Thursday, October 31, 2019

Research Paper on Potential Career Paths Essay Example | Topics and Well Written Essays - 3000 words

Research Paper on Potential Career Paths - Essay Example One of the most significant impacts the ICT has had is on the world of business. The adoption of ICT methodologies in business has seen the conversion of small enterprises to large multinational corporations in a matter of years. The economic crises of 2008 brought with it new challenges not only for businesses around the globe but also for the ICT industry (Lanvin, Dutta, & Bilbao-Osorio, 2013). In these crucial times businesses are looking to gain competitive edge over their rivals and obtain as much of the market share as possible. To achieve these objectives they heavily rely on innovative techniques that can only be provided by the ICT industries. These factors have contributed to the growth of the industry and have accelerated the progress of the industry to great speeds (Lanvin, Dutta, & Bilbao-Osorio, 2013). Issues of ICT sector: One of the main issues that have plagued the industry is the integrity of personal and corporate data. Data that is converted into digital format is usually vulnerable to a number of threats from different sources. Even with different security measures implemented there is no guarantee that the data would not be accessed by unauthorized personnel (Mathieu & Woodard, 1993). Another issue that the industry faces is its bad reputation regarding satisfaction of customer needs. In a number of cases customers complain that large corporations fail to meet their demands and provide an end product that is of no use to them (Norton, 2011). This usually gives the sector and those working in it somewhat a bad name. Moreover IT professionals tend to communicate with the customer in an arrogant manner portraying as if customers are of less intelligence because they are unaware of the basic fundamentals of IT sector. The customers may be oblivious to these fundamental facts but treating them in such a manner increases their ill feelings towards the IT professional they are dealing with. This adds to the deteriorating image of the industry as a whole (Norton, 2011). Since the invention of internet, mainframe and personal computers one trend has been seen increasing within the ICT industry every year and that is the complexity of software and hardware produced. The complex nature of products that are developed increases each year. This causes a huge dilemma for professionals working within the industry (Norton, 2011). These professionals must have thorough knowledge of all these products in order to be efficient at their jobs. However due to the increased complexities of these products companies need to hire entire teams and teamwork with one’s peers have become a lot more vital than it ever was(Norton, 2011). Description of SAP AG SAP AG is one of the leading software development companies. The foundation of the company was laid in 1972 and since then it has been providing businesses all around the world with IT solutions. One of its most popular software products is the SAP enterprise resource planning applicatio n systems and management (PR Carbon, 2013). The company has its headquarters in Walldorf, Germany however the company offers its services to a number of companies across the globe. The company has divided its operations with respect to four geographic regions it has created EMEA, America, LAC and APJ. EMEA (Europe, Middle East and Africa) as the name suggests, operates within the Middle Eastern and the African regions.

Monday, October 28, 2019

Natural Environment and Campbell Soup Essay Example for Free

Natural Environment and Campbell Soup Essay Why do some business firms pursue a triple-bottom-line outcome while others focus only on profit maximization? Please, use a real company example to illustrate your points. The triple bottom line outcome focuses on the concept where firms are environmentally conscious and socially responsible by achieving a balance between profits, avoiding damage to the environment, and achieving social benefits (Douglas, 2012). Traditionally, firms focused on profit maximization to achieve profits to pay out dividends and capital gains so shareholders can buy things. In a recent article, Nursing Homes are overbilling Medicare . 5 billion a year for treatments patients don’t need or never receive. When nursing homes where for-profit, 30% of claims sampled were considered improper while non-profit nursing homes estimated only 12% (Waldman, 2012). Jill Horwitz, a professor at the University of California stated that for-profit health care providers are more likely to pursue money in any way possible, even by pushing the legal envelope (Walkman, 2012). There are still for-profit companies who pursue a triple-bottom-line outcome. Campbell Soup Company has been environmentally conscious and socially responsible since 1953. The Campbell Soup Foundation has been supporting local communities where employees live and work financially. Campbell Soup’s headquarters is located in Camden, New Jersey where they donate approximately $1 million each year to impact the local residents in a positive manner (Campbell Soup Foundation). They focus on hunger relief, childhood obesity and youth-related programming. Not only does Campbell Soup invest in its local communities, they also partner is many non-profit organizations like the Boy Girls Club and the United Way. Customers can influence firms to pay more attention to the preservation of the natural environment by emphasizing how important the community and environment in which they live are. Many organizations are now trying to go green. They are making products that use fewer materials and are less harmful to the environment. If customers refuse to buy products from organization that do not value the environment, organizations will change to customer’s needs. Along with not buying products, customers should not invest with companies who do not value the environment and communities. â€Å"Economists incorporate the triple bottom line into their models of business decision making by assuming that many individuals will buy shares in companies that achieve the triple bottom line outcomes they want and will sell shares in companies that do not† (Douglas, 2012. Pg. 7). References Campbell soup foundation. (2012). Retrieved from http://www.campbellsoupcompany.com/Foundation.aspx Douglas, E. (2012). Managerial Economics (1st ed.). San Diego, CA: Bridgepoint Education. This text is a Constellationâ„ ¢ course digital materials (CDM) title. Waldman, P. (2012, December 31). For-Profit Nursing Homes Lead in Overcharging While Care Suffers. Bloomberg. Retreived from http://www.bloomberg.com/news/2012-12-31/for-profit-nursing-homes-lead-in-overcharging-while-care-suffers.html 1. Firm Objectives Why do some business firms pursue a triple-bottom-line outcome while others focus only on profit maximization? Please, use a real company example to illustrate your points. Guided Response: In 300 words or more, please, provide your response to the above discussion question. Comment on how customers can influence firms to pay more attention to the preservation of the natural environment. Respond substantively to at least two of your classmates’ postings. Substantive responses use theory, research, and experience or examples to support ideas and further the class knowledge on the discussion topic. 2. Decision Making Under Uncertainty To save on gasoline expenses, Edith and Mathew agreed to carpool together for traveling to and from work. Edith preferred to travel on I-20 highway as it was usually the fastest, taking 25 minutes in the absence of traffic delays. Mathew pointed out that traffic jams on the highway can lead to long delays making the trip 45 minutes. He preferred to travel along Shea Boulevard, which was longer (35 minutes), but rarely had traffic jams. Edith agreed that in case of traffic jams, Shea Boulevard was a reasonable alternative. Neither of them knows the state of the highway ahead of time. After driving to work on the I-20 highway for 1 month (20 workdays), they found the highway to be jammed 3 times. Uncertainty is when the potential outcomes are not predictable and/or the probabilities of these outcomes are not estimable ahead of time (Douglas, 2012). * I-20 = 25 minutes w/o delays (25 minutes * 365 days = 9,125 minutes) * I-20 = 45 minutes w/ delays * Shea Boulevard = 35 minutes w/o delays * 1st month of travel there where 3 traffic delays assuming 20 workdays each month 1. Assuming that this month is a good representation of all months ahead, should Edith and Mathew continue to use the highway for traveling to work? * 3 jams (workdays) * 45 minutes = 135 minutes * 17 workdays * 25 minutes = 425 minutes * Total = 560 minutes compared to * 20 workdays * 35 minutes = 700 minutes when taking Shea Boulevard. Edith and Mathew should continue to use the highway because they save 140 minutes each month. 2. How would you conclusion change for the winter months, if bad weather makes it likely for traffic jams on the highway to increase to 6 days per month? * 6 jams (workdays) * 45 minutes = 270 minutes * 14 workdays * 25 minutes = 350 minutes * Total = 620 minutes compared to * 20 workdays * 35 minutes = 700 minutes when taking Shea Boulevard. Edith and Mathew should still continue to take I-20 during winter months because they will continue to save time. They will save 80 minutes of time taking the highway during winter months. 3. How would your conclusion change if Mathew purchased a new smart-phone app that could show the status of the highway traffic prior to their drive each morning, thus reducing the probability of them getting into a jam down to only 1day per month (where on this day, the app showed no traffic jam, but a jam developed in the meantime as they were driving along the highway). The conclusion would change in that Edith and Mathew should take Shea Boulevard on days in which they know there is an accident ahead of time. Either way they should continue to take the highway unless they discover accidents ahead of time. Non-Winter * 1 jams (workdays) * 45 minutes = 45 minutes * 17 workdays (highway) * 25 minutes = 425 minutes * 2 workdays (Shea Boulevard) * 35 minutes = 70 * Total = 540 minutes compared to * 20 workdays * 35 minutes = 700 minutes when taking Shea Boulevard. Winter * 1 jams (workdays) * 45 minutes = 45 minutes * 14 workdays (highway) * 25 minutes = 350 minutes * 5 workdays (Shea Boulevard) * 35 minutes = 175 minutes * Total = 570 minutes compared to * 20 workdays * 35 minutes = 700 minutes when taking Shea Boulevard. 4. Further, comment on how the conclusions of this problem will change if there was no uncertainty and the highway always had traffic jams, whereas Shea Blvd was always traffic jam free? Is this scenario realistic and why? Respond substantively to at least two of your classmates’ postings * 20 workdays * 45 minutes (I-20 w/ jams) = 900 minutes. * 20 workdays * 35 minutes (Shea Boulevard) = 700 minutes. If this was the case, Edith and Mathew would take Shea Boulevard every day. The scenario can be realistic because construction could incur at some point throughout the year cause delays and an increase in accident rates. References Douglas, E. (2012). Managerial Economics (1st ed.). San Diego, CA: Bridgepoint Education. This text is a Constellationâ„ ¢ course digital materials (CDM) title.

Saturday, October 26, 2019

Theory Of Second Language Acquisition English Language Essay

Theory Of Second Language Acquisition English Language Essay Second Language Acquisition (SLA) is a critical issue to both teachers and learners of a second language equally. Thus, teaching and learning a second language has always been of a highly important matter for linguistics who always seek language learning solutions to facilitate instructors job and answer educational enquires .Fillmore and Snow, 2002 and Hamayan, 1990 stated that teachers can play a positive role in improving second language acquisition if they understood how to improve the learners ability of majority. This paper will be devoted to Stephen Krashens second language learning acquisition theory. It will go through the stages of the theory and some applicable strategies for L2 teachers and learns. Key words: mother tongue, second language acquisition, learning, L2, theory Introduction Linguist Stephen Krashen (1981,1982) , University of Southern California, USA has developed the most famous second language acquisition theory (SLA) which is also known as the Krashens Monitor Model. Krahsen has developed his theory of second language acquirers who are assumed to have two autonomous systems for improving their ability in acquiring a second language and aware of the language learning. So, these systems are interconnected in an explicit way where unconscious acquisition seems to be more vital as it takes place naturally. The theory rotates around hypotheses that young learners subconsciously pick up the target language similarly to acquiring their mother tongue in informal situations. In fact, this is totally different from formal learning where it is thought to be dominated by error alteration and the appearance of the grammatical rules (Krashen and Seliger,1975). In this paper, light will be shed on SLA theory, its components and how important for the L2 teachers to be familiarizes with it. Acquisition and learning Both the mother tongue and the second language acquisition share different aspects. They both require a meaningful interaction, authentic communication in which speakers are paying the most attention for conveying and understand the message rather than the form of their utterances. Error alteration is more likely not so important and teaching grammar is not applicable to acquiring a second language. Teaching should give acquisition an adequate chance to flourish and make the second language learner gains a self-confidence which will help him later on to realize his mistakes and overcome them as this technique will help the acquisition process. (Brown and Hanlon, 1970; Brown, Cazden, and Bellugi, 1973). On the other hand, formal language learning is thought to be overwhelmed by a great deal of error correction and the existence of explicit grammatical rules (Krashen and Seliger, 1975). Although error alteration is sustained, it helps the acquirer comes to the right psychological image of the linguistic simplification. It is said that, error correction hinders the language development with a feeling of continues anxiety governed by error phobia . Whether such feedback has this effect on the acquirer to a significant degree or not remains an open question (Fanselow, 1977; Long, 1977). 2. The natural order hypothesis This hypothesis in second language acquisition assumes that mastering second language grammatical rules occurred in a predictable order. Regardless of the mother tongue of the learners, acquiring the target language rules varies in terms of their sequential which means that some rules are acquired earlier than others. Yet, second language grammar should not be taught as it is supposed to be acquired in this natural order. 3. The monitor hypothesis This hypothesis states that acquiring an L2 will be developed automatically allowing the acquirer to monitor his new language grammatical rules and edit the mistakes unconsciously at some stage, which we will see later as the Monitor. These monitor uses vary from a learner to another, with different degree of accomplishment. Stephen Krashen (1981) classify the monitors into two types, Over-users who habitually try to use their Monitor, in fact, this application leads to a result of a correct language lacks a lot of natural fluency that should help the learners in their real live. Monitor Under-users either have not intentionally learned or decide to not use their aware information of the language. Even though the modification of errors by others has little effect on the learners, they can frequently correct themselves, later on, based on a good judgment for correctness. 4. The input hypothesis Krashens theory of SLA is also called the input hypothesis, which answers the question of how a target language acquirer develops competency over time. It states that a language learner who is at i level must receive sufficient and logical input that is at his level i and a new +1.The new +1 varies from a learner to a another where an x can pick something different form a z depending on his background, interest, priority, attention and the way it is presented. 5. The affective filter hypothesis Filtering the learners input varies from a stage to another, so a learner of a second language might not need to filter every single input at the early stage. The role of filtering the new input increases as the learner have sufficient comprehensive input. At later stage, when the second language learner masters a lot of L2 rules and have reached the advanced language proficiency, filtering becomes subconscious process. This process will shape the new language and internalize its rules forming a native like competency. The preceding five hypotheses of acquiring L2 can be summed as follow: 1. Acquiring a language is far more significant than learning. 2. For acquiring a new language, two conditions are essential,i+1 input, which should be formed slightly above the learners present stage, and the second, a low sense of filtering to allow the input takes place. Development of second language acquisition Stephen Krashens concept of second language acquisition intake means presenting a language context a little beyond the learners current competence in the L2 ( Krashen, 1981,p.103). He sometimes refers to it as we saw an i+1, meaning that the learning situations should challenge the L2 acquirer by presenting a new input and above the learners level so that he will acquire something new and construct on what he already has . The concept of the continuum of learning, is said to be a shared phenomenon by most current language theorists, where predictable and sequential stages of second language development occurs. A child can acquire a second language using almost the same techniques he applies in acquiring his mother tongue. In fact, it requires authentic situational interaction in the second language and meaningful communication in which the two parties are caring not with the structure of their vocabulary but with the communication they are passing on and understanding. Error alterati on and pure rules teaching is not relevant to language achievement as Brown and Hanlon, 1970; Brown, Cazden, and Bellugi, 1973 said. The second language learner progresses from no knowledge of the new L2 to a level of competency closely like a native speaker. These theories however, have identified different stages for the development of second language acquisition where they are identified in five phases: Stage 1, the receptive or preproduction stage This stage is also called the silent stage where the learners develop survival vocabulary, following different teaching and learning situations including playing, miming, simple games and listening to stories. This phase could last from hours to six months. As the learner feels comfortable, he/she starts understanding and interacting with the teacher, his classmates and the surrounding environment using a variety of techniques like pointing to surrounding things, standing up, closing the door, nodding or might responding using simple words like yes or no. Teachers are recommended not to force learners to speak at this stage. Stage 2,the early production stage After acquiring about 5000 words in the first stage, the learner adds 1000 active words, in another six months, enabling his/ her to speak one or two words phrase, and demonstrates understanding by responding to yes/no, some WH questions or to either or. New vocabularies are required to be presented side by side with revising the old ones. Mistakes are to be tolerated in speaking provided the message is understandable. Stage 3, the speech emerging stage The most prominent phenomenal of this stage is the production of L2 phrases and simple sentences. During the second year, the learners will start interacting using the second language in reading and writing for operational purposes. The surrounding should play a positive role in encouraging the L2 learner and ignoring mistakes as long as the message is understandable and clear. Stage 4,the intermediate fluency At this stage the L2 learner is more aware of the usages of academic words in different situations comprehending about 6000 active words. He/she can interacts outside the teaching and learning contexts without using L1 for interpretation thus, he still makes errors in complex grammar and the usages of new vocabulary. The learner can interacts in academic presentations using visual and hands-on science activities, solve math problems, making models, maps, participate in academic discussion, make brief oral presentations and answer higher level order thinking questions. Stage 5, the advanced language proficiency speakers This level can be mastered after from five to seven years. The learner can comprehended academic presentations without using visual illustrations. He can use higher reading comprehension skill, writing comprehension, reports and research papers. The learner can use L2 grammar and vocabulary comparable to his age native learners. Understanding the learners stage helps the instructor to tailor the material accordingly and build on the existing strengths and remedial the weaknesses. Mother Tongue and Second Language Acquisition Mother tongue interference has been of a high priority in the history of second language acquisition researches and practices. For a long time , it had been reputed that the main source of syntactic errors in adults L2 performance was their mother tongue (Lado, 1957), in addition to a huge deal of resources preparation was done with this assumption in mind (Banathy, Trager, and Waddle, 1966). Consequently, experimental studies of errors made by second language learners guided to the detection, however, that many errors are not specific to the rules of the mother tongue, but are familiar to second language users of different linguistic backgrounds (e.g. Richards, 1971; Buteau, 1970). These results have guided several researchers to examine the importance of contrastive study and to argue as an alternative for error examination. As clearly stated earlier, the mother tongue is one of a number of causes of error but other factors need to be measured. A research conducted by Selinker, Swain, and Dumas, 1975; Plann and Ramirez, 1976 found that , mother tongue influence appears to be higher in complex word order and in word for- word translations of phrases. Mother tongue influence tends to be weaker in bound morphology. Mother tongue influence also appears to be strongest in acquisition poor surroundings. And finally mother tongue influence errors here are also in the area of word order. Pedagogies Providing Krashens Theory The question which we all need to ask ourselves is, How can a second language learner benefits from a formal learning situations? Formal learning or face-to-face learning can be of a great benefit for an L2 learner if it provides a comprehensive input. If the learner current ability helps him to add something more to his i or as Vygotsky called ZOPD. It is also said that classroom or formal learning cannot provide the acquirer with the wide range of daily issues and social langue needed. So the classrooms role is to prepare the learners for dealing with real life situations by presenting a sufficient daily actual language contexts. The theory also suggested that learners who are not able to speak output for physical problems can still master the full ability to comprehended language by presenting comprehensible input dependence on each learner. Teachers need to be slower and carefully articulate using common vocabulary and avoid dilates , slang language and shorter sentences. Teachers should facilitate presenting the best possible monitor users as to promote communication and avoid hindering acquisition with grammatical rules domination. In addition to getting the appropriate input, acquirers need to have their emotional filter kept minimum which will help them get the maximum input from the surrounding and allow them to master the techniques of dialogue and ideas exchange. Conclusion: Acquiring and learning a second language is very important in a bilingual and multi lingual society. It is also a necessity in todays global world where technology is mostly restricted to specific countries speaking a small number of languages. In fact, a lot of students, teachers, specialist and politics find themselves in a bad need for learning these languages. As presented earlier, Krashens theory of second language acquisition, suggested some useful techniques for teaching and acquiring a second language. Teachers are urged to use such theories for facilitating their job and helping their students acquire and learn better. Although this theory was a result of studies conducted in America on bilingual and multilingual speakers, our students in the Arab world in general and in the UAE in particular could gain the most of it with the help of their teachers. The focus should be on how to gradually help the learners pick the foreign language in a way that focus on fluency rather than accuracy.

Thursday, October 24, 2019

Legal Constraints Regarding the Usage of Customer Data :: essays research papers

1. PRIVACY WANTED 3 2. THE REGULATION – EU DIRECTIVE AND THE CAN SPAM ACT 3 2.1. Safe Harbor 4 2.1.1 Opt-in or Opt-out? 4 1. Privacy wanted Most of us have already asked ourselves who all owns the information about our name, our address and telephone number or the amount we keep in our checking account. Instinctively we feel that our names and other personal information belong to us and dislike the thought that someone else could profit from marketing them. However, it is the obvious reality that it happens very often. It is enough to look at our mailboxes to see big amounts of unsolicited mails with various kinds of offers for a number of products and services. Clearly, customer information is seen as a business asset that is acquired and utilized aggressively. To understand the dimensions of the privacy debate, it is valuable to remember that e-commerce allows marketers to advertise goods and services ever more accurately, in an increasingly personalized manner. Rather than relying on demographic statistics that lump consumers into broad target groups, or collating credit card purchasing data into marketing profiles, the Internet allows businesses to track profiles and information provided directly by the consumer — and then create automated marketing programs tailored specifically to that customer. By monitoring clicks made on the Web and leaving behind "cookies" on the computer to help the system remember an individual, marketers can gather a startling amount of personal information with which to sell goods and services. There is a lot of talk about the desired level of privacy regarding the wide range of customer data held by businesses. The consumers are becoming more displeased by marketers buying and selling their personal information, while at the same time the rise of e-commerce has raised fears about this issue, due to the ease with which all types of sensitive data may be gathered, copied, shared, and misused via the Internet. In response, the European governments have passed tough laws regulating how businesses manage and share personal information — including a prohibition on sharing data with businesses located in countries that fail to provide adequate data protection. Given the far less restrictive policies on privacy in the US, many in the business community feared that the new laws would effect e-commerce between the US and Europe. 2. The Regulation – EU Directive and the CAN Spam Act The view on how much protection consumers deserve regarding their data and how much control should they be allowed in the way businesses use that data depends on where one lives. Legal Constraints Regarding the Usage of Customer Data :: essays research papers 1. PRIVACY WANTED 3 2. THE REGULATION – EU DIRECTIVE AND THE CAN SPAM ACT 3 2.1. Safe Harbor 4 2.1.1 Opt-in or Opt-out? 4 1. Privacy wanted Most of us have already asked ourselves who all owns the information about our name, our address and telephone number or the amount we keep in our checking account. Instinctively we feel that our names and other personal information belong to us and dislike the thought that someone else could profit from marketing them. However, it is the obvious reality that it happens very often. It is enough to look at our mailboxes to see big amounts of unsolicited mails with various kinds of offers for a number of products and services. Clearly, customer information is seen as a business asset that is acquired and utilized aggressively. To understand the dimensions of the privacy debate, it is valuable to remember that e-commerce allows marketers to advertise goods and services ever more accurately, in an increasingly personalized manner. Rather than relying on demographic statistics that lump consumers into broad target groups, or collating credit card purchasing data into marketing profiles, the Internet allows businesses to track profiles and information provided directly by the consumer — and then create automated marketing programs tailored specifically to that customer. By monitoring clicks made on the Web and leaving behind "cookies" on the computer to help the system remember an individual, marketers can gather a startling amount of personal information with which to sell goods and services. There is a lot of talk about the desired level of privacy regarding the wide range of customer data held by businesses. The consumers are becoming more displeased by marketers buying and selling their personal information, while at the same time the rise of e-commerce has raised fears about this issue, due to the ease with which all types of sensitive data may be gathered, copied, shared, and misused via the Internet. In response, the European governments have passed tough laws regulating how businesses manage and share personal information — including a prohibition on sharing data with businesses located in countries that fail to provide adequate data protection. Given the far less restrictive policies on privacy in the US, many in the business community feared that the new laws would effect e-commerce between the US and Europe. 2. The Regulation – EU Directive and the CAN Spam Act The view on how much protection consumers deserve regarding their data and how much control should they be allowed in the way businesses use that data depends on where one lives.

Wednesday, October 23, 2019

Britannica online Essay

This is a book proposal that has been created to ensure the children of today are still exposed to the same childhood experiences that we all had years ago. In today’s society we are much more fast paced and immediately are drawn to electronics such as computers, television, movies, ipods, etc†¦ The numbing effect of this constant barrage of information on very young children could lead to a sort of deterioration of values in a small child. Proposed title: Back to the Basics: A Collection of Nursery Rhymes for Today’s Child Introduction: Many of us picked up our own sets of values and morals from what had been passed down to us through tradition. A Nursery Rhyme is a poem or a song, traditionally taught to very young children. Nursery Rhymes in the English language are usually British in origin, dating back to as far as the 16th Century. Aside from the ones imported from England, many Nursery Rhymes also developed in North America (Encyclopedia Britannica online, 2008). These little songs and poems form a sort of symbolic â€Å"backbone† to the continuing cultural and psychological development of the American people and culture. Indeed, at its very core, a Nursery Rhyme is a sort of cultural footprint. While most oral tradition (ex: nursery rhymes) may sound more like nonsense or oversimplified, moralistic tales set to a rhythm and a tune, they carry the symbolic weight of generations past (Bettelheim, 1976). Passed on through tradition and brought alive by the imaginations of the very children who hear them and pass them on, these rhymes bear the values of the culture that created it. For example, Humpty Dumpty’s story reminds us that there are some things that, once broken, can never be mended. In another example, the Itsy Bitsy Spider speaks to us of the value of perseverance. Sometimes, a Nursery Rhyme isn’t just a moral legacy, but a historical one as well: showing us how people lived or worked during the particular time when these rhymes were created. For example, while shepherding may no longer be a common profession, especially in heavily populated urban areas, even children from the inner city are aware that it was once a way of life, thanks to Little Bo Peep and her sheep. Rationale: Nursery Rhymes have been in existence for hundreds of years, but what exactly is the importance in continuing in this tradition? Children are automatically drawn into these stories because of the rhyme, there is rhythm, and they are often about creatures in otherwise unimaginable circumstances, which leads the child’s own imagination to wander. In addition to being an effective vehicle through which a culture propagates and preserves itself, Nursery Rhymes are of particular importance in the development of a young child’s growing language and memory skills. There is a reason that today, even after growing up; we can still remember these little phrases. They have made great impact in our childhood learning schemata and we believe that if they continue to be reintroduced to the children of today, their impact would be highly beneficial. We believe that this book will be a great hit among small children and their parents, and that with the aid of colorful illustrations, this book can be very useful in promoting a child’s mental, psychological, and social development. Methodology: After much deliberation, we decided to limit our selection to the most common and well-loved Nursery Rhymes. We looked through several collections of nursery rhymes, both online and offline, and picked out the ones that occurred the most frequently. Given that we plan to make this book a children’s book, we limited our selection to only four Nursery Rhymes. We chose to do this so that the book could accommodate the illustrations that we hope will be included as visual aids for the children, without being too heavy or cumbersome for even a small child to read and carry. These Nursery Rhymes are as follows: Humpty Dumpty: Humpty Dumpty sat on a wall, Humpty Dumpty had a great fall. All the king’s horses, and all the king’s men, Couldn’t Put Humpty together again. Jack and Jill Jack and Jill went up the hill, To fetch a pail of water. Jack fell down and broke his crown. And Jill came tumbling after The Itsy Bitsy Spider The Itsy Bitsy Spider Climbed up the water spout. Down came the rain And washed the spider out. Out came the sun And dried up all the rain, And the itsy bitsy spider Climbed up the spout again. Little Bo Peep Little Bo-Peep has lost her sheep, And can’t tell where to find them. Leave them alone, And they’ll come home, Wagging their tails behind them. Thank you very much for taking the time to read and consider this. We look forward to your timely and positive reply! References Bettelheim, Bruno (1976). Uses of Enchantment: the Importance of Fairy Tales. New York: Knopf Encyclopedia Britannica online, concise version. Nursery Rhymes. retrieved February 3 2008. from http://www. britannica. com/ebc/article-9373775

Tuesday, October 22, 2019

Message confidentiality Essays

Message confidentiality Essays Message confidentiality Essay Message confidentiality Essay Secret key cryptography is also known as Symmetric Encryption. Here same key is used for both the Encryption and Decryption processes [1]. In this approach, sender and receiver both should know the algorithm to use and the secret key. Sender and receiver should be kept the key secret and they should obtain the key in a secured way [2]. Most commonly used secret key cryptography algorithms are DES, 3DES, RC4 etc [1]. In this test DES has been used to encrypt/decrypt an arbitrary message. Here Base64 encoding has also been used to encode the message. We know that, while sending SMTP e-mails with attachments normal text files can be attached in plain text format, but binary files (such as image files) cannot be attached in the same way. Binary files need some sort of encoding process to be attached with STMP mail. And the most widely used encoding is Base64 [3]. Description of DES algorithm DES Encryption Process DES has a very strong internal structure [2]. The following figure presents an overview of the DES encryption process. Figure 1: DES Encryption process In DES encryption process 2 inputs are provided to the encryption function: a 64 bit plain text and a 56 bit secret key. At first, the 64-bit plaintext is initially permuted. In the next step combination of a permutation and substitution function is executed 16 times, it makes 16 rounds. Left half and right half of the output from the last round are swapped and permuted again. This permutation is an inverse function of the initial permutation function. At last we get a 64 bit cipher text as an output of the whole process [2]. DES Decryption Process DES decryption process uses the same algorithm as DES encryption process. But in this case the application of the subkeys is reversed [2]. Strength of DES The main strength of DES is usage of 56 bit keys. For using 56-bit long keys the number of possible key is 256 and so the bruit force attack needs 255 attempts which is quite impractical to complete. So DES is strong against Brute force attack. It is also strong against Differential Cryptanalysis and Linear Cryptanalysis as they need 247 and 243 attempts respectively [4]. Base64 Data Representation Base64 data representation is based on a 64 character alphabet [3]. The alphabet is presented in the following table. Sequence Characters 0 25 A Z 26 51 a z 52 61 0 9 62 + 63 / Table 1: Base64 Alphabet A binary file is a series of zeros and ones [3]. These bits are represented with a 0 or 1 character. In Base64 data encoding at first the zeros and ones are grouped into sets of 6 characters. Then these blocks of bits are converted by a single character, which can be calculated from table 1. In this way 6 characters are replaced by a single one. Thus Base64 alphabet allows converting binary zeros and ones into a compressed and human readable format [3]. Description of the demo Programming Language Java Java has been used here to implement DES including Base64. Java has been chosen as it has some advantages such as it is open source, platform independent, and it has automatic memory management [5]. Besides, the Java platform has some built in packages that make cryptographic implementation easier. Source code Result of test run The test result was as follows. Conclusion According to Microsoft Confidentiality is the ability to keep a message unreadable by anyone other than the intended recipient; this is achieved through cryptography [6]. So here to achieve confidentiality DES algorithm has been used including Base64 encoding and also have successfully retrieved the original message by using decryption process. Reference: [1] Secret Key Cryptography, sequi. com/SEQUI_VPN_Glossary. htm [2] William Stallings, Cryptography and Network Security, 4th Edition (Nov 16, 2005), chap 3. [3] Randy Charles Morin, How to Base64 kbcafe. com/articles/HowTo. Base64. pdf