Wednesday, October 30, 2019

S6W3Dqs Essay Example | Topics and Well Written Essays - 500 words

S6W3Dqs - Essay Example The same applies to President Eisenhower’s in his farewell address. In this respect, Henry Kissinger’s remark that â€Å"Morality has nothing to do with foreign policy† is totally misplaced and uncalled for. Morality should, as a matter of fact, be part and parcel of the overall national strategy. Morality has to do with the distinction of good from bad or right from wrong. On the other hand, foreign policy is concerned with the beliefs, attitudes and actions of America towards other countries. Mr. Y (2011), in A National Strategic Narrative clearly articulates the American dream as regards to foreign policy. For instance, the narrative calls upon the United States to pursue it domestic and foreign policies with a unified effort that reflect constancy of purpose (The National Strategy Forum Review, 2010). It further goes on to state that US should pursue her national interest while at the same time allow others to pursue theirs. However, this is pegged on condition that American values are not betrayed. Finally, Mr. Y says that America should seek fair competition and should not hesitate to deter bad behavior. This in itself is a moral position in foreign policy. Based on personal reflection, the National Strategic Narrative, and a recollection of values enshrined in American constitution, the role of morality in national security strategy cannot be downplayed. Other nations will only respect the position of USA on various matters based on her moral standards. The involvement of multinationals such as NATO in America national security has greatly boosted the collective power to promote security, curb incumbent threats, as well as protect the American citizens. Such is the case with which NATO and its 27 member states work to promote ideas and peace of the member countries. America is part and parcel of these efforts done by NATO. Secondly, multinationals work with the American government to advance the

Monday, October 28, 2019

Lamb to the Slaughter Essay Example for Free

Lamb to the Slaughter Essay Rohal Dahl’s short story, ‘Lamb to the Slaughter’, set in the early 20th century, isn’t your typical crime-fiction story, a murder is brewing. As the detectives strive for answers, eating away their only clue, Dahl communicates to the reader that the contrast is unexpected. A housewife, Mary Maloney, is expecting her husband home after a long day at work; unaware to the news he carries with him. Dahl never reveals the news to the readers, but gives them clues by Mary’s reactions. As the author continues the story, the readers sense a mood between Mr. and Mrs. Maloney. This serves the purpose of foreshadowing by hinting at a future problem or disagreement. Dahl uses several writing techniques such as language style, characterization, point of view, plot structure and setting to make the story more exciting and enjoyable. Lamb to the Slaughter, is written in their person to take most of the character’s personal feelings out of the story. Writing in third person is a stronger, more forceful type of writing because the main points and events stand out them selves without feelings getting in the way. One of the reasons authors write in third person is to dis-include themselves from the story. By using words like they, she and he, Dahl has excluded both himself and the reader from the story, creating a stronger, more enjoyable story. The first character introduced in the novel is Mary Maloney. Because it is only a short story, Dahl has left most of the physical features of the character out and focused more in the idiosyncrasies and actions of each character. Along the way Mary’s features are described but not in dept. Another way characters are revealed is by the way others react to them and how much emotion each character puts in their speech. Dahl has made sure that the readers feel intrigued by Mrs. Maloney’s character and how she changes from such an innocent woman to an emotionless murderer.

Saturday, October 26, 2019

The Miraculous Reishi: Mushroom or Medicine? :: Botany

The Miraculous Reishi: Mushroom or Medicine? Ganoderma lucidum, otherwise known as the Reishi or Mannentake has been heralded by Asian cultures for many centuries. It is a polypore mushroom of corky or woody texture that appears to have a coat of varnish on the top. It is a shelf mushroom that grows on dead and dying trees. There are many varieties of Reishis. Akashiba is the red Reishi, the most potent; Kuroshiba--the black Reishi; Aoshiba--the blue Reishi; Shiroshiba--the white Reishi; Kishiba--the yellow Reishi; and Murasakishiba--the purple Reishi. (www.canited.com/w-reshi.htm) The Reishi mushroom is attributed with many health stimulating properties from general good health and recuperation, to longevity, sexual prowess, wisdom, and happiness. In certain cases it is used as sculptural artwork. Under certain conditions the fruiting body takes on what is referred to as an "antler" shape, that to some is aesthetically pleasing. According to Paul Stamets, this is a result of elevated carbon dioxide levels in the surrounding en vironment. Reishis may prove useful to the fight against cancer as well. More and more research is being conducted about compounds, in reishis, that stimulate the immune system. Historical Usage Reishi, Ling Zhi, or Saiwai-take, a mushroom of many names and uses. It has been documented with some pretty amazing properties for over two thousand years. "The earliest mention of Ling Chi was in the era of the first emperor of China, Shi-huang of the Ch'in Dynasty (221-207 B.C.)" (Stamets, 355) The Reishi is credited with longevity, increased virility and sexual prowess; the Chinese considered it one of the "Herbs of the Gods". In China it was believed that a tincture of this type of mushroom could bring the dead back to life. Often sold in Chinese medicine shops, commonly in tinctures with Ginseng. Ganoderma lucidum, or a closely related species, can be used to combat high altitude sickness. Himalayan guides sometimes employ the Reishi for this purpose. Mayan Indians have used reishis to fight and prevent communicable diseases. In China, sometimes a woman will give a man Reishis to express sexual interest. The antler form mentioned previously is favored for this purpose. Interest ing considering that the Reishi is supposed to stimulate sexual virility. Medicinal Usage The Reishi is a mushroom of many medicinal properties. Supposed to cure cancer, arthritis, chronic fatigue syndrome, and a whole slew of other ailments. It is no wonder that it is supposed to grant its user a long healthy life. The Miraculous Reishi: Mushroom or Medicine? :: Botany The Miraculous Reishi: Mushroom or Medicine? Ganoderma lucidum, otherwise known as the Reishi or Mannentake has been heralded by Asian cultures for many centuries. It is a polypore mushroom of corky or woody texture that appears to have a coat of varnish on the top. It is a shelf mushroom that grows on dead and dying trees. There are many varieties of Reishis. Akashiba is the red Reishi, the most potent; Kuroshiba--the black Reishi; Aoshiba--the blue Reishi; Shiroshiba--the white Reishi; Kishiba--the yellow Reishi; and Murasakishiba--the purple Reishi. (www.canited.com/w-reshi.htm) The Reishi mushroom is attributed with many health stimulating properties from general good health and recuperation, to longevity, sexual prowess, wisdom, and happiness. In certain cases it is used as sculptural artwork. Under certain conditions the fruiting body takes on what is referred to as an "antler" shape, that to some is aesthetically pleasing. According to Paul Stamets, this is a result of elevated carbon dioxide levels in the surrounding en vironment. Reishis may prove useful to the fight against cancer as well. More and more research is being conducted about compounds, in reishis, that stimulate the immune system. Historical Usage Reishi, Ling Zhi, or Saiwai-take, a mushroom of many names and uses. It has been documented with some pretty amazing properties for over two thousand years. "The earliest mention of Ling Chi was in the era of the first emperor of China, Shi-huang of the Ch'in Dynasty (221-207 B.C.)" (Stamets, 355) The Reishi is credited with longevity, increased virility and sexual prowess; the Chinese considered it one of the "Herbs of the Gods". In China it was believed that a tincture of this type of mushroom could bring the dead back to life. Often sold in Chinese medicine shops, commonly in tinctures with Ginseng. Ganoderma lucidum, or a closely related species, can be used to combat high altitude sickness. Himalayan guides sometimes employ the Reishi for this purpose. Mayan Indians have used reishis to fight and prevent communicable diseases. In China, sometimes a woman will give a man Reishis to express sexual interest. The antler form mentioned previously is favored for this purpose. Interest ing considering that the Reishi is supposed to stimulate sexual virility. Medicinal Usage The Reishi is a mushroom of many medicinal properties. Supposed to cure cancer, arthritis, chronic fatigue syndrome, and a whole slew of other ailments. It is no wonder that it is supposed to grant its user a long healthy life.

Thursday, October 24, 2019

Computational Multibody Model Elbow Joint Health And Social Care Essay

Abstraction: Computational multibody mold can be used as a various tool to analyze joint mechanics, joint hurt, examine ligament map, and to foretell joint contact force per unit area. This paper describes a fresh method for the development and rating of a computational multibody theoretical account that represents human elbow flexion- extension associated with forearm pronation-supination. An expeditiously developed theoretical account can help sawboness and other research workers in the design and rating of interventions for cubitus hurts, and contribute to the improvement of patient attention. Therefore, it is really much necessary to analyze biomechanical technology to develop and formalize an effectual cubitus theoretical account for the optimum intervention of cubitus upsets prior to their application in patients. The computational theoretical account accurately predicted flexion-extension gesture bounds, and relationships between coronoid procedure remotion, flexure angle, and varus constraining forces. The theoretical account was besides able to calculate parametric quantities that the experimental probes could non, such as forces within ligaments and contact forces between castanetss [ 1 ] . Introduction: The cubitus articulation is the 2nd most normally dislocated joint in grownups [ 2 ] . Relative to hurts and upsets of the lower limb, there is relatively small grounds to direct intervention of many elbow hurts [ 3 ] . Computational theoretical accounts of the cubitus could profit our apprehension and intervention of upper appendage upsets. Multibody mold is an effectual and powerful tool in biomechanics. The multibody patterning attack has been used by research workers for patient-specific preoperative planning, computer-aided surgery, and computer-aided rehabilitation. Biomechanical computational theoretical accounts of the cubitus have been developed, but all limited their pertinence by presuming fixed joint axes of rotary motion, ordering specific kinematics, simplifying ligament features or disregarding gristle consequence [ 2, 4-6 ] . Therefore, the cardinal aim of this survey was to develop and formalize a multibody theoretical account of the cubitus articulatio n that includes representation of articular gristle and ligaments as non-linear viscoelastic springs. The topic specific theoretical account was validated by comparing predicted bone kinematics to mensurate gesture of the identically loaded corpse cubitus utilizing a bi-axial mechanical examiner. The overall end of the undertaking is to put capable specific articulation theoretical accounts within musculus driven musculoskeletal motion simulations of the upper-extremities. Methods and Materials: The experimental and multibody patterning methods were similar to that described by Stylianou et Al. [ 7 ] and Bloemker et al. [ 8 ] . One fresh frozen corpse cubitus ( 44 old ages old, female, left cubitus, 152cm tallness, 41 kg mass ) was used for this survey. The humerus caput was cemented with a cylinder that was attached by a flexible joint articulation to a Bose 3510 bi-axial mechanical examiner. The triceps musculuss sinews was sutured and tightly connected to a burden cell that was stiffly attached to the top cylinder of the testing machine. The elbow bone was besides fixed to a cup connected to the mechanical examiner via a cosmopolitan articulation ( Fig 1 ) .The radius was free to revolve. For each simulation kinematics of the humerus and ulna were obtained utilizing stiff organic structure markers and a 3-camera Optotrak Certus system ( Northern Digital, Inc. , Waterloo, ON, Canada ) and the forces on triceps sinews were recorded by a burden cell ( Model SBO-100, Temecula, CA 92590 ) . The initial place and orientation of cadaverous bone geometries relative to the dynamic simulator were recorded utilizing a examining tip with the Optotrak system. After proving, the cubitus was dis-articulated and the median collateral ligament ( MCL ) , sidelong collateral ligament ( LCL ) , triceps insertion/origin sites were measured with an Optotrak digitizing investigation.3omega ten Y Load Cell Ired Localizer21C: UsersmmrhwbDesktoppictureElbow # 2 # 3 proving images & A ; videos100_0183.jpg C: UsersmmrhwbDesktopReportpictureabs_model_pic.jpgFig 1: Experimental Setup Fig 2: Model ApparatusComputed Tomography ( CT ) scan images of the cubitus castanetss and localizers were taken to do 3D bone geometries. The plan 3D Slicer ( www.slicer.org ) was used to make the bone and localizer geometries from the CT images by utilizing car cleavage. Geomagic Studio ( Geomagic, Inc. Research Triangle Park, NC ) was used for file transition and post-process filtering of the cubitus geometries including smoothing, taking spikes, and cut downing noise. The bone geometries and ligament insertion/origin points were aligned in MSC.ADAMS ( MSC Software Corporation, Santa Ana, CA ) by utilizing the initial place points and point clouds of each bone ( Fig 2 ) . The ligaments and musculus sinews were modeled as nonlinear springs utilizing a piecewise map depicting the force-length relationship for each p ackage [ 9 ] . A subprogram was written in ADAMS to depict this relationship. This subprogram was derived from the ligament force as a map of strain, the length of each ligament in the place it was constructed, the measured zero-load length and the ligament stiffness. The zero-load length of each package was determined by ciphering the maximal straight-line distance between interpolation and beginning sites throughout the by experimentation measured full scope of gesture and so using a rectification per centum of 80 % [ 8 ] . The gristles geometries were modeled as stiff organic structures of 0.5 millimeters unvarying thickness by squeeze outing cartilage country of bone surface by utilizing Geomagic shell map. Soft contacts were applied between gristle geometries utilizing a contact map in MSC.ADAMS that allows for interpenetration of the geometries to imitate soft tissue [ 7 ] . Consequence: The theoretical account is validated by comparing the kinematics and RMS mistake of each bone and triceps tendon force obtained from the theoretical account versus the experimental information. The comparing of kinematics graphs demonstrates that the theoretical account replicates the experiment.AA Degree centigrade: UsersmmrhwbDesktopReportpicture3_y_abs.jpgCCalciferol FoC: UsersmmrhwbDesktopReportpicture6_y.jpgFigure 3: Comparison of Movement in y-direction of Humerus ( A ) , Ulna ( B ) and Radius ( C ) . Motion informations are taken from Marker 1, 2 & A ; 3 shown in Figure 2.Degree centigrades: UsersmmrhwbDesktopReportpicture ricep_force.jpgC: UsersmmrhwbDesktopReportpicture7_y_abs.jpgFigure 4: Comparison of triceps tendon forceBMarker No.Marker 1 ( millimeter )Marker 2 ( millimeter )Marker 3 ( millimeter )Tricep sinew force ( N )RMS mistaketen 2.40 ten 5.90 ten 10.0 6.5 Y 1.96 Y 2.54 Y 6.20 omega 1.27 omega 4.80 omega 9.37Table 1: RMS Mistake in x, y & A ; z way for marker 1,2 & A ; 3 and tricep sinewDiscussion: The chief purpose of this survey was to make and formalize a topic specific computational multibody theoretical account of the elbow articulation composite to foretell joint behaviour. Model cogency was successfully demonstrated through comparings of fake kinematics and triceps tendon tenseness informations obtained from cadaver experiment. The chief advantages of this theoretical account are the ability to foretell ligament and contact forces which are really hard to capture by experimentation [ 1 ] . Future work includes utilizing non-uniform distinct gristle, adding more ligament packages, annulate ligaments, and patterning soft tissue wrapper. The developed techniques will so be used for capable specific musculoskeletal motion simulations of the upper-extremity that include anatomical theoretical accounts of the cubitus. Recognitions: This research is funded by the School of Medicine, University of Missouri-Kansas City. Mentions: [ 1 ] J. P. Fisk and J. S. Wayne, â€Å" Development and Validation of a Computational Musculoskeletal Model of the Elbow and Forearm † , Ann. Biomed. Eng. , Vol. 37, No. 4, pp. 803-812, April 2009, [ 2 ] J. de Haan, N.W.L. Schep, D. Eygendaal, G-J. Kleinrensink, W.E. Tuinebreijer and D. den Hartog â€Å" Stability of the Elbow Joint: Relevant Anatomy and Clinical Implications of In Vitro Biomechanical Studies † The Open Orthop. J. Vol.5, pp.168-176, May 2011. [ 3 ] L. M. Ferreira, J. A. Johnson, Graham J.W. King, â€Å" Development of an active cubitus gesture simulator to measure kinematics with the humerus in the multiple places † , J Biomech. Vol. 43, No.11, pp. 2112-2119, August 2010 [ 4 ] F.C. Anderson, M.G. Pandy. â€Å" Dynamic optimisation of human walking † . J. Biomech Eng. Vol.123, No.5, pp.381-390, October 2001. [ 5 ] . A.S. Arnold, S.L. Delp. â€Å" Rotational minute weaponries of the median hamstrings and adductors vary with femoral geometry and limb place: deductions for the intervention of internally rotated pace † , J. Biomech, Vol. 34, No.4, pp.437-447, April 2001. [ 6 ] . T.M. Barker, C. Kirtley, J. Ratanapinunchai, â€Å" Calculation of multi-segment stiff organic structure joint kineticss utilizing MATLAB † , Proc. Inst. Mech. Eng. [ H ] , Vol.211, No.6, pp.483-487, 1997. [ 7 ] A. P. Stylianou, T. M. Guess, J. L. Cook, â€Å" Development and proof of a multi-body theoretical account of the eyetooth knee articulation † , Comp. Meth. Biomech. Biomed. Eng. , DOI: 10.1080/10225842.2012.684243, pp. 1-8, May 2012. [ 8 ] K. H. Bloemker, T. M. Guess, L. Maletsky, K. Dodd, † Computational Knee Ligament Modeling Using Experimentally Determined Zero-Load Lengths † , The Open Biomed. Eng. , Vol.6, pp.33-41, April 2012 [ 9 ] G. Li, J. Gil, A. Kanamori, S. L. Woo. â€Å" A validated 3-dimensional computational theoretical account of a human articulatio genus articulation † , J. Biomech. Eng. Vol.121, No.6, pp.657-662, December 1999

Wednesday, October 23, 2019

Media Formulation

Medium formulation is an essential stage in the design of fermentation process. Most fermentation media require liquid media, although some solid-substrate fermentations are also operated. Fermentation media must satisfy all the nutritional requirements of the microorganisms and fulfill the technical objectives of the process. There are several stages where media are required in a fermentation process; inoculum (starter culture), propagation steps, pilot-scale fermentations and the main production fermentations.According to Cruger W and Cruger A (1990); on a large scale, the sources of nutrients should be selected to create a medium which should meet as many as many possible of the following criteria: i. It should produce the maximum yield of product or biomass per gm of substrate used. ii. It should produce maximum concentration of product or biomass. iii. It should permit the maximum rate of product formation. iv. There should be the minimum yield of undesired products. v. It shoul d be of a consistent quality and be readily available throughout the year. vi.It should cause minimal problems during media preparation and sterilization. vii. It should cause minimal problems in other aspects of the production process particularly aeration and agitation, extraction, purification and waste treatment. The initial step in media for media formulation is the examination of the overall process on the stoichiometery for growth and product formation. The optimization of a medium should be carried out such that it meets as many as possible of the seven criteria. Different combinations and sequences of process conditions have to be investigated to determine growth conditions (Stanbury P.F and Whitaker A; 1995). Medium optimization can be carried by the classical method, in which one independent variable is changed while keeping all others at a certain level. An aerobic fermentation process may be represented as: Carbon and energy source + Nitrogen source + O2 + other require ments Biomass + products + CO2 + H2O + heat This primarily involves consideration of the input of the carbon and nitrogen sources, minerals and oxygen and their conversion to cell biomass, metabolic products.Based on this information, it should be possible to calculate the minimum quantities of each element required to produce a certain quantity of biomass and metabolite According to Prasanthi V et al (2008); Chlorella vulgaris is a green, spherical, single celled fresh water microalga belongs to the phylum Chlorophyta. As per the study conducted so far it is found that green algae are the highest source of chlorophyll in the plant world and particularly, Chlorella one of the members of green algae is the richest source of chlorophyll which is widely used as a health food and feed supplement.The aim of this work is to design different medium types to evaluate optimization combinations for maximum growth, morphology and pigment content of C. vulgaris. Effect of glucose Three differen t volumes of glucose from apple juice while other variables are kept constant. The volumes that were used are 5g/l, 15g/l and 30g/l. The highest chlorophyll production (12%) was obtained with a glucose concentration of 15g/l. Glucose is used as a carbon source which is required for all biosynthesis leading to reproduction, product formation and cell maintenance. It also serves as the energy source.Carbon requirements may be determined from the biomass yield coefficient (Y), an index of the efficiency of conversion of a substrate into the cellular material: Ycarbon (g/g) = biomass produced (g) __________________ Glucose substrate utilized (g) An increase in glucose concentration of 30g/l resulted in the production of chlorophyll being at a constant this is because all the active sites of the microorganism are occupied and active carrying out biochemical reactions. At low glucose concentration of 5g/l very little biomass (chlorophyll) is obtained and also there is low growth rate.Thus , glucose concentration significantly influences chlorophyll production and microbial growth of the microorganism. Constraints that can be generated include the fact that apple juice not only contains one type of sugar, glucose but also contains other sugars (fructose and sucrose) which the microorganism can either utilise for growth resulting in us not obtaining accurate optimization results and also the other sugars can inhibit the growth of the microorganism. Apple juice also contains soluble pectin these can be difficult to digest hence a reduction in biomass.Effect of nitrogen from defatted soya Nitrogen being important constituent of the cell protein was needed for algal growth, either in combined or in molecular form. It is also a component of proteins nucleic acids some co-enzymes. Industrially important microorganisms can utilize both inorganic and organic nitrogen sources. Inorganic nitrogen may be supplied as ammonium salts, often ammonium sulphate and diammonium hydrogen phosphate, or ammonia; these can be used in place of defatted soya. Ammonia can also be used to adjust the pH of the fermentation.As nitrogen deficiency develops the amount of chlorophyll in the cells decreases faster than the nitrogen content in C. vulgaris. Nitrogen is a limiting factor if continually increased it can inhibit the production of chlorophyll. Varying concentrations of nitrogen were used i. e 0. 3g/l, 0,6g/l and 2. 0g/l. At 0. 3g/l little chlorophyll is obtained this is due to the fact that nitrogen being a macronutrient it is required in high concentration. At 0. 6g/l high yields of chlorophyll are obtained and at 2. 0g/l nitrogen turns to be a limiting factor and can lead to culture toxicity.Constraints can be generated when using Ammonia as a substitute for defatted soya this is due to the fact that ammonia leads to high pH which results in a precipitate formation in the medium but lower pH of the medium prevent the precipitation. Foaming in a microbiological proc ess is due to media proteins that become attached to the air-broth interface where they denature to form stable foam. Non-treatment of foam may block air filters, resulting in loss of aseptic conditions. The foam production can be controlled by addition of chemical antifoam. Natural antifoams include plant oils (e. g.Soya, sunflower and rapeseed), hence defatted soya is used as a nitrogen source rather than ammonia. Also high concentrations of ammonium ions can be toxic to cells of the microbe. Effect of Mg2+ MgSO4 can be used as the source of magnesium. It promotes the maximum growth of the present alga and it is also incorporated as an enzyme co-factor component of chlorophyll. Three salt concentrations were used 0. 1g/l; 0. 5g/l and 1g/l. At low salt concentration of 0. 1g/l it results in a magnesium deficiency which interrupted cell division in Chlorella which results in abnormally large cell formation. Increase in salt concentration of 0. g/l and 1g/l of magnesium alone in the medium resulted in higher cell number, although increase in nitrogen alone did not make much difference that means cells need magnesium to synthesize chlorophyll. The process of multiplication requires a larger concentration of magnesium in the medium than does the production of cell material. Iron uptake is strictly required to optimize the process. References 1). Crueger W and Crueger A. 1990. A Textbook of Industrial Microbiology. Oxford. Panima Publishing Corporation. 2). Stansbury P. F and Whitaker A . 1995. Principles of fermentation technology. New York. Pergamon Press. 3).Prasanthi V, Yugandhar M. N, Vuddaraju S. P, Nalla K. K, Raju C. A. I and Donthireddy S. R. R. Optimization of the fermentation media using statistical approach and artificial neural networks for the production of chlorophyll by Chlorella vulgaris. International Journal of Natural and Engineering Sciences. 2008. 2 (3): 51-56 CHINHOYI UNIVERSITY OF TECHNOLOGY NAME: Ngara Tanyaradzwa R REG NUMBER: C1110934J C OURSE: Process Optimization and Production COURSE CODE: CUBT 208 PROGRAM: BSBIO Level 2:2 Assignment: 1 Lecturer Dr Zvidzai

Tuesday, October 22, 2019

Battle of Franklin - Civil War Battle of Franklin - John Bell Hood

Battle of Franklin - Civil War Battle of Franklin - John Bell Hood Battle of Franklin - Conflict: The Battle of Franklin was fought during the American Civil War. Armies Commanders at Franklin: Union Major General John Schofield30,000 men Confederate General John Bell Hood38,000 men Battle of Franklin - Date: Hood attacked the Army of the Ohio on November 30, 1864. Battle of Franklin - Background: In the wake of the Union capture of Atlanta in September 1864, Confederate General John Bell Hood regrouped the Army of Tennessee and launched a new campaign to break Union General William T. Shermans supply lines north. Later that month, Sherman dispatched Major General George H. Thomas to Nashville to organize Union forces in the area. Outnumbered, Hood decided to move north to attack Thomas before the Union general could reunite with Sherman. Aware of Hoods movement north, Sherman sent Major General John Schofield to reinforce Thomas. Moving with VI and XXIII Corps, Schofield quickly became Hoods new target. Seeking to prevent Schofield from joining with Thomas, Hood pursued the Union columns and the two forces squared off at Columbia, TN from November 24-29. Next racing to Spring Hill, Schofields men beat off an uncoordinated Confederate attack before escaping in the night to Franklin. Arriving at Franklin at 6:00 AM on November 30, the lead Union troops began preparing a strong, arc-shaped defensive position to the south of the town. The Union rear was protected by the Harpeth River. Battle of Franklin - Schofield Turns: Entering the town, Schofield decided to make a stand as the bridges across the river were damaged and needed to be repaired before the bulk of his forces could cross. While repair work commenced, the Union supply train slowly began crossing the river using a nearby ford. By noon, the earthworks were complete and a secondary line established 40-65 yards behind the main line. Settling in to await Hood, Schofield decided that the position would be abandoned if the Confederates did not arrive before 6:00 PM. In close pursuit, Hoods columns reached Winstead Hill, two miles south of Franklin, around 1:00 PM. Battle of Franklin - Hood Attacks: Establishing his headquarters, Hood ordered his commanders to prepare for an assault on the Union lines. Knowing the dangers of frontally attacking a fortified position, many of Hoods subordinates attempted to talk him out of the assault, but he would not relent. Moving forward with Major General Benjamin Cheathams corps on the left and Lieutenant General Alexander Stewarts on the right, the Confederate forces first encountered two brigades of Brigadier General George Wagners division. Posted half a mile forward of the Union line, Wagners men were supposed to fall back if pressed. Disobeying orders, Wagner had his men stand firm in an attempt to turn back Hoods assault. Quickly overwhelmed, his two brigades fell back toward the Union line where their presence between the line and the Confederates prevented Union troops from opening fire. This failure to cleanly pass through the lines, coupled with a gap in the Union earthworks at the Columbia Pike, allowed three Confederate divisions to focus their attack on the weakest part of Schofields line. Battle of Franklin - Hood Wrecks His Army: Breaking through, men from Major Generals Patrick Cleburne, John C. Brown, and Samuel G. Frenchs divisions were met by a furious counterattack by Colonel Emerson Opdyckes brigade as well as other Union regiments. After brutal hand-to-hand fighting, they were able to close the breach and throw back the Confederates. To the west, Major General William B. Bates division was repulsed with heavy casualties. A similar fate met much of Stewarts corps on the right wing. Despite the heavy casualties, Hood believed that the Union center had been badly damaged. Unwilling to accept defeat, Hood continued to throw uncoordinated attacks against Schofields works. Around 7:00 PM, with Lieutenant General Stephen D. Lees corps arriving on the field, Hood selected Major General Edward Allegheny Johnsons division to lead another assault. Storming forward, Johnsons men and other Confederate units failed to reach the Union line and became pinned down. For two hours an intense firefight ensued until Confederate troops were able to fall back in the darkness. To the east, Confederate cavalry under Major General Nathan Bedford Forrest attempted to turn Schofields flank but were blocked by Major General James H. Wilsons Union horsemen. With the Confederate assault defeated, Schofields men began crossing the Harpeth around 11:00 PM and reached the fortifications at Nashville the next day. Battle of Franklin - Aftermath: The Battle of Franklin cost Hood 1,750 killed and around 5,800 wounded. Among the Confederate deaths were six generals: Patrick Cleburne, John Adams, States Rights Gist, Otho Strahl, and Hiram Granbury. An additional eight were wounded or captured. Fighting behind earthworks, Union losses were a mere 189 killed, 1,033 wounded, 1,104 missing/captured. The majority of those Union troops that were captured were wounded and medical personnel who remained after Schofield departed Franklin. Many were liberated on December 18, when Union forces re-took Franklin after the Battle of Nashville. While Hoods men were dazed after their defeat at Franklin, they pressed on and clashed with Thomas and Schofields forces at Nashville on December 15-16. Routed, Hoods army effectively ceased to exist after the battle. The assault at Franklin is frequently known as the Picketts Charge of the West in reference to the Confederate assault at Gettysburg. In reality, Hoods attack consisted of more men, 19,000 vs. 12,500, and advanced over a longer distance, 2 miles vs. .75 miles, than Lieutenant General James Longstreets assault on July 3, 1863. Also, while Picketts Charge lasted approximately 50 minutes, the assaults at Franklin were conducted over a span of five hours. Selected Sources Civil War Trust: Battle of FranklinCWSAC Battle Summary: Battle of Franklin

Monday, October 21, 2019

History of Imperialism

History of Imperialism There is no exact definition of imperialism in particular. Usually, this word is confused with colonialism. However, the two words are frequently related to European expansionism except that imperialism is far reaching to the Ottoman and Chinese histories. Certainly, imperialism was a way of life to ancient societies such as Persian and Greek, Aztec and Mayan among others.Advertising We will write a custom essay sample on History of Imperialism specifically for you for only $16.05 $11/page Learn More Imperialism by definition is the maintenance or creation of unequal cultural and economic relationship between states where one is a subordination of the other. Others define it as the policy that allows a nation to extend its authority or control through establishment of political and economic hegemony through acquisition of other nation’s territorial boundaries (Lenin 14). Imperialism evolved through a series of stages dating back to the AD era. Before developing into a major kingdom, Europe underwent major transformations over a long period of time. Meanwhile, Africa was characterized by a constant stream of explorers and outside traders who brought in new religions and ideas. On the other hand, Henry, the then Prince of Portugal, sent ships to West Africa in attempt to explore the area. He commanded ships to take gold to West Africa in exchange for slaves, and this resulted to the establishment of new colonies especially inside America. Imperialism then took a different phase of industrial revolution where natural resources and raw materials such as diamond and rubber were being transported to Britain. Then followed the era of The Atlantic Slave Trade where horrible injustice was committed against African slaves before they got sold to major kingdoms such as Britain (Lugard 59). Moreover, the scramble for Africa by colonial masters began, and this led to the Berlin Conference of 1888. However, imperialism was resisted in some Af rican countries like the Zulu in South Africa. Meanwhile, effects of imperialism especially loss of life through slave trade raised a lot of tension amongst African nations. This was followed by Independence Nationalism that led to the Pan-Africanism movement, which was aimed at bringing all Africans together on the basis of their common heritage. Through World War II, most European countries were weakened and Pan-Africanism gained strength. As such, most African nations gained independence during the 1950s.Advertising Looking for essay on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More However, these nations experienced poor governments and poor economies, which they struggled to stabilize. As this was happening in Africa, Middle East started experiencing imperialism through the collapse of the Ottoman Empire. In the nineteenth century, most independent states such as Egypt were recaptured by the Great Britain. Elsewhere, as India was struggling to gain independence in 1919, troops from Britain wounded and killed almost one thousand five hundred civilians (Lenin 39). What followed from that period was a series of events that led to today’s imperialism. Despite the brevity of the imperialism era, its impact on the world was immense. The European countries who were the major perpetrators of this concept had their culture and society tremendously influenced by the various colonies they captured. Even after independence of most colonies, the interaction process between the colonized and the colonizers continued. Consequently, massive migration from the colonies into Europe occurred, and this was a key factor to the emergence of Europe’s multicultural societies. On a similar note, the culture of Europe was copied to the colonized nations. For instance, European sports such as soccer and cricket are adapted in most countries around Africa, the Pacific, and Asia. This idea is further evidenced by the manner in which countries around these regions speak French and English. Besides, the imperialism legacy developed in different spheres of such colonies. This includes metropolitan economic ties, communication networks, and economic structures that have undoubtedly shaped the contemporary society. Surprisingly, the imperialism legacy has far reaching effects not only in the past, but also in the foreseeable future. Take for example the world’s fluctuations on market that greatly depend on Europe’s economy, which has become so hard to remove, and hence, enhancing this idea of dependency (Lugard 22). Accordingly, imperialism related legacy extends to religious systems in the colonized countries. Not only did campaigns by Christian missionaries convert individuals, but also they left behind a series of Christian states such as Ghana, South Africa, Kenya, and Nigeria in Africa.Advertising We will write a custom essay sample on History of Imperialism specifi cally for you for only $16.05 $11/page Learn More They also left behind Catholicism in South Asia and Latin America. Moreover, modernization resulted from imperialism. This resulted to descent cities, the emergence of the money economy, ownership of private land, modern medicine, cash crop farming, and modern technologies among others. Besides, some of the legacy include infrastructure. Evidence exists that some British built road network and water projects in India, Kenya, Zimbabwe, and Pakistan are present up to date. In addition, the British employed the divide and rule strategy that led to ethnic divisions present in our society. For example, they preferred the Hausa and Tutsi communities in Nigeria and Rwanda respectively. They also preferred the Kikuyu in Kenya and the resettled slaves in Liberia. Also, they placed borders illogically, and this led to ethnic conflicts such as those seen in Kashmir, Palestine/Israel, Spanish Sahara/Moroccan Sahara, Biafra war, and West/Eastern Pakistan. Lenin, Vladimir. Imperialism: The Highest Stage of Capitalism. Moscow: Foreign Languages Publishing House, 1947. Lugard, Frederick. The Dual Mandate in British Tropical Africa. Edinburgh and London: Blackwood and Sons, 1922.

Sunday, October 20, 2019

Lemon Juice and Baking Soda Reaction Project

Lemon Juice and Baking Soda Reaction Project The lemon fizz project is a fun bubbly science experiment using kitchen ingredients that’s ideal for kids to try. Lemon Fizz Materials Baking soda (sodium bicarbonate)Lemon juice or a lemon cut into quartersLiquid dishwashing soap (e.g., Dawn or Joy)Food coloring (optional)Spoon or strawNarrow glass or cup The Lemon Fizz Project Put a spoonful (about a teaspoon) of baking soda into a glass.Stir in a squirt of dishwashing liquid.Add a drop or two of food coloring, if you want colored bubbles.Squeeze lemon juice into the mixture or pour in lemon juice. Other citrus fruit juices work too, but lemon juice seems to work the best. As you stir the juice into the baking soda and detergent, bubbles will form that will start to push up and out of the glass.You can extend the reaction by adding more lemon juice and baking soda.The bubbles are long-lasting. You cant drink the mixture, but you can still use it for washing dishes. How It Works The sodium bicarbonate of the baking soda reacts with the citric acid in lemon juice to form carbon dioxide gas. The gas bubbles are trapped by the dishwashing soap, forming fizzy bubbles.

Saturday, October 19, 2019

Fence discrimination defence(not sure which one) Essay

Fence discrimination defence(not sure which one) - Essay Example The fences we put up are getting bigger, more inhuman and harder to overcome. It is the argument of this paper that these fences should not be allowed to exist, that we should not fence people in, whether the context is moral, social or cultural. Dr. Christina Kochemidova , in her article The Culture of the Fence: Artifacts and Meanings, brings up the various contexts a fence can be looked at. A fence can be used in many ways; as a bar, or barrier, to prevent ingress or to prevent escape. Alternatively it can be used as simply a marker, to demarcate a boundary. More often, fences are used as a division and increasingly as a means of control. These sorts of fences are invisible; they exist as rules, laws, and attitudes. This is also noted by Naomi Klein in her article Don' Fence Us In. There are numerous examples of this; racism, privatization and property rights are the most prevalent. These create barriers that are incredibly difficult to overcome. Man may have originally have used the fence to demarcate, but over the centuries it has evolved into more; a protective barrier, in one way, to keep the "other" out. The other can be anyone we perceive as a threat, or conversely anyone we wish to control. The fence as a control measure is frightening. This avatar is especially clear in the case of racism Racism is universal. Whether it manifests itself as the oppression and slavery of blacks in the United States, or as hatred of Pakistanis and Muslims in Norway, or the conflict between Hindus and Muslims in India and Pakistan, the common factor is the segregation and separation of two peoples based on the belief of the inherent superiority of one over the other. In fact, the word "apartheid" was created from the Afrikaans word for "separate"; the whole concept of a fence lies in that word. Racism has been responsible for some of the most horrible atrocities ever committed; the Holocaust, the slavery of blacks. In the United States, prior to the Civil War, Blacks were not even allowed the right to be citizens of the country; they were not even given the right to be considered human. Segregation in the south of the country took the form of separate facilities for everything including transport and housing. Even when they were finally recognized under the Constitution, they were still e ducated separately under the guise of "separate but equal" schools under the law. This sort of segregation is a fence. It separates and empowers one group, and suppresses another as is evidenced by the example given above. Denying an ethnic group the status of "human" is one of the most horrific fences that can be put up. This status was used to control the blacks and keep them "in their place". Denied education, proper housing, denied their very independence, the blacks were successfully controlled by these fences that kept them exactly where they were wanted. Education became an extremely important way to break out of these barriers. However, as noted by Hansman et al, education itself is prone to racist overtones. They remark that in many multicultural institutions, the structure of the work is planned around the majority culture, thereby leading to the ineffectual training of minority groups. Institutional factors therefore have a role in maintaining racial prejudice. Another

Friday, October 18, 2019

The Role of Corporate Social Responsibility in Sustainability Essay

The Role of Corporate Social Responsibility in Sustainability Development - Essay Example In addition the study will also shed light on the benefits of sustainable development to both societies as well as to the organizations. However, the study will mainly focus on the role played by corporate social responsibility (CSR) in fostering sustainable development of a company. Finally, on the basis of the findings the study will draw a conclusion. Discussion Since the late 1980s, nations from different parts of the world have been discussing about the need of sustainable development. The issue became more apparent when scientists identified the degradation of the ecosystem due to organizational activities. The subject of global warming was also becoming a cause of concern (Polese and Stren, 2000). In addition, to reduce the damages caused by the human and organizational activities, sustainable development become necessary. Nevertheless, after a certain point of time, sustainable development became an obligation for the organizations. Sustainable development is not only necessa ry for preserving the society and environment, but it is beneficial for both organizations as well as for the society. The study will now discuss about the advantages of sustainable development for both organizations and society. Advantages of Sustainable Development for Organizations In response to the increasing environmental challenge, high inequalities in the communal development, organizations around the world have adopted sustainable development, as their growth model (United Nations Industrial Development Organization, n.d). However, this approach has not only helped companies to continue their operation in an eco friendly way, but has also provided them with large numbers of benefits. Some of the most common ones are... This report declares that nowadays, most of the companies around the world have adopted different CSR mechanisms. Moreover, the mission and vision statement of some companies are formulated in such a way that it reflects the company’s viewpoint towards the society and environment. At the same time, these companies have also implemented innovative technologies by which they can reduce the consumption of energy and resources. Rapid population growth, globalization, urbanization and increasing middle class are the driving factors towards lessening down of scarce resources such as water, energy and raw materials. The study was about identifying the role played by corporate social responsibility in the sustainable development process of an organization. In order to satisfy the objective, the study has comprehensively researched the theories proposed by the scholars previously. In addition, real life examples regarding the area of concern were also considered. The study revealed that most of the firms around the world have adopted CSR activities in order to ensure both company as well as society gets benefitted by it. In addition, from the study it has been also identified that several CSR activities such as the smarter planet of IBM, Kellogg’s ‘k-value’ are playing a crucial role in the sustainable development process of the organizations. Therefore it can be concluded that corporate social responsibility is playing a major role in fostering sustainable development.

Research Paper on the History of the United States Navy Essay

Research Paper on the History of the United States Navy - Essay Example Thus, it can be said that the US navy does not have any specific origin, but it rather came in to being because of the requirements and political progressions of that time. In the eighteenth century, US navy used the fleet of the ship-of-line in their wars. These ships were beautifully designed keeping in mind all the important aspects of the needs and requirements of the war time. Three vast masts were incorporated in these ships, which towered 200 feet above the surface level of the sea. These ships basically worked on the propulsion of the winds, and they therefore were totally not dependent upon the energy. The ships were easy and comfortable enough to be lived in as long as possible. In the 19th century, when Japan started creating its own ships and battle cruises, the US naval forces started working on the building of new fleet of ships. Every war made the US navy stronger comparatively. Exercise and hardships made the US stand against all the naval forces of the world. In the present time, the US navy is considered to be the best among all the naval forces of the world (Howarth 229). The history of the US navy basically started from 1775 when the war between Lexington and Concord took place. A fleet under the leadership of Captain Abraham Whipple overtook and captured the British tender located in Narragansett Bay. Meanwhile, Congress was recommended to build a Continental Navy to fight against these actions. Washington’s navy, was asked by George Washington to attack the British ships by using Hannah in the action. In response to this action, Continental navy came into existence in the same year. Silas Deane, Christopher Gadsden and John Langdon were the supervisors of this work (Howarth 57). The first action of the Continental navy took place in 1776. The Continental Navy could not survive because its discovery was considered as the worst

Thursday, October 17, 2019

Germany and the Germans class Essay Example | Topics and Well Written Essays - 250 words

Germany and the Germans class - Essay Example Although honesty is considered a good quality in America, it is often the case that conversations lack directness, because Americans do not want to appear blunt and impolite. Environmental awareness is a second stereotype that I believe to be accurate and good. Germans have strict rules about recycling trash and biodegradable packaging. Moreover, their cars are fuel-efficient. I picked this trait, because protecting nature is a positive characteristic. Even though there seems to be a change in America towards a more environmentally friendly culture, I still think that Germans are more advanced in that field. The third and last stereotype that I believe to be accurate and positive is that Germans are often portrayed as rule abiding. For example, many German pedestrians respect traffic rules and will not cross the street, when the traffic light is red, even if there are no cars in sight. This is a positive trait, because it makes everyday life more civilized and safer. Americans also respect laws; however, I am of the opinion that Americans sometimes have a tendency to ignore certain laws if they believe that it does not make sense to follow the rules, such as waiting at a red light, even though the street is

Good and Evil - An analysis of the characters in Schiller's 'Die Essay

Good and Evil - An analysis of the characters in Schiller's 'Die Ruber' and Lessing's 'Emilia Galotti - Essay Example The subject of good and evil has been covered extensively by the world of theatre and literature where several eminent and noble minds have contributed immensely to the discussion and review of the issue. Several notable productions such as ‘Jackyll and Hyde’ and the Apollo Victoria Theatre in Australia have made an attempt to highlight a comparison between these two virtues. However, the subject has been a case for discussion since times immemorial and has become the subject of intense scrutiny in theatrical works over the past 300 years. German theatrical works have played an immense role in this area by helping produce some of the most magnificent works that deals with the good and the evil things in this world. Among them, the plays ‘Emilia Galotti’ by Lessing and ‘Die Rauber’ by Schiller have stood out in terms of their intricacy in projecting the subject that has worked wonders over the years in highlighting the issue. The current paper is an attempt at highlighting the same by discussing the subject in several perspectives of good and evil wherein each shall be discussed in separate sections. Lessing has always been one of the most famous playwrights in contemporary German literature. His 1771 play titled ‘Emilia Galotti’ has been the subject of intense scholarly debates for several centuries. There have been several interpretations of Emilia Galotti, which fall into three basic categories namely the traditional, scholarly association with the Roman legend of Virginia and as a father’s dilemma over securing and convincing the innocence of his daughter. There has been some opinion among a few scholars who view the play as a mere testimony of the struggle of the bourgeoisie (middle classes) against emancipation. However, the play is further very interesting to examine given that it provides a deeper insight

Wednesday, October 16, 2019

Germany and the Germans class Essay Example | Topics and Well Written Essays - 250 words

Germany and the Germans class - Essay Example Although honesty is considered a good quality in America, it is often the case that conversations lack directness, because Americans do not want to appear blunt and impolite. Environmental awareness is a second stereotype that I believe to be accurate and good. Germans have strict rules about recycling trash and biodegradable packaging. Moreover, their cars are fuel-efficient. I picked this trait, because protecting nature is a positive characteristic. Even though there seems to be a change in America towards a more environmentally friendly culture, I still think that Germans are more advanced in that field. The third and last stereotype that I believe to be accurate and positive is that Germans are often portrayed as rule abiding. For example, many German pedestrians respect traffic rules and will not cross the street, when the traffic light is red, even if there are no cars in sight. This is a positive trait, because it makes everyday life more civilized and safer. Americans also respect laws; however, I am of the opinion that Americans sometimes have a tendency to ignore certain laws if they believe that it does not make sense to follow the rules, such as waiting at a red light, even though the street is

Tuesday, October 15, 2019

Vicarious Liability for Police Supervisors Research Paper

Vicarious Liability for Police Supervisors - Research Paper Example The law has with considerable forethought, extended the scope of this doctrine to encompass the activities of the police. Thus, senior police officials are under a duty to supervise the activities of their subordinate officers. They are directly liable to the public for the acts of their subordinates (Del Carmen 107). This rule applies even when they authorize, participate, or ratify such acts. These senior officials are also liable, when the act had been committed in their presence and it had been possible for them to prevent it, but they had preferred to remain indifferent. Vicarious liability connotes indirect responsibility for the negligent actions of subordinates. Such conduct could be the outcome of negligence in hiring, training, assignment, supervision, entrustment, or retention (Del Carmen 107). The State laws may render police supervisors liable for the actions affecting subordinates. In general, direct liability tends to be related to the reasons for which employees could be reassigned, suspended, demoted, or dismissed from service. The provisions of Title 42 Section 1983 are generally invoked, in order to render a police supervisor directly liable to the public (Del Carmen 107). ... In addition, these police supervisors have to enhance their awareness regarding the actions and competencies of their subordinates. As such, police supervisors should recommence the fundamental tasks of continually supervising, teaching, updating, and controlling their subordinates. This will prevent to a major extent, the various civil rights actions that tend to be undertaken on a regular basis against the actions of the police. In the contemporary world, there has been a tremendous increase and development in technologies related to computers, the Internet and communications (Grossman). Consequently, the cost of providing refresher courses and documentation on a continual basis should not exceed the cost of a legal action for failure of the municipality to provide proper training and adequate supervision, with regard to its law enforcement officers (Grossman). In Suders v Easton, the plaintiff was a police communications operator, who resigned from her post without officially info rming the police department of her having been subjected to sexual harassment. Subsequently, she sued the police department for sexual harassment in violation of Title VII. Her contention was that her resignation was tantamount to a constructive discharge (Bass 195). The Third Circuit ruled that a constructive discharge on account of sexual harassment by a supervisor was a tangible employment action. This ruling effectively precluded the police department’s affirmative defense to vicarious liability. Such an affirmative defense can be resorted to when the sexual harassment does not lead to a tangible employment action (Bass 195). However, this important ruling was overturned by the Supreme Court in Pennsylvania State Police v Suders. The reason

Monday, October 14, 2019

Sony company Essay Example for Free

Sony company Essay One of the most recognized brand names in the world today, Sony Corporation, Japan, established its India operations in November 1994, focusing on the sales and marketing of Sony products in the country. In a span of 16 years, Sony India has exemplified the quest for excellence in the world of digital lifestyle becoming the country’s foremost consumer electronics brand. With relentless commitment to quality, consistent dedication to customer satisfaction and unparalleled standards of service, Sony India is recognized as a benchmark for new age technology, superior quality, digital concepts and personalized service that has ensured loyal customers and nationwide acclaim in the industry. With brands names such as BRAVIA, VAIO, Tablet, Handycam ®, Cyber-shot, Walkman ®, Xplodâ„ ¢, Sony hi-fi, Memory stick ® and PlayStation ®, Sony has established itself as a value leader across its various product categories of Audio/Visual Entertainment products, Information and Communications, Recording Media, Business and Professional products. Sony India is one of the most recognized consumer electronics brand in the country, with a reputation for new age technology, digital concepts and excellent after sales service. In India, Sony has its footprint across all major towns and cities in the country through a distribution network comprising of over 10,400 dealers and distributors, 270 exclusive Sony outlets and 23 direct branch locations. Sony India also has a strong service presence across the country with 255 service outlets. Manned by customer friendly and informed sales persons, Sony’s exclusive stores ‘Sony Center’ are fast becoming the most visible face of the company in India. A distinctive feature of Sony’s service is its highly motivated and well-trained staff that provides the kind of attentive and sensitive service that is rare today. Sony is committed to ensuring that both the products and the marketing activities employed truly make a difference to people’s lifestyles and offer them new dimensions of enjoyment. Relentless commitment to quality, continuous dedication to customer satisfaction and unparalleled standards of service is what differentiates us from countless competitors and reflects a true image of all that is Sony. HISTORY It was in 1946 that Masaru Ibuka and Akio Morita together with a small team of passionate and committed group of employees started to build â€Å"Tokyo Tsushin Kenkyujo† (Totsuko), or â€Å"Tokyo Telecommunications Research Institute† into the billion dollar global conglomerate that it is today. The main objective of the company was to design and create innovative products which would benefit the people. From early attempts at creating products like the rice-cooker to the later success of creating Japan’s first magnetic recorder, the innovative company went on to create other hit products which won the company widespread recognition and international acclaim as a truly global company known for its quality and innovative products. Significant product milestones included Japan’s first transistor radio (1955), Trinitron colour television (1968), Walkman personal stereo (1979), Handycam videocamera (1989), PlayStation (1994), Blu-ray Disc recorder (2003) and PlayStation 3 (2006). The company name of Sony was created by combining two words of â€Å"sonus† and â€Å"sonny†. The word â€Å"sonus† in Latin represents words like sound and sonic. The other word â€Å"sonny† means little son. Used in combination, Sony is supposed to represent a very small group of young people who have the energy and passion towards unlimited creations and innovative ideas. With the far-sight of expanding worldwide, it was in 1958 that the company formally adopted â€Å"Sony Corporation† as its corporate name. Easy to pronounce and read in any language, the name Sony, which has a lively ring to it, fits comfortably with the spirit of freedom and open-mindedness. FORMATS AND TECHNOLOGIES Sony has historically been notable for creating its own in-house standards for new recording and storage technologies, instead of adopting those of other manufacturers and standards bodies. The most infamous of these was the videotape format war of the early 1980s, when Sony marketed the Betamax system for video cassette recorders against the VHS format developed by JVC. In the end, VHS gained critical mass in the marketbase and became the worldwide standard for consumer VCRs and Sony adopted the format. While Betamax is for all practical purposes an obsolete format, a professional-oriented component video format called Betacam that was derived from Betamax is still used today, especially in the television industry, although far less so in recent years with the introduction of digital and high definition. Sony launched the Betamax videocassette recording format in 1975. In 1979 the Walkman brand was introduced, in the form of the worlds first portable music player. 1982 saw the launch of Sonys professional Betacam videotape format and the collaborative Compact Disc (CD) format. In 1983 Sony introduced 90 mm micro diskettes (better known as 3.5-inch (89 mm) floppy disks), which it had developed at a time when there were 4 floppy disks and a lot of variations from different companies to replace the then on-going 5.25 floppy disks. Sony had great success and the format became dominant; 3.5 floppy disks gradually became obsolete as they were replaced by current media formats. In 1983 Sony launched the MSX, a home computer system, and introduced the world (with their counterpart Philips) to the Compact Disc (CD). In 1984 Sony launched the Discman series which extended their Walkman brand to portable CD products. In 1985 Sony launched their Handycam products and the Video8 format. Video8 and the follow-on hi-band Hi8 format became popular in the consumer camcorder market. In 1987 Sony launched the 4 mm DAT or Digital Audio Tape as a new digital audio tape standard. In addition to developing consumer-based recording media, after the launch of the CD Sony began development of commercially based recording media. In 1986 they launched Write-Once optical discs (WO) and in 1988 launched Magneto-optical discs which were around 125MB size for the specific use of archival data storage. In the early 1990s two high-density optical storage standards were being developed: one was the MultiMedia Compact Disc (MMCD), backed by Philips and Sony, and the other was the Super Density disc (SD), supported by Toshiba and many others. Philips and Sony abandoned their MMCD format and agreed upon Toshibas SD format with only one modification based on MMCD technology, viz EFMPlus. The unified disc format was called DVD which was marketed in 1997. Sony introduced the MiniDisc format in 1993 as an alternative to Philips DCC or Digital Compact Cassette. Since the introduction of MiniDisc, Sony has attempted to promote its own audio compression technologies under the ATRAC brand, against the more widely used MP3. Until late 2004, Sonys Network Walkman line of digital portable music players did not support the MP3 de facto standard natively, although the provided software SonicStage would convert MP3 files into the ATRAC or ATRAC3 formats. In 1993, Sony challenged the industry standard Dolby Digital 5.1 surround sound format with a newer and more advanced proprietary motion picture digital audio format called SDDS (Sony Dynamic Digital Sound). This format employed eight channels (7.1) of audio opposed to just six used in Dolby Digital 5.1 at the time. Unlike Dolby Digital, SDDS utilized a method of backup by having mirrored arrays of bits on both sides of the film which acted as a measure of reliability in case the film was partially damaged. Ultimately, SDDS has been vastly overshadowed by the preferred DTS (Digital Theatre System) and Dolby Digital standards in the motion picture industry. SDDS was solely developed for use in the theatre circuit; Sony never intended to develop a home theatre version of SDDS. In 1998, Sony launched their Memory Stick format; flash memory cards for use in Sony lines of digital cameras and portable music players. It has seen little support outside of Sonys own products with Secure Digital cards (SD) commanding considerably greater popularity. This is due in part to the SD formats greater throughput (which allows faster recording and access), higher capacities, and significantly lower price per unit capacity compared to Memory Sticks available at the same time. Sony has made updates to the Memory Stick format with Memory Stick Duo and Memory Stick Micro. Sony and Philips jointly developed the Sony-Philips digital interface format (S/PDIF) and the high-fidelity audio system SACD. The latter has since been entrenched in a format war with DVD-Audio. At present, neither has gained a major foothold with the general public. CDs are preferred by consumers because of ubiquitous presence of CD drives in consumer devices. In 2004, Sony built upon the MiniDisc format by releasing Hi-MD. Hi-MD allows the playback and recording of audio on newly introduced 1 GB Hi-MD discs in addition to playback and recording on regular MiniDiscs. Recordings on the Hi-MD Walkmans can be transferred to and from the computer virtually unrestricted, unlike earlier NetMD. In addition to saving audio on the discs, Hi-MD allows the storage of computer files such as documents, videos and photos. Hi-MD introduced the ability to record CD-quality audio with a linear PCM recording feature. It was the first time since MiniDiscs introduction in 1992 that the ATRAC codec could be bypassed and lossless CD-quality audio could be recorded on the small discs. Sony was one of the leading developers of the Blu-ray Disc optical disc format, the newest standard for disc-based content delivery. The format emerged as the market leader over the competing standard, Toshibas HD DVD, after a 2 year-long format war. The first Blu-ray players became commercially available in 2006. By the end of 2007 the format had the backing of every major motion picture studio except Universal, Paramount, and DreamWorks The Blu-ray formats popularity continued to increase, solidifying its position as the dominant HD media format, and Toshiba announced its decision to stop supporting HD DVD in 2008. Now, all major studios support Blu-ray and release their films on the format. CORPORATE INFORMATION Finances Sony is one of Japans largest corporations by revenue. It had revenues of  ¥6.395 trillion in 2012. It also maintains large reserves of cash, with  ¥13.29 trillion on hand as of 2012. In May 2012, Sony shares were valued at about $15 billion. The company was immensely profitable throughout the 1990s and early 2000s, in part because of the success of its new PlayStation line. The company encountered financial difficulty in the mid- to late-2000s due to a number of factors: the global financial crisis, increased competition for PlayStation, and the Japanese earthquake. The company faced three consecutive years of losses leading up to 2011. While noting the negative effects of intervening circumstances such as natural disasters and fluctuating currency exchange rates, the Financial Times criticized the company for its lack of resilience and inability to gauge the economy. The newspaper voiced skepticism about Sonys revitalization efforts, given a lack of tangible results. In September 2000 Sony had a market capitalization of $100 billion; but by December 2011 it had plunged to $18 billion, reflecting falling prospects for Sony but also reflecting grossly inflated share prices of the dot.com years. Net worth, as measured by stockholder equity, has steadily grown from $17.9 billion in March 2002 to $35.6 billion through December 2011. Earnings yield (inverse of the price to earnings ratio) has never been more than 5% and usually much less; thus Sony has always traded in over-priced ranges with the exception of the 2009 market bottom. In April 2012, Sony announced that it would reduce its workforce by 10,000 (6% of its employee base) as part of CEO Hirais effort to get the company back into the green. This came after a loss of 520 billion yen (roughly US$6.36 billion) for fiscal 2012, the worst since the company was founded. Accumulation loss for the past four years was 919.32 billion-yen. Sony plans to increase its marketing expenses by 30% in 2012. 1,000 of the jobs cut come from the companys mobile phone units workforce. 700 jobs will be cut in the 2012-2013 fiscal year and the remaining 300 in the following fiscal year. On 9 December 2008, Sony Corporation announced that it would be cutting 8,000 jobs, dropping 8,000 contractors and reducing its global manufacturing sites by 10% to save $1.1 billion per year. Environmental record In November 2011, Sony was ranked 9th (jointly with Panasonic) in Greenpeaces Guide to Greener Electronics. This chart grades major electronics companies on their environmental work. The company scored 3.6/10, incurring a penalty point for comments it has made in opposition to energy efficiency standards in California. It also risks a further penalty point in future editions for being a member of trade associations that have commented against energy efficiency standards. Together with Philips, Sony receives the highest score for energy policy advocacy after calling on the EU to adopt an unconditional 30% reduction target for greenhouse gas emissions by 2020. Meanwhile, it receives full marks for the efficiency of its products. In 2007, Sony ranked 14th on the Greenpeace guide. Sony fell from its earlier 11th place ranking due to Greenpeaces claims that Sony had double standards in their waste policies. Since 1976, Sony has had an Environmental Conference. Sonys policies address their effects on global warming, the environment, and resources. They are taking steps to reduce the amount of greenhouse gases that they put out as well as regulating the products they get from their suppliers in a process that they call green procurement. Sony has said that they have signed on to have about 75 percent of their Sony Building running on geothermal power. The Sony Take Back Recycling Program allow consumers to recycle the electronics products that they buy from Sony by taking them to eCycle (Recycling) drop-off points around the U.S. The company has also developed a biobattery that runs on sugars and carbohydrates that works similarly to the way living creatures work. This is the most powerful small biobattery to date. In 2000, Sony faced criticism for a document entitled NGO Strategy that was leaked to the press. The document involved the companys surveillance of environmental activists in an attempt to plan how to counter their movements. It specifically mentioned environmental groups that were trying to pass laws that held electronics-producing companies responsible for the clean up of the toxic chemicals contained in their merchandise. EMPLOYEE SATISFACTION Employee Data The addition of employees of its mobile communications business, included in the scope of consolidation effective from fiscal year 2011, was offset by substantial personnel reductions at production sites in the East Asia and Asia/Pacific regions (i.e., excluding Japan) accompanying the implementation of production adjustments. As a consequence, as of March 31, 2012, the Sony Group had approximately 162,700 employees on its books, down 5,500 from the previous fiscal year-end. Sony Corporations headcount peaked at 23,000 in 1993, after which it remained fairly consistent at approximately 17,000. As of March 31, 2012, Sony Corporations headcount was approximately 16,000. Composition of Sony Corporations Directors and Corporate Executive Officers ELECTRONICS Sony Corporation is the electronics business unit and the parent company of the Sony Group. It primarily conducts strategic business planning of the group, research and development (RD), planning, designing and marketing for electronics products. Its subsidiaries such as Sony EMCS Corporation (6 plants in Japan), Sony Semiconductor Corporation (7 plants in Japan) and its subsidiaries outside Japan (Brazil, China, England, India, Malaysia, Singapore, South Korea, Thailand and United States) are responsible for manufacturing as well as product engineering (Sony EMCS is also responsible for customer service operations). In 2012, Sony incorporated rolled most of its consumer content services (including video, music, and gaming) into the Sony Entertainment Network. Sony produced the worlds first portable music player, the Walkman in 1979. This line fostered a fundamental change in music listening habits by allowing people to carry music with them and listen to music through lightweight headphones. Walkman originally referred to portable audio cassette players. Sony utilized a related brand, Discman, to refer to its CD players. It dropped this name in the late 1990s. Sony sells many of its computer products using the VAIO brand. Sony entered again into the global computer market under the new VAIO brand, began in 1996. Short for Video Audio Integrated Operation, the line was the first computer brand to highlight visual-audio features. Sony faced considerable controversy when some of its laptop batteries exploded and caught fire in 2006 resulting in the largest computer-related recall to that point in history. In a bid to join the tablet computer market, the company launched its Sony Tablet series in 2011. The machines run on Google Android software. Sony offers a range of digital cameras. Point-and-shoot models adopt the Cyber-shot name, while digital single-lens reflex models are branded using Alpha. The first Cyber-shot was introduced in 1996. At the time, digital cameras were a relative novelty. Sonys market share of the digital camera market fell from a high of 20% to 9% by 2005 Sony entered the market for digital single-lens reflex cameras in 2006 when it acquired the camera business of Konica Minolta. Sony rebranded the companys line of cameras as its Alpha line. Sony is the worlds third largest manufacturer of the cameras, behind leaders Canon and Nikon. Sony used the LCD WEGA name for its LCD TVs until summer 2005. The company then introduced the BRAVIA name. BRAVIA is an in house brand owned by Sony which produces high-definition LCD televisions, projection TVs and front projectors, home cinemas and the BRAVIA home theatre range. All Sony high-definition flat-panel LCD televisions in North America have carried the logo for BRAVIA since 2005. Sony is the third-largest maker of televisions in the world. As of 2012[update], Sonys television business has been unprofitable for eight year. In December 2011, Sony agreed to sell all stake in an LCD joint venture with Samsung Electronics for about $940 million. On 28 March 2012, Sony Corporation and Sharp Corporation announced that they have agreed to further amend the joint venture agreement originally executed by the parties in July 2009, as amended in April 2011, for the establishment and operation of Sharp Display Products Corporation (SDP), a joint venture to produce and sell large-sized LCD panels and modules. Sony also sells a range of DVD players. It has shifted its focus in recent years to promoting the Blu-ray format, including discs and players. Sony produces a wide range of semiconductors and electronic components including image sensors, laser diodes, system LSIs, mixed-signal LSIs, OLED panels, etc. The company has a strong presence in image sensor market. Sony-manufactured CCD and CMOS image sensors are widely used in digital cameras, smartphones, tablet computers. Sony Ericsson distinguished itself with multimedia-capable mobile phones, which included features such as cameras. These were unusual for the time. Despite their innovations, SMC faced intense competition from Apples iPhone, released in 2007. From 2008 to 2010, amid a global recession, SMC slashed its workforce by several thousand. Sony acquired Ericssons share of the venture in 2012 for over US$1 billion. In 2009, SMC was the fourth-largest mobile phone manufacturer in the world (after Nokia, Samsung and LG). By 2010, its market share had fallen to sixth place. Sony Mobile Communications now focuses exclusively on the smart phone market. Launched in 1994, the first PlayStation gained 61% of global console sales and broke Nintendos long-standing lead in the market. The console has become the most successful of all time, selling over 150 million units as of 2011[update]. Early on, poor sales performance resulted in significant losses for the company, pushing it to sell the console at a loss. It later introduced the PlayStation Move, an accessory that allows players to control video games using motion gestures.Early on, the format was used for movies, but it has since lost major studio support. Sony released a disc-less version of its PlayStation Portable, the PSP Go. The company went on to release its second portable video game system, PlayStation Vita, in 2011 and 2012. Sony Online Entertainment operates online services for PlayStation, as well as several other online games. In 2011 hackers broke into the PlayStation Network online service, stealing the personal information of 77 million account holders. ENTERTAINMENT Sony Pictures Entertainment, Inc. (SPE) is the television and film production/distribution unit of Sony. With 12.5% box office market share in 2011, the company was ranked 3rd among movie studios. Its group sales in 2010 were US$7.2 billion. The company has produced many notable movie franchises, including Spider-Man, The Karate Kid, and Men in Black. It has also produced popular television game shows Jeopardy! and Wheel of Fortune. Sony entered the television and film production market when it acquired Columbia Pictures Entertainment in 1989 for $3.4 billion. SPEs television division is known as Sony Pictures Television. For the first several years of its existence, Sony Pictures Entertainment performed poorly, leading many to suspect the company would sell off the division. In July 2000, a marketing executive working for Sony Corporation created a fictitious film critic, David Manning, who gave consistently good reviews for releases from Sony subsidiary Columbia Pictures that generally received poor reviews amongst real critics. Sony Music Entertainment (also known as SME or Sony Music) is the second-largest global recorded music company of the big four record companies and is controlled by Sony Corporation of America, the United States subsidiary of Japans Sony Corporation. The company owns full or partial rights to the catalogues of Michael Jackson, The Beatles, Usher, Eminem, Akon, and others. In one of its largest-ever acquisitions, Sony purchased CBS Record Group in 1987 for US$2 billion. In the process, Sony gained the rights to the catalogue of Michael Jackson, considered by the Guinness Book of World Records to be the most successful entertainer of all time. In 2004, Sony entered into a joint venture with Bertelsmann AG, merging Sony Music Entertainment with Bertelsmann Music Group to create Sony BMG. In 2005, Sony BMG faced a copy protection scandal, because its music CDs had installed a controversial feature on users computer that posing a security risk to affected users. In 2007, the company acquired Famous Music for US$370 million, gaining the rights to the catalogues of Eminem and Akon, among others. Sony bought out Bertelsmanns share in the company and formed a new Sony Music Entertainment in 2008. Since then, the company has undergone management changes.

Sunday, October 13, 2019

Computer Fraud

Computer Fraud Task 1 (6.c)Importance and Effectiveness of Legal Regulation in Computer Fraud Introduction In todays world due to the advancement in the modern technology there has been always problem arising related with computers especially computer fraud misuse. People who are using computers are deceived in many ways like program fraud, system hacking, e-mail hoax, auction, retail sales, investment schemes, information hacking, virus/worm attacks and people claiming to be experts on subject areas. Anyone who uses the computer with an internet connection is a potential candidate for being a victim of computer fraud. The computer fraud rate is increasing every day as the internet usage among the people increases, most of the people are using the computers and internet for a good cause but there are some people who are intentionally using the computers to bring down some organizations or business firms or to get peoples personal information. But due to the implementation of current legal regulations in each and every fields; the crime people started to get tracked down and are punished under the Computer Misuse Act, which may ultimately reduce the number of computer fraud rate in the future. Background Over the past decades the amount of financial, military and intelligence information, business data and personal information is stored on and transmitted by computers has increased by tremendous growth. All the major sectors like government and military operations entirely depend upon computers / internet for their work process and data transmission. The information which is stored and transmitted via internet will be vulnerable to attack from any unknown source; almost every organization has been affected in some way due to the computer fraud. â€Å"The British National Computer Centre reported that more than 80% of British organizations suffered security threat in the last two years† [5], most of the investigation revealed that the computer fraud occurred involves unauthorised access to computers via the internet. The current growth in the technology suggest that within a decade it will be possible for every person in the world to access all the information network including the security defence data and government departments personal information but it is in the hand of the people to make sure that they do not misuse the available information. Other than the increase in the number of computer users, there will be also increase in the number of computers per person. Each person will own and connect to hundreds of computers for information processing through network environment. In the future all the people will use computers in home appliances, phones, televisions, offices and automobiles; all these computers share the information to optimize the use of resources and to provide convenience in daily life which might result in a threat for computer fraud. In this context we will discuss about the detailed term of * Computer fraud * Causes for computer fraud * Types of computer fraud/attacks * Basic ways to prevent computer fraud apart from legal regulation. * Importance / Effectiveness of the legal regulation in computer fraud. Computer Fraud Basically computer fraud is defined as taking control access illegally or stealing information without others knowledge, computer fraud can take place in any form; it includes fraud committed by an employee of a company using the computer to steal funds or information from the work company, whereas some people use deception to gain access to individual resources. Therefore the type and the method carried out to do the computer fraud vary from people to people depending upon the need to do it. Causes for computer fraud Most of the computer fraud is done for the main purpose of gaining money either by stealing the needed information from big organizations/firms or directly stealing funds from big organizations/firms. There are few people who are not concerned about the money or information but they wanted to bring down the fame of the organization/firm so they reveal all the secrets of the particular organization and few people like hackers does the computer fraud/crime just for a fun. Types of computer fraud Computer fraud can be classified into many types depending upon the fraud committed but the major categorisations of fraud are mentioned below. All the computer crime/fraud taking place now a day comes under these main categories. o Internet auction/Bid sales fraud o Retail sales o Investment schemes o Identity theft o Phising o Credit card fraud o Information hacking o Email hoax o Virus/Worm attack o Letter scam o Ad ware All these types of computer frauds are caused mainly due to the advancement in the technology and crime is still growing around the world. Basic ways to prevent computer fraud apart from legal regulation The most important thing to do to prevent computer fraud is to be alert to the scams that are circulated over the internet so that it helps to safeguard the system and the information stored within the system, there are some basic rules to be followed in order to prevent the system from computer fraud o Users should be aware of not to publish any of their personal details on the websites or forums. o The organization/firms should not broadcast much of their business details on the internet. o Organizations/firms should ensure that they follow security policies, and procedures. o People working at homes or organization should ensure that before sending any personal information on the net should check for valid signatures. Internet auction/bid sales fraud o Understand the way how the auction/bidding works on the internet, think what is the need for the seller to sell it. o Check out what will be actions taken by the online seller if something goes wrong during transaction and shipment. o Try to find more information about the seller; if the only information you have is the business email id, check the Better Business Bureau where the seller/business is located o Examine the sellers feedback on previous sales, if the seller has good history and good feedback on previous sales; then there is no need to worry about the purchase. o Determine what method of payment the seller is asking for during the transaction. o Be aware of the difference in laws governing auctions between the U.K. and other countries like U.S, China. If a problem occurs with the auction transaction that has the seller in one country and a buyer in another country, it might result in a dubious outcome leaving you empty handed. o Be sure to ask the seller about when delivery can be expected and warranty/exchange information for the product. o To avoid unexpected costs, find out whether shipping and delivery cost are included in the auction price or are additional. o Finally, avoid giving out your social security or drivers license number to the seller, as the sellers have no need for this information. Credit Card Fraud o Do not give out credit card number online unless the site is both secure and reputable. Sometimes a tiny icon of a padlock appears to symbolize a higher level of security to transmit data. The icon is not a guarantee of a secure site, but may provide you some assurance. o Before using the site, check out the security software it uses; make sure your information will be protected. o Make sure you are purchasing product from a reputable/legitimate source. Once again investigate the person or company before purchasing products. o Try to obtain a physical address rather than merely a post office box and a phone number, call the seller to see if the number is correct and working. o Send them e-mail to see if they have an active e-mail address and be cautious about the sellers who use free e-mail service where a credit card was not required to open the account. o Do not purchase from sellers who will not provide you with this type of information. o Check with the Better Business Bureau to see if there have been any complaints against the seller before. o Check out other web sites regarding this person/company details. o Be cautious when responding to special offers. o Be cautious when dealing with individuals/companies from outside your own country. o If you are going to purchase an item via the Internet, use a credit card since you can often dispute the charges if something does go wrong. o Make sure the transaction is secure when you electronically send your credit card somewhere. o You should keep a list of all your credit cards and account information along with the card issuers contact information. If anything looks suspicious or you lose your credit card contact the card issuer immediately. Investment Fraud o Do not invest in anything based on appearances. Just because an individual or company has a flashy web site does not mean it is legitimate. Web sites can be created in just a few days. After a short period of taking money, a site can vanish without a trace. o Do not invest in anything you are not absolutely sure about. Thoroughly investigate the individual or company to ensure that they are legitimate. o Check out other web sites regarding this person/company. o Be cautious when responding to special investment offers; inquire about all the terms and conditions dealing with the investors and the investment. Importance of the legal regulation in computer fraud After all the basic discussion about the concepts and the causes of computer fraud, we are going to discuss about the legal regulation issues related with the computer fraud which tells how the legal regulations prevent or reduce the increasing computer fraud rate in todays developing world of technology, Most of the law reform is achieved by modifying and extending existing law to cope with new situations rather than by the introduction of completely new legislation.This can sometimes make it difficult to find a single place where the whole of an area of law is clearly set out. The Computer Misuse Act was enacted in 1990 and it remains the primary piece of UK legislation focusing on the misuse of computer systems. It covers computer frauds such as hacking and the deliberate spread of viruses and was created to prevent unauthorized access or modification of computer systems and to prevent criminal elements from using a computer to assist in the commission of a criminal offence or fro m impairing or hindering access to data stored in a computer. â€Å"In 2004, MPs specifically, the All-Party Internet Group (APIG) began a review of the CMA, on the basis that this legislation was created before the emergence of the Internet and therefore required updating† [5]. The Act was seen to focus too much on individual computers and not enough on computer networks. In addition some of the definitions used in the 1990 Act need updating. The final report outlined several recommendations to the government for changes to the CMA. In March 2005, APIG called for amendments to the CMA to address the threat from denial of service attacks. The Computer Misuse Act was passed in 1990 to deal with the problem of hacking/other threats of computer systems. In the early days hacking/other computer fraud related issues was not taken very seriously by the law and the impression was that it is mischievous rather than something which causes serious loss to organizations. However, with developments in technology the issue has become more serious and legislation was introduced to recognize three key offences: o Unauthorized access to computer material, Example: Finding or guessing someones password and then using that to get into a computer system and have a look at the information. o Unauthorized access with intent to commit further offences. The key to this offence is the addition of intent to commit further offences. It therefore includes guessing or stealing a password and using that to access material or services without the consent of the owner. o Unauthorized modification of computer material. This could include deleting files, changing the desktop set-up or introducing viruses with the deliberate intent to impair the operation of a computer. Effectiveness of legal regulation in computer fraud ( Conclusion) All the above mentioned computer fraud issues was not taken seriously until the legal regulation was made properly, and due to the implementation of legal law of Computer Misuse Act, the effectiveness caused a tremendous change by punishing all the illegal users of the computer system. Below example shows the consequence for an ‘Unauthorized Access to system. Incident Unauthorized Access to Communications Systems Provision Computer Misuse Act Section 1 Description Cause a computer to perform any function with the intention of securing access to any program or data held in a computer, if this access is unauthorized and if this is known at the time of causing the computer to perform the function. Sanction A fine and/or a term of imprisonment not exceeding 6 months was sentenced for the illegal user. Total number of words in the Task1 report: 2500 Signed [ ] Task 2 (2)Do legal developments in law relating to Software copyright and Patents help or harm the cause of information system security Information system security acts as the protection of information system against unauthorized access or modification of existing information whether in storage, processing or transit stage. The information system ensures to safeguard all the stored information. Information security covers not just information but the entire infrastructures that facilitate access and use of information. The primary concern to organizations is the security of valuable information which can be anything from a formula to a customer list or organizations valuable information to financial statements. Three widely accepted elements of information system security are: o Confidentiality Ensuring information is only accessed by authorized users. o Integrity Safeguarding the accuracy and completeness of information. o Availability To ensure that authorized user have secure access to information when required. Law relating to Software Copyright and Patents In early 1970s there was a debate concerning about whether there is a need to make a copyright for the softwares or not, but later on it was decided that all the developed software needed to be copyrighted and if needed it can also be patented under the UK Copyright, Design and Patents Act 1988. The UK law for copyright and patent helped the organizations from misuse of their developed softwares/concepts. Some organizations try to steal the concepts/parts of code from developed software of other organization and try to utilize them in their developing software product. But due to the software copyright and patent law, all the leading software organizations like ‘Microsoft started to make copyright for their parts of developed code, so that no other organizations can use their part of code for developing other applications, this helped most of the organizations to develop a unique software product. Legal requirement for Information Security Keeping valuable information secure is not only a matter of good organization practice it is also a legal requirement. Since 1999 in UK and most parts of the world, there is a statutory obligation on all organizations to maintain minimum levels of security. Organizations that fail to meet the minimum security requirements may face enforcement action by the UK Government via the Information Commissioners Office. â€Å"Enforcement action can take any form and the Information Commissioners powers are not limited. Organizations that want to be relatively safe can choose to implement BS7799† [2], that is a voluntary standard which helps to ensure that sensitive information is handled by an organization in a professional and secure manner, it can done by making the organization to classify the sensitivity of information and to provide necessary control access to it. Legal developments in laws relating to software copyright and patents ‘help the information system security (Conclusion) As discussed earlier, the main work of information system security is to provide a secure environment for the information storage and processing, in the past decades when there was no legal laws for software copyright and patents, hackers used to break the information system and get the needed information/softwares; they are not really afraid of anything because there was not any law stating that taking/hacking the softwares/information was a crime which caused a big problem for the software developing organizations but now due to the development of legal laws; if a person tries to hack the information system security, he can be sentenced to prison due to the current state of law. So the development of the legal laws relating to software copyright and patents did help the information system security to make a secure environment. Total number of words in the Task2 report: 500 Signed [ ] Task 3 (4)Evaluate the proposition that Data protection laws are an unnecessary burden on legitimate public and commercial data collection The Data Protection Act was originally started on 1984 but later the existing act was replaced by the new Data Protection Act of 1998[DPA 1998], the â€Å"new act of 1998 implemented the EU Data protection Directive 95/46† [3]. The DPA relates to the protection of personal information that includes names, email addresses, financial details, personal documents and photographs. Personal information is everywhere and because it is generally impossible to separate personal information from other organizations information, most observers agree that the security standards required by the Data Protection Act are the minimum that must be applied to organization IT Systems as a whole. The security of information is so important to most organizations that, regardless of what the law require, organizations generally implement levels of security that are as high as budgets and technology. Data Protection Act of 1998—Personal Data Security The main legal requirements are set out in Principle 7 of the Data Protection Act 1998 says that all organizations must take â€Å"Appropriate technical and organizational measures against unauthorized or unlawful use and against accidental loss, damage or destruction, of information.† [4] Today, all computerized processing of personal data, structured manual records, and even some unstructured manual records are subject to provisions of the DPA 1998, including the right of the individual to access the data which is held about them. Together with the Freedom of Information Act 2000 (FOIA 2000), the DPA 1998 has forced a re-think of organizations good practice in personal data handling, new approaches to records management and made organizations consider more carefully their obligations to those whose data they hold. The FOIA 2000 extends the rights of the individual to access their data which had already existed under the DPA 1998. The definition of data is widened, as far as public authorities are concerned; to include all other recorded information held by a public authority. However, there are limits to the data subject rights that apply to this additional category of data. A request by an individual for information about him or herself is exempt under the FOIA 2000 and should be handled as a subject access request under the DPA 1998. In certain circumstances such a request may involve the release of associated information in which case the provisions of sections 7(4) and (5) of the DPA 1998 should be used to determine whether it is appropriate to release the third party information. Where an applicant specifically requests information about a third party or where responding to a request for information would involve the disclosure of personal information about a third party which is not also personal information about the applicant, the request falls within the remit of the FOIA 2000. However, the authority must apply the Data Protection Principles when considering the disclosure of information relating to individuals. An authority must not release third party information if to do so would mean breaching one of the Principles. Conclusion Even though the DPA secures the users personal information/data, there are some problems/burden exist for the legitimate users/public facing the Data Protection Act, according to DPA there is no exemption for back-up of data/information. In practice it will be unlikely that a data subject want access to data back-up and there is nothing to prevent a controller confirming that a data subject wishes to access only the most recent records. The back-up data which provides that automated data processed to replace other data which has been lost, destroyed or impaired are exempt from section 7 during the first transitional period ending on 23 October 2001; but this is not a general exemption for back-up data in the traditional sense. Total number of words in the Task3 report: 500 Signed [ ] Bibliography o Andrew Terrett., The Internet, Business Strategies for Law firms, (2000, Law Society, London) o Bobbie Johnson., ‘UK computer laws are ridiculous, April 30, http://technology.guardian.co.uk/news/story/0,,1763989,00.html o ‘Computer Fraud and its Acts, April 30, http://www.itwales.com/999573.htm o ‘Concepts of Patent work, May 1, http://www.patent.gov.uk/about/consultations/conclusions.htm o ‘Data protection effect on senior management, May 2, http://www.jisc.ac.uk/index.cfm?name=pub_smbp_dpa1998 o ‘Data protection law, The key change, May 1, http://webjcli.ncl.ac.uk/1998/issue4/widdis4.html o David Icove. and Karl Seger, Computer Crime, (1995, OReilly Associates, USA) o David S. Wall., Cyberspace Crime, (2003, Darmouth Publishing Company , Hants, England) o Douglas Thomas. and Brian Loader, Cyber crime, (2000, Routledge publication , London) o ‘Facts on copyright, May 1, http://www.intellectual-property.gov.uk/faq/copyright/what.htm o ‘Fraud law reforms, April 30, http://www.bcs.org/server.php?show=conWebDoc.1149 o ‘Fraud Tips, April 30, http://www.fraud.org/internet/intset.htm o ‘Hacking and other computer crime, April 30, http://www.met.police.uk/computercrime/#SO6 o Ian Lloyd., Information Technology Law, (1997, Reed Elsevier Ltd, Halsbury, London) o Joshua Rozenberg., Privacy and the Press, (2005, Oxford university press Inc , USA) o Michael Levi., Regulating Fraud, (1987, Tavistock Publication , London) o ‘New laws for computer fraud, April 30, http://www.thisismoney.co.uk/news/article.html?in_article_id=400895in_page_id=2 o ‘Summary of Intellectual property rights, May 1, http://www.copyrightservice.co.uk/copyright/intellectual_property o Susan Singleton., Data protection The New Law, (1998, Jordans Publication , Bristol) o ‘UK Data protection laws are chaotic, May 2, http://www.theregister.co.uk/2004/11/17/data_protection_laws_chaotic/