Tuesday, May 19, 2020

The Exploration Of The English Language - 912 Words

In this exploration blend, we efficiently explored the exploration writing from 1989 to 2010 to inspect vocabulary information and perusing system use and guideline, as identified with perusing perception for center evaluations English dialect learners in U.S. schools. By and large, the discoveries from the methodical audit uncovered that both vocabulary advancement furthermore perusing technique direction are vital in creating center evaluations ELLs as effective English perusers. By and large, the studies bolster that vocabulary is a key element impacting ELLs capacity to grasp English message and make that the exchange of vocabulary information from the L1 to the perusing in the second dialect (L2) can happen for local Spanish-talking ELLs. While less capable English perusers may see the L1 as an obstruction to English perusing understanding, the L1 can be utilized deliberately by more capable perusers to recognize obscure vocabulary and appreciate content. In terms of Spanish-En glish cognates, there is by all accounts a complementary relationship, such that related distinguishing proof furthermore utilize can expand English perusing, generally as capability in English perusing can add to understudies capacity to perceive cognates. The studies additionally recommend that perusing techniques can be exchanged over dialects, and they record the utilization of cognates and interpretation as techniques that capable local Spanish speaking bilingual perusersShow MoreRelatedThe First Form Of English Language993 Words   |  4 Pages Editor Doug Larson once remarked, â€Å"If the English language made any sense, lackadaisical would have something to do with a shortage of flowers.† Even at an early stage, all English learners realize how complex and versatile the English language can be. Due to its extensive lineage and consistent reformation, the English language holds a highly diversified panorama of linguistic landscape. Dating back as early as 410 A.D., the fall of the Roman empire, neighboring countries and tribes vigorouslyRead MoreHow English Evolved Into A Modern Language797 Words   |  4 PagesEnglish is the official language of many countries all over the world and is spoken more and more every day(How English Evolved Into a Modern Language.). Modern English is the product of the invasions of England over a long period of time(Where Did the English Language Come From?). Throughout history English has influenced and been influenced by many different languages(A Brief History of the Englis h Language.). Historically, English is divided into three periods: Old English or Anglo-SaxonRead MoreThe â€Å"rightness† of Native American boarding school Essay1200 Words   |  5 PagesOne night, he gave three men a sleeping potion so that they appeared to be dead. He carted them out in wheelbarrows. When they were revived, it may have seemed as though he had the power to raise the dead. Volunteers were recruited to teach the English. They were put to work on various projects so that they were taught the value of work. They were expected to follow Anglo-Saxon Protestant Christian faith. In 1878, the prisoners were freed. Some were truly transformed, but most returned to theirRead MoreLanguage Acquisition Is A Theory Created By Stephen Krashen826 Words   |  4 PagesLanguage acquisition is a theory created by Stephen Krashen pertaining â€Å"to the acquisition of the linguistic rules of language† (Manitoba, 2006, p. 14). Krashen agreed that humans are born with a language acquisition device (LAD) that allows them to â€Å"acquire the rules of language† automatically as long as they have â€Å"a plentiful supply of comprehensible input† (Manitoba, 2006, p. 14). Acquisition will inevitably occur if learners are exposed to a sufficient quantity of linguistic messages that theyRead MoreThe Layman View806 Words   |  4 Pagessystem, however, their writings can speak for themselves. The overlying theme in this entire course was more of a diversification study, than an English language class. Therefore none of their opinions have dramatically altered my understanding surrounding English Standard. So what are those belief? I thought you would never ask. 1. The purpose of language is to share thoughts and ideas. 2. In order for successful communication, the sender speaks their thoughts, which are spoken, written, or sharedRead MoreEuropean Exploration And Trade During The Age Of Discovery975 Words   |  4 Pagessome of history’s darkest ages. European exploration and trade during the age of discovery is what indirectly created what we today call America. The world that we see today can be attributed back to Portugal as it pioneered a niche in expedition for European culture. European exploration and trade began in the 15th century with Portugal as they played a very significant role to the age of discovery, a period of time that designated Europe as an exploration powerhouse. Portugal paved the path withRead MoreDiversity Within The Workplace And How Communication Is The Driving Force Behind It Essay1463 Words   |  6 Pagesarticles that were limited to one aspect of diversity were excluded from this review. The implementation of reinforced interpersonal communication skills is the leading influence of workplace diversity; it is for that reason this topic is worthy of exploration through the lenses of communication scholars. â€Å"Effective communication, both internally and externally, is essential for any organization wishing to excel in today s internationally competitive corporate environment and global business and competitiveRead MoreEssay AngloSaxon Language1062 Words   |  5 PagesAngloSaxon Language Nearly all knowledge of the English language before the seventh century is hypothetical. Most of this knowledge is based on later English documents and earlier documents in related languages (3). The English language of today represents many centuries of development. As a continuous process, the development of the English language began in England around the year 449 with the arrival of several Germanic tribes including: the Angles, the Saxons, and the Jutes (1, pRead MoreEssay on Phase of Rapid Change in the English Language783 Words   |  4 PagesChange in the English Language The English language is always changing, however, at the moment it is going through a phase of rapid change, more so than ever before. This more recent change, I believe, is due to mass media and advances in science and technology global communications (Including SMS messaging, the internet, e-mail and other advances in). Due to being almost flooded with American television adverts and programmes, the English language is taking on boardRead MoreIM Australian Too Essay1223 Words   |  5 PagesThe teaching resource selected to support diverse literacy and language learning in a grade one classroom is a children’s book ‘I’m Australian Too’ written by Mem Fox and illustrated by Ronojoy Ghosh (Fox, M. (2017) ‘I’m Australian Too’ Australia; Scholastic Australia). The book is available for purchase both online and at ‘Readings’ stores in Hawthorn, Carlton, Malvern and St Kilda for $19.99. It can also be accessed as an audio copy from http://memfox.com/books/im-australian-too/. The book details

Sunday, May 17, 2020

Is College A Lousy Investment Essay - 1507 Words

The debate on whether or not students should attend college after achieving a high school degree is one that many would like to consider two-sided; Debra Humphreys says that â€Å"going to college is clearly better than not going,† but Claire Potter mentions the opposite side, quoting an unnamed professor who says that â€Å"the vast majority of people who end up in our community college system don’t belong in college at all.† I would argue that the issue is not two-sided, and that there are more complexities to the issue than are always printed in media; to say that all college students should go to college or that all should not attempt to place a variety of different cases into a single group. Perhaps a better option is to say that college (in†¦show more content†¦Again, the point is that college, in the traditional sense, should be recognized as an option for students graduating high school, but alternate cases should be considered. The articles written that are completely devoted to either extreme of the issue are numerous. Pharinet says that college is not for everyone, supporting her position by saying that â€Å"approximately 50% of students who begin college never graduate† (635). Yet, Robert Perry aligns with the opposite side, saying that â€Å"we need more, not fewer university and community graduates† because his state is facing a shortage in workers who fulfil requirements for their positions (625). Humphrey agrees with Perry, proposing that â€Å"for any individual student, going to college is clearly better than not going† (she also cites economic reasons). Although these writers are very strong in their positions on one side or the other, they fail to acknowledge the fact that the decision to go to college depends on more than just the economy or the graduation rate. Although these two considerations are significant, the age of the graduate, prior commitments (such as a family business), and how much money and time is desired to be spent on the education as a whole. Thus it is reasonable to consider community college or vocational school depending on the specific situation of the graduating student. As stated before, it is common for articles in media to slice the issue of educationShow MoreRelatedIs College Worth The Money?880 Words   |  4 PagesImportance of College Education Student in high school, college students, and even adults ask a simple question. Is college worth the money? This paper will answer just that question. We all know someone that says it’s not worth it, and that coming out of college with tons of debt and no job is an almost guarantee. The United States now rank 6th for Percentage of 25- to 64-Year-Olds with an Associate Degree or Higher, 2007 says Derbyshire. In a discussion about the standard of living on averageRead MoreWhy I Was The Teacher Unhappy?1546 Words   |  7 Pagesshe went to college. What the heck? I was (at the time) 38-years-old and didn t know what I wanted to do with the rest of my life. How on earth is a 14-year-old supposed to know that? Three years later she came home angry (progress, I think) because her counselor was pushing her towards a $38,000 a year college, rather than the $11,000 a year college that she had chosen. Because she felt that her counselor was not terribly bright, she did the math for him. The $38,000 a year college had offeredRead MoreCollege Costs Are Out Of Control Essay1461 Words   |  6 Pages People with college degrees are paid 80% more than people with only a high school education. When the college degree is from a more prestigious school, that percentage increa ses even further (McArdle). Even President Barack Obama acknowledged this in a 2012 speech, saying that â€Å"The incomes of folks with a college degree are twice as high as those who dont have a high-school diploma† (Lemann). While a college education is a good investment for the long run, the cost of college is not a positiveRead MoreTeachers, Counselors, And Even Parents Seem To Think That1403 Words   |  6 PagesTeachers, Counselors, and even parents seem to think that pushing students towards applying to college early is helping them out. When most teenagers already have have multiple college classes, extra-curricular activities, and activities outside of school to worry about. To top it off, they even have to worry about getting enough sleep at night and fitting relationships and friendships into their already busy schedule. Teachers, counselors, and parents never really stop to think about whether thisRead More They got next Essay1127 Words   |  5 PagesWNBA Champ ionship at the Staples Center. The Seattle Storm won the first pick in the 2002 WNBA Draft in the inaugural WNBA Draft Lottery held in New York. Things got even more entertaining when the top ten picks included four of the most exciting college players coming from the same team that won the National Championship that year. They were Connecticut Huskies Sue Bird, Swin Cash, Ashja Jones and Tamika Williams going 1st, 2nd, 4th and 7th in the draft. Now two years after Cash was drafted to theRead MoreCollege Education Argument For College2157 Words   |  9 PagesCollege Education Argument I can’t believe it! I graduated college with my dream job and I am making $150,000 a year! I am so glad that I made the choice to continue my college education. Paying for school was rough and accepting loans for large amounts had me feeling a little apprehensive, but I made it. I finally graduated college, landed my dream job and now paying back the loans will not be a problem. This is my goal, I will be saying this in the next few years. I originally questioned whetherRead MoreThemes Of Catch 221750 Words   |  7 Pagesreports filed on them in order to receive promotion. After a mission that results in the death of four people, Cathcart outright expresses his apathy for his men by saying, â€Å"I don’t give a damn about the men or the airplane. It’s just that it looks so lousy on the report. How am I going to cover up something like this in the report?† (138). He does not care about his men’s lives or their wellbeing, he instead only cares abou t how he is going to benefit from the missions he sends his men to. This can beRead MoreThe Rise Of College Tuition2217 Words   |  9 PagesProposed topic: The Rise of College Tuition, Our Freedom of Choice and Fairness. Introduction: College rising tuition is currently the hottest topics debated by political and social interest’s groups who pretty much understand that if this is not fixed soon, it will have long damaging effects on our convalescent economy. It is important to be reminded that college education play a tremendous multiplier role in our economy that holds more the 50% of college graduates. (College Has Been Oversold by AlexRead More Students Deserve A College Tuition Essay3258 Words   |  14 Pagessufficient amount of money. This student gets to go to the best college that their family’s money can buy, which will probably go to waste on partying. Now compare that to a straight A student, living in a too-small temporary place, and no way to pay the bills. This student is everything a college could dream of having, and they actually care about their education. Sadly enough, though, they will never go because how can someone possibly go to college when their family cannot even pay the bills? ConsideringRead MoreThe Goal And Managing Production Management2087 Words   |  9 Pagessuccessfully. Their marriage begins to strain because of the devotion Rogo needs to give to the plant. While in a team meeting Rogo starts to reflect of his life and how he is back at square one is some ways. He thinks back on a conversation he had with a college friend, Jonah. Jonah was a Physicist and in catching up they discussed the production plant and the new implementation of robots on the assembly line. Jonah didn t agree that the robots increased production efficiency; in this reflection Rogo realized

Wednesday, May 6, 2020

Hegels Deep Reverence For Socrates - 1766 Words

Hegel’s deep reverence for Socrates is reflected in his comparison of Socrates with Jesus. While there are many similarities between them—both men attracted disciples, taught orally, were persecuted for undermining traditional authority, were martyrs and dichotomized world history—Hegel’s comparison primarily meant to convey his belief that Socrates’ importance cannot be overstated (Most). For Hegel, Socrates not only introduced the world to philosophy, but also brought about the advent of a type of consciousness formerly absent from the world. Hegel refers to this as â€Å"subjective consciousness†, which enabled individuals to critically examine the world around them and look within, as oppose to the external, to determine morality. Socrates introduced the world to this concept by deliberately engaging in conversations with individuals, imploring them to articulate their beliefs then highlighting contradictions and confounding the individua l. The ramifications of Socrates’ teachings threatened Athenian institutions and ultimately contributed to Athens’ downfall. Despite, perhaps being the most influential being to ever live, Socrates remains a tragic figure, as his philosophy of negativism was never supplemented with positivism or anything to fill the created void. Socrates had a profound impact on the world as his introduction to â€Å"subjective freedom† spurred critical examinations in Athens and continues to inspire examination today. Socrates inspired generations of thinkers,

Ptsd in Slaughterhouse 5 - 1808 Words

Billy Pilgrim has not come unstuck in time; Billy has become a victim of violent warfare. Common to many soldiers of war, he has witnessed such horrific events during the bombing of Dresden that he has acquired Post-Traumatic Stress Disorder. In order to avoid the reality of his cruel life and of the war, Billy has become dependant on escapism. Through escapism he has created the planet of Tralfamadore and the Tralfamadorians. Billy Pilgrim has become a victim of PTSD after having served in the military during World War Two. Although not officially diagnosed until the 1980s, the mental disorder had been terrorizing its victims throughout history. One will understand Billy Pilgrim inevitably suffers from this disorder when one discovers†¦show more content†¦Since the first time Billy claimed to have come unstuck in time while in the forest leaning against a tree, he has depended on an alternate reality in which he has created a new life for himself to avoid thoughts of the horrific events he witnessed while in Dresden. Although Billy claims that he was abducted by the Tralfamadorians, in reality, he was captured by the Germans. The reason that the Tralfamadorians exist is so that Billy can escape from the harsh reality of being a prisoner of war. Although separate in Billy’s conscience, the Nazis and the Tralfamadorians are interchangeable. Billy’s adventures on Tralfamadore all have significant and undeniable connections to his life: â€Å"He came to in what he thought might be a building on Tralfamadore. It was shrilly lit and lined with white tiles. It was on Earth, though. It was a delousing station through which all new prisoners had to pass. Billy did as he was told, took off his clothes. That was the first thing they told him to do on Tralfamadore, too† (83). Billy constructed Tralfamadore from his personal experiences in order to shield himself from reality. The building reminded him of Tralfamadore because that building was the basis of his imagined fantasy world. To cope with the humiliation Billy faces when the Germans â€Å"laughed and laughed† (90) at his appearance, Billy manipulated the situation,Show MoreRelatedAnalysis Of The Limerence Of Martha 1170 Words   |  5 Pagesreflect most stories of war: mortal. Many war writers who have seen action follow that same trend, especially if they have been on active duty. Kurt Vonnegut has been renowned for his story Slaughterhouse 5 where he tells of a first-person tale about the Dresden firebombing. The Things They Carried and Slaughterhouse Five both carrying the tone of humping life on your shoulders. It is routine survival from Vonnegut s quote â€Å"so it goes,† and Tim O’Brien’s quote â€Å"determined by necessity.† These booksRead MoreKurt Vo nnegut s Slaughterhouse Five1246 Words   |  5 PagesIn Kurt Vonnegut’s Slaughterhouse-Five, Billy Pilgrim becomes â€Å"unstuck† in time. The question here is, why? The fact of the matter is that he does not actually begin to time-travel. Billy â€Å"becomes unstuck† as a coping mechanism to deal with his traumatic experiences during the war. Billy attempts to reorganize his life’s events and cope with a disorder known as post traumatic stress (PTSD). â€Å"Post traumatic stress disorder is a debilitating condition that follows a terrifying event† (Marilyn 8)Read MoreAnalysis of Slaughterhouse-Five, a Novel Written by Kurt Vonnegut1196 Words   |  5 PagesSlaughterhouse-Five, a novel written by Kurt Vonnegut, tells the story of the devastating effects of war on a man, Billy Pilgrim, who joins the army fight in World War II. The semi-autobiographical novel sheds light on one of history’s most tragic, yet rarely spoken of events, the 1945 fire-bombing of Dresden, Germany. Kurt Vonnegut was born in 1922 in Indianapolis, Indiana to German parents. As a young man, Vonnegut wrote articles strongly opposing war for his high school newspaper, and the schoolRead MoreVonnegut : An Outlook On Fate1477 Words   |  6 PagesChristopher Friedrichs Mr. Carroll English IV AP 10/26/15 Vonnegut: An Outlook on Fate In Kurt Vonnegut’s classic fiction novel, Slaughterhouse Five, we experience the horrors of war through the eyes of fictional character Billy Pilgrim, and their effect on him. Pilgrim, who was a POW in Dresden during the firebombing, is obviously impacted by the war, like many others who experience combat. By channelling his own experiences into Billy Pilgrim, Vonnegut explores his belief in the inevitabilityRead MoreWar And Its Consequences : The True Reality1545 Words   |  7 PagesWar and its Consequences: The True Reality American veteran and novelist, Kurt Vonnegut uses his wartime experiences as a basis for his thought-provoking, antiwar novel, Slaughterhouse-Five. The novel follows Billy Pilgrim, an American chaplain’s assistant who serves near the end of World War II, through the horrific fire bombings of Dresden and his life after the war. In his novel, Vonnegut presents twentieth century war as traumatic and destructive, however; it is something that cannot be avoidedRead MoreBilly Pilgrims Struggle with PTSD in Vonneguts Slaughterhouse Five1766 Words   |  8 PagesDisorder (PTSD), which caused him to become â€Å"unstuck in time† in the novel. Billy Pilgrim illustrates many symptoms of PTSD throughout the story. Vonnegut uses these Slaughterhouse Five negative examples to illustrate the horrible and devastating examples of war. The examples from the book are parallel to real life experiences of war veterans, including Vonnegut’s, and culminate in a very effective anti-war novel. Although Kurt Vonnegut does not say in his novel that Billy Pilgrim has PTSD, it is impliedRead MoreSlaughterhouse Five By Kurt Vonnegut1997 Words   |  8 PagesKurt Vonnegut’s book, Slaughterhouse-Five, is full of historical context, scientific-fiction themes, modernistic themes, and even emphasizes the idea of free will. But Vonnegut’s novel contains one major theme of the destructiveness of war making the book anti-war. Vonnegut uses a variety of techniques to allude to this theme and he does it well. The combination of his writing style and his use of humor to degrade the human in the event of war is highly effective in the fact that it causes the readerRead MoreSlavery And Social Criticism In Toni Morrisons Beloved1999 Words   |  8 Pagesidentical to the way Kurt Vonnegut did so with war in Slaughterhouse v, 18 years before Beloved was released. Both stories are reported in very roundabout, seemingly incoherent ways. Neither narrates in chronological order and both include multiple narrators. While it may seem counterintuitive to write a novel in this style, in both cases it allows the reader to generate an image more sophisticated than the immediate words on the page; in Slaughterhouse V the chaotic writing style that mirrors the bombingRead MoreSlaughterhouse Five Author : Kurt Vonnegut2047 Words   |  9 PagesIndependent Reading Dialectical Journal Name: Trevor von Hake Date: 9/25/14 Period: 8 Title of Novel: Slaughterhouse-Five Author: Kurt Vonnegut No. Pg. # â€Å"Quote† Response Classification 1 1 â€Å"who took us to the slaughter house where he had been locked up at night as a prisoner of war.† In this passage, the reader discovers that the â€Å"Slaughterhouse† in the title Slaughterhouse-Five is the camps in which the Germans held prisoners of war. This will obviously serve as a significant setting throughoutRead MoreThe War Of War By Heidi Squier Kraft1853 Words   |  8 PagesHospital, were quite different from the first 6 books we have read. This book was the only book we read that was for the war. All the others six books for against the war such as All Quiet on the Western Front, A Farewell to Arms, Goodbye, Darkness ,Slaughterhouse 5, The Things They Carried, and Redeployment. In these books readers can see that theses novels shared common perspectives and characteristics. Some book were memoirs and some were stories but all these books had one main purpose which was the

Transforming Society through Digital Innovation

Question: Discuss about theTransforming Society through Digital Innovation. Answer: Introduction The digital innovation is transforming the society globally. The digital era has immense power to change the society on a large scale. Digital innovation is governing our lives in homes, industry, business and society and is changing every aspect of our lives. The internet is the first wave in the digital technology transforming lives of every individual and after the innovation of smart phones and devices the internet use is accessible to everyone. By 2020, the use of digital technology would exceed 50 million. The digitalized machinery, computers and embedded sensors has revolutionized the industry, business and society as a whole. The mobile applications, cloud based devices, big data and artificial intelligence has provided enormous services to people on an unprecedented scale. The people, information and a connected structure are the key elements that drive digital transformation globally. Greengard and Samuel in their book how internet changes everything explained how internet has directed our lives in every possible way. As we get up, we check our smart phone for messages and emails. The wrist sleep bands monitor our sleep patterns during night. The fit bit scale helps to weigh our body weight, body fat, food and water intake and other activity levels. The fitness app helps to provide the nutritional data and calorie intake (Greengard and Samuel 2015). They also explained how the phone apps provide information regarding geographic location, watch movies through wireless internet network, and read electronic books on mobiles. Apart from mobile phones and computers, there are a number of devices that are connected to wireless internet that are used on daily basis like health monitors, thermostats, fitness devices, environmental sensors, supermarket shelves and even livestock. Concisely, the activities we perform on a daily basis are greatly dependent on technology and have great impact on us. The book by Greengard and Samuel also explained how the society has changed in the last few decades. Before the digitization, the data and information existed in the form of hrad drives and gigantic frameworks stored in computers. The local area network and floppy disks were used to transfer data from one device to another. The data transfer via floppy disks was slow and had limited capabilities. The transportation of data through magnetic media was challenging for people as they had to carry disks from one place to another. This led to wastage of time as the transferring of data would take days or months. The first internet connections started with the dialing of the modems and web browsing through Mosaic. In 1990, the first web browser called Nexus came into existence. The connections were slow and the user could access only while connected through America Online and other portals. Robert E Kahn and Vint Cerf invented the internet and showed that world is connected through an interconnected network via internet. The introduction of mobile phones and high speed broadband helped people to conne4cts not only their mobile phones but also other electronic gadgets including door locks, washing machines, vehicles, tablets and even refrigerators. The book explained how the traditional DVD players, conventional camera, landline phones and paper maps are being replaced by mobile applications and tablet devices encompassing every activity on fingertips. The medical equipments, industrial machines and agricultural equipments are being connected to the internet transferring data and storing them in databases. Meyer, Eric T., and Ralph Schroeder 2015 explained how internet has transformed the concept of knowledge. The concept of e-research through digital tools and data has helped the researchers and students in their research by introducing the knowledge machines online that has transformed the concept of research. The research on any topic is possible now by the help of search engine Google providing a wide range of information on various topics available online. This explains the scenario when the writer was a kid. The skill did not lie in finding the information rather it focuses on the processing, analysis, combination and computation of the information and data. The access to Wikipedia, online available journals, peer reviewed journals helps to find answers to any question in minutes. The book explained not only the way how the knowledge is acquired but also the configuration and generation of the data. The knowledge machines are the instruments for manipulation of data and its use i n the research advancement. Meyer, Eric T., and Ralph Schroeder 2015 focused on the defining the e-research, generating the new knowledge by the university researchers. They have explained the overview and broader aspects of the five forms of internet research. The first form is the internet as a social phenomenon. The social aspects include a person in communication and connecting to people, learning, playing and interacting via internet. The second aspect is the internet as information source by students and research scholars. The use of Wikipedia, research articles, student projects, e-library and literature search shows how the internet acts as a source of information. The third aspect is the internet use as a research tool or method. The online survey research, virtual ethnography and web metrics and other handbooks provide online research options. The fourth aspect is the research regarding engineering and computer science and study of underlying technologies that defines the internet functioning. Many ef forts are being made in this regard and research is going on to keep the internet software processing. The e-research is used to define the use of digital tools and data to produce knowledge. It is the creation of new knowledge through scientific, social and humanities knowledge. The book explained how the face of research changes with the networked technologies as compared to academic knowledge. Concisely, the book explained that how e-research is helpful in generating new knowledge from the databases and research journals and it has changed the face of configuration of data. Technology has not only transformed an individual and education arena but also the sales and marketing industry. Nourbakhsh 2013 explained that how the digitization has transformed the marketing and sales industry scaling heights. The companies are successful in alluring customers through online shopping and make them bind to the social networks, values and virtual products. People spend thousands for virtual weapons and robotic products. The book explained how the companies could track whatever the customers does and they could measure and discern loyalty of the customers. The companies are addicted to the digital world and they could receive information and have total control over it. The internet tracks the human behavior, websites gathering information about their visitors, their way of navigation and how they react. The companies profit by keeping a track of what their customers frequently visit, which browser they use and what kind of computer models they use. The development of strong tools like data mining helps in storing big data regarding online behavior of the people. The analytics company can generalize the experimentation of their shoppers online. The face interpretation could track which way and what people are looking at. The digitalization has the ability to observe a person via computer vision systems all the time. The New Mediocracy unleashes the robotic future and judgment of human behavior taking the shape of new interactive media. Drori 2010 explained in his book how information and communication technology is a marker for human development. The world is taking the shape of e-economy, e-governement and e-empowerment. Drori addressed the global inequality in the access and use of technology called digital divide and innovation divide that describes the technology gap in creation and ownership in intellectual property. The technology use access issues and rights of person to technology. The global innovation divides and differentiates among the countries that are operating globally. The innovators benefit from the creation of novel technol ogies and the non-inventors are dependent on the rights to purchase and use of any such technology. The e-economy is scaling heights through information and communication technology. Despite of the innovation of technology and digital tools, there is a wide gap in the global innovation. Schnapp and Battles 2014 explained that how books emerged as e-books and it has changed the face of education. Readers go through the lines analyzing and keeping a track of what they have studied. Now a days books are measured in bytes and in pixels. The digital documents being flexible stacked in the form of lists, icons, and blocks and in two or three dimensional arrays. The digital bookshelf comprising of e-books and digital records stores complex data. The scanners, recorders and copiers are accessible and within the reach of common man. The librarian keeps a record of books being a guard and keeper of books. The concept of digital library has made the librarian profession seems less. The library cards are now designed as smart biometric identification forms storing information of the readers entire research history, payments, operability across the institutions and use of special services. The social network and media the references are self driven and user centered. The book The Peoples Platform by Taylor Astra explained how internet has become a revolution in every field. The industry is digitalized engaging people into online shopping and rapidly expanding their infrastructure. The researchers and students are transforming via internet in the way they search and investigate the problems. The classrooms have become smart through digitalization and store information in the form of e-library. The online world has increased greater communication among the people being connected together being distant from each other. The book shows a new perspective of the digital tools being used by people in a creative or destructive manner. The broadband access could help any person to become a journalist by starting a blog, sharing photos and keeping accountable of the politicians. Taylor in her article summarized the use of internet transforming consumers into producers and placing customers at par with the power. The main strength of the book lays in her ref usal critique the new system. The online piracy and live streaming has reduced the revenue of the music world. The technologies like Bit Torrent have made easy access to the downloading of movies hampering the world of filmmaking. Taylor expanded her views into the education, politics and the labor market showing how technology is surpassed into the hands of the large entities and individuals having less power. Concisely, internet is a revolution changing every aspects of life from a n individual to the society as a whole. In the above mentioned books, the authors explained how technology has transformed an individual and in various aspects of society like the industry, education, trade and marketing industry. Going beyond these sectors, the digital technology has transformed the telecommunication, healthcare, banking and media industry. The productivity and gross revenue has increased over the recent years in the telecommunication industry. The online generated phone bills, automated online directories, voice recognition systems has helped the customers to get hassle free services and has significantly reduced the work force in providing the telecommunication services. The online billing can keep a record of calls, internet use, call rates and duration that would enable to retrieve the information at the time of need. The digitized communication through broadband services via optical cable accommodates better more capacity and increased traffic. The automatic identification enables to identify the cal ler and trace ones history. The video calling is also useful for people to stay connected being distant from each other and also helpful to students to attend classes being conducted at some other place. The use of barcodes, microchips are useful to provide security to people and store information regarding a product and its inventory data. The Radio frequency identification is very useful in tightening human security at homes and workplaces. A control reader detects the signal provided by the chip and recognizes the person allowing entering the door. The video conferencing, interviews through Skype and tools enabling instant messaging helped in simplifying the complex business processes enhancing the productivity and economy to a great extent. The digital technology has been incorporated in the school curriculum in the form of computer classes and technological subjects to help them in their further studies that are technology driven. The introduction of smart classes helped the students to know the world in a better way and make things accessible to them in an easy and better way. The notes are available in the form of soft copies helpful for the students to access from anywhere without missing any important point that are a major disadvantage in handwritten notes. Technology has also helped the kids those have not started their school life yet. The use of technology by parents in the form of online video classes and games helps them to get ready for their school life and give them a head start for their upcoming life. The online databases, webpages and discussion rooms help the students to gain knowledge on a wider aspect. Digital technology is posing a positive effect on the healthcare system. It has helped mankind in many ways. The medical and professional skills in collaboration with use of digital technology has enhanced over the years in providing better services to the people and in saving millions of life. The embedded computing and microelectronics used in diagnostic methods like computerized tomography, magnetic resonance imaging, sphygmomanometer and digital thermometers are essential for diagnosis (Bardhan, Indranil and Thouin 2013). The best clinical practice is performed by using digitalized diagnostic tools that are overpowering the manual databases for keeping patients records and are useful in saving time in case of emergency patients. The use of bar coded wristbands for patient identification is also helpful in providing accurate treatment and giving them the individual care. These bar coded wristbands helps to monitor the movements of the patients within the hospital premises. The wid e use of video and remote access in hospitals is helping the physicians to keep a check on the patients status and improvement. The teleconferencing among the doctors and information technology based remotes helps them to consult specialists all over the world and seek better assistance. The banking sector is a major part of our economy and through innovative digitalization; it is enhancing the revenue and economy of a country. Banks perform personal and commercial transactions on a daily basis and net banking is a boon for the banking and insurance sector. The computerized banking and software applications are helpful in keeping records of the customers and better retrieval and in processing of the banks. The solution of core banking is a boon to the banking industry. The reliable and centralized database for connecting the branches is helpful in providing the multi city banking without going to the banks (Setia, Venkatesh and Joglekar 2013). The cheque processing through magnetic ink is a systematic procedure providing faster processing. The recording of data through use of debit and credit cards called plastic cards offer withdrawal or money transactions in few minutes and ensure privacy. The printing of passbooks, automated inquiry, cash and cheque deposit are no w automated providing the users to save time and ease of access. The system of cheque truncation removes the physical obstacles like demand drafts, cheques, warrants and processing of loans online helps to remove the associated hassle in approving loans at any point of time. The mobile banking is the most popular technology used providing people a wide range of options like mobile transactions and keeping a track of the banking process. The digital technology has also great impact on the insurance industry. The financial services through digitization reduce the market losses, provide online insurance schemes and provide wide range of insurance options to the customers changing with time (de Leeuw et al. 2014). The media industry has greatly revolutionized through the use of digital technology. The online versions of newspapers and mobile applications providing news all over the world on fingertips helps people to be aware of their surroundings and the major issues. The online movies, live streaming, music is very popular among the people all over the world. The digitization helps the mass media industry to reach out to people and bring the burning social issues to the mass and the concerning authorities (Biagi 2012). The digital technology in media helps to connect all kinds of people coming from across the globe sharing their common interests and one platform. The media industry through digitization can trace the reactions and behavior of the common people through online social networking sites and adapt to new changes in the people (Straubhaar, LaRose and Davenport 2013). Greengard and Samuel in their book The Internet of Things also explained that through internet we connect to people via social networking sites, transactions and communication are done which poses a threat providing a place for hacking, malware, breaching of data and other related problems. The breach of data includes the personal as well as financial data putting consumers at big risk. The main concerns are in the area of industry, transportation and healthcare putting peoples life, health and their well being at risk. The understanding of the consequences of using internet in a creative manner or in a destructive way lay in the hands of the people. Digital technology acts a positive opportunity as well as a negative threat. It is important to identify and correctly interpret the transformation to identify our actions. The digital technology has negative impact on the people and the society as a whole. The high technology environment with smart phones, cloud based devices, digitized smart classrooms, online shopping, banking and other facilities has save the time and energy of the people but also has dark sides. The internet surfing and use of search engines has reduced the imagination power, the way they think and deep thought analysis about any material in people. The digitization has reduced the physical activity of the people and posing them to lead a sedentary lifestyle. The technology use by people has made people live in isolation and in a fictional world and there is no physical meeting between the people. People waste time in internet surfing, there is loss of concentration and productivity, continuous use of gadgets an d earphones would make them consume unhealthy foods, hamper eyesight and hearing, lack of privacy due to social networking sites. The addiction to gadgets makes poor sleep patterns affecting health and other related problems. Therefore, it can be concluded that digitization has made the life easy for the people and the society as a whole in every sector still it has some negative impacts that varies with the extent of application and actions of the people. References: Bardhan, Indranil R., and Mark F. Thouin. "Health information technology and its impact on the quality and cost of healthcare delivery."Decision Support Systems55, no. 2 (2013): 438-449. Biagi, Shirley.Media impact: An introduction to mass media. Cengage Learning, 2012. de Leeuw, Jan, Anton Vrieling, Apurba Shee, Clement Atzberger, Kiros M. Hadgu, Chandrashekhar M. Biradar, Humphrey Keah, and Calum Turvey. "The potential and uptake of remote sensing in insurance: a review."Remote Sensing6, no. 11 (2014): 10888-10912. Drori, Gili S. "Globalization and technology divides: Bifurcation of policy between the Digital Divide and the Innovation Divide." Sociological Inquiry 80, no. 1 (2010): 63-91. Greengard, Samuel.The Internet of Things. MIT Press, 2015. Meyer, Eric T., and Ralph Schroeder.Knowledge machines: digital transformations of the sciences and humanities. MIT Press, 2015. Nourbakhsh, Illah Reza. Robot futures. MIT Press, 2013. Schnapp, Jeffrey T., and Matthew Battles. The library beyond the book. Harvard University Press, 2014. Setia, Pankaj, Viswanath Venkatesh, and Supreet Joglekar. "Leveraging Digital Technologies: How Information Quality Leads to Localized Capabilities and Customer Service Performance."Mis Quarterly37, no. 2 (2013): 565-590. Straubhaar, Joseph, Robert LaRose, and Lucinda Davenport.Media now: Understanding media, culture, and technology. Cengage Learning, 2013. Taylor, Astra. The people's platform: Taking back power and culture in the digital age. Macmillan, 2014.

Tuesday, May 5, 2020

Computer Security Regarding the Submarine

Question: Describe about the Computer Security for Regarding the Submarine. Answer: Part A: Computer Security Breach leads to leakage of Sensitive Submarine Information This report critically analyses the incident of security breach that has resulted in leaking of sensitive information about the Scorpene submarine that has been designed by France (Can French keep a secret?, 2016). There is no more serious incident than disclosure of the stealth secret of a country. Hence the report will focus on the questions like how did the incident occur, why did it occur and the possible solutions to the leak. A.1) The Problem The author Cameron Stewart discuss in The Australian about the latest security breach which has made sensitive information regarding the Scorpene submarine public. A submarine technology is as effective as the amount of stealth and secret it can maintain. The leaked DCNA (Direction des Constructions Navales) documents carry bolt to bolt details about the submarines capability and combat abilities along with the weaknesses (Scorpne data leak: Who is responsible for the massive information security breach? - Firstpost, 2016). The major victims of the leak are India, Malaysia, Chile and Brazil who operate the Scorpene submarine. The breach will compromise the security of the six submarine fleet that is maintained by India. This incident will further deteriorate the security condition of the country. The project that has been valued more than 3.5 billion USD was being built at Mumbai docks. The deal was inked in 2005 and leaked document shows a detailed technical specification which wil l make it easier to detect the Scorpene submarine (Joseph, 2016). A.2) How and Why did the breach happen The data and the documents that reached The Australian via mail did not contain any detail regarding the submarine. The Australian made the news public as Australia has contracted DCNS for building Shortfin Barracuda Submarines. The leak happened at the DCNS side as it contained sensitive information about other frigates and amphibious ships which have been planned to be sold to Chile and Russia. The document that has been leaked is the year 2011 document that has been used as framework for building the submarines. The leak not only have created security risk for the buyers but has also defamed the suppliers and its subcontractors. The latest leak has been attributed to lesser awareness of the contractors about the IP (Intellectual Property) protection. DCNSs leak is an eye opener that IP in this modern world of connectivity is hard to maintain and should be taken seriously (French submarine maker data breach highlights challenges of IP security, 2016). DCNS also claim that it has be en a victim of economic warfare, and it is for sure that after this incident there are few people who will trust company with their sensitive information. Various reasons have been attributed to the security breach like lack of awareness about the IP protection and data classification and protection. Intellectual Property (IP) protection is a very difficult task as it involves various stages of security involved for the protection and maintenance. Since today due to interconnectivity everything is connected to every other thing maintaining the security has become tougher. Maintaining IP is more difficult compared to other data because these data are extremely unstructured (French submarine maker data breach highlights challenges of IP security, 2016). Apart from being unstructured the work upon it is done in various segments so the full value of the data often goes unrealised by the individual working upon it. It should also be understood that the failure to understand the importance of data classification and its protection too gives rise to security breaches. If the data is not classified according to its importance and security implication, it is bound to be grouped with lesser important files which will result in access to data by unwanted personnel or hackers thus leading to leakage of information (Barile, 2014). A.3) The possible solutions There is no definite outcome for internet security breaches as the hackers and personnel do evolve with the increasing security. But the task for them can be made harder. One possible solution for the problem could be restructuring architecting the security from the very beginning. So that the security is designed to be hard to crack, easy for upkeep and recovery is smooth (StjepandiĆ¡ Liese Trappey 2015). The segmented approach will go a long way in preventing the data. Alarms can be embedded into the system to show any movement of data. The importance of data should be well understood and the classification and segmentation should be for a better understanding of security. Hence, the various aspects of the computer security have been discussed. The recent incident related to a computer security breach in France which has resulted in the release of sensitive information about submarines has been analyzed. The questions like how and why were answered and solutions were pro vided for restricting such breaches. Part B: The Anthem Medical Data Breach B.1) Problem Statement An American healthcare company Anthem Inc. which was founded in the 1940s was hacked in 2015. Anthem Inc. on 4th, Feb 2015 disclosed the fact about the network security breach that has led to the theft of 37.5 million records containing user information from its server. On a later day in February, the company further increased the number, of records that were stolen, to 78.8 million. According to the information provided by the organization the security breach compromised records of various brands of the company like Anthem Blue Cross, Blue Shields, etc. The company further confirmed that the breach didn't compromise with the financial data and the medical information of the members and patients. But other details like names, e-mail IDs, medical IDs, birthdays, social security numbers, income data, employment information, have been compromised and according to the report in The New York Times' could be used for identity theft. To prevent victimization, the firm has asked the persons to be careful regarding their accounts as vigilance might help to reduce the damage of identity theft. B.2) Affected People According to the data released by the company 78.8 million people have been affected by the theft. If the data USA Today are to be believed, then the number of affect mass could increase to 80 million. The data that has been compromised include every data needed for identity theft like name, social security number, etc. The stolen data of 80 million people could be used for identity theft hence making a large populace vulnerable to identity cloning. Identity theft is a deliberate use of others identity to gain financial advantages. Hence it can be easily understood that people whose details have been compromised are living in fear. The organization Anthem Inc. also maintains thousands of HighMark customers whose information was compromised. The CEO of the company addressed the sufferers of the incident and apologized for the same, thus creating a lot of fuss about the issue. The breach has shaken the investor confidence, and the company has been struggling to maintain the market share that it previously had. The customers too have been skeptical about the security policies of the company and fears investing with it. Although no incident of identity theft has been recorded till now due to the security breach but the possibility and the impact of the breach has been profound. B.3) Details of Attack Carried Out The company was on its way to implementing two-tier securities before which the breach totally took the IT expert of the company by shock. As per the report by J. K. Wall, as soon as the security breach was found all the system with a single level of safety was shut down. Before the attack, only individual level authentication was done by recording the username and password, so hackers acquired the combination of two and started the breach for weeks. Although at final stages hacker had all the information needed for accessing the sensitive data, the company is still not sure about the source of the initial breach. Every company makes a trade-off between the ease of handling system and the involved security for making the system both easy to use and user-friendly. This can result in minor challenges for the system which the hackers use to gain access to the network. The data about the patients constituted around 35 GB of disc space and was moved in small chunks to avoid unwanted attention and had been done for weeks to before the breach was noticed. B.4) Possible Solution to Prevent the Attack It had been mentioned in the previous section that the IT experts were just a few weeks away from implementing a two-tier security system. Once the system was in place, the hackers might not have been able to breach the security. So it can be easily understood that single level security is unsafe, and a multi-level security is the need of the time. Apart from multi-level security, the IT professionals should be more proactive to stop any attack on the system. According to The LA Times initial attempts of hacking were detected and deflected, but the final one went unnoticed for six weeks. It is estimated that the hacker was extremely persistent and might have gained access to the system using phishing on of the IT managers. References Anthem data breach could affect affiliate customers, including Highmark. (2016).Pittsburgh Post-Gazette. Retrieved 25 August 2016, from https://www.post-gazette.com/business/tech-news/2015/02/06/Anthem-data-breach-could-affect-affiliate-customers-including-Highmark/stories/201502060059 Barile, I., Wootton, B., Kessler, D., Upadhyay, R. (2014).U.S. Patent No. 8,695,090. Washington, DC: U.S. Patent and Trademark Office. Can French keep a secret?. (2016).Theaustralian.com.au. Retrieved 25 August 2016, from https://www.theaustralian.com.au/opinion/itll-be-50bn-down-the-gurgler-ifthe-french-cant-keep-a-secret/news-story/535be2819009eb7180b468ef5751f7fb Data Breach at Health Insurer Anthem Could Impact Millions Krebs on Security. (2016).Krebsonsecurity.com. Retrieved 25 August 2016, from https://krebsonsecurity.com/2015/02/data-breach-at-health-insurer-anthem-could-impact-millions/ Details of Anthem's massive cyber attack remain in the dark a year later. (2016).Modern Healthcare. Retrieved 25 August 2016, from https://www.modernhealthcare.com/article/20160330/NEWS/160339997 Forbes Welcome. (2016).Forbes.com. Retrieved 25 August 2016, from https://www.forbes.com/sites/danmunro/2015/12/31/data-breaches-in-healthcare-total-over-112-million-records-in-2015/#43f5c8937fd5 French submarine maker data breach highlights challenges of IP security. (2016).ComputerWeekly. Retrieved 25 August 2016, from https://www.computerweekly.com/news/450303120/French-submarine-maker-data-breach-highlights-challenges-of-IP-security Goldstein, R. (2016).Millions of Anthem Customers Targeted in Cyberattack.Nytimes.com. Retrieved 25 August 2016, from https://www.nytimes.com/2015/02/05/business/hackers-breached-data-of-millions-insurer-says.html?_r=0 Joseph, J. (2016).Scorpene data leak Not a tight ship, submarine project leaked like a sieve.The Hindu. Retrieved 25 August 2016, from https://www.thehindu.com/news/national/scorpene-data-leak-not-a-tight-ship-submarine-project-leaked-like-a-sieve/article9027165.ece Riley, C. (2016).Insurance giant Anthem hit by a massive data breach.CNNMoney. Retrieved 25 August 2016, from https://money.cnn.com/2015/02/04/technology/anthem-insurance-hack-data-security/ Scorpne data leak: Who is responsible for the massive information security breach? - Firstpost. (2016).Firstpost. Retrieved 25 August 2016, from https://www.firstpost.com/world/scorpene-submarine-leak-who-is-responsible-for-the-massive-information-security-breach-2976018.html StjepandiĆ¡, J., Liese, H., Trappey, A. J. (2015). Intellectual property protection. InConcurrent Engineering in the 21st Century(pp. 521-551). Springer International Publishing. The massive breach at health care company Anthem Inc.. (2016).USA TODAY. Retrieved 25 August 2016, from https://www.usatoday.com/story/tech/2015/02/04/health-care-anthem-hacked/22900925/ Times, L. (2016).Anthem is warning consumers about its huge data breach. Here's a translation..latimes.com. Retrieved 25 August 2016, from https://www.latimes.com/business/la-fi-mh-anthem-is-warning-consumers-20150306-column.html