Thursday, December 26, 2019

Love Of God Reflection Paper - 1739 Words

Love is the feeling of both attachment and deep affection. Anyone who has ever lived has come to know this feeling at some point in their existence. A lot of people find themselves unloved and worthless when it is the complete opposite. They fail to notice the presence of God and his work. From the moment we are born, we already are touched by the love of God. Throughout the ages, humans and God have always had a rocky relationship; from the time of fall of man to present day 2017, but even at our lowest points as humanity, he still has loved and cared for us. We are created in his image; we are his children and through him, we learn to love the ones around us and ourselves. But to love others and ourselves, we must first learn how to†¦show more content†¦Even before that, God demonstrated his merciful nature in the fall of man, with Adam and Eve. They were told not to eat the fruit lest they be killed, but they went against his wishes and ate from the fruit of knowledge. G od, seeing them as his creations, was merciful and allowed them to live without a second thought. I also saw some traits that I had never noticed before. One of them being slow to anger. Even when Abraham got mad at him, he remained calm and promised Abraham once more that he would give him numerous descendants. When Jacob was being snobbish, God still was willing to guide him through life as the blessed one. He is also very just. He allowed for Adam and Eve to live, but he also gave them consequences for their actions. Same with Lot. Sodom and Gomorrah were filled with horrible people, ones who were selfish and haughty. But even with so many sinners, Lot was welcoming and humble and because God saw this, Lot was spared and allowed to live out his life in a neighboring city. God is someone who cares and loves us although we don’t extend the same love back at Him, He will always be there waiting for our acceptance. As creations of Gods, we have learned about love and selflessness, but also found ourselves being selfishness and prideful. We should be using the bible to learn lessons about ourselves and God, not straying away from what is written. A big lesson in bible in humility and compassion. When Abraham,Show MoreRelatedTheology: God and Prayer Essay1143 Words   |  5 PagesReflection Paper: Prayer and Character Development Twila S. Cooper Theology 104 November 16, 2012 Professor White INTRODUCTION The purpose of this paper is to reveal a direct correlation between prayer and character development. It is crucial that Christians fully understand this tool that has been put in place in order for us to be able to communicate with the Lord, our Creator. Praying and communing with the Lord leads to and builds not only a stronger relationshipRead MoreReflection Paper1562 Words   |  7 PagesReflection Paper #1 Rhonda Carter Theology 104-D11 LOU April 15, 2013 I. Introduction This paper will be written to discuss the two topics I have chosen to write about for my first reflection paper. The topics I chose are spiritual gifts and love. When you start to think about it, these two things go together. If a person uses their spiritual gifts for the right reasons they will be doing it out of love for God. A lot of people these days do not use theirRead MoreReflection Paper1453 Words   |  6 PagesReflection Paper Shannon B. Payton Liberty University Introduction This paper is about reflecting on what was covered in Theology 104. There are many Christians who understand that God loves us and wants the best for His children. There are many subjects, videos, and extracted material that has been read or discussed over the span of four weeks which has given me a better understanding of the Bible and Christianity. My reflection for this paper I have chosen two topics that I have chosenRead MoreTheo 104 Reflection Paper1243 Words   |  5 PagesHolly Peters September 13, 2012 Theo 104 Reflection Paper #1 Introduction: Within this paper I will be reflecting over the first part of Theology 104. This class has addressed many topics that have given me a better understanding on Christianity, the Bible and most importantly Jesus Christ. I will be addressing two topics that I feel are very important to Christianity the first topic being the Importance of Personal Testimony and the second topic covering the Importance of MaintainingRead MoreTheo 104 Reflection Paper 1642 Words   |  3 PagesTOPICS TO CONSIDER FOR THE REFLECTION PAPER: Angels, Anthropological Argument, Arminianism, Assurance of Salvation, Attributes of God, Baptism of Holy Spirit, Believers Glorified Body Bible Study, Biblical Theology, Calvinism, Character Development, Christian Service, Comfort of God, Conscience, Contemporary, Theology, Conversion, Conviction, Cosmological Argument,Creation, Crown of Life, Deacon, Death Death of Christ, Deity of Christ, Demons,Denominations, Doctrine, Dogmatic Theology, DoubtRead MoreTheology 104 Reflection Paper1245 Words   |  5 PagesTheology-104 May 4, 2011 Reflection Paper Introduction Did Jesus claim to be God? If a person is a Christian, does it matter how they live their life? What can your local Church do to better communicate God’s love to your community? These are just three of many questions when it comes to being a Christian living in the world we live today. Section 1: Did Jesus Claim to be God? Jesus is never recorded in the Bible as saying the precise words, â€Å"I am God.† That does not mean, however, that HeRead MoreThe Important Elements Of The Christian Worldview And Specific Topics Essay1512 Words   |  7 PagesGospel Essentials This paper will focus on the important elements of the Christian worldview and specific topics. The paper will go into more detail on the topics that will be discussed in the paper. In the paper there will also be analysis and reflection from my own personal worldview as well. The main focus of this paper will be on God, humanity, Jesus, and restoration by analyzing and reflecting on each of the different topic. The Christian Worldview God God is the almighty creator who createdRead MoreEssay On Christians In A Diverse World1707 Words   |  7 Pageswere explained and considered. Throughout the class, we also broke up the schedule of reading these five books to writing two other papers based off of a project or research that were both spread out randomly in the semester. The first two books that we based our class discussions on were, â€Å"Unchristian† by David Kinnaman and Gabe Lyons, and â€Å"It’s Really All About God† by Samir Selmanovic. In the book â€Å"Unchristian,† we learned about the â€Å"image problem† that non believes have of Christians and how theyRead MoreTheo 104 Reflection Paper1067 Words   |  5 PagesReflection Paper My dad used to tell me all the time that we are all a work in progress. At the time I didn’t know exactly know what he meant. As years have passed on and my relationship with Christ matured, I now know what he meant. We as children of God can never be perfect, but what we can do is strive to be like Christ, this is what the definition of a Christian is, â€Å"Christ like†. I try to share the good news of Jesus, and when I do I like to talk to people about God’s Grace and through hisRead MoreAngels Demons - 1 Essay1190 Words   |  5 PagesValerie Marica THEO 104-D48 Reflection Paper Introduction Angels are many times presented as being dressed in white flowing robes with halos and wings. They are usually depicted with long flowing hair and surrounded by bright white light. It is not unusual to see angels presented in movies, television and literature as taking human form and assisting people by performing various supernatural acts, such as flying or performing miracles. Angels are almost always presented as good and peaceful

Wednesday, December 18, 2019

Inequality Inequality And Inequality - 1903 Words

Inequality In regards to inequality, Bhagwati argues that the inequality, which has further been perpetuated by economic globalization, is not a negative occurrence. . Critics of globalization usually point to inequality as a reason to present objections to globalization, however, Bhagwati argues that inequality is not bad at all. Even though economic globalization via trade and corporations will generally benefit the country and lead to an increased GDP , some individuals will attain significantly way more financial reimbursements than others. Bhagwati is against poverty but not inequality. Bhagwati says â€Å"inequality is accepted because it excites not envy but aspiration and hope. Capitalism’s inequalities then become tolerable, not because the rich deny themselves self-indulgence but because they make the poor fancy that these prices may come to them someday too †. Thus, inequality inspires people at the bottom end of the socio-economic status to work hard and achieve living status mobility. Another reason why Bhagwati supports huge levels of inequality is because it will lead to Altruism, hence a better society . If the inequality gap is not very high, people who have money will spend it on themselves and their never ending desires rather than help poor people members of society achieve class mobility . He referred to Bill gate to illustrate this point. The fact that Bill gate had billions and billions of dollars was what made him give his money back to charity, henceShow MoreRelatedInequality2240 Words   |  9 PagesVictorian model of a home we can see that the husband was expected to work, and the wife was expected to stay home. The female of the house was also expected to cook, clean and care for the husband and children. Very much as it remains to date. Inequality in the home has many downsides to it. The marriage will not be an equal partnership. The female could feel undervalued, and this in turn could lead to low self esteem and the eventual breakdown of the relationship.   In Kurt Vonnegut’s story,Read MoreSocial Inequality : Inequality And Inequality3119 Words   |  13 Pages Core Assessment Paper Carrie Bailey Park University Social Inequality in My Life Social inequality is described by the presence of unequal opportunities and rewards for various social positions or statuses inside a society or group. It contains organized and repetitive examples of unequal distributions of goods, riches, opportunities, prizes, and disciplines. Racism, for instance, is comprehended to be a wonder whereby access to rights and resources is unreasonably disseminatedRead MoreSocial Inequality And Gender Inequality Essay2163 Words   |  9 Pagesn AmericaSocial inequality is defined as the set of unequal for different social classes or statuses for various individuals within a group or society. It usually refers to people of distinct genders, ages and ethnicities. Many American’s have experienced some type of social inequality throughout their lifetime. America’s gaping inequality is seen everywhere from education to the workforce. Society tends to oversee inequality based on race, gender, and other social characteristics believe that racialRead MoreSocial Inequality And Gender Inequality Essay2091 Words   |  9 PagesSocial inequality is defined as the set of unequal opportunities for different social classes or statuses for various individuals within a group or society. It usually refers to people of distinct genders, ages, and ethnicities. Many American’s have experienced some type of social inequality throughout their lifetime. America’s gaping inequality is seen everywhere from education to the workforce. Society tends to oversee inequality based on race, gender, and other social characteristics . AmericansRead MoreEconomic Inequality, Inequality And Inequality952 Words   |  4 Pagesthe OECD, the term inequality in the opposite of equity can be defined as evenness or fairness within the social, political, and economic perspectives. Equity forms the core value of both the western democratic tradition and religions. From the concept of equality, inequality can be described as unfair or uneven treatments of the people within the society or unequal distribution of resources, income, and other factors between different sectors in the society. Inequality can be defined asRead MoreInequality : Inequality And Poverty1729 Words   |  7 Pages Inequality and poverty exist in our society because wealth and opportunity are inherited. If we all entered the world with an equal amount of resources, some would still rise above others but everyone would get the same chance to succeed in life. Since greed is one of the norms of our society, and wealth is passed from generation to generation, there will always be inequality and poverty. The system of wealth and inequality is actually pretty simple. It all boils down to a few things what youRead MoreEssay On Gender Inequality1091 Words   |  5 Pagesbeen many inequalities that the world has been faced with; whether it is race, gender, or ethnic background. I am writing you, the representatives for Equal Rights to discuss an urgent concern of American women in the workplace. Although gender inequality is decreasing, it still exists and makes a lot of people suffer its consequences every day. Gender inequality is unfair rights between male and female based on different gender role s which leads to unequal treatment. Gender inequality has been widelyRead MoreEssay On Gender Inequality1127 Words   |  5 Pagesstill being treated worse than the white males of society. Even today, when white males are typically the leaders of society, it’s not always race and gender that creates inequality; sometimes it’s money that creates the issue. Not just from past evidence, but from present evidence as well, America shows signs of inequality by the way people are taught different at different schools and also by the often occurring shootings, riots, and police brutality incidents happening on a national scale. Read MoreAn Equally Faulted Inequality Essay2469 Words   |  10 PagesAn Equally Faulted Inequality With the signing of the Declaration of Independence in 1776 came more than solely the independence stated in the â€Å"legal† document. The Declaration brought about a component of equality unanticipated by any signer or drafter that would soon shape the future and the mindset of many citizens. This sensation of equality spread rapidly through the country and could be seen in different time periods throughout American history where a group of people realized the government’sRead MoreInequality in the Classroom Essay759 Words   |  4 PagesThe issue of inequality seems to be evident in our classrooms nowadays. It is said that although everyone, regardless of race or religion, have been given equal oppurtunities, the outcome is still imbalanced. Researchers say that this could be due to either biological destiny (/innate intelligence superiority) or cultural depravation (/cultural superiority). This essay will reflect my views on innate intelligence and cultural superio rity in explaining group differences as well as other explanation

Tuesday, December 10, 2019

Analysis of Micro Economy in Australia †MyAssignmenthelp.com

Question: Discuss about the Analysis of Micro Economy in Australia. Answer: Introduction In this particular report, the overall analysis regarding the micro economy of the country Australia has been significantly discussed. Here the aspects of monopoly, duopoly, and oligopoly market in Australia have been significantly highlighted in order to judge the current commodity market scenario of the country. Thus in order to formulate all the judgement a mere analysis through representing different diagrams has been emphasized in order to depict the feasibility assessing the research. a sectional overview of the respective market has also been analyzed so as to perceive the ideas generated from the overall considerations. Explanation of markets prevailed in Australia Generally, the market structure in any economy entails significant characteristics in the recent period of time. There are four types of markets like perfect competition market, monopolistic competition market, oligopoly market and monopoly market. There are also significant perception upon some other markets like duopoly, monopsony. Therefore, the significant description regarding the markets in Australia has been revealed so as to perceive the ideas regarding how the market has been operated determining the products and services (Nabin, et al., 2014). Monopoly market depicts that the aspects of the market competition where the only one firm operate through producing goods. In this respective market, there exists only one producer, which can produce goods, and it has not contained any substitute product that can generate any competitive structure. Theoretically, it has been sufficed that the monopoly market has formulated one single supplier in the market with numerous customer who can easily purchase the products. Only one supplier through entailing the supply of goods has controlled this market and apart from this, the supplier can also control the respective price of the products. It can be said that that oligopoly market has significantly determined the aspects through controlling the business operation through large suppliers that are small in numbers through dominating the market in which the firm sold its product. Generally, oligopoly can be differentiated with monopoly market through intervening the feasibility of large num ber of suppliers rather than the monopoly, which constitute only one firm (Julien Musy, 2015). This particular market has also constituted minimum rival firms operating in the market. This type of market always persist competition in accordance with the price and non-price aspects within the firms. This has been perceived because the firms produce homogeneous goods through which the product differentiation may occur in different situation. Another interventions assessed through oligopoly market is entailing the decisions independently through firms production. Thus, the assumptions are important to secure effective decision in accumulating profit by selling the products. The duopoly market has incessantly embedded the aspects that analyze the behaviour of oligopoly market. It has been assessed that there exists interdependence between respective firms (Hattori Tanaka, 2016). The assumptions considering the market size, which remain constant, derive loss of one firm that equals to the value of profit achieved by another firm. Thus, the firms have to forecast about enhancing the market share or to encapsulate a constant market share in the respective country. This has significantly determined the game theory in the duopoly market. Considering this feasibility, Australian economy has endeavoured with all these market interventions, which readily outflow the commodity production and sales to their potential customers through acquiring excess profits (Simshauser Whish-Wilson, 2017). Evaluation of the market through economic concepts In the respectivemicro economic market environment of Australia, there exists some interventions which has been aroused through the consequences, that encircles various functional strategies. If we consider the monopoly market competition, then an organization or a firm will face the aspects of normal profits with the potency to achieve super normal profits. Apart from this, the pricing strategy with allocative efficiency within the products of the firm has been intervened. Moreover, the significance regarding the barriers to entry has been considered. Nevertheless, the price discrimination in the monopoly market has been considered to be much more significant characteristics. Even though duopoly has no such determinants that can regulate the market structure, but oligopoly market has intervened the aspects of price wars among the firms (Hazledine, 2017). Moreover, the price leadership is considered to be embedded upon the oligopoly market in order to determine the profit achieved by the firms through selling the products. The kinked demand curve has also been ascertained through oligopoly market determinants. In the country Australia, busting monopolies is considered as one of the most crucial job of government. This has been regulated through the aspects of monopoly, that has to be charged. The government of Australia has prevented the monopoly and oligopoly formation by pertaining competition laws. However, it has been analysed that monopoly has existed its significance in the Australian commodity market resulting into only one product seller with an uncommon product (Tyers, 2015). Only one firm Telstra has achieved the monopoly in the telecommunication industry of Australia, which has owned the network of copper wire assisting in transmission of telephone calls and internet services. Generally, monopoly market is certainly different from duopoly and also oligopoly market. There exists the dominance on behalf of two firms in the market with differentiation i n the products or its respective range. Thus, the grocery prices among the supermarkets of Australia like Coles as well as Woolworth maintain a cosy duopoly structure in the market. Analysis through different charts and diagrams In this respective section, the analysis of the different market structure has been pertained. From the diagram, it can be stated that in the monopoly market, a firm can be price taker or a quantity maker. Therefore, if price of the products can be reduced, then the sales have been increased. Thus, by increasing unit sales, the average revenue or AR curve falls and the marginal revenue will be lower than average revenue. Thus the AR curve is always downwards sloping which the sales has been increased. In the oligopoly market, the significance of price cartel can be demonstrated with the help of the diagram highlighted aside. This has been pertained through the consequences where all the firms operating in the market agreed to perceive fixed price at which the products will be sold. Now whether the market is considering to sell the product at lower price for meeting the demand, the cartel will significantly impose high price through restriction all the supply of the products. Thus, the firm can easily increase the profitability if all the firms control the respective prices (Lin Matsumura, 2017). Bibliography Hattori, M., Tanaka, Y. (2016). License or entry with vertical differentiation in duopoly. Hazledine, T. (2017). Mixed pricing in monopoly and oligopoly: theory and implications for merger analysis.New ZealandEconomic Papers,51(2), 122-135. Julien, L. A., Musy, O. (2015). A Review of Heinrich von Stackelberg's Book:Market Structure and Equilibrium. Lin, M. H., Matsumura, T. (2017). Optimal Privatization Policy under Private Leadership in Mixed Oligopolies. Nabin, M. H., Nguyen, X., Sgro, P. M., Chao, C. C. (2014). Strategic quality competition, mixed oligopoly and privatization.International Review of Economics Finance,34, 142-150. Simshauser, P., Whish-Wilson, P. (2017). Price discrimination in Australia's retail electricity markets: An analysis of Victoria Southeast Queensland.Energy Economics,62, 92-103. Tyers, R. (2015). Service Oligopolies and Australia's Economy?Wide Performance.Australian Economic Review,48(4), 333-356.

Monday, December 2, 2019

9/11 Terrorist Attacks Essay Example

9/11 Terrorist Attacks Essay An Analysis of the 9/11 Terrorist Attack On September 11, 2001, 19 Al Qaeda terrorists hijacked four United States commercial airliners travelling from the east coast to California. The hijackers forcibly took control of four planes. Two planes were purposefully crashed into the World Trade Center (WTC) in New York City. The third aircraft was flown into the Pentagon building in Washington DC. The fourth plane landed in a Pennsylvania field. All of the people on board the aircrafts were killed. There were 2996 people killed including the hijackers and the airline passengers and the victims on the ground in New York and Washington DC. A total of 836 first responders also died as the result of their efforts to rescue people in the WTC before it collapsed (The National Commission on Terrorist Attacks, 2004). According to the US government, 9/11 was an act of war. The United States government, state and local agencies mobilized during the disaster. Victims in New York and Washington DC were taken to area hospitals for medical treatment. As the result of the terrorist attack, the government instituted a series of measures that changed the United States policy towards terrorism and homeland security. The aftermath of the World Trade Center and Pentagon attacks left the country in a state of shock. The report on 9/11 details the steps taken by the government during the attack on the WTC and the Pentagon. The attacks caused wide-spread confusion among air traffic controllers and news organizations. During 9/11, the government used radio and television to communicate with people and inform them of the situation. Grisly scenes of the wreckage were replayed in the media. Government and state agencies communicated with each other via radio and walkie talkie. We will write a custom essay sample on 9/11 Terrorist Attacks specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on 9/11 Terrorist Attacks specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on 9/11 Terrorist Attacks specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Cell phone and telephone services were impossible; because, the volume of calls disabled communications networks. Because of the possibility of more 9/11 style attacks, the government immediately invoked SCATANA, Security Control of Air Traffic and Navigation Aids. United States (US) airspace was closed to all aircraft except for military aircraft, and the US border was closed to international travel. Planes that were in flight were ordered to land immediately. International planes that were travelling to the United States were forced to land in Mexico or Canada. Because the 9/11 terrorists targeted the White House and the Pentagon, the federal government created a contingency plan for the continuity of government in cases of emergency. In addition, a plan for the evacuation of the top American political leaders was developed and implemented in case of future terrorist attacks (The National Commission on Terrorist Attacks, 2004). On September 11, 2011, the government declared a state of emergency. The United States military and the National Guard were mobilized. The states of CT, NJ, NY, and VA also mobilized resources. The government passed the USA Patriot Act which allowed law enforcement officials to invade the privacy of citizens suspected of terrorism. The National Security Agency also employed listening devices to eavesdrop on the telephone and email communications of people in the USA and other countries without a warrant. In addition, The Homeland Security Act was passed in 2002 to protect the United States from terrorism and natural disasters. Because of the Patriot Act, several of the masterminds of the 9/11 terrorist attacks were captured, like Khalid Sheikh Mohammed (The National Commission on Terrorist Attacks, 2004). After the first attack in New York, the New York Police Department (NYPD), Port Authority Police Department (PAPD), and Emergency Medical Service (EMS) were mobilized to care for the wounded, conduct search and rescue operations. In New York City, the subway was closed and main roadways were cleared for emergency use. In Washington DC, similar actions were taken to secure the city and the surrounding area. In New York, the Fire Department of New York (FDNY) also began search and rescue and firefighting efforts. After the 2nd plane crashed, 2000 NYPD officers rushed to the World Trade Center. In addition, there were numerous port authority officers coordinating efforts with the NYPD and FDNY. In New York City, the Office of Emergency Management (OEM) was located at the WTC. Difficulties occurred in New York because the OEM office was destroyed after the second airplane crash and had to relocate. In addition, many people were trapped in the WTC because rooftop rescues were not possible, and airspace was closed. The authorities and people trapped in the WTC were unprepared for the mass evacuation which occurred. Inadequate communications also created problems in the aftermath of 9/11. Government and local agencies communicated with one another by radio or walkie talkie, as cell phone communications were impossible. Problems occurred with the state and local response in New York because the number of 911 calls disabled the emergency channels. In addition, messages to first responders were given inaccurately which caused problems with search and rescue operations. First responders in New York failed to get relevant radio messages which resulted in the deaths of firefighters and civilians (The National Commission on Terrorist Attacks, 2004). A triage station was established, at the WTC, to treat victims with injuries and transport them to area hospitals. Problems occurred because of lack of communication among the EMS staff and area hospitals. In addition, there was no helicopter transport for the most critically injured patients. Some reports suggested that many of the physicians who became first responders were not adequately trained in emergency medical procedures (Simon Teperman, 2001). In Washington DC, local, regional, state, federal, police, fire, and military agencies responded to the Pentagon attack. In addition, FEMA, the Bureau of Alcohol Tobacco and Firearms, Red Cross, Department of Defense, Ronald Reagan National Airport Fire Department, and the VA Department of Emergency Management assisted. Prior to the Pentagon attack, the government received advanced warning of the hijacking and began evacuating all personnel. Because of the swift evacuation of the Pentagon and skillful mobilization of the state government and local agencies, there were fewer casualties than in New York. Communication in Washington DC was conducted by pagers and walkie talkies, as radio and cell phones did not operate. In the aftermath of the attack, Operation Solace and the Dilorenzo Clinic were established to provide families and victims of the attack with mental health care and therapy. Pentagon workers were desensitized and returned to work as quickly as possible. Operation Solace and the Dilorenzo Clinic were highly successful. People were able to return to work within several days of the attack, and there were no long-term mental health consequences. The Pentagon Family Assistance Center was created to assist people who lost a family member and were homeless because of the attack. Homeless families were housed in the Sheraton hotel for a month and provided with housing assistance. The government also assisted families with financial assistance and memorial services (Ritchie, n. d. ). The 9/11 terrorist attacks were the first large scale attacks in America since Pearl Harbor. The government should be given credit for mobilizing quickly, and speedily establishing services to care for the wounded. Because the government took immediate action, closed airspace and warned the pentagon of the impending attack, lives were saved. Problems with the 9/11 response occurred in the areas of communication and lack of training in some first responders. In future disasters, communication should be conducted by walkie talkie or text message instead of radio and cell phone. Studies have also suggested that first responders need better training to handle large scale emergency events. In the 9/11 disaster, over 3000 people lost their lives. However, because of the courageous actions of the American people and government and local agencies, many people survived the tragedy. The lesson of 9/11 continues to affect American policy on terrorism and disaster planning, at the state and federal level (The National Commission on Terrorist Attacks, 2004). References (National Commision On Terrorist Attacks 2004 9/11 commission report)The National Commission on Terrorist Attacks (2004). The 9/11 commission report (). Retrieved May 10, 2011, from The National Commission on Terrorist Attacks website: http://www. 9-11commission. gov/report/911Report. pdf (Ritchie E 2011510 9/11 response to the pentagon)Ritchie, E. (n. d. ). The 9/11 response to the pentagon. Retrieved May 10, 2011, from http://www. newpaltz. edu/idmh/keynote3ritchie. pdf (Simon R Teperman S 2001 World Trade Center attack: Lessons for disaster management)Simon, R. , Teperman, S. (2001). The World Trade Center attack: Lessons for disaster management. Critical Care, 5(6), 318-320. (United States Government 20010911 George W. Bush 9/11 address to the nation)United States Government. (2001, September 11). George W. Bush 9/11 address to the nation. Retrieved May 10, 2011, from http://www. americanrhetoric. com/speeches/gwbush911addresstothenation. htm

Wednesday, November 27, 2019

Colonization Essays - Thirteen Colonies, Free Essays, Term Papers

Colonization Essays - Thirteen Colonies, Free Essays, Term Papers Colonization Essay #1 Although New England and the Chesapeake regions were settled largely by people of English origin, by 1700 the regions had evolved into two distinct societies. I have described both societies in an attempt to demonstrate their developments. Virginia Colony In 1607 a group of merchants established England?s first permanent colony in North America at Jamestown, Virginia. They operated as a joint-stock company that allowed them to sell shares of stock in their company and use the pooled investment capital to outfit and supply overseas expeditions. This joint stock company operated under a charter from James I with a concern for bringing Christian religion to the native people. However, most of the settlers probably agreed with Captain John Smith that the real aim was profit rather than religion. Profits were elusive in the early years; expectations of gold and other minerals, trade with Indians for beaver and deer skins were not to be had by the colonists. Many Virginia colonists died of dysentery, malaria and malnutrition. The Virginia Company sent a diverse collection of people to Jamestown; there were artists and glassmakers, as well as unskilled servants. Both types of people adapted poorly to the wilderness conditions. Relations between the colonists and the Indians were bitter from the beginning. John Smith dealt with the Indians by shows of force and the Indians withdrew trade with the English. Many settlers died of starvation in the first years. The discovery that tobacco would grow in the Chesapeake region was a salvation for Virginia. The planters shipped the first crop in 1617 and thereafter tobacco cultivation spread rapidly. By 1624, Virginia was exporting 200,000 pounds of tobacco; by 1638 the crop exceeded 3 million pounds. The cultivation of tobacco caused Virginia?s planters to find a reliable supply of cheap labor. To fill this need, planters recruited immigrants from various countries. These immigrants were called indentured servants. They willingly sold a portion of their working lives in exchange for free passage across the Atlantic ocean. Many of the indentured servants were unemployed and held the lower class on the social ladder from their places of origin. Life for indentured servants was often a nightmare. If diseases did not kill them, many succumbed to the brutal work routine that harsh masters imposed upon them. When the remaining servants neared the end of their contract, masters would find ways to add time to the contracts. The profitable tobacco crops created an intense demand for land. As more and more colonists settled along the rivers that flowed in Chesapeake Bay, the local Indian tribes retaliated. The murder of an Indian captain triggered a fierce Indian assault that dealt a staggering blow to Virginia. This attack led to the bankruptcy of the Virginia Company. The surviving planters felt they had justified reasons for the destruction of the Indians. As more settlers arrived, more pressure was placed on the Indians for land. Wars over land was provoked in 1644 and again in 1675. In each of these conflicts, the colonizers were victorious. The native population of Virginia was reduced to less than 1,000 by 1680. Immigrants to the Chesapeake Bay region found existence difficult. Many immigrants arrived as indentured servants and could not marry until their time was paid. Once marriage was made, diseases claimed many within about seven years. Few children growing up could expect to have both parents alive. Widows and widowers often remarried soon after the death of their spouse, creating a complex web of family life. Because of mortality, the Chesapeake settlers remained, for most of the seventeenth-century, a land of immigrants rather than a land of settled families. Social institutions such as churches and schools took root very slowly. The Chesapeake region architecture showed the fragility of life in the tobacco growing environment. Settlers at first built primitive huts and shanties. After establishing crops, planters improved their habitats but still built ramshackle one-room dwellings. Even as Virginia and Maryland matured, cheaply built and cramped houses remained the norm. Life was too uncertain and the tobacco economy was too volatile. Massachusetts Bay Colony While some English settlers scrambled for wealth on the Chesapeake, others were seized by the spirit of religion. These individuals were known as Puritans. They aimed their

Saturday, November 23, 2019

The Ultimate AP Human Geography Study Guide

The Ultimate AP Human Geography Study Guide SAT / ACT Prep Online Guides and Tips In your AP Human Geography class, you'll learn about the dynamics of societies around the world in economic, social, political, and environmental contexts. This course focuses a lot on ideas and models, along with terminology that defines the ways in which we've chosen to inhabit and change our surroundings. The following AP Human Geography study guide is designed to guide you through all the concepts covered in the course, with an emphasis on cumulative preparation for the AP exam. What Will You Get From This AP Human Geography Study Guide? This guide will help you review for assessments in your AP Human Geography class by providing links to practice resources and tips on effective study strategies. I'll also give advice that's specific to preparing for the final AP exam. In the first section, I’ll detail a step-by-step process you can follow to create and execute a customized study plan for the test.This process includes taking a diagnostic test, evaluating your weaknesses, studying the content areas where you struggled the most, and taking additional practice tests to check your progress. To follow up the study plan, I’ll list a few key study tips to remember as you revisit the course content and take practice exams.I’ll also give you notes for each topic area that you can use to study for in-class tests and review for the AP exam. Having all this information in one place will hopefully make studying for this class much less stressful! Creating a Study Plan for AP Human Geography In this section, I'll go through the steps of a basic study plan for the AP exam. Most of the principles will also apply to your studying for tests throughout the class, but full practice tests are only important when directly preparing for the final exam. You can use shorter topic-specific quizzes to diagnose your weaknesses in different units of the course earlier in the school year. Step 1: Take and Score a Full Practice Test The first step is to take a full practice test so you can get a better idea of your current score level.When you take the test, time it to the specifications of the real AP exam so that you’ll be able to tell if you have any issues with time management. Keep in mind that on the AP test, you only have an hour to answer 75 multiple-choice questions.To be on the safe side, you should try to get your time down to around 30 seconds per question.The only way to get used to this pace is to take practice tests under the same conditions. You might consider usingthis full practice test from Barron’s, which offers both timed and untimed versions with automatic scoring for multiple choice.As you take your practice test, circle or make note of any questions where you feel anything less than totally confident in your answer. Even if you end up getting them right, you should reexamine that content later in your review to increase your comfort level with the material. When you're done, score your test so you can see where you fall in the AP range. You can use this online calculatorfor a decent score estimation based on how many raw points you earned.Then, set a goal for improvement, and decide how many hours you’ll need to put into your prep.If you have a couple of months, you should be able to put in 20+ hours of study time.This will be an appropriate amount studying if you’re hoping to improve by more than one AP point.If you only need to improve by one point or are just looking to raise your score within the same range, you might be able to wait until the month before the test to start the rest of the process. You shouldn’t need to study for more than 10-20 hours. Step 2: Go Through Your Mistakes If you decide to begin the rest of this process now, go through your mistakes on the practice test, and categorize them.This is how you’ll decide which content and skill areas to focus on in your review.There’s no point in studying concepts and terms that you’ve already mastered.If you want to see real improvements, this is the most important stage of the study process.You can’t fix your mistakes unless you know what they are first! Step 3: Study Appropriate Content After you finish analyzing your mistakes, start looking at notes that correspond to the areas where you had the most trouble on the test.Make sure you’re fully absorbing the information as you read.In this case, flashcards might be useful because there are so many terms to remember for AP Human Geography.If you found the free response questions especially challenging, practice a few more of those before you move on to the next step.You can also use some of the sites I’ll link to later in this article to review specific topics with short multiple-choice quizzes. Step 4: Take a Second Full Practice Test When you feel that you’ve fully addressed all of your mistakes on the first test, you can take a second test to see if your scores have improved. Compare your new score to the goal you set in the first step, and decide whether you want to go through the study process again or are happy with your current score. If you're satisfied, you can take a break and just do a bit of light review up until the test. If you find that you haven’t improved, you should reevaluate how you conducted this process and make some changes to your strategy in the next round.Were you in an environment that was too distracting? Did you skim over our notes without really absorbing them? These are the kinds of things that can cause your progress to stall. For planning purposes, here’s the estimated time required for each of the steps in the process for this exam: Step 1: 2.5 hours Step 2: 1 hour Step 3: 2 hours Step 4: 2.5 hours It should take approximately eight hours total for a complete cycle. Of course, you can always extend the time you spend reviewing content if you’re rusty on a bunch of different topics or just want to be extra thorough. Clean off that rust with an acidic solution of facts. AP Human Geography Study Tips These are a few of the most valuable strategies to keep in mind as you go through your study plan to prepare for the AP exam.They should also be helpful in your preparation for smaller assessments throughout the school year in your class. Tip #1: Know Your Regions To get full credit for most free response questions, you have to provide specific examples to support your answers.That means being able to identify the characteristics of world regions regarding their various cultures, demographics, and physical environments.You’ll see a map of the major regions covered by AP Human Geography in the content section of this guide along with a list of seven topics.You should be able to locate each region and identify the relationship it has with each of the seven topic areas. Tip #2: Terms, Terms, Terms Although knowing your way around a map is important, much of AP Human Geography is about your knowledge of terminology.I’d highly recommend making flashcards or using online flashcards in your studying (I'll put a link to some of these in the upcoming content section!).Many multiple-choice questions are essentially just asking for definitions, and some free response questions begin by asking you to define a term that the rest of the question addresses in more depth. Even if it's not this direct, knowing your way around the language of the field of geography will make it much easier to understand questions without relying on shaky assumptions or inferences. Tip #3: Pay Attention to Important Models and Theories Human Geography is mostly considered a humanities subject, but there are some scientific elements to it. These show up in the form of demographic models that are introduced throughout the course. It's important to know how to read models and understand what they represent. You should also know how they connect to major theories in human geography and what those theories say about the development of society. I'll give you a link to a comprehensive list of models and theories at the end of the next section. Skylar, how many times do I have to explain homophones to you? YOU'RE. NOT. HELPING. AP Human GeographyTopics and Notes AP Human Geography covers seven major topic areas. In this section,I’ll list each of them followed by notes that cover relevant subtopics. You can use these notes in the content review stage of your final AP study process and during the year as you review for in-class tests.You might find these notes (from CourseNotes) difficult to get through because they’re written in such a way that it’s hard to pick out key concepts. There are a lot of long paragraphs with no bolding of important terms.If you find these notes borderline incomprehensible, you should try getting a review book that puts all the content in clearer terms. I thinkCracking the AP Human Geography Exam is a good starting point. As a precursor to the notes, here's a map of all the world regions that are discussed throughout the course. You'll need to consider how these topics apply differently to varying locations around the globe: Topic #1: Geography: Its Nature and Perspectives Geography and Human Geography Topic #2: Population The Earth As Humanity’s Home Fundamentals of Population: Location, Distribution, and Density Processes and Cycles of Population Change Where and Why People Move Topic #3: Cultural Patterns and Processes Cultures, Environments, and Regions A Geography of Languages Diffusion of Languages Modern Language Mosaics Origins and Distribution of Religions Religion: Location, Diffusion, and Cultural Landscape Religion, Culture, and Conflict Topic #4: Political Organization of Space Political Culture and the Evolving State State Organization and National Power Multinationalism on the Map The Changing Global Political Landscape Topic #5: Agricultural and Rural Land Use The Livelihoods of Rural Peoples Rural Settlement Forms Commercial Agriculture Global Disparities in Nutrition and Health Topic #6: Industrialization and Economic Development Industrial Activity and Geographic Location Resources and Regions: The Global Distribution of Industry Concepts of Development From Deindustrialization to Globalization Topic #7: Cities and Urban Land Use Civilization and Urbanization Urbanization and Location Urban Pattern and Structure Changing Civic Experiences Since terms are so important on the exam, I’d also recommend checking out this full list of all vocab covered by the course (provided by Quizlet) so that you can review all the vocabulary you need to know in one place. You should also check out this overview of all the different theories and models covered throughout the course. When lots of humans get together to form an urban community, they can't help but color on everything. What an adorable species. Resources for Reviewing Content In this section, I’ll go over a few different resources that you can use to test your knowledge of the content and take practice tests and quizzes. Review Books Review books are helpful resources that provide access to additional practice questions and tests.They often include diagnostic tests that will help you diagnose your weak areas accurately and with less legwork on your part.Especially in a subject like Human Geography that can be a little elusive, review books will help you figure out exactly what you need to study and how you should study it.Read my guide to the best review books for this course to get a better idea of which ones you should consider getting.Some solid review books include: Cracking the AP Human Geography Exam (Princeton Review) Barron’s AP Human Geography AP Human Geography Crash Course (REA) Official Free Response Questions (2001-2015) This includes all the free response questions that have been asked on the AP Human Geography exam since 2001.Be aware that the scoring guidelines are only included for 2004 onwards, so the first three sets of questions for 2001-2003 don’t have official answers that you can consult. Sporcle Geography Quizzes As I mentioned in the tips section, it's important to know your world regions for AP Human Geography so you can back up your answers with specific examples.You don’t need to be a complete expert on where every country is located, but these quizzes are both fun AND educational, so I’d recommend checking them out (warning: super addictive). Countries of the World Countries of Asia Countries of Europe Countries of Africa Countries of South America Countries of North America Varsity Tutors Diagnostic Tests This site offers four diagnostic tests for AP Human Geography with 75 questions each (multiple-choice only).The tests have automatic scoring, and each is given a preliminary difficulty level rating.There are also tons of mini-quizzes listed by concept if you want to practice topic-specific questions as well as flashcards that will help you learn all the course terminology. Learnerator Practice Quizzes There are quizzes on every topic with questions categorized by difficulty level. Quizzes range in length from 10-40 questions, and the site keeps a running tally of how many questions you’ve answered correctly in each category (easy, medium, and hard). Unfortunately, you do need to pay for access to the quiz questions in the "hard" category.It’s $25 to get full access to all the AP Human Geography questions, including a bunch of free response practice. Chapter Quizzes for Human Geography: Landscapes of Human Activities (11th Edition) If you select a chapter of this book on the left-hand navigation bar, you can scroll down and click on a link for a multiple choice quiz.These quizzes are helpful review materials even if your class isn’t using this particular textbook. Now, sit back and enjoy the fruits of your labor in the form of an A and/or 5. Conclusion This AP Human Geography study guide has covered a review plan for the AP test, tips for success in studying throughout the year, and a list of all the topics included in the AP Human Geography curriculum. Let's recap!The steps in a successful study plan should look something like this: Step 1: Take and Score a Practice Test Step 2: Go Through Your Mistakes Step 3: Study Appropriate Content Step 4: Take a Second Practice Test Again, you can go through this process multiple times if you don't get the results you want in the first round. Just pay close attention to whether or not you're improving. If not, make changes to amp up the effectiveness of your content review. Some study tips you should keep in mind as you study for both the AP test and in-class assessments include: Tip #1: Know Your World Regions Tip #2: Terms Are Important Tip #3: Pay Attention to Major Geographic Models and Theories After you're clear on the fundamentals of how to study, you can use the notes and practice resources in the second half of the article to prepare for unit quizzes, midterms, and the final AP test. What's Next? Are you thinking about self-studying this class or other AP classes? Find out more about whether AP self-study is right for your situation and which classes are the most manageable options. If you're still planning out your schedule for the future, check out our article on which other history classes you should takeafter AP Human Geography. You might also be interested in these articles that discussAP credit policies at colleges and which classes you should takethroughout the rest of your time in high school based on your college goals. Want to improve your SAT score by 160 points or your ACT score by 4 points?We've written a guide for each test about the top 5 strategies you must be using to have a shot at improving your score. Download it for free now:

Thursday, November 21, 2019

111History of Psychology... 1st one Essay Example | Topics and Well Written Essays - 1000 words

111History of Psychology... 1st one - Essay Example Therefore, the strict position of empiricism states that we have no instincts and rational thinking does not, alone, allow us to reach any conclusion unless we have suitable experience to profit from. This experience can be either in one particular instance or through many different instances that have all been combined together to give that person suitable knowledge. Even small common facts such as the color of an object or the sequence of numbers are attained with experience and only with the first hand experience of these facts can these facts be justified by the individual. Notable history of empiricism includes a Renaissance philosopher Francis Bacon who emphasized that gaining knowledge of the natural world was easier and more efficient through observation than through deductive reasoning [1]. While he did not oppose the thought of prior or instinctive knowledge, he firmly believed that any knowledge that was not experienced was far less useful or important than that which was gained through experience. Experienced knowledge was so important, in fact, that without it the human species would not be able to evolve or advance. This belief helped pave the way for William Ockham, a Franciscan philosopher, to note that all knowledge of the natural world is experienced through the senses [4]. He implied that any rationalization of abstract knowledge was merely hypothetical thinking. A thought that later lead to the belief that causation is merely an observation of regularity instead of an actual conclusive connection [4]. This line of thought was taken even further by Thomas Hobbes who believed that, while all genuine knowledge was held through prior knowledge, it required deduction from definitions of experience in order to derive any conclusion [1, 4]. Perhaps the most influential philosopher on empiricism was John Locke who believed that

Wednesday, November 20, 2019

Assimilation and Multicultural in bilingual education within the Research Paper

Assimilation and Multicultural in bilingual education within the sociopolitical context - Research Paper Example The world is fast becoming a global melting point of people from different cultural, ethical, religious and social backgrounds. Cities around the world are becoming more and more cosmopolitan as the effect of globalization, industrialization, trade; commerce and immigration are being realized. The unprecedented increase in diversity especially in the first world countries has called for tolerance and coexistence. Indeed there has been a raging debate with two contrary opinions on dealing with this issue of diversity. Some people see the assimilation of smaller ethnic groups as a way of creating uniformity and cohesiveness. This is especially an issue in the USA where diversity is perhaps the most widespread. Proponents backing this ideology of assimilation are of the view that smaller ethnic minorities should be encouraged to adopt the dominant culture, in this the White culture, for the sake of national unity and cohesiveness. However opponents of the idea of assimilation foster ano ther ideology. The idea of multiculturalism is widely supported by almost all ethnic groups that argue that assimilation will put their different cultures at risk of erosion that may eventually lead to extinction. Some provisions have been made in the education system to embrace this diversity and possibly preserve the different cultures of all these communities. Schools therefore have become fundamental in trying to foster tolerance, understanding and coexistence in the society. Assimilation is commonly defined as the ideological stand that members of a different ethnic community should give up their heritage culture and adopt a more â€Å"American† way of life.... Indeed this view widely held especially amongst the White working class families who view other communities as ‘outsiders’. Recently in Europe, leaders have taken stands in support of assimilation as the best way to realize unity. German Chancellor Angel Merkel was quoted in 2010 as saying â€Å"This multicultural approach has failed, utterly failed.†British Prime Minister David Cameron also lent his support to the assimilation agenda by saying that multiculturalism should be faulted, as it is responsible for the ‘weakening of national identity’. Perhaps this issue is not as divisive and controversial in Europe as an American. The diversity of American society has elicited very many different opinions on the cultural issue with both intra and inter-groups opinions also tending to differ. Multiculturalism refers to an ideology held by some people that these small ethnic minority groups should not only be allowed to maintain their culture but also to pr omote it in the spirit of coexistence and tolerance. Multiculturalism challenges and rejects racism and other forms of discrimination in schools and society, and accepts and affirms pluralism (Micro, 1992). Supporters are adamant with the reasoning that multiculturalism promotes multicultural tolerance and conserve each group’s contribution (Glazer, Moyniham 1970 Greely 1974, Novak 1972). Those who oppose multiculturalism point to the potential that this could have on negatively diversifying the society and create language barriers. Many pundits and interested parties have moved more towards the revival of multiculturalism as they see it as not only a solution for creating

Sunday, November 17, 2019

Apple Executive Summary Essay Example for Free

Apple Executive Summary Essay The iShare is an innovative product designed to offer more convenience and speed in file sharing. iShare aims to help eliminate the traditional inconveniences and complicated requirements involved when transferring files between any two Apple i-devices, to give users the joy of easy sharing, and to deliver sustainable profit to its shareholders. This business plan concerns the introduction of iShare to the Thai market. MARKET ANALYSIS We aim to be the expert in file-sharing gadgets between any electronic devices. We decided to first begin by developing a device called the iShare, which enables music sharing between the Apple iPods/iPhones before we go further and make similar products for other brands like Samsung and HTC in the future. The target market for iShare is mainly the Thai middle-to-upper-class, younger generation who owns an iPod/iPhone and have solid income to spend on this innovative gadget. Our market size is carefully calculated to be approximately 200,000,000 THB for the iShare alone and up to 1,000,000,000 THB in total. Our direct competitor is miShare LLC, which offers a similar product to customers in the US and Europe. Indirect competitors include other computer programs that enable easy file transfer between e-devices as well. PRODUCT AND TECHNOLOGY The iShare is a small device that connects 2 iPods or iPhones together, and let users easily transfer files from one device to another without any computer required. We aim to provide our customers the never-before convenience, speed, and the fun of directly transferring files between their device and their friends’. The iShare will also overcome the technical problems and satisfy the customer needs that has not been met previously by our main competitor, miShare LLC. We will develop the software ourselves and outsource the production to China. After we succeed with the iShare, similar products capable with HTC Android and Samsung Galaxy will be introduced to the market. MARKETING AND SALES STRATEGY The iShare will be launched in the middle of the year 2012. They will be sold directly to first tier distributors who will then pass them on to other retailers. The iShare can be purchased from any iStudio and authorized retail stores. Customers can also find an online user manual, a demonstration video, and many more useful information on the iShare website. The iShare will be advertised through various distribution channels such as social networking websites, printed advertising, and viral marketing. MANAGEMENT TEAM Our team is composed of many talented members with different expertise and great connections. We have a technology expert with a background in consumer electronics, a talented software programmer and developer, an experienced and amazingly creative designer who specializes in hi-tech gadget designs, and a very devoting marketing manager with 5 years of experience in marketing consumer electronics. In addition, we also have a close relationship with a huge manufacturing company in China, which will be our supplier and manufacturer for the iShare. The company has confidently claimed that it is capable of producing our product at our desired cost, given our carefully developed software program and product specifications. FINANCIAL HIGHLIGHTS Market and Competition Analysis Market Opportunity There are many ideas and theories concerning the relationship between the choice of media and personality types nowadays. One of the most popular and widely accepted ideas is the one stating that a person’s music taste reveals personality type: classical music fans are most likely to be shy, while British-pop fans are mostly young, indie hipsters. As we all know, everybody in this world is unique, or at least they want to be perceived that way: as being unique, different, and have their own tastes and preferences for basically everything. Most people are likely to be confident in their own tastes. People with the same taste in music usually gets along well, providing that they believe they have some common values, backgrounds, and personalities that enable them to understand each other better. Music has always been one of the most popular communication tools that bring people closer together. Many people love to share with their friends their favorite album, current favorite songs, or the artists they admire. Nowadays in the world that has become much more digitalized, almost every music and songs offered are in the digital format, to be played and listened to on a digital music player. Sales of music CDs and cassette tapes has been constantly decreasing, while on the other hand the sales of online music, in the iTunes store, for example, has rocketed worldwide. Digital music players have become so popular, and the use of them is widely adopted globally. Cassette tapes and CD players, on the other hand, are going into extinction. One of the general customer needs that have not been fully met in the digital market nowadays is the ability to share their digital files with friends and families easily and without a computer. Whether it is a HTC android, a Samsung Galaxy Player, or an Apple iPod touch, it requires at least a cable and a computer to support file transfer and sh aring. For some particular brands like Apple, transferring files between two iPods or iPhones is still not easy, even with a computer involved. Unlike many other music player producers, the complicated Apple software does not allow users to simply copy and paste files from the portable device to the computer, but requires that users have the corresponding program, the iTunes, that supports the uploading and syncing of files from a computer to their device, and vice versa. Our group sees this unsatisfied customer need as a great market opportunity. We are determined to become the expert in file sharing between electronic devices, especially focusing on music sharing. Eventually we will become the business that provides the market with a device that will make file sharing much more easier for users of almost every digital music player brand, but we have decided to first begin with Apple. From various researches, surveys, and discussions with digital experts, we came to the conclusion that easy music sharing between the Apple i-devices is the highest in demand, due to the brand’s complicated traditional requirements involved in file transferring, and to the massive number of existing Apple users in the market. We have decided to develop first a device that enables music sharing between the Apple iPod/iPhone before we go further and make similar products for other brands like Samsung and HTC in the future. These devices to follow the iShare will work with Samsung Galaxy and HTC Androids, and can be expected to be developed, produced, and offered to the market relatively quickly. This expectation is due to the existing capability, experiences gained, and the competences achieved during the development, sales, and marketing of our first product, the iShare. Our group’s product, the iShare, is a small device that connects 2 Apple iPods or iPhones together, and let users easily transfer files from one device to another. Ordinarily, people would need a computer to transfer files, but the iShare helps eliminate this inconvenient requirement. We aim to provide our customers the never-before convenience, speed, and the fun of directly transferring files between their device and their friends’. Market Size Generally, our target market is the Thai people who own at least one digital music player and have the passion and anxiety about innovative gadgets and file sharing made-easy on their electronic devices. They are likely to be middle-to-upper-class, young to middle aged people with solid income to spend on gadgets and electronic devices’ accessories. They are likely to be interested in new technology and keep themselves updated with new innovation and hi-tech products. We also target on people whose career revolves around the digital music industry, in which it will be very helpful for them to have a device that makes file sharing and transferring convenient and fast. The overall market size is carefully estimated to be approximately 3,000,000 people. However, due to the fact that this business plan will mainly focus only on the iShare, a sharing device specifically designed for the Apple iPod and iPhone, the potential number of market size is reduced to 1,000,000 people as of now. This number is believed to be constantly rising due to the increasing popularity of Apple products. The market size for iShare can be predicted by the number of existing iPod/iPhone users in Thailand. From our careful calculation, together with some reliable sources, out of all the population in Thailand, the number of people who owns at least 1 iPod or iPhone is around 1 million people. Assuming realistically that we can sell the iShare to about 10% of this total, our market size can be estimated at roughly 100,000 people in total. Given that our wholesale price for a single iShare is 2,000 THB, our market size for the iShare alone can be estimated to be around 200,000,000 THB. However, this number does not include other potential markets, the markets for other brands’ users that we will enter in the future. If we take those markets into account, the total market size for our business can be as high as 1,000,000,000 THB. Our Section of the Market Figure 1 : Age groups of Apple i-devices users in Thailand In Thailand, the major group of Apple customers, which accounts for 32% of all users, is between the ages of 22-35. This group also made up a majority of the early adopters of Apple products. Other groups of users, which also contribute a lot to the total number of users, are users with the age of 18-21 and 36-50, which together accounts for 52% of all users. ( See illustration in Figure 1 ) Figure 2 : Percentage share of Apple users among e-mobile users per country According to Figure 2, in Thailand, the percentage share of Apple users among all other e-mobile users in Thailand is 79.6% of the whole market. This makes the market of complementary products to be used with the electronic devices very large; therefore, we can attract a lot of potential customers by introducing iShare, the new, innovative complementary product to the Apple iPhone/iPod. We conducted a survey at MBK mall, one of the most popular malls in Bangkok for mobiles and electronic devices shopping. We gave out a questionnaire about the iShare to 100 people who were wandering around the mobile phone section. More than 90% said that they are very interested in this product and more than 70% of the interested people have responded they are willing to pay up to 3000 THB for the iShare, while another 30% thinks that it would be too expensive and they would not buy it at this price. Market Segmentation Our market for iPod/iPhone users can be segmented further using age groups. By looking at different age groups of users, we can determine the segment that is most likely to be our potential customers and thus market our product and create strategies accordingly. Different segments for our market are as follow: 1. Apple devices users with the age of lower than 18 ( Students ) 2. Apple devices users between 18-21 years old ( College students ) 3. Apple devices users between 22-35 year old ( Junior working class ) 4. Apple devices users between 36-50 years old ( Senior working class ) 5. Apple devices users with the age of more than 50 years old ( Senior citizens ) ( Refer to Figure 1 for illustration ) We are targeting a specific market and plan on overtaking it with quality – what we try to achieve is to be a selection of choice that will offer a never-before convenient and fun product that enables people to share more with each other. We aimed at existing users of iPod/iPhone who desire the ability to save the time and effort required to transfer files between their devices. Basically our market is largely based on a millennium age people that give a huge importance in the ease of use and the amount of time that can be saved by using our product. After looking at some statistics and researches previously done by many interested parties, we came to the conclusion that the most interesting segments for our product are the iPhone/iPod owners with the age of between 18-35, or segment 2 and 3 from our classification. These two segments make up more than 60% of all Apple i-devices users in Thailand. Market Growth Since the market for electronic devices, including smart phones, MP3 players and tablet PC, is growing worldwide, the complementary products market is most likely to be growing along with them in the same direction. We first focused on Apple products because of its undeniable continuous rise in popularity and demand. Not only Apple, there are a lot of other companies such as Samsung, HTC and Sony who are also in the electronic device market, and in the near future there is likely to be more and more brands that will enter into this market. Although this will also attract many other competitors, we can gain the brand loyalty easier as a first mover of a product of this kind in Thailand. Therefore, after we succeed with the iShare for Apple products, we will modify the iShare and make it compatible for use with other brand users in order to generate more revenues for our business from the new market segment. We will develop a similar device to the iShare that will work with a Samsung Galaxy Tab, a HTC android, and possibly other competing brands in the future. We see a lot of opportunity for growth in this industry, and we will continue to maintain our image as being the expert in music sharing with our restless innovation. Market Competition Looking only at the iShare, our direct competitor would be the one company that actually gave us the idea of this device at the very beginning of our project: miShare LLC. MiShare LLC is a software and hardware developer company in New York City, specializing in publishing tools for iPods and other digital media and offering publishing systems for schools, museums, music and movie companies, and marketers who want to distribute audio and video directly to iPods and other digital-media players for immediate playback. MiShare LLC is the inventor and legal producer and distributor of the miShare, a small device that enables users to transfer music, pictures, or videos from one iPod to another without the use of a computer. In the past, there had been similar devices that claimed to have the same ability, but most of them failed and none has ever been as successful as miShare. Nathaniel Wice, the CEO and cofounder of miShare LLC, is the technology entrepreneur and marketer with a journalism background. He adds startup experience and contacts to the miShare and looks forward for collaboration with other startups on business and funding opportunities. His other co-partner name is Josh Hochman, a busy writing software programmer. Hochman is the top programmer with the background in consumer electronics. The company’s main players in the office consist of Nathaniel Wice, Josh Hochman, and a young woman doing shipping-and-receiving department working on the hand-stamping envelopes. Our group’s idea of the iShare originates from the fact that such successful and widely accepted device like a miShare is not yet made available to the Thai and other Asian market. MiShare targets only the iPod users in the United States and Europe. Currently they do not have the policy to ship their product to any Asian country. Thus, we take this opportunity to follow their footsteps and bring to the Thai market this interesting product. We aim to outperform miShare by overcoming their product’s major weakness, which is the current version of miShares software that does not work with the distinctive disk format of iPhone and iPod touch. Their products only works with a limited range of iPod models such as the iPod shuffle, and iPod touch are still unsupported by miShare. This is the technical problem that we aim to overcome in order to provide an even more superior file-sharing device that also works with iPod and iPhone, the iShare, in order to satisfy our customers need and be successful in our business. Other indirect competitors include other iPod/iPhone applications that also enable users to transfer files from one Apple device to another easier than traditionally required. These include applications like Bluetooth Share and Files Lite. Bluetooth share is an application that allows users to share files, photos and contacts. It was first launched to App store in early 2010. However, its major weakness is the fact that its sharing process takes much longer time than the iShare. A regular 3 minutes song would take 5 minutes to transfer from one device to the other. Another indirect competitor, Files Lite, is an application that gives users the ability to synchronize documents directly to their devices. They can store and share files via email and PC easily. The files can be opened directly on the devices. Files Lite supports Microsoft documents, PDF, HTML, images, videos, audios, Apple iWork and text documents. With the most recent update in January 2012, this application allows users to transfer their files easier and quicker. However, a Wi-fi connection is required to connect Files Lite to transfer files and documents. The transfer time is slightly faster than Bluetooth share, but still is much slower compared to iShare. Despite the fact that these applications have also made it easier for its users to transfer music and files between 2 iPods or iPhones, there are still some disadvantages that still make the iShare a superior choice over them. The fact that these applications are much slower and that some require internet connection in order to transfer files are some of those disadvantages. Looking at the situation from every angle, the iShare still holds the superior advantage of being the fastest, most convenient choice ever for file sharing. Product and Technology Product Technologies From our design development and our effective and innovative production process, the iShare will provide the convenience and speed in file transferring between Apple i-Devices like never before. Our RD Team has developed this new gadget to make file sharing between iPods and iPhones much easier. No computer or cable is needed, and its very easy to use. Users can use the iShare to transfer just about anything they have on their iPods or iPhones: music, photos, videos, and playlists. A typical song will take ten seconds to transfer once the devices are attached, depending on the file sizes. A short home video in iPod format could require half a minute.

Friday, November 15, 2019

Hurricane Katrina Essay -- Natural Disasters Papers

Hurricane Katrina Hurricane Katrina has been one the most devastating natural disasters to hit USA ever costing a total of 125 billion dollars, and leaving almost 1000 dead. We need to look at ways of preventing such a disaster. As this is the only problem, we can predict and perceive how dangerous a hurricane can be but preventing one is a different matter entirely. The U.S. National Hurricane Centre (NHC) reported on August 23 that Tropical Depression Twelve had formed over the south-eastern Bahamas this was soon to be named hurricane Katrina, it was upgraded to a hurricane on the 25th of august, it hit land the same day lousing its strength while travailing over Florida. Although on the 26th of August it grew it to a category 2 hurricane. It became clear the storm was headed for Mississippi and Louisiana. The next day the hurricane grew to category 3 and again the day after, the storm grew in intensity and on August the 28th it became category 5 with winds up 214mph. Katrina made...

Tuesday, November 12, 2019

Network VPN and Web Security Cryptography Essay

Securing Internet commercial transactions and sensitive banking data is increasingly becoming critical as threats to computer networks continue to cause significant financial losses resulting from data damage, loss or corruption by spy ware, viruses and other data corrupting hostile codes (Mogollon, 2007). The consequences of having weak security system administration become enormous and companies should step up their security measures to protect sensitive data by cryptographic methods. In online transactions, the secure Web server communicates with the client’s computer by authenticating each other. They do this by enciphering the data which is transmitted by means specific protocols such as transport layer security (TLS), Internet protocol security (IPsec) and secure socket layer (SSL). All Web browsers such as Internet Explorer and Netscape have in-built TLS and SSL protocols. To make internet transactions safe, the problems associated with end-user certificate distribution have to be solved and this was the challenge that led to the fall of secure electronic transaction (SET) technology after its introduction in 1990s (Mogollon, 2007). This paper will discuss important technologies behind VPN SSL and website encryption paying critical attention to algorithms which make encryption in financial systems such as the Internet commercial transactions possible and secure. In particular, the paper addresses advanced and critical issues in online transactions as one of the areas applying cryptography and network security. The Need for Network Security in Financial Systems The modern online commerce and financial systems are rapidly growing partly because several protocols for Web encryption are often implemented hence ensuring secure transactions. In a practical scenario, online clients buying commodities enter the credit card number online and then hit the â€Å"Submit† button. While this information is provided online and can be deciphered by hackers, the Web browser commits to secure this online transaction by enciphering the transmitted data (Mogollon, 2007). Secure communication between the client and the server requires client-server authentication which is a cryptographic key exchange involving an agreement of both parties. The client and the server will agree on a common pre-master secret code or key. Data is then enciphered using the keys which are generated from the agreed pre-master key. This communication agreement between the client and server also involves the decisions on which versions and protocols to use such as SSL2, SSL3, TLS1. 0, and TLS 1. 1 (Mogollon, 2007). They will also agree on which cryptographic algorithm to use and whether to authenticate to each other or not. The use of certain techniques of public-key encryption which generate the pre-master secret key will also be agreed on. Both have to make an agreement that session keys are to be created to help in the enciphering of the messages. Virtual Private Network (VPN) A virtual private network (VPN) serves as an extension of a private network which encompasses links across public or shared networks such as the Internet (Mogollon, 2007). VPN enables users to send data between two interconnected computers across a public or shared network in a way that it emulates point-to-point private link properties. Virtual private networking is the technique of creating and configuring VPN and it emulates point-to-point links (Mogollon, 2007). There should be data encapsulation or wrapping with headers to provide routing information thus allowing it to traverse the public or shared transit internetwork and attain its endpoint. At the same time, to emulate private links, the sent data must be encrypted for security and confidentiality (Microsoft Corporation, 2003). The packets intercepted on public or shared networks cannot be deciphered without the use of encryption keys. Private data is encapsulated in a connection portion known as the tunnel and it is encrypted in a connection portion known as the VPN connection (Microsoft Corporation, 2003). Fig 1. 1 Figure 1. 1: Virtual private network connection (Microsoft Corporation, 2003) The VPN connection provide the capabilities for remote users while at homes, branch offices or even while traveling to securely connect to remote organizations’ servers by the use of routing infrastructure which is provided by a shares or public network like the Internet(Microsoft Corporation, 2003). Since the creation of VPN connection is facilitated by the Internet from anywhere, these networks require strong security mechanisms to avoid any unwelcome private network access and to protect private data while traversing the public network (Microsoft Corporation, 2003). These security mechanisms include data encryption and authentication as well as other advanced VPN security measures such as certificate-based authentication. Virtual private network security (VPNs) is provided by the Internet Protocol security (IPsec), TLS and SSL (Mogollon, 2007). IPsecVPN are commonly used in several enterprises but they are not as easy to use as SSLVPN. Another difference between IPsec VPN and SSL VPN is that IPsec VPN works at Layer 3 and creates a tunnel into networks. This way, IPsec allows for devices to log on as if they have physical connections to the local area network (LAN) (Mogollon, 2007). On the other hand, the SSL VPN work at the application Layer 4 and users can have access to individual applications through the Web browser. In SSLVPN, the administrators can dictate the access by applications instead of providing entire network access. VPN emulates the facility of private wide area network (WAN) by the use of private Internet Protocol (IP) and public internet backbones (Mogollon, 2007). Secure Socket Layer Virtual Private Network (SSLVPN) Security networks particularly those used in online transactions demand increasingly complex cryptographic systems and algorithms (Lian, 2009). Therefore, there is need for individuals concerned with the implementation of security policies in companies to use technical knowledge and skill in information technology in order to implement critical security mechanisms. Unlike the traditional IPsec VPN which requires the use of special client software on computers of end users, the SSL VPN such as Web SSL VPN requires no installation of such software (Lian, 2009). SSLVPN is mainly designed to provide remote users access to various client-server applications, Web application as well as internal network connections. SSL VPN authenticates and encrypts client-server communication (Lian, 2009). Two types of SSL VPNs are recognized: the SSL Portal VPN and SSL Tunnel VPN (Lian, 2009). The SSL Portal VPN usually allows a single SSL to connect to the website while allowing secure access to a number of network services by end users. This common website is known as the portal because it serves as a single door leading to a number of resources. The site is usually a single page having links to other pages. The second example of SSLVPN is the SSL Tunnel VPN which allows Web browsers, and thus users to safely access a number of multiple network services as well as protocols and applications which are not Web-based (Lian, 2009). Access is mainly provided via a tunnel which runs under SSL. The SSL Tunnel VPN requires all browsers to have the capacity to support active content that makes them to have more functionality not possible with SSL Portal VPN. The active content supported by SSL Tunnel VPN includes Active X, Java, JavaScript and plug-ins or Flash applications (Lian, 2009). Secure Socket Layer (SSL) provides a standardized communication encryption deployed for the purpose of protecting a number of protocols (Lian, 2009). For instance, most online transacting sites such as PayPal, AlertPay and MoneyBookers have their Universal Resource Locator (URL) address beginning with â€Å"https://† instead of â€Å"http://. † This means that the Hypertext Transfer Protocol (Http) is wrapped inside the SSL (Lian, 2009). Cryptography and Encryption Cryptography is concerned with the development of algorithms where data is written secretly thus the names, crypto-meaning secret and –graphy, meaning writing (Li, n. d). Cryptography basically provides a number of ways to confirm data security during VPN communication. These various means or algorithms include hash, cipher, digital signature, authentication and key generation (Lian, 2009). Cryptography endeavors to conceal the actual context of data from everyone except the recipient and the sender hence maintaining secrecy or privacy. Cryptography also verifies or authenticates the correctness or validity of data to recipients in virtual private network. As a result of this, cryptography has been the basis of a number of technological solutions to problems such as communication and network security in share networks such as that in VPN. In general, cryptography can be defined as the technique exploiting the methods and principles of converting intelligible data into unintelligible one and then changing it back to the original form (Li, n. d). SSL VPN encryption involves the adoption of traditions and novel algorithms of encryption in the protection of sensitive data such as the one exchanged during online transactions. The original data is transformed into secure data with specific algorithm of encryption by the use of the encryption key. At the same time, the encrypted data can be decrypted back into its original state with the help of algorithms of decryption. Sometimes, attacks to data are common in networked systems where hackers break into systems to obtain the original data which has not been encrypted. The present research focuses on the efficient algorithms of encryption and decryption which are secure against these attacks (Lian, 2009). Typical VPN Encryption Algorithms VPN encryption utilizes a number of encryption algorithms to secure flowing traffic across a shared or public network (Malik, 2003). The encryption of VPN connections is done so as to allow VPN and Web traffic to traverse share or public network like the Internet. Example of encrypted VPN is the SSL VPN and IPsec which uses encryption algorithms to safely allow traffic across shared or public network such as the Internet (Malik, 2003). Apart from classifying VPN in terms of encryption, classification of VPN can also be based on the model of OSI layer which they are constructed in. this is an important classification as the encrypted VPN only allows specific amount of traffic which gets encrypted and the degree of transparency to VPN clients (Malik, 2003). Classification of VPN based on the OSI model layers recognizes three types of VPNs: data link layer, network layer and application layer VPNs (Malik, 2003). Algorithms used for encryption can be classified into partial encryption, direct encryption and compression-combined encryption (Lian, 2009). According to the number of keys used, algorithms can also be classified into asymmetrical and symmetrical algorithms. In general, different encryption algorithms encrypt data volumes hence acquiring different efficiency and security. It therefore remains a decision of system security administrators to select which algorithm to use which will provide the best VPN security (Microsoft Corporation, 2005). There is no single encryption algorithm which is efficient to address all situations (Microsoft Corporation, 2005). However, there are basic factors to consider when selecting the type of algorithm to use in VPN security. Strong encryption algorithms always consume more resources in computer systems compared to weaker encryption algorithms. Long encryption keys are considered to offer stronger securities than the shorter keys. Therefore, Chief Security Officer (CSOs) should decide on longer keys to enhance system securities (Microsoft Corporation, 2005). Asymmetric algorithms are also considered stronger than the symmetric ones since they use different keys (Microsoft Corporation, 2005). However, asymmetric algorithms of encryption are slower compared to symmetric ones. Experts also prefer block ciphers as they use loner keys hence offer stronger security compared to stream ciphers. Passwords that are long and complex seem to offer better security than shorter and simpler passwords which can be broken easily by hackers. It should be factor to consider the amount of data which is being encrypted. If large amounts of data are to be encrypted, then symmetric keys are to be used to encrypt the data and asymmetric keys should be used to encrypt the symmetric keys. It is also critical to compress data before encrypting because it is not easy to compress data once it has been encrypted (Microsoft Corporation, 2005). Direct encryption involves the encryption of data content with either traditional or novel cipher directly. Partial encryption involves the encryption of only significant portions of data and other parts are left unencrypted (Microsoft Corporation, 2003). Compression-combined encryption involves the combinations of encryption operation with compression operation which are simultaneously implemented. Comparably, direct encryption offers the highest data security as it encrypts largest volumes of data. However, this method has the lowest efficiency as it takes much time encrypting all data volumes. The reduction of data volumes in partial and compression-combined encryptions result to lower security but with highest efficiency (Lian, 2009). There are specific examples of ciphering algorithms used by most online companies to protect sensitive and private data such as business data, personal messages or passwords for online banking. The commonly used ciphering algorithms include the DES/3 DES, RC4, SEAL and Blowfish (MyCrypto. net, n. d). Data encryption in VPN client-server communications is critical for data confidentiality. This is because data is passed between VPN clients and VPN servers over a public or shared network which often poses risks of illegal data interception by the hackers. However, VPN servers can be configured to force communication encryption. The encryption will force VPN clients connecting to VPN servers to encrypt their data or else be denied connections. Microsoft Windows Server 2003 employs two different types of encryptions: the Internet Protocol security (IPSec) encryption that uses the Layer Two Tunneling Protocol (L2TP) and Microsoft Point-to-Point Encryption (MPPE) which used Point –to –Point Tunneling Protocol (Microsoft Corporation, 2005). In telephone communication or dial-up clients, data encryption is not necessary between the clients and their Internet Service Providers (ISP) since the encryption is always carried out with VPN client-VPN server connections. This implies that mobile users using dial-up connections to dial local ISPs need not to encrypt anything since once the Internet connection has been established, the users can create VPN connection with corporate VPN servers. In case VPN connections are encrypted, there is no need for encryption between users and ISPs in dial-up connections (Microsoft Corporation, 2005). VPN encryption generally allows for the attainment of the highest possible security standards made possible by key generation in a certified centre using the RSA, 1024 bit (MyCrypto. net, n. d). Smart card technology especially the TCOS-2. 0 Net Key SmartCard OS (operating system) grant a safe mode for key storage which complies with the evaluation criteria of information security systems (Li, n. d). Different types of encryption algorithms employ proprietary specific methods to generate the secret keys and thus the encryption algorithms become useful in different types of applications (MyCrypto. net, n. d). The length of keys generated by these algorithms determines the strength of encryption. The most common algorithms, DES/3DES, BLOWFISH, IDEA, SEAL, RC4 and RSA have different qualities and capabilities which network security administrators may choose to use in providing VPN security (MyCrypto. net, n. d). The RSA algorithm, developed in 1979 was named after its developers Ron Rivest, Shamir and Adleman hence the name RSA (Riikonen, 2002). RSA supports digital signatures and encryption and it is therefore the most widely used type of public key algorithm. RSA takes advantage of the problem of integer factorization to enhance security and it utilizes both private and public keys. It is one of the algorithms which is easy to understand and it has been patent-free since the year 2000 (Riikonen, 2002). RSA is commonly used for securing IP data, transport (SSL/TSL) data, emails, terminal connections and conferencing services. Its security entirely depends on the randomness of the numbers generated by the Pseudo Random Number Generator (PRNG). Data Encryption Standard/ Triple Data Encryption Standard (DES/3DES) has widely been used as a standard in banking institutions in Automatic Teller Machines (ATMs) as well as in UNIX OS password encryption (MyCrypto. net, n. d). DES/3DES allows the authentication of Personal Identification Number (PIN) to be made possible. While DES is basically a 64-bit block cipher, it uses 56-bit keys in encryption and most users don’t regard it as advances in computer technology continue to transform the banking and online industry (MyCrypto. net, n. d). DES has been found to be vulnerable to some cyberattacks and experts have now recommended 3DES as the stronger option. 3DES has the ability to encrypt data 3 times hence the name 3DES. It uses different keys for all the three passes and this gives it a total cumulative of 112-168 bit key size (MyCrypto. net, n. d). IDEA (International Data Encryption Algorithm) is another type of algorithm first developed by Prof. Massey and Dr. Lai in the wake of 1990s in Switzerland (MyCrypto. net, n. d) . It was meant to replace DES algorithm but one of the weaknesses of DES is that it uses a common key for both encryption and decryption and it only operates on 8 bytes at every incident. The success of IDEA in enhancing security lies on the length of its 128-bit key which makes hackers difficult to break especially those who try out every key. To present, there are no known means of breaking the IDEA 128-bit key other than trying each key at a time which is also difficult (MyCrypto. net, n. d). This then makes the algorithm better for security. Since it is a fast algorithm, IDEA has been implemented in most hardware chipsets to male them run faster (MyCrypto. net, n. d). Just like IDEA and DES, Blowfish represent another type of a symmetric block cipher which tales a varying key length ranging from 32 to 448 bits (MyCrypto. net, n. d). This makes it ideal for both exportable and domestic use. Developed in 1993 by Bruce Schneier, Blowfish became not only a fast alternative but also a free option to the other existing algorithms of encryption. Blowfish is now becoming more accepted by many experts because of its strong encryption properties (MyCrypto. net, n. d). Software-optimized Encryption Algorithm (SEAL), developed by Coppersmith and Rogaway is an example of a stream cipher where data is encrypted continuously (MyCrypto. net, n. d). Stream ciphers represent a group of algorithms which are faster compared to block ciphers such as IDEA, Blowfish and DES. However, stream ciphers have an extended initialization phase whereby a secure harsh algorithm is used to complete the set of tables (MyCrypto. net, n. d). It is considered a very fast algorithm as it uses 160 bit key for the purpose of encryption. In addition, SEAL is considered one of the safest algorithms used to protect data from hackers and thus, it can be used in managing passwords in financial systems (MyCrypto. net, n. d). Ciphers and Encryption Ciphers transform plaintext into secured ciphertext and then recover it back from ciphertext with the help of keys (Li, n. d). This way, data is kept private during client-server communication this providing maximum VPN and Web security. The transformation into plaintext and the recovery from ciphertext is commonly known as encryption and decryption respectively. During the decryption process, a key is required and without the key, correct plaintext recovery is not possible. There are several types of ciphers widely known and have been classified according to their properties. Ciphers can be classified as to either symmetric or asymmetric ciphers (Li, n. d). In symmetric ciphers, the decryption key used in cryptography is the same as that used in encryption. The operation for decrypting is often symmetric to the encrypting operation in symmetric ciphers (Li, n. d). In asymmetric ciphers, the decryption operations are never symmetric to encryption operations hence the keys used might differ (Lian, 2009). A simple model for showing asymmetric and symmetric ciphers is as shown below in Fig 2. 1 (a) and (b). Fig 2. 1(a) and (b) (a) Symmetric cipher (b) Asymmetric cipher Fig 2. 1 (a) and (b): Symmetric and asymmetric ciphers (Lian, 2009) In the models shown above, symmetric cipher use same key (K0) in encryption and decryption while asymmetric cipher use different keys (K1) and (K1) for encryption and decryption respectively (Lian, 2009). Since in asymmetric cipher the key is similar in both encryption and decryption operations, the key is known both to the sender and the receiver but not to the third party and it should always be kept private. Otherwise, the third party can decrypt the ciphertext and expose the ciphertext as plaintext. This is why the asymmetric cipher is also known as the private cipher. However, symmetric ciphers such as Advanced Encryption Standard (AES), Data Encryption Standard (DES) and International Data Encryption Algorithm (IDEA) have widely been used despite some vulnerabilities of ciphertext decryption by third parties (Lian, 2009). Asymmetric ciphers offer advanced security as the encryption key (K1) can securely be made public but the decryption key (K2) is safely kept private only made known to the receiver. This means that if the sender and the third party only knows one key (the encryption key), he is not able to decrypt the ciphertext hence maintaining maximum network security. The asymmetric cipher is therefore known as the public cipher and the symmetric cipher, private cipher. Asymmetric cipher or public ciphers are regarded more suitable particularly for key exchanges in online communications and internet commercial transactions. The reasons which make public ciphers suitable for VPN securities are for instance the difficulties in large number factorization in RSA cipher. The problem of the discrete logarithm is the concept behind the suitability of Elliptic Curve Cryptography (ECC). The ElGamal encryption is also regarded to offer suitable securities because of the problem with complex computing of discrete logarithms as the encryption is always defines over a wide range of cyclic groups. Cryptanalysis and Security Attacks Cryptanalysis techniques allow hackers to break easily into cipher systems in VPN. According to Kerckhoffs principle, the hacker clearly knows the cipher per se and the security of the cipher is largely depended on the private key (Lian, 2009). Cryptanalysis techniques employed by attackers aim to get access to the cipher’s private key with the aim of knowing the information as plaintext, ciphertext or even encryption algorithm. Cryptanalysis methods can be grouped into four categories according to the information best known to the attackers (Lian, 2009). The attack based on only ciphertext means that the attack only progresses after the attacker has known ciphertext collection. This method is known as ciphertext-only attack (Lian, 2009). Known-plaintext attack is another cryptanalysis method which means that the attack method will only be successful when the hacker has obtained pairs of plain-text-ciphertext sets. Another attack method is the chosen-plaintext attack which progresses only when the hacker has ciphertexts which correspond to arbitrary plaintexts sets. The last possible method of attack is the related-key attack which works after the attacker has obtained ciphertext which are encrypted using two dissimilar keys (Lian, 2009). Encryption algorithms security is determined by the resistance to cryptanalysis techniques including attacks like differential analysis, statistical attack and relate-key attacks. Ciphers used for network VPN and Web security should be analyzed thoroughly before they can be used, otherwise, attackers will break into systems when ciphers don’t provide the required maximum network security. Simple metrics can be employed in measuring resistance to cryptographic analysis and common attacks of ciphers. These metrics include plaintext sensitivity, key sensitivity and ciphertext randomness (Lian, 2009). It can therefore be said that the cryptographic algorithm is of high security only when the encryption algorithm is heavily secured against cryptographic analysis and attacks. In case the algorithm doe not provide this essential requirement, the encryption algorithm is then considered to be of low security. Key sensitivity refers to changes in ciphertext as a result of changes in keys. Good ciphers will recognize the slightest difference in keys and cause significant changes in ciphertext. Plain text sensitivity is almost similar to plaintext sensitivity and is defines as the alteration in ciphertext as a result of plaintext changes. Good ciphers should also be able to recognize any slight difference in plaintext changes and therefore cause significant ciphertext changes. Ciphertext randomness basically differs from the plaintext. In good ciphers, the ciphertext always has good randomness which makes it hard for attackers to establish holes in statistical properties of ciphertexts (Lian, 2009). Ciphers transform original intelligible data into a form which is unintelligible by the help of keys. This method is used to secure data confidentiality. Hash always uses the original data to generate short strings used to protect data integrity. Digital signatures employ the key-based hash in the generation of hash values for the data which is to be protected. Digital signatures are often used in the detection whether operations are done by the authenticated owner or not. This is critical in online transactions such as those involving online payment methods such as AlertPay, PayPal and MoneyBookers. Key generation and authentication provide critical methods which help in the generation and distribution of multiple keys during communication. Hackers use cryptoanalytical methods to analyze and break into networked systems through cryptographic means. Cryptoanalysis provides some special or common means to analyze hash, cipher, digital signatures or key generation and authentication algorithms securities. The best cryptographic methods in VPN and Web security should be immune to cryptoanalytical methods before they can be applied in system network security. Conclusion Encryption algorithms offer secure communication against cryptanalysis used by attackers such as known-plaintext attack, ciphertext-only attack and select-plaintext attacks. Complete encryption offers security to traditional and novel ciphers against cryptanalysis by hackers. Partial encryption allows some parameters to be encrypted using ciphers which are immune to cryptographic attacks. Compression-combined encryption involves the combination of encryption and comprension operations which make it secure from the perspective of cryptanalysis. VPN encryption utilizes basic encryption mechanisms which secure the traffic flowing across shared or public network. The encryption is critical in allowing VPN traffic to traverse public or shared network like the Internet. Banking systems have always employed complex security measures such as SSL VPN and IPsec VPN to encrypt traffics by the use of encryption algorithm in shared VPN connections. References: Malik, S (2003). Network security principles and practices. Indianapolis, IN: Cisco Press. Mogollon, M (2007). Cryptography and security services: mechanisms and applications. Hershey, New York: Cybertech Publishing. Lian, S (2009). Multimedia content encryption: Techniques and applications. New York: Taylor & Francis Group. Li, X (n. d). Cryptography and network security. Retrieved July 31, 2010 from, http://www. cs. iit. edu/~cs549/lectures/CNS-1. pdf. Microsoft Corporation (2005). Data encryption between VPN server and client. Retrieved August 4, 2010 from, http://technet. microsoft. com/en- us/library/cc778013%28WS. 10%29. aspx Microsoft Corporation (2003). Virtual private networking with Windows Server 2003: Overview. Retrieved August 1, 2010 from, http://www. microsoft. com/windowsserver2003 MyCrypto. net (n. d). Encryption algorithm. Retrieved August 4, 2010 from, http://www. mycrypto. net/encryption/crypto_algorithms. html Riikonen, K (2002). RSA algorithm. Retrieved August 4, 2010 from, http://www. cs. uku. fi/kurssit/ads/rsa. pdf