Wednesday, July 31, 2019

Corwin Corporation Analysis Essay

EXECUTIVE SUMMARY The purpose of this of document is to analyze the factors that led to the Corwin’s project failure. Corwin Corporation’s relationship with a good customer, Peters Company was strained because of Corwin’s failure to follow their management policies. A fixed-price contract was signed without proper risk analysis, the was no evidence of a project plan and the situation was made worse by the lack of support from management. This report discusses the failures in project selection, lack of executive support and communication breakdown, all of which lead to the project being terminated by the client. INTRODUCTION Corwin Corporation accepted a project which was outside their scope of work from Peters Company to develop a specialty product. They accepted the assignment based on a rough draft and without analyzing the risks and thus  leading to the project being later terminated by Peters Company and jeopardizing their long-standing good relationship with the client. The project started before the contract was signed. Corwin’s failure could be attributed to a number of errors that were made on accepting this assignment. A number of important factors like the management policy, were completely ignored. Corwin agreed on a fixed-price 5-year contract based on a rough draft, no proper analysis was done and the scope was unclear. This meant that Corwin would be responsible for any cost overruns incurred. It is never advisable to accept a fixed-price contract without determining the client’s needs and whether or not they are achievable. Corwin failed to assign the right person to manag e the project. An inexperienced Project Manager was tasked to lead the project and although one of the senior managers had doubts about the project manager’s capabilities to lead such a project, his concerns were ignored. Effort Corwin allowed an in-house representative direct access to the lab which ultimately left the employees unhappy and disgruntled. The lack of management support also played a major role in the project’s failure. Management was dealing with the issues raised by the project manager passively and hoped the â€Å"situation would correct itself†. The requirements were poor and the schedule was unrealistic. Poor project selection, lack of support from top management, non-existent change management control and communication issues were identified as areas of concern within the Corwin Corporation. For the purpose of the case study, the researcher will be discussing how these project management principles/concepts, if followed properly could have prevented Corwin from accepting this project. CASE ANALYSIS 1. Project Selection Project Selection should not be perceived to be a tedious and unnecessary exercise but as an important exercise that would be beneficial for the customer and the contractor. A number of factors such as production consideration, marketing consideration, financial consideration, personnel consideration and administration consideration, need to be taken into  consideration to ensure that the project is in line with the organisation’s strategic objectives. 1.1 Poor Project Selection Corwin established a management policy that governed the project selection process for the evaluation of specialty product requests. (Burke: 67) states that â€Å"The selection of the right project for future investment is a crucial decision for the long-term survival of a company†. Frimel’s failure to follow the management put the company’s reputation at risk. Following the project selection process assists companies in deciding which projects to pursue and which to let go. Most of the executives were away on vacation which means that the project was not evaluated using the company’s selection method and without the executives’ consultation. It is important to note that during the evaluation process, individuals with different with backgrounds and subject-matter expects should been involved to make an informed decision whether or not to take on Peters Company offer. In this case, the major decision-makers were away on holiday. Peters Company came across as bullying and threatening in their requests thus this might have led to Corwin accepting the project to save their business relationship. This project was outside Corwin’s scope and should have never been accepted. It answered â€Å"NO† on the first criteria of the management policy therefore it wasn’t viable. 1.2 Proposal Preparation A proposal is a response document to the RFP (Request for Proposal), it includes a plan of action, states why the action is necessary and persuades the customer to approve the implementation of the recommended action. The proposal should also include a plausible management plan and technical approach. To create winning proposals, it is important to have resources with relevant skills and expertise e.g. subject matter expects, to help prepare a quality proposal. Royce used inappropriate and unskilled resources to prepare the proposal. He had reservations about selecting West; despite his lack of experience in dealing with external projects, as the Project  Manager without Dr. Reddy’s (R&D Manager) input but he ignored his instincts. The proposal preparation was conducted by contracts man who was not familiar with fixed-price contracts. Royce was overly optimistic in estimating the cost and didn’t include contingency to cover unexpected situations that may arise during the project. (Clements & Gido, 5th Edition: 69) states that â€Å"if the estimated costs are overly optimistic and some unexpected expenditures arise, the contractor is likely to either lose money (on a fixed-price contract) or hate to suffer the embarrassment of going back to the customer to request additional funds to cover cost overruns†. Corwin’s final proposal to Peters was a technical document as it contained engineering intent and cost summaries which were also not properly done. This later in the project resulted in scope creeps which saw Corwin’s profit on the project diminish. 1.3 Contract Negotiation Fixed-price contracts are beneficial to the customer but not the contractor. Before signing this type of contract, the customer should have a detailed scope work from the customer. There are risks associated with this type of contract for contractors, i.e. the customer is liable for any cost overruns should the project run beyond schedule, budget and time. Agreeing to a fixed-price contract was also one of the contributing factors that led to the project’s failure. Although the profit margins sounded appealing on the phone during Delia and Frimel’s conversation, they looked different on paper. The disadvantages of such a contract for Corwin far outweighed the advantages for Peters Company. (Clements & Gido, 5th Edition: 76) states that â€Å"Fixed-price contracts are most appropriate for projects that are well defined and entail little risk†. It is good practice to start working on a project after the contract has been signed. Corwin worked first and signed later . 1.4 Risk Management Ignored Royce made a commitment to assess the risks once he got hold of the specification sheets. Looking at the Cost Summary in the proposal, one can  conclude that he never kept to his commitment since it didn’t even include the contingency amount. â€Å"Some level of risk planning should be done during the initiation phase of the project life cycle to make sure, for example, that the contractor understands the risks involved with bidding on a proposed project† (Clements & Gido, 5th Edition: 270). Risk assessment therefore is an important aspect of project initiation because it helps the contractors make better decisions, negotiate fair contracts and create risk mitigation methods. A good risk assessment takes into consideration anything that could go wrong with the project and determines what it would cost. Accepting a project outside Corwin’s scope area of expertise was a risk, appointing an inexperienced scientist from the R&D department was a risk, agreeing to a fixed-price contract was a risk and procurement of all materials was a risk. Corwin resorted to risk aversion. 1.5 Project Kickoff Meeting West solicited support from other groups after sending the proposal to the customer. This left his colleagues unhappy because of the lack of communication about the project objective. It is the project manager’s duty to involve the project team at the early stages of the project to clearly define the project objective, gather support from the departments affected by and involved in the project and define each member’s role and responsibility. †The project manager spearheads development of a plan to achieve the project objective. By involving the project team (Clements & Gido, 5th Edition: 303) in developing this plan, the project manager ensures a more comprehensive plan than he or she could develop alone†. Project kickoff meetings provide a good platform for the project manager to deliver a presentation about the meeting and its importance to the organization. Clear roles and responsibilities of each project team member must be discussed. An understanding of each member’s role in a team reduces communication issues and late deliverables. This will not only help him gain commitment from the team but it will also assist in accomplishing the project objective on time, within budget and of the right quality. 1.6 Change Management At the start of the project, a change control system needs to be established to define how changes will be documented, approved and communicated† (Clements & Gido, 5th Edition: 320). The project manager did not have proper change control procedure in place. The in-house representative made changes to the scope, which resulted in scope creep. His changes were not documented and communicated and were not within the budget. When he requested an additional five tests beyond the agreed scope, the project manager should have evaluated the request and provided Peters Company with a proposal outlining the costs to add the tests to the scope. Uncontrolled change exposed Corwin to unnecessary risk. A change control process is significant to the successful delivery of a project and ensures that each change introduced to the project environment is appropriately defined, evaluated and approved. The project manager in this case struggled to control changes in the project because he didn†™t have proper process in place and that he lacked project management experience. 1 Lack of Management Support Top management support is the most important critical success factor for project success. Many projects fail because they have only passive senior management support. In mature organisations, executives act as project sponsors. In this case, Royce (VP of Engineering) should have been the project sponsor. The role of a sponsor is to â€Å"ensure that the correct information from the contractor’s organisation is reaching executives in the customer’s organisation, that there is no filtering of information from the contractor to the customer, and that someone at the executive level is making sure that the customer’s money is being spent wisely† (Kerzner, 7th Edition: 475). The project failed to achieve an enthusiastic approval from the president, there was little hope of it being successful. Projects need some involvement by executive management to allocate needed resources appropriately to the projects. The executives set strategic goal for organization and uses projects to meet those goals. They need to provide guidance to project managers that is in line with the organisation’s strategic objectives and track the alignment of those objectives to the  project objectives. Frimel, after initiating the project, distanced himself when he handed full responsibility over to Royce and went on vacation. Frimel had experience in these types of projects because his department was the decision maker for the specialty products. He should have acted as project sponsor and supported Royce but instead, left him to fail. During the first meeting in which the project was discussed, Dr. Reddy (R&D Manager) expressed his dissatisfaction about the choice of project manager Royce had made. 2.7 Organisational Structure and Culture â€Å"The organizational culture, style, and structure influence how projects are performed† (PMBOK, 4th Edition: 27). Corwin has maintained a functional organisational structure for more than 15 years. In functional structures, project managers do not full control over the project teams. One of the disadvantages with this type of structure is the competition among functional departments. Corwin’s Marketing department made almost all the decisions, project managers for specialty products came out of marketing. The Engineering department as stated in the case study, â€Å"was considered merely as a support group†. The Vice President for engineering mentioned at some point that his vote never appeared to carry any wait. The morale was very low in some departments as they felt that they were not as valued as the other departments. Reddy did not give much support to the project manager and later contradicted himself that the project manager â€Å"kept him in the dar k†. His unbecoming behaviour can be attributed to the fact that the Vice President failed to heed his call about his reservations towards the choice of the PM thus, he became so reluctant to assist the PM. A healthy organizational culture encourages accountability and personal responsibility. Denial, blame and excuses harden relationships and intensify conflicts. 2 Poor Communication The president’s reluctant authorization was interpreted as â€Å"the boss gave his blessing†. â€Å"†¦ phone conversations allow the listener to hear the tone,  inflection, speed, volume and emotion of the voice† (Clements & Gido, 5th Edition: 371). A reluctant voice sounds differently from an enthusiastic voice on the phone. The project manager failed to communicate timely to the executives about the representative’s interfering behaviour, he thought he could handle it. The situation spiraled out of control when the representatives started giving orders to the project manager about removing functional employees on the team. Providing the customer with progress reports frequently, keeps the customer in the loop and informed about the status of the project. Communication skills are one of the most important skills every project manager should possess, it very important that the project manager communicates with the stakeholders and project team. The project manager should have escalated problems as they occurred and scheduled meetings to resolve them. He should know what needs to be communicated to who and when. CONCLUSIONS Corwin Corporation failed to follow its own management policy, took on a project, and neglected to apply the proper management principles. The executives were not part of the contract acquisition and failed to develop and nurture the project manager. The organizational culture was such that all departments were equal but some were equal more than the others were. This resulted in people wanting to prove themselves worthy by taking on big projects even though they lacked experience. The project manager was set deliberately set to fail, the manager knew his strength and weaknesses but was unavailable to assist until the last minute. Corwin did not have a house rules in place with regards to in-house representatives. Corwin didn’t work the plan and therefore couldn’t plan the work. RECOMMENDATIONS * Top management need to educate employees on the management policy regarding new projects. Functional managers need to lead this drive. * The Engineering department plays as much a role in decision making as the Marketing and Manufacturing department. The R&D bring innovation of the products in the organization and thus should not be seen as a support group. * The project manager’s mistakes were attributed to his lack of  experience. The PM should continue to lead small projects and the organization must provide Project Management training for aspiring project managers within the company. * The staff’s morale is low at this point, management needs to organize team-building to boost confidence and foster and repair relationships * Create cross functional teams to function as self-directed respond to specific directives REFERENCES James P. Clements & Jack Gido. 2007. Effective Project Management. 5th Edition. South-Western: Cengage Learning. Harold Kerzner, PHD. Project Management: A Systems Approach to Planning, Scheduling, and Controlling. Seventh Edition. USA: John Wiley & Sons Inc. PMBOK ® Guide . 2008. A Guide to the Project Management Body of Knowledge. Fourth Edition. USA: Project Management Institute.

Tuesday, July 30, 2019

Othello has been called a ‘domestic tragedy’

A domestic tragedy takes place in a personal setting. In Othello, the men are in Cyprus to fight a war. However, the tragedy is the events within the relationships of the central characters. There is little discussion of the war and, although Desdemona blames state matters for Othello's change in behaviour, the real problems Othello faces are matters of the heart. The women in the play have no part in the war, but still their presence contributes to the downfall of both Othello and Iago, creating repercussions for the state. The historical context of the play is important when considering the female characters contained in it. The play was first performed in 1604 at the start of the reign of King James I. It is generally thought that wives were expected to be obedient to their husbands at this time, and play the â€Å"maiden never bold†, as Desdemona is described by her father in Act One, scene three. However, the time of the play's first performance was shortly after the reign of Queen Elizabeth I. Elizabeth never married and is known to have been of strong character. It is therefore likely that a strong-willed female character would have been accepted by an audience of this time. A feature of the play that should be considered is the misogyny shown by the male characters. In the first scene of the play, the language used by Iago to describe the sexual acts of Desdemona and Othello is coarse, â€Å"an old black ram Is tupping your white ewe†. The sexuality of women is valued little by the men in the play, except for Othello who seems to over-romanticise it. Iago is coarse and rude. Cassio is seen as a ladies man, but uses women for sex. Roderigo shows very little knowledge of Desdemona but loves her for her beauty. Othello is similar to this, he idealises Desdemona, showing little understanding of her as a person. As Leavis says, Othello has a â€Å"preoccupation with his emotions rather than with Desdemona in her own right.† The three men, Othello, Iago and Cassio, all have a typically male profession, that of a soldier. They are all, including Othello (despite his romanticism), very masculine characters. Othello's lack of understanding and failure to attempt to understand, the complexity of women contributes greatly to his downfall. The character of Desdemona is a complex one. She has strong beliefs and shows complete devotion to Othello. Her main belief is in true love, and her views on this never falter. She will do anything to maintain her love with Othello. Her first appearance in the play shows bravery, a true love of Othello and complete trust in him. It is here she first expresses her views on love. â€Å"to his honours and valiant parts Did I my soul and fortunes consecrate.† Desdemona believes that to love someone is to give oneself to them completely. She has a very idealistic view on love and this is shown again in Act Four, scene three when she is discussing unfaithful women with Emilia. â€Å"Dost thou in conscience think – tell me, Emilia – That there be women do abuse their husbands In such gross kind?† It is her innocent and naà ¯Ã‚ ¿Ã‚ ½ve views that show what Desdemona represents in the play. In ‘The Othello Music', Knight says â€Å"In Othello, pure love is the supreme good†. Desdemona's main belief is in pure love. This leads to the conclusion that Desdemona represents goodness and purity within the play, as when she is dead, Knight says â€Å"pure love lies slain.† Another value Desdemona possesses is compassion. When Cassio loses his status as Othello's Lieutenant, it is Desdemona that he goes to for help, under the instruction of Iago. Even though Iago is doing this to benefit himself, what he says to Cassio of Desdemona is entirely true. â€Å"She is of so free, so kind, so apt, so blessed a disposition, that she holds it a vice in her goodness not to do more than she is requested.† As Knight states in ‘The Othello Music', Desdemona â€Å"is typically feminine in her attempt to help Cassio, and her pity for him.† Othello also tells the Senate in Act One, scene three that he loved Desdemona â€Å"that she did pity† him for the dangers he had passed. It is femininity that Desdemona also represents in the play. She is loved and admired for her girlish innocence and feminine compassion. Emilia represents a more down-to-earth, common sense woman. Her personality, like Desdemona's is feminine in many ways. For example, she is highly protective over Desdemona, acting as a mother figure to her. The femininity she represents is more mature than Desdemona's. As she is older than Desdemona, and has been married to Iago for a longer time than Desdemona to Othello, she is far more knowledgeable about love and life. She is also more cynical and far less romantic in her views. In her conversation with Desdemona about unfaithful women, she openly admits that she would be unfaithful to her husband if the whole world were her reward. Lianne Evans â€Å"who would not make her husband a cuckold, to make him a monarch?† Emilia knows that love and men are not as ideal as Desdemona believes them to be. When Othello's behaviour towards Desdemona changes, Emilia, unlike Desdemona realises that something is wrong with the relationship and that Desdemona should not let Othello treat her in such a way. â€Å"I would you had never seen him.† She stands for strength and common sense, and her views about marriage show this clearly. â€Å"Let husbands know Their wives have sense like them†. Bianca represents a quite impure love within Othello. She shows that she loves Cassio, but her lifestyle as a prostitute also shows this as quite corrupt. She represents the opposite of the innocent and naà ¯Ã‚ ¿Ã‚ ½ve Desdemona. She is a woman with no responsibility to anyone but herself in the play. She has a relationship with Cassio but her reputation does not allow this to be taken seriously by anyone, including Cassio himself. She represents a love with few morals. Desdemona believes in completely faithful, perfect love, Emilia believes that being unfaithful is acceptable for a large price and Bianca, although she seems to care greatly about Cassio, has still made her living as a prostitute. She may show strong character in some areas, for example, when Emilia insults her, she comes back with, â€Å"I am no strumpet, but of life as honest As you that thus abuse me.† This shows that she is prepared to stand up for herself and her lifestyle, implying that she believes it is right. It is important when performing Desdemona to a modern audience to portray the strength of her beliefs. Bradley has described Desdemona as â€Å"helplessly passive† and I believe that this view of Desdemona should be avoided. To achieve maximum impact with a modern audience, it is important not to show Desdemona as a helpless victim of abuse, or too stupid to do anything about her unhappy relationship. For Desdemona to be admired and sympathised with, it would be necessary to show her stronger qualities. The reason she allows Othello to treat her with such disrespect is not because she is passive or helpless. She has already shown courage when she first appeared in the play, betraying her father for her love of Othello, and speaking out in front of the Senate. Her dogmatic nature, belief in pure love and loyalty to Othello are the qualities that would achieve a maximum impact with a modern audience. However, it would also be important to show her youth and innocence, being careful not to confuse this with stupidity. She always knows what she is doing, even though it is sometimes misconceived. When standing up for Cassio to Othello, it would be important to show her feminine charms and kind intentions. This would make it believable for Othello to suspect her of adultery, as her nature is so friendly. Emilia appears to be the most modern character of the three women in Othello. Her views on marriage would be much appreciated by a modern audience and her cynicism and wit would be found amusing. Many modern women could easily relate to Emilia. Portraying her mature, worldly personality would be very effective with a modern audience. It would also be important to show her loyalty, especially to Iago. It is clear that Emilia loves Iago as she stands by him throughout the play, until she discovers the real truth about him. According to Bradley, Emilia â€Å"remains perfectly true to herself†, but this is not true. Iago has a great influence over Emilia's actions, and because of Iago, Emilia compromises her own judgement. In stealing Desdemona's handkerchief she is doing something that she knows is wrong, but she does it all the same, just to gain the love of her husband. Showing his power over her would create sympathy for her. Her belief in her husband's honest nature, along with everyone else's, is part of the tragedy of Othello. At the end of the play however, Emilia's common sense returns and her most important scene would need to be performed effectively to create maximum impact. To do this it would be necessary to show Emilia's anger, frustration, hurt and disgust. The character of Emilia is very likeable with a modern audience, and it would be important not to lose any of her strong, amusing and loyal qualities. Performing Bianca would be a difficult task. Her character has little substance and it would be easy to lose her in a performance. Within the play she is mainly ridiculed and insulted. A modern audience could show admiration for her when she approaches Cassio about the handkerchief he gave her. As an actress, it would be important to show Bianca's strength here, and her belief in herself. Bianca could also be sympathised with as her love for Cassio is unrequited and despite her attempts to woo him, he only ridicules her. In general, a modern audience can sympathise with all the women in the play. All, despite their strengths, suffer at the hands of the men in their lives. Desdemona's unfaltering belief in pure love only results in Othello's killing her. Emilia's loyalty and strength leads her to being murdered, also by her own husband. Bianca's love for Cassio only brings her ridicule. In a modern society this supports the radical feminist view that no relationship with a man is beneficial to a woman. Each woman displays different feminine qualities. Desdemona's approach is obedience, Emilia's is loyalty and Bianca's, persistence, but none of these bring them any rewards. The women in Othello are so often misunderstood. The majority of criticism on the play is written by males and there is very little comment on the female characters at all. This has led to difficulty in performing these characters to create a Lianne Evans maximum impact with a modern audience. However, their roles are clear. They all show the negative qualities in the male characters, but at the same time have an effect on their lives. The play is a domestic tragedy but the effects of the domestic lives of the characters are shown in all aspects of their lives. The misunderstanding of Desdemona, Emilia and Bianca, within the play and in audiences has led to misinterpretations of their characters. To create a maximum impact with a modern audience, the female characters need to be given their own personality, and the effects they have need to be shown. Without the women going to war with their husbands, the tragedy of Othello would be a very different one.

Monday, July 29, 2019

Putting Physical Activity Where It Fits in the School Day Essay

Putting Physical Activity Where It Fits in the School Day - Essay Example The intervention that was applied was the ABC (Activity Bursts in the Classroom) for Fitness, which was reported to incorporate brief bursts of activity in the classroom setting throughout the day at the discretion of the teacher. The results indicated that the proposed intervention, the ABC for Fitness Program, was effective in improving academic performance, physical fitness, reduce medication use, and even preserve teaching time. As disclosed, there were limitations in terms of the population not being an effective representative of the cross-section of the children; the use of a relatively small sample size; and virtually limited intervention and follow-up periods. Overall, the study provided relevant insights on the feasibility of classroom-based fitness program without impairment of academic instruction. The reporter found the study beneficial and useful to various academicians and health practitioners in terms of promoting health through the identified ABC for Fitness Program. Its applicability is relatively easy and would not hamper any existing instructional methods or the need to use special resources. As disclosed, the 30 minutes recommended daily physical activity could significantly improve identified crucial variables such as academic performance, physical fitness, and even the use of medications for ADHD and asthma. This study proves that through innovative techniques and with the assistance of dedicated and committed educators, the goals for health promotion programs (HPPP) could be achieved.  

Sunday, July 28, 2019

Sap Essay Example | Topics and Well Written Essays - 1000 words - 2

Sap - Essay Example In allocating costs, SAP utilizes transaction based and periodic allocations. Periodic allocations are generally known as periodic reposting methods. Periodic reposting enables the user to adjust postings transferred to cost centers, business processes or internal orders. Transaction postings made under periodic reposting yield similar results to those posted under transaction based reposting (Periodic Allocations). Under periodic allocation, reposting has an effect felt only once on actual costs incurred at the end of the period. Postings are usually made on costs related to controlling, which include telephone, postal charges, and insurance costs that are all accounted for in financial accounting. These costs incurred are then posted to an allocation cost center or a specific business process. Periodic reposting widely uses distribution and assessment allocation, and indirect activity allocation method. Under distribution and assessment methods, primary and secondary costs are allocated from cost center accounting and activity based costing. Allocations can be based on costs or quantities where the user is dealing with indirect activity allocations. The costs or quantities are collected on a cost center during the accounting period and allocated to receivers according to keys defined by the user. These are the same methods used in indirect allocation method except that exchange of activities is not the basis of allocating costs or quantities. In indirect allocation, distribution and assessment methods utilize user defined keys such as amounts, percentages, statistical key figures or assignment basis provided for by the amount posted. Distribution and assessment methods define keys as well as the sender and receiver relationships only once; therefore being easy to use. Methods are also advantageous over direct allocation methods in that they can be used for cost centers (Periodic

Saturday, July 27, 2019

The Role of New Media in Shaping the Image of Cultural Diversity in Essay

The Role of New Media in Shaping the Image of Cultural Diversity in Britain of the 21st Century - Essay Example Culture diversity also describes a variety of dissimilar communities or individuals with divergent origins, faiths and customs all co-existing and intermingling with each other. The assorted societies around the globe are distinct from each other. Their cultural disparities are clear from the way they dress, talk and relate among others. There are also considerable disparities in the way communities structure themselves, in their mutual presumption of morality and in the manner they interact with their surroundings. The conception of cultural variety is grounded on the notion that cultural personalities should not be discarded, but rather sustained and valued. The basis of this notion is that every culture and ethnic group has distinct characteristics (Amin, p. 20, 2002). Cultural diversity also comprises of having an open mind that recognizes, allows, values and even celebrates the varied ways in which individuals live and interrelate in the globe. Appreciation of this cultural vari ety makes a person understand that despite all these variations, as human beings, we look for similar things. These crucial things encompass well-being, respect, acceptance, autonomy, and equity. Features of diversity include age, cognitive structure, customs, economic background, instruction, ethnicity, gender personality, geographic milieu, language, pious beliefs and political inclination among others. However, some critics assert that this phrase is frequently misused to describe the diversity of human communities or cultures in a certain locale or the globe. This trend is referred to as multiculturalism as opposed to ethnic variety. The ethnically destructive action of globalization has had an unconstructive impact on the world’s ethnic variety (Alibhai-Brown, p. 89, 2000). Cultural Variety in Britain The two world battles of the previous epochs, the resultant disintegration of empires and the advancement of transit technology considerably changed a lot of things in Euro pe. Since this era, massive immigration started into both Europe and the UK. This rate has, however, reached extraordinary levels in the previous decades. In 2005, the population of Britain was anticipated to reach seventy million with the seventy percent increase attributable to enormous immigration. Britain was formerly an extremely homogenous community. However, since WWII, Britain has become considerably varied as it has hosted massive immigrant populations. The mixtures of cultural associations complicate the procedure of describing Britain as appearing of behaving in a certain manner. Britain has gained from this cultural diversity all through its long history and most presently it is amongst the most ethnically diverse nations in the universe. The UK has a long account of racial and cultural variety. Current decades have seen significant immigration of dissimilar racial associations into the UK from around the globe. This has generated a community extremely diverse in the 21s t epoch. This is with conceptions such as super diversity which have surfaced in an attempt to express the diversification of variety. The massive immigrations have pushed the coalition administration to establish stringent immigration controls. However, overseeing cultural variety is a complex and tricky challenge. Administrative regulations directed at fostering cultural variety over the previous year have failed to foster social assimilation and cohesion as envisioned. The administration’

Friday, July 26, 2019

The Cranes by peter meinke Essay Example | Topics and Well Written Essays - 1000 words

The Cranes by peter meinke - Essay Example The bare plot of the story is quite simple: a couple who have mated for life are driving on the seashore and watching the Whooping Cranes, which also mate for life. They admire the cranes and wish that they could see a mating dance. There is not any time to wait, because the woman has a terminal disease. We are never told what the disease is, but we can guess at lung cancer from her coughing. At the end of the story we are not quite sure what will happen, but the author hints that the husband will kill the wife and then himself. The most ironic note in the story is that Whooping Cranes were once almost extinct, but are now a viable population. We might wonder if humans who mate for life are as lucky. We learn all of this in a just a few pages, because the writer uses what we now about the cranes and what most people know about the controversial subject of euthanasia is also used. The description of the tall and stately cranes hints at how the author see the two people, dignified. This is a mainstay of the euthanasia controversy, that people have the right to die with dignity. We find out how old the couple is by the conversation. The man says that he has been coming for years and never seen a Whooping Crane. When she says they make the little birds look like clowns makes him mention that he could use some laughter. This prompts her to wonder if this is the right things to do. She says she feels responsible. It is then that we get a fuller picture of this couple, who have, apparently, been married a very long time. He answers her statement that she feels responsible with a list of all the things he cannot do, and we realize that his health is not very good. At this point we do not know that it is she who is terminally ill, but her statements hint at this. At first read, we might assume that this couple do not believe in God. However, that is not really what is said. She mentions a time when he got

Individual Report Assignment Example | Topics and Well Written Essays - 2000 words - 1

Individual Report - Assignment Example ts that are usually given a high sense of priority, when analyzing the economic status of a country in relation to its fitness for business activity (Mohr, 2011). In this research, the discussion will be based on an analysis of three major economic indicators; the currency value against the US Dollar, inflation and economic growth rate measured in Gross Domestic Product and how they will affect the multinational company that intends to expand the provision of its services and products to other parts of the global business environment. Economists have asserted that a nation’s economic indicators are usually voluminous statistical information that are provided by governments, non-governmental organizations as well as the economic agencies charged with the responsibility of undertaking economic analyses (Mohr, 2011). This information has proved beneficial to not only local companies, but also multinational companies that aspire to expand their services to these countries. According to the Federal Reserve Bank of the United States, information regarding the country’s Gross Domestic Product has been crucial for the government owing to the fact that it assists in making adjustments of the existing economic policies (Berlatsky, 2013). In this regard, multinational and SME’s are usually subjected to scenario where they have to keep up to date with the existing economic policies in order to adjust their operations. The Federal Reserve Bank of the United States indicates that Gross Domestic Product of a nation is basically the value of services and products within its markets, generated within a specific period of time (Berlatsky, 2013). This information is usually released to the general public on a quarterly basis together with some revisions that may be provided within a period of ten weeks after the real of GDP information. Information regarding this data is usually accompanied with explanatory data that provides reasons for an increase in GDP or the reasons why

Thursday, July 25, 2019

Psychology (mental illnesses) Essay Example | Topics and Well Written Essays - 250 words

Psychology (mental illnesses) - Essay Example In the process of analyzing the obscure emotions of the patient, the therapist can link them to the actual relationships that they cause, for example one's animosity to food or alcohol. The other technique is introduced by Carl Rogers. He is the founding father of the Person-centered approach, the most widely used technique in modern clinical psychology. This concept explores the healing of the psyche through empathy, active listening, and "mirroring" of the patient. This therapeutic intervention is focused on the immediate conscious experience rather than attempting to solve the unconscious. The transformative impact of Roger's therapy is that there is an unconditional positive attitude to the client "not as a scientist to an object, but as a person to a person (Rogers 22)". The theory of person-centered therapy suggests that the resources for someone to heal himself lie inside them. In today's global world where our daily activities mix with the technologies, telephone or internet therapy is something acceptable and understandable. The mental health programs where the treatment is conducted via internet or phone provide instant support and availability to patients in emergencies. However, the quick access advantage adds to other disadvantages.

Wednesday, July 24, 2019

First amendment assignment Essay Example | Topics and Well Written Essays - 1000 words

First amendment assignment - Essay Example He also tried to stop them from distributing their printed materials using the same claim. Members of this group were removed from the city by force and illegally searched for Labor Union pamphlets. The Supreme Court found that the city's actions violated the citizens rights under the assembly clause of the First Amendent. In addition to that, the Court found that the original city ordinances preventing communist groups from meeting were also a violation of the assembly clause of the First Amendment. This was because the city officials could deny a meeting permit to any group for any reason, simply by claiming that he felt it had the potential to lead to disorderly public conduct. While city officials do have a duty to prevent unlawful conduct from occurring, they cannot infringe on the right to assembly in order to do this. Cox v. Louisiana, 379 U.S. 536 (1965) http://supreme.justia.com/us/379/536/case.html Cox v Louisiana was a case of the police overstepping their boundaries on di spelling riots or disruptive demonstrations. A civil rights group was protesting the arrest of some African-American students by gathering on the far side of the street from the courthouse, picketing, and singing songs. At some point, the leader of the group encouraged them to participate in a sit-in protest at the diners on that side of the street. The police construed this as an intent to disturb the peace, and forced the group to disband using tear gas. The group's leader was then arrested for â€Å"peace disturbance, obstructing public passages, and courthouse picketing†. Similarly to the Hague v CIO case, the Supreme Court found that the laws defining a peaceful demonstrations versus a disturbance were overly broad. They were designed to protect the peace, but it came at a violation of the First Amendment rights of the populace. In addition, the Supreme Court found that the laws about â€Å"obstructing public passages† were not being enforced. Enforcing them in th is case seemed like intentional discrimination and a violation of Cox's right to assembly specifically. Hill v. Colorado, 530 U.S. 703 (2000) http://laws.findlaw.com/us/530/703.html Colorado passed a law that stated that petitioners could not approach other visitors to a health care facility within 100 feet of the entrance to that facility in order to hand out printed materials, display signs, or verbally protest their actions. This law was primarily put into place to protect women who were visiting abortion clinics from overbearing protesters. The law was appealed in court because Hill felt that it was a violation of their rights to both free speech and assembly, since citizens could not gather at the entrance to a healthcare facility to engage in peaceful protest. The Supreme Court upheld the law, but only by a 6-3 vote. It was considered acceptable because it limited the places and ways in which speech and assembly could occur, without limiting their right to do so. Petitioners w ere free to gather at the healthcare facilities and protest, as long as they did so within the confines of the law. However, the dissenting opinions pointed out that the law was only being enforced at abortion clinics and so involved the content of the

Tuesday, July 23, 2019

Personality or behavior - Organizational Behavior HRM Case Study

Personality or behavior - Organizational Behavior HRM - Case Study Example The concept of personality has a broad definition from a psychological perspective. Nonetheless, the most reasonable definition asserts that personality is the personal characteristics that result in a consistent pattern of behavior, thoughts, and emotions (Ajzen, 2005; Stuart-Kotze, 2006). Specifically, personality is an arguably permanent aspect of an individual influenced by culture, family, life experiences, group membership, and beliefs. Consequently, personality is consistent, impacts behaviors and action, and expresses multiple concepts such as thoughts and feelings.On the other hand, a behavior is the action resulting from our values and beliefs. From a psychological viewpoint, a behavior is a response to external and internal stimuli that produce externally visible outcomes influenced by experience and a change in attitude. Therefore, personal behavior is flexible as affected by organizational culture and ethical beliefs supported by a company (Ajzen, 2005). Consequently, th e difference between behavior and personality is that the latter is rigid and permanent while the former is flexible and changeable to fit in a particular culture. Specifically, this is because changing the substance of personality such as attitudes, principles, philosophies, and ambitions is difficult (Stuart-Kotze, 2006).The Big Five personality model is a combination of broad domains of personality Specifically, this model is essential as it aids in understanding different trait in personality without overlapping.

Monday, July 22, 2019

Education Vision Essay Example for Free

Education Vision Essay I believe that all students should be held to the same standards of education. While there should always be accommodations for an individual students strengths, weaknesses and learning style, there should also be a universal set of criteria by which a students progress is measured. While those standards may sometimes seem exacting to the students expected to meet them, they are far less demanding than what is required of todays workers in an economy where competition has become global. An innovative and creative spirit has become in the last twenty years something that is generally expected of everyone rather than something only expected of the exceptional, a solid foundation in the basic elements of education, math and reading have become ever-more vital to succeeding in the modern world. Where education is concerned, I have found that creativity and innovation can oftentimes be fostered by the experience of overcoming challenges and, thereby, attaining a justified belief in ones own abilities. A student who is taught to take pride in their work and, especially, to take pride is turning a failure into a success is someone likely to succeed in a world where competition is fierce and belief in ones self is the most advantageous thing. Where the application of standards are concerned, I believe that any leader in an educational setting must be held to high standards just as are the students. By holding myself accountable to the highest standards, I gain the legitimacy to expect the same of my students and the ability to inspire them to do more than they may have thought possible. The position of a leader is one that is at least partially earned by gaining credibility in the eyes of those whom I am charged to lead. This can best be accomplished by setting an example; by continually challenging myself with new ideas and new situations while at the same time having the conviction to stand by those practices that have proven effective over time. Having worked as a teacher and a teachers assistant in various settings for the past five years, I have learned that both students and educators must never loose touch with their essential humanity and that empathy must always accompany high expectations. When a student knows that their teachers understand the hardships they face but still expect them to perform at a level of excellence, the student can be assured that they are not being driven unreasonably but are only expected to perform at the level their teachers know that student can achieve. Where sympathy and lowered expectations are really forms of condescension, empathy and high expectations communicate to a student that their instructor has not only high hopes for their student, but also a sincere and justified respect for their students potential. I have always felt a visceral connection and genuine responsibility for the successes and failures of my students. I hope to always be there to help my students experience the satisfaction of success and of overcoming failure.

Creative writing Essay Example for Free

Creative writing Essay On Writing by Stephen King is a memoir of the craft of the job as a published author, mainly aimed toward the aspiring ones. The book is divided up into three sections. The first section titled C. V. was all authentic glimpses into King’s life and featured interesting little episodes that King considered his ‘life lessons’ or things that sparked his sense of humor. It also provided a very important part in the basic aspects of being a good writer: King grew up loving to read and read frequently. He started writing and submitting his work at an early age and that’s where C. V. paints the picture of a real-life struggling novelist: how he had to work at several different crummy, though nevertheless interesting, and inspiring book setting jobs while supporting a family, a drug habit, and a fairly large and fairly flawed manuscript. The second section was titled On Writing, a section I found the most interesting and identified the most with as part of being both an aspiring author and a curious one. In this portion of the memoir of the craft, King gives you, flat-out but not in a patronizing tone, what you need to succeed as a decent writer. The best way to summarize how I felt about the section as a whole is this: when he revealed that he taught high school English for several years before the success of Carrie, I was desperately jealous of those students. But at the end of the day, I suppose any reader that is interested enough in King could always be his student by picking up book after book of his and becoming transfixed by his material and intelligence from cover to cover. Lastly, there’s the last section of the book, where King explores his painful memories of the accident from when an oblivious man in a blue van literally ran King over during one of his notorious thought-processing walks. The man, in attempt to calm down his Rottweiler’s in the backseat, veered off road and took King clear off his feet. This section of the book is about that and his slow road to recovery. It literally wrenched my heart when he talked of his wife setting up a table in the stuffy hall that he sat at to write for the first time. It was obvious that writing is more than just a business occupation and it becomes obvious in this section that King has a true passion for the craft. Despite it being far from the definitive writer’s guideline, this book takes on a unique perspective on creative writing spectrum. King lays down the law and then he teaches it, essentially. He shares his techniques, his pet peeves, and his own personal horrific experiences both as child and adult and he does it all within the defined space of what all he can say on a printed page. And he does it well. He constructs a personal ending with tragedy, growth, and experience within a tight covering of his famous storytelling style. And overall, I think Stephen King wrote this simply because he could. He knew it is a select audience that is going to read it and those fans who don’t ever care to be writers won’t read this book. Maybe I’m wrong and they might with the mindset that they might gain some secret insight into the mind of their idol and let me just tell you firsthand if that is the case, they will be disappointed. In not so many words, King says exactly the same thing himself. â€Å"There is no secret to my storytelling. It just is what it is. As true as I can say it, it’s just a lot of hard work, dedication, time, and exceled patience. All of which, I had to learn on my own,† King writes. Lastly, in the heart of the book, in the section On Writing, King writes, â€Å"Now comes the big question: What are you going to write about? And the equally big answer: Anything you damn well want. Anything at all as long as you tell the truth. Your truth. † That’s the biggest lesson I took away from this. But there is more, believe it or not. You can tell it from his writing. And before he gets to the end, King goes ahead and lets the cat out of the bag when he is writing about beginning again after his debilitating accident. He writes, â€Å"I feel that buzz of happiness, that sense of having found the right words and put them in a line. It’s like lifting off in an airplane: you’re on the ground, on the ground, on the ground and then you’re up, riding on a magical cushion of air and prince of all you survey. That makes me happy because it’s what I was made to do. † As a human, I was touched by his childhood anecdotes and often laughed with him about his insecurities. I am still in awe at what he has recently had to overcome physically. But as a writer, I am grateful for a brief glimpse into his vocational, bright burning world. I gained confidence from learning about things I have been doing right and have changed many bad habits or wrongdoings I’d been screwing up on obliviously the entire time because sometimes the coldest hands to wrap around your neck are the true ones. The only bad thing I can say about this book is that it’s too short, something one rarely has the opportunity to state regarding the beloved author. And a huge thank you goes to the beloved author himself Stephen King for a brief indulgence into the life of a genius storyteller.

Sunday, July 21, 2019

Factors Responsible for Employee Retention

Factors Responsible for Employee Retention Strategic Human Capital Management The paper is generated by referring to Christeen George’s article paper, with title of Retaining professional workers: what makes them stay?. The main issue normally practice by Human Resource is to let the turnover occur then only to find out the reason of the intention to quit through exit-interview. Knowing the reason only after people quit is seem defenseless because the collected information on why people quit fail to restore back the job gap. Hence, the purpose of this paper is to identify the factors that capable to retain the professional staffs in one organization, then the factors are tested for the retention of the professional employees. The variables used in this paper are divided into two dimensions, first dimension is organizational which consist of four factors, management, conducive environment, social support and development, second dimension is job which consist of four factors, autonomy, compensation, crafted/sculpted workload, work-life balance. Hence, the paper is driven by research questions, which are to explore whether the eight factors identified in this paper is usable to measure the individual intention to stay in the organization, are the factors identified distributed into organizational group and job group is blended positively, and whether the organizational level and job level could predict the individual’s intention to stay in the organization. The study area is conducted in UK site, the sample of the study is focusing the employees of multinational marketing company which come from variety job function such as Accountant, IT professionals, Consultants, Marketing and Sales professionals, and HR professional. The total respondents are 138, which covered 76 male, 62 female. The age range from 20 to 61 years. The measurement instrument, the questionnaires were electronically sent to the respondents. The independent variables (IV) content of sex, age, organizational level scores and job level scores showed significant result, and that showed the IVs used are able to predict the intention of the employee to stay and to quit. The most durable IV to predict the intention of the employee to stay and to quit is organizational level scores which consist the characteristics of leadership and support from management, work environment is fun, flexibility, adequate resources, feel belong to the team, friendly and caring workmates, opportunity to enhance/acquire skills, promotion prospects. Meanwhile, the eight factors that distributed into organizational level and job level showed significant positive correlations respectively, and that showcase the eight factors were distributed in the correct group. Many researchers and academias give substantial focus on the impact of employee turnover, the turnover impact towards organization cause high cost. This is supported by Ghosh, Satyawadi, Joshi and Shadman (2013) literature finding stated an internal analysis has shared to replace turnover employee is more expensive than compensate employee, which is more than 35 per cent. Knowing the big loss could occur to any organization due to turnover, it is wise to prevent better than cure, the idiom may sound clichà ©, but it is a crucial issue to tackle in order to assist the organization to save the resources. Apart of loss in revenue, the organization is facing the risk of loss of experience employees, bad reputation to other organization, productivity is affected, loss of intellectual capital which knowledge is one of the valuable intangible asset to the organization (Sandhu, Jain, Ahmad, 2011) and this lead to other organization gain more advantage by obtaining the asset (Ghosh et al., 2013). Turnover issue is inevitable, however the issue could be alleviated with the help of research. Hence, the paper is creating awareness about it is more advantage to identify factors that make the professional employees stay rather to identify factors on why they are quit. The paper could help the organization to understand the proven factors (management, conducive environment, social support and development under organization level is the most durable predictor) resulted from this study to strategize on how to retain the professional employees in the organization. However, there are arose enquiries on the part of independent variables and dependent variable stated in the paper. The term of independent variable is viewed as an item that influence the outcome, meanwhile dependent variable is viewed as an outcome which may result different outcome for different independent variable are used to test (Leroy, 2011). Based to the term defined, the organizational subscale which consist of four factors, management, conducive environment, social support and development, and job subscale which consist of four factors, autonomy, compensation, crafted/sculpted workload, work-life balance are responsible to influence the result of retention. Thus, the reader expected the identified variables in the paper, organization subscale and job subscale are independent variable, and intention to quit is dependent variable, however, it is stated in opposite statement. The enquiries arose are not meant to downgrade the content of the paper, in fact, the reader made cor respondent via e-mail on 11 March 2015 as in appendix to the author, respond is yet pending. The purpose of the e-mail is sent with respect and courtesy, and to clarify the doubtful and ambiguity as well. In Malaysia context, one study presented at the 2nd International Conference On Management, Economics And Finance in Sabah by Fadzilah, Queiri, Sabarudin and Iskandar (2013) claimed that Generation Y is more likely to quit their job due to several reasons such as lack of fun work. This issue is critical and need to be taken seriously by the organization because the contribution of Generation Y towards in any economy is significant, and they are growing fast and bigger employees to replace the Baby Boomers who are in line of retirement. Generation Y showcase different characteristics when come to work which influence by leadership, developments and technologies (Cheong, Hasliza, Yusuf Desa, 2011). Despite the respondents’ age range between 21-61 years old in the paper, which mean Generation Y and Baby Boomers are part of the respondents, the paper is capable to provide a foundation framework on how the Malaysia organizations design a strategy to retain the Generation Y. This i s rational because the study conducted by the author tested the similar factors that influence Generation Y when come to work, leadership and development. Malaysia is gearing up to beef up the human capital development by producing first class mentality, knowledge-based economy and talent-based. For instance, Talent Corporation Malaysia (TalentCorp) is responsible to facilitate the talent management in Malaysia. The biggest hurdle encountered by TalentCorp is brain drain. The professional employees choose to leave Malaysia and work abroad. TalentCorp has come with a strategy to attract and retain the professional employees which they offer various packages, such as tax exception and work life balance. Work life balance is one factor tested in the author’s study and that it is proven that the significant of the study does promote to other agency that associate to human resource such as TalentCorp to infuse the factor into part of their retention strategy. Knowing the present of TalentCorp is vital to constantly conduct research in order to ensure the objectives are achieved, thus, this paper could help TalentCorp to come out with a robust blueprint regards strategy on retaining professional employees, of which TalentCorp may considers the tested factors in the paper such as social support. Finally, the research is emphasizing the needs to increase the number of respondents, and needed to expand larger coverage of organizations and professional employees. The wider scope as it may goes, the possibility differ outcome it may be. The factors identified and tested in this study which distributed into organizational level and job level are proven related to the individual intention to stay and to quit. Thus, the finding show significant positive for human resource and organization to design a robust strategy to retain employees. The negative impacts due to turnover or quit the job that discussed in this review could be alleviated by the help of to understand the factors influence the intention to stay and to quit. However, one of the factor in the framework model, which is compensation, may cause the small, medium, enterprises organizations to consider to use it as one of the retention strategy as they are unable to offer competitive compensation packages compare to larger organizations who use compensation as one of their retention strategies, this is supported by Ghosh et al. (2013) stated large organizations could afford to provide better compensation package such as appreciation and recognition award. In the other hand, the future research suggested in the paper is to examine the relation between employee engagement, employee retention and organizational performance. The significant of the future research would create a wider scope for the organization to understand and harvest the benefit of retention strategies. REFERENCES Cheong, T. W., Hasliza, D., Yusuf, M., Desa, H. (2011). A Study on â€Å" Generation Y † Behaviours at Workplace in Penang Associate Professor , School of Business Innovation and Technopreneurship , Universiti Malaysia. Australian Journal of Basic and Applied Sciences, 5(11), 1802–1812. Fadzilah, Z., Quieri, A., Sabarudin, Z., and Iskandar, H. (2013). Generation-y turnover intention in business process outsourcing sector. 2nd International Conference on Management, Economics and Finance (pp.429-439). Sabah, Malaysia: Conference Master Resources. Ghosh, P., Satyawadi, R., Joshi, J. P., Shadman, M. (2013). Who stays with you? Factors predicting employees; intention to stay. International Journal of Organizational Analysis, 21, 288–312. Leroy, G. (2011). Designing User Studies in Informatics, Health Informatics. London: Springer-Verlag London Limited. Sandhu, M. S., Jain, K. K., Ahmad, I. U. K. B. (2011). Knowledge sharing among public sector employees: evidence from Malaysia. International Journal of Public Sector Management, 24, 206–226. Talent Corporation Malaysia. (2011). Malaysian at home. Retrieved March 12, 2015 from http://www.talentcorp.com.my/about-us/

Saturday, July 20, 2019

Will HIV and AIDS as the Black Death of the Twenty-First Century :: Papers

Will HIV and AIDS as the Black Death of the Twenty-First Century According to an article on BBC World Service, published on 25th October, 2001, the Black Death claimed 25 million lives in Europe and Asia between the 13th and 17th century. Now nearly 400 years later the British Medical Journal reports an estimated 65 million deaths from AIDS by the end of the decade. Obviously these figures are rough estimates, however they illustrate the severity of the Bubonic Plague and the impending severity of an AIDS epidemic. These figures themselves lead me to believe that in fact AIDS is already the modern day Black Death and whether anyone will be here in another 400 years to compare AIDS to the Black Death is yet to be seen. The Bubonic Plague or 'Black Death' as it is more commonly known swept through Europe and Asia mainly in the 14th century. The Bubonic Plague is caused by the bacterium Yerina Pestis and is transmitted to humans by infected fleas on rats. In most common cases victims suffer from fevers, chills, fatigue and painfully swollen lymph nodes. Another symptom were haemorrhages, which turned black, this is why it became known as the Black Death. Even though in the time of the Black Death there was no medical shield to protect against the plague, with today's medical advances there is. This is where the Black Death and AIDS differ. AIDS (Acquired Immune Deficiency Syndrome) is a clinical syndrome, resulting from damage to the immune system caused by infection with Human Immunodeficiency Virus (HIV). In HIV individuals, there is a gradual loss of immune cells and immune function. It generally takes six to ten years from the point of infection to develop AIDS. Even though large drug companies have developed drugs that slow down the progression from HIV to AIDS, none have yet to market any kind of vaccine or cure. There may be more success in finding a cure, so that AIDS will not be looked back upon in years to come as the Black Death of its time if,

Friday, July 19, 2019

Motherhood Under Slavery in Tony Morrison’s Beloved Essays -- Beloved

Tony Morrison’s novel Beloved, explores how slavery effects of the lives of former slaves. Morrison focuses more specifically on how the women in these situations are affected. One of the main areas affected in the lives of these women is motherhood. By describing the experiences of the mothers in her story (primarily Baby Suggs and Sethe) Morrison shows how slavery warped and shaped motherhood, and the relationships between mothers and children of the enslaved. In Beloved the slavery culture separates mothers and children both physically and emotionally. Sethe has a strong maternal instinct and sees her children as a part of herself. They rightfully belong to her. However her maternal ownership of her children is not recognized by the culture of slavery. As a slave she cannot own anything (Mock 118). Therefore while they are enslaved neither Baby Suggs nor Sethe really own their children. In the slavery culture both the mothers and the children are considered as property of their white owners. As property, their rights as mothers are made void and they have no say about the lives of their children. To the owners a slave woman’s primary value is in her reproductive ability. The female slave is seen as giving birth to property, and therefore capital in the form of new slaves. (Liscio 34). The owner has the ability to use and dispose of this new property as they wish. Therefore children could be sold without any regards for their feelings of the feelings of their mother. In the novel Baby Suggs states she has given birth to eig ht children, however she only gets to keep one that she sees grow into adulthood. By the end of her life slavery has stolen all of her children from her: You lucky. You got three left. Three pull... ...the two of them. The Slavery culture in the novel has restricted both Baby Suggs’s and Sethe’s ability to mother their children. It has altered motherhood from the ideal and transformed it into something barely recognizable. Works Cited Liscio, Lorraine. â€Å"Beloved’s Narrative: Writing Mother’s Milk.† Tulsa Studies in Women’s Literature, Vol.11, No.1 (Spring, 1992): 31-46. JSTOR. Web. 27. Oct. 2015. Mock, Michelle. â€Å"Spitting out the Seed: Ownership if Mother, Child, Breasts, Milk, and Voice in Toni Morrison’s Beloved.† College Literature, Vol. 23, No.3 (Oct, 1996): 117-126. JSTOR. Web. 27. Oct. 2015. Morrison, Toni. Beloved. New York: Vintage International, 2004. Print. Wyatt, Jean. â€Å"Body to the Word: The Maternal Symbolic in Toni Morrison’s Beloved.† PMLA, Vol. 108, No.3 (May, 1993): 474-488. JSTOR. Web. 27. Oct. 2015.

Urban Public Art in Canada Essay -- Canadian Art

When on holiday in any city, the visitor inevitably snaps photographs of the iconic public statuary and buildings in an effort to identify a location through association with landmarks and architecture. It is allowed freely without intrusion of private indoor spaces and confirms the identity of the place visited. The relationship of the art to the environment is illustrated and the fact that one is â€Å"being there† is documented. When at home in any city, the citizen approves or disapproves of what is presented in the form of urban public art as part of his or her own cultural identity. A sense of ownership and contribution confirms that one â€Å"belongs there†. From time to time what doesn’t belong, in the view of the citizen, is the art. There is no question that urban public art has value. Visitor and citizen benefit from the safe, politically correct selections of well-formed art committees that portray history, fame, or simply artistic caprice. Th is paper will discuss three specific examples of modern sculpture in Canada, all of which at one time have been considered contentious and controversial. The fourth example is of art that was never created. In each case, the specific relevance and importance of the pieces to the associated environment have been determined according to prevailing local civic attitudes. The service of urban public art to the civilized population is as old as civilization itself. Ancient monuments, architecture, and sculpture of almost every continent and every era are important facets of historic cultures. Exceptional figures and events have been immortalized through art. Religions have been fostered through worship of inanimate representations of divine symbols. The dead have been memo... ... and the artist are not on common ground in some cases. Art appreciation and art itself is constantly changing and the public forum is important not only for open expression, but also for open appreciation and freedom to express opinions. Even the incredible Gothic style of architecture was criticized in the thirteenth and fourteenth centuries as opus modernum, or modern art (Gardner, 1959, 243) as if it were inferior to the traditional and known. The three sculptural pieces mentioned caused similar discussion about misfit in three different decades but also found a societal best-fit in the end. All have supporters and detractors which illustrate the relationship between art and community is alive—not that one kind of urban public art is favoured over another—rather that we all have opinions and we all care about who and what â€Å"belongs there†. Urban Public Art in Canada Essay -- Canadian Art When on holiday in any city, the visitor inevitably snaps photographs of the iconic public statuary and buildings in an effort to identify a location through association with landmarks and architecture. It is allowed freely without intrusion of private indoor spaces and confirms the identity of the place visited. The relationship of the art to the environment is illustrated and the fact that one is â€Å"being there† is documented. When at home in any city, the citizen approves or disapproves of what is presented in the form of urban public art as part of his or her own cultural identity. A sense of ownership and contribution confirms that one â€Å"belongs there†. From time to time what doesn’t belong, in the view of the citizen, is the art. There is no question that urban public art has value. Visitor and citizen benefit from the safe, politically correct selections of well-formed art committees that portray history, fame, or simply artistic caprice. Th is paper will discuss three specific examples of modern sculpture in Canada, all of which at one time have been considered contentious and controversial. The fourth example is of art that was never created. In each case, the specific relevance and importance of the pieces to the associated environment have been determined according to prevailing local civic attitudes. The service of urban public art to the civilized population is as old as civilization itself. Ancient monuments, architecture, and sculpture of almost every continent and every era are important facets of historic cultures. Exceptional figures and events have been immortalized through art. Religions have been fostered through worship of inanimate representations of divine symbols. The dead have been memo... ... and the artist are not on common ground in some cases. Art appreciation and art itself is constantly changing and the public forum is important not only for open expression, but also for open appreciation and freedom to express opinions. Even the incredible Gothic style of architecture was criticized in the thirteenth and fourteenth centuries as opus modernum, or modern art (Gardner, 1959, 243) as if it were inferior to the traditional and known. The three sculptural pieces mentioned caused similar discussion about misfit in three different decades but also found a societal best-fit in the end. All have supporters and detractors which illustrate the relationship between art and community is alive—not that one kind of urban public art is favoured over another—rather that we all have opinions and we all care about who and what â€Å"belongs there†.

Thursday, July 18, 2019

Applications of Biometrics in Cloud Security

CHAPTER ONE 1. 1 INTRODUCTION The success of modern day technologies highly depends on its effectiveness of the world’s norms, its ease of use by end users and most importantly its degree of information security and control. Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure ‘in the cloud’ that supports them [15, 16].Authentication, thus, becomes pretty important for cloud security. Biometric is the most secure and convenient authentication tool. It cannot be borrowed, stolen, or forgotten and forging one is practically impossible. The term comes from the Greek words bios (life) and metrikos (measure). To make a personal recognition, biometrics relies on who you are or what you do—as opposed to what you know. OBJECTIVES 1 To know and understand the meaning of biometric, its uses, the characteristics and also its advantages and challenges. To know and understand the full meaning of cloud computing its type and its service providers 3 To explain the about cloud security and its shortfalls 4 To know how biometric technology can be applied to enhance security in cloud computing CHAPTER TWO 2. 0 BIOMETRICS The word â€Å"biometrics† comes from the Greek language and is derived from the words bio (life) and metric (to measure). Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits.Computer science, biometrics to be specific, is used as a form of identification [1]. Biometrics is automated methods of recognizing a person based on a physiological or behavioural characteristic [2]. Biometrics offers new perspectives in high-security applications while supporting natural, user-friendly and fast authentication. Biometric technology uses these characteristics to identify individuals automatica lly1. Ideally the characteristic should be universally present, unique to the individual, stable over time and easily measurable [5]. 2. Biometric systems A biometric system provides an automated method of recognizing an individual based on the individual's biometric. A biometric is a measurement of a biological characteristic such as fingerprint, iris pattern, retina image, face or hand geometry; or a behavioural characteristic such as voice, gait or signature. Behavioural biometrics are related to the behaviour of a Person, including but not limited to: typing rhythm, gait, and voice. Some researchers have coined the term behaviourmetrics to describe the behaviour class of biometrics [1].A biometric system is essentially a pattern-recognition system that recognizes a person based on a feature vector derived from a specific physiological or behavioural characteristic that the person possesses [3]. Biometric systems can be used in two different modes. Identity verification occurs wh en the user claims to be already enrolled in the system (presents an ID card or login name); in this case the biometric data obtained from the user is compared to the user’s data already stored in the database Identification (also called search) occurs when the identity of the user is a priori unknown.In this case the user’s biometric data is matched against all the records in the database as the user can be anywhere in the database or he/she actually does not have to be there at all [4]. The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems. 2. 2 Biometric Authentication Authentication on the other hand, is a process where a known person's live biometric is compared to a stored template of that person.For example, an individual’s identity is revealed to the biometric system upon entering a PIN (Personal Identification Number). To authenticate that this is the person associated wi th this PIN, a live biometric is presented by the individual and compared to the template and a match is determined. This is known as a ‘one to one’ search. It is more accurate than the ‘one to many’ application and is the predominant biometric process in place today and the more privacy friendly of the two systems.This answers the question – Are you who you say you are? Two general uses of biometrics are identification and verification which both require the existence of reference data that the person’s measured traits will be compared with reference templates or raw data. During these processes, a biometric data sample is compared against the respective biometric data of every person enrolled in the database or against a single reference template of a particular enrolled individual in order to confirm the identity of that person respectively.When a biometric system correctly identifies a person, then the result of the identification process is a true positive, whereas if the system correctly rejects a person as not matching the respective enrolled template, the result is a true negative. Similarly, when the system incorrectly identifies or rejects a person then we speak about a false positive or a false negative. Fig 2. 1 Components of a Biometric Authentication System[31] 2. 3 BIOMETRIC SECURITY SYSTEM The biometric security system is a lock and capture mechanism to control access to specific data.In order to access the biometric security system, an individual will need to provide their unique characteristics or traits which will be matched to a database in the system. If there is a match, the locking system will provide access to the data for the user. The locking and capturing system will activate and record information of users who accessed the data. The relationship between the biometric and biometric security system is also known as the lock and key system. The biometrics security system is the lock and biometric s is the key to open that lock [11]. 2. 4 CRITERIA FOR BIOMETRIC SYSTEM[12]There are seven basic criteria for biometric security system: [12] * Uniqueness: uniqueness is considered as the priority one requirement for biometric data. It will indicate how differently and uniquely the biometric system will be able to recognize each user among groups of users . For instance, the DNA of each person is unique and it is impossible to replicate. * Universality: Universality is a criterion for the biometric security that indicates requirements for unique characteristics of each person in the world, which cannot be replicated. For example, retinal and iris are characteristics will satisfy this requirement. Permanence: permanence parameter is required for every single characteristic or trait which is recorded in the database of the system and needs to be constant for a certain period of time period. This parameter will mostly be affected by the age of the user * Collectability: The collectabil ity parameter requires the collection of each characteristic and trait by the system in order to verify their identification * Performance: performance outlines how well the security system works. The accuracy and robustness are main factors for the biometric security system.These factors will decide the performance of the biometric security system * Acceptability: The acceptability parameter will choose fields in which biometric technologies are acceptable. * Circumvention: circumvention will decide how easily each characteristic and trait provided by the user can lead to failure during the verification process. DNA is believed to be the most difficult characteristic leading to the failure of the verification process [13]. Figure 2. 2 Basic Criteria for Biometrics Security System [26] 2. 5 TYPES OF BIOMETRIC systems Two classes of biometric methods are: 1) Physical Biometrics:Physiological biometrics is based on measurements and data derived from direct measurement of a part of the human body. * Fingerprint: Fingerprint recognition is one of the best known and most widely used Biometric technologies. Fingerprint recognition technology extracts features from impressions made by the distinct ridges on the fingertips. * Iris-scan: Iris recognition technology is based on the distinctly coloured ring surrounding the pupil of the eye. Iris recognition systems use a small, high-quality camera to capture a black and white, high-resolution image of the iris. Retina-scan: Retina recognition technology captures and analyses the patterns of blood vessels on the thin nerve on the back of the eyeball that processes light entering through the pupil. * Hand geometry: Hand geometry technology takes 96 measurements of the hand, including the width, height, and length of the fingers; distances between joints; and shape of the knuckles. * Facial recognition : Facial recognition technology identifies people by analysing features of the face not easily altered—the upper out lines of the eye sockets, the areas around the cheekbones, and the sides of the mouth..Facial recognition can be used in both verification and identification systems. 2) Behavioural characteristics are based on an action taken by a person. Behavioural biometrics, in turn, are based on measurements and data derived from an action, and indirectly measure characteristics of the human body * Voice recognition: Voice authentication is unique and non-intrusive method and also the hardware requirements required for this type of authentication are cheap and are available readily. Microphones can be used for this purpose.However the back ground noise must be controlled, high storage is required for this kind of authentication. This type of authentication can also be extraneously influenced by once sore throat and cold. [7] * Keystroke-scan: Keystroke dynamics is a biometric based on the assumption that different people type in uniquely characteristic manners. Observation of telegraph operato rs in the 19th century revealed personally distinctive patterns when keying messages over telegraph lines, and telegraph operators could recognize each other based on only their keying dynamics [22].Keystroke dynamics is known with a few different names: keyboard dynamics, keystroke analysis, typing biometrics and typing rhythms [22]. Currently users begin information to computer systems via physical keyboards or keyboards on touch screens. The main advantage of using keystroke dynamics is that it can be used without any additional hardware. Thus it is inexpensive. The user acceptance of a keystroke dynamics biometric system is very high, since it is not intrusive and users do not necessarily even notice that such a system is used [22, 27]. Signature Recognition: Signature recognition authenticates identity by measuring handwritten signatures. The signature is treated as a series of movements that contain unique biometric data, such as personal rhythm, acceleration, and pressure flo w. In a signature recognition system, a person signs his or her name on a digitized graphics tablet or personal digital assistant. The technology can also track each person’s natural signature fluctuations over time. The signature dynamics information is encrypted and compressed into a template.One of the defining characteristics of a behavioural biometric is the incorporation of time as a metric – the measured behaviour has a beginning, middle and end [6]. A number of biometric methods have been introduced over the years, but few have gained wide acceptance. 2. 6 PERFORMANCE OF BIOMETRICS SYSTEMS The following are used as performance metrics for biometric systems [8]. * False Accept Rate FAR and False Reject Rate FRR: The FAR gives a measure of the probability that an individual will be ‘falsely accepted’ by the system (i. . that the system accepts someone who is not enrolled on the system, or makes an incorrect identification). The FRR indicates how like ly it is that a legitimate user will be rejected. The balance between the FAR and the FRR greatly influences both the security and usability of the system. The False Rejection Rate (FRR) is usually caused by lighting, climate conditions, low quality equipment or inexperience. The False Acceptance Rate (FAR) is caused by the security standard being too low [9]. False Match Rate FMR and False NonMatch Rate FNMR: A false match occurs when a system incorrectly matches an identity, In verification and positive identification systems, unauthorized people can be granted access to facilities or resources as the result of incorrect matches. That occurs when a subsequent reading does not properly match the enrolled biometric relating to that individual, something that results in Denial of Access to services. * The Crossover Error Rate (CER): The Crossover Error Rate (CER) is defined as the error rate of the system when the FAR and FRR are equal.Usually expressed as a percentage, the CER can b e used to compare the performance of different biometric systems. * False enrol rate: This occurs when a person’s biometric is either unrecognizable, or when it is not of a sufficiently high standard for the machine to make a judgment, something that does not allow the user to enrol in the system in the first place. The fingerprints of people who work extensively at manual labour are often too worn to be captured. A high percentage of people are unable to enrol in retina recognition systems because of the precision such systems require.People who are mute cannot use voice systems, and people lacking fingers or hands from congenital disease, surgery, or injury cannot use fingerprint or hand geometry systems [10]. Applications of biometrics 2. 7ADVANTAGES OF BIOMETRIC SECURITY [14] 1. The first advantage of using this new technology is the uniqueness and it is also the main characteristic which allows biometrics technology to become more and more important in our lives. With un iqueness of biometrics technology, each individual's identification will be single most effective identification for that user.A chance of two users having the same identification in the biometrics security technology system is nearly zero. 2. Secondly, the highly secure way of identifying users makes this technology less prone for users to share access to highly sensitive data. For example, users can share their fingerprints, iris and so forth allowing other users access to secure information. Each trait used during identification is a single property of that user. In other words, it is extremely hard or impossible to make duplicate or share biometrics accessing data with other users.This makes it ever more secure allowing user information and data to be kept highly secure from unauthorized users. 3. This identification of users though biometrics cannot be lost, stolen or forgotten. This aspect of biometrics technology allows it to become more popular in its use. This method of ide ntifying and giving access to user makes user identification a lot easier. Finally, most biometrics security systems are easy to install and it requires small amount of funding for equipment (except modern biometrics technology such as: DNA/retinal/iris recognition). . 8 CHALLENGES AND ISSUES Nothing is 100% secure, not even biometrics. Nevertheless, biometrics does provide the means to present security credentials that are unique. Unlike other systems that may rely on passwords or tokens that can be vulnerable to loss or exploitation, no one is going enter your live biometric as a means of impersonation Just as a firewall does not constitute a network security solution but rather a component of a defensive strategy, biometrics could be viewed in the same manner.It is not enough to assume absolute verification with biometrics alone but rather as part of a well designed security implementation that considers strong two factor authentication. The second major threat is concerned with modification of the components of the authentication system. The capture device could be modified to output a different image to the one captured. Alternatively, it could be modified to create a denial-of-service (DoS) that will prevent legitimate users accessing the system (by smashing a camera, for example). The processes of emplate generation or template matching could be subverted to produce erroneous results; for example, a piece of malicious code could interfere with the template generation software to produce the attacker’s template rather than that of the legitimate user, or the matching process could be modified to produce an artificially high or low matching score. CHAPTER THREE 3. 1 CLOUD COMPUTING Cloud computing is a means of accessing computer facilities via the Internet, where the adjective â€Å"cloud† reflects the diagrammatic use of a cloud as a metaphor for the Internet.Most of us have been using cloud-computing facilities in one form or another for years through ordinary email and the World Wide Web. Recently, the term has come to reflect the use of software and the running of computer applications via the Internet where the computer infrastructure and software are not â€Å"on premises. † Cloud computing, as a form of service provisioning, has given rise to several related concepts, such as mesh computing, cloud platforms, and software plus service. Cloud Computing is a new computing model that distributes the computing missions on a resource pool that includes a large amount of computing resources.In a survey undertaken by the International Data Corporation (IDC) group between 2008 and 2009, the majority of results point to employing Cloud computing as a low-cost viable option to users [17] developers or research projects and even e-commerce entrepreneurs. Using Cloud computing can help in keeping one’s IT budget to a bare minimum. It is also ideally suited for development and testing scenarios. It is the easie st solution to test potential proof of concepts without investing too much capital.Using cloud computing service, users can store their critical data in servers and can access their data anywhere they can with the Internet and do not need to worry about system breakdown or disk faults, etc. Also, different users in one system can share their information and work, as well as play games together. Many important companies such as Amazon, Google, IBM, Microsoft, and Yahoo are the forerunners that provide cloud computing services. Recently more and more companies such as SalesForce, Facebook, YouTube, MySpace etc. also begin to provide all kinds of cloud computing services for Internet users . 2 TYPES OF CLOUDS [18] In providing a secure Cloud computing solution, a major decision is to decide on the type of cloud to be implemented. Currently there are three types of cloud deployment models offered, namely, a public, private and hybrid cloud. A. Public Cloud A public cloud is a model whic h allows users’ access to the cloud via interfaces using mainstream web browsers. It’s typically based on a pay-per-use model, similar to a prepaid electricity metering system which is flexible enough to cater for spikes in demand for cloud optimisation.This helps cloud clients to better match their IT expenditure at an operational level by decreasing its capital expenditure on IT infrastructure [19]. Public clouds are less secure than the other cloud models because it places an additional burden of ensuring all applications and data accessed on the public cloud are not subjected to malicious attacks. Therefore trust and privacy concerns are rife when dealing with Public clouds with the Cloud SLA at its core. B. Private Cloud A private cloud is set up within an organisation’s internal enterprise datacenter.It is easier to align with security, compliance, and regulatory requirements, and provides more enterprise control over deployment and use. In the private clo ud, scalable resources and virtual applications provided by the cloud vendor are pooled together and available for cloud users to share and use. It differs from the public cloud in that all the cloud resources and applications are managed by the organisation itself, similar to Intranet functionality. Utilisation on the private cloud can be much more secure than that of the public cloud because of its specified internal exposure.Only the organisation and designated stakeholders may have access to operate on a specific Private cloud [20]. C. Hybrid Cloud A hybrid cloud is a private cloud linked to one or more external cloud services, centrally managed, provisioned as a single unit, and circumscribed by a secure network [20]. It provides virtual IT solutions through a mix of both public and private clouds. Hybrid Clouds provide more secure control of the data and applications and allows various parties to access information over the Internet. It also has an open architecture that allow s interfaces with other management systems. . 3 CLOUD COMPUTING DELIVERY MODELS [18] The architecture of Cloud computing can be categorised according to the three types of delivery models, namely Infrastructure as a service (IaaS), Software as a service (SaaS) and Platform as a service (PaaS). A. Infrastructure as a Service (IaaS) Infrastructure as a Service is a single tenant cloud layer where the Cloud computing vendor’s dedicated resources are only shared with contracted clients at a pay-per-use fee. This greatly minimizes the need for huge initial investment in computing hardware such as servers, networking devices and processing power.They also allow varying degrees of financial and functional flexibility not found in internal data centers or with co-location services, because computing resources can be added or released much more quickly and cost-effectively than in an internal data center or with a colocation service [21]. B. Software as a Service (SaaS) Software as a Service also operates on the virtualised and pay-per-use costing model whereby software applications are leased out to contracted organisations by specialised SaaS vendors. This is traditionally accessed remotely using a web browser via the Internet.Software as a service applications are accessed using web browsers over the Internet therefore web browser security is vitally important. Information security officers will need to consider various methods of securing SaaS applications. Web Services (WS) security, Extendable Markup Language (XML) encryption, Secure Socket Layer (SSL) and available options which are used in enforcing data protection transmitted over the Internet. C. Platform as a Service (PaaS) Platform as a service cloud layer works like IaaS but it provides an additional level of â€Å"rented† functionality.Clients using PaaS services transfer even more costs from capital investment to operational expenses but must acknowledge the additional constraints and possi bly some degree of lock-in posed by the additional functionality layers [20] . The use of virtual machines act as a catalyst in the PaaS layer in Cloud computing. Virtual machines must be protected against malicious attacks such as cloud malware. Therefore maintaining the integrity of applications and well enforcing accurate authentication checks during the transfer of data across the entire networking channels is fundamental.Figure 3. 1 CLOUD COMPUTING MAP [18] 3. 4 CLOUD SECURITY Cloud computing have many advantages in cost reduction, resource sharing and time saving for new service deployment. While in a cloud computing system, most data and software that users use reside on the Internet, which bring some new challenges for the system, especially security and privacy. Since each application may use resource from multiple servers. The servers are potentially based at multiple locations and the services provided by the cloud may use different infrastructures across organizations.Al l these characteristics of cloud computing make it complicated to provide security in cloud computing. To ensure adequate security in cloud computing, various security issues, such as authentication, data confidentiality and integrity, and non-repudiation, all need to be taken into account. The biggest challenge in implementing successful Cloud computing technologies is managing the security. As with any new technology enhancements, criticisms are driven by fear of unknown variables and changes to current control procedures. How can cloud stakeholders ensure and promote the security of Cloud computing?In the Cloud Computing Services Survey conducted during August 08/09 by IDC IT group [17], users were asked to rate their issues and challenges experienced with Cloud computing. The results illustrate that security is the biggest concern. Security is the main issue users are concerned with when considering Cloud computing solutions. CHAPTER FOUR 4. 1 APPLICATION OF BIOMETRICS IN CLOUD SECURITY One of the Security risks in cloud computing according to Garfunkel [23] is hacked passwords or data intrusion. If someone hacks a password they get control over the resources.They can manipulate the information or disable the services. Furthermore, there is a possibility for the user’s email (Amazon user name) to be hacked (see [24] for a discussion of the potential risks of email), and since Amazon allows a lost password to be reset by email, the hacker may still be able to log in to the account after receiving the new reset password [25]. As an excellent storage scheme for tenants’ big data, cloud computing has been a hot issue for a lot of consumers, generally, tenants’ different data should be processed by different security modes.Biometric authentication has the advantage of exclusive for tenant in data access. When any registered cloud tenant , want to access the data stored in cloud, first, he must pass the cloud system check such as cloud_sys_c hecker A Hybrid biometric method can be developed by fusing finger prints and voice biometric methods. The fused value can be used as signal sign on for multiple resources provided by cloud. This encrypted data is used for authentication 4. 2BIOMETRIC AUTHENTICATION SYSTEM AS A CLOUD SERVICE:The authentication service provider maintains the biometric data base . The data has to be stored in encrypted format using cryptography on biometric for the security reasons 4. 2. 1ARCHITECTURE BIOMETRICS AUTHENTICATION SYSTEM A secure data access scheme based on identity-based Encryption and biometric authentication for cloud communication Cloud Services1 CS1 Cloud Services1 CS3 Cloud Services1 CS2 Biometric Authentication Service Org1 User1 User2 †¦ Org2 User1 User2 Fig4. 1: Biometric Authenticating System in cloud [30].The user initially enrols with the biometric system which is provided by a cloud, once the identity is registered his/her biometric authentication details are stored in c loud service provider database. The authorization details are also entered at the registration time which is also encrypted. Whenever the user wants to use any cloud service user first uses the biometric authentication service rather than a traditional password mechanism. Once authenticated, the user is redirected to the actual cloud service for which he is authorized to use. 4. 3 A PROPOSED METHOD [29] Step1: Setup cloud side parameters . Initialization On the cloud service side, given a security parameter 2. Key generation When tenants are registered in cloud computing providers, each tenant will obtain a unique identity to identify him or her. The phase generates private key corresponding to given registered ID of every tenant in cloud computing. Step2: Generate tenant’s biometric template Cloud computing is a pervasive service environment for tenants, different tenants have different security requirement. To these tenants who have special security concern on data can gene rate their biometric template and be stored in cloud database.Biometric authentication must be needed when someone wants to access the data. Step3: Encrypt cloud data Input: cloud data (which is created by cloud tenants and stored in the database of cloud platform), a private key (the cloud service providers), and an ID (the cloud tenant who want to access the data); output: encrypted cloud data. Step4: Biometric authentication As an excellent storage scheme for tenants’ big data, cloud computing has been a hot issue for a lot of consumers, generally, tenants’ different data should be processed by different security modes.Biometric authentication has the advantage of exclusive for tenant in data access. Step4: Biometric authentication As an excellent storage scheme for tenants’ big data, cloud computing has been a hot issue for a lot of consumers, generally, tenants’ different data should be processed by different security modes. Biometric authentication has the advantage of exclusive for tenant in data access. When any registered cloud tenant say, p, want to access the data stored in cloud, first, he must pass the cloud system check such as cloud_sys_checker.Then, cloud tenants use registered identity ID to create their biometric template and all of the created templates are stored in cloud_sys_database. In cloud data access, cloud tenant p must pass the biometric authentication performed by biometric matcher in cloud computing. Step5: Decrypt cloud data Input: encrypted cloud data ciphertext (which is generated in Step3), an ID (the cloud service provider’s), a private key (the cloud tenant who want to access the data), and output: the corresponding plaintext i. e. cloud data. CHAPTER FIVE 5. 1 SUMMARYIn summary, as Biometrics allow for increased security, convenience we can say that fused biometric authentication system will be novel solution for authenticating users on cloud computing ,which can be provided as service on cloud . By following guiding principles discussed in this paper, a great deal of insecurities may be easily expelled, saving business owners’ valuable time and investment. Cloud computing has the potential to become a frontrunner in promoting a secure, virtual and economically viable IT solution. Future work and progress lies in standardising Cloud computing security protocols 5. CONCLUSION . Authentication is necessary in Cloud Computing. In order to seek a secure data access method for cloud tenants, a proposed method presented a secure data access mechanism based on identity-based encryption and biometric authentication in this paper, the mechanism set double protection for confidential data of cloud tenants, encryption will make the tenants data secure against the peekers and biometric authentication will eliminate the maloperations over tenants data by root administrator in cloud service. The security of data is maintained even though the same application is shared by mu ltitenant.To ensure the correctness of users’ data in cloud data storage, an effective and flexible biometric is proposed. i believe that data storage security in Cloud Computing, an area full of challenges and of paramount importance, is still in its infancy now, and many research problems are yet to be identified. This proposed method can be implemented with more security by using strong biometric m easures like eye. REFERENCES [1] http://en. wikipedia. org/wiki/Biometrics [2] J. L. Wayman, â€Å"Fundamentals of Biometric Authentication Xhtp:/ww. engr. sisu. edu/biometrics/nbtcw. p 4] http://www. fi. muni. cz/reports/files/older/FIMU-RS-2000-08. pdf [6] http://www. indexbiometrics. com/physiological_or_behavioral. htm [7] http://ntrg. cs. tcd. ie [8] Cernet. â€Å"CHARACTERISTICS OF BIOMETRIC SYSTEMS†. [online] available: http://www. ccert. edu. cn/education/cissp/hism/039-041. html. February 2013 [9] V. Vijaya Kumari and N. Suriyanarayanan. â€Å"Performance Measu re of Local Operators in Fingerprint Detection. † Academic Open Internet Journal, vol. 23, pp. 1-7, (2008). [10] www. gao. gov/cgi-bin/getrpt? GAO-03-1137T. February 2013 [11] Jain, A. K. ; Ross, A. Pankanti, S. , â€Å"Biometrics: a tool for information security† Volume: 1 Issue: 2, Issue Date: June 2006, page(s): 125 – 143 [12] Michael E. Schuckers, â€Å"Some Statistical Aspects of Biometric Identification Device Performance†, 2001 [13] Sandra Maestre, Sean Nichols â€Å"DNA Biometrics†, 2009 [14] Massimo Tistarelli and Marks Nixon, â€Å"Advances In Biometrics†, Springer-Verlag Berlin Heidelberg 2009, ISBN 03029743 [15]Erdogmus, H. : Cloud Computing: Does Nirvana Hide behind the Nebula? IEEE Software 26(2), 4–6 (2009) [16] Leavitt, N. : Is Cloud Computing Really Ready for Prime Time?Computer 42(1), 15–20(2009) [17] Gens F, 2009,’ New IDC IT Cloud Services Survey: Top Benefits and Challenges’,IDC eXchange, viewe d 18 February 2010, Accessed online @ . February 2013 [18]Ramgovind S, Eloff MM, Smith E,† The Management of Security in Cloud Computing† [Online] Available: http://uir. unisa. ac. za/bitstream/handle/10500/3883/ramgovind. pdf;jsessionid=75882F66B5AF28B3D640A3C5F9CFD837? sequence=1 February 2013 [19] A Platform Computing Whitepaper, ‘Enterprise Cloud Computing: Transforming IT’, Platform Computing, pp6, viewed 13March 2010. 20]Global Netoptex Incorporated, 2009, â€Å"Demystifying the cloud. Important opportunities, crucial choices† , [online] pp 4-14 Available: http://www. gni. com, February 2013 [21] Brodkin J, 2008, ‘Gartner: Seven cloud-computing security risks’, Infoworld, Accessed [email  protected] http://www. infoworld. com/d/security-central/gartner-seven-cloudcomputing-Security-risks-853? page=0,1 February 2013 [22] J. Ilonen, Keystroke dynamics, Lappeenranta University of Technology, Finland, http://www. it. lut . fi/kurssit/ 03-04/010970000/seminars/Ilonen. pdf (2003) [23] S. L.Garfinkel, â€Å"An evaluation of amazon’s grid computing services: EC2, S3, and SQS†, Technical Report TR-08-07, Computer ScienceGroup, Harvard University, Citeseer, 2007 [24] S. L. Garfinkel, â€Å"Email-based identification and authentication: An alternative to PKI? â€Å", IEEE Security and Privacy, 1(6), 2003 [25] Cloud Computing Security: From Single to Multi-Clouds [Online] Available: http://ieeexplore. ieee. org/stamp/stamp. jsp? tp=&arnumber=614956 February 2013 [26] Rahultech â€Å"IT trends-latest/recent trends in information technology† 2010[online] available: