Saturday, August 31, 2019

Paranoia, it must’ve been Essay

High school is the time in our lives to begin exploring options and figure out who we are as individuals, and where we want to go. It is a pathway that guides us to whatever our future holds, but it is also full of commotion, which would transform the slightest bit of misunderstanding into arguments and violence. I recall a classmate of mine transferring school due to a fallacious rumor of him stealing. There was no proof; just words from people who â€Å"claim† they believe it were him. Far too many bad things could happen in high school, and they could alter our experiences in negative ways. It wasn’t farfetched to say I was a victim of such calamity. My experience at my current secondary school started off full of excitement. I participated in many different activities and made a great deal of friends, which made me love high school. But there were many quarrels in school, which made life akin to the weather: unpredictable, uncontrollable, and unfair. The defining moment of my sophomore year was a simple misunderstanding that left a deep scar behind. It was a frosty morning, sending chills down my spine as I walked to school for basketball practice, become an ice cube along the way. When the coach dismissed us to my relief, someone’s phone was missing from the volleyball team which was next door. For privacy reasons I am going to give him the alias â€Å"Joe. † The news did not surprise me, but Joe’s friends wanted to search me, and he went through all my belongings. The shock of someone thinking that I took his phone hit me like a bullet. It left me numb and speechless. Feeling helpless like a mouse in a trap, I desperately needed someone to be on my side. The word â€Å"fair† kept on popping up in my mind, and it sparked an anger that had being building. I sought after the people who wanted to put the blame on me. I had no alibi of me not stealing the phone, but likewise they had no evidence of me stealing the phone either. While walking through the halls, I felt like the walls were following me, watching my every step. Everything was blurry. It felt like I have lost control of who I am. My ears overheard my name and gossip about me in the halls, and that was when I lost it. My mind erupted and broke open like a broken dam: every bit of emotion started flowing out. My eyes started to water but I tried my best to suppress the tears. The inevitable had happened: I became the new laughingstock of the school. News spread faster than wild fire in an ancient forest. With rumors flooding in excess, my reputation had taken a hit. I was branded â€Å"The Thief†. This incident impacted me in ways beyond I would ever imagine. I did not make one jump shot at the subsequent practice. People were cautious around me. They kept their phone out of my sight and tried to avoid me in the halls; it seemed like that even teachers seemed to treat me differently, although that must’ve been my imagination. I felt sick; I could not eat or sleep. Everything seemed to become more confounded. I had trouble looking people in the eye, and my heart raced every time someone mentioned the word â€Å"phone†. I would turn around to see whether they were talking about me. Paranoia, it must’ve been. I avoided the volleyball team at all costs, and I did not talk to my close friends. It was excruciating to restrain my demons me while wearing a poker face, hoping others cannot see the pain. The week of the incident simply did not go well. Fortunately, after what had seemed like an eternity of torture, Joe finally found his phone in his friends bag. However, he never apologized to me for blind accusation. I didn’t really care; The pain, and suffering was worth more than a simple â€Å"sorry†! But everything went back to regular routine and school became exciting once more. Looking back, I really couldn’t blame Joe: he lost an iPhone 4S, the newest and most expensive phone at the time. It would be hypocritical of me to say that I would not be infuriated if I had lost my iPhone. High school is a pathway which we all must take. The views and experiences may be different but the concept remains the same. In the eye of a student there are very many negative and few positives about high school. The main point is staying out of trouble’s way and avoiding it at all cost, because one simple misunderstanding could cause you years of pain. People may also blame you for things you haven’t done, but the truth is: life is easier when you have someone else to blame.

Friday, August 30, 2019

Case studies

Mudflats Biscuit Manufacturing Plant Roles Mudflat is said to be a leading businessman in the hill country who owns the largest and the one and only state of the art biscuit manufacturing plant in the country that was running for more than 30 years. His business constitutes over 2000 employees and his products had a 70% market share in the local market. He also exports his products to 20 countries including USA. Roles Mudflat also had other business Interests In the field of hotels, travel, apparel and plantation.He is a father of two children who has completed their Master Degrees in Bangor n the field of IT and Fashion Design. His belief was that it's his prime responsibility to look after the welfare of his fellow employees' and their families and his character towards them was more of father than an owner of the plant Itself. He also proved that paper qualification does not matter when It came to real life business. Them in order to enjoy his retirement. He then appointed his son Reason as the Director Operations and his daughter Rossini as the Director Marketing.Overall analysis of this case is to see as to how the new management approach is different to that of the old management approach of managing the biscuit manufacturing plant. 2. Question 1 – Discuss about the leadership approach of Roles Mudflat and how the company was benefited for many years with his self-learned management skills and main drawbacks of the process. The leadership approach used during the reign of Roles Mudflat at his manufacturing plant is a mixture of Autocratic approach, Democratic approach and Paternalistic approach.As an autocratic he decided that his manufacturing plant would be more controlled if he did not recruit professional managers. Through practicing autocratic approach he was able to make quick decisions, this was rather unofficial as he was facing constant changes in the environment due to competitiveness in the local as well as the foreign markets. It was ra ther a challenging thing for Roles Mudflat to be looking into his workers needs as they were needed to keep his business from falling apart.Through democratic approach Roles Mudflat was able to create an environment as such that he appointed his most senior employees as Supervisors to overlook employees under thereby encouraging decision-making amongst them. He also believed in an open-door policy, which encouraged employees to come to him whenever and whatever time they wanted to talk to him. This resulted in building the employer and employee relationship which built trust in-between, encouraged team- work amongst his fellow employees and so forth. Finally, as a paternalistic Roles Mudflat was more looked as a father rather than a boss.This is so because he believed that the people working for him were the best assets he possessed. He not only looked into the needs of his employees, he also extended an extra hand towards the needs of their families too. He supported his workers by giving 02 month bonuses, provided soft loans to purchase a motor cycle to errors who worked more than 05 years, distributed a dry ration pack worth of RSI. 1000/-, offered scholarships to their children whom were selected to universities, provided books and other accessories to needy children. Society, without which survival of the company would be damaged. And he also was a people person, although he did not have an HRS to look into the needs of the employees he happen to do it the way he understood how to manage people. The benefits gained through Roles Mudflat with his self-learned management skills are however very few compared to that of the drawbacks. He believed in an open or policy, whereby all employees' feedback was considered and he acted upon accordingly. This policy improved the morale of employees to a greater extent and had a direct impact to the turnover.When employees feel that their decisions and feedback are accounted for they gain a sense of belongingness and tr ust which helps Roles Mudflat retain his fellow employees. Another benefit is that Roles Mudflat has a 70% market share in the local market, exports his products to 20 countries including USA, caters to the needs of over 2000 employees and also together has won over the society through certain CAR projects. The little knowledge of management he has, had helped him not only look into the internal environment but also to cater to the external environment too.The drawbacks of the leadership approach used by him is such that, it is the result of lack of interest of the leader that leads to his adopting this style. This proves poor management and makes the employees lose their direction and focus. Roles Mudflat has no interest about the future of his business, I. E. No mission or vision of the business, no career development for his employees. According to the case, his most senior employees are Just Supervisors. They have no development beyond that because he does not see the importance of such a promotion for such employees.This may be due to his lack of knowledge of how to manage people or more or less the reason as to his lack of interest to take his business forward. There is no proper organizational structure that illustrates the positioning of the employees of the manufacturing plant. He has no set procedure and policy of how the business has been running in the past and how it came to be. This is necessary for the next heir who would be taking over. Without this policy or procedure no one can put two and woo together and continue the business, or to survive in the competitive market. . Question 2 – What are the shortcomings of the new approach taken by the young directors and their team to the change the process? The new approach taken by the young directors and their team to the change the process was rather costly. Rather than providing internal promotions they hired two Secretaries as Personal Assistants to the newly appointed directors. Six manag ers were hired for the core functions of the company namely Production, HRS, Quality, Supply Chain, Marketing and Finance.The managers were the newly appointed directors' classmates. They failed to identify manpower requirement, through internal recruitment. They incurred a lot of finance on unnecessary expenses like for instance; Reason came to understand that the company was running without a vision consultant in the country to come up with an attractive vision and corporate plan. Reason made available printed cards to all employees with the vision and mission statement and spent one million rupees on fixing digital boards with the company's vision.The HRS introduced a new incentive scheme based on individual performance and informed all employees that their annual bonus will be based on performance appraisals. Here the new management failed to inform the employees as to how their performances were going to be appraised and as to what they had to do in order to improve their curre nt performance. Employees had no one to go with their grievances as they were not given much attention as compared to Roles Mudflat. Employees were highly denominated as they faced difficulties communicating with the new management.The new directors failed to integrate the culture of the company's vision and mission. There was a clash between the previous culture and the existing culture. Reason and Rossini were too busy recruiting new blood to the organization that they ailed to realize the damages it was doing to the company. The employee turnover increased by 25% of the first three months Reason and Rossini took over the company. 4. Question 3 – Being the HRS Manager, what is your proposal to young directors to implement best HRS practices and processes in this 30 year-old company with over 2000 employees?When we look at the business that Roles Mudflat maintained for the past 30 years and the manufacturing plant that is now about to reach extinct, we could see that the mai n reason for this unsuccessful turn is the lack of knowledge the new management as about the culture and the business itself that was run by their father. As an HRS Manager, before I implement best HRS practices and processes I shall first speak to the employees and learn from them about the manufacturing plant. This is done so as to get a wider picture of the business as a whole, and as to how it was controlled by Roles Mudflat.Through this I could derive his secret of managing people and do a comparison of before and after the new management took control. As it is the employees are much disgusted over the way they have been treated and how much they have been ignored. So as an initial step I would involve employees in helping me to work out a SOOT of the past and present and get their valuable comments or suggestions, if any. Based on the SOOT analysis, I shall look into the areas that were lacking much expertise.Initially, the HRS manager should be able to fix the denominated sta ff and to do so he/she has to be very open to them, allow them to speak about their problems bothering them. Later, recruit a counselor to help those employees whose minds needs special attention. The HRS Manager should effectively encourage employee engagement benefit from owe employee turnover, greater customer satisfaction, a solid corporate culture, improved performance and communication, and higher commitment to the core values and objectives of the organization which had been embedded during the initial period when Roles Mudflat was leading.HRS Manager should also clarify the strategic direction by means of articulating the Vision, Mission and Values of the organization. HRS Manager should also integrate HRS programmed through HRS practices. For instance, by establishing a Staffing and Recruitment Policy it well help the organization to develop an effective recruitment tragedy in order to attract qualified workers who are committed to the organization's goals.The HRS Manager s hould also be able to identify the short-term and long-term human resources needs through a HRS planning process in order to mitigate resignations. HRS Manager should also develop a compensation policy. This is done by identifying goals and objectives of the organization by considering the competitiveness in attracting and retaining employees and whether performance is tied with pay increases. HRS Manager should also provide for training and development programmed so as to eater to all employees in need of training. Case Studies Case Scenarios Read the following scenarios. Answer, in a 50- to 100-word response, each of the following questions: Scenario 1 Sophia has been removed from her family and placed into foster care for the second time in the last 2 years due to her mother’s ongoing substance abuse. Sophia has missed many days of school and often comes to school dirty and wearing clothes from the day before. Sophia’s mother does not think she has a problem and blames the system for once again taking her daughter. 1. What can a human service professional do to help this family?They can have the family go to family counseling; also have the mother take substance abuse classes or to a drug rehab program. Then go talk to the foster care center and talk to Sophia and see why see is missing school and wearing dirty clothes. The human service can tell Sophia if she want to go back home she need to go back to school and get good grade and wear clean clothes to school then she can go back home with her parents Sophia would be my first focus because kids are most vulnerable. I would place Sophia in temporary foster care and set up biweekly meetings to understand her point of view of her current situation.I would also check her school attendance. And see if she needs some counseling to talk to someone about how she feels. We have a duty to protect that child not only from her living situations but also by placing her into a caring, loving family that will not allow this to happen. If she eventually comes to realization that this temporary situation could become a permanent situation maybe she will engage in the services offered and take things seriously the second time around, but never allow her to think it’s too late to make a change with her life. 2.How might the family’s previous involvement with the child protection system affect their willingness to engage in services the second time around? The family's previous involvement could be that they were not infor med of why their child was being taken out of their care and they are just upset about the whole situation of having her taken away. The case worker could have just taken the child and gave no explanation or propose a plan to help the family provide a stable environment for their daughter which would make anyone unwilling to engage in services. I would hope that the mother would realize the longer it takes her to seek help and stay clean the longer it will take for her daughter to return home. If she eventually comes to realization that this temporary situation could become a permanent situation maybe she will engage in the services offered and take things seriously the second time around, but never allow her to think it’s too late to make a change with her life. I am sure the child is very insecure of the Human Services at this point.Especially due to the fact that she has had so many issues with them in the past, and nothing has been done, at least nothing that was making a positive impact on her future. I personally feel having a closer relation with this child and building up trust may be a very positive approach. Social service workers are helpers. One asset that we possess in this profession is the ability not to judge. In this profession, just like our lives, we see people progress and regress. It does not stop our willingness to help.However, we do change our tactics to help these individuals with each failed attempt. Scenario 2 John has been homeless for most of his adult life. He is often seen on the medians of busy intersections asking for food and money or wandering through the park talking to himself. John used to seek housing in a homeless shelter but often chooses to sleep in the local park. During the winter, the local homeless coalition attempts to talk to John about staying in the shelter but he refuses.Staying out in the cold has led John to being hospitalized on several occasions, but he maintains that he is better off without anyone ’s help. 1. If you were a case manager for the homeless coalition what would you do to try and help John seek appropriate housing during the winter months? I would try to talk to John to see what happened all through his life and why he is homeless and why he refuses to stay in the shelter. There could be a mental or emotional underlying issue that could factor his reasoning with himself.I would try my best to offer John alternatives such as appropriate housing or shelter, along with assigning him to a case worker to follow up with and seek for resources. I would try to offer counseling and build that trustworthy client-caseworker relationship in order for him to understand and believe there are better ways to live in this world. Identifying the skills he may lack as well. It’s obvious John may be suffering from depression, lack of trust, and low self-esteem. The longer John remains in this state of mind it will be hard for him to get all his needs met. Adults, childre n and youth who have Developmental Disabilities are offered programs that range in intensity and setting according to their needs and desires – from highly supervised residential programs to job coaching and supported living. The Network strives to protect the welfare of individuals at-risk in numerous ways. I feel getting John involved in an organization like this one where he was taken care of and receiving meds I feel he would be on the path to a healthy happy life.In this case it would be good to know what disciplines John most likely fit into. Psychology would be my choice. I would attack his mind and behavior for a solution. 2. How does John’s outlook about receiving help affect his ability to get his needs met? John has too much pride in his self to accept the help he needs. He is already got it set in his mind that he can make its own his own without any help from anyone. He thinks this is a handout to him. Many homeless have this mentality and they live day to day on the streets.John (as well as the many others) need to be reminded that these programs are here to help and are not a handout in any way, most of the programs that are out there for the homeless are set up to assist those in getting back on their feet and off drugs and the street. This is going to be a process in which we may have to take baby step to get the job done. First we must get John to trust us, and let him know we are his friends looking out for him. We must get him to a doctor, get him medicated and get his mental illness under control so he understands us and his situation better.I believe after those two steps we will see huge improvements in him, and I’m sure he will also want to make great changes in his life. . Resistant means they have to attend but they don’t participate, they miss their appointments, So, We want to give John whatever services he will accept. Scenario 3 Juan often runs away from home because his parents constantly fight and oft en blame him for their issues. Juan runs away for 2 to 3 days at a time and will do this at least once a week. When he is at home, he typically does not follow the rules and will yell at his parents and siblings.Juan has a history of defiant behavior, but his home environment has often been chaotic. Juan’s parents have been through family counseling, but they feel it was not helpful and are reluctant to do it again. Juan sometimes will run to a local group home that takes in runaway youth. 1. If you were a counselor at the group home, how might you work with Juan to get him to stop running away from home so that he is not sleeping on the streets? I would try to talk to Juan to ask him why his parents are fighting about and why does he think he is the blame.Then ask him has he ever sat down and had a talk with his parents to see if he can help them out being he is the oldest in the family. I would try to get Juan to understand that the only blame he should take responsibility for would be any deviant behavior that he does. His parents fighting and him being blamed for it is just a way for them to pass the buck onto him and make him feel bad. He is not responsible for his parents fighting and once he can realize that and put measures of emotional protection he would not feel the need to run away. However I would encourage Juan to seek positive ways to handle and deal with the stress from home, whether becoming involved with sports or other positive groups. Juan would be offered therapy and anger management classes. Trying to figure out what makes him the angriest and we both figure out a solution to the problem so that he can remain in his home every night and learn the importance of rules as well. . Parent’s sometime worry when they don’t know where their kids are, therefore, causing arguments.I would show him ways he could be an influential key to the other kids in the house. 2. How might you try to work with the family even though they ha ve participated in family therapy previously and did not find it effective? I would try talking one on one with each family member. Since I have already talk to Juan, I would talk to his mother to see what she has to say and how she feels. Then I would talk to his father to see if he has been in Juan’s life from birth to now. After talking to the parents then I would talk to his brothers and sisters to see how they feel about him.Once I have completely talked to everyone I can understand what really happen or have a whole picture of all the problems. Then I will bring the whole family together and let them express how they really feel and how they want to stay a happy family. Encourage the parents to understand and accept the fact that there is a problem in the home and it starts with them. As a counselor there would be weekly follow up visits with the family. The family would be offered resources and as a whole we all work together to find a solution to the problems inside t he household.I am a firm believer that one should never give up. And as a human services worker, I will never give up on a patient or a family. Maybe, they weren’t ready to change with the first session, I feel we must give up all we got in order to show change and get a positive result. To break the ice, I would start by asking questions like, â€Å"What do you see the problem being? † This gives the parents some since of control in helping the problem. I would suggest marriage counseling to stop the arguing. There has to be another reason for their arguments other than Juan running away.

Thursday, August 29, 2019

Through The Eyes Of The Native Essay Example | Topics and Well Written Essays - 250 words

Through The Eyes Of The Native - Essay Example They sided with the British because they stuck an agreement with King George III to protect them from Americans who were getting their lands from them. Because of this, the Native Americans saw this as a positive development because this would serve as their defense against the Americans, who they think were robbing them of their territories. The Iroquois was led by Joseph Brant or Thayendenaga, a Native American who was educated in Moor’s Indian Charity School. He worked as an English translator and was the chief of the Mohawk tribe3. The British lost the Revolution and in the Preliminary Articles of Peace in 1972, when they were making agreements with the Americans, they have failed to mention the plight of the Native Americans. This shocked Brant as they also learned that the British were selling them out to Americans. The British also failed to keep their promise of setting aside their lands, as in their previous treaties 4. They were â€Å"sold† to the Americans, as a result. Because of this, we can conclude that the American Revolution was a catastrophe for the Native Americans. They were used and they were made victims of a broken promise. They allied with the British with the hope that they could have helped in defending their native culture and territory but in the end, they were sold to the Americans too, without even them knowing it. In the end, we can say that they would have been better off on their

Wednesday, August 28, 2019

Strategic Management in IKEA Case Study Example | Topics and Well Written Essays - 2750 words

Strategic Management in IKEA - Case Study Example Businesses usually define their goals and objectives through mission statement and vision that are imprinted on the organizations product. According to Knapp (1999, p.75)3, mission and vision statements generally represent the purpose of the organization which is evident in the present case study of IKEA where IKEA's mission is to Whereas the vision is to provide better everyday life to all and IKEA formulates its strategies based on the mission and vision which aims to provide better life by offering its products at lower cost than in the market. Austin and Pinkleton (2006, p.19)4 mentions that mission statement sets out strategic focus for accomplishing long term outcome and vision conveys the long term ideal which is evident in IKEA's scenario. Further vision shares the organizations values that are intended to support their mission. The seriousness of offering products at low cost is also seen its corporate values where the organization recruits employees who share the values developed by IKEA of togetherness, cost consciousness, respect and simplicity. The mission, vision and values are interrelated to each other as each one is developed by other and helps the organization the long term goal as in case of IKEA to provide better life to all by providing low cost products in the industry duly integrating w ith the values that promotes the involvement of customers in product designing. IKEA has been able to achieve considerable success strongly because of its values and it is essential that the values imbibed in the market for IKEA should be pampered and the organization should continue to operate in the same way as it has done until now generating good revenue and garnering customer appreciation from all over the world. 1 (b) Difference between company's resources and capabilities According to Grant (2005, p.145) the strategy of any business is concerned with utilizing the firm's resources to improve and increase the capabilities to grab the opportunities arising in the external environment. However both, resources and capabilities play vital role in the development of the organization and to identify their importance, they are distinguished hereunder with special reference to IKEA. Resources Capabilities It is the productive asset owned by the firm like tangible and intangible like financial, infrastructural, knowledge and human resource, etc.

Tuesday, August 27, 2019

Multimedia in entertainment Assignment Example | Topics and Well Written Essays - 250 words

Multimedia in entertainment - Assignment Example 19). Apart from the animation industry as a whole, there are applications and software that are used in the entertainment industry. The Photo shoot software that are largely used in the fashion industry to add and edit the views, content, background of a photo all are examples of usage of multimedia in the entertainment industry. Adobe Photo shop is one prime example in this category that finds its usage in both domestic usage as well as commercial advertisement and fashion industry (Sidhu and Singh,p. 65). There are large number of video editing software available online as well which also brighten the multimedia field of entertainment. In the sports discipline all the international sporting activities find the usage of multimedia and graphics. Football for example displays the screens presenting the stats, graphs, digital animations. The other sporting fields also make use of similar multimedia techniques. The gaming consoles and the other online apps introduced are another example of multimedia usage in the entertainment

Monday, August 26, 2019

Patient case study with chief complaint cough Essay

Patient case study with chief complaint cough - Essay Example FAMILY HISTORY: Mother died at 84y/o (h/o HTN, Cataracts, RA, HF, Endometriosis), Father unknown age of death (h/o HF, HTN), Sister died at 48y/o from MI (h/o HTN, HF, smoker), Sister died at 54y/0 from HF (h/o HTN, HLD, HF, COPD, smoker), Brother died at 60y/o from lung CA (h/o HTN, Lung CA, smoker), Youngest Sister (h/o HTN). SOCIAL HISTORY: Ms. Simmons was married for 5yrs, divorced for 22yrs, lives home with 36y/o daughter. Completed high school, 3 daughters, 2 grandchildren, and works 40 hours per week. Active in church, attends twice a week and street witness (door to door) Jehovah witness, refuses blood transfusions. Has health insurance at current job. Reports single, last sexual intercourse 22yrs ago, practicing celibacy, heterosexual. Likes to go out to dinner with family and friends, reading, and watching movies. NUTRITION: (24 hour recall) Breakfast (today)-2donuts and white milk, Dinner-chicken salad sandwich, slice of cake, coke cola, Lunch-Chinese chicken w/egg roll, coke cola, 1 bottle water, Snack-chicken salad croissant, 1 decaf coffee, Breakfast (yesterday)-McDonald’s hash brown, sausage biscuit, orange juice. General: Ms. Simmons has pleasant mood, sitting in chair w/arms folded in front of body, AAOx3, NAD noted, no c/o pain at present. She is dressed appropriately, w/good hygiene, well developed, and well

Sunday, August 25, 2019

Evolution Essay Example | Topics and Well Written Essays - 750 words - 1

Evolution - Essay Example Although Scientists are convinced that macroevolution occurs resulting in emergence of new species, this is a misconception. This paper argues that macroevolution has never and will never occur. The reasons given by scientists to support occurrence of evolution are controversial and disputable. Irrespective of there being no observable evidence to show occurrence of macroevolution, scientist continue to defend the notion that the existing species evolved from primitive species through gradual stages. There is not recorded evidence that any distinct organism ever evolved into a different kind of organism. This shows that evolution of any significant scale has never occurred and will never occur (Camp, 2006). If the process of evolution ever occurred, then someone must have observed it. On the contrary no one has ever witnessed an organism undergo evolution. Additionally, there are no transitional forms of organism in existence. If evolution does occur, then different organisms of different species would at least be seen in their transitional stages (Denton, 2010). On the contrary, organisms belonging to same species are almost indistinguishable in terms of the traits they possess. Although a single species may have different varieties, there are no organisms in the transition stages that show characteristics such as shared features between two different species. For example, if human evolved from the apes, there should be some existing ape like human in the process of evolving into humans. On the contrary, contemporary apes are different from humans with no entities in the transitional stages (Camp, 2006). Another reason why macroevolution is an invention by scientists is failure of experiments in the lab. Scientists have carried out experiments using rapidly reproducing organisms such as fruit flies in an attempt to produce better species. Such experiments have failed even with use of

Saturday, August 24, 2019

Projectile Lab Report Example | Topics and Well Written Essays - 250 words

Projectile - Lab Report Example . The ball was then pushed into the back making sure it does not move forward. A test shot was then made to determine where the ball lands after which a carbon paper was placed on the white sheet. The ball was then fired 6 different times and the distance travelled by the ball from where the ball leaves the launcher recorded.The position of the launcher was made in such a way that the launcher launches the ball at 200 the steps in part A were then repeated and data recorded in table 2 If the velocity is increased, the time taken for the ball to reach the ground will be more than the calculated speed. Considering the velocity equation, it’s clear that velocity is directly proportional to time thus an increase in velocity consequently increases the time. Trajectory labeled C has the longest hang time. This is because the distance travelled by the projectile is longer as compared to the other two i.e. A & B since distance travelled is directly proportional to hang time The experiment was successful since from the measured distance, it was possible to calculate the both the time and the velocity of the projectile

Interprofessional Working on Patients with Learning Disability Essay

Interprofessional Working on Patients with Learning Disability - Essay Example This essay will explore the interprofessional working environment’s challenges, solutions to barriers and problems, as well as how these scenarios have been translated or could have been avoided on the case of Tom. Discussion Case Summary: Tom had a profound and multiple learning disabilities and attended a residential special school. One year prior to his death, a hospice consultant recommended an investigation by a gastroenterologist but the medical assessment promised during the NHS assessment never materialised. Tom’s parents relayed their concerns based on Tom’s expressions of pain on numerous occasions but it the social services workers did not heed the reports. The school interpreted Tom’s discomfort as dislike for school even whilst his parents insisted he needed medical investigation. When brought to a hospice, the consultant suggested his digestive system be further investigated. During the discussion with his GP, Tom’s parents were not included and the GP decided that a PEG feeding tube will not be tolerable and that there was unclear direction as to how Tom could receive adequate nutrition. After leaving school, the professionals also decided there was nowhere suitable for Tom to go to. Instead, he was placed into an NHS psychiatric assessment unit. His parents were only promised of medical assessment but it never happened. His health deteriorated, he lost weight and started acting unusual such as gouging his head of which his parents interpreted as experiences of pain. By the time a place for social services residential home became available for Tom, it was also then that his health was acted upon and he was confined in a hospital. It was found Tom had ulcerated oesophagus and that he was inserted with a PEG in order to be fed by tube prior to an operat ion. However, it has been too late because Tom was already extremely weak and died in the process. Ethical and legal issues It was apparent on the case of Tom that there was serious negligence on the part of the general practitioner (GP) to act accordingly by making a decision without consulting or including Tom or Tom’s parents in the process. It was already obvious that a health consultant recommended the need for Tom to be inspected by a gastroenterologist. This should have been pursued and provided in a timely manner. The GP as the gateway for Tom’s more specific medical needs shares the biggest responsibility in the process. In addition, there is the Disability Discrimination Act which called for the full application of human rights principles on the case of Tom and others who have disabilities. The human rights concept is â€Å"key to the development and improvement of healthcare for people with learning disability,† (Jacques and Strank, 2009, 439). This c alls for treatment and respect with equity of outcomes in healthcare the patient with disability receives. Additional support, in fact, is required because their disability increases the difficulties they experience and increases their rights instead of being diminished. Aside

Friday, August 23, 2019

Age Discrimination Essay Example | Topics and Well Written Essays - 3750 words

Age Discrimination - Essay Example This type of discrimination can take many forms and can surface in many workplace areas. This paper highlights age discrimination, who it affects, where it is likely to surface, the laws constructed to prevent its occurrence, and also illustrates suggestions for today’s HR managers to prevent this form of discrimination from occurring. Age discrimination has many definitions, but can be best described as a situation which occurs when older workers are â€Å"avoided or excluded in everyday (business) activities because they are simply the wrong age† (Nussbaum, 2000). Age discrimination also involves denying the provision of job opportunities to older workers, such as a career-based promotion, in favor of promoting a younger individual for the management role. Age discrimination, when it occurs, impacts both the more seasoned worker and the business as well. For instance, the older employee who is experiencing discrimination based on age will not only see diminished job opportunities, but their emotional well-being can be impacted negatively. Despite the various legislation created to combat this growing form of discrimination, evidence suggests that age-related bias and discrimination is on the rise in contemporary business and in the broader society. According the Equal Employment Opportunity Commission (EEOC), age-bias claims have soared in recent years, which is attributed to today’s economic conditions (Levitz and Shishkin, 2009). For instance, because many companies are currently looking for methods to reduce costs, lay-offs have become the cost-cutting choice when personnel and payroll costs begin to exceed salary and compensation budgets. In addition, recent changes to existing anti-discrimination laws have made it easier for laid-off employees to allege age bias as the rationale for why they lost their jobs (Levitz and Shishkin). However, why is the older worker being targeted for lay-offs over their younger,

Thursday, August 22, 2019

Cis170 Essay Example for Free

Cis170 Essay using System. Collections. Generic; using System. Linq; using System. Text; namespace Lab5A { class Program { static void Main(string[] args) { string[] playerName = new string[100]; int[] playerScore = new int[100]; int c = 0; c=InputData(ref playerName, ref playerScore); double avg= CalculateAverageScore(ref playerScore,c); Console. WriteLine(Name Score); DisplayPlayerData(ref playerName, ref playerScore, c); Console. WriteLine(); Console. WriteLine(Average Score: + avg + ); Console. WriteLine(Players Who Scored Below Average); Console. WriteLine(Name Score); DisplayBelowAverage(avg, ref playerName, ref playerScore,c); } static int InputData(ref string[] player, ref int[] score) { int addName = 0,counter=0; do { Console. Write(Enter Players Name (Q to quit): ); player[counter] = Console. ReadLine(); if (player[counter] == q || player[counter] == Q) { addName = 1; } else { Console. Write(Enter score for {0}: , player[counter]); score[counter] = Convert. ToInt32(Console. ReadLine()); counter++; } } while (addName ! = 1); eturn counter; } static void DisplayPlayerData(ref string[] playerName, ref int[] playerScore,int counter) { for (int i = 0; i lt; counter; i++) { Console. WriteLine({0} {1}, playerName[i], playerScore[i]); } } static double CalculateAverageScore(ref int[] playerScore,int counter) { int total = 0, avg = 0; for (int i = 0; i lt; counter; ++i) { total += Convert. ToInt32(playerScore[i]); } if (playerScore. Length gt; 0) avg = total / counter; return avg; } static void DisplayBelowAverage(double avg, ref string[] playerName, ref int[] playerScore,int counter) { or (int i = 0; i lt; counter; i++) { if (playerScore[i] lt; avg) { Console. WriteLine({0} {1}, playerName[i], playerScore[i]); } } Console. ReadLine(); } } } Part B: using System; using System. Collections. Generic; using System. Linq; using System. Text; using System. Collections; namespace Week_5_iLab_Part_B { class Program { static void Main(string[] args) { string response = y; ArrayList LastNameAL = new ArrayList(); //Console. Write(Enter a last name: ); //LastNameAL. Add(Console. ReadLine()); //Console. Write(Keep Going? (Y/N) ); //response = Console. ReadLine(); while (response == y) { Console. Write(Enter a last name: ); LastNameAL. Add(Console. ReadLine()); Console. Write(Keep Going? (y/n) ); response = Console. ReadLine(); } Console. WriteLine(LastNameAL. Count + last names entered. ); Console. WriteLine(Last names in ascending order. ); LastNameAL. Sort(); foreach (string s in LastNameAL) { Console. WriteLine(s); } Console. WriteLine(Last names in descending order. ); LastNameAL. Reverse(); foreach (string s in LastNameAL) { Console. WriteLine(s); } Console. ReadLine(); } } }

Wednesday, August 21, 2019

The Boon Or Bane Of Global Warming Environmental Sciences Essay

The Boon Or Bane Of Global Warming Environmental Sciences Essay The stratosphere ozone (o3) is a product of billions of years of the photochemical process catlalyzed by the solar radiation . The ozone screen provides a shield for living creatures by filtering out dangerous ultra-violet rays from sunlight . ultra violet radiation causes sun burn , skin cancer , cataracts and can suppress the immune system . Since 1973 it has been increasingly recognized that the ozone umbrella is being ripped off by the industrial activities of man which release chemicals like chlorofluorocarbons (CFCs) The main problem with the CFCs is their long life in the atmosphere ranging from 75 to 125 years . Also one molecule of CFC can destroy 1,00,000 molecules of ozone . Also rockets which take off vertically carry ozone killers (Chlorine containing chemicals and nitrogen oxides ) Eg : The American Delta booster, the authors rate it as a second ozone killer which destroys 8 million tonnes of the earth shielding gas during every take-off SOLUTION Coming to the question of stopping launchings of space ships to obviate thinning of the ozone layer , the soviet experts are of the view the problem can be tackled by taking positive steps like minimizing production of ozone-killing chemicals , banning solid fuel fired rockets , and setting international restrictions for the frequency of launches . A BRITISH ORGANIZATION , Ozone Help (OH ) has come out with a programme to produce ozone in the upper atmosphere . A solar powered machine is carried to high altitudes by balloons over the antartica , where the ozone depletion has reached its highest . This ozonator is a simple electronic unit about the size of a large microphone and generates a charge of more than 15,000 volts . When this charge is emitted into the air , it produces a significant amount of ozone by converting the oxygen of the air. GLOBAL WARMING (due to greenhouse gases ) The large scale burning of fossil fuels in modern industry and transport systems increases the concentration of greenhouse gases such as CO2 , O3 , CH4, CFC3 and N2O in the atmosphere . These greenhouse gases allow suns rays to penetrate the earth surface but retard the return flow of the infra-red radiation. Thus the suns heat would be trapped near the earths surface, raising the earths surface temperature over a period of time. Among all the gases CO2 alone plays a major role in creating greenhouse effect. There are many reasons to be cautious about accepting CO2 as the causative agent if there really is warming. This is highlighted by 2 papers published in March 2008. Scafetta and West showed that up to 69% of observed warming is from the sun and Ramanathan and Carmichael show that soot has 60% of the warming power of CO2 The fluctuations in the composition of the atmosphere and changes in the temperature over the past two lakh years can be determined by analysis of tiny air bubbles trapped in ice that has accreted year by year in arctic and Antarctic. All scenarios on global warming show that significant climate change will occur over a period of time. There are many other issues of environmental concern too like radioactive fallouts , phenomenon of acid rain , large scale deforestation and large scale use of pesticides and chemical fertilizers in modern agriculture and so on . Here are some ways for the prevention of global warming Clean or replace filters on your furnace and air conditioner Cleaning a dirty air filter can save 350 pounds of carbon dioxide a year.. Do not leave appliances on standby Use the on/off function on the machine itself. A TV set thats switched on for 3 hours a day (the average time Europeans spend watching TV) and in standby mode during the remaining 21 hours uses about 40% of its energy in standby mode Plant a tree A single tree will absorb one ton of carbon dioxide over its lifetime. Shade provided by trees can also reduce your air conditioning bill by 10 to 15%. Encourage the switch to renewable energy Successfully combating global warming requires a national transition to renewable energy sources such as solar, wind and biomass. These technologies are ready to be deployed more widely but there are regulatory barriers impeding them Try car sharing Need a car but dont want to buy one? Community car sharing organizations provide access to a car and your membership fee covers gas, maintenance and insurance. Is Global Warming Bad? The IPCC 2007 Reports Suggest There Will be More Losers than Winners with Warming. The IPCC process includes many unlikely scenarios. These worst-case estimates also have associated impacts, from benign to worst-case. Thus we get the 5% worst impacts that have a 5% chance of happening (a combined 0.25% likelihood) equally discussed with benign changes that are reasonable to expect. By the time summaries are written, and press releases, only the bad effects are presented.   This leads to a gross exaggeration of the problems. Global Warming Will Actually Have More Winners then Losers. Throughout the history of human life, the Earths livability has always been better when the climate has been warmer than cooler. Human populations have expanded the most when the Earth warmed and turned greener, whether during the middle ages or during the last 2 decades. Whether it is a   fish in the ocean, a shrimp in an aquaculture pond, or a bean on a   vine, it will grow faster when it is warmer, all things being equal. Humans will   be quick to take advantage of a warmer climate and to adjust if it gets too warm in an area. More crops grow where it is warm or hot than in frozen ground, and CO2 is a primary food of plants basic facts that   seem forgotten. Even now, NASA satellites show that the Earth has become 6% greener as the world has warmed over the past 20 years (In the laymans approach, ozone depletion and global warming is mostly the same thing . However if you take a closer look youll know they are completely different . Although the two are different, activities leading to one always have some impact on the other ) Read more: Difference Between Ozone Depletion and Global Warming | Difference Between | Ozone Depletion vs Global Warming http://www.differencebetween.net/science/nature/difference-between-ozone-depletion-and-global-warming/#ixzz1AiNbKbQO Facts about climate change This chart looks ominous until put into the context that the average temperature for 1901-2000 is 13.9C (57.0F), so we are talking about a change from about 13.5 to 14.3 C or 56.3 to 57. 7 F. Not only is Earths surface warming, but the troposphere the lowest level of the atmosphere, where weather occurs is heating up too, U.S. and British meteorologists reported The EPA is set to regulate greenhouse gases next year for the first time, after the Supreme Court ruled in 2007 that it could treat heat-trapping gases such as carbon dioxide as pollutants.EPA spokesman Brendan Gilfillan responded: The commonsense and transparent steps weve taken are already proving doomsayers wrong, as evidenced by the fact that 98 percent of states have stated theyre in a position to comply (times of india) Democrats established the committee in 2007, after taking control of the House. At the time, House Speaker Nancy Pelosi, a Democrat, called global warming possibly the greatest challenge of our time, setting at risk our economy, environment and national security. Scientists across the globe are toiling to perfect newer sources of energy that would end reliance on fossil fuels and threat of global warming. Those at citybased National Environmental Engineering Research Institute (Neeri) have joined the pack. They have developed a process of producing biofuel from four different species of micro-algae (plants that cant be seen with naked eye). The climate is changing. The earth is warming up, and there is now overwhelming scientific consensus that it is happening .. With global warming on the increase and species and their habitats on the decrease, chances for ecosystems to adapt naturally are diminishing. Many have agreed that climate change may be one of the greatest threats facing the planet. Recent years show increasing temperatures in various regions, and/or increasing extremities in weather patterns. Climate change, in the absence of mitigation policies would in all likelihood lead to: 1 Possible disappearance of sea ice by the latter part of the 21st century 2 Increase in freqency of hot extremes, heat waves and heavy precipitation 3 Increase in tropical cyclone intensity 4 Decrease in water resources due to climate change in many semi-arid areas, such as the Mediterranean Basin, western United States, southern Africa and north-eastern Brazil. 5 Possible elimination of the Greenland ice sheet and a resulting contribution to sea level rise of about 7 metres. Without mitigation future temperatures in Greenland would compare with levels estimated for 125,000 years ago when palaeoclimate information suggests 4 to 6 m of sea level rise. 6 Approximately 20 to 30% of species assessed so far are likely to be at increased risk of extinction if increases in global average warming exceed 1.5 to 2.5 degrees C. In Africa, by 2020, between 75 and 250 million people are projected to be exposed to water stress due to climate change, and in some countries yields from rainfed agriculture could be reduced by up to 50%. The impacts of climate change would be disproportionately severe on some of the poorest regions and communities of the world. My own analysis suggests that at least 12 countries are likely to tend towards becoming failed states and communities in several other states would show potential for serious conflict due to scarcity of food,, water stress and soil degradation. UN Summit on Climate Change, 22 September 2009 STATEMENT OF DR. R. K. PACHAURI Chairman, IPCC Director General, The Energy and Resources Institute Director, Yale Climate and Energy Institute Warming of the climate system is unequivocal as is now evident from observations of increases in global average air and ocean temperatures, widespread melting of snow and ice and rising global sea level, and that Most of the observed increase in temperatures since the mid-20th century is very likely due to the observed increase in anthropogenic GHG concentrations. In the twentieth century average global temperature increased by 0.740 C while sea level rise resulting from thermal expansion of the ocean and melting of ice across the globe amounted to 17 cms. With this increase the Maldive Islands with land surface barely a metre or two above sea level, every storm surge and major upwelling of the seas represents a major danger to life and property. But this is not all. Climate change is already resulting in an increase in the frequency, intensity and duration of floods, droughts and heat waves. Precipitation has increased significantly in eastern parts of North and South America, north ern Europe and northern and central Asia, whereas it declined in the Sahel, the Mediterranean, southern Africa and parts of south Asia. Globally the area affected by drought has increased since the 1970s If we take no action to stabilize the concentration of greenhouse gases in the atmosphere, then average temperature by the end of this century would increase anywhere from 1.1 degrees to 6.4 degrees C. The world is increasing its emissions at a rate that may take us to the upper end of the range projected, which implies a total increase in these two centuries of over 7 degrees C, that is, over 12 degrees Fahrenheit. Yet between 1970 and 2004 global GHG emissions increased by 70% and carbon dioxide by 80%. We must halt this unacceptable trend. It is heartening that the G8 leaders have recognized the broad scientific view of limiting increase in global average temperature to 2 ° C. But, we have clearly specified that if temperature increase is to be limited to between 2.0 and 2.4 ° C, global emissions must peak no later than 2015. That is only six years from now. And the 2.0 ° ceiling too would lead to sea-level rise on account of thermal expansion alone of 0.4 to 1.4 meters. This increase added to the effect melting of snow and ice across the globe, could submerge several small island states and Bangladesh. CONCLUSION Like Michael Jackson said Heal the world make it a better place for you and for me and the entire human race . There are people dying if we care enough for the living , make it a better place for you and for me While this is just the tip of the iceberg, many, many issues need addressing regarding the extinction of plant and animal species, polar bears and their natural habitat and as times of india has mentioned that the lakes are heating faster than the air There are many such questions that need to be answered. .It is more important now than ever before to pull heads out of the sand and make a change for the better to our mother earth before it becomes too late. The earth is something we borrowed from our future generation hence we must do what we can in our capacity to preserve it . where the question of global warming arises it is seen as a detriment to us hence we should take measures to counter its growth or to our peril .

Tuesday, August 20, 2019

History Of Mobile Banking

History Of Mobile Banking Mobile banking is known as M-banking or SMS Banking. The european company called PayBox supported financially by Deutsche Bank, in 1999 started mobile banking.  [i]  SMS was the earliest mobile banking service offered. It is an emerging field in the banking segment. However, older phones had limited functionality. Mobile phones, palm PCs and PDAs were lacking hardware and software support. The higher cost of data plans and the slower network speed were also limiting factors in the growth of mobile banking. It has been improved with the advancement of the technology, the hardware and software. The cost of mobile devices has been reduced drastically and is still reducing. Network speed is much better than before and data plans are not as costly. All of these changes have provided necessary raw materials for the growth of mobile banking and the numbers of people using mobile banking is increasing day by day. Users, who were using computers/laptops for online banking, are moving towa rds mobile banking because of ease of use and fast access. In the USA, mobile banking was introduced in 2006 by Wachovia bank.  [ii]  In Sep 2007, Aite group predicted the mobile banking users in the United States would reach 1.6 million by the end of the year 2007 and will rapidly increase to 35 million by the year 2010.  [iii]  The report indicated the growth potential for mobile banking. However, the security issues are the major concerns for mobile banking service providers and the users. As mobile banking systems mature, more users will start using mobile banking, which will draw the attention of the hacker community to target mobile banking customers mostly for financial gain. Safety and security of the personal and financial information stored and managed in the devices are the key factors for users, banking organization and the security community. The purpose of this paper is to gain basic knowledge of mobile banking, explain the different kinds of architecture used in mobile banking and identify the different security attacks and its countermeasures. Mobile banking in US compare to other countries Wachovia bank was the first to announce mobile banking services to their customers in Sep 2006 and re-launched in March 2007 followed by a few other banks.  [iv]  They developed their own banking product with ATT. Bank of America started mobile banking services in March 2007 in collaboration with four major wireless carriers, which reported 500,000 users within the first 6 months. Initially, the services offered were funds transfer, bill payment, branch and ATM locations, account balance, etc. Since then there has been huge progress in mobile banking services. In 2009 and 2010 respectively, San Antonio, Texas-based USAA launched their new application for the iPhone and Android platform that is capable of remote deposit capture allowing users to take a photo of the check and deposit electronically.  [v]  In the middle of 2010 Chase bank also introduced the mobile RDC application for the iPhone.  [vi]  In Nov 2010, U.S. Bank and Visa announced a mobile payment system for th eir customers.  [vii]  They offer the service via use of the MicroSD card, which fits in most existing mobile devices. A month before that, U.S. bank launched a full suite mobile banking solution for prepaid cardholders with bill pay capabilities. Even though the US based banks provide different kinds of mobile banking services, they are still far behind of their counter parts in the world. 7Many banks in the world have offered mobile banking and financial services for years. European and Asian countries have been offering mobile banking services for years that vary for banking related services to the mobile proximity payments. Japan and South Korea are the world leaders in adopting mobile banking technology. Before 2004, the Internet was the only way of using mobile banking in Japan, which enabled customers to browse the merchant website through a web browser. However, customers still had to use their credit/debit cards for payments. In 2004, NTT DoCoMo started using FeliCa contactless IC chips developed by Sony for mobile devices, which can carry personal and financial information that facilitated remote payments and substituted mobile devices for cash and cards at merchants points of sale. In 2005, KDDI and Vodafone also adopted FeliCa. 7In 2002, SK Telecom and KTF launched their proximity payment programs in South Korea, which used an infrared technology. These prog rams were not successful because of number of reasons. In 2003, LG Telecom started South Koreas first IC chip based mobile banking service, which significantly increased the market share of LG Telecom. The other carriers also adopted IC chips following the success of LG Telecom. Also, Visa and MasterCard have successfully operated in South Korea since 2006. Since then mobile banking services have come a long way in other countries of the world. Difference between mobile banking and online banking/credit/debit card banking At present, mobile banking provides almost the same kind of services as online, credit/debit card banking. When mobile banking services first started, the mobile devices were not able to support all mobile banking services and they were lacking hardware and software support. The initial mobile banking service offered was the SMS banking; while online banking was very well developed and was offering all kinds of banking services. Credit/debit card systems are also fully developed and people were able to use their cards at merchants point of sale and online for payments. However, technological advancements in mobile devices have enabled users to use mobile banking related services via SMS, web browser and mobile web applications. Currently available mobile devices have the same processing power as computers and they are still evolving. In some countries, mobile banking was started in the early 90s and now offer a full suite mobile banking solution, which has features of online banking and credit/debit card banking. People are using their mobile devices to replace cash and cards. However, mobile banking services in the USA were started at the end of 2006. Most USA banks are still not offering full mobile banking solutions to their customers. U.S. banks recently announced proximity payment systems in 2010, which has been in use for a long time in other countries. Some of the features of online banking and credit/debit card banking are not available for mobile banking systems. So mobile banking systems in the US are less developed compared to online, credit/debit card banking in terms of services. However, as number of people enrolled in mobile banking increases and banks offer more services with a full range of solutions in the US, the line between mobile banking and online/credit/debit card banking will get thinner and, in the future, mobile banking will provide a combination service of online and credit/debit card banking in the US. In terms of security, mobile banking is as secure as online banking and offers the same security features and protections. However, there is less number of users for mobile banking than online/credit/debit card banking, which reduces the risk of security threats. The hacking community is more targeted towards the online/credit/debit card banking for financial gain. A large number of antivirus, antimalware/spyware etc. available for online banking are not widely available for mobile banking. But with the increase in number of users for mobile banking, these software are also increasing. Mobile banking also carries the risk of some attacks called Vishing, SMishing and spoofing that are only possible in mobile devices. The security features and countermeasures for them differ from online banking. However, mobile banking provides the same security protections as the online banking, as most of them are derived from the experience with online banking. Mobile banking services 5Mobile banking systems allow users to perform bank related transactions like balance checks, account transactions, bill payments, fund transfers, credit/debit card management, etc. through mobile telecommunication devices like mobile phones or PDAs (personal digital assistants). Mobile banking can be divided in three different concepts based on an academic model: (1) Mobile accounting, (2) Mobile brokerage and (3) Mobile financial information services. 6Mobile accounting services can be divided into account operations and account administration. Account operations include fund transfers, bill payments, etc. and account administration includes ordering checks, updating profiles and personal information, managing lost or stolen cards, etc. Mobile brokerage is related to buying and selling of stocks, securities, and obtaining current information about securities. Mobile financial information divides into account information and market information. Account information includes informati on on branch and ATM locations, credit/debit cards, statements, alerts, balance inquiries, etc., while market information includes products and services, currency exchanges, interest rates, etc. Mobile banking advantages disadvantages Mobile banking offers many advantages to both, users and service providers. It is fast and easy to use and saves time. For online banking, an internet connection is an essential which is a major problem in developing countries. However, many individuals can find mobile connectivity at places where internet connection cannot be found. Mobile banking is cost effective for providers as cost of mobile banking is much less compared with onsite banking. Various kinds of banking services and transactions can be performed with mobile banking. However, mobile banking has many disadvantages too. Security issues are the major concern. Phishing scams, viruses and Trojans and physical loss of the mobile device are some of the security issues that affect mobile banking. The cost of the mobile devices, which are compatible with the mobile banking application and still quite high. Mobile requires a data plan and text messaging services, which is an added cost to the user. Some providers charge for s oftware and mobile banking services as well. Different types of mobile banking architecture 5There are three types of architectures available for mobile phones to enable mobile banking. Up until 2010 most of the mobile banking was performed by SMS or mobile web. With the advancement in mobile phones and following the success of Apples iPhone and other operating system based phones, mobile banking is increasing through the special client applications. These different architectures are further discussed below: SMS or MMS based mobile banking Mobile website Mobile client application SMS or MMS based mobile banking architecture SMS based mobile banking was the first mobile banking service offered. It is based on plain text message interaction. 6,11SMS banking works in two different modes. Pull mode and push mode. Pull mode is a one-way text message system where the bank sends a text message to the users informing them about certain account situations. It can be used to promote other mobile banking services. Push mode is a two-way message system where users send text messages to the bank requesting specific transactions or services with predefined request codes and the bank replies with specific information pertaining to the transactions or services through plain text messages. 6,11There are two different kinds of text messaging systems: SMS and MMS. SMS is a short form of short message service, which includes sending or receiving plain text messages from the bank. It has a limitation on the number of characters can be included in a message. MMS, known as multimedia messaging service, is the second type of messaging service, which can carry larger text messages and works on the same platform as SMS. To use message based mobile banking, a customer has to enroll his/her cell phone to the bank and the bank sends a text massage with a onetime password. Each bank has its own SMS banking number and commands for mobile banking. The message based system has some advantages. It is cost effective and familiar technology, virtually available in each and every cell phone regardless of manufacturer, model or carrier. It provides two-way communication between the bank and the user, so either the bank or the customer can initiate communication. It does not transmit or sto re the confidential information in the mobile device. However, SMS cannot carry a larger message and account information. SMS has to be limited to certain number of characters which limits its use. Mobile website based mobile banking architecture 6,11This architecture includes the use of the internet browser of the mobile device to access the banks internet banking website. Users can connect to the internet via a wireless network or their carriers internet service. The biggest advantage of this architecture is most of the processing is done at a remote server at the bank and much less information is stored in the mobile device. On the other hand, it doesnt require the installation of special software and most of the phones today are capable of using an internet browser. 6,11WAP (wireless access protocol) was created in 1999 and made internet access possible through mobile devices. WAP is an industry standard for wireless applications for mobile devices. It provides the same kind of user experience to the customer as the Internet banking and it does not require the installation of a special mobile banking application. However, it has some disadvantages also. Banks have to create mobile websites that are mobile friendly and can be accessed through the small screen of mobile device. It does not work with all kinds of phones and requires smart or PDA phones. There is an added cost for data plans and only customers can initiate communication. This system is more prone to attack as mobile devices are not capable of running firewalls or antivirus protections. Mobile client application based mobile banking architecture 6,11This architecture requires the download and installation of a mobile client application to the mobile device. With the help of the application a bank can provide a wide range of services to their customers. Although this approach has some advantages and some disadvantages. First of all, users have to learn a new application. The application has to be customized to different phones which increases the development cost to the banks. The applications are also susceptible to attacks and only customers can initiate communication. The older phones are not capable of running this application because of technical limitations. The use of internet requires a data plan that increases the cost on the part of customers. (A data plan requires to use client application based mobile banking architecture, which increases the cost on the part of customer.) Some of the banks charge an initial fee for downloading and installing the mobile client application. Mobile banking security requirements Confidentiality Authentication integrity non-repudiation Security attacks/threats Mobile banking is an emerging technology and the number of mobile banking subscribers increases day by day. With the increase in number of users, the concerns for security also rise. Different kinds of security attacks are as follows: What kinds of attacks are more on which types of architecture model? Vishing12 Vishing is a social engineering attack over the telephone system. It is a type of phishing and it is a combination term of voice and phishing. Mostly it uses features facilitated by Voice over IP (VOIP), to gain access to private, personal and financial information from the public (information of the users). It is used to get the authentication information of the user mostly for financial gain. 13Phishing Phishing is an another kind of social engineering attack in an electronic communication to acquire sensitive information like usernames, passwords and credit card details by redirecting unsuspecting users to a fake website with the use of an authentic looking email. It can also be carried out by instant messages. 14Smishing Smishing is also a social engineering attack similar to phishing. The name is derived from SMs phiSHING. It uses the text message system of the phone to get private, personal, and financial information of the user. A web site URL embedded in the text message may act as a hook. However, the phone number that connects to the automated voice response system has become more common. 15,16Spoofing Spoofing is an attack where a person or program successfully masquerades as another with falsifying data. A spoofing attack causes the telephone network to display a number on the recipients caller-id-display. This number is familiar and looks like it came from a legitimate source, which is not an origination source actually. 6Lost and stolen phones This is one the biggest threats for mobile banking. Mobile phones are small and portable and could be easily lost or stolen. Authentication, authorization and confidentiality are the areas to be considered when mobile devices are lost or stolen. 19In 2001, 1.3 million devices were lost or stolen in the UK. 17In 2006, over 1 billion phones were sold worldwide. Of those 80 million were smartphones, which have operating system and can store all kinds of information. 18A survey found that 34% users didnt even use a PIN. This threat increases with the increase in the number of phones. 6Cracking and Cloning Cracking a mobile device means modifying its software to gain control of that particular mobile device. Attackers find the ways to break or crack the software and once cracked the attacker has the access to the data stored in the device. An IPhone cracked by an ISE is an example of phone cracking. Attacker found an exploit in the iPhones web browser, deployed a fussing attack and injected invalid data into a program looking for the buffer overflow. With cracking, the software attacker can also view SMS logs, call history, etc. or send that data to their machine. Bluetooth is also vulnerable to phone crack attack. 17If Bluetooth is on, any Bluetooth device can connect to the phone within a 30 foot range. An attacker can use bluesnarfing and download, upload or edit files on a device without the owners permission. Default setting can be change by attacker.(Even once a Bluetooth device connected with phone, attacker can change the default setting also.) 20One survey in London found that 379 out of 943 phones had their default setting on and 138 out of 379 were vulnerable to attack. Making identical copies of anything is known as cloning. Cloning of a mobile device creates a second device, which has the same identical information as the original device. Cloning new phones is difficult while older phones were easy to clone with some basic equipment. 17Cloning of GSM phones is much more difficult in comparison to cloning of CDMA phones. Cloning of CDMA phones only requires a phones electronic serial number and mobile identification number. A few ALLTEL customers had their phones cloned during their visit to different places. Cloning can affect all carriers and all kinds of phones if they are left on. 21With less than $2000, any attacker can build a cloning device that can capture the signals from a mobile device. It can capture the signals sent out by the phone from up to a mile away and get the codes that identify the phone. Cracking and cloning are active threats to mobile banking. Cracking can be used to get sensitive data from the phone or to install malware w hile cloning can duplicate all information from the phone and an attacker can get about half of the information to identify the phone. 6,22Man-In-the-Middle attack(MIM) MIM is considered a threat to the confidentiality and integrity of people. It is a form of active eavesdropping in which attacker makes independent connections to victims by positioning him/herself in between two victims to take control of communication between them with the intention of interception and alteration of information and relays it to others, making them believe that it came from the other person and not from the attacker. The attacker must be able to intercept all messages and alter them while it is transit. It is also known as active wiretapping or traffic intercepting. The chances of this kind of attack increases with the use of wireless connection compared to other more secured connections. Viruses, malware and malicious code 24Malicious code is a software in the form of viruses, malware or worms. These kinds of software can be inserted into a system without the knowledge of the user. The primary intent of inserting the software is to gain private personal and financial information of the user and compromise the integrity and confidentiality of the system. It affects the victims private data, applications, operating systems or sometimes just annoys the users. 23Mobile browsers are susceptible to the same kind of security risks as home or office computers. Mobile browsers are little safer at this point compared to computers. With the increase of mobile banking, the numbers of these kinds of software will increase. However, at present, the increasing number of viruses and Trojan horses is the biggest concern to mobile banking security. 25The mobile devices running windows operating system are a favorite target for the hacker community. 26The first generation viruses were proof-of-concept viruses. The Commwarrior virus spreads over Bluetooth and MMS. SymbOS.skulls is a Trojan horse that affects symbian phones and changes all the application icons to skull icons. In 1994, the Cabir worm spread as an infected SIS package called caribe.sis. It spread via open Bluetooth connections and affected Symbian Series 60 phones. Timifonica virus infected PCs in 2000 and sent harmless text messages to cell phones. There are also software that infect mobile devices and look for personal information like stored password or other sensitive information. Some Trojans can steal address book information and send that information to hackers via SMS or MMS. 6Bluetooth can be used easily to spread these viruses. Most digital phones available today are Bluetooth enabled and any Bluetooth device can be infected within range. In Finland, a mobile malware was spread from Bluetooth to Bluetooth device during a soccer game. However, while Blueto oth is the easiest way to spread viruses it is not the only way. Malware have been written that use Internet and cellular networks to spread. SMS and MMS can also be used to spread viruses and malware. Therefore, this threat is a recent major concern for banks and users. Vast number of attacks can be launched with use of viruses and malware. Security countermeasures Security of mobile banking is an important and a crucial issue. In addition to that, wireless communication increases the vulnerability of the system. Therefore, more robust security system is necessary to protect the private personal and financial information of the users. Following are some of the countermeasures discussed in the paper. What kinds of countermeasures are more required and more available for which types of architecture model? User authentication 27Authentication is process of identification of something or someone as authentic. There are three different ways by which someone can be authenticated. These three categories are based on the factors of authentication: what you know, what you have or what you are. Each of these factors have a range of elements. Research has suggested that for better security at least two or preferably three factors be verified. If two elements are required for authentication it is called as two-factor authentication while two or more than two factors authentication is known as multi-factor authentication. 6FFIEC requires banks to use multiple forms of authentication for electronic banking. All mobile banking systems need to use at least two-factor authentication for user identification. 6Authentication techniques based on what user knows including a combination of the pin number, the username, the password and the onetime password for mobile banking. Research has shown security concerns with this technique as users use weak passwords, write it down or share with others. 28Therefore, to increase the protection of the mobile device pin protection or distributed pin verification scheme has been suggested in which one-half of the pin is stored in the mobile device and rest of the half is stored in a remote machine in the network. So the attacker can get only half of the pin from the phones memory. 6Another technique uses what user has. This includes ID card, cell phone, credit card etc. Use of any of the above forms is not a reliable technique as the user must have the physical possession of them. 6Biometrics is an another form of authentication that includes face, voice, fingerprint, DNA sequence etc. 18Clarke and Furnell found in a survey that 83% of populations were in favor of using biometric system for authentication. 29A report on biometric security for mobile banking in March 2008 discusses the different issues of the mobile banking and suggests use of biometric system for more robust security with the help of a users fingerprint as a biometric element. 6Behavior analysis can also be used as a security measure where users are granted or denied access based on their previous behavior. A robust system uses multiple forms of identification before and during use of an application and if necessary asks for more accurate form of identification. If the user fails they are locked out. Encryption 30Encryption means changing or transforming the information in an unreadable form to anyone with the help of algorithm. A key is required to make the information readable again. This process is called decryption. Encryption addresses the confidentiality issue. Encryption can be used to protect data at rest and in transit. There are vast numbers of incidents reporting data interception in transit. 6There are two different ways to protect the data on the phone. (1) Encryption of information stored in the phone and (2) Encryption of the information during communication. 31The current encryption technique is AES and ECC. The wireless data is encrypted with AES and the encryption key uses ECC to encrypt this data. They increase the speed of encryption and decryption and currently they are the most powerful technology available for encryption. 6CellTrust uses AES and micro clients to protect the SMS messages and send encrypted SMS messages. ClairMail recommends the use of SSL and HTTPS during communication. TPM is another tool that can help with encryption and protection of mobile devices. It is an embedded chip in the motherboard that can work with mobile devices or security smartcards. It can store keys, passwords, digital signature and certificates. 32TPM chip has a unique RSA key embedded in it during production. So it can be used to perform platform authentication. For example , to verify mobile devices seeking access for mobile banking. Digital signature 33Digital signature is an electronic signature that can be used to identify the authenticity of the message of the document. It is also known as digital cryptographic signature. It can be used with encrypted or unencrypted message. A valid digital signature indicates that the message or document was sent by a known person and it was not altered in transit. Digital signature also represents non-repudiation. Therefore, ones the message has been sent and digitally signed, the signer cannot deny that he/she did not sign a message. 6With the help of Digital signatures customer can sign the document and does not have to visit branch office. In mobile banking, adding a digital signature to the transaction proves that a customer authorized the transaction. 31At present digital signature technology uses RSA algorithm and ECC algorithm. Because of higher security level, low calculating processing speed, small storage space and low band-width requirement ECC will be more suitable for mobile banking. WPKI technology 34PKI (public key infrastructure) is a security mechanism for wireless internet and uses public key cryptography and certificate management for communications. It provides all four of the security feature for e-commerce: confidentiality, integrity, non-repudiation and authentication. 35WAP (wireless access protocol) is developed by WAP forum to provide a common format for internet transfers for mobile devices. The WAP stack includes five layers: WAE, WSP, WTP, WDP and WTLS. WAP consists of WIM, WTLS, WMLScrypt and WPKI. 31Wireless application protocol PKI is an extension of traditional IETF PKI standards used in wired network. It is mainly used in wireless network. WPKI applications have to work in a restricted environment like less powerful CPUs, less memory, less storage space, small displays etc. Therefore, WPKI must be optimized like the other security and application services within WAP environment. WPKI uses a public key system based on ECC algorithm for encryption and decryption. With the help of this system the information can safely reach to its destination. In the presence of other security protocols like WIM, WTLS and WMLScrypt of WAP, WPKI can fulfill all four security requirements for mobile banking: confidentiality of data, identity and authentication, integrity and non-repudiation. Conclusion The number of people use mobile devices is rising rapidly. Advanced technology in mobile device field has overcome the limitations of the older phones. Newer phones have a wide range of functions and improvement in hardware and software support, which enabled users to use mobile devices as substitute for computers. These mobile devices are capable of performing complex functions, which enabled users to manage their finances through mobile devices. There are three different kinds of architecture for mobile banking. SMS based system works in almost any mobile device. Web based systems are similar to internet system and they are more popular in the USA. The client application system offers robust solution to mobile banking. However, all of these systems have security issues those need to identified and addressed in a proper fashion. Confidentiality, authentication, integrity and non-repudiation are the most important security requirements for any mobile banking system. Authentication of the user and encryption of the data presents serious challenges to the mobile banking system. Implementing the various types of authentication and encryption technology can improve the mobile banking security, which reduces customers fear against security issues and increase

Monday, August 19, 2019

Men and Women Engaging in Non-traditional Sports :: Sociology Essays Research Papers

Men and Women Engaging in Non-traditional Sports What are the social and cultural costs and benefits of an individual (male or female) entering a non-traditional sport for their gender/sex (e.g. women who enter body building, power lifting, boxing; men who enter synchronized swimming or field hockey)? Social change has been marked by men and women participating in non-traditional roles for their sex. Athletics is one field where non-traditional roles are both applauded and derided by society. Female body-builders and male ice-skaters push the boundaries of what is socially acceptable in our society. While there are many rewards for such activity, there are also many costs, both to society and to the individual. There are many cultural and personal costs to engaging in non-traditional sport. Women and men face personal humiliation and the derision of friends, family, and society. They can be denied advancement in the work force, be ostracized by society, and suffer a multitude of slights and slurs. Women, in particular, bear the brunt of this particular brand of humiliation. Mere personal humiliation is not the only cost of non-traditional participation in sport. Some people may see it as a lessening of the game. For example, there are slightly different rules for women's basketball then for male basketball. By allowing women to play and compete in a supposedly "weaker" version of the game, we lessen the value of the game and the competition in which the players are engaged. Such difference also reinforces cultural beliefs that men and women cannot compete on a level playing field. Supposedly, women must have easier rules, because otherwise, they would not be able to play. This particular cultural attitude can arise from women participating in sport. However, it is a goal of such participation that that attitude be eliminated from our society. There are also a number of benefits to men and women engaging in supposed non-traditional activities. It pushes the boundaries or what is acceptable in our society, paving the way for future pioneers. It makes difference more acceptable in our society by not backing down. We can only become more accepting of other people when there are such extreme points of view out there to compare our opinions to. Athletics, in general, benefits with the presence of both men and women in all sports. With such a wide range of potential competition, sport is much more exciting and rewarding - personally and monetarily. Both sexes contribute something to their respective sport, and challenge the other to accept new ideas and change.

Sunday, August 18, 2019

Falstaff :: essays research papers

Romanticism, as stated in the American Heritage Electronic Dictionary is, "An artistic and intellectual movement originating in Europe in the late 18th century and characterized by a heightened interest in nature, emphasis on the individual's expression of emotion and imagination, departure from the attitudes and forms of classicism, and rebellion against established social rules and conventions." Falstaff is the ideal romantic character. In an article written by Harry T. Baker titled, "The Two Falstaffs" Baker writes against all the critics who claim that the Falstaff from Henry IV parts I and II is a different character then the Falstaff in The Merry Wives of Windsor. He believes that, "although, as the critics declare, Falstaff is not himself, this is due to the [change in] situation, not to the inconsistency of character portrayal." In Henry IV parts I and II we see Falstaff as the romantic character that is stated in the definition above, defying everything that the Classical character, Prince Hal, stands for and believes.. He refuses to take life seriously. He believes that "War is as much of a joke to him as a drinking bout at the Boar's Head." He uses people solely for his own purposes, either for money or for food and drink. He is rude and crude to all those around him and is one of the best liars who continually gets caught in his lies but makes new ones to cover for the old failed ones. Yet Baker states that, "His presence of mind and quickness of retort are always superb; his impudence is almost sublime. Yet the man thus corrupt, thus despicable, makes himself necessary to the prince that despises him, by the most pleasing of all qualities, perpetual gaiety. Falstaff creates around his capacious bulk a sort of Utopia which frees us temporarily from the worries and troubles of the actual wo rld. What does it matter that Falstaff ridicules chivalry, honor, truth-telling, and bravery in battle? He is not to be taken seriously...he is a wholly comic character." At the end of Henry IV part II we can see what happens to Falstaff when he is surrounded by reality, he is caught off guard and is out of place. Baker states that when Falstaff is entangle with the realities of life "he cannot shine." We see this first at the coronation of Hal, once his friend in mischief, when Falstaff is told, quite bluntly by Hal that " I know thee not, old man.

Wealth Disparity in the United States :: essays research papers

Wealth in the United States has always been unequally dispersed among African Americans and whites, even dating back to the 1800’s. African Americans own less property, are less educated, and are in a lower socioeconomic class than whites. Policies since the 1960’s have been implemented in the United States, such as welfare, to help lessen the gap between the two, but the evidence suggests that these policies have not worked to their potential.   Ã‚  Ã‚  Ã‚  Ã‚  Furthermore, the question that the author is trying to answer is what can be done to help lessen the wealth gap between African Americans and whites. The author looks at affirmative action, business ownership among blacks, but overall focuses most of his attention on home and property ownership.   Ã‚  Ã‚  Ã‚  Ã‚  The author suggests that to achieve the goal of racial and class equality, a policy needs to rely on socioeconomic status, but especially take a person’s assets into account. Whites own substantially more property than blacks, which creates a large gap in assets between blacks and whites. While many blacks want to live in integrated neighborhoods, white neighborhoods do not want their property value declining, so therefore white flight ensues. The author proposes to have a policy that guarantees that black ownership in a neighborhood will not top 15 percent, so whites would be less likely to leave. Also, many incentives have been proposed to help the poor gain prosperity, such as a national wealth tax. This tax would make individuals review their assets and liabilities, and then individuals would be required to pay the government a percentage of that net worth.

Saturday, August 17, 2019

False Claims

Rgtgfggdgdfsgggggggggggggggggggggggggggggggggggg ggggggggggggggggggggggg ggggggggggggggggggggggg ggggggggggggggg gggggggggggggggg gggggg dfdfdf fdfdfdf dfdfdfdf dfdfdfdf ffdfdfd dfdfdfdf dfdf fdfdfdf d dff dddwsassee eeerrr errerer rerwren e rr er e re re rer e rer e r ere r er ert rtytytuy tyu ty ty u yuyuty ty rt yrtyrtyrt t yty try ty rty try rty rt yrt rtughuuhhihuihuh ewwewewe wewewe ttttt rrrrrr 45 45 45 njknjk hnjh lkl kl kl k mnkmnk nkn klj kj kj kj k jkj kjkj dffdf dfdfd t rt rtrtrdfdfdfdftrrt rtrt rtrt ererererre yty tytyt ererer er iujiuiu jk jk jk jk j It’s normal and therefore acceptable to have mistakes and undeveloped sections in your first draft. However, if you don’t understand the criteria or the mistakes I’ve pointed out, please see me. If you have many areas marked â€Å"no evidence,† don’t try to revise your first draft; it’ll be easier to start over.The problem section eventually needs to include all of the following, so me of which may be in the same paragraph though others will take several paragraphs: A. an anecdote (a story that illustrates the problem—this should be your first paragraph); this’ll be in a your own words today, but in later drafts you’ll quote the original; B. a definition and description of the problem–an explanation of what it is; define key terms; C. relevant background (maybe scientific or historic); D. the size/scope of the problem (usually, the number of cases in a given time frame for a given area as well as some statistics on how wide spread the problem is); E. consequences of the problem (what happens as a result of the problem, which could include multiple.

Friday, August 16, 2019

How to Achieve Your Goals

Achieving Your Goals â€Å"The greatest discovery of my generation is that human beings can alter their lives by altering their attitudes of mind. † – Lee Iacocca In today’s work world you have to be aware and be prepared for survival. Awareness starts with accepting the breathless pace of the ever growing technology and the fact that corporations can no longer guarantee job security. The job requirements keep changing with the advancements in technology. Lifelong learning is essential if you want to go with the flow and not drown in it. Up and ahead is not the only direction to move in an organization.If your sole definition of success is getting promoted or advancing in pay/status/job title, then you are not thinking broadly enough. In the new world of work, it is important to consider multiple directions in which your career could move and to focus on those moves that help you develop your employability the most. Focus on progress, not perfection. Flexibility is the key to it all. Self-Managed learning gives us that flexibility. Below are some pointers which will help get us to focus on achieving our goals: Aims & Requirements: First things first. Write down clearly what you are aiming at.What do you want to do? Why do you want to do it? Who do you want to be? What would you get out of it? Where do you want to reach? What all would you need to know to get there? Now picture yourself there. Keep that in mind always even when you face with failures. This will help you keep moving forward. Set achievable and realistic goals. Creating a Time Table: Whatever may be our goal, making a time table always helps us manage our time properly. For example, If we were on a ‘weight loss’ goal keeping a record of all our calorie intakes, the time we take to work out along with our daily routine will help us a great deal.We will know where we are going wrong, where we need to improve, what all could be done to help us improve ourselves. It k eeps us in check and helps us know our progress. There could be a column in which we can self-assess ourselves (give grades and fun remarks) to motivate and encourage us to go on. Yes, it would be a pain keeping tabs, but hard work pays more than short cuts ever will. Personal Orientation: Personal Orientation helps us to understand how we relate to an environment/situation/relationship. It gives us the opportunity to discover our aptitudes, interests and aspirations.When we are looking for a job in a company, this could help us to know what we can give to them. It could also help us to align our interests to what the company is looking for. For personal orientation you should learn to explore your world. Make mistakes and learn from them. It will help you make better choices suiting your interests. In short, personal orientation will help you feel more sure of yourself in this complex and ever changing technological world. Deadlines: Deadlines help us to make use of our time more e fficiently so as to get maximum output. It also helps to keep laziness at bay.When you know something has to be done within the specified time limit you tend to work harder to get it done. When things get hard we tend to keep it off until the next day. Deadlines keep a check on that. Without the urgency of a hard deadline pushing your work to completion, it’s easy for you to lose focus. As illustrator Christoph Niemann pointed out in a 99% interview, â€Å"Deadlines can actually help us by creating a fixed window of opportunity that requires us to be focused, pragmatic and decisive: In advertising, and also editorial, when people have 2 days, the briefing is much better, and the discussion is much better.It’s not that people just sign off on anything because they’re in a hurry. They’re just really looking at what they have, and trying to make the best product, and get it done. The problem is when people have too much time on their hands. Because then at some point everybody’s going to question, â€Å"Why did you make it red, not green? † and â€Å"Could we try it upside-down, or left to right? † and then at some point it becomes arbitrary. If the anxiety is about the deadline, then the energy really focuses on the result. If there is not anxiety about a deadline, all of the anxiety goes right to the creative part. Review your progress regularly Keep reviewing your progress daily. This will help you get back on track if you go off course. Monitoring your progress might also motivate you to work harder. These could be included in the Time table. Celebrate! Congratulate yourself when you manage to get through an especially tough spot. Give yourself a treat. Self-Reflection & staying true to your goals: â€Å"By three methods we may learn wisdom: first, by reflection, which is noblest; second, by imitation, which is the easiest; and third, by experience, which is the most bitter. –  Confucius How true the se words ring. No matter what goals we have set for ourselves or how efficient we have made our time table unless we really truly believe we are capable of it, we will most probable fail. Self-reflection is important. We have to understand and conquer our fears, come to terms with our inner self and strengths. This might seem a waste of time for most people but that’s not so. Being able to remove all those thoughts and feeling which are holding us back from giving our 100% can open so many doors for us. We will not be afraid to take the next step. It will help us grow as a person.We have to believe we can do it. And then we will become what we believe. Making goals is easy, but working towards achieving them might not be so. Anything worth having takes time and effort. So be prepared to face challenges to get what you want. Don’t let obstacles damper your desire for success. Even after having set your goals getting started is often the hardest thing to do. But doesnâ⠂¬â„¢t success taste the sweetest after some hard work? Try to follow your plans with a true heart and I’m sure you’ll success in every walk of life. And yes, pray to God! He will help you with it all!