Thursday, December 26, 2019

Biography of Robert Smalls Civil War Hero, Congressman

Born a slave in 1839, Robert Smalls was a sailor who escaped to freedom and changed the course of history during the Civil War. Later, he was elected to the House of Representatives, becoming one of the first African American members of Congress. Fast Facts: Robert Smalls Occupation: Sailor, U.S. CongressmanKnown For:  Became a Civil War hero by providing the Union Navy with intelligence after being enslaved aboard a Confederate ship; later, elected to the U.S. Congress.Born:  April 5, 1839 in Beaufort, South CarolinaDied:  February 23, 1915 in Beaufort, South Carolina Early Years Robert Smalls was born on April 5, 1839 in Beaufort, South Carolina. His mother, Lydia Polite, was a house slave owned by Henry McKee; although his paternity was never formally documented, it is possible that McKee was Smalls’ father. Smalls was sent to work in McKee’s fields as a child, but once he reached adolescence, McKee sent him to Charleston to work. As was commonplace at the time, McKee was paid for Smalls’ labor. At some point during his teen years, he found work on the docks in Charleston’s harbor, and he worked his way up from longshoreman to rigger, and eventually to the position of sailmaker by the time he was seventeen. He moved through various jobs until he became a sailor. Eventually, he struck a deal with his master, which enabled him to keep his earnings of approximately $15 per month. When war broke out in 1861, Smalls was working as a sailor on a ship called the Planter. Interim Archives / Getty Images Escape to Freedom Smalls was an accomplished sailor, and was extremely familiar with the waterways around Charleston. In addition to being a sailor on the Planter, he sometimes worked as the wheelman—essentially, a pilot, although he was not allowed to hold that title because of his status as a slave. A few months after the Civil War began in April 1861, he was given the task of steering the Planter, a Confederate military ship, along the coast of the Carolinas and Georgia, while Union blockades sat nearby. He worked diligently at this job for nearly a year, but at some point, he and other enslaved crew members realized they had an opportunity for escape: the Union ships in the Harbor. Smalls began to craft a plan. In May 1862, Planter docked in Charleston and loaded up several large guns, ammunition, and firewood. When the officers on the ship disembarked for the night, Smalls put on the captain’s hat, and he and the other enslaved crewmen sailed out of the harbor. They stopped along the way to pick up their families, who were waiting nearby, and then headed straight to the Union ships, with a white flag displayed in place of the Confederate banner. Smalls and his men immediately surrendered the ship and all of its cargo to the Union Navy. Interim Archives / Getty Images Thanks to his knowledge of the Confederate ships’ activities in Charleston Harbor, Smalls was able to provide the Union officers with a detailed map of fortifications and underwater mines, as well as the captain’s codebook. This, along with other intelligence he provided, soon proved Smalls to be valuable to the Northern cause, and was quickly hailed as a hero for his work. Fighting for the Union After Smalls surrendered the Planter to the Union, it was decided that he and his crew should be awarded the prize money for the ship’s capture. He was given a position with the Union Navy as the pilot of a ship called Crusader, which scoured the Carolina coast finding mines that Smalls had helped place when aboard the Planter. In addition to his work for the Navy, Smalls traveled periodically to Washington, D.C., where he met with a Methodist minister who was trying to persuade Abraham Lincoln to allow black men to join the Union Army. Eventually, Secretary of War Edwin Stanton signed an order creating a pair of black regiments, with five thousand African American men enlisting to fight in the Carolinas. Many of them had been recruited by Smalls himself. In addition to piloting Crusader, Smalls was sometimes behind the wheel of the Planter, his former ship. Over the course of the Civil War, he was involved in seventeen major engagements. Perhaps the most significant of these was when he piloted the ironclad Keokuk in the April 1863 attack on Fort Sumter, just off Charleston’s shore. The Keokuk sustained heavy damage and sank the next morning, but not before Smalls and the crew had escaped to the nearby Ironside. Later that year, Smalls was aboard the Planter near Secessionville when Confederate batteries opened fire upon the ship. Captain James Nickerson fled the wheelhouse and hid in the coal bunker, so Smalls took command of the wheel. Fearing that the black crew members would be treated as prisoners of war if captured, he refused to surrender, and instead managed to steer the ship to safety. As a result of his heroism, he was promoted to the rank of Captain by Department of the South Commander Quincy Adams Gillmore, and given the role of Acting Captain of the Planter. Political Career After the Civil War ended in 1865, Smalls returned to Beaufort and purchased the home in which his former owner had lived. His mother, who still lived in the house, resided with Smalls until she died. Over the next few years, Smalls taught himself to read and write, and founded a school for the children of former slaves. He established himself as a businessman, philanthropist, and newspaper publisher. During his life in Beaufort, Smalls became involved in local politics, and served as a delegate to the 1868 South Carolina Constitutional Convention in the hopes of making education free and mandatory for all children in the state. That same year, he was elected to the South Carolina House of Representatives, working tirelessly for civil rights. Within a few years, he was serving as a delegate to the Republican National Convention, and was soon appointed to the rank of lieutenant-colonel of the Third Regiment, South Carolina State Militia. By 1873, Smalls had his sights set on more than just state politics. He ran for office and was elected to the  United States House of Representatives, where he served as the voice of residents of South Carolinas predominantly black coastal region. Fluent in the Gullah language, Smalls was popular with his constituents, and was re-elected consistently until 1878, when he was charged with taking a bribe in the form of a printing contract. Smalls regained his political footing shortly thereafter, however. He served as a delegate once more to the 1895 South Carolina constitutional convention, where he fought against white politicians who aimed to disenfranchise his black neighbors with questionable voting laws. In 1915, at the age of 75, Smalls passed away from complications of diabetes and malaria. A statue was erected in his honor in downtown Beaufort. Sources Boley, Oklahoma (1903- ) | The Black Past: Remembered and Reclaimed, blackpast.org/aah/smalls-robert-1839-1915.Gates, Henry Louis. â€Å"Robert Smalls, from Escaped Slave to House of Representatives.†Ã‚  PBS, Public Broadcasting Service, 6 Nov. 2013, www.pbs.org/wnet/african-americans-many-rivers-to-cross/history/which-slave-sailed-himself-to-freedom/.Lineberry, Cate. â€Å"The Thrilling Tale of How Robert Smalls Seized a Confederate Ship and Sailed It to Freedom.†Ã‚  Smithsonian.com, Smithsonian Institution, 13 June 2017, www.smithsonianmag.com/history/thrilling-tale-how-robert-smalls-heroically-sailed-stolen-confederate-ship-freedom-180963689/.â€Å"Robert Smalls: Commander of the Planter During the American Civil War.†Ã‚  HistoryNet, 8 Aug. 2016, www.historynet.com/robert-smalls-commander-of-the-planter-during-the-american-civil-war.htm.

Wednesday, December 18, 2019

A Good Man Is Hard To Find by Mary Flannery O’Connor Essay

Mary Flannery O’Connor, the writer of many short stories known for their cruel endings and religious themes, wrote â€Å"A Good Man Is Hard to Find† in 1955. â€Å"Her works combine flat realism with grotesque situations; violence occurs without apparent reason or preparation.† (Roberts 429). â€Å"A Good Man Is Hard to Find† is about a southern family’s trip to Florida which takes a dramatic turn. This story was written in O’Connor’s first collection of short stories. â€Å"A Good Man Is Hard to Find† is a compelling story of tragedy that utilizes humor and irony to draw the reader’s attention, and two major characters to convey the authors central theme. Throughout the short story â€Å"A Good Man Is Hard to Find† O’Connor uses†¦show more content†¦June Star’s response was â€Å"No I certainly wouldn’t. â€Å"I wouldn’t live in a broken-down place like this for a million bu cks!† There are many more humorous descriptions in â€Å"A Good Man Is Hard to Find† these are examples of descriptions that our slightly more obvious in humor. As stated before O’Connor’s use of humor is one element that helps to enhance the story and draw the reader’s attention. After reading â€Å"A Good Man Is Hard To Findâ€Å" the irony of the story is very clear. The first sentence in this short story is â€Å"The grandmother didn’t want to go to Florida.† In fact, the grandmother goes on to try to persuade her son Bailey and is wife not to take their trip to Florida but Tennessee instead. The grandmother informs her family about the fellow, the misfit, and all the horrible things he says he has done to people. â€Å"Just you read it I wouldn’t take my children in any direction with a criminal like that a loose in it. I couldn’t answer to my conscience if I did.† Ironically, that is exactly what she does w hen she convinces her son Bailey to take the family down a deserted road to see a house with secret panels. The grandma’s sudden recollectionShow MoreRelatedMary Flannery OConnor: One of the Best Short Story Writers of Her Day684 Words   |  3 PagesOne of the best short story writers of her day, Mary Flannery O’Connor was a brilliant writer, and still is, highly acclaimed. Her unique style of writing has a large part in her continued popularity. Ann Garbett states,†Ã¢â‚¬ ¦O’Connor combined religious themes from her Roman Catholic vision with a comically realist character from the rural Protestant south to create a fiction that is simultaneously serious and comic† (1910). Mary O’Connor Flannery was an extremely talented young author who experiencedRead More Violence Leading To Redemption In Flannery OConnors Literature1482 Words   |  6 PagesViolence Leading to Redemption in Flannery OConnors Literature Flannery OConnor uses many of the same elements in almost all of her short stories. I will analyze her use of violence leading to the main character experiencing moral redemption. The use of redemption comes from the religious background of Flannery OConnor. Violence in her stories is used as a means of revelation to the main characters inner self. The literature of Flannery OConnor appears to be unbelievably harsh and violentRead More Flannery OConnor Essay1299 Words   |  6 PagesFlannery OConnor Flannery O’Connor and the Relationship Between Two of Her Stories Flannery O’Connor was born Mary Flannery O’Connor on March 25, 1925 in Savannah, Georgia, as the only child to Edward F. O’Connor, Jr., and Regina (Cline) O’Connor. Later in 1941, Flannery O’Connor’s father dies of lupus while O’Connor is in Milledgeville, Ga. After her father’s death, O’Connor rarely speaks of him and continues to be active in school projects such as drawing, reading, writingRead MoreFlannery O Connor Is Considered One Of The Most Successful Writer979 Words   |  4 PagesMary Flannery O’Connor is considered one of the most successful short story writers in history. She composed her works during a period of prosperity and economic boom following World War II. Although the economy was thriving, the 1950’s were a period of struggle for women’s rights, as well as other minorities. (Digital History) Based on her success, one could conclude O’Connor exceeded all barrier s against women during the fifties. Flannery O’Connor’s life experiences based on her faith, her novelsRead MoreFlannery OConnors A Good Man Is Hard to Find and Revelation1436 Words   |  6 PagesFaulkner, Flannery O’Connor, and Cormac McCarthy. One author in particular, Flannery O’Connor, is a remarkable author, who directly reflects upon southern grotesque within her two short stories, â€Å"A Good Man is Hard to Find† and â€Å"Revelation.† These two short stories are very similar to each other, which is why I believe that O’Connor often writes with violent characters to expose real violence in the world while tying them in with a particular spiritual insight. The first short story that O’Connor refersRead MoreIdentify Irony in Flanners Oconnors a Good Man Is Hard to Find1421 Words   |  6 PagesThe Irony in Flannery O’Connor’s Irony is a significant rhetorical technique used in demonstrating a condition which is conflicting or expression whereby the result is the exact opposite of what is anticipated. This device of literature creates absurdity in the story according to its tone. Irony has an element of indirectness hence making the writing interesting to the reader. In the story of Flannery O’Connor’s â€Å"A Good Man is Hard to Find,† Irony has aided deeper comprehension and understandingRead MoreFlannery O’connor’s Use of Symbolism, Theme, and Religion1057 Words   |  5 PagesFlannery O’Connor’s Use of Symbolism, Theme, and Religion In this essay I will be covering the similarities, differences, and uniqueness of theme in three of Flannery O’Connor’s short stories. The stories I will be discussing are A Good Man is Hard to Find, Revelation, and Good Country People. O’Connor was considered to be a type of religious propaganda. At least one character in her stories had a name or behavior that reflected religion. Her stories most often had an aggressive twist to them.Read MoreEssay Mary Flannery OConnor948 Words   |  4 PagesMary Flannery OConnor is one of the most preeminent and more unique short story authors in American Literature (OConnor 1). While growing up she lived in the Bible-belt South during the post World War II era of the United States. OConnor was part of a strict Roman Catholic family, but she depicts her characters as Fundamentalist Protestants. Her characters are also severely spiritually or physically disturbed and have a tendency to be violent, arrogant or overly stupid. (Garraty 582) She mixesRead MoreThe Genre of Southern Gothic in A Good Man Is Hard to Find Essay1347 Words   |  6 Pagesenough good in it to keep readers interested. The short story, â€Å"A Good Man is Hard to Find† by Mary Flannery O’Connor, is often considered a perfect example of Southern gothic writing. In â€Å"A Good Man is Hard to Find†, O’Connor has characters typical of Southern gothic. Characters in this genre are â€Å"riddled with many broken bodies, and even more broken souls†. It contemplates innocence, and whether or not anyone really is ever innocent. The grandmother in â€Å"A Good Man is Hard to Find† is a religiousRead MoreFlannery OConnors A Good Man Is Hard to Find Essay1418 Words   |  6 PagesThe Dysfunctional: Psychoanalysis of Flannery O’Connor’s â€Å"A Good Man is Hard to Find† Murder of women, children, and even a baby is a harsh image used by Flannery O’Connor in â€Å"A Good Man is Hard to Find.† The imagery is an effective literary device used to convey ironic tragedy, the struggle of female characters, and the family unit. The story follows a family on a trip to Florida when their journey, interrupted by an ill-fated detour resulting in a car wreck, ends in murder after they cross paths

Tuesday, December 10, 2019

Soft Computing in Information Communication Technology

Question: Brief description of the research project and issue under investigation and an analysis of good practice in relation to this issue. Identification of the key stakeholders and why and how they might be interested in or affected by this study. The key sources of secondary research and an evaluation of their contribution to the study The key methods of collecting primary data and their relative strengths and weaknesses an outline of how you might present the findings in order to persuade stakeholders to act on the results.? Answer: Introduction The study basically deals with a company which is based in United Kingdom and its name is TESCO (Biscaro et al., 2012). Basically it is a retail industry and has been in operations from years and has supermarkets in various locations to provide convenience to the customers. This company actually is having a leadership quality as over because it is one of the leading company in the retail sector (Chang and Madera, 2012). Buying of small shops has become a major marketing strategy which was adopted by this company made them more successful at a faster pace. Efforts are made to keep the shareholders happy and the customers to provide whatever they need as per the current trend and fashion. Evaluate a range of primary and secondary methods for obtaining information including the use of online facilities for the research into an HR or management practices. With the increased technology, online facilities has become a major advantage to the entire human being where all the facilities are available with just a single click which makes life easier residing any place in the world(Clement, 2011). The company selected here is TESCO which indulge its activities in the sale of various FMCG products which are made available to the customers at the most competitive price. The primary data which are required to be collected are the raw data like questionnaire that are needed to be filled by the customers whether or not they will be interested in the online purchase of goods and services(Clement, 2011). Online facilities will make the job of the customer more comfortable as they can purchase any goods online and make the online payment as well. Secondary research which has to be done on an individual research will be based on the internet source which will be required to assess the data in the most efficient manner (Cleophas, 2012). Human resource information should be transparent for all the employees which will make them more comfortable to work in the most suitable environment (Jordan, 2012). Training should be provided to the employees so that they can have complete knowledge of the services which have to be provided to attain success in the long run (Walker et al., 2012). Compare and contrast data from different sources and publications. The various data has to be collected in different which will help to compare to have a better idea of particular business activities (Karmarkar and Dutta, 2010). The most important aspect which has to be kept in consideration is that online facilities are everywhere and efforts should be made to enhance it for a better business in the near future. This company if have the online access then easily can reach the success in short span of time because it will also help in reducing cost and increasing of profits(Kittelberger et al., 2012). Salesmens cost will not be required in case of online availability because it actually do not need to showcase any goods and make the customers attract towards the services which are provided to them. Many retail sector have already indulge its business activities in the way of online practices which is giving them success in wider range but there are various disadvantages as well in case of online facilities provided to the customers(Zhang et al., 2012). It can happen that the customers remain dissatisfied just because they could not have the imagination power to understand the product in online basis. Any business has both the aspect so as to attain the success rate and it does not come alone because it can always happen that the particular business can decrease in the revenue due to some strategy made (Larkin, 2005). The wrong strategy can bring loss to the company but that does not mean that they should stop the business rather it should made effort to diversify its business activities and think of expanding in more ways. TESCO also expand its business activities in the areas of financial planning which helped them to achieve the success rate in the long run. Identify an area of HR business practice which can be investigated. HR professionals are actually responsible to recruit the right person at right job in order to gain the specialized workforce so that they can easily achieve the target within a very short period of time (Luo, 2012). The areas which need to be investigated so as to ensure smooth functioning of the business enterprise in the long run are as follows: There is often found that there is very short time for the delivery of goods which can also sometimes go in the account of penalty which is not beneficial for the company and it needs rectification at an organizational level (Nikolaev and Chugunov, 2012). Consumers are not satisfied with the services of this company and complaint whereby they found the problem with the amount of services provided to them. The issue arises with the invoice where duplicity has been recognized as to which there are issue of two product at the same time which is actually a wrong practice in the company and it needs immediate attention. Unknown items are seen to be deducted for no valid reason and it has become a issue which needs attention at operational level of business activities. The cost which is incurred in the promotional basis has been found incorrect and deductions made are completely wrong and has to be solved by the HR professional with the help of other business heads present in the company. Justify the choice and application of data collection methods and research instruments to explore an area under investigation. Data collection methods are urgent to prove the success rates of a particular organization like TESCO who indulges in the retail sector and suppose to deal with various products which serve the purpose of the customers to buy more of it so that their expectations are met as well as they are ready to consume the services at a price (O'Clair and Davidson, n.d.). Online services make the life of the consumer easier and that is the topic for this research and various data should be collected in order to implement it so that everyone can get benefited over it (Pekgn, 2012). Preparation of questionnaire and focus groups, interviews can help in knowing the view point of the customers as in what way they will be comfortable in receiving the goods and services. Research has to be conducted so as to know whether the particular online services can work in the future or not (Phillips, 2011). Investments need to be made in the initial stage to create the web page of the business activities and they need to access it in proper manner. It may happen that the customers are more comfortable in the tangible products so that they can touch and feel the product which can make them happy because online products can only see and no one has the idea of the actual product. Evaluate the strengths and weaknesses of a research study. Strengths:- Leadership can be recognized in TESCO because it is considered as one of the best in the retail industry since its establishment from the year 1997. Due to its leadership qualities, the company has reached the high level to receive profits which will help to sustain in the competitive world. One of the strength which made TESCO rise at a faster pace is that it has best buying power as it bought other rival shops to sustain in the market. It actually takeover many shops which actually was a marketing strategy and one of the most well known buying strategy was to buy Sainsbury which was the best retailer for the food section in the year 1995(PieÃÅ'Â ¨tka and Kawa, 2012). TESCO is known to implement good strategy in the area of growth and expansion to have an establishment in the new markets. It has also made strategy to expand its services from food to financial services as well as telecom services which will help to maintain the sustainable development. Customers remain satisfied once they use the services of TESCO Company because the company make sure to have a survey on the price check. The company make effort to satisfy the needs and wants of the customer so that they can retain the customers for the future course of time. The store format of TESCO has a multipurpose as so many options are available starting from extra, super stores, home plus and many more which will provide convenience to the customers. Weakness:- In this study, it was found that TESCO does not have much availability of its food items and mostly they manage with the substitute products which disappoint the customers to a great extent. Cash payment is not allowed in this supermarket but it should not be the case as both cash as well as credit facility should be made available to the customers so that the customers can avail the services with whatever resources possible. Discount coupons too are not accepted in this supermarket which ultimately makes the customers unhappy of the fact they cannot save money which becomes necessary while making bulk purchase. Substitute products that are made available may not be applicable as well as not useful as far as the actual product which the customer asked for. Identify key stakeholders, their interests and needs The shareholders of TESCO should have the complete knowledge of the company and should ask the questions at the annual general meeting regarding the problems faced by them so as to sustain in the market (Plimmer, 2010). Some of the ultimate questions that need to be given proper consideration are as follows: Payment procedure of TESCO has been in the scandal when it was found that various accounts are indulging in fraud practices in getting the payments from the suppliers. Some of the significant changes result in having a huge impact on the financial position of the business enterprise. It is rumoured that this company is giving rise to deferred prosecution with the SFO (Raj and Varghese, 2012). Shareholders should make effort to reduce the threat as far as possible and look into the matter to maintain the profitability of the firm. TESCO indulges its business activities in the retail sector and it has a debt of over 22 billion Euros which will make the company suffer from decrease in sales and credit rating as a matter of fact. Credit rating can be up to the mark if TESCO can attain another 5 billion Euros to solve the issue to sustain in the market. Evaluate different ways of presenting data to meet stakeholder needs. Stakeholders invest a large chunk of money in the business so they are liable to get the accurate information so that all their doubts are clear after the presentation of the data. Graphical presentation will attract the shareholders to have a clear view of the companys policies and procedures (Raj and Varghese, 2012). Pie chart is very easy to understand which will ultimately help the shareholders to understand each slice of pie which will represent a variable and its distribution structure. Bar chart as well helps in understanding the value in horizontal format which will help the shareholders to understand the attributes of distribution at a better manner which is not possible if it is done on a theoretical as aspect (Sinclair, 2012). The shareholders are the real owner of the company as they give a lot of money to run the business activities so the presentation made for them should be more attractive so that they feel like investing more in the business and make effort to expand its activities to reach the success of the business enterprise. The data should be more concise and to the point which can answer all the questions regarding the products as well as services which are made available in the market. Use an appropriate mix of diagrammatic and narrative formats. TESCO is a company which has its presence in UK mainly in the retail sector. The pie chart shows the different variable in single pie which actually signifies various other companies indulging in the same business practices (Tesco, 2012). TESCO is shown as 25.4% share as a whole in the retail sector so it can be said that it is the market leader of this particular business. This company also have the buying power of small shops which is their marketing strategy which makes them to sustain in the market along with its competitors. The next position is taken over by Sainsbury which actually is bought by TESCO which made them the king of the particular retail sector. The following bar graph helps in understanding the TESCOs revenue of two years so that a comparison is possible between the operating profit and net profit. In the year 2009, it can be seen that the revenue of this business is slightly lesser as compared to the revenue which came in the year 2010(Tesco, 2012). Next, operating profit tells us the profit which is incurred by the company over the current period and can be compared with previous year to know the actual profit earned by the company. The year 2010 made a slighter increase in the operating profit as compared with the 2009(Thu Nga and Binh, 2012). Net profit also is the same case because it shows an increase in the year 2010. The overall overview can make it clear that the year 2010 was better and has an increase in the revenue which is good for the company as a whole and efforts should be made to be better with the aim to earn more profits in the near future(TSUKUBA and TAKACHI, 2010). Conclusion This study reflects the impact of human resources in gathering information regarding TESCO which are basically deals with FMCG products and has supermarkets all over the world with the aim to satisfy the needs as well as wants of the consumers. Research proposal has been made to implement the online services for this company whereby the customers will be benefited and can enjoy the online services at a much lower cost. Large variety of products is possible to view as well as alternatives will be available. Payment pattern is easier as individual can use the debit card for the process which will make them hassle free in carrying the cash. Time will be saved as the individuals do not have to visit each and every store to view at the various products which is tiring as well that can lead to even irritation for shopping. Online shopping makes the life of the consumer more happy and content. Reference list Biscaro, B., Lindvall, O., Tesco, G., Ekdahl, C. and Nitsch, R. (2012). Inhibition of Microglial Activation Protects Hippocampal Neurogenesis and Improves Cognitive Deficits in a Transgenic Mouse Model for AlzheimerÂ’s Disease. Neurodegenerative Dis, 9(4), pp.187-198. Chang, W. and Madera, J. (2012). Using Social Network Sites for Selection Purposes: An Investigation of Hospitality Recruiters. Journal of Human Resources in Hospitality Tourism, 11(3), pp.183-196. Clement, M. (2011). Rage against the market: Bristol's Tesco riot. Race Class, 53(3), pp.81-90. Clement, M. (2011). Rage against the market: Bristol's Tesco riot. Race Class, 53(3), pp.81-90. Cleophas, C. (2012). Multi-agent modelling for revenue management. Journal of Revenue and Pricing Management, 11(2), pp.240-242. Jordan, J. (2012). Information, technology, and innovation. Hoboken, New Jersey: Wiley. Karmarkar, S. and Dutta, G. (2010). Multi-period revenue management model for internet advertising.Journal of Revenue and Pricing Management, 11(2), pp.225-239. Kittelberger, K., Piazza, F., Tesco, G. and Reijmers, L. (2012). Natural Amyloid-Beta Oligomers Acutely Impair the Formation of a Contextual Fear Memory in Mice. PLoS ONE, 7(1), p.e29940. Larkin, F. (2005). [Tesco Opera]. Circa, (111), p.41. Luo, J. (2012). Soft computing in information communication technology. Berlin: Springer. Nikolaev, D. and Chugunov, D. (2012). The education system in the Russian Federation. Washington, D.C.: World Bank Publications. O'Clair, K. and Davidson, J. (n.d.). The busy librarians guide to information literacy in science and engineering. Pekgn, P. (2012). Revenue management for manufacturing companies. Journal of Revenue and Pricing Management, 11(3), pp.350-351. Phillips, R. (2011). Efficient frontiers in revenue management. Journal of Revenue and Pricing Management, 11(4), pp.371-385. PieÃÅ'Â ¨tka, E. and Kawa, J. (2012). Information technologies in biomedicine. Berlin: Springer. Plimmer, G. (2010). Scoring points: How Tesco continues to win customer loyalty. Journal of Revenue and Pricing Management, 9(4), pp.377-378. Raj, M. and Varghese, K. (2012). Full paper: Positioning of human resources in a construction environment using Zigbee. Gerontechnology, 11(2). Raj, M. and Varghese, K. (2012). Positioning of human resources in a construction environment using Zigbee. Gerontechnology, 11(2). Sinclair, A. (2012). R (Midlands Co-Operative Society Limited) v Birmingham City Council Tesco Stores Limited (Interested Party). Euro Law Rep, 16(5), pp.640-683. Tesco, G. (2012). Autophagy: a common road to perdition in acute brain injuries and Alzheimers disease. Journal of Neurochemistry, 120(4), pp.475-476. Tesco, G. (2012). Autophagy: a common road to perdition in acute brain injuries and Alzheimers disease. Journal of Neurochemistry, 120(4), pp.475-476. Thu Nga, N. and Binh, L. (2012). Establishment of a system for regeneration and transfor-mation in peanut (Arachis hypogaea L.) using somatic embryo. TAP CHI SINH HOC, 34(3). TSUKUBA, S. and TAKACHI, N. (2010). Human resources development using IPe-learning by INPIT. Journal of Information Processing and Management, 52(11), pp.645-650. Walker, K., Kang, E., Whalen, M., Shen, Y. and Tesco, G. (2012). Depletion of GGA1 and GGA3 Mediates Postinjury Elevation of BACE1. Journal of Neuroscience, 32(30), pp.10423-10437. Zhang, L., Wang, H., Cao, X., Wang, X. and Zhao, K. (2012). Knowledge management component in managing human resources for enterprises. Information Technology and Management, 13(4), pp.341-349.

Monday, December 2, 2019

Mobile Security

Introduction In the modern world, mobile devices are an important part of people’s lives. They include laptops, Personal Digit Assistants (PDAs), and smart phones. They offer a communication opportunity both in personal life and in business transactions (Furnell, 2009). In the recent past, there has been a notable growth in sales of smart phones due to their multiple functions.Advertising We will write a custom research paper sample on Mobile Security specifically for you for only $16.05 $11/page Learn More For example, there was 40% sale of smart phones in United Kingdom in 2012. Most people now prefer smart phones compared to traditional models of mobile phones. In addition, most people encourage their employees to use smart phones for easiness of communication (Braunberg, 2013). The use of these mobile devices is very important in the society today due to shifting from analogue communication systems to digital communication systems. Nowadays, m ost people will prefer using a smart phone rather than use a very heavy computer. This is because the smartphone is portable and can even fit in a handbag or pocket. Use of PDAs and mobile phones in the places of work is largely contributing to easing of communication. These devices operate nearly the same as desktops besides providing personal information to the owner. They contain features such as phonebook, notepad, and calendar. In addition to these features, mobile devices receive voice calls and text messages (Jansen Scarfone, 2008). Due to increase in their demand, there has been rise in hacking and theft. Therefore, it is important to take security measures to protect them. Organizations store most of their information in these devices. Lack of security can cause such organizations to loose very important data and information thus compromising their productivity. Among the security concerns that loss of devices can lead to include: data leakage via these devices, virus infe ction hence distorting the information and even unauthorized traffic interception. These concerns call for enhanced security measures of mobile devices (The Government of the Hong Kong, 2011).Advertising Looking for research paper on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More Security of mobile devices The ubiquitous nature of the wireless devices makes it more vulnerable to security attacks compared to the wired ones. Reports on unauthorized traffic interception as a form of security makes unauthorized people access an organization’s email and other private data sent over the hacked network. Consequently, security is a significant aspect in the wireless systems than in wired communication systems (Venkataram Babu, 2010). According to Braunberg, 2013 organizations need to take care of the different applications and software used by the mobile devices. In this case, they should ensure that the devices use only th e allowable applications. This would reduce cases of malware attack and viruses. Security of mobile devices encompasses security of all information and data saved and stored in the tablets, smart phones, laptops, and PDAs. These measures protect the confidential data against abuse. In addition, such security measures ensure that only the authorized persons can access the information. When unauthorized persons access some information, there may be cases of identity theft, financial theft and breakdown in communication (Paulus, Pohlmann Reimer, 2005) Mobile phones and PDAs need a secure infrastructure for suitable management. Security measures should follow proper identifications of the organization’s information systems, guidelines, standards, procedures, and development. This will enhance integrity, availability of information system resources and even confidentiality. In addition, this will ensure the development of a well-organized and wholesome security system for the mob ile devices of such organization. (Jansen Scarfone, 2008) The first generation of analogical mobile phones had an electronic serial number that could confirm the terminal to allow access to the service. On the other hand, the recent mobile devices use GSM. Each subscriber receives a Subscriber Identity Module (SIM) required before using the service. SIM has the user’s identity and authentication key, which is only active during the subscription time.Advertising We will write a custom research paper sample on Mobile Security specifically for you for only $16.05 $11/page Learn More Moreover, SIM is an independent terminal, which is removable. SIM is one of the major forms of mobile security. The SIM ensures security in that the user requires a Personal Identification Number (PIN) to open up the SIM. This form of security is effective when the user does not share the PIN with anybody (Pagani, 2005). Another way to secure the mobile devices is ensur ing proper configuration of its devices. The devices should have the right services and applications to avoid frequent upgrade, patches, and any other safeguards. These upgrades and patches can introduce virus and malwares hence infecting the device. The devices should receive configurations according to the companies’ requirement. Moreover, in case of introduction of new security checklists and protocols, the administrators should manage their installation effectively (Jansen Scarfone, 2008) Many network administrators concentrate on avoiding eavesdropping and authentication. They know that security of any network is very significant to organizations. Everybody loves privacy and would work to ensure security of his devices to avoid occurrence of hacking leading to unauthorized access to the emails, use of one’s credit card to make purchases and even sending inappropriate emails to other people on his/her name. Contrary to the wireless devices, the wired devices get t heir security from system administrators who are the only people allowed to access authentication of the device. On the other hand, the wireless devices depend on encryption to prevent eavesdropping. This form of security measure uses a static key in most occurrences; this can include a key got from the static key, negotiated key, a shared static key and sometimes a dynamically- generated key. They use this type of security measure because anybody can access the Wireless Application Protocol (WAP) of the wireless device (Weiss, 2002) Due to their high demand, most wireless devices are prone to theft. Therefore, it is worth noting when storing data that the device can get lost or stolen. With this in mind, there is another approach, which can ensure security of the stored data. This is use of password. This approach generates a unique combination of character to every mobile device.Advertising Looking for research paper on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More However, the system administrator should observe the clear password management policy. In this case, only the person with the password should access the data. In addition, the system administrator can destroy the stored data remotely in case there is loss or theft of the device (The Government of the Hong Kong, 2011) Recommendations In the modern world, increased mobile security measures should come first because there is an increase in the use of mobile wireless devices. The current measures are costly, non-universal, and ineffective. The device users should be very keen on the cost of protecting their confidential information. Most of them need a device that will not cost any further above the purchase price. The system administrators, on the other hand are keen on the cost of the security measures. They also want an approach that is cheap but effective in protecting their users from traffic interception. The measures must be effective in providing protection and authentication (W eiss, 2002). Use of biometrics is another technological mobile security measure that is very effective. This rapid evolving technology improves the security of numerous mobile applications. Its architectural design consists of enrollment and authentication roles. The authentication role ensures that the biometric data rightly compares with the stored template. This will prevent an unauthorized person from accessing the data because the biometric data and the stored template have to match. The enrollment role on the other hand, enables creation of a template by the user and then acquires biometric information. This will make sure that only the administrator can access the information stored in the mobile device (Apampa, Wills Argles, 2010). Another important security measure that is effective is setting an idle timeout. This approach ensures that the device goes off if it is idle for a specific time. In order to open the device, the owner should feed the system with the PIN number a nd the configured password. In addition, it will help unauthorized person not to access any information in the device. The idle timeout has an auto lock feature that controls access to the device. This system locks the device automatically unless opened using the correct code. It is important to note that the code is usually unique and it does not depict commonly used characters. The user should avoid writing or storing the PIN number and password in a place accessible by an unauthorized person. It is also crucial for the mobile devices users to have a data backup. Organization’s data and information should not just be in one copy. However, it is important for the data stored in the devices to be in another secure device. This is a guarantee that no matter what happens there is data available. This is especially important for organizations, which may require the information. In addition, the organizations ought to acquire the software that automatically deletes any informatio n put if the password input is wrong for several times. This will ensure the device does away with the data before the unauthorized person can access it. Conclusion Mobile devices are very important gadgets of communication in the modern world. They include mobile phones, tablets, Personal Digit Assistants (PDAs), and laptops. These devices are portable, hence used in different places and by different people. The main use of mobile devices is not only receiving voice calls and texts messages but also stores personal information for the owner like notepad, phone book, and calendar. Currently, many organizations store important data in the mobile devices. However, with increased demand there is increased theft and hacking of the devices. The ubiquitous nature of the wireless devices makes it more vulnerable to security attacks compared to the wired ones. The security of mobile devices covers all data and information stored or saved in the smart phones, tablets, PDAs, and laptops. Secu rity is very important because lack of it leads to loss of confidential information. Various approaches can ensure security of mobile devices. These include configuration of a password, setting an idle timeout and data backup. In addition, use of SIM, PIN numbers and backing up data ensure security of mobile devices as well as data stored in them. These approaches deter unauthorized access to confidential data and information stored in the devices. Reference List Apampa, K. M., Wills, G., Argles, D. (2010). User Security Issues in Summative E-Assessment Security. International Journal of Digital Society, 1, (2), 135-147. Braunberg, A. (2013). Mobile Security Buyer’s Guide. Web. Dwivedi, H., Clark, C. Thiel, D. (2010). Mobile Application Security, New York: The McGraw-Hill. Furnell, S. (2009). Mobile Security, Cambridgeshire: IT Governance Ltd. Jansen, W., Scarfone, K. (2008). Guidelines on Cell Phone and PDA Security. Pagani, M. (2005). Mobile and Wireless Systems beyond 3 G: Managing New Business Opportunities, Pennsylvania: Idea Group Inc (IGI). Paulus, S., Pohlmann, N., Reimer, H. (2005). Isse 2005 -Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2005 Conference, New York: Springer. The Government of the Hong Kong, (2011). Mobile Technologies Security. Web. Venkataram, P., Babu, S. (2010). Wireless Mobile N/W Security, New Delhi: Tata McGraw-Hill Education. Weiss, J. (2002). Wireless Networks: Security Problems and Solutions. Web. This research paper on Mobile Security was written and submitted by user Greyson R. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.