Saturday, August 31, 2019

Bio-Medical Discourse

Discuss the strengths and limitations of social work practice within an organization, such as a hospital, that operates from a biomedical discourse (give an example)? The biomedical discourse is one of the most influential discourses in the health care profession today (Healy, p. 20). Biomedicine is a dominant and pervasive model in health care settings and there are strengths and limitations in working within the this discourse.One of the strengths of working within this model, it allows you to work within a multidisciplinary team with psychiatrists, doctors, nurses, and other medical staff and this opens up a whole new perspective for social workers. We get to see the medical side of things and how that affects the person. When a medical professional see’s a patient they see the direct problem of that patient and there disease.Using this model and all of our social work skills and approaches will give us a total picture of what is happening in that person’s life by no t only looking at the environment but putting other factors into place such as the biological aspect. We can help out clients navigate through the health care system and can clarify medical terms to help them feel at ease with there illness. The biomedical discourse has its limitations as well.This model works under the belief that disease’s are caused by a specific biological agents or processes and fails to take a deeper look at the individual environment and living factors. It is out job as social workers to look at all of the other factors such as environment, family, culture ect of that individual, not just the focusing on the person and modifying the person. I worked with a social worker on the cardiac rehab unit at the Glenrose Hospital and she worked with a patient that had a heart attack and had bypass surgery and is now in rehab.He was given medications to take after the surgery and most likely will be on for the rest of his life. The doctors tell the patient all ab out the medial procedure they just had, what current medications they are on and how to take them and what the side effects are, nut never talk about all the other factors that come into play. The social worker has to now prepare not only the patient to return home but has to prepare the family as to how there environment will be changing in order to have a safe recovery for the patient.As social workers it can be hard for us to ignore the environmental contributions in an individual’s life. The social worker only had two visits with the patient and the family, the nutritionist had another two visit’s and the physician has on going visits with the patient for as long is needed. The physician was only concerned with the disease and diagnosis of the patient and modifying the person. Another limitation is the focus on medicalization. Not everyone is in need of medical attention and to be put on medication.Our jobs as social workers are to recognize that people’s en vironments really do affect them. Person can come into see there GP and tell them that they are depressed, the first thing they do is put them on med’s for their depression. They don’t look at what has been going on in that person’s life, have they been through a major trauma, what changes have been happening. All they look at are the symptoms and the medications to go along side of them. This determines that the doctor is the expert and knows best.

Friday, August 30, 2019

Corruption in Electricity Sector

INTRODUCTION Corruption is a topic of interest and concern in academic circles, in the media, among people of different professions, within the civil service, among members of parliament, politicians, government officials, members of the business and financial communities, students, foreign investors, aid agencies and non-governmental organizations. In other words, the term corruption is not new to Bangladesh. A general impression conveyed by the media and by popular discourse is that among ordinary people in Bangladesh; corruption is viewed quite clearly as ‘a way of life'.A recent survey carried out by the Bangladesh Unnayan Parishad reinforces that impression: the survey found, among other significant data, that 95 per cent of respondents believed that the police were the most corrupt department in the land, followed very closely by the customs, the department of excise and taxation, the bureaucracy, and the judiciary. A solid 62 per cent of respondents believed that the pri mary responsibility for corruption in Bangladesh lay in the hands of government officials. Corruption is not identifiable as a single, separate, independent entity which can be isolated and destroyed.Corruption is a complex set of processes involving human behavior and many other variables, some of which are difficult to recognize or measure. Even though corruption manifests itself as a force on its own and often generates its own momentum, it is linked to many other factors, and it is by understanding these factors that we can hope to understand corruption. What is corruption? There are several meanings of the word corruption but when we use the term, we usually refer to a specific kind of exchange, activity or behavior.For instance, corruption could mean a process of physical decay or degeneration; the loss of innocence; a state of moral impurity or moral deterioration; perversion in taste or language; and also the wrongful, negligent or willfully corrupt act of a public official in the discharge of his or her public duties. Corruption is the abuse of entrusted power for private gain. It hurts everyone whose life, livelihood or happiness depends on the integrity of people in a position of authority. Corruption (philosophical concept), often refers to spiritual or moral impurity, or deviation from an ideal.Corruption is not just an economic exchange, generated by a monetary or ‘economic' motive. Neither is corruption an exclusively political activity, motivated by a desire to attain or retain political power. The process of corruption is more than economic or political – it is a social process as well, existing side-by-side with, and sometimes complementing economic and political activity. Historical Background: Power is the key source of productivity and an effective breakthrough to the modernization of the world society.Electricity was first installed at Dhaka in 1901, and in 1948, the Electricity Directorate was established in East Pakistan. D uring that period, the highest plant size was only 10 mw Steam Turbine in Siddhirganj along with other plants in Chittagong and Khulna. Box 1: Historical Background of The Power Sector 1901: Electricity was first installed at Ahsan Manjil, Dhaka City (Generation: 21 MW by Public; Distribution: 17 towns by private companies) 1948: Electricity Directorate (ED) 1959: Water and Power Development Authority (WAPDA) 1960: EPWAPDA statuary org. 972: Bangladesh Water Development Board and Bangladesh Power Development Board 1978: Rural Electrification Board 1991: Dhaka Electricity Supply Authority 1996: Electricity Generation Company of Bangladesh and Dhaka Electricity Supply Company 2002: Ashuganj Power Supply Company Ltd. 2003: West Zone Power Distribution Company Ltd. 2005: North West Zone Power Distribution Company Ltd Source: http://www. bpdb. gov. bd The construction of the Kaptai hydro-electric project with an installed capacity of 40 MW and commissioning of Dhaka-Chittagong 32 KV tran smission line in 1962, was a milestone in the history of power development in this country. Each year the demand is increasing at the rate of 10 – 12 percent or 800-1000 mw and the government is also commitment to meet the MDG (Millennium Development Goal) regarding the access to electricity for all by 2020, the country’s power generation has to be increased by at least 8 per cent each year. Besides, to ensure energy security, there should be an arrangement of 16–22 percent power to be reserved in both of public and private sectors through quality investment†3.Since only 12 percent of the households in the lowest 20 percent of the income distribution have access to power, the need for better access to affordable and reliable electricity to the majority of the people of Bangladesh by 2020. However, the yearly growth of the generation verses the demand for new connections provides the reverse scenario. Therefore, the determination of consumer tariffs and the reliability of power are important issues in terms of the policy formulation, as energy prices should be based on production costs and efficiency, and subsidies should be given on the basis of social and economic need.Overview of the Power Sector in Bangladesh: The Government of Bangladesh is committed to provide affordable and reliable electricity to all citizens by 2020. However, the nation’s 1386 million people, only 42 percent7 have access to electricity, which was only 3 percent in 1971; but per capita electricity consumption is 165 kwh/unit, still one of the lowest in the world, against India’s 561 kwh per. Unfortunately, 79 percent of the connected suffer severe load-shedding, and 60 percent of the consumers face low voltage supply. The power sector of Bangladesh is usually characterized by natural monopolies10.Conventional wisdom states that since natural monopolies threaten competitive pressures, they should be regulated either by the government, through inde pendent regulatory agencies or directly by public enterprises. Table 1: Key Statistics of the Power Sector SectorPublicIPP+Captive Installed Capacity5275 mw2490 mw* De-rated Generation Capacity4582 mw Generation (Effective)Demand* Maximum Generation (sep’ 07)4130 mw5368 mw Minimum (Jan’ 07)2331 mw Transmission Lines (230 and 132 KV in km)4119 Distribution Lines in Km2,64,891 Access of electricity (%)42Per capita generation 165 kwh Per capita consumption 140 kwh Consumer Number including WZPDCL97. 33 lac Agricultural Consumers2. 16 lac System Loss (Average Percentile) 21. 3 Source: Power Cell, February 25, 2007 * 1290 mw generation in IPP and 1200* captive power consumption Moreover, allowing another firm would increase cost or inefficiency. The Power sector includes the generation, transmission and distribution of electricity among different holdings including residential, commercial, industrial and service sectors under the guidance of the Power Division of MPEMR.At p resent, BPDB has total installed capacity of generating 4680 MW in 65 units, including the public and private sectors. The Independent Power Producers (IPP) is now producing 1290 mw in 37 units of power plants located at different parts of the country11. In this situation, the GoB drafted an energy policy accounting the increased scope of gas exploration and power generation to meet the future demand for both renewable and nonrenewable energy. Currently, 80 percent of power is non-renewable indigenous gas-based, and 70 percent of the commercial energy is recovered by gas12; the rest 20 percent is from power and 10 percent from coal.Due to poor generation, the maximum demand served was the lowest of 3000 mw at peak hours in January, 2007. Though there was no significant increase in power generation, the transmission network was expanded rapidly by the funding from ADB. However, due to the intervention of vested interest groups, poor co-ordination, the absence of accountability and tr ansparency is perverse. Power shortage hampers the contribution of power to GDP growth and creates huge excesses/unbearable demand.Under these critical circumstances there is an immediate need to identify or diagnose the major reasons for the unavailability of power as well as the low level performance of the power sector. Corruption is one of the major threats to global development, especially in developing countries; for instance, â€Å"corruption is jacking up the cost of power projects in the Philippines, delaying their implementation and providing Filipino households and businesses with expensive but unreliable electricity services†.According to the Household Survey on Corruption in 2005, â€Å"around 10 percent of the consumers are using illegal connections and around 48 percent paid bribes for taking a new connection or meter†. This corrupt practice was first identified in 1956. According to Husainy, â€Å"Dacca Electricity Supply Co. was also nationalized in 1 956 due to virulent corruption in new connection due to excess demand, maintaining uninterrupted power supply; though some improvement was observed but not significant at all during that period. †In terms of distribution of electricity, non-technical loss and pilferage of electricity make the sector more vulnerable and the bribery and harassment of the staff faced by 70 percent of the consumers18 are few of the examples of the mismanagement of this sector. Under the above circumstances, it is necessary to identify the prospect and governance in the power sector. This study tries to find the source of corruption in several issues of procurement, generation, transmission, distribution and human resource management, including the effectiveness of the existing act to combat the corruption and abuse of power.Purpose of the study: Broad Objective: The broader objective is to review the governance system of the power sector and to identify the nature of corruption likely to be presen t in the different division of the power sector. Specific Study: ?To diagnose governance failure and demand-supply shortfalls ? To identify whether any governance failure exists, regarding human resource, administration, finance etc. ?To identify the rate of corruption are occurred in this sector. To identify the actual lose has been occurred in this sector and so forth. ?To identify the sufferings and harassment faced by the consumers, especially by the poor in the commercial services including new connections, day-to-day services, billings load shedding. Methodology: Data Collection Process for Secondary Materials: Literature, articles, periodicals, reports, acts and rules, also electronic journals, documents of power sector, case studies on power generation and distribution have been reviewed. Collection of Primary Information:The primary sources of qualitative data are informal discussions with stakeholders, employees and experts of the power sector and documents on the procurem ent and distribution sides to assess whether any mismanagement or illegal practices such as abuse of power and/or funds and resources took place. Rapport building played an important role in the extraction of the qualitative data. Key informants were sector experts, policy makers, academicians who provided specific case studies and recommendations to improve the governance of the power sector, including procurement, BERC, generation, distribution and legal practice.Consumer Survey on the Quality of Commercial Service and Billing: A cross section survey among all types of consumers was administered during 5 May to 5 June of 2006 to find out the quality of services provided by different organization including DESA and DESCO. The instrument of the survey, i. e. the questionnaire, was developed by the researcher and then validated through field tests. The questionnaire on consumer survey covers the nature and extent of the corruption and harassment faced by the consumers. Questionnaire for Consumer Survey:The components of the questionnaire were six: i) the basic profile of the consumers with the information on the socio-economic profiles of the consumers/adult respondents, consumption pattern of electricity, ii) the types of connection, the new connection process, problems and harassment faced by consumers, the amount of bribe transacted during the connection process; iii)the quality of electricity service in terms of meter reading and billing process, illegal practices such as collusion with meter readers, fake billing, and other day-to-day service-related problems; iv) load extension, load shedding and voltage variation, losses of equipment due to voltage fluctuation; v) and finally, the consumers’ satisfaction regarding the different commercial services has also been illustrated through this measuring scale. Sampling Technique: A multi-stage stratified sampling technique has been followed to determine the sampling of the consumers for the survey  œ Stage 1: Consumption pattern of DESA DESCO, to put the proportionate weight in determination of the number of the sample for each agency. Then, the proportion of consumers across the distributors is considered in stage 2.Stage 2: Based on this proportion, different types of consumers are considered to select the sampling from each distributor agency. Stage 3: Distribution of Sample Consumers sing the standard formula of random sampling, the precision level or observed probability of corrupt practices was extracted at 0. 7 at a 5 percent level of error. Sample size, 1027 was determined using the design effect and across agencies in regional clusters. Distribution of Sampling Consumers: DistributorDistrict/Area Or Ward D C ISub totalTotal DESA DESCO Dhaka, Mirpur Dhaka, Karwan Bazar 10 10 10 10 10 10 30 30 60 (D= Domestic, C= Commercial, I= Industrial) Governance Failures and Problems in the Power Sector:Under the co-ordination and guidance of the Power Division, BPDB, a holding com pany, is solely responsible for generating, transmitting and distributing power through PDB, DESA, DESCO, WZPDCL and REB/PBSs though out the country. Usually, the Prime Minister is in Charge of the MPEMR and a State Minister runs the Power Division under the guidance of the PM. The PDB Chairman is Chairman of the newly converted holding company of BPDB21 and the Secretary of corporatized companies such as PGCB and WZPDCL. Furthermore, Chairman of DESA is also the Chairman of DESCO. The newly established BERC is to regulate planning, tariff fixing, dispute settlement and licensing.The following Flow Chart-1 shows the functional relationship between the different wings of the power sector. Adverse Power Crises: According to the ADB (2005), â€Å"Consumption of electricity in Bangladesh grew at an average annual rate of 8. 2% from FY 1994 to FY 2004 and forecast is to grow at an annual rate of about 8% for the next 10 years. † Since the early 1990s, the supply of power went down and system loss shot up and the frequency of load shedding increased vigorously by the middle of the 1990s. In this situation, the Government proposed the National Energy Policy in 1995, but this also failed to meet the crisis and finally Power Cell formulated the Private Power Generation policy in 1996 in order to boost the generation of power.Crisis in the power sector or the staggering demand-supply gap has emerged due to several key reasons. Since the generation of power did not increase at the rate of the increase in demand, the gap between served generation and peak demand has increased over the period shown in Figure 1. In mid ‘90, the shortage was almost zero, but the staggering gap and the demand has been increasing, the official figure is at 4250 mw, but the production is only at 2100-2200 mw which resulted in a 2000 – 2200 mw shortfall in generation. According to the PSMP 2006, the real demand was forecasted at 6200 mw in 2007, but at the same time the amoun t of power generation went down to 3,200 mw.It is noted here that the demand for power has been increasing at a rate of around 10 percent per year and furthermore then the total shortage of power would be around 435032 mw in 2010 or even more than the current estimate (shown in figure 4) if the progress of the establishment of the proposed power plants is not completed as per schedule. In estimating demand, the PDB does not usually consider economic growth and the exact demand of the prospective consumers. The crisis also emerged due to the absence of a vision and mission by PDB and DESA as well. Absence of clear organization goals of the PDB and DESA: The Power sector is such a dynamic sector that it requires clear organizational goals or objectives and the strength to take sharp decision. In reality, however, the PDB and DESA do not have clear working paper, organizational goals.As a result, there is always a sense of confusion between policy makers and the management. This hamper s the productive growth of the sector as well as its day-to-day services. New Connection Process and harassments faced by the consumer: The staff is responsible for completing the several tasks associated with a new connection. In a particular holding, no more than one residential connection is provided, with each flat considered flat as a separate entity. Requirements need to be fulfilled as per tariff rules and pro-poor documentation. In reality it is quite tough for an applicant to complete the process by himself due to harassments by the staff and agents or media.According to the survey, on average, 27percent of the consumers (the highest figure being 42 percent) face the harassment during the new connection process. A new connection process and the tyranny of â€Å"media† or â€Å"broker† According to the 2006 survey, among the applicant for a new connection, 94. 2 percent took the new connection through an agent in order to avoid the hassle and to save time; only 4. 3 percent of the consumers got the new connection by themselves. According to the consumer survey in the case of both LTI and HT connections, 94 percent of the applicants took the help of brokers or agents such as meter readers, MLSS/Fourth class employees, or electrical Contractor. Process of new connection IN DESA;Average bribe of a new connection: Reduction of bills at cost of bribe in DESA: The S & D Office disconnected the line with an outstanding amount of Taka. 3,00,000 and filed a case against ‘x’ consumer of Lalbagh S&D. The Meter Reader proposed a bribe of Taka. 1, 50,000 to settle the case. The concerned consumer agreed to the proposal in order to become benefited and to avoid harassment. Finally, the case was dismissed and office issued the reduced bill for only Taka. 28, 000 for the following month. It is noted here that the meter reader did not provide any bank receipt to the consumers, just a paper upto clearance. This is a reflection of the DESA†™s management system.Average bribe to reduce meter change Delay in Providing New Connections: According to the 2006 survey findings, if any consumer does not pay a bribe then the consumer can get connection even before the deadline of around 30 days; the longest delay in DESCO for providing a new connection was 103 days, but at the payment of bribe the connection took only 6 to 7 days for getting a new connections in DESA and RDB respectively. Interestingly, the PBS, through efficient in maintaining the desired import-collection ratio, also makes delays in getting new connection if the consumers do not bribe to the officials (Table 9). Complexities in File Processing:Bureaucratic dilemma/delay is a regular phenomenon in Bangladesh; and it is also practiced during the provision of a new connection, as application files pass through around 36/38 hands/tables before an applicant get a connection. Though the office claims that the delay is due to the insufficiency of MLSS and inadequa cy of the required documents, the real cause of the delay is illegal practice152 or the paying of bribes to speed up the process. Bribe for meter change: Office staff takes monthly bribes to reduce the electricity bill of the consumers by issuing a minimum bill against the huge bill of the power consumed (which are remaining unadjusted and stored in the meter).When the cumulative amounts of the unpaid bills, especially of HT consumers, become high, the meter reader proposes to change meter claiming to be concerned amounts showing the damage. Taking a handsome bribe, officers change the meter claiming to be concerned about the clients showing the cause of the consumer’s safety and GoB loose huge amount of revenue. Consumer, on average, pays an extra Taka 2056 as bribe to the meter reader, lineman, foreman or the Gatish of the meter reader if he/she wants to change the damaged meter. Interestingly, the highest amount has to be paid (i. e. Taka 8685 and Taka 2748) by the consume rs of the corporatized or said to the efficient organization REB. PBS and DESCO161. Erroneous and/or false billingOn average, 39 percent of the consumers of all the distributor agencies claimed that they received excess bills and the meter readers with the help of ledger keeper and the billing section. In case of the unavailability of receipts, consumer has to pay the bill with a fine including a surcharge; the significance of the chi-square value162 justifies the allegation on the wrong meter reading. It supports the presence of erroneous and bogus billing in the PDB, DESA and PBSs as well. If any honest consumer, particularly, is the small industries category (such as cold storage, cinema halls etc. ) where refrigeration plants, air conditioners had standard loads, does not agree To conclude with meter reader and wants to pay the correct bills, he is likely to be in serious trouble.Conclusion and Policy Recommendation: A number of efforts have been made by the present caretaker go vernment in order to mitigate the power failures. These efforts include the following: Cancellation of the tendering process of small power plants addressing the allegation of nontransparent process and attempt for re-tender. Identification of major targets to rehabilitate and maintain the power station, and sign of treaties to establish both public and private power plants. Unfortunately, it is alleged by local power company that the aid providing agencies have put several clauses in the bid manual so that they cannot submit the bid papers fulfilling the conditions.Approval of five IPPs (three foreign companies) of 1,930 mw capacity, increasing the share of IPPs in the total power generated up to 3,190 mw (62%). Unfortunately, no significant decision has been taken yet to identify the leakages and rampant theft of power. Appointment of two members for the BERC and development of several guidelines along with the methodology of the determination of power tariff. However, in this met hodology, the peak and off-peak demand was not considered. Besides, there is no vivid guideline from BERC on how submitted documents and information by applicant IPPs would be cross-checked and the previously completed contracts between PDB and IPPs are out of the proposed formula.This study was undertaken with the aim to diagnose the problems prevailing in this sector. The scope of this study includes review the state of governance in this sector, demand-supply shortfalls, the current procedure of power plant procurements and identifying the nature and extent of corruption, accountability of the staff, investigate the sufferings and harassments faced by the consumers, day-to-day services, billing, load shedding, and rural-urban disparities. Information from both primary and secondary sources has been used in preparing the report. Sources of secondary information included acts and rules, published articles, periodicals, reports, as well as official documents.Primary sources of infor mation include a consumer survey, informal discussion with stakeholders, employees, and experts of the power sector. The consumer survey covered the nature and the extent of corruption and harassments faced by the consumers. The cross section survey among all types of consumers (1027) was administered to find out the quality of services provided by different organization including PDB, REB/PBSs, DESA and DESCO. Adverse power crises and governance failures The PDB’s official report shows a shortfall of generation of around 2000 – 2200 mw. However, according to PSMP 2006, the total shortage of power would be around 4350 mw in 2010.The reasons for power shortages are identified below. Policy Level Failures: The government failed to put adequate emphasis on the power sector; there has not been any clear and specific guideline to estimate the real demand and supply; there have also been violation of the PSMP in the form of politicization of the location, size and types of p lants, emphasis on short-term planning, inadequate autonomy in making financial and administrative decisions, appointment of foreign consultants for rent-seeking purpose despite the availability of local hands, and imbalanced expansion of distribution lines for rent-seeking purposes Limitations and malpractice within the procurement process:The procurement process in power sector has been distorted due to unwanted intervention in the procurement process, complexities of the bidding process, wrong evaluations, absence of uniform Technical Evaluation Committee (TEC), delay in hiring consultants and resolving disputes due to bureaucratic dilemma, corruption such as putting specific condition, nepotism, extortion by vested interest groups, collusion between the bid officials and bidders, false experience certificate submitted by bidders, appointment of contractors for maintenance and rehabilitations without any tender, abuse of funds by plant and policy-level staff, supply of low qualit y machinery violating the contract, and power purchase agreements made at high rates. As a result, around Tk 4,007 crore or US$ 688 million (from purchase of the 6 power plants and outsourcing the maintenance and rehabilitation works to a foreign company) during 1996-2005 have been abused.Inadequate financial capacity: Around 17000 crore Taka is required to meet the demand for power of 8000 mw by next 2010; but the concerned organizations have inadequate financial capacity due to i) cumulative increase of unpaid bills and unaccountable indebted organizations, ii) poor rate of collection (caused by high T&D losses, legal shelter taken by large bill defaulters, low density of consumers in several PBSs of REB), and iii) instantaneous increase of financial burden due to contract with IPPs at a floating exchange rate, iv) contract, under PPA, with IPPs at high tariff arte, v) high input cost of diesel based generation plants. References:Analysis of the Sustainability of the Electrical Po wer Sector, Advanced Engineering Associates International (AEAI), February 2003, Asian Development Bank, 2005, Sector Assistance Program Evaluation of Asian Development Bank Assistance to Philippines Power Sector. Asian Development Bank, â€Å"Special Evaluation Study on Cost Recovery in the Power Sector Operation and Evaluation Department†, SS-55, April 2003 Bacon, R. W. and Besant-Jones, J. , 2001,’Global Electric Power Reform, Privatization And Liberalization Of The Electric Power Industry In Developing Countries’ The International Bank of Reconstruction and Development, The World Bank. Washington. D. C. Bangladesh Energy Regulatory Commission Act 2003, BG press, MPEMR, GoB, 2003, DhakaBose, Sudhansu, Poor collection efficiency of Indian state owned power distribution companies: causes and remedies, White Paper, Wipro InfoTech Complexity of Electric Power Distribution Governance†, Journal, 26 (3), 1-39, 2004 Dr. Hardiv H Situmeang, June 1, 2005, THE CHA LLENGE OF FINANCING POWER PROJECTS. Jakarta Fiany, Ronald, et. al. July 2003, Governance Problem in the Brazilian Power Sector, Oxford University Gilbert, Richard and Kahn, Edward et al, 1996, International Comparisons of Electricity Regulation, Cambridge: Cambridge University Press. HYPERLINK†http://www. stenmar. com/oil_and_gas_sector. asp† http://www. stenmar. com/oil_and_gas_sector. asp

Thursday, August 29, 2019

Patrick Henry Vs Martin Luther King Jr. Essay

Patrick Henry and Martin Luther King Jr. were two of the most influential revolutionary’s known to mankind. Even though their views on how to become liberated were completely opposite, their passion and unrelenting determination eventually proved to be rewarding. Patrick Henry and Martin Luther King Jr. are as the sun and water fighting for the same withering blossom but with different methods to success. Patrick Henry had an intense, win big or lose big approach to freedom. In his speech he is pleading to the president to open his eyes and notice that everything is not apt. Henry was telling the president there was no peaceful means of settling this dispute with Great Britain. They tried to solve their differences by talking for ten years, Henry said, but to no avail. According to Henry, there was nothing left to do but fight for their freedoms. He said,† If we wish to be free-if we mean to preserve inviolate those inestimable privileges for which we have been so long contending-if we mean not basely to abandon the noble struggle in which we have been so long engaged, and which we have pledged ourselves never to abandon until the glorious object of our contest shall be obtained, we must fight! I repeat it, sir, we must fight!†. He yearned for freedom so desperately he was willing to die for it. â€Å"Give me liberty, or give me death†. Martin Luther King Jr. was just as ardent for freedom as Patrick Henry was, but his approach was different. He devised a more passive plan to lift his oppression. He was very unwavering in his non-violent beliefs. His philosophy was that violence only brings momentary results. Violence only starts a circle of endless chaos. He believed you must offset hatred with love. In order to progress something has to be gained. When violence is present nothing is gained, therefore, in order to progress you will need to use non-violent tactics. Patrick and Martin had many differences. They have different policies in which they followed to overcome cruelty. They also had different types of oppression. Martin was dealing with racial issue and Patrick was dealing  with governmental issues. Martin was a peaceful, non-violent problem solver and Patrick wasn’t getting any results being nonviolent so he became violent. These two men also have some things in common. They both had a strong belief in God. They both had been under heavy subjugation. They both fought the oppressor, although with different means of force, both were successful. These two great men help shape our country in to what it is today. Whether by violence or non-violent acts both overcame the harsh realities of life. Without their sacrifices where would we as a people be today?

Wednesday, August 28, 2019

Statistics Minitab Assignment Example | Topics and Well Written Essays - 500 words

Statistics Minitab - Assignment Example Then analyse the variability in the designed experiment. Then the results would be interpreted. The paired-t test has been selected because we needed to test whether the two samples had difference means and if these differences were significant. We therefore needed to pair these two samples and test the differences at 95% confidence level. As can be seen, p > .05 therefore the differences are not significant. The chi-square analysis was run for the categorical values as were in the table. The chi-square tested the hypothesis that there is no association between caffeine consumption (column factors) and marital status (raw factors). The results show that the chi-square statistic was 51.656. The p value is < .001 which suggests that we reject the null hypothesis of no association between marital status and caffeine consumption in favour of the alternative that there is indeed an association between them. Thus, marital status affects caffeine consumption. The reason for this association could be attributed to the fact that we had more married participants in the sample and hence the results may be biased towards the same. As can be seen, there were 3029 married participants out of the 3888 participants in total. I recommend that to improve results, same number of samples should be selected from the marital status categories for the

Module 5 - Case Gang Violence (CASE) Essay Example | Topics and Well Written Essays - 500 words

Module 5 - Case Gang Violence (CASE) - Essay Example Narcotic trade is termed as one of the main attributes of the dramatic increase in these illegal gangs which recruits even minors. According to the report that was released by the Review of Homicide Crime Statistics Criminal Justice Center in the year 2005, about 43% of all the homicides committed in Los Angeles County were accounted for by gangs (US Department of Justice, 2007). Getting imprisoned is one of the prime risks that children who join these gangs are subjected to. Children who are members of gangs commit various types of crimes such as homicide, robbery, assaults, and rapes as well as drug trafficking of which all these crimes are considered as capital criminalities. Such practices can make them spend much of their lives behind bars if not lifetime imprisonment. Other risks include making children become victims of their rival gangs, a factor that poses them to assaults or even getting murdered. The inherent violence associated with gang graffiti (body drawings gangs use as a symbol of marking their territory) is of great concern because when a neighborhood is marked with graffiti indicating territorial dominance, the entire area and its inhabitants become targets for violence. Everybody irrespective of where they are be it the streets or in their homes is fair game for drive-by attacks by rival gang members because rival gangs identifies everyone in a neighborhood as a potential threat. Adults and parents have a crucial role of learning about gangs so that they can remain aware of what is going on around with their children. This enables parents to easily identify early warning signs in the kids their children associate with and also helps them teach their kids correct information when the opportunity is presented. Having information about those gangs on various aspects such as reasons why children join then, type of people their children associate with, characteristics of children who are members of these sects, and the type of practices

Tuesday, August 27, 2019

Healthcare Spending Essay Example | Topics and Well Written Essays - 1500 words - 1

Healthcare Spending - Essay Example In order to achieve desired health outcomes, there should be a systematic approach that addresses staff competence, health care financing, and emphasis on quality. System theory offers a guide health care towards the desired direction by employing evidenced-based management practices to enhance quality, accessibility an equity as fundamental elements of health care systems. The theory envisions use of a systematic guideline in practice to ensure health care emans such as quality, affordability are met. One of the fundamental concepts of system theory is system thinking. Wiegerinck, Kappen, & Burgers (2010) stated that the application of system theory in the health care system can have an incredible achievement in streamlining operations towards the desired standards. With system thinking, health care quality would greatly improve because the conceptual framework would help in building health care as a system with several subsystems. This theory emphasizes six critical cornerstones that apply well to the health care system. Firstly, it higlightes improving communication among subsystems within a larger system. Certainly, communication is an important asset in health care reforms. Communication allows for nursing, and medical staff strives towards the same direction by employing uniform quality care. Quality health care standard is, therefore, an important feature in the health care system (Bhandari & Snowdon, 2012). Secondly, the social theory, a fundamental component of the system theory, premises teamwork as a success strategy in any task undertaking. Evidently, achieving health care standards that quality-based, cost-effective and appropriate to the community culture requires interdisciplinary collaboration. In contemporary health care system emphasizes on teaming up with the community members in the identification of health care needs, this is emphasized in system theory

Monday, August 26, 2019

Business research Essay Example | Topics and Well Written Essays - 2500 words

Business research - Essay Example The paper will be inclusive of various presentation slides that will summarize the findings and the methods employed in coming up with those findings. Finally, the paper will discuss the ethical considerations in the research and limitations and recommendations for further studies to be done to verify data for the next years. Research Questions The study will first outline the background of arriving at the research question formulated. The study will attempt to answer the following questions: What is the music taste of the University of East London? What factors determine those tastes? Hypothesis Different musical tastes are observed in a university environment as a result of different mix of culture and gender (Bryman 2007). Methodology For there to be accuracy in this study, there was a need to hear out the views of various individuals regarding their taste in music genres. The assumption, as stipulated in the hypothesis was that all the students had different types of music genre they listen. The researcher conducted a small scale investigation due to the limitations and constraints created by time (Collis and Hussey 2009). A British study conducted by Bourdieu retrieved both qualitative and quantitative information hence provided a base for future research, this one included. In order to add to these findings, this study will include interviews from groups of students from the universities, ranging from different points of views (Munn and Drever 2004). Focus was put into three groups. These include undergraduates and the post graduates and staffs of the university. There three groups would be represented by about five individuals. The five individual comprised of two females and three males. The groups comprised of at least three different races. The aim here is also to analyze if the factors relating to race, social class and gender influenced the tastes of music. The age group interviewed ranged from 18-35. Questionnaires were distributed to various group s formed as a result of sampling (Srivastava 2011). This method of collecting data was approved since it gave the respondents the confidentiality they asked for in answering the questions. Three groups were targeted. The questionnaire was formulated in such a way that the respondents described the type of music genres they were interested. The questionnaire also contained a description part where they would describe what drives them to love certain types of music appendices (Knight 2002). Sampling The researcher adopted the snowball sampling in order to be able to convince unknown people to participate in the study. According to Bryman (2008), snowball sampling entails the researcher making contacts with a given group of people he or she describes or finds to be relevant to the subject study. The researcher then uses these groups to establish or reach other individuals. I used some of the students I was sharing classes with to reach other. I also approached some of the lecturer I de alt with to establish contacts with others. Some of the students introduced me to the staff where I gathered a number of them who said their views or opinions (Collis and Hussey 2009). Results The music type that was highly rated included techno, rock and pop. Most of the females in the university advocated for rock and pop and blues while most males went for techno, rock and hip hop. Most of the males also favored Christian

Sunday, August 25, 2019

I have chosen to look at the Death Penalty in America. Each state in Research Paper

I have chosen to look at the Death Penalty in America. Each state in the US has a different view on what is and what is not a ca - Research Paper Example The execution of those who have committed capital offenses varies from country to country depending on the laws in place and in America it varies from state to state. Some states like Wisconsin, Michigan, New Jersey, Hawaii and the District of Columbia have already abolished the use of death penalty while states like California, Georgia, Florida, North and South Carolina, and Texas among others still enact the practice (Galliher et al. 6). According to (Berkowitz, 66), capital punishment has been in use for many years, since the time of King Hammurabi, as well as during the Roman Empire. However, it has spurred a lot of controversies along political, judicial and moral lines. The proponents of the death penalty argue that it deters crime especially homicide but researchers have over the years established that even though the punishment continues to be imposed, the states that have long abolished the practice have lower rates of murder than those that continue to use it (Morrison, 201 1). This begs the question whether death penalty really deters crime. Criminologists argue that death penalty is necessary as it’s a preventive social measure however, religious leaders belief in sanctity of life thus making intentional killing immoral. On the other hand, the offenders are given a chance to defend themselves and appeal before being sentenced to death though this does not prevent innocent people from being convicted. The constitution of many states also seems to offer too much protection to the accused person which then raises the question whether this contributes to further crime. The paper will discuss the various states that support death penalty and those that do not as well as the pros and cons on the death penalty and why it should not be adopted by every state. History of Death Penalty Death penalty is not a new phenomenon as it was in existence as early a 10th century A.D in Britain where criminals were punished by hanging (Herrmann, 4). Later, they we re punished by burning and beheading among other cruel means. The first person to be executed in USA was Captain George Kendall for being a spy for Spain in 1608. Nowadays, more means of execution which are more humane have been put in place such as use of lethal injection, electric chair, and gas chamber. Under the 8th amendment on the constitution, death penalty is prohibited as it is cruel and unusual but some states still enforce it. The offenders in early times did not have many protections as they do now. A death row inmate can have his/her sentence reduced to life imprisonment if s/he can prove that the sentence was racially discriminatory (Death Penalty Information Center). The convicts are also provided with defense attorneys, investigators and experts and the jury and the judge have to be qualified. They are also entitled to make appeals which are paid for using tax payers’ money. Besides, some states protect the women and the mentally retarded as well as the juveni les against such punishment. In the past, a convict was executed without delay unlike nowadays where the process is too lengthy and those convicted are rarely executed as they die of natural causes before execution; the time between conviction and execution is 25yrs hence convicts have ample time to appeal (DPIC). In the past offenders were executed for committing crimes such as; murder, treason, and drug trafficking. Many states nowadays execute the offenders for committing first degree murder although some states are calling for

Saturday, August 24, 2019

To compare the quality of health care in U.K and Saudi Arabia Essay

To compare the quality of health care in U.K and Saudi Arabia - Essay Example is that it has to ensure that EU citizens obtain equal treatment in a host State. Thus while in case of U.K., one must both refer to the guidelines of WHO as well as E.U., Saudi Arabia needs to follow the guidelines of WHO only. In some countries health care for their respective citizens are regulated statutorily and some others it is only voluntary. Thus before going into the prevailing conditions in U.K. and Saudi Arabia, guidelines of the WHO and the E.U. must be examined. Standards of quality of general health care must be seen before going into the disease-specific health care quality standards. Some definitions relating to quality of health care need to be mentioned. They represent performance indicators or are used to describe performance measurement of health care industry. Rather than quality indicators, financial indicators have only played so far crucial role to describe performance. Financial indicators such as length of stay, average cost per discharge are no longer sufficient to understand quality of health care delivery of an organisation. In fact, Florence Nightingale set the tone for tracking healthcare outcomes. Later Earnest A. Codman, a surgeon from Boston, in early 1900s opined that physicians instead of just measuring what they did, should track results of their performance over a period. His thinking was ahead of his time and he called it the â€Å"end-result idea† saying that there should be some feedback system on what happened to the patients one year after receiving their treatment, though it was not welcomed by the profession and his colleagues at Massachusetts General Hospital criticised him for his outlandish idea.1 In his two volume classic Explorations in Quality Assessment and Monitoring (1980,1982), Donabedian, another physician proposed three key issues in the health care delivery. They are Structures, Processes and Outcomes. Structures are the tools, resources and organisational components. Processes are

Friday, August 23, 2019

International strategy operation Coursework Example | Topics and Well Written Essays - 1250 words

International strategy operation - Coursework Example In this context, the unattractiveness of the ‘mass market’ segment of the auto industry would be based on the following fact: the profits generated by the firms operating in the specific field are low. The above condition would be checked using Porter’s Five Forces model. Through this model the competitive environment of an organization can be evaluated. In this way, a strategy can be identified so that the organization involved is better positioned in its market2. The above approach has been characterized as ‘outside-in’ approach emphasizing primarily on each firm’s external environment and not on the organizational resources3. In the context of the Five Forces model, the ‘mass market’ segment of the auto industry would have to face the following forces: a) new entrants4; competition in the automotive industry is extremely high. Even if the number of new entrants is kept at low levels, the market share of the industry’s lea ding firms is so high that it is difficult for medium firms of the particular industry to standardize their market position. Even the industry’s major competitors often face difficulties in keeping their competitiveness high; b) bargaining power of customers5; customers can choose among a high range of cars of the particular category. ... ?s major competitors there are firms operating locally increasing the challenges for the industry’s multinationals8; e) substitute products9; in the context of the ‘mass market’ it is quite easy for substitute products to appear at the level that the technology used in cars of the ‘mass market’ can be easily adopted by the industry’s small manufacturers. According to the issues discussed above, the chances for profits in the ‘mass market’ segment of the automotive industry are limited, a fact that harms the attractiveness of the industry’s specific segment. 2. Explain why profitability is generally higher at the luxury and ultra-luxury end of the auto industry. In order to understand why profitability is higher at the luxury and ultra-luxury end of the auto industry, it would be necessary to evaluate the characteristics of the above segment using an appropriate strategic tool, such as the PESTEL analysis. The above tool help s to analyze the macro-environment of an industry, or of an industry’s segment, so that the current status and the prospects of the particular industry are effectively evaluated. The PESTEL analysis focuses on six elements of a firm’s macro-environment, as these elements are able to influence the performance of organizations operating in the industry involved: Political, Economic, Social, Technological, Environmental and Legal. The PESTEL analysis for the luxury and ultra luxury end of the auto industry would be developed as follows: a) Political: political conditions worldwide are not stable. Strong political conflicts are developed in most countries in the international community. In such political environment it would be quite difficult for an industry’s profits to be standardized. The luxury and the ultra luxury end of

Thursday, August 22, 2019

Fitness Essay Example for Free

Fitness Essay Why do people exercise? This may be a simple question, but it can generate multiple and varying responses. Assumptions such as pure weight loss, arise. Although this may be true, weight loss is not the only reason that drives people to engage in such activities. If curious minds dig a little deeper within this topic, different perceptions are brought up or given a better understanding of the situation. People exercise for many reasons. These reasons can be categorized to physical, psychological, and emotional dimension. In the physical sense, people exercise to better their appearance by losing or maintaining weight and overall health. One of the most noticeable effects of exercise is the physical changes that occur to the loss of body fat in a person. A person who may be overweight see exercise as a tool to help him achieve his desired body composition. With continuous exercise, the body burns calories. Excess fat that are stored within the body are utilized and burned for energy, leading to weight loss. Aside from weight loss, exercising provides beneficial heart effects to a person. It strengthens the heart muscle by allowing it to pump blood more effectively which results in the reduction of pressure on the walls of the blood vessel, which lowers blood pressure. (Sherwood, 2010). Other heart benefits include good HDL cholesterol levels, reducing bad LDL cholesterol levels, and reducing inflammation of arteries, as suggested by the University of Maryland Medical Center, or UMMC (as cited by Sherwood, par. 4). According to the website WebMD, regular exercise can help prevent diseases and ailments such as heart disease, stroke, high blood pressure, diabetes, back pain, and osteoporosis. Beyond the physical effects of exercise come psychological effects. Running, after a long and stressful day at school or work can help a person feel better afterwards. The link between exercise and mood is pretty strong, Michael Otto, PhD, a professor of psychology at Boston University says. Usually within five minutes after moderate exercise you get a mood-enhancement effect. (as cited by Weir, 2011). Aerobic exercises help the body produce chemicals called endorphins. Endorphins are polypeptides that that bind the neuron-receptors in the brain which provides relief from pain (ciarac, 2006). Endorphins also help treat contributing factors to anxiety and depression. Exercise can help reduce immune system chemicals that may worsen depression. Aside from that, it helps increase body temperature that may have calming effects on a person. Some people also exercise as an alternative to drinking. Exercise is a healthy coping mechanism for anxiety and depression, as opposed to drinking alcohol or dwelling on negative thoughts which can lead to difficult situations. Engaging in moderate amount of exercise will result in improved emotional state as well. Some people exercise in the assumption that they will gain a sense of achievement. In some cases, exercising provides that first push for a person to aim for, and achieve self-confidence. When a person meets his or her exercise goal or challenge, it helps feed that yearning of achievement. The emotional state of a person also ties in with the physical result of exercise. When a person loses weight, he or she tends to feel better about his or her appearance. Being able to wear clothing you desire, gives that extra good feeling. Exercising also becomes a positive distraction from the stresses of everyday life. It helps take a person’s mind off his or her worries temporarily. Another reason why people exercise is to get more social interaction. Exercising can provide opportunities to meet more people by going to the gym, jogging at the park, or signing up for dance class. Positive interaction improves a person’s emotional state. These interactions can vary from a friendly smile to creating strong meaningful bonds. Exercise promotes better sleep as well. Regular physical activity tires you out and get to fall asleep faster as well as deepen it. Do you feel tired or out of shape when it comes to sex with your special someone? It could sparks up more intimacy in your relationship between lovers as well. Regular physical activity can leave you feeling energized and looking better, which may have a positive effect on your sex life. But theres more to it than that. Regular physical activity can lead to enhanced arousal for women. And men who exercise regularly are less likely to have problems with erectile dysfunction than are men who dont exercise. As well as performance that both the male and female enhances for greater pleasure. Gain health benefits as you have fun. If you want to lose weight or meet specific fitness goals, you may need to exercise more. Remember to check with your doctor before starting a new exercise program, especially if you have any health concerns. One more important thing about exercising is that it is very fun when you just think about it. Exercising is one of the best way to better your connection within your family, you’re not just improving your health but your well-being too. There are several ways you can enjoy exercise, not just going to the gym constantly, such as hiking, mountain climbing, swimming, snorkeling, diving, etc. There is wide variety of activities to choose from just to keep yourself from being bored from doing the same thing every day. So work out, get your lazy behinds up and get a move on. You won’t get the satisfaction like any other just by sitting down doing nothing but watching television.

Wednesday, August 21, 2019

The Primary Care Clinic Essay Example for Free

The Primary Care Clinic Essay A small primary care clinic has 69 employees, representing 9 different clinical professions and 12 other skills. It operates two (2) sites, one (1) of which is bigger and has the departments for medical specialists, diagnostic labs, and patient services. The clinic also contracts for a variety of services, such as repair and maintenance, referral specialists, and advanced diagnostic services. You are the manager. You report to the owners who are four (4) of the family practitioners and their wives. Two of the wives still work at the clinic as registered nurses. Write a five to seven (5-7) page paper in which you: 1.Discuss the key political, economic, and social forces that may have influenced the development of the clinic. 2.Create a comprehensive mission statement and explain what makes it a comprehensive mission statement. 3.Identify three (3) performance measures you would use to measure the clinic’s effectiveness and provide the rationale for each performance measure. 4.Describe how you would approach decisions regarding clinic expansion and annual plan approval. 5.Describe the role of the clinic as a component of the healthcare delivery system in your community. 6.Examine how public healthcare policy has influenced the formation of outpatient clinics in the healthcare system. 7.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: †¢Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. †¢Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: †¢Examine the political, economic, and social forces that have influenced the organizational foundations of the United States healthcare system †¢Explain how public policy has shaped the development of the U.S. healthcare system. †¢Analyze the critical management issues, purpose, functions, and performance measures of different departments within healthcare organizations. †¢Use technology and information resources to research issues in health services organization management. †¢Write clearly and concisely about health services organization management using proper writing mechanics. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Tuesday, August 20, 2019

Functions of Norethindrone

Functions of Norethindrone Part V: Compound Summary Synthesized first in 1951, Chemists Luis Miramontes, Carl Djerassi, and George Rosenkranz blended Norethindrone to be the first highly active oral progestogen in Syntex at Mexico City. Norethindrone however is not the first oral progestogen as a use in birth control and many other variations came before, examples being progesterone, ethisterone 19-norprogesterone , and 17ÃŽ ±-methylprogesterone being in chronological order . The drug was put on the market in 1957 and was later combined with another estrogen called Mestranol to create Ortho-Novum in 1963 which happened to be the 2nd only oral contraceptive in the market. This significance of Norethindrone in history can be found that it was the first highly active oral progestogen and was used as an example to follow for later models and drugs like   norethynodrel (1952), and norethandrolone. Norethindrone consists of 3 different elements including :Carbon, Hydrogen, and Oxygen with single, double and triple bonds occurring across the lewis structure. Norethindrone has 1 H-Bond with hydrogen and oxygen with many LDFs and Dipole-Dipole bonds throughout the structure. Being consisted of 20 Carbon, 26 Hydrogen, and 2 Oxygen elements, the total mass of each molecule per atom being contributed to the element all together is 298.41844g/mol, Carbon has 240.215g/mol weighting the most and   having the highest percentage mass with the percentage of 80.49%. The total mass contributed to Hydrogen is 16.20644g/mol with 8.78% percentage mass and lastly Oxygen has the 2nd highest contribution with it having 31.998g/mol and 10.72% of the compound. Solubility is the ability to dissolve in a specific substance as a physical property. Solubility is important in general as it determines what type of reactant will be formed from the products that are soluble. Solubility is important in my specific compound is that my compound is taking in orally, by mouth. The aqueous solubility is important to my drug to guarantee a safe entrance from dissolving in spit and saliva present in the mouth. The general rule of solubility relates to polarity and if a nonpolar substance is present, it dissolves in another nonpolar solvent and if a polar substance is present, it dissolves in a polar solvent. My compound specifically is polar thus melting in any polar solvent like saliva. This being said, my drug compound is aqueously soluble meaning that it will dissolve in water. The main function of norethindrone is to be used as a birth control to prevent pregnancy. The way it prevents pregnancy is that it prevents ovulation from occurring stopping the ovary from being fertilized. When interacting with other drugs norethindrone side effects can have various effects, most of them being moderate. An example of a moderate side effect from an interaction with Norethindrone is its interaction with Axotal, a commonly used product in Aspirin. Norethindrone effectivity may decrease when taking Axotal so using other birth control methods should be used to ensure the best effectivity. A more serious interaction is Norethindrone interaction with accutane, one of the most common medicines for acne. With the use of accutane while pregnant, accutane can cause life threatening birth defects that can form problems with their bone and internal structure including but not limited to the heart, skull, eyes and brain. Less serious effects by itself is an increase in acne , cha nges in weight, and breast pain. Norethindrone is only used as an oral contraceptive using capsules and ingestion to create the effects of the compound. The taking of norethindrone should be monitored carefully as if patients have former cases of strokes, breast cancer and miscarriages in the past, they should be given another prescription. Norethindrone as a modern day relevance is still commonly used as a birth control however the ratings for the drugs arent very good. For the birth control aspect, the reviews are very positive saying that it works, however almost all of the 49 review reflect on a constant problem in excessive bleeding during their menstrual periods as well as severe pain in the breast and pelvic area with weight gain being a smaller portion of the reviews. However, the versions combined with mestranol is not very known and not commonly used compared to Norethindrone by itself.

The Privacy of E-Mail Essay -- Argumentative Persuasive Essays Interne

The Privacy of E-Mail Today the Internet is being used more and more frequently, and the question of e-mail privacy is becoming more and more of an issue in society. Many people today, both at work and at home, are using e-mail to keep in touch with their friends, family, and their co-workers. Sometimes the information that is contained in these messages is private and confidential, neither the sender nor the receiver wish any one else to be privy to what is contained in these messages. What happens if that very private piece of mail is intercepted and read by those whom it is not meant for? For some people it might only be a slight problem, but for others it could cause some serious problems. It also brings up the issue of who actually has the right to read e-mail. Is it acceptable for someone's boss or employer to be reading e-mail that is not meant for them, and is it acceptable for the police to read the private e-mail of those whom they suspect have been involved a crime? There are dozens questions that arise when a person is discussing the issue of e-mail privacy and just who has the right to read what some one else has sent to a person, something that might contain a message that they do not want read by anyone else. In 1986 the Electronic Communications Privacy Act was put into effect by Congress, this act was designed to protect the users of e-mail from having to worry about others reading what they consider to be a private message. In basic terms the act states that e-mail is not to be intercepted by an outside third party without the proper authorization. It also states that the police are not able to search and seize a persons e-mail unless they are in the possesion of a warrant authorizing them to do so. Whil... ...mics of Mass Communication 6th ed. Boston: McGraw Hill College 1999. Electronic Interaction in the Workplace: Monitoring, Retriving and Storing Employee Communications. Mark S. Dichler and Michael S. Burkhardt. October 2-5, 1996. The American Employment Law Council. November 27, 1999. www.mlb,com/speech1.html Elmer-Dewitt, Philip. "Who's Reading Your Screen?" Time Jan. 18, 1993, p.46. Reprinted in Privacy, SIRS. Boca Raton Fl., 1996. vol 5. art 1. Grossman, Lev. "How Bad Was the Hotmail Disaster?" Time Digital (August 31, 1999): 5pars. 27 Nov. 1999. www.time.com "Internet Privacy Survey." Privacy & American Business July/Aug 1997, pp. 1. Reprinted in Privacy, SIRS. Boca Raton Fl., 1996. vol 5. art 95. Privacy Rights 1996-1999. 27 Nov. 1999. San Jose Mercury News Jan. 30, 1994, pp. 1F. Reprinted in Privacy SIRS. Boca Raton, Fl., 1996. vol. 5. art. 22.

Monday, August 19, 2019

Comparing Do not go gentle into that good night and When I consider how

Comparing Dylan Thomas's poem Do Not Go Gentle Into That Good Night and John Milton's poem When I consider How My Light Is Spent Dylan Thomas's poem "Do not go gentle into that good night" and John Milton's poem "When I consider how my light is spent" were written during times of trouble in their respective poet's life. Thomas was faced with losing his father to death; Milton was dealing with becoming completely blind at the age of forty-three. As each poet struggles to deal with the crisis occurring in his life, he makes a statement about the relationship between mankind and God, the reasons that God gives and then takes away certain gifts, and the proper way to live life. Thomas and Milton ended up with contrasting answers to these fundamental questions about life. The poets' use of personal events in their lives as a topic and their use of the personal pronouns "I" and "my" resolve possible questions of voice in both poems. Because Thomas refers directly to "my father" (line 6) and Milton opens his poem with the line "When I consider how my light is spent" (1), the reader can, with some basic knowledge of the history of each poem, reasonably assume that the poet and the speaker are interchangeable. Both Thomas and Milton chose to share their private thoughts on intensely personal matters with the world through their poems. By drawing from their own experiences, the poets give these works a tone that resonates with the reader because he/she can connect the words of the poem with his/her own life. Thomas and Milton present contrasting views of the relationship between mankind and God or the inevitable events of life. Thomas sees humans as having some degree of control; his father may not be able to live forever, bu... ...erent men at very different points in history, but both poets were struggling with difficult situations and trying to decide how they should react. Although their final conclusions are completely opposite , the raw emotion behind each poem resonates with the reader whether the poem is 45 or 345 years old. The human struggle to understand life, regret, and why God gives and withholds certain gifts will continue as long as humanity exists; each person who considers these questions will come to his/her own personal conclusions just as Thomas and Milton did. Works Cited: Milton, John. "When I Consider How My Light Is Spent." The Longman Anthology of British Literature: Compact Edition. Ed. David Damrosch. New York: Longman, 2000. Thomas, Dylan. â€Å"Do Not Go Gentle into That Good Night.† Literature and Ourselves. Addison-Wesley Educational Publishers, 1997.

Sunday, August 18, 2019

Biochemistry :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  Biochemistry   Ã‚  Ã‚  Ã‚  Ã‚  What is Biochemistry? Biochemistry is everything from the elements to dehydration synthesis. What is an element? An element in a pure substance that can be broken down in to smaller units called protons neutrons and electrons. There are over 100 elements on our planet. Did you know that DNA is a nucleotide because of it basic structural units which contains sugars joined together to form what looks like a winding ladder?   Ã‚  Ã‚  Ã‚  Ã‚  Elements can be bonded either by covalent bond, ionic bond, peptide bond or hydrogen bond.. Each bond is a chemical attraction between electrons. Once an chemical has bonded and it is written on paper the written bond is knew as a chemical formula. Another written bond is called a structural formula which is an expanded molecular formula showing the same thing as a chemical formula. In order for there to be a brand new chemical formed there must be some from of oxidation which is the transfer of electrons or reduction which is the subtraction of electrons. Sometime a element forms an organic compound which is a compound that includes Carbon. There are many more compounds such as monomer which is a chemical compound that can undergo polymerization or polymer which can be either a mixture or a compound formed but polymerization and consisting essentially of repeating structural units such as a glucose molecule. Also an isotope is any of two or more species of atoms with the same atomic number and a similar chemical behavior but with a different atomic mass   Ã‚  Ã‚  Ã‚  Ã‚  Biochemistry isn’t just about the elements it’s also about foods. There are many saturated and unsaturated fats in foods. Many most people don’t know about them. Amino acids are acids synthesized by living cells or obtained as essential components of a diet. In other words they are the fats in food. Much like a phospholipid which are numerous lipids in which phosphoric acid as well as fatty acids. A lot of food carry glucose which is the chemical word for sugar. Starch is a white odorless and tasteless powdery complex carbohydrate. Another type of carbohydrate is glycogen which is a white amorphous tasteless polysaccharide that is the principal form in which carbohydrates are stored. Steroid is any of numerous compounds containing a 17 carbon 4 ring system the includes various hormones. In order to make all these acids used in food useable the must be denature which means to deprive of natural qualities.

Saturday, August 17, 2019

Management development review notes

To manage Is to forecast and plan, to command, to co-ordinate and to control Management Is a social process which consists of planning, control, co-ordination and motivation Kenton & online 1976 – Managing Is an operation process Minimally best dissected by analyzing the managerial functions.The essential managerial functions are planning, organizing, staffing, directing and leading, controlling. Classical School Payola's 14 principles of management – many still true but was very structural and paternalistic. Scientific Management FEW Taylor 1911 – the principles of scientific management. Breaking the job down into movements and timing how long it took. Criticized for turning workers into automatons. Concept of Bureaucracy Max Weber 1947 – The theory of social and economic organizations – describes the bureaucratic organizationA bureaucracy is based on rational-legal authority which arises out of the office or position of the person in authority. We ber believed that bureaucracy Is the most efficient means of organizing for the achievement of formal goals. Elton Mayo 1927-1936 Hawthorn Studies/experiments – social relations at work are as Important as monetary Incentives and good physical working conditions Human Relations School.

Friday, August 16, 2019

Enron Corporation Essay

Enron Corporation began as a small natural gas distributor and, over the course of 15 years, grew to become the seventh largest company in the United States. Soon after the federal deregulation of natural gas pipelines in 1985, Enron was born by the merging of Houston Natural Gas and InterNorth, a Nebraska pipeline company. Initially, Enron was merely involved in the distribution of gas, but it later became a market maker in facilitating the buying and selling of futures of natural gas, electricity, broadband, and other products. However, Enron’s continuous growth eventually came to an end as a complicated financial statement, fraud, and multiple scandals sent Enron through a downward spiral to bankruptcy. During the 1980s, several major national energy corporations began lobbying Washington to deregulate the energy business. Their claim was that the extra competition resulting from a deregulated market would benefit both businesses and consumers. Consequently, the national government began to lift controls on who was allowed to produce energy and how it was marketed and sold. However, as competition in the energy market increased, gas and energy prices began to fluctuate greatly. Over time, Enron incurred massive debts and no longer had exclusive rights to its pipelines. It needed some new and innovative business strategies. Kenneth Lay, chairman and CEO, hired the consulting firm McKinsey & Company to assist in developing a new plan to help Enron get back on its feet. Jeffrey Skilling, a young McKinsey consultant who had a background in banking and asset and liability management, was assigned to work with Enron. He recommended that Enron create a gas bank to buy and sell gas. Skilling, who later became chief executive at Enron, recognized that Enron could capitalize on the fluctuating gas prices by acting as an intermediary and creating a futures market for buyers and sellers of gas; it would buy and sell gas to be used tomorrow at a stable price today. Although brilliantly successful in theory, Skilling’s gas bank idea faced a major problem. The natural gas producers who agreed to supply Enron’s gas bank desperately needed cash and required cash as payment for their products. Enron also had insufficient cash levels. Therefore, management decided to team up with banks and other financial institutions, establishing partnerships that would provide the cash needed to complete the transactions with Enron’s suppliers. Under the direction of Andrew Fastow, a newly hired financial genius, Enron also created several special-purpose entities (SPEs), which served as the vehicles through which money was funneled from the banks to the gas suppliers, thus keeping these transactions off Enron’s books. As Enron’s business became more and more complicated, its vulnerability to fraud and eventual disaster also grew. Initially, the newly formed partnerships and SPEs worked to Enron’s advantage. Yet in the end , it was the creation of these SPEs that culminated in Enron’s death. Within just a few years of instituting its gas bank and the complicated financing system, Enron grew rapidly, controlling a large part of the U.S. energy market. At one point, it controlled as much as a quarter of all of the nation’s gas business. It also began expanding to create markets for other types of products, including electricity, crude oil, coal, plastics, weather derivatives, and broadband. In addition, Enron continued to expand its trading business and, with the introduction of Enron Online in the late 1990s, it became one of the largest trading companies on Wall Street, at one time generating 90% of its income through trades. Enron soon had more contracts than any of its competitors and, with market dominance, could predict future prices with great accuracy, thereby guaranteeing superior profits. To continue enhanced growth and dominance, Enron began hiring the best and brightest traders. However, Enron was just as quick in firing its employees as it was in hiring new ones. Management created the Performance Review Committee (PRC), which became known as the harshest employee ranking system in the country. Its method of evaluating employee performance was nicknamed â€Å"rank and yank† by Enron employees. Every 6 months, employees were ranked on a scale of 1–5. Those ranked in the lowest category (1) were immediately yanked (fired) from their position and replaced by new recruits. Surprisingly, during each employee review, management required that at least 15% of all the employees ranked were given a 1 and therefore yanked from their position and income. The employees ranked with a 2 or 3 were also given notice that they were liable to be released in the near future. These ruthless performance reviews created fierce internal competition between fellow employees w ho faced a strict ultimatum; perform or be replaced. Furthermore, it created a work environment where employees were unable to express opinions or valid concerns for fear of a low ranking score by their superiors. With so much pressure to succeed and maintain its position as the global energy market leader, Enron began to jeopardize its integrity by committing fraud. The SPEs, which originally were used for good business purposes, were now used illegally to hide bad investments, poorly performing assets, and debt; to manipulate cash flows; and eventually, to report more than $1 billion of false income. The following are examples of how specific SPEs were used fraudulently. Chewco: In 1993, Enron and the California Public Employees Retirement System (CalPERS) formed a 50/50 partnership called Joint Energy Development Investments Limited (JEDI). In 1997, Enron’s Andrew Fastow established the Chewco SPE, which was designed to repurchase CalPERS’s share of equity in JEDI at a large profit. However, Chewco crossed the bounds of legality in two ways. First, it broke the 3% equity rule, which allowed corporations such as Enron to not consolidate if outsiders contributed even 3% of the capital, but the other 97% could come from the company. When Chewco bought out JEDI, however, half of the $11.4 million that bought the 3% equity involved cash collateral provided by Enron—meaning that only 1.5% was owned by outsiders. Therefore, the debts and losses incurred at Chewco were not listed where they belonged, on Enron’s financial reports, but remained only on Chewco’s separate financial records. Second, because Fastow was an Enron officer, he was, therefore, unauthorized to personally run Chewco without direct approval from Enron’s board of directors and public disclosure with the SEC. In an effort to secretly bypass these restrictions, Fastow appointed one of his subordinates, Michael Kopper, to run Chewco, under Fastow’s close supervision and influence. Fastow continually applied pressure to Kopper to prevent Enron from getting the best possible deals from Chewco and, therefore, giving Michael Kopper huge profits. Chewco was eventually forced to consolidate its financial statements with Enron. By doing so, however, it caused large losses on Enron’s balance sheet and other financial statements. The Chewco SPE accounted for 80% (approximately $400 million) of all of Enron’s SPE restatements. Moreover, Chewco set the stage for Andrew Fastow as he continued to expand his personal profiting SPE empire. LJM 1 and 2: The LJM SPEs (LJM1 and LJM2) were two organizations sponsored by Enron that also participated heavily in fraudulent deal making. LJM1 and its successor, LJM2, were similar to the Chewco SPE in that they also broke the two important rules set forth by the SEC. First, although less than 3% of the SPE equity was owned by outside investors, LJM’s books were kept separate from Enron’s. An error in judgment by Arthur Andersen allowed LJM’s financial statements to go unconsolidated. Furthermore, Andrew Fastow (at that time CFO at Enron) was appointed to personally oversee all operations at LJM. Without the governing controls in place, fraud became inevitable. LJM1 was first created by Fastow as a result of a deal Enron made with a high-speed Internet service provider called Rhythms NetConnections. In March 1998, Enron purchased $10 million worth of shares in Rhythms and agreed to hold the shares until the end of 1999, when it was authorized to sell those shares. Rhythms released its first IPO in April 1999 and Enron’s share of Rhythms stock immediately jumped to a net worth of $300 million. Fearing that the value of the stock might drop again before they could sell it, Enron searched for an investor from whom it would purchase a put option (i.e., insurance against a falling stock price). However, because Enron had such a large share and because Rhythms was such a risky company, Enron could not find an investor at the price Enron was seeking. So, with the approval of the board of directors and a waiver of Enron’s code of conduct, Fastow created LJM1, which used Enron stock as its capital to sell the Rhythms stock put options to Enron. In effect, Enron was insuring itself against a plummeting Rhythms stock price. However, because Enron was basically insuring itself and paying Fastow and his subordinates millions of dollars to run the deal, Enron really had no insurance. With all of its actions independent of Enron’s financial records, LJM1 was able to provide a hedge against a profitable investment. LJM2 was the sequel to LJM1 and is infamous for its involvement in its four major deals known as the â€Å"Raptors.† The Raptors were deals made between Enron and LJM2, which enabled Enron to hide losses from Enron’s unprofitable investments. In total, the LJM2 hid approximately $1.1 billion worth of losses from Enron’s balance sheet. LJM1 and LJM2 were used by Enron to alter its actual financial statements and by Fastow for personal profits. Enron’s books took a hard hit when LJM finally consolidated its financial statements, a $100 million SPE restatement. In the end, Fastow pocketed millions of dollars from his involvement with the LJM SPEs. Through complicated accounting schemes, Enron was able to fool the public for a time into thinking that its profits were continually growing. The energy giant cooked its books by hiding significant liabilities and losses from bad investments and poor assets, by not recognizing declines in the value of its aging assets, by reporting more than $1 billion of false income, and by manipulating its cash flows, often during fourth quarters. However, as soon as the public became aware of Enron’s fraudulent acts, both investors and the company suffered. As investor confidence in Enron dropped because of its fraudulent deal making, so did Enron’s stock price. In just 1 year, Enron stock plummeted from a high of about $95 per share to below $1 per share. The decrease in equity made it impossible for Enron to cover its expenses and liabilities and it was forced to declare bankruptcy on December 2, 2001. Enron had been reduced from a company claiming almost $62 billion worth of asse ts to nearly nothing.

Thursday, August 15, 2019

3-D Password for More Security

ADVANCED E-SECURITY CP5603 MINOR RESEARCH REPORT Submitted By: Neeraj Kumar MIT-MBA Student ID. : 12682310 TABLE OF CONTENTS Title Page no ABSTRACT 3 INTRODUCTION 2-6 1. 1 Authentication 5 1. Authentication Methods 5-6 1. 3 Organization of the Report 6 ACTUAL RESEARCH WORK 7-8 3D PASSWORD SYSTEM 2. 1 Overview 7 2. 2 Innovative Component 7-8 2. Comparison with Current Authentication Systems 8 IMPLEMENTATION OF THE 3D PASSWORD 9-16 3. 1 Virtual Object Recognition 9 3. 2 3D Password Selection and Inputs 10-13 3. 3 3D Virtual Environment Design Guidelines 14-16 APPLICATIONS 17-18 4. Advantages 18 CONCLUSION 19 REFERENCES 20 ABSTRACT Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks.Many available graphical passwords have a password sp ace that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed; however, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. In this report mechanism of secure authentication is dicussed. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects.The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-D password key space. INTRODUCTION In this chapter the pass word stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc.Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionary or their pet names, girlfriends etc. Ten years back Klein performed such tests and he could crack 10-15 passwords per day. On the other hand, if a password is hard to guess, then it is often hard to remember. Users have difficulty remembering a password that is long and random appearing. So, they create short, simple, and insecure passwords that are susceptible to attack.Which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Graphical passwords schemes have been proposed. The strength of graphical passwords comes from the fact that users can recall and recognize pictures more than words. Most graphical passwords are vulnerable for shoulder surfing attacks, where an attacker can observe or record the legitimate user’s graphical password by camera. Token based systems such as ATMs are widely applied in banking systems and in laboratories entrances as a mean of authentication. However, Smart cards or tokens are vulnerable to loss or theft.Moreover, the user has to carry the token whenever access required. Biometric scanning is your â€Å"natural† signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas (Biometric scanning). In this seminar, present and evaluate our contribution, i. e. , the 3-D password. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects.The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-Dpassword key space. 1. 1 AUTHENTICATION Authentication is the act of establishing or confirming something as authentic, that is, that claims made by or about the subject are true.This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what it’s packaging and labeling claims to be, or assuring that a computer program is a trusted one. For example, when you show proper identification credentials to a bank teller, you are asking to be authenticated to act on behalf of the account holder. If your authentication request is approved, you become authorized to access the accounts of that account holder, but no others. 1. 2 AUTHENTICATION METHODS The first i s comparing the attributes of the object itself to what is known about objects of that origin.For example, an art expert might look for similarities in the style of painting, check the location and form of a signature, or compare the object to an old photograph. An archaeologist might use carbon dating to verify the age of an artifact, do a chemical analysis of the materials used, or compare the style of construction or decoration to other artifacts of similar origin. The physics of sound and light, and comparison with a known physical environment, can be used to examine the authenticity of audio recordings, photographs, or videos. The second type relies on documentation or other external affirmations.For example, the rules of evidence in criminal courts often require establishing the chain of custody of evidence presented. This can be accomplished through a written evidence log, or by testimony from the police detectives and forensics staff that handled it. Some antiques are accomp anied by certificates attesting to their authenticity. External records have their own problems of forgery and perjury, and are also vulnerable to being separated from the artifact and lost. Currency and other financial instruments commonly use the first type of authentication method.Bills, coins, and cheques incorporate hard-to-duplicate physical features, such as fine printing or engraving, distinctive feel, watermarks, and holographic imagery, which are easy for receivers to verify. Consumer goods such as pharmaceuticals, perfume, fashion clothing can use either type of authentication method to prevent counterfeit goods from taking advantage of a popular brand's reputation (damaging the brand owner's sales and reputation). A trademark is a legally protected marking or other identifying feature which aids consumers in the identification of genuine brand-name goods. 1. ORGANIZATION OF THE REPORT The 3-D password is a multifactor authentication scheme. To be authenticated, we presen t a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-Dpassword key space.ACTUAL RESEARCH WORK 3D PASSWORD SYSTEM 2. 1 OVERVIEW In this chapter the system consist of multi factor authentication scheme. It can combine all existing authentication schemes into a single 3Dvirtual environment. This 3D virtual environment contains several objects or items with which the user can interact. The user is presented with this 3D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects i nside the 3D environment constructs the user’s 3Dpassword.The 3D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment. The choice of what authentication schemes will be part of the user's 3D password reflects the user's preferences and requirements. A user who prefers to remember and recall a password might choose textual and graphical password as part of their 3D password. On the other hand users who have more difficulty with memory or recall might prefer to choose smart cards or biometrics as part of their 3D password.Moreover user who prefers to keep any kind of biometric data private might not interact with object that requires biometric information. Therefore it is the user's choice and decision to construct the desired and preferred 3D password. 2. 2 INNOVATIVE COMPONENT The proposed system is a multi-factor authentication scheme that combines the benefits of various authentication schemes. Users have the freedom to select whether the 3D password will be solely recall, recognition, or token based, or combination of two schemes or more. This freedom of selection is necessary because users are different and they have different requirements.Therefore, to ensure high user acceptability, the user’s freedom of selection is important. The following requirements are satisfied in the proposed scheme 1. The new scheme provide secrets that are easy to remember and very difficult for intruders to guess. 2. The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others. 3. The new scheme provides secrets that can be easily revoked or changed. 2. 3 COMPARISON WITH CURRENT AUTHENTICATION SYSTEMS Suffer from many weaknesses. Textual passwords are commonly used.Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and v ulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed. However, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. The 3D password is a multi-factor authentication scheme.The design of the 3D virtual environment and the type of objects selected determine the 3D password key space. User have freedom to select whether the 3D password will be solely recall, recognition, or token based, or combination of two schemes or more. IMPLEMENTATION 3. 1 VIRTUAL OBJECT RECOGNITION Virtual objects can be any object that we encounter in real life. Any obvious actions and interactions toward the real life objects can be done in the virtual3Denvironment toward the virtual objects. Moreover, any user input (such as spea king in a specific location) in the virtual 3Denvironment can be considered as a part of the 3Dpassword.We can have the following objects: 1) A computer with which the user can type; 2) A fingerprint reader that requires the user’s fingerprint; 3) A biometric recognition device; 4) A paper or a white board that a user can write, sign, or draw on; 5) An automated teller machine (ATM) that requests a token; 6) A light that can be switched on/off; 7) A television or radio where channels can be selected; 8) A staple that can be punched; 9) A car that can be driven; 10) A book that can be moved from one place to another; 11) Any graphical password scheme; 12) Any real life object; 3) Any upcoming authentication scheme. The action toward an object (assume a fingerprint recognition device)that exists in location (x1 , y1 , z1 ) is different from the actions toward a similar object (another fingerprint recognition device) that exists in location (x2 , y2 , z2 ),where x1 = x2 , y1 = y 2 , and z1 = z2 . Therefore, to perform the legitimate 3Dpassword, the user must follow the same scenario performed by the legitimate user. This means interacting with the same objects that reside at the exact locations and perform the exact actions in the proper sequence. 3. 2 3D PASSWORD SELECTION AND INPUTSLet us consider a 3Dvirtual environment space of size G ? G ? G. The 3Denvironment space is represented by the coordinates (x, y, z) ? [1†¦ G]? [1†¦ G]? [1†¦ G]. The objects are distributed in the 3Dvirtual environment with unique (x, y, z) coordinates. We assume that the user can navigate into the 3Dvirtual environment and interact with the objects using any input device such as a mouse, key board, fingerprint scanner, iris scanner, stylus, card reader, and microphone. Consider the sequence of those actions and interactions using the previous input devices as the user’s 3Dpassword.For example, consider a user who navigates through the 3Dvirtualenvironment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types â€Å"FALCON. † Then, the user walks to the meeting room and picks up a pen located at (10, 24, 80) and draws only one dot in a paper located in (1, 18, 30), which is the dot (x, y) coordinate relative to the paper space is (330, 130).The user then presses the login button. The initial representation of user actions in the 3Dvirtual environment can be recorded as follows: †¢ (10, 24, 91) Action = Open the office door; †¢ (10, 24, 91) Action = Close the office door; †¢ (4, 34, 18) Action = Typing, â€Å"F†; †¢ (4, 34, 18) Action = Typing, â€Å"A†; †¢ (4, 34, 18) Action = Typing, â€Å"L†; †¢ (4, 34, 18) Action = Typin g, â€Å"C†; †¢ (4, 34, 18) Action = Typing, â€Å"O†; †¢ (4, 34, 18) Action = Typing, â€Å"N†; †¢ (10, 24, 80) Action = Pick up the pen; †¢ (1, 18, 80) Action = Drawing, point = (330, 130). Figure 3. 2 – Snapshot of an experimental 3-D virtual environmentThe 3-D password is a multifactor authentication scheme. It can combine all existing authentication schemes into a single 3-D virtual environment. This 3-D virtual environment contains several objects or items with which the user can interact. The type of interaction varies from one item to another. The 3-D password is constructed by observing the actions and interactions of the user and by observing the sequences of such actions. It is the user’s choice to select which type of authentication techniques will be part of their 3-D password. This is chieved through interacting only with the objects that acquire information that the user is comfortable in providing and ignoring th e objects that request information that the user prefers not to provide. For example, if an item requests an iris scan and the user is not comfortable in providing such information, the user simply avoids interacting with that item. Moreover, giving the user the freedom of choice as to what type of authentication schemes will be part of their 3-D password and given the large number of objects and items in the environment, the number of possible 3-D passwords will increase.Thus, it becomes much more difficult for the attacker to guess the user’s 3-D password. Fig 3. 2. 1 State diagram of 3D password 3. 3 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES The design of the 3 D virtual environments affects the usability, effectiveness, acceptability of 3D password. The first step in building a 3 ­Dpassword system is to design a 3 ­Denvironment that reflects the administration needs and the security requirements. Figure 3. 3 3D virtual environment 1) Real life-similarity ­The prospec tive 3 ¬D virtual environment should reflect what people are used to seeing in real life. Objects used in virtual environments should be relatively similar in size to real objects (sized to scale). Possible actions and interactions toward virtual objects should reflect real life situations. Object responses should be realistic. The target should have a 3 ­D virtual environment that users can interact. 2) Object uniqueness and distinction ­ Every virtual object or item in the 3 ­D virtual environment is different from any other virtual object.The uniqueness comes from the fact that every virtual object has its own attributes such as position. Thus, the prospective interaction with object 1 is not equal to the interaction with object 2. However, having similar objects such as 20 computers in one place might confuse the user. Therefore, the design of the 3 ­D virtual environment should consider that every object should be distinguishable from other objects. Similarly, in desi gning a 3 ­Dvirtual environment, it should be easy for users to navigate through and to distinguish between objects.The distinguishing factor increases the user’s recognition of objects. Therefore, it improves the system usability. 3) Three Dimensional Virtual Environment Size  ­ A 3 ­Dvirtual environment can depict a city or even the world. On the other hand, it can depict a space as focused as a single room or office. A large 3 ¬D virtual environment will increase the time required by the user to perform a 3 ­Dpassword. Moreover, a large3 ­Dvirtual environment can contain a large number of virtual objects. Therefore, the probable 3 ­Dpassword space broadens.However, a small 3 ­D virtual environment usually contains only a few objects, and thus, performing a 3 ­D password will take less time. 4) Number of objects and their types ­ Part of designing a 3 ­D virtual environment is determining the types of objects and how many objects should be placed in th e environment. The types of objects reflect what kind of responses the object will have. For simplicity, we can consider requesting a textual password or a fingerprint as an object response type. Selecting the right object response types and the number of objects affects the probable password space of a 3 ­D password. ) System Importance ­ The 3D virtual environment should consider what systems will be protected by a 3D password. The number of objects and the types of objects that have been used in the 3D virtual environment should reflect the importance of the protected system. APPLICATIONS The 3D password can have a password space that is very large compared to other authentication schemes, so the 3 ­D password’s main application domains are protecting critical systems and resources. 1. Critical servers ­Many large organizations have critical servers that are usually protected by a textual password. A 3-D password authentication proposes a sound replacement for a te xtual password. Moreover, entrances to such locations are usually protected by access cards and sometimes PIN numbers. Therefore, a 3-D password can be used to protect the entrance to such locations and protect the usage of such servers. 2. Nuclear and military facilities- Such facilities should be protected by the most powerful authentication systems.The 3 ­D password has a very large probable password space, and since it can contain token ­, biometrics ­, recognition ­, and knowledge based authentications in a single authentication system, it is a sound choice for high level security locations. 3. Airplanes and jet fighters ­ Because of the possible threat of misusing airplanes and jet fighters for religious, political agendas, usage of such airplanes should be protected by a powerful authentication system. In addition, 3 ­D passwords can be used in less critical systems because the 3D virtual environment can be designed to fit to any system needs.A small virtual envir onment can be used in the following systems like Some other application areas: †¢ ATM †¢ Desktop Computers ; laptop logins †¢ Web Authentication 4. 1 ADVANTAGES * Easy to memorize: Users can memorize a 3D password as a â€Å"little† story which makes the password easy to remember * Flexibility: 3d passwords allows multi-factor authentication. Smart cards, biometrics and alpha num. password can embedded in the 3d password technology * Strength: A scenario in a 3D environment offers as almost unlimited combination of possibilities.As such system can have specific 3d world, hack are extremely difficult. * The 3D password gives users the freedom of selecting what type of authentication techniques. * Secrets those are not easy to write down on paper. * The scheme secrets should be difficult to share with others. * Provide secrets that can be easily revoked or changed. CONCLUSION There are many authentication schemes in the current state. Some of them are based on us er’s physical and behavioral properties, and some other authentication schemes are based on user’s knowledge such as textual and graphical passwords.Moreover, there are some other important authentication schemes that are based on what you have, such as smart cards. Among the various authentication schemes, textual password and token-based schemes, or the combination of both, are commonly applied. However, as mentioned before, both authentication schemes are vulnerable to certain attacks. Moreover, there are many authentication schemes that are currently under study and they may require additional time and effort to be applicable for commercial use.In this report the 3D password mechanism is explained the 3-D password is a multifactor authentication scheme that combines these various authentication schemes into a single3-D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object. Therefore, the resulted password space becomes very large compared to any existing authentication schemes. REFERENCES [1] X. Suo, Y. Zhu, and G. S. Owen, â€Å"Graphical passwords: A survey,† in Proc. 1st Annual . Comput. Security Appl. Conf. , Dec. 5–9, 2005, pp. 463–472. [2] D. V. Klein, â€Å"Foiling the cracker: A survey of, and improvement to passwords security, in Proc. USENIX Security Workshop, 2008, Measurement,VOL. 57,September 2008. [3] NBC news, ATM Fraud: Banking on Your Money, Dateline Hidden Cameras Show Criminals Owning ATMs, Dec. 11, 2003. [4] T. Kitten, Keeping an Eye on the ATM. (2005, Jul. 11). ATMMarketPlace. com. [6] G. E. Blonder, â€Å"Graphical password,† U. S. Patent 5 559 961,Sep. 24, 1996. [7] http://en. wikipedia. org/wiki/3-D_Secure