Wednesday, July 31, 2019

Back to the Dream Time

NORTHERN UNIVERSITY OF MALAYSIA COLLEGE OF LAW, GOVERNMENT AND INTERNATIONAL STUDIES SBLE 1043(GROUP D4) TITLE: BACK TO THE DREAMTIME LECTURER: MADAM HAZNUR NADIN BINTI HASSAN PREPARED BY: TEOH BOON KHAI (219673) The two main characters in the novel ‘Back To The Dreamtime’ were Richard and Tom. This novel is talking about how a boy complete the mission that given by his father who had died when he was two years old and how a family maintain their relationship although Richard is adopted by McDonald. Richard Oenpelli McDonald was a smart, rational and filial piety boy.He has a sibling which is Judy and Tom. His mother named Sonya and his father, Oenpelli, tribal name, was died when he was two years old. He was adopted by the Joe McDonalds. However, his parents had hidden him about his background and heritage. Although Richard was Aborigines, he lived in city since he was a kid. He study in University Of Sydney which is same with his brother, Tom. Richard was interesting i n History and he intention to take this course in the university. Tom is Richard’s brother however Tom is a white man and Richard is Aborigines.Tom study in the same university with Richard which is University Of Sydney. Tom was older than Richard exactly two month. Tom was interested in photography and he may continue his study in photography. He found it very interesting and it’s not usual nine to five job. The relationship this two main character was good. They went to school to school together everyday. Besides that, they used to sit and chi-chat beside the railway tracks every morning before going to school. Besides that, Richard, Tom and their sister, Judy were playing cricket in their house backyard.It was their favourite pastime on the weekend. During the break time in school, they and their friend, Bradley used to left the school grounds secretly to go to their favourite place at cliff. Moreover, Richard and Tom decided joined the year’s senior class ca mp which location at Alice Springs with a friend who named Bradley. The year’s camp was taking five days in Alice Springs. Tom volunteer himself to go to Alice Springs with Richard. The purpose they went there is to burn the tjuruga in Richard’s father burial ground at Uluru. At the end, they succeeded to find the burial ground and buried the tjurunga.During the trip, it had drained them physically and emotionally and they experienced it together. They helped each other during the trip. In the conclusion, I feel that the way they maintain their relationship among Richard, Tom and their family is what we have to learn. Although they don’t have any relation in scientific prove, they still very respect and love each other. Nevertheless, they treat their family members very well and take care of each other. They can stay peaceful among each other. This kind of spirit and moral value is what we have to learn from.

8th of march Essay

Happy women’s day! International Women’s Day (8 March) is an occasion marked by women’s groups around the world. This date is also commemorated at the United Nations and is designated in many countries as a national holiday. This day women on all continents, often divided by national boundaries and by ethnic, linguistic, cultural, economic and political differences, come together to celebrate their Day. 8th March is celebrated as International Women’s Day, worldwide. The day is observed to bring a ocial revolution aiming at gender equality. In fact, in some countries like China, Nepal, Vietnam, Russia, it’s an official holiday! Here are some fun-facts about Women’s Day and areas where women excel, which is sure to make every woman proud of herself! 1. The first Women’s Day was observed on 19th March 1911. More than 1 million women and men attended rallies to support women’s right to work, vote, hold public office and to end gender discrimination. Over the years, 8th March as fixed as International Women’s Day. 2. Research suggests that women possess much stronger verbal skills, compared to men. Women are naturally more articulate. 3. Yellow mimosa is the symbol of Women’s Day in Italy, Russia and Albania. In Italy, men give flowers to women. Chocolates and yellow mimosa tops as gifts in Russia and Alba 4. Women have better empathy and can interpret emotions better. Women are also faster to identify something visually different than usual. According to scientists, women have a stronger immune system and female hormone oestrogen gives women this edge! 6. Women, if they receive proper medical care during her birth and pregnancy, have a longer life expectancy than men. 7. Women and caring go hand in hand. This may be the reason why many patients prefer female doctors. Several studies indicate that female doctors are more encouraging, reassuring and spend up to 10% more time with patients.

Tuesday, July 30, 2019

Reading Response on Four by Veronica Roth

To have a successful fife in the right faction when a boy or girl turns sixteen they must take the aptitude test which helps them pick their faction. However, they may choose their faction based off of opinion or interest. There are five factions to choose from. Abnegation, the ones who value selflessness, Candor, the ones that honor honesty, Amity, the ones that honor the peaceful, Erudite, the ones who honor the intelligent, and Dauntless, the ones that honor the brave. Each faction honors a certain trait. They believe that if a person was brave, or selfless, or kind, there would be no war and only peace.At the Choosing pick their factions. They may choose to stay with Ceremony the teenagers their faction and their families or they can abandon them. Later on, if they prove to be unfit for their new factions they will become factionists; these are the people that have no family, no home. They live together or alone in abandoned buildings or homes, and even on the streets. Tibias Eat on, originally from Abnegation, has turned sixteen and has to decide what he was going to do with his life and what faction he will spend it in. However, one thing is clear for him.He will run from Abnegation, and he will run from his father. Tibias has to escape his father, and find a place where he is safe, and hidden. Tibias is tired of living in fear and is ready to take on his own path in a different faction. When Tibias returns to his plain Abnegation home he goes to his room and reviews his most precious possessions that were given to him by his mother. Tibias was informed that his mother died of child labor when he was a young boy. This made his family fall apart and caused the tension between him and his father.The author made this connection teen Tibias and his mother to show how his mother was the glue of their family and that Tibias was closer to her than he is to his father. When Tibias reviews all of his possessions he is caught by his father and has it all taken away from him. His father throws all of his treasures around the room, destroying them in the process. Tibias is now deprived of the only connection he had to his mother. Yet, we are about to discover more about Tibia's and his fathers relationship. Tibias has developed a fear of his father and this is because of the abuse his father puts on Tibias. His hands oiled with my chest. I stumble back and hit the dresser. Then he draws his hand back by his face to hit me, and say my throat tight with fear ‘ ‘The Choosing Ceremony, Dad! † † tomorrow was Tibia's Choosing Ceremony. His last chance to escape, to be free of fear. â€Å"When we get there, my father puts a hand on my shoulder as we walk to the entrance, sending shocks of pain through my body. Have to get out. † The day of the Choosing Ceremony is the day Tibias changes his life and the person he will become. Tibias is desperate to escape Abnegation and to escape his father.As the ceremony goes on, Tibias is thinking of what faction he will choose. Where will he fit in the most? Where will he be safe? He decides that Candor, Erudite, and Amity are not choices that he can live with. His only choice is Dauntless. â€Å"l open my palm over the coals. Feel like they're burning in my stomach, filling me to the brim with fire and smoke. I am free. † The minute the ceremony is over, Tibias begins initiation. He and the rest of the initiates must prove their bravery by jumping on to a moving train, then jump off of a moving train on a roof, and finally they must jump off of the roof.My stomach drops and my limbs fumble in the air for something, anything to hold onto, but there is nothing, only the drop, the air, the frantic search for the ground. † As initiation goes by Tibias changes his name to Four. After facing his worst fears Tibias and his initiation instructor Mar find out that he only has four fears. This new name gave Tibias new power, a new identity. â€Å"My name is Four,† I say. â€Å"Call me ‘Stiff again and you and I will have a problem. † During initiation, Four makes many friendships and becomes close to Mar. However, he is still quite different from the rest.He likes to be alone, to have a peace of mind once in a while. The first stage of initiation is physical training and combat. Four has the drive and the practice from his childhood abuse to become the best initiate. He proves his bravery by beating the other initiates in combat fights and using his strength and his thinking skills to his advantage. By the end of stage one, Four is ranked first out of his entire class and is considered someone to look out for. In the second stage of initiation Four has to prove that he can overcome his fears mentally using critical, fast thinking and by asking decisions that may be risky but courageous.However, Four thinks differently and beats the system by being aware during his stimulations that it is not reality. By being able t o do this he gets out of the stimulation by realizing that if he jumps he won't die because it's not real. Its just a test. Later on, Mar teaches Four to go through the stimulation like any other Dauntless would; with bravery. At the end of initiation the initiates are ranked to show who has more potential and more strength than others. For Four, his rank surprised him a bit. â€Å"Instantly, some of the tension disappears. I follow he list up, and panic stabs me for just a second when I can't find my own name.But then, there it is, right at the top. 1. Four. † After initiation Four becomes a full pledged Dauntless. Finally, he is rid of Abnegation, rid of his father. When Four gets his apartment he also gets a job offer to become a dauntless leader. Even though Four wanted to have a job where he would be the initiation instructor, like Mar, he was expected to have a more prestigious job since he was ranked first. Four agrees to take the job but his heart isn't with it. Later on, Four realizes that if he becomes a leader he will eve to face his father, an Abnegation leader. My fingers start to go numb. I've faced my fears so many times in simulations, but that doesn't mean I'm ready to face them in reality. † Four has to learn what it would be like to be a Dauntless leader but he also needed to learn the basic lifestyle of the Dauntless and needs to learn that Dauntless is more ‘out there' than Abnegation with their feelings, thoughts, and emotions. When Four goes to the meeting for dauntless leadership he quietly disagrees with the way the leaders handle situations and the changes that they want to make to aunties initiation.As the days go by, Four takes multiple tests that will determine if he has what it takes to become a leader, there is still tension and competition between Four and Eric and the fact that Eric has information that threatens Fours identity, and Four still has the suspicion of an intruder coming into his apartment. Four f inally faces his new life as the new â€Å"best† initiate of Dauntless. After a day of hard work, Four returns home to find that once again somebody was in his apartment. This time they left a note. â€Å"On the day you hated most. At the time when she dies. In the place where oh first jumped on. Four figured out that someone that had some connection to his childhood wanted to meet him. Instinctively, Four thinks its Marcus, his father. Four decides that he needs to know what Marcus wants and why he risked getting caught to contact him. When Four arrives at the platform in the middle of the night, its not Marcus that shows up. Its Evelyn Eaton. His mother. Right away Fours mind races with memories of his mothers the death. The funeral, the gathering, the ashes. The only thing Four can say is â€Å"You're supposed to be dead. † Fours mother tries to explain to IM that she didn't leave to hurt him.She had to get away from Abnegation, from Marcus. Just like Four. The aut hor here shows a similarity where both the mother and the son needed to escape from Fours father and his lifestyle. This show that Marcus might hide his temper and his real self from the public and only shows and acts like him true self at home. However, Four doesn't want to hear her pity story and he acts like she is the last person he wants to talk to. â€Å"Stop wasting my time. What are we doing here? † Evelyn reveals to Four that she is a leader to the factionists and that there is a big chance of a pricing among the factions and that Four should be on her side. Our city is changing, Tibias. The factionists are coming together, and so are Dauntless and Erudite. Sometime soon, everyone will have to choose a side, and I know which one you would rather be on. I think you can really make a difference with us. † Four doesn't care about any Of the problems, really. He just can't let go of the fact that Evelyn hasn't talked or reached out to him in seven years and now she actually wants something from him. A favor. Four chooses to run from her. Like he ran from him. Now that Four is trying to find who he ally is he wants to get a tattoo that will represent him as a person.While Four is getting the tattoo, Tort, the tattoo artist tells him about being Divergent. â€Å"That's a word for people who are aware during simulations, who refuse to categorize. † Four realizes that fits the description of Mar. Mar was aware during the Simi ululations. Divergent fit Mar, and it fit him. When Four meets with the dauntless leadership group again, he proves to have a less strategic protocol for initiates than no one other than Eric. Four realizes that this is his chance to change jobs and to escape leadership. To be honest, sir, I don't think that this is the right place for me.I told you when you first asked me that I'd like to be an instructor, and think I'm realizing more and more that that's where I belong. † Days have passed by after Four's meeti ng with Evelyn. He had time to think if leaving Dauntless, betraying his faction to join the factionists is the best thing he can do right now. He decides that it's not. He has friends that support and understand him and he knows that no way is he leaving them behind. â€Å"If the factions are deteriorating, as my mother loud have me believe, this is not a bad place to watch them fall apart. Four makes the choice to stay loyal to the faction that set him free. Two years later, Four is the initiation instructor for a group of transfer initiates which means that they come from other factions. There were initiates from Candor, Erudite, Amity, and Abnegation. The girl from Abnegation sparked Fours interest. Her name was Tries. She had a small form and looked as if she can snap like a twig in a second. Whenever Four is next to her he acts a certain way. He loses his hard, mean personality and opens up to her like he doesn't veer do to anyone.

Monday, July 29, 2019

Learning Intention Essay Example | Topics and Well Written Essays - 250 words

Learning Intention - Essay Example I try to anticipate the various events that I must go through such as delivering verbal instructions, using teaching aids or other resources in order to augment the learning process. In a somewhat similar manner, the teacher has to be sensitive to what concepts and content is delivered in the class. Modern classrooms are multiracial, multilingual and posses a number of ethnicities and socio economic backgrounds. The individual identity of each student in class must be preserved by paying careful attention to the delivered content. Additionally the teacher must also keep abreast of student’s learning by monitoring it. It is often cumbersome for me to monitor each individual student in my class so I use groups to assess how well each student in class is doing. In order to pose a more innovative teaching stance, I create various hypotheses relating to student behavior, instructional medium and style and test them out both qualitatively and quantitatively as applicable. This allows me to learn more about students and their styles of learning (Hattie, 2012). Above everything else, being a teacher I show the utmost respect for all members of the school including staff, students and faculty. The teacher has to project a friendly identity that is warm and inviting for students so that they can take learning to a more personal

Sunday, July 28, 2019

Sugar Cane Alley Video Assignment Example | Topics and Well Written Essays - 250 words

Sugar Cane Alley Video - Assignment Example Indeed, formal education had thought him that nothing could be more enslaving than for his true identity to be missing. In his search for knowledge therefore, Jose was also seriously searching for his true identity and a self will that would make him accept his roots and identity as the best. After all it is said that even if the back of your teeth is sour, it remains where your tongue licks. This means that even if you shy away from your identity because of whatever negative tag it may have, it remains your roots. For Jose to have said that "tomorrow Ill return to Fort de France and Ill take my Black Shack Alley with me" therefore means that Jose had finally come to find the solution to the puzzle he had been trying to solve since the beginning of the movie. The puzzle of his identity – the puzzle of who he was! The solution was that he was Black and came from the true Black identity, which is of course Africa and for the fact that he admired and revered where he was coming from, he was ready to take his identity along with him without fear or shyness. The statement therefore means the discovery of Jose’s identity and his readiness to embrace his true and original identity without

Saturday, July 27, 2019

Requirements for the Corporate Computing Function Essay

Requirements for the Corporate Computing Function - Essay Example For instance, most companies today have a backlog of e-mails, instant messaging, web processing, voice call and other communication means to handle on a daily basis. In most cases, handling organization and management of information tend to pose a huge challenge to many. In spite of the challenges involved, it is an aspect that must be given serious attention. Data is part of a business today and the information obtained from data received is of great value in today’s business environment (Andersen,. 1995). In fact, most organizations depend on the availability and accuracy of the data to function. However, the technological advancements witnessed in the recent past have brought new hurdles in managing information that did not exist in the past before the emergence of computers and the internet. Whereas technology has increased efficiency, access, and integrity on ways of how to manage information, it can be tiresome. However, based on the competitive nature of the global econ omy, managers must ensure that data is received in a timely and accurate manner in order to be able to meet the information needs of management. The availability of accurate and timely data is important for the management since it keeps them informed and up to date with decisions (Andersen,. 1995). ... In the past, businesses used to rely on manual file management system, including cabinets and notebooks. However, the traditional filling systems are no longer productive in today’s competitive business environment. To solve this dilemma, the management must integrate technology by installing information system that is capable of addressing business processes and accomplish the goals of the organization in a timely and effective manner (Hanrahan, 2007). This can be achieved by introducing the Local Area Network (LAN) and Metropolitan Area Network (MAN) technology to ensure that the company receives data real time. The LAN is a technology used to interconnect computer networks in a single building (Hanrahan, 2007). The installation of the LAN technology in the company will enhance information sharing, which helps in meet information needs of the management. This is attributed to fact that managers will use the LAN technology to link with other members of the staff, thereby enha ncing the provision of information in a timely manner. The fact that the management will be able to obtain data real time helps in aiding timely decision-making in the company. Therefore, the fact that LAN technology allows management to share data is important and helps meet the informational needs of the management. The MAN technology will also help ensure that the informational needs of management are fulfilled. The MAN technology is important because it interconnects users with computer networks in a wide geographical area (Hanrahan, 2007). This may include different buildings within a city. As a result, MAN will allow the management to share data with users located in different geographical locations without necessarily having to travel to get the information. This is critical since it

Friday, July 26, 2019

Social Networking's Impact on UK Business Dissertation

Social Networking's Impact on UK Business - Dissertation Example The structure of social networking allows an individual to have his or her own profile, friends, discussion groups, posts blogs, and more.The widespread usage of social networking amongst masses elucidates the escalating popularity of social networking on a constant basis. It also shed the light on the fact that consumers profoundly calculate upon the social networking services before making a decision for their purchase of any product or service. However, several enterprises have become ignorant to the fact that the sales profoundly comes under the impact of the usage of social networking services (Donoghue, 2010). On the other hand, people, businesses, and entrepreneurs are inclining towards the usage of social networking, it is imperative that the social networking is leaving an indelible imprint on to the thoughts and perceptions on masses. Therefore, it provides the researcher to conduct a wide range of investigations in order to determine the impact, whether negative or positiv e upon the business community in the UK. SMART Objectives The primary aims and objectives that urge the researcher to carry out the research analysis come under enlightenment below. However, these aims and objectives would enable the researcher to have a vital, evident, and extensive understanding about the social networking and its impact on businesses in UK. To determine the diverse and different types of social networking aspects To classify the trends and occurrence of the natural disasters To identify the impact (both negative and positive) of social networking on business, particularly the UK business sector To categorize and discover the arenas (such as marketing, employment, Corporate Social Responsibility and many more) on which the social networking abscond an impact on business in UK In order to compose a comprehensive and systematic analysis, the hypothesis statement is imperative that would help the researcher to accomplish the above-mentioned goals. In this regard, the research statement has come under design, which articulates, "How social networking has had an impact on businesses in the UK?" Literature Review Social networking is one of the arenas that lay key emphasis on fabricating the social associations amongst people who share similar interests, backgrounds and intend to develop own societies (Muniz and Schau, 2007, pp. 186-202). Besides, the social networking provides a choice of selection for the people to share their thoughts, events, activities, and interests within a particular developed network. Facebook, Twitter, Ask-a-peer, LinkedIn, Skyrock, Tagged, and numerous others are some of the popular and widely used social networking sites in the European region (Liebowitz, 2007, pp. 11-15). With the increased employment of the social networking, the impact that it creates on business has become a common and universal concern for the scholars and experts in various fields (Shirky, 2011, pp. 39-46). Therefore, research with respect to the impact has already come under initiation that even envelop several other aspects of impact of social networking such as privacy, social investment, youth culture, education and several others (Liebowitz, 2007, pp. 11-15). According to one of the very recent research study, it has come to notice that more than half of

Thursday, July 25, 2019

The barriers of new energy development in Beijing Essay

The barriers of new energy development in Beijing - Essay Example The findings and discussion provide evidence that personal background and attitude are strongly influenced in the willingness to buy a new energy car. Government policy and marketing investigations indicate that relevant regulations are still in an unclear developmental situation, and the marketing of new energy vehicles is still a difficult endeavour. Therefore, the relevant non-sound rules and regulations, the continued use of fossil fuel, the nearly saturated automotive and second hand vehicles market, as well as some deep-rooted personal views are the main barriers for the development of new energy vehicles in Beijing. The consumer age groups purchasing new energy cars are mainly younger people. The results also show the difference in the development of new energy vehicles between Beijing and cities of other developed countries. The main conclusions and recommendations drawn from this study are that the new energy vehicle cannot replace the motor vehicle directly; they can be onl y gradually developed because time is required for the establishment of regulations, policies and charging stations, and for people’s attitudes to change. If motor Enterprises produce a car that achieves the requirements of a reliable level of technology, security and an attractive appearance, the popularity of the car will be increased. If new energy vehicles are able to reach this level, new energy vehicles will also be fast to become popular. Acknowledgements and Declaration This dissertation would not have been possible without the help and guidance of certain people. It is a pleasure to thank those who made this dissertation possible, such as my parents who gave me spiritual encouragement and the economic support I required, and my professor, Lynn CROWE, who supervised me and enabled me to develop an understanding of the subject. I owe my deepest gratitude to Education Adviser Viv THOM, who gave me advice about structure and corrected my language errors. I would also lik e to thank a friend, Minfeng YAN, who introduced two important people to me, one is Teng LI, the consultant of the Audi 4S store, and Feng ZHANG, a salesperson of the Toyota 4S store. I must make a special reference to Minfeng YAN, because without his help I could not have gotten such relevant information. I am thankful to respondents and friends in the support and cooperation of the surveys and interviews. Lastly, I offer my regards and blessings to all of those who supported me in any respect during the completion of the project. It is declared that this Research Report is entirely the product of my own work. 1.1 Overview The questionnaire sample sizes were 65 and 78 for face-to-face and online survey respectively. To ensure the accuracy of the answers, each face-to-face survey was completed by different people and the online survey could only be filled in once for one IP. In order to understand the condition of the auto vehicles market in a short period, the interpretive intervie ws selected consultants and salespeople from different mainstream 4S stores, where one consultant came from an Audi 4S store, another one came from a Toyota 4S store, and the last one from BYD. 1.2 Personal background The age distribution in the face-to-face survey demonstrates that there is no age limitation. 60% of total respondents were aged from 19 to 30, while 32.3% of them were aged between 31 and 50 years old. In contrast, most of respondents of the online survey (92.3%)

Pierson and the Secret Service Scandal Essay Example | Topics and Well Written Essays - 500 words

Pierson and the Secret Service Scandal - Essay Example During this entire incident neither the President, nor his family were inside the White House. However, this act was viewed as a significant attempt to trick the security of the President and shed light on work of Ms. Pierson, who was responsible to look after the President’s security detail at all times. Another event which turned out to be a final blow to Julia Pierson’s Position came in the face of an incident where in Atlanta an armed guard was using the same elevator as President Barrack Obama. Interestingly enough, the guard was not authorized to be near the President, and this could have possibly led to disastrous consequences (Plate and Sterman, 2014). I personally believe that Ms. Julia Pierson’s case could have been handled in a much different manner as compared to the way it was currently resolved. What needs to be understood is that Ms. Julia, like all civil servants, has served at various key positions and undergone rigorous training prior to being appointed to lead the President’s Security Detail. Anyone can have a bad day at work, and making a judgment on someone based on a couple of events is essentially not the right thing to do. I believe Ms. Julia should have been first asked to explain if she has been undergoing any issues which are keeping her attention from her work. Accordingly, she should have been counseled. If the interaction determined that Ms. Julia needs a break from work, then she could have been sent for vacations to cool her mind and later on join in with a fresh attitude. Asking her to resign like in this case is no resolution. It is totally unjust and ruthless to end a person’s service straight away without giving them any chance. What could have been rather more appropriate, would be to not make Ms. Julia resign from her position, but rather to move her to another office and assign her with another responsibility instead of simply sabotaging her

Wednesday, July 24, 2019

Summary Essay Example | Topics and Well Written Essays - 1500 words - 2

Summary - Essay Example Researchers are also developing a washing machine that is connected to the internet to reduce dependency on energy and increase efficiency. This article explains the development of Chain Home, the first radar defence system ever created in the world. Robert Watson-Watt, a Scottish physicist, led the team that manufactured the Chain Home. The new BBC film ‘Castles in the Sky’ elaborates the drama that accompanied the manufacturing of this defence system. Scientific drama entailed manufacturing a fully functioning system at the least cost and in the shortest time while political drama entailed the dilemma of appeasement or re-armament policies. The film also shows the secrecy and the enormous costs that accompanied the development of the system. The radar system was important in Britain’s quest to keep Luftwaffe at check but its development continues to date. Clark and Johnston emphasize on the importance of a disposable society. A disposable society is a society that uses disposable items that can decompose. Clark and Johnston discourage the use of plastic bags citing their negative environmental effect. This article encourages the use of disposable items instead of plastic materials. Disposable materials are cost-effective to manufacture especially when recycled and environmentally friendly. In addition, this article supports the use of sustainable building materials. It examines the benefits of using grown materials over using artificial materials. The Firth of Forth, the Pont de Normandie and the Angel of the North are among the most iconic structures in the world because of their unique design. These structures embody creativity and innovation. The Forth Bridge took six years to build from 1882 to 1889. It contains a cantilever design balanced on its three towers. These towers support and hold the trains and link bridge between the two main sections. The Forth Bridge is the second largest

Tuesday, July 23, 2019

International Financial Management Essay Example | Topics and Well Written Essays - 2500 words - 2

International Financial Management - Essay Example Companies engage in foreign direct investment due to various reasons, but mainly to generate profit and secondly to hedge risk. Sometimes the companies would have huge cash surplus and fear that due to unfavourable movement in the exchange rate the dollar value of the cash surplus would decrease (Bajaj, 2001). The companies would park their extra cash in various foreign countries in the form of foreign direct investment. Generally the FDI are long term in nature but a company looking for quick gain can resort to short term borrowing. The research endeavours to create an international financial management report on FDI for Infosys. Infosys, a software giant in India is contemplating to conduct a FDI in another international country. The target firm chosen is Apple and the target market chosen is USA. The choice of the target market and the choice of the target company bear special significance (Bonaccorsi and Daraio, 2009). Apple has a myriad of products and service starting from elec tronic gadgets to the creation of operating systems. Apple has experienced one of the highest rises in the price of shares and apart from that the company is in an excellent growth trajectory. Infosys wants to cash in from the excellent growth opportunity of Apply by investing directly in it its path breaking technologies. Apart from this USA has a strong track record of FDI. These are two motivating factors behind the choice of Apple and America for FDI. Infosys wishes to follow a joint venture Greenfield with Apple. The joint venture Greenfield will help to create new products in USA. 2. Literature review The factors affecting the global flow of foreign direct investment in USA or as a matter of fact any country is many and varied. Although in the present context, only 4 important factors are considered which are transportations costs, market imperfections, strategic behaviour, product life cycle and location specific advantage. 2.1 Transportations Costs The diagram given below is an indication of the transportation cost at present in USA. The cost of transportation is shown as cumulative of the average costs incurred by travelling both by air and road. The cost of transportation is major issues but only for those products which have a low value to weight ratio. In the present case the value to weight ratio is assumed to be very high (Clark and Mathur, 2013). This is because of the reason that the target products (electronic gadgets) are negligible in terms of weights. So the cost of transportation will not pose as a serious threat. Fig 1: Transportation cost over the last 10 years Source: (Mintzberg and Waters, 2011) 2.2 Market imperfections Over the last 50 years almost 56% of the foreign companies that took part in the FDI considered market imperfections to be the single most important factor. Whenever there are impediments in both exporting and sale of know-how through licensing then FDI takes place. Barriers to export include quotas, complete bans, tari ffs and other restrictions that hinder the free flow of product between two nations. Most of the foreign countries in the world do not share a mutual bilateral trade between themselves that facilitates the flow of goods and services (Das, Quelch and Swartz, 2000). During 2000 to 2012 phases some of the emerging nations resorted to FDI with USA since international groups like NATO ordered restrictions on establishing trade relations with different countries. Thus these countries like China, Japan, Korea,

Monday, July 22, 2019

Porter Diamond Essay Example for Free

Porter Diamond Essay Michael Porter put forth a theory in 1990 to explain why some countries are leaders in the production of certain products. His work incorporates certain elements of previous international trade theories but also makes some important new discoveries. He identifies four elements present to varying degrees in every nation that form the basis of national competitiveness. Analyze the current situation of Japan using the four elements of Porter’s national competitive advantage theory. Suggested Answers: 1. Factor conditions Japan possesses relatively weak basic factors but good advanced factors, e. g. availability of high quality scientist and engineers; and advanced rail road and telecommunication infrastructure. 2. Demand conditions High degree of buyer sophistication Strong preference for new product and high demand for quality products and services 3. Related and supporting industries Clusters in manufacturing sector are sustained by abundant and high quality supporting industries. For example, the automobile parts cluster in Ota City and the industrial supply base for construction machinery in Komatsu City. 4. Firm strategy and rivalry Good cooperation in labor-employer relations. Japan has traditionally lifetime employment, which helps to build good relationship between  management and employees High intensity of local competition. There are large number of companies in both manufacturing and service sectors, e.g. car manufacturers and IT software companies CGE25101 Globalization and Business Tutorial 12 Discussion Question: The Porter’s Diamond Michael Porter put forth a theory in 1990 to explain why some countries are leaders in the production of certain products. His work incorporates certain elements of previous international trade theories but also makes some important new discoveries. He identifies four elements present to varying degrees in every nation that form the basis of national competitiveness. Analyze the current situation of Japan using the four elements of Porter’s national competitive advantage theory. Suggested Answers: 5. Factor conditions Japan possesses relatively weak basic factors but good advanced factors, e.g. availability of high quality scientist and engineers; and advanced rail road and telecommunication infrastructure. 6. Demand conditions High degree of buyer sophistication Strong preference for new product and high demand for quality products and services 7. Related and supporting industries Clusters in manufacturing sector are sustained by abundant and high quality  supporting industries. For example, the automobile parts cluster in Ota City and the industrial supply base for construction machinery in Komatsu City. 8. Firm strategy and rivalry Good cooperation in labor-employer relations. Japan has traditionally lifetime employment, which helps to build good relationship between management and employees High intensity of local competition. There are large number of companies in both manufacturing and service sectors, e.g. car manufacturers and IT software companies CGE25101 Globalization and Business Tutorial 12 Discussion Question: The Porter’s Diamond Michael Porter put forth a theory in 1990 to explain why some countries are leaders in the production of certain products. His work incorporates certain elements of previous international trade theories but also makes some important new discoveries. He identifies four elements present to varying degrees in every nation that form the basis of national competitiveness. Analyze the current situation of Japan using the four elements of Porter’s national competitive advantage theory. Suggested Answers: 9. Factor conditions Japan possesses relatively weak basic factors but good advanced factors, e.g. availability of high quality scientist and engineers; and advanced rail road and telecommunication infrastructure. 10. Demand conditions High degree of buyer sophistication Strong preference for new product and high demand for quality products and services 11. Related and supporting industries Clusters in manufacturing sector are sustained by abundant and high quality supporting industries. For example, the automobile parts cluster in Ota City and the industrial supply base for construction machinery in Komatsu City. 12. Firm strategy and rivalry Good cooperation in labor-employer relations. Japan has traditionally lifetime employment, which helps to build good relationship between management and employees High intensity of local competition. There are large number of companies in both manufacturing and service sectors, e.g. car manufacturers and IT software companies CGE25101 Globalization and Business Tutorial 12 Discussion Question: The Porter’s Diamond Michael Porter put forth a theory in 1990 to explain why some countries are leaders in the production of certain products. His work incorporates certain elements of previous international trade theories but also makes some important new discoveries. He identifies four elements present to varying degrees in every nation that form the basis of national competitiveness. Analyze the current situation of Japan using the four elements of Porter’s national competitive advantage theory. Suggested Answers: 13. Factor conditions Japan possesses relatively weak basic factors but good advanced factors, e.g. availability of high quality scientist and engineers; and advanced rail road and telecommunication infrastructure. 14. Demand conditions High degree of buyer sophistication Strong preference for new product and high demand for quality products and services 15. Related and supporting industries Clusters in manufacturing sector are sustained by abundant and high quality supporting industries. For example, the automobile parts cluster in Ota City and the industrial supply base for construction machinery in Komatsu City. 16. Firm strategy and rivalry Good cooperation in labor-employer relations. Japan has traditionally lifetime employment, which helps to build good relationship between management and employees High intensity of local competition. There are large number of companies in both manufacturing and service sectors, e.g. car manufacturers and IT software companies CGE25101 Globalization and Business Tutorial 12 Discussion Question: The Porter’s Diamond Michael Porter put forth a theory in 1990 to explain why some countries are  leaders in the production of certain products. His work incorporates certain elements of previous international trade theories but also makes some important new discoveries. He identifies four elements present to varying degrees in every nation that form the basis of national competitiveness. Analyze the current situation of Japan using the four elements of Porter’s national competitive advantage theory. Suggested Answers: 17. Factor conditions Japan possesses relatively weak basic factors but good advanced factors, e.g. availability of high quality scientist and engineers; and advanced rail road and telecommunication infrastructure. 18. Demand conditions High degree of buyer sophistication Strong preference for new product and high demand for quality products and services 19. Related and supporting industries Clusters in manufacturing sector are sustained by abundant and high quality supporting industries. For example, the automobile parts cluster in Ota City and the industrial supply base for construction machinery in Komatsu City. 20. Firm strategy and rivalry Good cooperation in labor-employer relations. Japan has traditionally lifetime employment, which helps to build good relationship between management and employees High intensity of local competition. There are large number of companies in both manufacturing and service sectors, e.g. car manufacturers and IT software companies CGE25101 Globalization and Business Tutorial 12 Discussion Question: The Porter’s Diamond Michael Porter put forth a theory in 1990 to explain why some countries are leaders in the production of certain products. His work incorporates certain elements of previous international trade theories but also makes some important new discoveries. He identifies four elements present to varying degrees in every nation that form the basis of national competitiveness. Analyze the current situation of Japan using the four elements of Porter’s national competitive advantage theory. Suggested Answers: 21. Factor conditions Japan possesses relatively weak basic factors but good advanced factors, e.g. availability of high quality scientist and engineers; and advanced rail road and telecommunication infrastructure. 22. Demand conditions High degree of buyer sophistication Strong preference for new product and high demand for quality products and services 23. Related and supporting industries Clusters in manufacturing sector are sustained by abundant and high quality supporting industries. For example, the automobile parts cluster in Ota City and the industrial supply base for construction machinery in Komatsu City. 24. Firm strategy and rivalry Good cooperation in labor-employer relations. Japan has traditionally lifetime employment, which helps to build good relationship between management and employees High intensity of local competition. There are large number of companies in both manufacturing and service sectors, e.g. car manufacturers and IT software companies CGE25101 Globalization and Business Tutorial 12 Discussion Question: The Porter’s Diamond Michael Porter put forth a theory in 1990 to explain why some countries are leaders in the production of certain products. His work incorporates certain elements of previous international trade theories but also makes some important new discoveries. He identifies four elements present to varying degrees in every nation that form the basis of national competitiveness. Analyze the current situation of Japan using the four elements of Porter’s national competitive advantage theory. Suggested Answers: 25. Factor conditions Japan possesses relatively weak basic factors but good advanced factors, e.g. availability of high quality scientist and engineers; and advanced rail road and telecommunication infrastructure. 26. Demand conditions High degree of buyer sophistication Strong preference for new product and high demand for quality products and services 27. Related and supporting industries Clusters in manufacturing sector are sustained by abundant and high quality supporting industries. For example, the automobile parts cluster in Ota City and the industrial supply base for construction machinery in Komatsu City. 28. Firm strategy and rivalry Good cooperation in labor-employer relations. Japan has traditionally lifetime employment, which helps to build good relationship between management and employees High intensity of local competition. There are large number of companies in both manufacturing and service sectors, e.g. car manufacturers and IT software companies

Sunday, July 21, 2019

No Country For Old Men By Cormac Mccarthy English Literature Essay

No Country For Old Men By Cormac Mccarthy English Literature Essay The novel No Country for Old Men by Cormac McCarthy uses symbolism and the world of the characters to support one of its many themes of the novel. Not only that, but through symbolism, McCarthy reveals the character traits and motives of each of the characters, mainly Moss and Chigurh. The journey of Llewellyn Moss and his attempts to escape the psychotic killer Chigurh symbolizes the fact that you must keep on going to escape the ever changing world. The actions of Chigurh also tell the readers that amongst our sweet, beautiful world, there is so much evil, greed, and death lurking and no matter how hard people try, there is no escape. Through the developments of characters as they are in the novel, and with the help of many symbols, McCarthy effectively conveys the message of No Country for Old Men. The title of the novel itself signifies one of the themes very well which is that one must keep running because if the ever changing world catches up to you, it will devour them. The quote survival of the fittest as said by Charles Darwin applies to this real well. For example, an example straight from the story is how Moss finds the suitcase with two million dollars in it, and is on the run thereafter, from the psychotic killer Chigurh. Where ever he goes, Chigurh gets there and finds him. This is an example of how the world is always changing and if even for a second, a person thinks they are not going to be a victim of it they are wrong. As the story progresses, Chigurh finally catches up with Moss and kills him. This tells the readers that as soon as you think you have won against the world, it will get you really hard. This theme also relates to the title of the story really well in the sense that it says that this is no country for old mean. How this relates is when people get old, they cannot stay up with the race against the world, and one day, the world overtakes them, and they meet their end. It may be the authors take on how life and death works. Another prominent character in the story, Sheriff Ed Tom Bell who is out to hunt for Chigurh plays a great role in signifying the theme mentioned in the above paragraph. Like Moss is on the run from Chigurh, Chigurh is on the run from Sheriff whether he knows it or not. This proves that it does not matter who you are and what you may do, the cycle of life, and the moving world applies to you too. How this applies to the Sheriff himself is really clear in the novel. Throughout the novel, he talks about how he is getting old and he wants to retire through big passages at the beginning of each chapter. He makes remarks about how the world has been changing so quickly, and becoming into a dark, scary place. He mentions that law enforcement work is more dangerous now than what it used to be and this is referring to the world of law enforcement, which is his world because he has been a sheriff since a really young age (McCarthy, 38). So what he is trying to say is that the world is a much more worse place not than before, which also points to the changing of it (the world), and it has changed for the worse. A point to be noted is the fact that he mentions how he is getting old and wants to retire. This goes back to the title of the novel itself. No country for old men. One more example of the prominence of the above theme is when Moss is on the run from Chigurh and is having dinner. He says three weeks ago I was a law abiding citizen. Workin nine to five jobs. Eight to four, anyways. Things happen to you they happen. They dont ask first. They dont require your permission (McCarthy 220). This quote is one of the single biggest proofs of the theme of a changing world in the book. This tells us how our choice, and decisions we make effects our life whether we know it or not, and we cannot do anything about it. Clearly, when Moss was making a choice of taking the money, he did not consider this. This tells the readers that whatever you do in the world will have its consequences and some you can avoid, and others you cannot but to do so, you must keep moving otherwise you will be caught and served justice. Along with that, another prominent theme of the novel is that there is nothing anyone can do about the evil side of human nature. This includes greed, violence, and cold hearted killing. Let us start off by talking about the protagonist, Llewellyn Moss. The actions of this man started off the whole chain of events, leading to numerous deaths. When Moss saw the drug deal gone wrong, instead of helping one of the wounded survivors out, he walks away, takes the 2 million dollars, and goes home. This triggers another event. Anton Chigurh sets out to find him, and wherever he goes, he leaves a trail of blood. When the Sheriff tells him he will help, he refuses and digs his grave even deeper. All of this is a result of the greed for money. Another example is that of Anton Chigurh the main antagonist. When Chigurh gets into a gun fight, he sees the lights receding. Watching his own image degrades in that squandered world (McCarthy, 122). This symbolizes the squandered world, being degraded to the point where people can kill very easily, and watch others die just as easily thereafter. The last quote mentioned also shows the contrast between the character of Moss and Chigurh. On one hand, there is Moss, who cannot kill Chigurh, even though he was right in front of him, knowing the fact that he is trying to kill him, no holds barred. On the other hand, there is Chigurh, who enjoys every single moment of killing people. Although what Moss did triggered so many murderous events, his actions throughout the book and lead us to say that he is not a bad person, though he may have made a few mistakes in his life. Going back to the beginning of the novel, when Moss finds the money case, and there is a man dying and asking for water. At that time, he does not have it so he goes back to get it and while coming so, says Im fixin to go do something dumbhern hell but Im going anyways (McCarthy, 24). He knows that going there is risky, but as a good person, he risks his life just to go and give a dying man some water and this is a really good sign of how great of a heart Moss possesses. Another example is later on when he is on the run. He says Three weeks ago I was a law abiding citizen. Workin nine to five jobs. Eight to four, anyways. Things happen to you they happen. They dont ask first. They dont require your permission(McCarthy, 220). He tells this to a girl who he is having dinner with. This shows his cha racter as a caring and nurturing one because he does not want the girl to make the mistakes he has made. This goes to show that no one on this planet is flawless. The actions of Anton Chigurh, from the start build his character as an evil, blood thirsty, and devilish person who will do anything to attain personal benefits. In the beginning of the story, Chigurh escapes from the clutches of a local Sheriff, and he place[s] his hand on the mans head like a faith healer [à ¢Ã¢â€š ¬Ã‚ ¦] The man slid soundlessly to the ground, a round hole in his forehead from which blood bubbles [à ¢Ã¢â€š ¬Ã‚ ¦] (McCarthy, 7). This quote, not only reveals Chigurhs character, but the fact that it is at the very beginning of the book, reveals the theme of violence, murder and violence throughout the story, and readers can very easily notice them. When Chigurh [à ¢Ã¢â€š ¬Ã‚ ¦] place[s] his hand on the mans head like a faith healer [à ¢Ã¢â€š ¬Ã‚ ¦], it reveals to the readers that Chigurh, despite being on a murderous rage, believes he had god given powers. Later in the novel, he weigh[s] things in his hand like a medium (McCarthy, 204) and this action of his is quite interesting because it paints divine light on the bloody character of Chigurh. Despite all the useless bloodshed caused by this fellow, he is portrayed as a greater being. Taking reference from Hindu philosophies, we can prove this to be correct. In Hinduism, a good person is the one who does his deed (karma) and bad people are the ones who slack away from it. Because of the fact that Chigurh is a killer, and he is killing people really well, McCarthy may have taken into account this philosophy, and painted Chigurh as an almost divine and great figure. By putting together all the different aspects of formalist approaches, we know that Cormac McCarthy is sending the readers of his novel, No Country for Old Men a deeper message than just the words. McCarthy wants to tell the readers that no matter what happens in life, you must keep moving forward, and never give up. This message can be taken by the readers no matter where they go in life and no matter how big of a person they become. Work Cited List No Country for Old Men Forums From Book to Film MovieWeb.com. (n.d.).  Movie Trailers, New Movies, Movie News, 2013 Movies, DVDs MovieWeb.com. Retrieved March 18, 2013, from http://www.movieweb.com/movie/no-country-for-old-men/FT252CRAcxjO56 McCarthy, C. (2005).  No country for old men. New York: Knopf. McCarthy, Cormac. No Country for Old Men Cormac McCarthy Study Guide, Lesson Plan more eNotes.com.  Study Guides, Lesson Plans, Homework Help, Answers More eNotes.com. N.p., n.d. Web. 18 Mar. 2013. .

Symmetric Encryption Schemes

Symmetric Encryption Schemes 2.1 Symmetric Encryption Schemes: With symmetric-key encryption, the encryption key can be calculated from the decryption key and vice versa. With most symmetric algorithms, the same key is used for both encryption and decryption, as shown in Figure 1.1. Implementations of symmetric-key encryption can be highly efficient, so that users do not experience any significant time delay as a result of the encryption and decryption. Symmetric-key encryption also provides a degree of authentication, since information encrypted with one symmetric key cannot be decrypted with any other symmetric key. Thus, as long as the symmetric key is kept secret by the two parties using it to encrypt communications, each party can be sure that it is communicating with the other as long as the decrypted messages continue to make sense. Encryption functions normally take a fixed-size input to a fixed-size output, so encryption of longer units of data must be done in one of two ways: either a block is encrypted at a time and the blocks are somehow joined together to make the cipher text, or a longer key is generated from a shorter one and XORd against the plaintext to make the cipher text. Schemes of the former type are called block ciphers, and schemes of the latter type are called stream ciphers. 2.1.1 Block ciphers Block ciphers take as input the key and a block, often the same size as the key. Further, the first block is often augmented by a block called the initialization vector, which can add some randomness to the encryption. 2.1.1.1 DES Algorithm: The most widely used encryption scheme is based on Data Encryption Standard (DES). There are two inputs to the encryption function, the plain text to be encrypted and the key. The plain text must be 64 bits in length and key is of 56 bits. First, the 64 bits of plain text passes through an initial permutation that rearranges the bits. This is fallowed by 16 rounds of same function, which involves permutation substitution functions. After 16 rounds of operation, the pre output is swapped at 32 bits position which is passed through final permutation to get 64 bit cipher text. Initially the key is passed through a permutation function. Then for each of the 16 rounds, a sub key is generated by a combination of left circular shift and permutation. At each round of operation, the plain text is divided to two 32 bit halves, and the fallowing operations are executed on 32 bit right halve of plain text. First it is expanded to 48 bits using a expansion table, then X-ORed with key, then processed in substitution tables to generate 32 bit output. This output is permuted using predefined table and XORed with left 32 bit plain text to form right 32 bit pre cipher text of first round. The right 32 bit plain text will form left 32 bit pre cipher text of first round. Decryption uses the same algorithm as encryption, expect that the application of sub keys is reversed. A desirable property of any encryption algorithm is that a small change in either plain text or the key should produce a significant change in the cipher text. This effect is known as Avalanche effect which is very strong in DES algorithm. Since DES is a 56 bit key encryption algorithm, if we proceed by brute force attack, the number of keys that are required to break the algorithm is 2 56 . But by differential crypto analysis, it has been proved that the key can be broken in 2 47 combinations of known plain texts. By linear crypto analysis it has been proved that, it could be broken by 2 41 combinations of plain text. The DES algorithm is a basic building block for providing data security. To apply DES in a variety of applications, four modes of operations have been defined. These four models are intended to cover all possible applications of encryption for which DES could be used. They involve using a initialization vector being used along with key to provided different cipher text blocks. 2.1.1.1.1 Electronic Code Book (ECB) mode: ECB mode divides the plaintext into blocks m1, m2, , mn, and computes the cipher text ci = Ei(mi). This mode is vulnerable to many attacks and is not recommended for use in any protocols. Chief among its defects is its vulnerability to splicing attacks, in which encrypted blocks from one message are replaced with encrypted blocks from another. 2.1.1.1.2 Cipher Block Chaining (CBC) mode: CBC mode remedies some of the problems of ECB mode by using an initialization vector and chaining the input of one encryption into the next. CBC mode starts with an initialization vector iv and XORs a value with the plaintext that is the input to each encryption. So, c1 = Ek(iv XOR m1) and ci = Ek(ci-1 XOR mi). If a unique iv is used, then no splicing attacks can be performed, since each block depends on all previous blocks along with the initialization vector. The iv is a good example of a nonce that needs to satisfy Uniqueness but not Unpredictability. 2.1.1.1.3 Cipher Feed-Back (CFB) mode: CFB mode moves the XOR of CBC mode to the output of the encryption. In other words, the cipher text c1 = p1 XOR Sj(E(IV)). This mode then suffers from failures of Non-Malleability, at least locally to every block, but changes to ciphertext do not propagate very far, since each block of ciphertext is used independently to XOR against a given block to get the plaintext. These failures can be seen in the following example, in which a message m = m1 m2 mn is divided into n blocks, and encrypted with an iv under CFB mode to c1 c2 cn. Suppose an adversary substitutes c2 for c2. Then, in decryption, m1 = Ek(iv) XOR c1, which is correct, but m2 = Ek(c1) XOR c2, which means that m2 = m2 XOR c2 XOR c2, since m2 = Ek(c1) XOR c2. Thus, in m2, the adversary can flip any bits of its choice. Then m3 = Ek(c2) XOR c3, which should lead to random looking message not under the adversarys control, since the encryption of c2 should look random. But m4 = Ek(c3) XOR c4 and thereafter the decryption is correct. 2.1.1.1.4 Output Feed-Back (OFB) mode OFB mode modifies CFB mode to feed back the output of the encryption function to the encryption function without XOR-ing the cipher text. 2.1.1.2 Triple DES: Given the potential vulnerability of DES to brute force attack, a new mechanism is adopted which uses multiple encryptions with DES and multiple keys. The simplest form of multiple encryptions has two encryption stages and two keys. The limitation with this mechanism is it is susceptible to meet in the middle attack. An obvious counter to meet in the middle attack and reducing the cost of increasing the key length, a triple encryption method is used, which considers only two keys with encryption with the first key, decryption with the second key and fallowed by encryption with the first key. Triple DES is a relatively popular alternative to DES and has been adopted for use in key management standards. 2.1.1.3 Homomorphic DES: A variant of DES called a homophonic DES [7] is considered. The DES algorithm is strengthened by adding some random bits into the plaintext, which are placed in particular positions to maximize diffusion, and to resist differential attack. Differential attack makes use of the exclusive-or homophonic DES. In this new scheme, some random estimated bits are added to the plaintext. This increases the certain plaintext difference with respect to the cipher text. A homophonic DES is a variant of DES that map search plaintext to one of many cipher texts (for a given key). In homophonic DES a desired difference pattern with the cipher text will be suggested with some key values including the correct one, oppositely wrong pairs of cipher text. For a difference pattern which 56-bit plaintext to a 64-bit cipher text using a 56-bit key. In this scheme, eight random bits are placed in specific positions of the 64-bit input data block to maximize diffusion. For example, the random bits in HDESS are the bit- positions 25, 27, 29, 31, 57, 59, 61 and 63. In this algorithm, after the initial permutation and expansion permutation in the first round, these eight random bits will spread to bits 2, 6, 8, 12, 14, 18, 20, 24, 26, 30, 32, 36, 38,42,44,48 of the 48-bit input block to the S-boxes and will affect the output of all the S-boxes. The 48 expanded bits must be exclusive-or’d with some key before proceeding to the S-boxes, thus two input bits into the S-boxes derived from the same random bit may have different values. This says that the random bits do not regularize the input to the S-boxes, that is, the property of confusion does not reduce while we try to maximize diffusion. The decryption of the homophonic DES is similar to the decryption of DES. The only difference is that eight random bits must be removed to get the original plaintext (56 bits). A homophonic DES can easily be transformed into a triple-encryption version by concatenating a DES decryption and a DES encryption after the homophonic DES. Security analysis: Thus there is a probability of 1/256 between a pair of texts. The differential crypto analysis is also difficult on this mechanism. The diffusion of bits is also more in this mode. Thus this mechanism provides some probabilistic features to DES algorithm which makes it stronger from differential and linear crypto analysis. 2.1.1.4 AES: The Advanced Encryption Standard (AES) was chosen in 2001. AES is also an iterated block cipher, with 10, 12, or 14 rounds for key sizes 128, 192, and 256 bits, respectively. AES provides high performance symmetric key encryption and decryption. 2.1.1.5 Dynamic substitution: An apparently new cryptographic mechanism [34] which can be described as dynamic substitution is discussed in the fallowing topic. Although structurally similar to simple substitution, dynamic substitution has a second data input which acts to re-arrange the contents of the substitution table. The mechanism combines two data sources into a complex result; under appropriate conditions, a related inverse mechanism can then extract one of the data sources from the result. A dynamic substitution combiner can directly replace the exclusive-OR combiner used in Vernam stream ciphers. The various techniques used in Vernam ciphers can also be applied to dynamic substitution; any cryptographic advantage is thus due to the additional strength of the new combiner. 2.1.1.5.1 The Vernam Cipher: A Vernam cipher maps plaintext data with a pseudo-random sequence to generate cipher text. Since each ciphertext element from a Vernam combiner is the (mod 2) sum of two unknown values, the plaintext data is supposed to be safe. But this mode is susceptive to several cryptanalytic attacks, including known plain text and cipher text attacks. And if the confusion sequence can be penetrated and reproduced, the cipher is broken. Similarly, if the same confusion sequence is ever re-used, and the overlap identified, it becomes simple to break that section of the cipher. 2.1.1.5.2 Cryptographic Combiners: An alternate approach to the design of a secure stream cipher is to seek combining functions which can resist attack; such functions would act to hide the pseudo-random sequence from analysis. The mechanism of this work is a new combining function which extends the weak classical concept of simple substitution into a stronger form suitable for computer cryptography. 2.1.1.5.3 Substitution Ciphers: In simple substitution ciphers each plain text character is replaced with fixed cipher text character. But this mechanism is weak from statistical analysis methods where by considering the rules of the language, the cipher can be broken. This work is concerned with the cryptographic strengthening of the fundamental substitution operation through dynamic changes to a substitution table. The substitution table can be represented as a function of not only input data but also a random sequence. This combination gives a cryptographic combining function; such a function may be used to combine plaintext data with a pseudo-random sequence to generate enciphered data. 2.1.1.5.4 Dynamic Substitution: A simple substitution table supported with combining function gives the idea of dynamic substitution. A substitution table is used to translate each data value into an enciphered value. But after each substitution, the table is re-ordered. At a minimum, it makes sense to exchange the just-used substitution value with some entry in the table selected at random. This generally changes the just-used substitution value to help prevent analysis, and yet retains the existence of an inverse, so that the cipher can be deciphered. 2.1.1.5.5 Black Box Analysis: Dynamic substitution may be considered to be a black box, with two input ports Data In and Random In, and one output port Combiner Out. In the simple version, each data path has similar width; evidently the mechanism inside the box in some way combines the two input streams to produce the output stream. It seems reasonable to analyze the output statistically, for various input streams. 2.1.1.5.6 Polyalphabetic Dynamic Substitution: A means to defend to known-plaintext and chosen-plaintext attacks would be to use multiple different dynamic substitution maps and to select between them using a hidden pseudo-random sequence. Thus the dynamic substitution if free from statistical attacks where each character of plain text is replaced with multiple characters of cipher text which makes the mechanism robust. 2.1.1.5.7 Internal State: Dynamic substitution contains internal data which after initialization is continuously re-ordered as a consequence of both incoming data streams; thus, the internal state is a function of initialization and all subsequent data and confusion values. The changing internal state of dynamic substitution provides necessary security to the data streams. Thus dynamic substitution provides a probabilistic nature to the enciphering mechanism. The limitation with this scheme is, not only different dynamic substitution tables has to be maintained but also the pseudo random sequence which selects between these dynamic substitution tables has to be shared between sender and receiver. 2.1.1.6 Nonces A nonce [29] is a bit string that satisfies Uniqueness, which means that it has not occurred before in a given run of a protocol. Nonces might also satisfy Unpredictability, which effectively requires pseudo-randomness: no adversary can predict the next nonce that will be chosen by any principal. There are several common sources of nonces like counters, time slots and so on. 2.1.1.6.1 Nonce Based Encryption: In this work a different formalization for symmetric encryption is envisaged. The encryption algorithm is made to be a deterministic function, but it is supported with initialization vector (IV). Efficiency of the user is made success of this mode. The IV is a nonce like value, used at most once within a session. Since it is used at most once having any sort of crypto analysis is practically not possible which provides sufficient security. 2.1.1.7 One-Time Pad Encryption One more encryption mechanism for providing security to data is one time pad [13] encryption. The functions are computed as follows: A and B agree on a random number k that is as long as the message they later want to send. Ek(x) = x XOR k Dk(x) = x XOR k Note that since k is chosen at random and not known to an adversary, the output of this scheme is indistinguishable to an adversary from a random number. But it suffers from several limitations. It is susceptible to chosen plain text and chosen cipher text attacks. Again the limitation is here is sharing of one time keys by the participating parties of the encryption scheme. As a new key is always used for encryption, a continuous sharing of key mechanism has to be employed by the participating parties. 2.1.2 Stream ciphers Unlike block ciphers, stream ciphers [14] (such as RC4) produce a pseudo-random sequence of bits that are then combined with the message to give an encryption. Since the combining operation is often XOR, naive implementations of these schemes can be vulnerable to the sort of bit-flipping attacks on Non-Malleability. Two types of stream ciphers exist: synchronous, in which state is kept by the encryption algorithm but is not correlated with the plaintext or cipher text, and self synchronizing, in which some information from the plaintext or cipher text is used to inform the operation of the cipher. Ronald Rivest of RSA developed the RC4 algorithm, which is a shared key stream cipher algorithm requiring a secure exchange of a shared key. The algorithm is used identically for encryption and decryption as the data stream is simply XORed with the generated key sequence. The algorithm is serial as it requires successive exchanges of state entries based on the key sequence. Hence implementations can be very computationally intensive. In the algorithm the key stream is completely independent of the plaintext used. An 8 * 8 S-Box (S0 S255), where each of the entries is a permutation of the numbers 0 to 255, and the permutation is a function of the variable length key. There are two counters i, and j, both initialized to 0 used in the algorithm. 2.1.2.1.1 Algorithm Features: 1.It uses a variable length key from 1 to 256 bytes to initialize a 256-byte state table. The state table is used for subsequent generation of pseudo-random bytes and then to generate a pseudo-random stream which is XORed with the plaintext to give the cipher text. Each element in the state table is swapped at least once. 2. The key is often limited to 40 bits, because of export restrictions but it is sometimes used as a 128 bit key. It has the capability of using keys between 1 and 2048 bits. RC4 is used in many commercial software packages such as Lotus Notes and Oracle Secure. 3. The algorithm works in two phases, key setup and ciphering. During a N-bit key setup (N being your key length), the encryption key is used to generate an encrypting variable using two arrays, state and key, and N-number of mixing operations. These mixing operations consist of swapping bytes, modulo operations, and other formulas. 2.1.2.1.2 Algorithm Strengths: The difficulty of knowing which location in the table is used to select each value in the sequence. A particular RC4 Algorithm key can be used only once and Encryption is about 10 times faster than DES. Algorithm Weakness: One in every 256 keys can be a weak key. These keys are identified by cryptanalysis that is able to find circumstances under which one of more generated bytes are strongly correlated with a few bytes of the key. Thus some symmetric encryption algorithms have been discussed in this chapter. They varies from block ciphers like DES, Triple DES, Homomorphic DES to stream ciphers like RC4. To the symmetric encryption mechanisms concepts like application of Nounce and dynamic substitution are discussed which provides randomness to the encryption mechanism. This probabilistic nature to the encryption mechanism provides sufficient strength to the algorithms against Chosen Cipher text attacks(CCA). The security with all these mechanisms lies with proper sharing of keys among the different participating parties. 2.1.3 Adoptability of some mathematical functions in Cryptography: Sign Function: [26,27] This function when applied on when applied on a matrix of values, converts all the positive values to 1, negative values to -1 zero with 0. The advantage of using this function in cryptography is it cannot be a reversible process ie we cannot get back to the original matrix by applying a reverse process. Modular Arithmetic: One more function that is widely used in cryptography is modular arithmetic of a number with a base value. It will generate the remainder of a number with respect to the base value. This function is widely used in public key cryptography. 2.2 Public-Key Encryption The most commonly used implementations of public-key [13,14] encryption are based on algorithms patented by RSA Data Security. Therefore, this section describes the RSA approach to public-key encryption. Public-key encryption (also called asymmetric encryption) involves a pair of keys a public key and a private key, used for security authentication of data. Each public key is published, and the corresponding private key is kept secret. Data encrypted with one key can be decrypted only with other key. The scheme shown in Figure 1.2 says public key is distributed and encryption being done using this key. In general, to send encrypted data, one encrypt’s the data with the receiver’s public key, and the person receiving the encrypted data decrypts it with his private key. Compared with symmetric-key encryption, public-key encryption requires more computation and is therefore not always appropriate for large amounts of data. However, a combination of symmetric Asymmetric schemes can be used in real time environment. This is the approach used by the SSL protocol. As it happens, the reverse of the scheme shown in Figure 1.2 also works: data encrypted with one’s private key can be decrypted only with his public key. This may not be an interesting way to encrypt important data, however, because it means that anyone with receiver’s public key, which is by definition published, could decipher the data. And also the important requirement with data transfer is authentication of data which is supported with Asymmetric encryption schemes, which is an important requirement for electronic commerce and other commercial applications of cryptography. 2.2.1 Key Length and Encryption Strength: In general, the strength of encryption algorithm depends on difficulty in getting the key, which in turn depends on both the cipher used and the length of the key. For the RSA cipher, the strength depends on the difficulty of factoring large numbers, which is a well-known mathematical problem.Encryption strength is often described in terms of the length of the keys used to perform the encryption, means the more the length of the key, the more the strength. Key length is measured in bits. For example, a RC4 symmetric-key cipher with key length of 128 bits supported by SSL provide significantly better cryptographic protection than 40-bit keys for use with the same cipher. It means 128-bit RC4 encryption is 3 x 1026 times stronger than 40-bit RC4 encryption. Different encryption algorithms require variable key lengths to achieve the same level of encryption strength. Other ciphers, such as those used for symmetric key encryption, can use all possible values for a key of a given length, rather than a subset of those values. Thus a 128-bit key for use with a symmetric-key encryption cipher would provide stronger encryption than a 128-bit key for use with the RSA public-key encryption cipher. This says that a symmetric encryption algorithm with a key length of 56 bits achieve a equal security to Asymmetric encryption algorithm with a key length of 512 bits, 2.2.2 RSA Key Generation Algorithm Two large prime numbers are considered. Let them be p,q. Calculate n = pq and (φ) phi = (p-1)(q-1). Select e, such that 1 Calculate d, such that ed ≠¡ 1 (mod phi). One key is (n, e) and the other key is (n, d). The values of p, q, and phi should also be kept secret. n is known as the modulus. e is known as the public key. d is known as the secret key. Encryption Sender A does the following:- Get the recipient Bs public key (n, e). Identify the plaintext message as a positive integer m. Calculate the ciphertext c = m^e mod n. Transmits the ciphertext c to receiver B. Decryption Recipient B does the following:- Consider his own private key (n, d) to compute the plain text m = c^d mod n. Convert the integer to plain text form. 2.2.3 Digital signing Sender A does the following:- This concept can also be used in digital signing as well. The message to be transmitted is converted to some message digest form. This message digest is converted to encryption form using his private key. This encrypted message digest is transmitted to receiver. Signature verification Recipient B does the following:- Using the sender’s public key, the received message digest is decrypted. From the received message, the receiver independently computes the message digest of the information that has been signed. If both message digests are identical, the signature is valid. Compared with symmetric-key encryption, public-key encryption provides authentication security to the data transmitted but requires more computation and is therefore not always appropriate for large amounts of data. 2.3. Probabilistic encryption schemes In public key encryption there is always a possibility of some information being leaked out. Because a crypto analyst can always encrypt random messages with a public key, he can get some information. Not a whole of information is to be gained here, but there are potential problems with allowing a crypto analyst to encrypt random messages with public key. Some information is leaked out every time to the crypto analyst, he encrypts a message. With probabilistic encryption algorithms [6,11], a crypto analyst can no longer encrypt random plain texts looking for correct cipher text. Since multiple cipher texts will be developed for one plain text, even if he decrypts the message to plain text, he does not know how far he had guessed the message correctly. To illustrate, assume a crypto analyst has a certain cipher text ci. Even if he guesses message correctly, when he encrypts message the result will be completely different cj. He cannot compare ci and cj and so cannot know that he has guessed the message correctly. Under this scheme, different cipher texts will be formed for one plain text. Also the cipher text will always be larger than plain text. This develops the concept of multiple cipher texts for one plain text. This concept makes crypto analysis difficult to apply on plain text and cipher text pairs. An encryption scheme consists of three algorithms: The encryption algorithm transforms plaintexts into cipher texts while the decryption algorithm converts cipher texts back into plaintexts. A third algorithm, called the key generator, creates pairs of keys: an encryption key, input to the encryption algorithm, and a related decryption key needed to decrypt. The encryption key relates encryptions to the decryption key. The key generator is considered to be a probabilistic algorithm, which prevents an adversary from simply running the key generator to get the decryption key for an intercepted message. The following concept is crucial to probabilistic cryptography: 2.3.1 Definition [Probabilistic Algorithm]: A probabilistic algorithm [11] is an algorithm with an additional command RANDOM that returns â€Å"0† or â€Å"1†, each with probability 1/2. In the literature, these random choices are often referred to as coin flips. 2.3.1.1 Chosen Cipher Text Attack: In the simplest attack model, known as Chosen Plaintext Attack (CPA) [5], the adversary has access to a machine that will perform arbitrary encryptions but will not reveal the shared key. This machine corresponds intuitively to being able to see many encryptions of many messages before trying to decrypt a new message. In this case, Semantic Security requires that it be computationally hard for any adversary to distinguish an encryption Ek(m) from Ek(m) for two arbitrarily chosen messages m and m. Distinguishing these encryptions should be hard even if the adversary can request encryptions of arbitrary messages. Note that this property cannot be satisfied if the encryption function is deterministic! In this case, the adversary can simply request an encryption of m and an encryption of m and compare them. This is a point that one should all remember when implementing systems: encrypting under a deterministic function with no randomness in the input does not provide Semantic Security. O ne more crypto analytical model is Chosen Cipher text Attack (CCA) Model. Under the CCA model, an adversary has access to an encryption and a decryption machine and must perform the same task of distinguishing encryptions of two messages of its choice. First, the adversary is allowed to interact with the encryption and decryption services and choose the pair of messages. After it has chosen the messages, however, it only has access to an encryption machine. An advancement to CCA Model is Chosen Cipher text Attack 2 (CCA2). CCA2 security has the same model as CCA security, except that the adversary retains access to the decryption machine after choosing the two messages. To keep this property from being trivially violated, we require that the adversary not be able to decrypt the cipher text it is given to analyze. To make these concepts of CCA CCA2 adoptable in real time environment, recently Canetti, Krawczyk and Nielsen defined the notion of replayable adaptive chosen ciphertext attack [5] secure encryption. Essentially a cryptosystem that is RCCA secure has full CCA2 security except for the little detail that it may be possible to modify a ciphertext into another ciphertext containing the s

Saturday, July 20, 2019

Essay --

Objective: Providing community-based mental health services is crucial and is an agreed plan between Iran Mental Health Office and Eastern Mediterranean Region. The aim of this study was to determine the effectiveness of home-visit clinical case-management services on the hospitalization rate and other clinical outcomes in patients with severe mental illness. Methods: One hundred eighty two patients were randomly allocated in to three groups ; home visit (n = 60), telephone follow-up (n = 61) and as-usual care group (n = 61).Trained nurses as clinical case-managers were provided home-visit services and the telephone follow-up tasks. Hospitalization rate as a measure of recurrence, as well as burden, knowledge, and general health condition of care givers, with positive/negative symptoms, satisfaction, quality of life and social skills of the consumers were assessed as main and secondary outcomes respectively. Results: Most clinical variables were improved in both interventional groups compared with control group. During the one year follow-up, the rate of re-hospitalization were 1.5 and 2.5 times more than home-visit group for telephone follow-up and as-usual group respectively. Conclusion: Single clinical case-managers are able to provide continuous care services for patients with severe mental illness. The telephone follow-up services also could have beneficiary outcome for the consumers, their caregivers and health system network. Key words: Case-management, Caregivers, Hospitalization, Mental illness Registered in IRCT.ir, with ID : IRCT201110261959N5 Introduction Since 1950, with the â€Å"deinstitutionalization† trend in the developed industrial nations, large size psychiatric hospitals were shut down and were subs... ...at in our social and cultural conditions, clinical case-management service is able to reduce the re-hospitalization and improve the clinical outcomes of the individuals who are suffering from severe mental illness. Also, the telephone follow-up services could have beneficiary outcome for the consumers, their caregivers and health system network. The results of current study has shown that an individual trained case manager is capable to provide effective service which is more compatible with the socio-economic condition of our society as a low middle income country. Although a few patients who needs community based cares are receiving such services by a team organized by Welfare organization ( such as general physicians, psychologist, and social worker), but it could be cost-benefit in our country in which the acute psychiatric beds are less than required. Essay -- Objective: Providing community-based mental health services is crucial and is an agreed plan between Iran Mental Health Office and Eastern Mediterranean Region. The aim of this study was to determine the effectiveness of home-visit clinical case-management services on the hospitalization rate and other clinical outcomes in patients with severe mental illness. Methods: One hundred eighty two patients were randomly allocated in to three groups ; home visit (n = 60), telephone follow-up (n = 61) and as-usual care group (n = 61).Trained nurses as clinical case-managers were provided home-visit services and the telephone follow-up tasks. Hospitalization rate as a measure of recurrence, as well as burden, knowledge, and general health condition of care givers, with positive/negative symptoms, satisfaction, quality of life and social skills of the consumers were assessed as main and secondary outcomes respectively. Results: Most clinical variables were improved in both interventional groups compared with control group. During the one year follow-up, the rate of re-hospitalization were 1.5 and 2.5 times more than home-visit group for telephone follow-up and as-usual group respectively. Conclusion: Single clinical case-managers are able to provide continuous care services for patients with severe mental illness. The telephone follow-up services also could have beneficiary outcome for the consumers, their caregivers and health system network. Key words: Case-management, Caregivers, Hospitalization, Mental illness Registered in IRCT.ir, with ID : IRCT201110261959N5 Introduction Since 1950, with the â€Å"deinstitutionalization† trend in the developed industrial nations, large size psychiatric hospitals were shut down and were subs... ...at in our social and cultural conditions, clinical case-management service is able to reduce the re-hospitalization and improve the clinical outcomes of the individuals who are suffering from severe mental illness. Also, the telephone follow-up services could have beneficiary outcome for the consumers, their caregivers and health system network. The results of current study has shown that an individual trained case manager is capable to provide effective service which is more compatible with the socio-economic condition of our society as a low middle income country. Although a few patients who needs community based cares are receiving such services by a team organized by Welfare organization ( such as general physicians, psychologist, and social worker), but it could be cost-benefit in our country in which the acute psychiatric beds are less than required.

Friday, July 19, 2019

Integrated Pest Management :: essays research papers

Integrated Pest Management Integrated pest management (IPM) is a recently developed technology for pest control that is aimed at achieving the desired control while reducing the use of pesticides. To accomplish this, various combinations of chemical, biological, and physical controls are employed. In the past, pesticides were all too often applied routinely whether needed or not. With IPM, pest populations as well as beneficial parasite and predator populations are monitored to determine whether the pests actually present a serious problem that needs to be treated. If properly and extensively employed, IPM might reduce pesticide use by as much as 50 percent, while at the same time improving pest control. If this goal were achieved, the environmental problems would be minimized, and significant benefits would result for farmers and society as a whole. IPM coordinates economically and environmentally acceptable methods of pest control with judicious and minimal use of toxic pesticides. IPM programs assess local conditions, including climate, crop characteristics, the biology of the pest species, and soil quality, to determine the best method of pest control. Tactics employed include better tillage to prevent soil erosion and introduction of beneficial insects that eat harmful species. Many pests that are attached to crop residues can be eliminated by plowing them underground. Simple paper or plastic barriers placed around fruit trees deter insects, which can also be attracted to light traps and destroyed. Weeds can be controlled by spreading grass, leaf, or black plastic mulch. Weeds also may be pulled or hoed from the soil. Many biological controls are also effective. Such insect pests as the European corn borer, and the Japanese beetle, have been controlled by introducing their predators and parasites. Wasps that prey on fruit-boring insect larvae are now being commercially bred and released in California orchards. The many hundreds of species of viruses, bacteria, protozoa, fungi, and nematodes that parasitize pest insects and weeds are now being investigated as selective control agents. Another area of biological control is breeding host plants to be pest resistant, making them less prone to attack by fungi and insects. The use of sex pheromones is an effective measure for luring and trapping insects. Pheromones have been synthesized for the Mediterranean fruit fly, the melon fly, and the Oriental

Thursday, July 18, 2019

In Search of Virtue in Honors Essays -- Aristotle Friendship Philosoph

In Search of Virtue in Honors Of the three forms of friendship discussed by Aristotle—the useful, the pleasant, and the good—the ideal seminar most resembles the perfectly good friendship between â€Å"good men who are alike in excellence or virtue† (Aristotle 1156b). A seminar, the Swarthmore website reads, unites faculty with â€Å"small groups of dedicated and accomplished students† committed to â€Å"independent learning† and â€Å"dialogue with peers, teachers, and examiners.† In light of Aristotelian and neo-Aristotelian thought on friendship, virtue and practical wisdom, this discussion will first examine how an ideal seminar promotes student virtues and then proceed to evaluate an e-mail I wrote in response to an imperfect seminar. Aristotle contends that friendship is instrumental for acquiring and maintaining moral excellence: †¦the friendship of good men is good, and it increases with their meetings. Also, it seems, they become better as they are active together and correct one another: from the mould of the other each takes the imprint of the trait he likes, whence the saying: ‘Noble things from noble people.’ (1172a) Similarly, a seminar composed of individuals with student virtues—including diligence, intelligence, curiosity, patience, and humility—can best maintain and encourage virtue. Rosemary Volbrecht’s â€Å"Mutual Apprenticeship in moral development,† Nancy Sherman’s â€Å"Making a Necessity of Virtue,† Laurence Thomas’ Living Morally and Aristotle’s Nicomachean Ethics outline the means by which friendship encourages moral virtue. An extrapolation from moral virtues to student virtues frames their discussion in the context of an honors seminar at Swarthmore. Volbrecht highlights the importance of role models in experie... ..., but I erred in the delivery. A wiser, more amenable route may have included individualized messages. The real problem, however, was imperfect information and my lack of familiarity with the nuances of my classmates’ personalities. Aristotle writes, â€Å"[e]ach man can judge competently the things he knows† (Aristotle 1095a). His counsel offers little comfort when combined with rigorous epistemological standards. If flawless practical wisdom requires perfect information, then any decision by imperfect moral agents requires a search not for truth, but for the lesser evil. In my case, I hope the damage done was not too great. Works Cited Aristotle. Ethics. Sherman, Nancy. Making a Necessity of Virtue. Thomas, Laurence. Living Morally. Volbrecht, Mary Rose. â€Å"Friendship: Mutual Apprenticeship in Moral Development.† Journal of Value Inquiry, vol. 24 (1990).

The Potential Market for Apple Ipad in the Uk

The Potential Market for Apple iPad in the UK Table of contents 1. 0Introduction3 2. 0Creative thinking3 3. 0Recommendations for successfully marketing iPad in the UK3 4. 0Conclusion4 References5 1. 0 Introduction After iSlate and iGuide, iPad as another tablet-shaped computer was launched by Apple. The various applications of the iPad are very attractive for customers, but it also has some shortcomings including high price and the same user interface as iPhone. The company prepares to set foot in the UK market. The purpose of this report is to identify how the iPad can be successfully marketed in the UK.Firstly, the main body of the report will briefly introduce creative thinking. Then, it will present the approaches for marketing iPad in the UK successfully. After that, it will make a conclusion in a few words. 2. 0 Creative thinking Creative thinking plays a significant part in constantly increasing the amounts of human knowledge, improving perceptivity of human being, as well as opening up new situation for practice. Creativity is the basis for generating innovation which is favorable to improve organizational competitiveness in the marketplace (Amabile, et al, 1996).It can be seen that creative thinking plays a significant role in the success or failure of new product or services in the market. Innovation can be driven by leadership, people management, knowledge management, and creativity management (Prajogo and Ahmed, 2006). The sources of creativity and innovation are people including customers, specialists, groups and teams, as well as individuals. Apple can be regarded as an innovative firm. Its innovation capacity comes from innovative chief executive. How to market its products creatively is very crucial for the success of product sales, which ill be discussed in the next section. 3. 0 Recommendations for successfully marketing iPad in the UK Marketing is the root for the survival and development of an organization. Over time, a large number of marke ting approaches come to the market, including relationship marketing, direct marketing, service marketing, internet marketing, international marketing and brand marketing and so on. Successful product marketing should attach much importance to many aspects such as market demand, customer preference, price, and marketing mix and etc.The following paragraphs will suggest ways how the iPad can be marketed successfully in the UK. In order to successfully marketing product or services in a new market, the first and most important thing for an organization to do is market research. In this way, the organization can better meet customer demands and preferences by analyzing market researching findings. In general, market research consists of four steps, that is, gathering the data, integrating the evidence, unraveling the insight, and telling the story (Rawlinson, 1970).It is known that iPhone has obtained remarkable success in the market. Owing to this, iPad has already employed the iPhone -style user interface (Johnson and Arthur, 2010). It is apparently that iPad is not creative in this aspect as a result of passive consumption. For successfully marketing, the company must attempt to persuade consumers to accept the uncommonness of the product. The key lies in how to promote its advantages overwhelming its advantages. As a whole, the company must explain clearly about the creation of the product so as to attract the attention of consumers.Otherwise, the marketing of the iPad will suffer from the impediment or even resistance from consumers. In the next place, marketing strategy is one of important factors to help the organization to remain invincible in the increasingly dramatic market competition. The iPad can provide numerous applications for customers but not only limited to web browsing, email and reading e-books (Johnson and Arthur, 2010). At the beginning, Apple did not make a price for iPad in the UK market. However, according to the surveys, a great many cus tomers in theUK reveal that iPad is excessively expensive (Harvey, 2010). It can be seen that cost is a key factor to determine if iPad can be successfully marketed in the UK. On one hand, the company should employ appropriately pricing strategy. Pricing strategies include skimming, market pricing and penetration pricing (Sutton-Brady and Beal, 2008). It is obviously that the UK is a new potential market for Apple. The key for the survival of the company in the new market is to stimulate market and capture market share. For this reason, penetration pricing strategy should be adopted by the company.On the other hand, the company should attempt to reduce cost as much as possible by all means. The last but not the least, promotional methods are also of great importance to the sales of products. Traditional promotional mix mainly includes the elements such as advertising, personnel selling, direct marketing, sales promotion, and public relation. Among them, advertising is an important t ool for marketing at any time. Both mature and blind consumers will be guided by the advertisement. What’s more, the returns from advertising are also impressive at short notice.In addition, public relation makes great contribution to corporate image and marketing. However, with the development of media technology, the promotional mix is taking place great changes. Moreover, the communication has already gone through four ages from interruption, entertainment, engagement to dialogue. From this aspect, it can be said that the iPad has already done a good job for media in different sectors including print and publishing, television, and advertising (Arthur, Anderson and Sweney, 2010). It has satisfied the customer demands on entertainment and engagement.According to the statistics, 70% of the content of the web will be user generated until 2010 (Daugherty, Eastin and Bright, 2008). From this, it can be seen that it is very important for an organization to interact with customer s. For this reason, customer engagement and interaction should be embodied in every link of marketing. The advertising ideas of iPad will be multiplatform rather than the â€Å"big TV campaign† mentality; furthermore, it will develop creative advertising ideas by a spectrum of consumer engagement (Arthur, Anderson and Sweney, 2010).From the perspective of public relation, traditional public relation messaging techniques may not be perceived as authentic any more. On the contrary, the company should regard user reviews and comments as the new word of mouth. Their messages will become the critical factors to improve the leadership of Apple in the UK market. 4. 0 Conclusion To sum up, marketing is extremely important for the development and expansion of an organization. The report has firstly introduced a little about creative thinking. Then, it has demonstrated how the iPad can be successfully marketed in the UK.Firstly, the company needs to conduct market research and make cor respondingly responses by market analysis. Secondly, the company is necessary to formulate appropriately pricing strategy. Thirdly, the company must focus on the interaction with customers in the age of media technology. The iPad can be marketed successfully by effective market reaction, correct pricing strategy, as well as frequent interaction with consumers. References Amabile, T. et al, (1996) Assessing the work environment for creativity, Academy of Management Journal, 39 (5): 1154-1184. Arthur, C. Anderson, K. and Sweney, M. (2010) A Good Job for Media, http://www. guardian. co. uk/media/2010/feb/01/ipad-imapact-on-media, Date accessed on June 8, 2010. Daugherty, T. , Eastin, M. S. and Bright, L. (2008) Exploring Consumer Motivations for Creating User-Generated Content, Journal of Interactive Advertising, 8(2): 1-24. Harvey, M. (2010) British Buyers will Pay More for iPad, but Critics Say Wait, http://business. timesonline. co. uk/tol/business/industry_sectors/technology/articl e7119823. ece, Date accessed on June 8, 2010. Johnson, B. and Arthur, C. 2010) Apple iPad: The Wait is over – but is it Future of Media or Oversized Phone? http://www. guardian. co. uk/technology/2010/jan/27/apple-ipad-tablet-computer-k indle, Date accessed on June 8, 2010. Prajogo, D. I. and Ahmed, P. K. (2006) Relationship between Innovation Stimulus, Innovation Capacity, and Innovation Performance, R&D Management, 36(5): 499-515. Rawlinson, J. G. (1970) Creative Thinking and Brainstorming, London: British Institute of Management. Sutton-Brady, C. and Beal, T. (2008) International Marketing, South Melbourne, Vic: Thomson Learning Australia.