Thursday, September 3, 2020

Should countries opt for nuclear power (please dont write anything Essay

Should nations settle on atomic force (if it's not too much trouble dont compose anything without perusing and referencig the pack gave) - Essay Example It is accepted that the accessible oil assets in this world are adequate enough just for a couple of decades more. â€Å"Running out of oil has a lot greater outcomes than just not having the option to drive your vehicle to work or not having the option to watch TV† (McLain, 2012). Under such conditions, it is inescapable for the world to discover exchange vitality sources and atomic vitality is by all accounts getting the main goal. Despite the fact that atomic vitality has numerous points of interest over other vitality sources, it has numerous disservices too. As indicated by Ewall (2008), â€Å"Nuclear power is a costly, contaminating, hazardous, bigot, depletable, and now an outside wellspring of energy†. The waste produced from the atomic force stations is hard to arrange appropriately as a result of its capacity to endure a great many years, freeing hurtful radiations. In addition, atomic vitality can be abused for dangerous purposes. The third peril related with atomic vitality abuse is the constrained existence of atomic reactors and the odds of mishaps. This paper contends against the abuse of atomic vitality. The capacity of atomic waste, created from the atomic force plants to make due for a great many years and to free hurtful radiations is the main issue. Simultaneously, backers of atomic vitality contend that the measure of squanders or ozone harming substances delivered from atomic force plants are less contrasted with the squanders created by other vitality sources. It ought to be noticed that oil and coal vitality are delivering numerous kinds of ozone harming substances and in this way causing natural issues and an Earth-wide temperature boost. â€Å"The just practical possibility of easing back an Earth-wide temperature boost is to radically lessen carbon emissions† (Dickson, 2007). As indicated by George Monbiot (2011), coal is multiple times more awful than atomic force. Individuals like Monbiot accepts that atomic vitality will push the world to

Wednesday, August 26, 2020

Should You Really Trust College Ranking Lists

Should You Really Trust College Ranking Lists SAT/ACT Prep Online Guides and Tips Since the U.S. News World Report school rankings list appeared in 1983, school destined understudies and their folks have gotten very enchanted with school positioning records. While the U.S. News rundown might be the most notable, there are a plenty of school positioning records out there. All utilization somewhat various standards to rank universities and all case to be the best and generally solid. In any case, would it be advisable for you to confide in any of these rundowns? Would it be a good idea for you to utilize them when choosing which school to join in? Do they give any significant data? In this article, I'll answer those inquiries. I'll tell you the amount you can believe school positioning records. Moreover, I'll clarify the upsides and downsides of these rundowns and how to utilize them to your advantage. How Are College Rankings Determined? Most positioning records utilize a blend of target insights and abstract conclusions dependent on study reactions to assemble their rankings. Target Numbers That Influence the Rankings These are the most well-known measurements utilized by the most famous school positioning records that help decide the rankings. Maintenance: Some rundowns utilize the first year recruit degree of consistency, the level of understudies who return for their sophomore years, to assist with deciding their rankings. The rationale behind utilizing this measurement is that if an understudy is content with a school and getting the important help, at that point she will return for her subsequent year. Additionally, records utilize the 6-year graduation rate, the level of understudies who graduate inside 6 years. In the event that a school is giving quality guidance and sustaining its understudies, at that point most by far ought to have the option to graduate inside 6 years. Class Size: US News quantifies the extent of classes with under 20 understudies and the extent with at least 50. The thought here is that extremely little and enormous classes are demonstrative of having more assets. Likewise, understudies in littler classes get more consideration and customized guidance. Personnel Salary: The thinking for utilizing this measurement is that schools that pay their staff most liberally can pull in the best educators. Understudy Faculty Ratio: If there is a low understudy workforce proportion, at that point understudies can get more consideration and there will be more open doors for understudies to communicate with educators. SAT/ACT Scores: Schools with higher normal government sanctioned grades are viewed as being increasingly specific and having all the more scholastically proficient understudies. Level of Students That Graduated in the Top 10% and 25% of Their High School Classes: Colleges whose understudies all graduated close to the highest point of their secondary school classes are judged emphatically for having the most noteworthy bore of understudy. Acknowledgment Rate: The rationale behind utilizing this number is that on the off chance that a school concedes just a little level of its candidates, at that point those that it concedes are probably going to be the best and most splendid. Normal Spending Per Student: US News figures spending per understudy by utilizing the normal spending per understudy on guidance, research, understudy benefits, and related instructive uses in the latest two monetary years. Spending on sports, dormitories, and emergency clinics doesn't tally. On the off chance that a school is spending more per understudy on training, at that point you might have the option to accept that its understudies have progressively instructive assets and quality guidance. Graduated class Giving Rate:The graduated class giving rate is the level of graduates who provided for the school, for the most part inside the most recent year or two. As per different examinations, the graduated class giving rate is a proportion of understudy fulfillment. Notwithstanding, I making the most of my involvement with Stanford, however I don't give to my institute of matriculation. Possibly someone from Stanford will understand this and I'll quit getting perpetual letters and calls approaching me for my cash. Budgetary Aid: Some rundowns measure the normal measure of money related guide granted and others measure the level of monetary need that is met. Better universities ought to have the assets to empower every certified understudy to go to paying little heed to budgetary need. US News additionally gauges how fulfilled understudies are with their budgetary guide, however that is a significantly more abstract rating. Compensation of Alumni: The rationale behind utilizing normal graduated class pay in school rankings is that universities that give magnificent instruction and can offer great expert associations will have graduated class with significant compensations. Suppositions That Influence The Rankings Scholastics US News World Report depends intensely on undergrad scholastic notoriety in its rankings. The scholarly notoriety of a school is dictated by how top scholastics and heads at different universities evaluate its scholastics. US News additionally reviews guides from secondary schools to rate the scholarly projects of universities to help decide scholastic notoriety. Princeton Review leads a study on how hard understudies work and the amount they get back for their endeavors to evaluate scholastics. Personal satisfaction Most school positioning records evaluate the personal satisfaction at a school through understudy overviews. Princeton Review grades personal satisfaction through understudy appraisals of their general joy; the excellence, security, and area of the grounds; the solace of dormitories; the nature of food; the simplicity of getting around grounds and managing executives; the cordiality of individual understudies; the collaboration of various understudy types; and the nature of the school's relationship with the neighborhood community.† Just because this year in its rankings, Forbes utilized an understudy fulfillment review on Facebook where understudies were asked how fulfilled they were with their school from 1-5. Clearly, the rationale behind utilizing personal satisfaction estimations in rankings is that understudies ought to be cheerful on the off chance that they're going to a decent school. Experts of College Ranking Lists Find New Colleges School positioning records can acquaint you with universities that might be a solid match for you. I think this is presumably the most important thing about these rundowns. Numerous understudies are not as acquainted with littler, all around positioned schools. Seeing these schools on positioning records can incite an understudy to investigate them, concern them, and possibly go to a school he would not have recently thought of. For instance, schools like Harvey Mudd and Williams are incredible schools that may not be as esteemed or have a similar name acknowledgment as Harvard or Yale, however they reliably rank exceptionally in school positioning records. Give Extensive Data to You to Compare Schools In one positioning show, you can see the normal class size, secondary school GPA, or SAT/ACT score for a wide range of universities. These rundowns can offer you an asset for numerical correlations. In case you're thinking about a couple of various universities, you can allude to a rankings rundown to analyze the accessible measurements for each school and that may assist you with narrowing down your rundown of universities to apply to. Give You an Idea of What Others Think While the rankings can be contested and these rundowns are emotional, school positioning records do give some knowledge into the notorieties of various universities. Graduate schools and managers regularly consider the notorieties of various schools when they decide. Heading off to a #12 versus a #20 school will most likely have little effect on those choices; in any case, heading off to a #12 versus a #200 school could. Realize What You Need to Do to Be a Qualified Applicant A considerable lot of the positioning records give you the normal secondary school GPA, government sanctioned grades, and the level of understudies who graduate in the top 10% and 25% of their secondary school classes. From these numbers, you can figure out what you have to do to make yourself serious for admission to a particular school. On the off chance that you need to have a better than average shot at getting into a specific school, your numbers should contrast well with those of the normal understudy there. Cons of College Ranking Lists A portion of the rules used to assess universities are exceptionally emotional. For US News World Report, top scholastics and secondary school guides answer overview inquiries regarding other schools' scholarly projects. It is safe to say that they are very much educated enough to have taught conclusions on the scholarly projects of schools they may have never worked at nor joined in? Is it accurate to say that they are simply depending on gossip and the notorieties of these schools to respond to these inquiries? So also, some personal satisfaction evaluations may not represent regular changes in sentiments. On the off chance that the grounds of a school in a rustic domain is positioned as lovely, that implies little for the understudy who lean towards urban situations and would locate the provincial grounds unappealing. A portion of the standards used to rank schools may have no genuine effect on your instructive experience. The pace of graduated class giving and selectivity of a school will likely not sway the nature of guidance you'll get at a specific school. Understudies can get excessively centered around the rankings as opposed to making sense of which school is the best fit for them. There's most likely very little distinction in the nature of instruction at a #5 school versus a #10 school. The #10 school might be a vastly improved fit for an understudy who could exceed expectations scholastically at both. At last, universities are exceptionally persuaded by the rankings. They'll persuade understudies who have minimal possibility of getting acknowledged to apply to expand their selectivity rating. They'll spend endless hours and enormous assets hitting up graduated class for cash to up their graduated class giving rates. Maybe these schools could improve their scholastic projects or bolster administrations on the off chance that they assigned their assets regardless of school rankings. School positioning records can be both acceptable and awful. What Do Some College Experts Think? By and large, in my examination, the specialists on record appear to have reverberated a portion of my opinions about school rankings. Jeffrey Brenzel, Dean of Admissions at Yale from 2005-2013, accepts that school positioning records are of constrained an incentive to understudies:

Saturday, August 22, 2020

The U.N Humanitarian intervention in Syria PART 2 Case Study

The U.N Humanitarian mediation in Syria PART 2 - Case Study Example Article 1 and 2 of the Charter of the United Nations diagrams the significance of perceiving the power of countries and their self-determinacy (Repertoire of the act of the security chamber 1). The contract denies part states from commandingly mediating in the inward issues of different states except if they either effectively look for the endorsement of the UN Security Council or respond to shield their outskirts from outer powers. This has assumed a significant job in the compassionate mediation, or absence of, in Syria. It has offered an impediment for any country ready to mediate so as to end the present emergency present in Syria. This limitation additionally covers the foundation of no fly zones and giving weapons to the dissident powers in Syria (United Nations 1). It is accepted that amazing countries with changeless seats in the Security Council have utilized this arrangement to leave any endeavor of mediation in Syria with Russia and China being the key denounced. At the point when the claims of the utilization of compound weapons by the legislature of Syrian on regular citizens and renegades in the area of Ghouta on 19 March 2013 surfaced, the United Nations set out on a reality discovering mission and introduced a dooming report that featured the utilization of sarin on regular people (United Nations 1). Thus, the UN Security Council during its sittings demonstrated an uncommon solidarity and passed Resolution 2118 trying to guarantee that the utilization of concoction weapons on regular citizens isn't rehashed. The goals requested the decimation of the synthetic weapons and disallowed the assembling, aggregation and move of compound weapons by Syria. Inability to cling to the conditions set, the Security Council may force punishments on Syria according to Chapter VII of the UN Charter (Repertoire of the act of the Security Council 1). The United Nations, along with the League of Arab States, has assumed a key job in the pursuit of a quiet political arrangement in Syria.

Radio Frequency Identification Essay examples -- Technology, Communica

I. Presentation RADIO recurrence ID (RFID) innovation is picking up consideration both from academicians and from specialists. RFID can possibly fill in as an essential innovation for universal administrations where the two items and individuals can be recognized naturally by means of connected RFID labels [35]. Be that as it may, with the guarantee of RFID innovation come gives that need to be tended to for its broad acknowledgment by shoppers. For instance, the utilization of RFID innovation by retailers and government offices brings up issues about potential infringement of individual data protection [35], and potential security dangers to individual data [40]. Inspired by such issues, this study proposes and approves a hypothetical model of buyer acknowledgment of RFID innovation. The proposed model is created in light of the surviving writing and gives a hypothetical structure of the basic factors that decide the consumer’s acknowledgment of RFID innovation. A commitment of this paper includes exploring the innovation acknowledgment model (TAM) Original copy got September 1, 2006; overhauled June 27, 2007. Audit of this original copy was masterminded by Department Editor A. Chakrabarti. The creators are with the Information Technology and Decision Sciences Office, College of Business Administration, University of North Texas, Denton, TX 76201 USA (email: hossainm@unt.edu; prybutok@unt.edu). Advanced Object Identifier 10.1109/TEM.2008.919728 what's more, contextualizing it to the RFID innovation. This contextualization is finished with the plan of stretching out the TAM to the acknowledgment of a particular technologyâ€RFID innovation. This study is the first in the RFID writing to use and contextualize the TAM for clarifying customer a... ...chnology. Seen helpfulness is characterized as the degree that people accept their activity execution is improved by utilizing a specific innovation. Seen usability is characterized as the degree to which an individual accepts that utilizing a specific framework is liberated from exertion. Hat additionally hypothesizes that apparent usability is an indicator of saw value. Analysts have used and approved TAM for use with various sorts of innovation [51]. A few examinations propose that TAMsuccessfully predicts an individual’s acknowledgment of different corporate data advances [1], [8], [12], [39]. Concurring to Straub et al. [42], TAM may hold across advances, individuals, settings, and times. As of late, TAM has its impressions in internet business [50], [51], and versatile help [46]. This examination grows TAMto the investigation of buyer acknowledgment of the RFID innovation.

Friday, August 21, 2020

Profile on Woman Writer Marge Piercy

Profile on Woman Writer Marge Piercy Marge Piercy (conceived March 31, 1936) is a women's activist author of fiction, verse, and journal. She is known for looking at ladies, connections, and feelings in new and provocative ways. Her cyberpunk novel He, She and It (known outside the U.S. as Body of Glass) won the Arthur C. Clarke Award, which praises the best sci-fi, in 1993. Quick Facts: Marge Piercy Known For: Feminist authorBorn: March 31, 1936 in Detroit Family Background Piercy was conceived andâ grew up in Detroit. In the same way as other U.S. groups of the 1930s, hers was impacted by the Great Depression. Her father, Robert Piercy, was some of the time jobless. She likewise knew the â€Å"outsider† battle of being a Jew, as she was raised by her Jewish mother and non-rehearsing Presbyterian father. Her neighborhood was an average workers neighborhood, isolated square by block. She experienced a few years of ailment after early wellbeing, first struck by German measles and afterward rheumatic fever. Perusing helped her through that period. Marge Piercy refers to her maternal grandma, who had recently lived on a shtetlâ in Lithuania, as an impact on her childhood. She recollects her grandma as a narrator and her mom as a ravenous peruser who empowered perception of her general surroundings. She had a grieved relationship with her mom, Bert Bunnin Piercy. Her mother urged her to peruse and be interested, yet in addition was exceptionally passionate, and not extremely open minded of her little girls developing autonomy. Training and Early Adulthood Marge Piercy started composing verse and fiction as an adolescent. She moved on from Mackenzie High School. She went to the University of Michigan, where she co-altered the scholarly magazine and turned into a distributed essayist just because. She earned grants and grants, including a cooperation to Northwestern to seek after her master’s qualification. Marge Piercy felt like an untouchable in 1950s U.S. advanced education, to some degree as a result of what she calls predominant Freudian qualities. Her sexuality and objectives didn't comply with anticipated conduct. The topics of women’s sexuality and women’s jobs would later be unmistakable in her composition. She published Breaking Camp,â a book of her verse, in 1968. Marriage and Relationships Marge Piercy wedded youthful, yet left her first spouse by age 23. He was a physicist and a Jew from France, dynamic in against war exercises during Frances war with Algeria. They lived in France. She was baffled by her spouses desire for customary sex jobs, including not paying attention to her composition. After she left that marriage and separated, she lived in Chicago, working at different low maintenance occupations to get by while she composed verse and partook in the social liberties development. With her subsequent spouse, a PC researcher, Marge Piercy lived in Cambridge, San Francisco, Boston, and New York. The marriage was an open relationship, and others some of the time lived with them. She worked extended periods of time as a women's activist and against war dissident, however in the end left New York after the developments started to fragment and fall apart.â â Marge Piercy and her significant other moved to Cape Cod, where she started composing Small Changes, distributed in 1973. That epic investigates an assortment of associations with people, in marriage and in public living. Her subsequent marriage finished soon thereafter. Marge Piercy wedded Ira Wood in 1982. They have composed a few books together, including the play Last White Class, the novel Storm Tide, and a true to life book about the art of composing. Together they began the Leapfrog Press, which distributes midlist fiction, verse, and genuine. They sold the distributing organization to new proprietors in 2008. Composing and Exploration Marge Piercy says her composition and verse changed after she moved to Cape Cod. She considers herself to be a piece of an associated universe. She purchased land and got keen on planting. Notwithstanding composing, she stayed dynamic working in the women’s development and educating at a Jewish retreat community. Marge Piercy frequently visited the spots where she sets her books, regardless of whether she had been there previously, to see them through her characters’ eyes. She depicts composing fiction as possessing a different universe for a couple of years. It permits her to investigate decisions she didn’t make and envision what might have occurred. Well known Works Marge Piercy’s is the creator of more than 15 books, remembering Woman for the Edge of Time (1976), Vida (1979), Fly Away Home (1984), and Gone to Soldiers (1987). A few books are viewed as sci-fi, including Body of Glass, granted the Arthur C. Clarke Award. Her numerous verse books include The Moon Is Always Female (1980), What Are Big Girls Made Of? (1987), and Blessing the Day (1999). Her diary, Sleeping With Cats, was distributed in 2002.

Monday, August 17, 2020

Sex and Drug Use Increase Teen Suicide Risk

Sex and Drug Use Increase Teen Suicide Risk Depression Suicide Print Sex and Drug Use Increase Teen Suicide Risk By Buddy T facebook twitter Buddy T is an anonymous writer and founding member of the Online Al-Anon Outreach Committee with decades of experience writing about alcoholism. Learn about our editorial policy Buddy T Updated on January 20, 2020 Petar Chernaev / E+ / Getty Images More in Depression Suicide Causes Symptoms Diagnosis Treatment Types Childhood Depression Information presented in this article may be triggering to some people. If you are having suicidal thoughts, contact the National Suicide Prevention Lifeline at 1-800-273-8255 for support and assistance from a trained counselor. If you or a loved one are in immediate danger, call 911 immediately. According to the Centers for Disease Control and Prevention (CDC), suicide is the third leading cause of death for teens in the United States.?? The rates of depression and suicide in U.S. teenagers have been increasing for decades.??   Although many factors are involved, several studies suggest that adolescents who engage in high-risk behaviors are more likely to attempt suicide. Research has also suggested that sexual activity and illegal drug use significantly increase teens’ risk for depression, suicidal thoughts, and suicide attempts. Teen Awareness Teens growing up in the U.S. are well aware of the mental health challenges facing their generation: In 2018, a Pew Research survey found 70% of teens aged 13â€"17 consider mental health to be “a major problem” among their peers.??   When teens were asked about specific issues of concern within their peer groups and communities, substance use and teen pregnancy were among the problems noted:   Drug use: 51% of teens considered drug use a major problem among peers.Alcohol use: 45% of teens considered alcohol use a major problem among peers.Teen pregnancy: 34% of teens considered teen pregnancy a major problem among peers. In recent decades, the rates of substance use and sexual activity among U.S. teens have been decreasing, while the rates of depression and suicide have continued to increase.   There’s little doubt these factors can contribute to poor mental health for teens, but the relationship is complex. For adults who are seeking to understand the impact of these factors and behaviors, seeking and reviewing the most recent research, data, and guidelines (as well as considering their context) is key to mitigating the effects and improving the mental health of teens. Teen Suicide Statistics What Research Suggests Around 28% of U.S. high school students have experienced severe depression, and suicide is the third leading cause of death for teens between the ages of 15â€"19. For those who study adolescent mental health, the first step in preventing these rates from increasing (and finding ways to lower them) is figuring out what forces are driving them. In 2004, a team of researchers lead by Denise D. Hallfors, Ph.D., a Senior Research Scientist at the Pacific Institute for Research and Evaluation in Chapel Hill, North Carolina, analyzed various sex and drug behavior patterns via data from a survey of nearly 19,000 teens in grades 7â€"12. The data were gathered from 132 U.S. schools as part of the National Longitudinal Study of Adolescent Health. The researchers divided the teens into 16 groups according to their behaviors, including:   “Abstainers” (completely avoid sex and drugs)Sex “dabblers” (experimentation with sexual behavior)Teens with multiple sexual partnersAlcohol and sex “dabblers”Illegal drug users   How Self-Esteem Influences Risky Sexual Behavior in Teens Teen Sex Pregnancy The teens in the “abstainer” group reported the lowest levels of depression, suicidal thoughts, and suicide attempts, while the teens in groups associated with sex and illicit drug use reported the highest levels.   Teens who were “dabblers” in sex, drugs, alcohol, and tobacco fell somewhere in the middle in terms of depression and suicide risk.   The study found that female teens were less likely than males of the same age to pursue high-risk behaviors. However, the girls who did engage in these behaviors were more vulnerable to depression, suicidal thoughts, and suicide attempts than their male peers. Thats not to say that simply engaging in sexual behaviors means a teen will become depressedâ€"the type and relationship context may make a difference. In 2018, a team of researchers at Cornell found that teens who engage in casual, non-romantic sex or “hookups” may be more prone to developing depression than their sexually-active peers who are in stable relationships.??   Other studies have indicated that sexually-active teens who participate in “sexting” may be more likely to have mental health problems as well as be more likely to be delinquent.?? However, previous research has indicated that academically, teens who are sexually active don’t do any better or worse in school than their abstinent peers.?? While these behaviors and activities may influence mental health for teens who are or become sexually active, they may not be the majority in their peer group.  Data presented in a January 2018 edition of the CDC’s Morbidity and Mortality Weekly Report indicated teens are waiting longer to have sex for the first time. In 1991, 53% of U.S. high schoolers had been sexually active. By 2005, the percentage had fallen to 47%. In 2015, the number of high school students who had ever had sex was down to 41%. In 2017, the rate had dropped to 39.5%.   In fact, the rates of teens having sex have been on the decline for the last several decades.?? One survey from 2018 put the percentage of teens who had ever had sex at just 40%â€"the lowest numbers since tracking began in 1991.??   Substance Use Research from 2018 indicates that teens are using drugs and alcohol at lower rates than in previous decades.?? According to CDC data, alcohol, tobacco, and marijuana continue to be the most commonly used substances by teens in the U.S.?? With the exception of marijuana (the rates for which have remained steady)?? and vaping (which has significantly increased),?? drug and alcohol use among teens has also been declining. In 2018, the rate of use for tobacco was actually the lowest in the survey’s history.   Teens are more likely to use marijuana every day than cigarettes. In response to an annual NIH survey, 71% of high school seniors said they don’t see much harm in using marijuana every day. However, in the same survey, 64% of high school seniors said they disapprove of daily marijuana use.?? Self-reported student data collected by the CDC indicates that the rate of illicit drug use among U.S. teens is declining. In 2007, 22.6% of teens reported they had tried at least one illicit drug. In 2017, only 14% of teens reported ever using drugs.??   Socioeconomic Factors Hallfors’ study also found that the risk of depression for teens is reduced by half if they come from a family of higher socioeconomic status.?? However, at the same time, coming from a higher socioeconomic background increased teens’ risk for suicidal thoughts.??   While the association isnt completely clear, previous research lead by the Federal Reserve Bank in San Francisco in 2010 investigated the high rate of suicides in wealthy California neighborhoods. The study suggested that for higher-income families, social and economic pressure to keep up with others (such as neighbors, colleagues, etc.) likely contributes to stress which in turn raises the risk of depression and suicide.?? The socio-economic circumstances of a teens family may influence their mental and sexual health in other ways. Research has shown that growing up in a low-income family can be a stronger determinant of the age at which a teen becomes sexually active than genetics (which is generally regarded as a prominent influence).?? Studies have shown that female teens who begin having sex at a younger age may be more prone to depression.?? As noted by Pew Research, the downward trend in teen births over the last few decades occurred in the context of an economic recession.?? Historically, birth rates are lower in all age groups during periods of economic depression. While the overall birth rate in the U.S. began to recover as the economy did, however, the teen birth rate did not. In fact, it has continued to fall.  The rates of teen pregnancy and parenthood have been steadily declining over the last decade. In 2018, the birth rate among teen girls was half of what it was in 2008.??   Screening and Treatment At the end of her teams study, Hallfors said doctors treating adolescent patients should “strongly consider” screening teens for depression, as well as assessing their suicide risk if they report having sex and/or using drugs. However, surveys of medical professionals have found that doctors may not be talking about sex?? and drug use?? with teen patients. These findings are concerning, but researchers are hoping to encourage and support these important dialogues between doctors and the adolescents they treat.     Healthcare providers should ask all adolescent patients about sexual activity and drug use. Any teen who reports engaging in the behaviors, especially if more than “dabbling,” needs to be screened for depression and suicide risk.   When talking to teens about the risks of sexual intercourse and drug use, studies have shown that harm reduction approaches are most effective (for example, when compared to abstinence-only sex education).?? Research has also consistently indicated that providing information about and access to contraceptives to teens does not lead to increased sexual activity.?????   Teen Suicide Warning Signs and Prevention A Word From Verywell For teens, emerging sexuality, peer pressure, and exposure to substances can cause stress. Its important that the adults around them (including parents, teachers, coaches, doctors, and counselors) understand how these behaviors can contribute to depression in teens. This includes being aware of the most current research and statistics and being able to use these facts to engage teens when discussing these topics freelyâ€"and without shame. Its also important that preteens and teens have access to accurate and actionable information and resources to help them become more informed about their sexual health. Teenagers also need supportive adults to educate them on and help them recognize the signs of substance use problems. They also need to become familiar with the resources available at school or within their community from which they can seek help if they (or someone in their peer group) is using substances. Myths About Teen Suicide

Sunday, June 21, 2020

FedEx Corporation Essay - 550 Words

FedEx Corporation (Research Paper Sample) Content: FEDEX CORPORATIONFedEx Corporation was formed on 2nd of October 1997 which serves as a holding company of four other subsidiary operating companies. The primary goal of this holding company is to provide policies, do planning, and manage the group of companies. The companys strategy to success has been to operate independently, to compete as a whole group of companies and to manage the group jointly. This has led to the expansion of their various companies due to the emerging macro-economic conditions. The company basically is driven by customer needs by providing them with easily accessible services and good customer experience. This means that these companies goals and strategy is geared towards serving the unique needs of each customer. This is evidenced by the by the facts that, (i), through the FedEx OneCall program, one customer care service provider is assigned to deals with a particulars customer account, (ii), The fedex.com website provides a single point of reference to access all the other companies details with links to their websites, customer care and invoicing information.FedEx Corporation basically provides a broad range of transportation needs, e-commerce and business services which are operated by subsidiary which compete among themselves and also collectively under the umbrella of FedEx brand. The four reputable business segments of FedEx Corporation are FedEx Express, FedEx Ground, FedEx Freight and FedEx Kinkos.There are several fixed assets which are traceable in each of these companies which includes, MD11 aircrafts, package handling equipment, computers, vehicles and facilities. The various costs that are not traceable in in these companies include, customer care cost, pension cost and business realignment costs.A cost centre is a department, a division or part of an entity or an organisation that does not necessarily directly make up the entitys profits, but it adds to the final revenues of the organisation, for example marketing department. A profit centre on the other hand is a specific part of a business that can be easily identified for example a department that contribute directly to the revenues of an organisation but it also has its costs, for instance a store. An investment centre is a critical department of an organisation that is used to control both the revenues and costs of that organisation, for instance in FedEx, Information Technology department.Margin TurnoverReturn on InvestmentFormula= Net operating income =Sales =Margin x Turnover Sales Average operating assetsFedEx ExpressMargin=1414/19485 =7.26% Turnover=19485/13130 =1.5 ROI=7.26*1.5=10.77%FedEx GroundMargin=604/4680 = 12.91% Turnover= 4680/2776 = 1.7 ROI= 12.91*1.7 = 21.76%FedEx FreightMargin=354/3217 = 11% Turnover= 3217/2047 = 1.6 ROI= 11*1.6 = ...

Sunday, May 24, 2020

Reducing Climate Change Canada - 1252 Words

There is something occurring in Canada. You may have lived here all your life and seen it or haven’t never even thought about it once. Over the period from 1948 to 2013 the annual temperature in Canada has warmed by 1.6[Symbol]C {Government of Canada, 2015}. Along with that, the arctic region of Canada has been warming four times faster than the rest of the planet since the 1970’s {Feket, J 2014 McDonald, B 2014}. The glaciers are also melting too. The Melville Icecap has lost 13% of its mass since the 1960’s {Feket, J 2015}. With these facts I have come to a thesis regarding this growing Canadian issue, the citizens of Canada, whether or not they are running the government or helping Canadian businesses grow, they need to do more about†¦show more content†¦Canada is also known for dropping out of the Kyoto Protocol, which included 139 parties. Canada then switched to the Copenhagen Agreement. This agreement wants Canada to cut 17% of its emissions {Me yer,2009}. 4% of emissions have been saved since signing back in 2009. This plan will not work because Canada only reduced 4% of its GHG’s in four years, there is no detailed plan to fix the average 1% decrease by 2020 or the future {Wingrove, J 2015}. Another strategy created by the government is the carbon pricing mechanism. Alberta teamed up with the Climate Control and Emissions Management Act (CCEMA) and placed a tax for carbon emissions on all Canadian Oil companies {CSA Group, 2015}. The tax is $15 per tonne and the CCEMA expects and wants a 12% decrease of oil sands GHG’s each year {CSA Group, 2015}. Canada is an oil producing company and a change like this would need time but we can switch over to less GHG emitting mechanisms {Mansbridge, P 2015}. The CCEMA plan will not be very effective because Canada has done so little to follow its rules and be effective in the past, and now we are even deeper I trouble. If the oil sands didn’t pay much attention to rules of GHG’s before, who says they are going to change now? Major oil company, Keystone XL, uses five flawed key ways to lower GHG emissions {TransCanada, 2015}. Keystone XL says they are lowering the

Monday, May 18, 2020

Cardiology Technologist Program Free Essay Example, 750 words

ï » ¿Entrance for Cardiology Technologist Program Gaining admission into the cardiology technologist program is not just my aspiration but also an ultimate goal. The main motivation and driving force behind this aim of mine is the fact that I can be of help to people who are in the most fragile health conditions due to a failing heart. My father has cardiovascular problems and due to his ailment, my yearning to become a cardiology technologist has multiplied. I wish to explore and gain awareness of what can be done to help him and many others like him. Moreover, I had ended up in a hospital myself, a year ago, and underwent a surgery. At that instant, I realized that I wanted to do something in the medical field. Though I explored various possible fields of study in the medical profession, it did not take me long enough to conclude that cardiology is the one course I would not just be happy in, but would also be able to give it my best, both in terms of output and responsibility. Working in this field would not only bring me satisf action in life, but will also enable me in creating a better life for my daughter and me. Achievements: I have been raising a daughter on my own for the past fourteen years. We will write a custom essay sample on Cardiology Technologist Program or any topic specifically for you Only $17.96 $11.86/pageorder now In spite of being out of school for twenty-three years with an education of only up to grade 9, I was able to pass G. E.D tests and the entrance exam for this course too. Over the past seventeen years, I have successfully worked with mentally and physically disabled children and adults through foster care. I have learnt how to change feeding buttons and perform a colostomy. I have cared for many different people at home on a daily basis, all of whom were physically and mentally challenged. I believe that the experience in handling and caring for people that I have gained over the years will go a long way in helping me develop the sensibilities and tactical expertise required for becoming an exceptionally good cardiology technologist. Personal and professional goals: Through this program, I will be able to achieve a higher education in the field of my choice, make new accomplishments and develop into a more robust and responsible individual. I will be able to live a healthier lifestyle and earn money substantially. Through this, I will be able to chart out a better life for my daughter and afford her university education. I will be able to meet new and insightful people, share ideas and experiences with them, and endeavor into new avenues that were impossible for me to traverse before. Expectations from the program: From this program, I expect to gain hands-on knowledge and expertise in cardiology. I expect great teachers who would always be ready to help if needed, good classrooms where there would be a hearty exchange of ideas and skills, and a great laboratory. On the completion of this program, I expect to be able to start working immediately and achieve the goals I have set for myself. I wish to be able to make a difference in the lives of people who are ailing from a damaged heart, and it would grant me lifelong satisfaction if I were able to save as many lives as I can. Strengths: Due to past experiences, I am emotionally stable and strong, and so, will be able to deal with the emotionally stressful situations that the job calls for. I am a great worker, even under extreme pressure and stress. I am mature and well organized, apart from being a good problem solver. I am emotionally attached and extremely passionate about this field. I am self-confident and reassuring. I have an eye for detail and enjoy working with high-end medical equipment. I respond quickly in case of emergencies and am alert at all times. I am very caring and great with people, especially those requiring medical aid. Since I have been working with disabled children and adults for the past seventeen years, I have developed a knack of handling those who are physically debilitated. To achieve my longstanding goals and ambitions, I really wish to become a successful cardiology technologist. Since I have taken this up as my ultimate goal, it is my utmost desire to be granted admission in the cardiology technologist program, so that I can bring this goal to realization. I am a hard and diligent worker and am always ready to learn. It is due to my fast learning capabilities and the ability to use resources in the most efficient way that has enabled me to achieve the strengths required to be successful in the field. I am sure that I will prove to be a worthwhile cardio-technologist, as it is my belief that everyone has the right to a healthy heart.

Wednesday, May 13, 2020

Should Abortion Be Legal - 1764 Words

In 1973 the court case Roe V. Wade which was settled by the Supreme Court, made abortion legal up until the third trimester of a woman s pregnancy. Abortion is a difficult subject to talk about because we live in a culture that has a mindset of, if one does not agree with us then they must not like us. People all over the United States either feel strongly against or in favor of abortions, which makes presenting our arguments even harder. Abortions may now be legal, but the act of killing an unborn fetus without a voice should be considered murder. Currently I am taking a child development class. I have had the privilege to learn about when life begins in the womb for an embryo which develops into a fetus and getting to know about how the†¦show more content†¦The National Association for the Advancement of Preborn Children says that â€Å"I have learned from my earliest medical education that human life begins at the time of conception†¦. I submit that human life is present throughout this entire sequence from conception to adulthood and that any interruption at any point throughout this time constitutes a termination of human life†(Alcorn, 1998). Many doctors and scientist have proven that there are many different stages of development that people consider life to happen, but the brain and the heart are first to developed. Scientist and researchers have proven that these are the earliest forms of life. Khan Academy, which is an online resource for students that want to learn more about a subject mentions that in order to understand what is alive and what is not the definition of the meaning behind the word refers to anything that has the following properties which include organization, metabolism, homeostasis, growth, reproduction, response, and evolution (What is life, 1). The unborn fetus has almost all of the properties that were listed by Khan Academy on what is a living thing because a baby has multiple cells, thanks to cell division, receive food and nutrients from the mother, the fetus is constantly growing in size, and the cells are multiplying to form organs, skin, and body parts like arms and legs (What is Life, 1). From my own experiences I haveShow MoreRelatedAbortion Should Not Be Legal1647 Words   |  7 PagesOne of the most highly debated topics is abortion and whether or not it should be legal. People who oppose abortion, meaning they are pro-life claim that abortion should be completely illegal with no aspects of it whatsoever; it can be a murder for the people standing against it. The other side of the argument, meaning people who are pro-choice, defend it by believing it to be a right been given to the women. They also claim even if abortion was to be illegal, it would still be practiced. EveryRead MoreAbortion Should Not Be Legal920 Words   |  4 Pagesworld has struggled with for ages and one thing that people are advocating around the world for is abortion. Abortion is either a procedure or pill that stops a fetus s heart. Abortion should not be legal because life beings at creation, abortions are a direct violation of the 14th amendment, and thousands of people would love to adopt a child: handicapped or otherwise. Abortion should not be legal because life begins at creation. What is creation? Some people say conception, but it actually isRead MoreShould Abortion Be Legal?1320 Words   |  6 PagesAbortion, as you all may know, is a really popular topic. There have long been many debates between the two groups, pro-life and pro-choice. People who are pro-life believe that part of the government’s job is to protect all forms of human life. Those who are pro-choice believe that every individual should have control over their own reproductive systems. Pro-life supporters strongly believe that even an undeveloped fetus has life; it is still growing and it needs to be protected. And this soundsRead MoreShould Abortion Be Legal?1217 Words   |  5 PagesNovember 2015 Should Abortion be Legal Among all the issues that have been fought for or against in the United States, abortion may be one of the most popular issues that Americans are passionate about. Abortion is defined as the removal of the embryo or fetus from the uterus in order to end a pregnancy. Thousands of abortions take place every single day, and yet public opinion remains at a standstill as to whether or not abortion is ethical. Everyone holds different opinions on abortion. The proponentsRead MoreAbortion Should Not Be Legal Essay1596 Words   |  7 Pages Abortions have been performed on women for thousands of years. Abortion is the deliberate termination of a human pregnancy. Most often it is performed during the first 20 weeks of being pregnant. The controversy over whether or not abortion should be legal continues to divide Americans till this day. An important landmark case was the Roe v. Wade case, where the Court argued that the zone of privacy was broad enough to encompass a woman s decision whether or not to terminateRead MoreShould Abortion Be Legal? Essay1089 Words   |  5 PagesWhen the word abortion is heard, it is always associated with many negative things such as murder and inhumanity. However not legalizing abortion creates a huge problem for women around the world. Having a child takes consideration, planning and preparation and if pregnancy happens without any of this, why bother to have it at all? The reasons why abortion should be legal is that it supports the fundamental human rights for women by giving them a choice, it reduces crime by reducing the number ofRead MoreShould Abortion Be Legal?1135 Words   |  5 PagesKelsi Hodgkin Composition 1 Professor Chipps 19 October 2015 Should Abortion Be Legal A common debate in the world today involves abortion, the deliberate end of human pregnancy, and whether or not it should be legalized. â€Å"Every year in the world there are an estimated 40-50 million abortions. This corresponds to approximately 125,000 abortions per day† (â€Å"Abortions Worldwide this Year†). On one side of the argument, people are not disturbed by this grotesque number, and on theRead MoreShould Abortion Be Legal?963 Words   |  4 PagesLegal or Illegal? Which would you prefer? Not many are willing to discuss such a gut wrenching topic, but this needs to be addressed. It is a very controversial topic with having to do with women rights and activists. Since there are two sides to every argument, there is one side such as to make abortion legal and the opposing side to keep abortions illegal. In my opinion making abortion illegal can regulate the amount of women who do get pregnant. I believe that making abortions legal will let womenRead MoreShould Abortion Be Legal?867 Words   |  4 PagesABORTION Abortion is a deliberate termination of a human pregnancy, most often performed the first 20 weeks of pregnancy. There are series of legal, moral and ethical issues which may arise about abortion. Most arguments about abortion are often focused on political insinuations and the legal aspect of such actions. Some frequently asked questions’ regarding the issue is if the practice should be outlawed and regarded as murder or should women have the right to practice it. For example, prior toRead MoreShould Abortions Be Legal?939 Words   |  4 PagesShould abortions be legal? Abortions have been a big issue since the Roe v Wade case. There have been a lot of disagreements between the Pro-life supporters and the pro-choice supporters. Pro-life supporters feel like abortions deter murder, while pro-choice supporters believe that the women should be able to make their own decisions. I am a part of the pro-life supporters because I feel like abortions are wrong for several of reasons. Why should women get an abortion if there are other choices for

Wednesday, May 6, 2020

Essay on Personality and Personal Growth - 796 Words

Personality and Personal Growth â€Å"An integral being knows without going, sees without looking and accomplishes without doing† – Lao Tzu The text book definition of Personality is an individual’s unique pattern of thoughts, feelings and behaviors that persist over time and across situations. I agree with this idea that a personality is what makes all of us who we are. I believe that a personality is a combination of innate characteristics that everyone is born with and the sum of total life experiences. I believe that a personality is a portrayal of an individual’s reality. The way that an individual walks, talks, speaks and even the career path that they choose to go on is all a reflection of their personality. I believe that†¦show more content†¦Like my niece teaching me to slow down and look at life more open minded and less judgmental, I also teach her about the responsibilities of life, I guess you could say that we teach each other to find a happy medium. My beliefs can be summarized as follows 1. You must always live your life to the fullest, 2. Make mistakes because that is the only way that you are going to learn, and grow 3. In order to find happiness one must first suffer to discover what is in front of them. These are only three that I found but in my opinion there are many more. I believe that an individual’s growth is determined on the way that they choose to live their life. All beings are given a choice, a fork in the road to follow. Once you have chosen the road to take then the lessons that you come upon are the ones that you are meant to learn. My mom always says to me when I get frustrated that I made the choice to live the life that I am living. The problems that I encounter during this lifetime are the ones that I have to encounter in order to find true happiness. I was once told that when any person is about to come to earth they sign a contract stating that they have different lessons to learn in order to find true happiness, if they do not learn the lessons that they are meant to learn then the challenges to teach them will follow them through to the next lifetimeShow MoreRelatedAnnotated Bibliography On The Implications Of Psychopathic Personality Traits For Successful And Unsuccessful Political Leadership1312 Words   |  6 PagesImplic ations of psychopathic Personality traits for successful and unsuccessful political leadership. Journal of Personality and Social Psychology, 103(3), 489-505. Lilienfeld et al., (2010) examined the attentiveness of psychopathic personality traits that aligned with job performance and leadership of the past presidents including George W. Bush, whereas their successful or unsuccessful behaviors were a matter of public records. The description of a psychopathic personality is conveyed as superficialRead MoreEssay on Annotated Bibliography: Leadership1362 Words   |  6 PagesAnnotated Bibliography Lilienfeld, S. O., Waldman, I. D., Landfield, K., Watts, A. L., Rubenzer, S., Faschingbauer, T. R. (2012). Fearless dominance and the U.S. presidency: Implications of psychopathic personality traits for successful and unsuccessful political leadership.  Journal of Personality and Social Psychology,  103(3), 489 -505. http://library.gcu.edu:2048/login?url=http://search.ebscohost.com.library.gcu.edu:2048/login.aspx?direct=truedb=pdhAN=2012-19403-001site=eds-livescope=site InRead MoreWeek 7 Leadership Paper1424 Words   |  6 PagesDominance and the U.S. Presidency: Implications of PsychopathicPersonality Traits for Successful and Unsuccessful Political Leadership by S.O. Lilienfeld, I.D. Waldman, K. Landfield, A.L. Watts, S. Rubenzer and T. Faschinbauer. Article 2: Impact of personal growth projects on leadership identity development by J. Williams. Article 3: Leadership Styles and AssociatedPersonality Traits: Support for the Conceptualisation of Transactional and Transformational Leadership by R. Van Eeden, F. Cilliers, and V.Read MoreScholarly Empirical Articles On Leadership884 Words   |  4 Pagesworks on the topic of Leadership. The first article to be analyzed is of â€Å"Impact of Personal Growth Projects on Leadership Identity Development† by Odom, Boyd, and Williams (2012) whose purpose was to discuss results from a qualitative research study involving the analysis of personal growth assignments in a personal education collegiate course. The second article examined, â€Å"Leadership Styles, and Associated Personality Traits: Support for the conceptualization of transactional and transformationalRead MorePsychology : The Positive Psychology Movement1269 Words   |  6 Pagesimportant aspects in determining how to enhance the personality by helping individuals recognize their human potential to learn and achi eve. In this assignment one will compare the view points of Maslow, Rogers, and the positive psychology movement concerning individual personality. Recent studies have shown that personality theory and assessment plays an important role in the new era of positive psychology. Positive psychology today, emphasizes that personal strengths and their contribution to an individualRead MoreBehavioral and Social/Cognitive Approaches to Forming Habits Paper1082 Words   |  5 PagesBiological and Humanistic Approaches to Personality Paper PSY/250 Traci Petteway January 12, 2013 University of Phoenix There are similarities and differences when analyzing the components of biological and humanistic approaches to personality. Maslow’s hierarchy of needs express important aspects of biological factors that approaches personality. Abraham Maslow hierarchy of needs focused on a theory of human motivation, management training, and personal development. Maslow divided organismicRead MoreThe Role Of Personality Traits Of A Leader1023 Words   |  5 Pagesleadership and how personality traits of a leader can reflect and affect his or her role. The first article was conducted by Liliendfel, Waldman, Landfield, Watts, Rubenzer, and Faschingbauer in 2012 titled, â€Å"Fearless Dominance and the U.S. Presidency: Implications of Psychopathic Personality Traits for Successful and Unsuccessful Political Leadership† whose purpose is to evaluate and measure the personality of the 42 U.S. presidents. The second article titled as, â€Å"Impact of Personal Growth Projects onRead MoreReliability Is The Credibility For An Item874 Words   |  4 Pagesdiscipline of economics, consumer price index is used to measure the economic growth of a country. However, the limitation of consumer price index is that it only measures the consumption over a period of time, but fails to recognize the standard of living or other factors that indicates the economic growth in a country. Consequently, shared knowledge is limited as only parts of the index is examined, which could contrast with personal knowledge, like individuals who live in the country, might not think theRead MoreAdaptations Are Much More Than A Mere Visual Illustration1504 Words   |  7 PagesGordie’s personality prior to the start of the journey and towards the end of the journey, in order to reveal Gordie’s rapid growth in character. Foremost, the naive Gordie whom the audience is introduced to, at the beginning of the movie, is incomparable to the Gordie with whom we’ve bonded with throughout the journey. At the beginning of the movie, although it is clear that Gordie is far more reliable than his friends, it is made apparent that he has quite a significant amount of personal growth to acquireRead MoreHumanistic Approach1 074 Words   |  5 Pages analyzing the biological and humanistic approaches to personality can be a difference of opinions. Abraham Maslow studied the development of personality. Maslow developed his own personality theory based on the basic human needs. His hierarchy of needs pyramid shows the influences of human needs to the formation of unique individual personality. There are biological factors that influence the formation of individual personality that play a factor. By reviewing the relationships between

Effectiveness of Racial Profiling in Countering Terrorism Free Essays

[Student’s Name] [Professor’s Name] [Subject Code and Title] Is Racial Profiling an Effective Counter Terrorism Measure? The September 11 terror attack on the American soil was followed by a successive wave of events that were aimed at countering terrorism. As the global engagement on terrorism intensified, racial profiling became more pronounced along the corridors of counter-terrorism. Conversely, the employment of racial profiling as an instrument for detecting terror suspects and countering terrorism has elicited sharp criticism from different quarters. We will write a custom essay sample on Effectiveness of Racial Profiling in Countering Terrorism or any similar topic only for you Order Now Even as protagonists of racial profiling reiterate its effectiveness in combating terrorism, dissenting voices lament the flagrant human rights violations and racial segregations borne of racial profiling. This paper critically examines the issues surrounding racial profiling in order to form a benchmark upon which the effectiveness of racial profiling in countering terrorism can be measured. The September 11 attacks on the US soil, which was one of the single worst acts of terrorism in the world’s history, led to the re-emergence of racial profiling in full force. In a desperate effort to bring to book the perpetrators of these attacks, security agencies in the US developed prejudice on Middle-Easterners. These prejudices were then codified into law including additional security measures for Arabs and Muslims leaving and entering the US territory. It is against this backdrop that racial profiling gained prominence not only in the US but also among its allies. This then raises a very pertinent concern as to whether racial profiling is effective in countering terrorism across the globe. Security organs more often than not have based detention and interdiction of suspects primarily on the basis of their race, ethnicity and/or religion. Pickering et al argue that racial profiling occurs against the belief that certain minority groups are more likely to engage in unlawful behavior. They further posit that integrating national security into law has opened up the possibility that racial profiling is inevitable in predicting crime and identifying potential perpetrators of crime. Profiling is however problematic in terms of its effectiveness given the fact that it is not firstly correlated statistically to risk. Secondly, racial profiling is ineffective in substantially narrowing down a pool of potential suspects (60). Therefore, profiling of suspects fails to meet professional law enforcement principles but instead reflect prejudice and discrimination. Nevertheless, the biggest concerns over profiling lie in the invasion of privacy as well as the erosion of fundamental civil liberties. The US has been on the forefront in advocating for the sharing of Passenger Name Records (PNR) information in an effort to single out possible terror suspects. However, this action invariably subjects individuals of particular ethnicities and religions to additional security checks consequently giving leeway to arbitrary discrimination (Muffler 241). What authorities do is basically identify names on the PNR that are Muslim or Arabic in nature. With the perception that Arabs and Muslims are potential terror suspects, they subject bearers of such names to more rigorous security screening. This act does not only discriminate affected individuals but it also produces a large number of false positives. Pickering et al have ascertained that large numbers of false positives divert resources needed to enhance more productive law enforcement activities. Moreover, false positives draws attention away from real threats and this is welcome news for terrorists. To that respect, racial profiling becomes self-defeating in the sense that it overlooks mainstream target groups thus ignoring the real danger of homegrown non-target terror groups (62). In the recent past, we have had terror attacks instigated by native citizens who have been either inspired by radical religious teachings or who are angry with their governments for reasons known to themselves. These individuals are never prioritized by the authorities thus pose a greater danger to national security. Over-emphasis on foreigners paves way for homegrown extremists to plan and execute terror attacks undetected. It is therefore a morally repugnant practice to target individuals as terror suspects based on their race and/or religion. Not all Muslims are terrorists and neither are all people of Arabic origin terrorists. It is really fallacious to generalize Muslims and Arabs as terrorists based on religious and ethnic prejudices. This then means that these individuals who would have otherwise provided intelligence on terror activities become sympathetic to terror groups with whom they share racial and religious inclinations. In the long run, racial profiling degrades social cohesion; it fuels animosity and ends up instigating more terror attacks that it intended to counter in the first place (Pickering et al 62). Racial alienation in the wake of racial profiling has given rise to a new phenomenon referred to as social terrorism. Intolerance experienced in society today has left victims of racial profiling with indelible marks of acute, episodic and vicarious discrimination. Social terrorism shutters minds, bodies and souls with affected individuals developing serious spiritual disturbances. These disorders may include questioning the essence of living, cessation from religious practices as well as loss of vitality and aliveness. Spirituality in particular is at the heart of resilience to adversity among people of color. Attacking a person’s spiritual beliefs therefore creates individuals prone to radical religious teachings. It is the victims of social terrorism that have been found to cause the worst atrocities against humanity since they have nothing to lose after all (Etiony 97). Profiling indeed increases the detection of terrorists attack in the short run. Through racial profiling, terror suspects have been apprehended before initiating their attacks. In the long run however, racial profiling creates the possibility of dangerous substitution. On the current trajectory, there is no empirical evidence whatsoever exploring the use of racial profiling as a counter terrorism measure. This means that we have no idea whether racial profiling is indeed bearing fruits in countering terrorism or not. What we are aware of is how racial profiling has negatively impacted those subjected to it (Center for Human Rights and Global justice 19). It is not my intention to ruffle people’s feathers the wrong way or even stir still waters. To that respect, I will try my very best to keep friendly skies friendly by condemning terrorism unreservedly with the strongest words possible. Terrorism destabilizes democracies by attacking the life and liberties of citizens. It must be met with firmness and increased co-operation among democratic countries. However, inasmuch as we must counter terrorism, we must denounce the escalation of barbaric acts that strike down innocent victims. People do not immigrate to foreign lands just to bomb them but they rather do so to appreciate the quality of life in these foreign countries. It is therefore incumbent upon the citizens of resident countries to welcome these foreigners and help them integrate in their communities. When all is said and done, it is imperative that we win the war on terrorism if we desire to make the world a peaceful haven. This war will not however be won through covert and coercive methods of intelligence gathering. Law enforcement agencies must desist from hiding their laziness and inefficiencies behind racial bigotry. What is needed is development of security structures for sharing intelligence between security agents and citizens on counter terror activities. Security agencies can no longer afford to guard terrorism as a top secret since terrorism affects all people regardless of their status in society. Fundamental rights must never become casualties of the politics of fear that have characterized States’ response to the war on terror. A faithful adherence to human rights incorporated in international, regional, and domestic law is the only sure way of securing and protecting all persons. Works Cited Center for Human Rights and Global Justice. Irreversible Consequences: Racial Profiling and Lethal Force in the War on Terror. NY: NYU School of Law, 2006. Print. Etiony, Aldarando. Advancing Social Justice Through Clinical Practice. NJ: Lawrence Eribaum Associates, 2008. Print. Muffler, J. Steven. Racial Profiling: Issues, Data and Analyses. NY: Nova Science P, 2006. Print. Pickering, Sharon, McCulloch and Wright-Neville David. Counter-Terrorism Policing: Community, Cohesion and Security. NY: Springer, 2008. Print. How to cite Effectiveness of Racial Profiling in Countering Terrorism, Essay examples

Online Dating and Relationships for Internet †MyAssignmenthelp

Question: Discuss about theOnline Dating and Relationships for Internet. Answer: Introduction Although online dating has provides a platform to users to find their compatible match and engage in a long term relationships, it has attracted some serious cyber-crimes and online frauds which has to be kept in mind before starting an online dating relationship. Online dating is a very popular concept in todays age of technology. The technology has entered into every aspect of our lives, the reason being convenience and time. The Internet being the most valuable gift of technology has exposed individuals to a variety of choices when it comes to meeting and interacting with new people without restricting to a geographical area. Interacting with people online and engaging in a romantic relationship with them is known as online dating. Unlike the conventional face to face dating, this gives an opportunity to potential singles to find dates whenever they want. There is a common platform usually a dating site where individuals choose and select their partner based on their preferences with a common goal of developing and maintaining a personal and romantic relationship. To use the services of such dating sites, the users have to create their profile which includes their picture, brief information consist of matching preferences. Match.com is a very popular dating site which allows individual to connect and date online users based on common set of preferences. Online dating in a fast paced life has enabled single individuals to socialize and meet with like-minded individuals. This has contributed greatly in the overwhelming success of online dating (Rosenfeld Thomas, 2012). Online dating has provided an opportunity to start a serious real world relationship and find a committed and loving partner. But the grass is not always greener on the side. Apart from having advantages, there are many drawbacks too associated with online dating. The Advantages of Online Dating: Online Dating sites give an opportunity to individuals to access variety of date profiles irrespective of the cultural or geographical restrictions. In real life the opportunity to meet the individual who will have the similar topics of interest like yours is very difficult because the search is limited to a close circle, clubs or any other accessible public places. Another reason for popularity of online dating is that it saves a lot of time. There are people who do not get an opportunity to meet someone who interest them due to their busy schedule. But online dating gives them a benefit of convenience to login anytime, anywhere and find someone who interest them (Nicholson, 2014). It also gives confidence to someone who is not able to interact in the real world. Also, these dating sites gives an insight into the lives of the potential dates and allow the user to select and reject individuals by maintaining anonymity without hurting them emotionally. These dating services also increase the chance of finding a future spouse. When an individual selects from the wide ranges of applicants with similar mindsets and interests, there are chances of compatibility with another increases. If the selected user is compatible then the scene progresses from online chatting ,to telephonic conversation and then end up meeting personally. If things worked out in favor of both, then there are chances of future commitment else one can always find the next option (Hitsch, Hortacsu Ariely, 2010). Cost saving is another added advantage to the online dating. The real time date can be an expensive one and it may not prove to be a start of a successful romantic relationship but online dating gives an individual many chances of selecting the right one before a real encounter. Online dating sites also give the benefit of customizing individuals search. It involves selecting the dating partner based on ones choice of interest and preferences. Not only this it also gives the clear idea about the intentions of other individual without assuming what they want casual dating or a long term relationship. The Disadvantages of Online Dating: As discusses above, online dating sites provides an unlimited access to potential dates profile. This means people find hard to commit to a single person when they have variety of other options available at fingertip. People see this as a casual dating or a hook up opportunity rather than finding a serious love. Online dating builds a lot of unrealistic expectations. People over the digital platform portray themselves according to their own choices. Airbrushing pictures, exaggerating about the personal information is seen as an easy medium to impress the potential date irrespective of the reality (Hancock, Toma Ellison, 2007). When one is involved in online dating there are chances that they have a long distance relationship surviving on the technology. You cannot actually know about the person living or chatting on the other side and they may not be reliable partners as they represent themselves on internet (Adams, 2015). Safety is the major drawback in online dating services. People often join these sites with an expectation to find a romantic relationship but end up being harassed mentally and emotionally. There are a lot of cases where two people came close and sometimes exchanged intimate photos which got leaked over internet. The harassment faced online can lead to consequences such as suicide. Another problem with online dating is internet connectivity; there are some areas which are still not technologically advanced which means it is difficult to avail the benefits of dating services in such areas. Also, even if someone finds their date in some other country or any far distance may create distance issues which may prove to be a hindrance in maintaining a long term relationship. Online dating also gives an implied authority to the potential dates to access the personal information shared during chatting or through the personal profile which includes pictures and other personal information, the information can be stored easily and may be used against the owner of that information. The most common type of activity is cyber bullying. There are people who are only involved in online dating to satisfy their sexual needs and they engage in conversation with individuals and deceive them by misrepresenting about their identity and leave them once there purpose if fulfilled. Creating a false profile is an easy way to trap innocent people who want to involve in a serious relationship but end up being exploited and harassed sexually (Smith Duggan, 2013). References Adams, R., 2015, 7 Drawbacks of Online Dating, According To Science, Accessed from https://www.huffingtonpost.in/entry/online-dating-science_n_7745108 on 19 May 2017. Hancock, T.J., Toma, C. Ellison, N., 2007, The Truth about Lying in Online Dating Profiles, Accessed from https://collablab.northwestern.edu/CollabolabDistro/nucmc/p449-hancock.pdf on 19 May 2017. Hitsch, G., Horatacsu, A., Ariely, D., 2010, Matching and Sorting in Online Dating, American Economic Review, Accessed from https://home.uchicago.edu/~ghitsch/Hitsch-Research/Guenter_Hitsch_files/Online-Matching-Sorting.pdf on 19 May 2017. Nicholson, J., 2014, Pros and Cons of Online Dating, Accessed from https://www.psychologytoday.com/blog/the-attraction-doctor/201404/pros-and-cons-online-dating on 19 May 2017. Rosenfeld, J.M., Thomas, J.R., 2012, Searching for a Mate: The Rise of the Internet as a Social Intermediary, Accessed from https://web.stanford.edu/~mrosenfe/Rosenfeld_How_Couples_Meet_Working_Paper.pdf on 19 May 2017. Smith, A., Duggan, M., 2013, Online Dating Relationships, Accessed from https://www.pewinternet.org/files/old-media/Files/Reports/2013/PIP_Online%20Dating%202013.pdf on 19 May 2017.

Monday, May 4, 2020

Security in Cellular Networks and Security in Wireless Sensor Networks

Question: Describe about the security in cellular networks and security in wireless sensor networks? Answer: Introduction Networks are evolving in its shape and functionalities very rapidly. Other than traditional networks, now we can see, different kinds of data communication networks around us. In our day-to-day life, we use numerous amounts of networks. Other than computers, we can use mobile and other types of cellular devices to access the Internet. Thus there are various techniques behind these facilities. Certainly a network of cellular devices, will not have the same component of a computer network, but the functionalities are quiet similar. These cellular networks also facilitates voice communication along with data transmission, internetworking. Thus the technologies are more complex. On the other hand, cellular networks are quiet new now in terms of data communications. Advancement in information and communication technologies are making these networks more robust and functional still there is a long way to go. Other than the technologies and functionalities, a big issue with any type of information sharing network is security. For cellular network, security of the data is essential. A common IT buzzword in recent days is Internet of Things. Other than computers, mobiles etc. there are number of smart devices now a days. Those devices share data across network and Internet. These devices are tiny sensors and the networks they are connected to are generally wireless networks. A wireless sensor network will have limited objective and functionalities, but they also take part in internetworking, data communication etc. Thus it also has security issues. (Vacca, 2013) In the rest of this report, I will be discussing the security in cellular networks and wireless sensor networks in details. The technologies used in both cases will be critically reviewed and several security aspects will be discussed. Technical Description Topic 1 Security in Cellular networks Cellular communication has become an important part of the communication networks around the world. Other than using voice-based communication through cellular phones, now Internet can be accessed through cellular networks. Activities like monetary transactions, sending important communication messages etc. are now very common. Day by day new services are being added over cellular networks. Cellular networks are solely dependent on wireless communication media and networks. There are many advantages of cellular networks. But there are certain disadvantages and security issues too. Limitation of wireless communication media has imposed several difficulties on the implementation of security principles like confidentiality, integrity and authentication to the cellular networks. (Mishra, 2008) Generation and Technologies behind Cellular Networks Cellular networks are working since 1980s. There are a number of generations of cellular networks. Each generation has its own technologies, benefits and challenges. The generations so far are, 1G, 2G, 3G and 4G. 4G cellular networks are rolling out but currently; the mostly used cellular network is the use of 3G networks. During the 1980s, 1G networks were used. It has a maximum of 9.6 Mbps speed. It was known as Advanced Mobile Phone System or AMPS in US and Nordic Mobile Telephony or NMT in European countries. The data used to be transmitted in a continuous waveform through analog modulation technologies. 1G cellular networks had security issues like lack of encryption, misuse of frequency spectrum etc. Then 2G cellular networks came into the picture and still these networks are in use in various parts of the world. These networks are also called Personal Communication Services or PCS. In 2G, digital modulation had been introduced. It overcomes various limitations of 1G. Technologies like Code Division Multiple Access or CDMA, Time Division Multiple Access TDMA, digital AMPS, Global system for Mobile Communication or GSM communication, Personal Digital Cellular or PDC etc. are used in 2G, in different countries. 1G communication networks were improved into 2G cellular networks. But the improvements were mainly in case of voice communication. Data transmission was still poor. An improvement of 2G, called 2.5G helped in better data communication over 2G networks. It bridged the gap between 2G and 3G networks. Technologies like EVDO, High Speed circuit switched data or HSCSD, enhanced GPRS, and EDGE etc. are examples of 2.5G cellular networks. (Halonen, et al., 2004) Then it was 3G networks. It provides faster Internet surfing than previous generations, supports video telephony. The main technologies used in 3G cellular networks are, CDMA 2000, Wideband CDMA or WCDMA, Time Division Synchronous Code Division Multiple Access or TD-SCDMA. Before fully deployment of 3G cellular networks, 4G cellular networks have started to be introduced in various parts of the world. 4G cellular networks will provide faster data transmission than 3G. It is expected that it will support near about 20 Mbps data rates. 4G supports wide array of next generation Internet technologies like Mo-IP, IPv6 etc. It will be cheaper yet more powerful. It is capable of supporting communication among mobile vehicles up to 250km/hour speed. (Pierre, 2010) Technologies in 2G and 2.5G The most widely accepted cellular technology is 2G and its later version of 2.5G. Short Messaging Service or SMS is a service in cellular networks than transfers text based messages between two cell phones. Larger messages are broken down into pieces before transmitting. Some other technologies in 2G and 2.5G networks are, High-Speed Circuit-Switched Data or HSCSD It provides faster data transmission than GSM. The speed can go up to 115 Kbps. But, it cannot carry larger bursts of data. And, that is why; GPRS is more popular than HSCSD. General Packet Radio Service or GPRS GPRS provides data transmission for larger bursts of data. This is facilitated by addition of two components in the cellular networks. Those are Service GPRS support Node or SGSN and Gateway GPRS support Node or GGSN. SCGN helps in implementing security in the access control and mobility. On the other hand GGSN supports connection to external packet switched networks. (Heine Sagkob, 2003) Enhanced Data Rates for GSM Evolution or EDGE This is a standard used in GSM technology. It is based on GMSK modulation techniques and uses 8PSK modulation. The data rate can go up to 384 kbps. (Seurre, et al., 2003) Cellular Digital Packet Data or CDPD This is a data service based on transmission of data packets. It is also able to detect some idle voice channel and further use of those channels for traffic management without harming voice communication. There are different variations of this technology in different countries. For example CDMA is used in USA for primary 2G networks, CDMAOne or IS-95a is the primary CDPD technique. It was capable of serve number of users than GSM and TDMA. The speed can go from 14.4 kbps to 115.2 kbps with CDMATwo extension. In 2.5G cellular networks, there are two techniques of CDMA. Those are 1xEVDV and 1xEVDO. The former one is used for data and voice transmission based on one radio frequency channels. The other one is used for same purpose but through separate channels. (Arokiamary, 2009) Technologies in 3G cellular networks 3G are focused on mobile networking based on worldwide standard and through a common frequency band. A new mobile network infrastructure called International mobile telecommunications 2000 or IMT 2000 was developed for supporting 3G cellular networks worldwide. 3G can support data transmission rate up to 2Mbps in 2 GHz frequency range. The main objectives of 3G cellular networks were set as, Supporting a wide range of services for voice and data communication without limitations of the geographic location. Supporting coverage of the network over a wide area and accommodating different kind of mobile stations. Supporting and expanding the services beyond constraints like inefficient spectrum, radio transmission, system economics etc. Supporting best QoS. Supporting an open architecture for easy deployment of different types of application. Supporting a modular architecture so that the size and complexity of the systems becomes manageable. 3G technologies are based on UMTS. UTMS provides Radio Access Network or RAN and the core network or CN. A RAN can have GSM, GPRS systems with connection to packet switched CNs even circuit switched CNs. To transit into a 3G network, it needs to connect to UTRAN systems. A UTRAN system has several sub systems. Each of these sub systems will have a Radio Network Controller or RNC. These are connected to a number of Base Transceiver Stations or BTN. UTMS provides the basic security implementation in 3G networks. (Hu Qian, 2013) Security in Cellular networks There are different kinds of security issues and attacks in cellular networks. These issues are closely related to the architecture and technologies of different cellular networks. With the advancements of cellular networks through different generations, these issues and attacks have become more common that there are difficulties in conforming to the basic security principles of confidentiality, integrity and availability. The security issues in cellular networks are, Confidentiality As the scope and application of cellular phones and networks in sensitive data transmissions are rising up, the confidentiality of all the information is becoming a serious issue. Integrity Integrity of the data and voice communication through the cellular networks is an essential part. It ensures that data has been transmitted properly from the sender to the receiver and no data is lost or modified whilst transmission. Authentication There is huge number of subscribers in cellular networks. It needs authentication to ensure that each of these subscribers are legitimate. 3G networks allow communication from people to different parts of the world. There may be problems related to cross-regions and cross service providers. Authentication may become an issue in cellular networks. A good authentication method will help to overcome these issues. Other security concerns are related to proper access control, web services and operating systems used in the cellular devices etc. some of the security issues are, Access control Access control to the data in the cellular devices may become an issue if there is any restricted data sharing among devices and across the networks. Web services Web services in cellular devices makes the devices and data exposes the devices and data to risks related to HTTP protocols. For example, issues like denial of services or DoS, buffer overflow, viruses etc. Operating system Cellular devices are small devices. There are different kinds of operating systems on different platforms, vendors etc. compatibility among these heterogeneous operating systems is an issue and may open up several security loopholes or vulnerabilities. Location detection Due to the privacy protection issues of the user, the actual location of a cellular device needs to be hidden. But, as the cellular networks are moving towards IP based networks, there are common issues that link to access point location etc. and this is leading towards the compromise of privacy, location, detection and sharing. Content Download Cellular networks let the user download different type of content from different sources just like traditional computer networks and Internet. Whilst downloading, adware may affect the user, and that may become a security issue. While the content is downloading, another issue is digital rights management. Users may download copyrighted content such as music, images, video etc. and there may be violation of the digital rights. Malware and virus Malware and viruses have become a daunting issue in case of cellular networks and cellular devices also. Liberty is the first virus that affected cellular networks and this was a part of a large occurrence of denial of service or DoS. Security of cellular devices The physical security of a cellular device is also a security issue. As these devices contains data, so there may be unauthorized access to those data and breach of security. Different types of attacks Different types of security attacks also affect cellular networks. The infrastructure is open to different types of attacks. They are as follows; Denial of Services or DoS and Distributed DoS or DDoS. Jamming of channels Eavesdropping Unauthorized access Forgery of message Man in the middle Message replay Session hijacking Etc. Counter measures There are several counter measures of the security attacks in cellular networks. Some of those are, In case of 3G cellular networks, UTMS is common and good security architecture. It has been developed based on the security measurements in 2G networks. Thus the robustness of the 2G networks are retained. Further the security implementations are extended. (Kaaranen, 2005) Wireless application protocol or WAP. Interlayer security in 4G networks. Use of cryptographic algorithms in data communication. Use of firewalls and antivirus. Use of advanced OS like Android etc. that have in built security infrastructure. Critical Review Cellular networks are widely used for long time. There are lots of technology and security measurements available for cellular networks. Wireless communication channels have some inherent security issues. Those are more prone to various information security attacks. But in case of cellular networks, security seems to be an important consideration and there are several counter measurs available to different types of cellular networks. Technical Description Topic 2 Security in Wireless Sensor Networks A wireless sensor network is a wireless communication network of tiny actuators and sensors. Wireless sensor networks have some specific purpose and usually those are used for monitoring different attributes of the environment. The micro sensors are low power and low computing resource devices. In a remote wireless sensor network, huge numbers of sensors are deployed densely. These sensors nodes are used to perform signal processing, routing and data communication. These are self-configurable in nature, scalable and have longer lives. In spite of several advantages and applications of WSN, there are significant security concerns. (Liu Ning, 2007) Architecture of a Wireless Sensor Network A WSN has different constituting components. Those are, a. Sensor nodes These sensor nodes are called sometimes as motes. A node can perform specific monitoring activities or routing activities. Thus a router in a WSN will have additional routing functionalities. Nodes do not interfere with one another. b. Gateway A gateway supports communication between nodes and external network like Internet. c. Network manager A network manager configures the network, schedules the communication process, manages and monitors the routing process, routing table etc. d. Security manager It manages the generation of data, storage and management of the same securely. (Sohraby, et al., 2007) Security analysis of a WSN The nodes in a WSN are simple enough and that makes the WSN simpler and popular. But this simplicity makes these networks more vulnerable from the security view point. WSNs suffers from different kinds of security attacks. For example, eavesdropping, injection of bits, packet replay etc. To make a WSN secure, it needs successful implementation of all security principles like confidentiality, integrity and availability along with other kind of security mechanisms and techniques. (Lpez Zhou, 2008) Attackers can easily mock a legitimate sensor code, damage any node. All these are easy with the sensor nodes as there is very little scope to secure these nodes. Those are low power consuming and limited computing resource devices. Thus implementation of some security measurements on those devices is really challenging. Some of the important and common categories of security attacks on WSNs are, Denial of Service or DoS There are several attacking techniques to attack a WSN. In a DoS attack the WSN network is made unavailable to the legitimate users. Or the capacity of the network is reduced deliberately so that the network fails to perform its activities. Different techniques of DoD attacks are, Jamming in physical layer. This is done by sending an interfering radio signal to the radio frequencies of the WSN. Basically, it is a process of interrupting the WSN by sending some interfering signal. Tampering in physical layer by causing damage of nodes. For example, reverse engineering can be used for this purpose. Collisions, exhaustion, unfairness etc. in data link layer. Homing, spoofing, flooding, black holes etc. in networking layer. De-synchronization, flooding etc. in transport layer. Interrogation attack in data link layer. Sybil Sybil is malicious device illegitimately taking on multiple identities type of attacks in WSNs. A single node can have multiple presence in a WSN as a result of this attack. Thus, it will reduce the effectively and fault tolerance of the network. The routing protocols are ale affected by this attack. Sybil attack can happen in physical layer, data link layer and network layer. In data link layer, the technique is data aggregation and voting. Wormhole In this kind of attack, an adversary sits near the base station and creates a wormhole in the network. Under this attack, the messages from the adversary are tunneled to one part of the network through some low latency link, then those are replayed in other parts of the network. A compromised node can play the role of the adversary. This attack happens in network layer. This is basically a routing based attack to disrupt the whole network. Black hole Black hole or sink hole attacks are carried out by compromising a node that is more attractive to its neighbor nodes in terms of some routing algorithm implemented in that WSN. This kind of attacks can be a part of another attack like selective forwarding. This type of attacks happen in network layer. Routing Information Manipulation Attacks of this type happens due to manipulation of routing information of the network. Selective Forwarding This kind of attack happens in network layer. Malicious nodes work like black holes. Messages are dropped by those nodes. Or the adversary can use these nodes to forward selective messages to the network. Flooding with Hello Packets Hello packets are forwarded by different protocols in a WSN. This is for knowing which nodes are within the range of data transmission. There may be some laptop class attack that may broad case information with more transmission power and convince some other node that the node is within the range. As a result it may take part in data transmission of the victim network. This happens in network layer. Spoofing Spoofing of the acknowledgement messages is very common in a WSN. This special kind of spoofing is called acknowledgement spoofing. There are various other types of attacks. Some of those are, cloning, impersonation, eavesdropping, traffic analysis, mote class, laptop class invasive and non-invasive etc. Counter measures Several countermeasures have been taken to secure WSNs from these wide ranges of security attacks. But the inherent architecture and constraints of a WSN makes those more prone to attacks. Still there are counter measures to combat with these attacks. Some of those counter measures are, a. Link layer security for outsider attacks Simple encryptions and authentication at link layer can save from major outsider attacks. This is done by a globally shared encryption public key. Attacks like wormholes, flooding by hello packets etc. can be prevented in this way. Even if an advisory is stopped from joining to a network, he/she cannot stop from being attacking the network through wormholes kind of attacks. Other link layer security mechanisms like described above cannot save a WSN from insider attacks like black holes, selective packet forwarding etc. b. Countermeasures for Sybil attacks Insider attacks are originated from within the network. Sharing of a global key can help the insider attacker to masquerade any node. There should be verification of the entities. Public key cryptography can help in this case however, generation and verification of digital signatures is not possible by the sensor nodes. A possible solution is to use unique symmetric key by each node, acquired from some trusted base station. Protocols like Needham-Schroeder can be used for verification the identities. To prevent insider attacks from a stationery network is possible by enforcing limitations on some compromised node. c. Countermeasures for help packet flooding Verification of a bi-directional sink can be useful to prevent attacks from hello packet flooding. d. Countermeasure for wormhole and black home attacks These kind of attacks are difficult to deal with. When these two types of attacks are combined in some network, then it becomes more difficult. Wormholes use some out of band and private channel for attack. This is generally invisible to the rest of the part of the WSN. On the other hand black holes or sinkholes are difficult because in this cases, the adversary use remaining energy of the nodes. The routing topology is used and the verification is harder. Routes having minimum hop count to a base station, can be verified easily. But in case of a wormhole attack, the hop count may be completely misinterpreting. Sinkholes can be easily created as there is no defender to verify the identity. A detection technique for wormholes can be very time consuming and requires high synchronization. Thus is not usable in sensor networks. (Patil Szygenda, 2013) Other types of countermeasures can be, Use of probabilistic selection and leveraging of global knowledge. This is difficult to implement due to the self-organizing nature of the nodes. There may be authenticated flooding and broadcasting. Critical Review Wireless sensor networks are an emerging field. These are being used for various types of networks and applications. In most of the cases those are used for monitoring purpose. Sensor networks are also a type of wireless networks but there are inherent differences between sensor networks when compared to IP networks. Thus, there are several other specific issues related to sensor networks. There is no issues with performance of the sensor networks. But as already described, security is a serious issue with sensor networks and there is some relation of security to performance. Rather there is a trade of between these two. Conclusion In this paper, two topics in network security has been discussed in details. The topics are security in cellular networks and security in wireless sensor networks. Both of these networks are different than traditional computer networks, quite new in operation. Both of these are becoming stronger with researches and application. However, security is a common issue for both of these. Types of security attacks and counter measures are different in both of the cases. In this paper those security aspects and counter measures are discussed in details. References Arokiamary, V. J., 2009. Mobile Communications. s.l.:Technical Publications. Chandrasekhar, V. Andrews, J. G., 2009. Spectrum allocation in tiered cellular networks. IEEE Transactions on Communications, 57(10), pp. 3059-3068. Halonen, T., Romero, J. Melero, J., 2004. GSM, GPRS and EDGE Performance. s.l.:John Wiley Sons. Heine, G. Sagkob, H., 2003. GPRS. s.l.:Artech House. Hu, R. Q. Qian, Y., 2013. Heterogeneous Cellular Networks. s.l.:John Wiley Sons. Kaaranen, H., 2005. UMTS Networks. s.l.:John Wiley Sons. Liu, D. Ning, P., 2007. Security for Wireless Sensor Networks. s.l.:Springer Science Business Media. Lpez, J. Zhou, J., 2008. Wireless Sensor Network Security. s.l.:IOS Press. Mishra, A., 2008. Security and Quality of Service in Ad Hoc Wireless Networks. s.l.:Cambridge University Press. Nichols, R. K. Lekkas, P. C., 2002. Wireless security. New York: McGraw-Hill. Patil, H. K. Szygenda, S. A., 2013. Security for Wireless Sensor Networks using Identity-Based Cryptography. s.l.:CRC Press. Pierre, S., 2010. Next Generation Mobile Networks and Ubiquitous Computing. s.l.:Idea Group Inc. Seurre, E., Savelli, P. Pietri, P.-J., 2003. EDGE for Mobile Internet. s.l.:Artech House. Sohraby, K., Minoli, D. Znati, T., 2007. Wireless Sensor Networks. s.l.:John Wiley Sons. Vacca, J. R., 2013. Network and System Security. s.l.:Elsevier.