUM implement Google+ as a way for students to improve their communication skills? According to Watson, Besmer and Lipford (2012), Google+ is a social networking site, similar to Facebook, MySpace and Twitter with an added feature for group-based sharing facilities (+Circles).Social Networking Sites (SNS) helps users to create an online profile that can be viewed by the public which allows interactive communication between the user and his or her circle of friends. As mentioned by Boyd and Ellison (2007) (as cited in Greenhow & Robelia, 2009): An online social network site (SNS) is a web-based service that allows individuals to (1) construct a public or semipublic profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system (p. ). Meanwhile, communication is defined as the means of sending or receiving information, such as telephone lines or computers (Oxford English Dictionary, 2007). However, in mass communication studies, Communication refers to your ability to share beliefs, values, ideas and feelings where it is seen as a dynamic process in which people attempt to share their internal states with other people through the use of symbols (Samovar, Porter, & McDaniel, 2010, pp. 14, 21).Thus, an effective communication consists of the ability to convey a message that is understood by the audience verbally and non-verbally such Using Google+ 5 as through gestures, facial expressions and postures and that which requires a two-way communication. As more and more youths are connected to their digital devices, their network relationships have also expanded from offline or face to face relationship to online relationship. Thus, many researches have been done to study on the usage and impa ct of social networking sites (SNS) on users’ social development.In addition, with the majority of social networking sites’ (e. g. Facebook ) users are adolescents and young adults who are still in high school and college, studies have found that social networking sites can influence the academic and social development of the students (Naeema, 2011; Ahn, 2011; Golder, Wilkinson, & Huberman, n. d. ). Moreover, Lampe, Ellison, and Steinfeld (2007) and Subrahmanyam and Greenfield (2008) mentioned that†Ã¢â‚¬ ¦emerging adults’ use of the internet is predominately social in nature, typically with people known from offline contexts. , as cited in (Reich, Espinoza, & Subrahmanyam, 2012, p. 364). However, the studies done tend to focus on the usage of Facebook and its implication on the general academic and social development of the users. There was little studies conducted on Google+ (Watson, Besmer, & Lipford, 2012), an emerging social networking site that was in troduced by Google in mid 2011 (Pascopella, 2011) which provides a more comprehensive features that are unique from Facebook such as +Circles that lets the user to share information that can only be known by selected group of friends.With Google+, students can gain considerable benefits as compared to Facebook with its features that can be used for group or team discussions. In addition with the lack of studies on the usage of Google+ by students, little research was done to explore on students usage and willingness in using social networking sites in improving communication skills. Using Google+ 6 MethodParticipants For this study, a sample of 25 respondents for survey were used which composed of undergraduate International Islamic University Malaysia (IIUM) students from the main Gombak campus who are currently taking courses offered in the Gombak campus such as IRK, HS, KAED, ENGIN, EDU, ICT, AIKOL and ENMS. The 25 respondents were selected from students in EAW class of section 1 4 and those who have answered the questionnaires which was posted through Facebook.Materials Respondents were given questionnaires that were done through Google Drive (see Appendix 1) consisting of 12 questions that are divided into three sections with three compulsory questions on gender, Kuliyyah and level of study of the respondents while Section B consists of questions on having a social network account, frequency in updating their social network profile, user of Google+ and time spent connecting to social network site and Google+ which can help to answer the first objectives while for the third section (Section C) was used to answer the second objective and two research questions, one question using eight-element questionnaire using Likert-like scale was used and three other questions on reason for using Google+ and how IIUM can implement Google+ into their system.Procedures The questionnaire was distributed to the 20 respondents via email by providing them the link to access t he questionnaire from Google Drive while the remaining five respondents were provided with the link to the questionnaire by posting the link on own Facebook profile. The purpose and objective of the research were stated clearly in the questionnaire for Using Google+ 7 respondents’ clarification and the questionnaire only took five minutes for respondents to complete. Data Analysis Descriptive statistics is used in analyzing the data and as the research instrument used in collecting the data was questionnaire, it will involved numbers making it easier for the data to be quantified.In descriptive statistics, frequencies such as percentages and graphs such as bar chart will be used in describing the data as it will focused on the differences such as the highest and lowest amount which will help in examining the frequencies of usage in social networking sites especially Google+. Google Drive provided the service of analyzing the data and describing it through graphs. In addition to Google Drive, Microsoft Excel will also be used. Using Google+ 8 Results The questions from the questionnaire (See Appendix 1) are generated in order to answer two research questions for this study which are 1) What benefits can students gain from using Google+ as a way to improve communication skills? 2) How can IIUM implement Google+ as a way for students to improve their communication skills? nd from the data that have been collected, 15 respondents (60 percent) agree that Google+ can be beneficial to students especially in improving communication skills while only two respondents (8 percent) strongly agree that Google+ can help improve communication skill. On the other hand, there is a balance between the number of respondents who disagree that Google+ can be beneficial to students in improving their communication skills with four respondents (16 percent) expressed disagreement while another four respondents expressed strong disagreement, as illustrated in the figure below: F igure 1 taken from Microsoft Excel Using Google+ 9 Meanwhile, pertaining to the second research question (How can IIUM implement Google+ as a way for students to improve their communication skills? ), the question ‘If yes, how do you think it can be implemented? is used in order to identify how students perceives the method for implementation of Google+ by IIUM with answers provided for them to check (See Appendix) . The answers from the respondents are listed in the figure below:- Figure 2 taken from Microsoft Excel As respondents can tick more than one answer for this question, almost half of the respondents chose ‘introducing Google+ as part of learning material, similar with e-learning’ (48 percent) while ‘introduce more team-based learning or collaborative learning through using Google+’ came a close second with 26 percent. Meanwhile, with a minor difference of 3 percent is the answer ‘making it compulsory for students to open a Google+ acc ount’ (23 percent).In contrast, ‘other’ only constitutes of 3 percent or only checked by one respondent who stated that there is no need to use Google+. Using Google+ 10 Thus, with the findings of the data collected from respondents are illustrated from the figures above, it shows how the findings have answered the two research questions for this study. For the rest of the answers from the respondents, it can be viewed from the summary of the responses (See Appendix 2). Discussion Based on the results from the survey, it can be deduced that a majority of respondents viewed Google+ positively as being beneficial to IIUM students in improving their communication skill, especially in a team or group based discussion.This is also inline with the studies by Naeema (2011) where majority of Sultan Qaboos University (SQU) students that were asked, were willing to use social networking sites for better academic communication and learning with all agreed that social networ king sites such as Facebook and other social networks are great form of communication that enable groups to meet and discuss matters (p. 99, 100). This shows that students in general are open to new way of learning, as evident in IIUM students’ willingness to use social networking sites such as Google+ in improving their communication skills. In addition, regarding on how IIUM can implement Google+ for students use in improving their communication skills, most respondents perceived that IIUM will introduce Google+ as part of learning material, akin to e-learning which can be advantageous to the student. Unlike -learning where communication mainly occur between the instructor or lecturer with their student (owner of the account) only, Google+ can offer a wide communication between the lecturer and the rest of his or her students and also students with their fellow classmates as long as they have a Google+ account. This is also similar to naeema’s (2011, p. 101) viewpoin t where according to her, ‘by integrating social network Using Google+ 11 technologies into the learning environments, students will learn from each other, explore regulations from experiences where students at advanced levels can help beginners’. Similarities between methodology used and the topic of research played a role in the outcome of this research.Both researches used university students who are active users of social networking sites and both employed quantitative research especially survey using questionnaire in gathering their data. In addition, the topic of research are somewhat similar with each other with Naeema doing a study on social networking as a tool for extending academic learning and communication whereas for EAW research, it tackles on IIUM students’ perception on the use of Google+ in improving communication skill. Using Google+ 12 Conclusion In conclusion, Google+ can be used by IIUM students in improving their communication skill as majo rity of respondents agreed that Google+ can help improved their communication skill and their optimism in how IIUM can implement Google+ into their curriculum.In addition, from the data collected, it has also fulfilled the objectives of this study as most of the respondents asked were active users of social networking sites and who mostly used these sites such as Google+ to keep in touch with friends and families and also for academic communication. Through this, the purpose of study which is to examine whether social networking site such as Google+ can really be used effectively by students in improving their communication skill, have been answered. Moreover, through this research, it can aid researchers who want to study on the usage and impact of social networking sites especially Google+ on the development of academic communication among university students in Malaysia as few researches has been done on Google+ and its perceived usefulness in improving communication skills of st udents especially in Malaysia .In addition, it can help IIUM on ways to expand the learning environment by tackling on new ways that can aid the learning process by integrating education and social networking sites and widen their perspectives on social networking sites being not just to establish and strengthen social relationship only but it can also help students in academic development which results in an interactive and fun way of learning between the lecturer and students. As the study was done through using limited number of respondents in terms of sample used and the method for data collection, the study may not have a high reliability and it may not reflect the perceptions and views of all university and college students in Malaysia. Using Google+ 13Thus, due to this limitation, this research can be improved in the future by changing the methods that have been used by this research such as increasing the number of respondents, changing the sample population by choosing stud ents from all universities and colleges in Malaysia or changing the type of research by using qualitative research such as in-depth interview or focus group instead. Thus, by changing the methods used it can lead to a different results of the study. In addition, by changing the purpose and objective of the study it can also direct the researcher to collecting different data and findings, for example, instead of looking at how Google+ can be used for academic development, the researcher can try to study on the impact of Google+ on the academic achievement. Using Google+ 14 References Ahn, J. (2011).The Effects of Social Network Sites on Adolescents' Social and Academic Development: Current Theories and Controversies. Journal of The American Society for Information Science and Technology, 62(8), 1435-1445. doi:10. 1002/asi. 21540 Brown, D. (2008). Chapter 2: Historical Perspectives on Communication Technology. In A. E. Grant, & J. H. Meadows (Eds. ), Communication Technology Update an d Fundamentals (11th ed. , pp. 30-31). Oxford: Focal Press. Goddard, A. , & Geesin, B. (2011). Unit four: e-language 2: real-time writing; social networking sites. In A. Goddard, B. Geesin, A. Beard, & A. Goddard (Eds. ), Language and Technology (1st ed. , pp. 51-52).London: Routledge. Golder, S. , Wilkinson, D. , & Huberman, B. (n. d. ). Rhythms of social interaction: messaging within a massive online. Palo Alto: HP Labs. Greenhow, C. , & Robelia, B. (2009). Old Communication, New Literacies: Social Network Sites as Social Learning Resources. Journal of Computer-Mediated Communication, 14, 1130–1161. doi:10. 1111/j. 1083-6101. 2009. 01484. x Naeema, H. J. (2011). Social Networking as a Tool for Extending Academic Learnning and Communication. International Journal of Business and Social Science, 2(12), 93-102. Oxford English Dictionary. (2007). e-kamus 5. 02 Professional Edition. Alaf Teras. Pascopella, A. (2011, October).Will Google+ Be the Answer for Safe Social Networking? District Administration, p. 1. Using Google+ 15 Reich, S. M. , Espinoza, G. , & Subrahmanyam, K. (2012). Friending, IMing, and Hanging out Face-to-Face: Overlap in Adolescents' Online and Offline Social Networks. Developmental Psychology, 48(2), 356-368. doi:10. 1037/a0026980 Samovar, L. A. , Porter, R. E. , & McDaniel, E. R. (2010). Communication Between Cultures (7th ed. ). Boston: Wadsworth Cengage Learning. Watson, J. , Besmer, A. , & Lipford, H. R. (2012). +Your Circles: Sharing Behavior on Google+. Symposium on Usable Privacy and Security (SOUPS), (pp. 1-10). Washington. Using Google+ 16 Appendix 1 Using Google+ 17 Appendix 2

Thursday, November 7, 2019

Cyber Security Threat Posed by a Terrorist Group

Cyber Security Threat Posed by a Terrorist Group Summary Cyber terrorism refers to terrorist attacks that are aimed at computer systems. It is similar to the traditional physical terrorism in its aim of distraction with the difference that it targets computer systems and not human beings and other physical property.Advertising We will write a custom essay sample on Cyber Security Threat Posed by a Terrorist Group specifically for you for only $16.05 $11/page Learn More This paper highlights possible cyber terror threats in Australia in government agencies and the commercial sector. Possible options over terrorism is then highlighted which include international efforts to curb the vice. The paper recommends independent efforts by institutions, governments and the international community in the war against the vice. Background The history of cyber terrorism spans back to the development of application of internet services that was introduced in the 1970s. The introductory use of the internet was centrally op erated throughout the globe but this was changed with decentralization that resulted from the cold war conflict between the United States and the Soviet Union. The initially restricted use of internet was also liberated towards the year 1990 that allowed private individuals to freely use the internet. The availability of internet together with its terms of usage which are associated with high degree of freedom has been identified as the main reason why it has been transformed by some individuals and groups as a weapon for assault. One of the realized features of the internet usage that makes it a weapon is its accessibility and â€Å"little or no regulation, censorship, or other forms of government control† (Pladna, n.d., p. 3) that offers an unregulated practice. The internet is similarly identified to be affordable and at the same time anonymous that offers opportunities for undertaking activities in the background. These among other features of the internet have been ident ified to form the basis of the cyber terrorism attacks (Pladna, n.d., p. 3). Particularly identified attacks of this nature have included hacking of data in other entity’s accounts that are normally aimed at causing harm to the systems and even a subsequent damage to the parties. An example of such attacks would include gaining an unauthorized access to a country’s security system with the aim of compromising the system.Advertising Looking for essay on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More It can also take the form of compromising information of an institution with the motive of causing harm. An attack can, for instance, be made with respect to the information system of a health service institution. This takes the form of altering information about patients with a subsequent effect of causing an inappropriate medication that can cause harm to the institution’s patients. The examples illustrate the two categories of cyber terrorism, â€Å"effect based and internet based† (Pladna, n.d., p. 4). Cyber terrorism attacks are said to be effect based if they are primarily meant to cause fear among individuals. Though the attacks are based on computer systems, their effects are normally similar to those of physical terrorism. Internet based cyber terrorism are on the other hand intended to cause damage rather that fear. This form of attack is associated with compromising systems of an entity so as to cause loses due to system malfunctioning. Cyber terrorism can thus be associated with intentions to establish â€Å"loss of integrity, loss of availability, loss of confidentiality and physical damage† (Pladna, n.d., p. 4). Application and subsequent development of cyber attacks have similarly been associated with development of technology and the globalization effect that has stemmed up efforts to curb the traditional physical terrorism. Factors such as high security along country boarders that has for instance restricted the activities of terrorists in the international concept has seen terrorists resort to the use of the internet to attain their objective of causing destruction. Contrary to the restricted across boarder physical movements due to security, the internet does not have any form of geographical limitation thus allowing access to any country.Advertising We will write a custom essay sample on Cyber Security Threat Posed by a Terrorist Group specifically for you for only $16.05 $11/page Learn More This has particularly lured terrorists to the cyber attacks. Engagements in illegal activities that have also been significantly associated with terrorist groups such as drug trafficking and even smuggling of illegal arms have witnessed a corporation between the terrorists and other parties such as computer specialists among others to help in ensuring the success of these illegal activities. Accessing syst ems of other parties such as a country’s security system for example reveal loopholes which can then be used to smuggle the commodities past security forces. Cyber attacks can in this manner be used to disrupt systems by causing inefficiencies which then allows for the illegal intentions of the groups. Reports have also indicated the use of cyber attacks to defraud individuals of money through credit cards. Intelligence has also revealed that the internet has been converted into a hub for terrorist group as a centre through which they â€Å"communicate, conduct operational planning, proselytize, recruit and train to obtain logistical and financial support† (Pladna, n.d., p. 5). Developments and increased level of cyber terrorism has adequately extended to the dependence of technocrats with individual groups either hiring computer specialists or training ones for their operations. The developments have also led to transformations of targets to make government institutio ns and corporate entities as the main targets of the terrorist attacks (Pladna, n.d., p. 5). Possible threats facing Australia due to cyber terrorism Cyber attacks have been significantly identified in Australia to be majorly attached to political motives in addition to the creation of â€Å"harm and the spread of fear to people† (Beggs and Warren, 2009, p. 2) with the aim of influencing either domestic or global activities. Example of access to official data from an institution or an agency that is then used to launch an attack by altering system operations which would then lead to an accident such as an explosion are for example highlighted in Australia as a possible cyber terrorism. This would be due to the expected level of harm and fear together with destruction that such moves would create. The supervisory control and data acquisition (SCADA) is for example identified as the potential target for cyber attacks. The system is used to manage distribution of commodities in the country, some of which are primarily essential.Advertising Looking for essay on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More This involves the distribution of materials such as â€Å"water, gas and electricity† as well as the transportation of waste materials for disposal (Beggs and Warren, 2009, p. 2). The SCADA system has at the same time been transformed to depend on modern technology for its operations. Integration of modern software as well as hardware has been the characteristics of operations of the system. There is therefore a possibility of security breach with respect to the system that can be used to launch attacks on the operations of the system. This is actually an imminent threat owing to the fact that such attacks have been realized in Australia in the past few years. Cases such as attacks on â€Å"the polish tram system in 2008, Estonia in 2007, SQL Slammer in 2003, Queensland in 2000 and Gazprom in 1999† (Beggs and Warren, 2009, p. 2) are illustrations that brings the possibility of similar actions. The application of technology to operate the systems makes it liable for man ipulation that can then lead to harmful incidents. An individual who gains access into the system can for example greatly increase the pressure with which the fluids such as water, gas and even waste materials are transported in order to cause explosive busts of the transporting vessels. This would for example lead to immediate harm of individuals at the explosion site as well as the curtailed delivery of services that will be interrupted. There will also be the impression of incompetence of the system that will be created in public opinion as well as extended fear of possible breaches in other services that can be very dangerous (Beggs and Warren, 2009, p. 4). Another possible cyber terrorism threat to Australia is its corporate system. The level of vulnerability that has been realized in a variety of institution has raised alarm over the safety of the business sector in the country. Experience of attacks that have been realized with respect to the country’s infrastructure h as a possibility of shifting to commercial organizations. The breach in the commercial sector can take two forms, attacks on organization as the main target or attacks on systems in financial institutions with the aim of extracting money from people’s accounts. An attack on an organization can take the form of paralyzing the information system of the organization which can at the same time be accompanied by subsequent harmful activities by the terrorist. In either way, a disruption, financial loss and fear with respect to security will have been realized. Attacks which are aimed at accessing people’s accounts for transferring money from such accounts will on the other hand have effects on both the institutions as well as the individual customers. Similar impacts such as instilled sense of insecurity and fear as well as lost trust will be realized due to the attacks. Fears of such cyber attacks on the country’s security systems such as the armed forces have also been raised. This would however be more serious with possibility of subsequent physical terrorism attacks. Though the short term effects of the different attacks may vary, there is a long term impact that such cyber attacks impose to Australia and any other country that is faced with threats of cyber attacks. There is the issue of economic instability that may result from the fear that is occasionally induced by the cyber attacks. Individual account holders whose accounts are hacked and misappropriated will for example suffer from economic instability that might be spilled over to the country’s economy especially if a significant number of accounts are compromised and the funds diverted outside the country. Attacks on corporate institutions and government agencies are also characterized with an increased level of insecurity that can scare away investors to the disadvantage of the country’s economy (McDonald, 2010, p. 1). Such threats have similarly been realized in oth er countries such as Britain. Though Britain never took a drastic measure following an attack which it realized in association with cyber terrorism in the year 2005, it was recognized as a possible future threat that is worth consideration. Cyber attack threats have also been identified in the United States though no significant countermeasures have been publicly outlined (McDonald, 2010, p. 1). Options against cyber terrorism The extensiveness of the use of computers that provides room for international attacks from any part of the globe offers restrictions over independency of states and nations in the war against cyber terror. One of the options that can be employed to curb the attacks is the combined effort of the international community against the vice. Use of conventions such as the one that was established in Europe in the year 2004 is thus an alternative. Under these provisions, standards can be outlined that can then be universally used to regulate the use of the internet for harmful purposes (Rollins and Wilson, 2007, p. 21). A comprehensive international collaboration among investigators and prosecution teams in cases of cyber attacks have also been identified as an option to controlling the practice. The need to control the use of the internet due to the attacks is however countered by the fact that the wide use of the internet is identified to be of importance (Escorial, 2009, p. 4). Recommendations Following the global threat over cyber attacks, a globally established body is required to ensure appropriate regulation and prosecution with respect to the terrorists. Individual countries are also supposed to take measures to protect their institutions from such attacks by ensuring standards for safer systems. Individual institutions are also supposed to strengthen their system and immediately report any identified attacks. References Beggs, C and Warren, M. (2009) Safeguarding Australia from cyber- terrorism: a proposed cyber terrorism SCADA risk f ramework for industry adoption. [Online] Available from http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1004context=iswsei-redir=1#search=%22cyber%20terrorism%20threats%20australia%22 Escorial, San. (2009) CoE- OAS/CICTE Conference on terrorism and cyber security, conclusions. [Online] Available from: coe.int/t/dlapil/codexter/3_CODEXTER/Working_Documents/Conclusions%20CoE%20OAS-CICTE%20Conference.pdf McDonald, T. (2010) Governments on alert for cyber terror threat. [Online] Available from: abc.net.au/news/stories/2010/10/19/3042762.htm. Pladna, B. (n.d.) Cyber terrorism and information security. [Online] Available from: infosecwriters.com/text_resources/pdf/BPladna_Cyber_Terrorism.pdf. Rollins, J and Wilson, C. (2007) Terrorists capabilities for cyber attack: overview and policy issues. [Online] Available from: fas.org/sgp/crs/terror/RL33123.pdf

Monday, November 4, 2019

Network Risk Assestment Research Paper Example | Topics and Well Written Essays - 1250 words

Network Risk Assestment - Research Paper Example The network layout of I.T soft requires an expandable and efficient network that will fulfill the requirements of the company. Advanced security features are also required in order to protect the VoIP traffic and preserve network availability. As I.T soft an automated business support network. The network is utilizing latest technology in terms of both hardware and software, however cost considerations cannot be ignored as the company is an SME. The software technology includes the new innovative network that supports the following: As seen in Fig 1.1, there is no protection on the Internet connection that is terminating on the router. The connectivity from the router to the two data switches i.e. switch connecting to the data center and the second switch connecting the access points also have no protection. However, MacAfee EPO is installed on the server and on the workstations as well. The centralized anti- virus works on defined policies and scans workstations, USB drives and downloads from the Internet. In this scenario, if any threat enters the network from the Internet and penetrates in the server hosting Mcafee EPO server, it will certainly corrupt the operating system and consequently, infect the EPO server as well. Identified risks from the Internet are virus and malicious codes. For physically securing the information systems, there are no physical controls currently. As shown in Fig 1.2, there are no physical controls on the data center and everyone can enter without verification and authentication. The sales database and customer database are connected to the switch. Every request from the users is redirected to the router, where the router checks the Access Control List (ACL). In this scenario, the accounts staff has permissions to access these servers. However, all the other users on the network are restricted to access these servers. I.T soft has configured an email server to provide email

Saturday, November 2, 2019

Are people obligated to fight evil if they have the ability to do so Essay

Are people obligated to fight evil if they have the ability to do so And are intellectuals the most fit to lead society - Essay Example It can be termed as destructiveness, as well as motives of causing pain and suffering for selfish or malicious intentions. Leadership, conversely, has been illustrated as the procedure of social authority in which an individual can procure the aid, as well as support, of others in the deed of a common duty. Other in-depth meanings of leadership have also materialized. This paper will discuss whether people are obligated to fight evil if they have the ability to do so and whether intellectuals are most fit to lead the society than non-intellectuals. Question 1 There is a distinction between an individual who is uninformed of social etiquette and a person who has a permanent impulse to wound and hurt other people. There is also a distinction between someone who has a rough day, as well as someone who is rough every day. The fact is that evil, as well as an evil person, is characterized by deception, viciousness, cruelty among other traits (Freeman 1). However, at other times people jus t might be having one of those temporary lapses that everybody has at times. The known characteristics portrayed by evil characters are: destruction, depiction as well as manipulation. Destruction is where by people aim to cause damages. Evil people recurrently tear down relationships plus they cannot maintain friendships. Evil people continually wound other people with cruel actions, as well as speeches. Now, a way of obviously fighting this person would be simply to avoid him or her. However, the challenge is how to note an evil person before a person becomes interactive with him or her. Another trait of evil or an evil person would be deception (Freeman 1). It is a fact that evil individuals chronically tell lies to the extent that people never know when they are telling the truth. People are obliged to avoid such behaviors, and they should take it as their initiative never to believe a word of an evil person. It is viable even not to talk to evil people. That is a vital way of t aking the initiative of fighting evil. Evil is also known to be a vital factor of manipulation. This is because evil people do not have a ‘god’ complex. Evil individuals desire to be the center of the universe. They also think that they are the center of the universe. Hence, they will proceed with what they want so as to acquire what they need. Now, a person with high self esteem, as well as morals, cannot easily be manipulated. The only means to fight such an individual is to show them that they cannot easily control a person’s life. That acts as a diminishing factor to evil people since they want to control everything (Freeman 1). This is a way of taking your own initiative to fight evil. Also, simply hoping that evil or an evil person will get better will not work. Hoping they will astonish people with 'goodness' is also a poor strategy. If a person is in a position to control evil, then they should undertake the task. It will mostly work if the person takes o n the evil person in public. This will put the evil person in a tough spot. It is not advisable to send any message such as a text or email, not unless from a lawyer. Also, people can tackle evil if they have the ability to involve a higher person in the society (Freeman 1). If the evil person is breaking the organizations rules, the person should involve the boss in a way of fighting that evil. It is also advisable to make their actions known by everybody. Everybody trying