Sunday, May 24, 2020

Reducing Climate Change Canada - 1252 Words

There is something occurring in Canada. You may have lived here all your life and seen it or haven’t never even thought about it once. Over the period from 1948 to 2013 the annual temperature in Canada has warmed by 1.6[Symbol]C {Government of Canada, 2015}. Along with that, the arctic region of Canada has been warming four times faster than the rest of the planet since the 1970’s {Feket, J 2014 McDonald, B 2014}. The glaciers are also melting too. The Melville Icecap has lost 13% of its mass since the 1960’s {Feket, J 2015}. With these facts I have come to a thesis regarding this growing Canadian issue, the citizens of Canada, whether or not they are running the government or helping Canadian businesses grow, they need to do more about†¦show more content†¦Canada is also known for dropping out of the Kyoto Protocol, which included 139 parties. Canada then switched to the Copenhagen Agreement. This agreement wants Canada to cut 17% of its emissions {Me yer,2009}. 4% of emissions have been saved since signing back in 2009. This plan will not work because Canada only reduced 4% of its GHG’s in four years, there is no detailed plan to fix the average 1% decrease by 2020 or the future {Wingrove, J 2015}. Another strategy created by the government is the carbon pricing mechanism. Alberta teamed up with the Climate Control and Emissions Management Act (CCEMA) and placed a tax for carbon emissions on all Canadian Oil companies {CSA Group, 2015}. The tax is $15 per tonne and the CCEMA expects and wants a 12% decrease of oil sands GHG’s each year {CSA Group, 2015}. Canada is an oil producing company and a change like this would need time but we can switch over to less GHG emitting mechanisms {Mansbridge, P 2015}. The CCEMA plan will not be very effective because Canada has done so little to follow its rules and be effective in the past, and now we are even deeper I trouble. If the oil sands didn’t pay much attention to rules of GHG’s before, who says they are going to change now? Major oil company, Keystone XL, uses five flawed key ways to lower GHG emissions {TransCanada, 2015}. Keystone XL says they are lowering the

Monday, May 18, 2020

Cardiology Technologist Program Free Essay Example, 750 words

ï » ¿Entrance for Cardiology Technologist Program Gaining admission into the cardiology technologist program is not just my aspiration but also an ultimate goal. The main motivation and driving force behind this aim of mine is the fact that I can be of help to people who are in the most fragile health conditions due to a failing heart. My father has cardiovascular problems and due to his ailment, my yearning to become a cardiology technologist has multiplied. I wish to explore and gain awareness of what can be done to help him and many others like him. Moreover, I had ended up in a hospital myself, a year ago, and underwent a surgery. At that instant, I realized that I wanted to do something in the medical field. Though I explored various possible fields of study in the medical profession, it did not take me long enough to conclude that cardiology is the one course I would not just be happy in, but would also be able to give it my best, both in terms of output and responsibility. Working in this field would not only bring me satisf action in life, but will also enable me in creating a better life for my daughter and me. Achievements: I have been raising a daughter on my own for the past fourteen years. We will write a custom essay sample on Cardiology Technologist Program or any topic specifically for you Only $17.96 $11.86/pageorder now In spite of being out of school for twenty-three years with an education of only up to grade 9, I was able to pass G. E.D tests and the entrance exam for this course too. Over the past seventeen years, I have successfully worked with mentally and physically disabled children and adults through foster care. I have learnt how to change feeding buttons and perform a colostomy. I have cared for many different people at home on a daily basis, all of whom were physically and mentally challenged. I believe that the experience in handling and caring for people that I have gained over the years will go a long way in helping me develop the sensibilities and tactical expertise required for becoming an exceptionally good cardiology technologist. Personal and professional goals: Through this program, I will be able to achieve a higher education in the field of my choice, make new accomplishments and develop into a more robust and responsible individual. I will be able to live a healthier lifestyle and earn money substantially. Through this, I will be able to chart out a better life for my daughter and afford her university education. I will be able to meet new and insightful people, share ideas and experiences with them, and endeavor into new avenues that were impossible for me to traverse before. Expectations from the program: From this program, I expect to gain hands-on knowledge and expertise in cardiology. I expect great teachers who would always be ready to help if needed, good classrooms where there would be a hearty exchange of ideas and skills, and a great laboratory. On the completion of this program, I expect to be able to start working immediately and achieve the goals I have set for myself. I wish to be able to make a difference in the lives of people who are ailing from a damaged heart, and it would grant me lifelong satisfaction if I were able to save as many lives as I can. Strengths: Due to past experiences, I am emotionally stable and strong, and so, will be able to deal with the emotionally stressful situations that the job calls for. I am a great worker, even under extreme pressure and stress. I am mature and well organized, apart from being a good problem solver. I am emotionally attached and extremely passionate about this field. I am self-confident and reassuring. I have an eye for detail and enjoy working with high-end medical equipment. I respond quickly in case of emergencies and am alert at all times. I am very caring and great with people, especially those requiring medical aid. Since I have been working with disabled children and adults for the past seventeen years, I have developed a knack of handling those who are physically debilitated. To achieve my longstanding goals and ambitions, I really wish to become a successful cardiology technologist. Since I have taken this up as my ultimate goal, it is my utmost desire to be granted admission in the cardiology technologist program, so that I can bring this goal to realization. I am a hard and diligent worker and am always ready to learn. It is due to my fast learning capabilities and the ability to use resources in the most efficient way that has enabled me to achieve the strengths required to be successful in the field. I am sure that I will prove to be a worthwhile cardio-technologist, as it is my belief that everyone has the right to a healthy heart.

Wednesday, May 13, 2020

Should Abortion Be Legal - 1764 Words

In 1973 the court case Roe V. Wade which was settled by the Supreme Court, made abortion legal up until the third trimester of a woman s pregnancy. Abortion is a difficult subject to talk about because we live in a culture that has a mindset of, if one does not agree with us then they must not like us. People all over the United States either feel strongly against or in favor of abortions, which makes presenting our arguments even harder. Abortions may now be legal, but the act of killing an unborn fetus without a voice should be considered murder. Currently I am taking a child development class. I have had the privilege to learn about when life begins in the womb for an embryo which develops into a fetus and getting to know about how the†¦show more content†¦The National Association for the Advancement of Preborn Children says that â€Å"I have learned from my earliest medical education that human life begins at the time of conception†¦. I submit that human life is present throughout this entire sequence from conception to adulthood and that any interruption at any point throughout this time constitutes a termination of human life†(Alcorn, 1998). Many doctors and scientist have proven that there are many different stages of development that people consider life to happen, but the brain and the heart are first to developed. Scientist and researchers have proven that these are the earliest forms of life. Khan Academy, which is an online resource for students that want to learn more about a subject mentions that in order to understand what is alive and what is not the definition of the meaning behind the word refers to anything that has the following properties which include organization, metabolism, homeostasis, growth, reproduction, response, and evolution (What is life, 1). The unborn fetus has almost all of the properties that were listed by Khan Academy on what is a living thing because a baby has multiple cells, thanks to cell division, receive food and nutrients from the mother, the fetus is constantly growing in size, and the cells are multiplying to form organs, skin, and body parts like arms and legs (What is Life, 1). From my own experiences I haveShow MoreRelatedAbortion Should Not Be Legal1647 Words   |  7 PagesOne of the most highly debated topics is abortion and whether or not it should be legal. People who oppose abortion, meaning they are pro-life claim that abortion should be completely illegal with no aspects of it whatsoever; it can be a murder for the people standing against it. The other side of the argument, meaning people who are pro-choice, defend it by believing it to be a right been given to the women. They also claim even if abortion was to be illegal, it would still be practiced. EveryRead MoreAbortion Should Not Be Legal920 Words   |  4 Pagesworld has struggled with for ages and one thing that people are advocating around the world for is abortion. Abortion is either a procedure or pill that stops a fetus s heart. Abortion should not be legal because life beings at creation, abortions are a direct violation of the 14th amendment, and thousands of people would love to adopt a child: handicapped or otherwise. Abortion should not be legal because life begins at creation. What is creation? Some people say conception, but it actually isRead MoreShould Abortion Be Legal?1320 Words   |  6 PagesAbortion, as you all may know, is a really popular topic. There have long been many debates between the two groups, pro-life and pro-choice. People who are pro-life believe that part of the government’s job is to protect all forms of human life. Those who are pro-choice believe that every individual should have control over their own reproductive systems. Pro-life supporters strongly believe that even an undeveloped fetus has life; it is still growing and it needs to be protected. And this soundsRead MoreShould Abortion Be Legal?1217 Words   |  5 PagesNovember 2015 Should Abortion be Legal Among all the issues that have been fought for or against in the United States, abortion may be one of the most popular issues that Americans are passionate about. Abortion is defined as the removal of the embryo or fetus from the uterus in order to end a pregnancy. Thousands of abortions take place every single day, and yet public opinion remains at a standstill as to whether or not abortion is ethical. Everyone holds different opinions on abortion. The proponentsRead MoreAbortion Should Not Be Legal Essay1596 Words   |  7 Pages Abortions have been performed on women for thousands of years. Abortion is the deliberate termination of a human pregnancy. Most often it is performed during the first 20 weeks of being pregnant. The controversy over whether or not abortion should be legal continues to divide Americans till this day. An important landmark case was the Roe v. Wade case, where the Court argued that the zone of privacy was broad enough to encompass a woman s decision whether or not to terminateRead MoreShould Abortion Be Legal? Essay1089 Words   |  5 PagesWhen the word abortion is heard, it is always associated with many negative things such as murder and inhumanity. However not legalizing abortion creates a huge problem for women around the world. Having a child takes consideration, planning and preparation and if pregnancy happens without any of this, why bother to have it at all? The reasons why abortion should be legal is that it supports the fundamental human rights for women by giving them a choice, it reduces crime by reducing the number ofRead MoreShould Abortion Be Legal?1135 Words   |  5 PagesKelsi Hodgkin Composition 1 Professor Chipps 19 October 2015 Should Abortion Be Legal A common debate in the world today involves abortion, the deliberate end of human pregnancy, and whether or not it should be legalized. â€Å"Every year in the world there are an estimated 40-50 million abortions. This corresponds to approximately 125,000 abortions per day† (â€Å"Abortions Worldwide this Year†). On one side of the argument, people are not disturbed by this grotesque number, and on theRead MoreShould Abortion Be Legal?963 Words   |  4 PagesLegal or Illegal? Which would you prefer? Not many are willing to discuss such a gut wrenching topic, but this needs to be addressed. It is a very controversial topic with having to do with women rights and activists. Since there are two sides to every argument, there is one side such as to make abortion legal and the opposing side to keep abortions illegal. In my opinion making abortion illegal can regulate the amount of women who do get pregnant. I believe that making abortions legal will let womenRead MoreShould Abortion Be Legal?867 Words   |  4 PagesABORTION Abortion is a deliberate termination of a human pregnancy, most often performed the first 20 weeks of pregnancy. There are series of legal, moral and ethical issues which may arise about abortion. Most arguments about abortion are often focused on political insinuations and the legal aspect of such actions. Some frequently asked questions’ regarding the issue is if the practice should be outlawed and regarded as murder or should women have the right to practice it. For example, prior toRead MoreShould Abortions Be Legal?939 Words   |  4 PagesShould abortions be legal? Abortions have been a big issue since the Roe v Wade case. There have been a lot of disagreements between the Pro-life supporters and the pro-choice supporters. Pro-life supporters feel like abortions deter murder, while pro-choice supporters believe that the women should be able to make their own decisions. I am a part of the pro-life supporters because I feel like abortions are wrong for several of reasons. Why should women get an abortion if there are other choices for

Wednesday, May 6, 2020

Essay on Personality and Personal Growth - 796 Words

Personality and Personal Growth â€Å"An integral being knows without going, sees without looking and accomplishes without doing† – Lao Tzu The text book definition of Personality is an individual’s unique pattern of thoughts, feelings and behaviors that persist over time and across situations. I agree with this idea that a personality is what makes all of us who we are. I believe that a personality is a combination of innate characteristics that everyone is born with and the sum of total life experiences. I believe that a personality is a portrayal of an individual’s reality. The way that an individual walks, talks, speaks and even the career path that they choose to go on is all a reflection of their personality. I believe that†¦show more content†¦Like my niece teaching me to slow down and look at life more open minded and less judgmental, I also teach her about the responsibilities of life, I guess you could say that we teach each other to find a happy medium. My beliefs can be summarized as follows 1. You must always live your life to the fullest, 2. Make mistakes because that is the only way that you are going to learn, and grow 3. In order to find happiness one must first suffer to discover what is in front of them. These are only three that I found but in my opinion there are many more. I believe that an individual’s growth is determined on the way that they choose to live their life. All beings are given a choice, a fork in the road to follow. Once you have chosen the road to take then the lessons that you come upon are the ones that you are meant to learn. My mom always says to me when I get frustrated that I made the choice to live the life that I am living. The problems that I encounter during this lifetime are the ones that I have to encounter in order to find true happiness. I was once told that when any person is about to come to earth they sign a contract stating that they have different lessons to learn in order to find true happiness, if they do not learn the lessons that they are meant to learn then the challenges to teach them will follow them through to the next lifetimeShow MoreRelatedAnnotated Bibliography On The Implications Of Psychopathic Personality Traits For Successful And Unsuccessful Political Leadership1312 Words   |  6 PagesImplic ations of psychopathic Personality traits for successful and unsuccessful political leadership. Journal of Personality and Social Psychology, 103(3), 489-505. Lilienfeld et al., (2010) examined the attentiveness of psychopathic personality traits that aligned with job performance and leadership of the past presidents including George W. Bush, whereas their successful or unsuccessful behaviors were a matter of public records. The description of a psychopathic personality is conveyed as superficialRead MoreEssay on Annotated Bibliography: Leadership1362 Words   |  6 PagesAnnotated Bibliography Lilienfeld, S. O., Waldman, I. D., Landfield, K., Watts, A. L., Rubenzer, S., Faschingbauer, T. R. (2012). Fearless dominance and the U.S. presidency: Implications of psychopathic personality traits for successful and unsuccessful political leadership.  Journal of Personality and Social Psychology,  103(3), 489 -505. http://library.gcu.edu:2048/login?url=http://search.ebscohost.com.library.gcu.edu:2048/login.aspx?direct=truedb=pdhAN=2012-19403-001site=eds-livescope=site InRead MoreWeek 7 Leadership Paper1424 Words   |  6 PagesDominance and the U.S. Presidency: Implications of PsychopathicPersonality Traits for Successful and Unsuccessful Political Leadership by S.O. Lilienfeld, I.D. Waldman, K. Landfield, A.L. Watts, S. Rubenzer and T. Faschinbauer. Article 2: Impact of personal growth projects on leadership identity development by J. Williams. Article 3: Leadership Styles and AssociatedPersonality Traits: Support for the Conceptualisation of Transactional and Transformational Leadership by R. Van Eeden, F. Cilliers, and V.Read MoreScholarly Empirical Articles On Leadership884 Words   |  4 Pagesworks on the topic of Leadership. The first article to be analyzed is of â€Å"Impact of Personal Growth Projects on Leadership Identity Development† by Odom, Boyd, and Williams (2012) whose purpose was to discuss results from a qualitative research study involving the analysis of personal growth assignments in a personal education collegiate course. The second article examined, â€Å"Leadership Styles, and Associated Personality Traits: Support for the conceptualization of transactional and transformationalRead MorePsychology : The Positive Psychology Movement1269 Words   |  6 Pagesimportant aspects in determining how to enhance the personality by helping individuals recognize their human potential to learn and achi eve. In this assignment one will compare the view points of Maslow, Rogers, and the positive psychology movement concerning individual personality. Recent studies have shown that personality theory and assessment plays an important role in the new era of positive psychology. Positive psychology today, emphasizes that personal strengths and their contribution to an individualRead MoreBehavioral and Social/Cognitive Approaches to Forming Habits Paper1082 Words   |  5 PagesBiological and Humanistic Approaches to Personality Paper PSY/250 Traci Petteway January 12, 2013 University of Phoenix There are similarities and differences when analyzing the components of biological and humanistic approaches to personality. Maslow’s hierarchy of needs express important aspects of biological factors that approaches personality. Abraham Maslow hierarchy of needs focused on a theory of human motivation, management training, and personal development. Maslow divided organismicRead MoreThe Role Of Personality Traits Of A Leader1023 Words   |  5 Pagesleadership and how personality traits of a leader can reflect and affect his or her role. The first article was conducted by Liliendfel, Waldman, Landfield, Watts, Rubenzer, and Faschingbauer in 2012 titled, â€Å"Fearless Dominance and the U.S. Presidency: Implications of Psychopathic Personality Traits for Successful and Unsuccessful Political Leadership† whose purpose is to evaluate and measure the personality of the 42 U.S. presidents. The second article titled as, â€Å"Impact of Personal Growth Projects onRead MoreReliability Is The Credibility For An Item874 Words   |  4 Pagesdiscipline of economics, consumer price index is used to measure the economic growth of a country. However, the limitation of consumer price index is that it only measures the consumption over a period of time, but fails to recognize the standard of living or other factors that indicates the economic growth in a country. Consequently, shared knowledge is limited as only parts of the index is examined, which could contrast with personal knowledge, like individuals who live in the country, might not think theRead MoreAdaptations Are Much More Than A Mere Visual Illustration1504 Words   |  7 PagesGordie’s personality prior to the start of the journey and towards the end of the journey, in order to reveal Gordie’s rapid growth in character. Foremost, the naive Gordie whom the audience is introduced to, at the beginning of the movie, is incomparable to the Gordie with whom we’ve bonded with throughout the journey. At the beginning of the movie, although it is clear that Gordie is far more reliable than his friends, it is made apparent that he has quite a significant amount of personal growth to acquireRead MoreHumanistic Approach1 074 Words   |  5 Pages analyzing the biological and humanistic approaches to personality can be a difference of opinions. Abraham Maslow studied the development of personality. Maslow developed his own personality theory based on the basic human needs. His hierarchy of needs pyramid shows the influences of human needs to the formation of unique individual personality. There are biological factors that influence the formation of individual personality that play a factor. By reviewing the relationships between

Effectiveness of Racial Profiling in Countering Terrorism Free Essays

[Student’s Name] [Professor’s Name] [Subject Code and Title] Is Racial Profiling an Effective Counter Terrorism Measure? The September 11 terror attack on the American soil was followed by a successive wave of events that were aimed at countering terrorism. As the global engagement on terrorism intensified, racial profiling became more pronounced along the corridors of counter-terrorism. Conversely, the employment of racial profiling as an instrument for detecting terror suspects and countering terrorism has elicited sharp criticism from different quarters. We will write a custom essay sample on Effectiveness of Racial Profiling in Countering Terrorism or any similar topic only for you Order Now Even as protagonists of racial profiling reiterate its effectiveness in combating terrorism, dissenting voices lament the flagrant human rights violations and racial segregations borne of racial profiling. This paper critically examines the issues surrounding racial profiling in order to form a benchmark upon which the effectiveness of racial profiling in countering terrorism can be measured. The September 11 attacks on the US soil, which was one of the single worst acts of terrorism in the world’s history, led to the re-emergence of racial profiling in full force. In a desperate effort to bring to book the perpetrators of these attacks, security agencies in the US developed prejudice on Middle-Easterners. These prejudices were then codified into law including additional security measures for Arabs and Muslims leaving and entering the US territory. It is against this backdrop that racial profiling gained prominence not only in the US but also among its allies. This then raises a very pertinent concern as to whether racial profiling is effective in countering terrorism across the globe. Security organs more often than not have based detention and interdiction of suspects primarily on the basis of their race, ethnicity and/or religion. Pickering et al argue that racial profiling occurs against the belief that certain minority groups are more likely to engage in unlawful behavior. They further posit that integrating national security into law has opened up the possibility that racial profiling is inevitable in predicting crime and identifying potential perpetrators of crime. Profiling is however problematic in terms of its effectiveness given the fact that it is not firstly correlated statistically to risk. Secondly, racial profiling is ineffective in substantially narrowing down a pool of potential suspects (60). Therefore, profiling of suspects fails to meet professional law enforcement principles but instead reflect prejudice and discrimination. Nevertheless, the biggest concerns over profiling lie in the invasion of privacy as well as the erosion of fundamental civil liberties. The US has been on the forefront in advocating for the sharing of Passenger Name Records (PNR) information in an effort to single out possible terror suspects. However, this action invariably subjects individuals of particular ethnicities and religions to additional security checks consequently giving leeway to arbitrary discrimination (Muffler 241). What authorities do is basically identify names on the PNR that are Muslim or Arabic in nature. With the perception that Arabs and Muslims are potential terror suspects, they subject bearers of such names to more rigorous security screening. This act does not only discriminate affected individuals but it also produces a large number of false positives. Pickering et al have ascertained that large numbers of false positives divert resources needed to enhance more productive law enforcement activities. Moreover, false positives draws attention away from real threats and this is welcome news for terrorists. To that respect, racial profiling becomes self-defeating in the sense that it overlooks mainstream target groups thus ignoring the real danger of homegrown non-target terror groups (62). In the recent past, we have had terror attacks instigated by native citizens who have been either inspired by radical religious teachings or who are angry with their governments for reasons known to themselves. These individuals are never prioritized by the authorities thus pose a greater danger to national security. Over-emphasis on foreigners paves way for homegrown extremists to plan and execute terror attacks undetected. It is therefore a morally repugnant practice to target individuals as terror suspects based on their race and/or religion. Not all Muslims are terrorists and neither are all people of Arabic origin terrorists. It is really fallacious to generalize Muslims and Arabs as terrorists based on religious and ethnic prejudices. This then means that these individuals who would have otherwise provided intelligence on terror activities become sympathetic to terror groups with whom they share racial and religious inclinations. In the long run, racial profiling degrades social cohesion; it fuels animosity and ends up instigating more terror attacks that it intended to counter in the first place (Pickering et al 62). Racial alienation in the wake of racial profiling has given rise to a new phenomenon referred to as social terrorism. Intolerance experienced in society today has left victims of racial profiling with indelible marks of acute, episodic and vicarious discrimination. Social terrorism shutters minds, bodies and souls with affected individuals developing serious spiritual disturbances. These disorders may include questioning the essence of living, cessation from religious practices as well as loss of vitality and aliveness. Spirituality in particular is at the heart of resilience to adversity among people of color. Attacking a person’s spiritual beliefs therefore creates individuals prone to radical religious teachings. It is the victims of social terrorism that have been found to cause the worst atrocities against humanity since they have nothing to lose after all (Etiony 97). Profiling indeed increases the detection of terrorists attack in the short run. Through racial profiling, terror suspects have been apprehended before initiating their attacks. In the long run however, racial profiling creates the possibility of dangerous substitution. On the current trajectory, there is no empirical evidence whatsoever exploring the use of racial profiling as a counter terrorism measure. This means that we have no idea whether racial profiling is indeed bearing fruits in countering terrorism or not. What we are aware of is how racial profiling has negatively impacted those subjected to it (Center for Human Rights and Global justice 19). It is not my intention to ruffle people’s feathers the wrong way or even stir still waters. To that respect, I will try my very best to keep friendly skies friendly by condemning terrorism unreservedly with the strongest words possible. Terrorism destabilizes democracies by attacking the life and liberties of citizens. It must be met with firmness and increased co-operation among democratic countries. However, inasmuch as we must counter terrorism, we must denounce the escalation of barbaric acts that strike down innocent victims. People do not immigrate to foreign lands just to bomb them but they rather do so to appreciate the quality of life in these foreign countries. It is therefore incumbent upon the citizens of resident countries to welcome these foreigners and help them integrate in their communities. When all is said and done, it is imperative that we win the war on terrorism if we desire to make the world a peaceful haven. This war will not however be won through covert and coercive methods of intelligence gathering. Law enforcement agencies must desist from hiding their laziness and inefficiencies behind racial bigotry. What is needed is development of security structures for sharing intelligence between security agents and citizens on counter terror activities. Security agencies can no longer afford to guard terrorism as a top secret since terrorism affects all people regardless of their status in society. Fundamental rights must never become casualties of the politics of fear that have characterized States’ response to the war on terror. A faithful adherence to human rights incorporated in international, regional, and domestic law is the only sure way of securing and protecting all persons. Works Cited Center for Human Rights and Global Justice. Irreversible Consequences: Racial Profiling and Lethal Force in the War on Terror. NY: NYU School of Law, 2006. Print. Etiony, Aldarando. Advancing Social Justice Through Clinical Practice. NJ: Lawrence Eribaum Associates, 2008. Print. Muffler, J. Steven. Racial Profiling: Issues, Data and Analyses. NY: Nova Science P, 2006. Print. Pickering, Sharon, McCulloch and Wright-Neville David. Counter-Terrorism Policing: Community, Cohesion and Security. NY: Springer, 2008. Print. How to cite Effectiveness of Racial Profiling in Countering Terrorism, Essay examples

Online Dating and Relationships for Internet †MyAssignmenthelp

Question: Discuss about theOnline Dating and Relationships for Internet. Answer: Introduction Although online dating has provides a platform to users to find their compatible match and engage in a long term relationships, it has attracted some serious cyber-crimes and online frauds which has to be kept in mind before starting an online dating relationship. Online dating is a very popular concept in todays age of technology. The technology has entered into every aspect of our lives, the reason being convenience and time. The Internet being the most valuable gift of technology has exposed individuals to a variety of choices when it comes to meeting and interacting with new people without restricting to a geographical area. Interacting with people online and engaging in a romantic relationship with them is known as online dating. Unlike the conventional face to face dating, this gives an opportunity to potential singles to find dates whenever they want. There is a common platform usually a dating site where individuals choose and select their partner based on their preferences with a common goal of developing and maintaining a personal and romantic relationship. To use the services of such dating sites, the users have to create their profile which includes their picture, brief information consist of matching preferences. Match.com is a very popular dating site which allows individual to connect and date online users based on common set of preferences. Online dating in a fast paced life has enabled single individuals to socialize and meet with like-minded individuals. This has contributed greatly in the overwhelming success of online dating (Rosenfeld Thomas, 2012). Online dating has provided an opportunity to start a serious real world relationship and find a committed and loving partner. But the grass is not always greener on the side. Apart from having advantages, there are many drawbacks too associated with online dating. The Advantages of Online Dating: Online Dating sites give an opportunity to individuals to access variety of date profiles irrespective of the cultural or geographical restrictions. In real life the opportunity to meet the individual who will have the similar topics of interest like yours is very difficult because the search is limited to a close circle, clubs or any other accessible public places. Another reason for popularity of online dating is that it saves a lot of time. There are people who do not get an opportunity to meet someone who interest them due to their busy schedule. But online dating gives them a benefit of convenience to login anytime, anywhere and find someone who interest them (Nicholson, 2014). It also gives confidence to someone who is not able to interact in the real world. Also, these dating sites gives an insight into the lives of the potential dates and allow the user to select and reject individuals by maintaining anonymity without hurting them emotionally. These dating services also increase the chance of finding a future spouse. When an individual selects from the wide ranges of applicants with similar mindsets and interests, there are chances of compatibility with another increases. If the selected user is compatible then the scene progresses from online chatting ,to telephonic conversation and then end up meeting personally. If things worked out in favor of both, then there are chances of future commitment else one can always find the next option (Hitsch, Hortacsu Ariely, 2010). Cost saving is another added advantage to the online dating. The real time date can be an expensive one and it may not prove to be a start of a successful romantic relationship but online dating gives an individual many chances of selecting the right one before a real encounter. Online dating sites also give the benefit of customizing individuals search. It involves selecting the dating partner based on ones choice of interest and preferences. Not only this it also gives the clear idea about the intentions of other individual without assuming what they want casual dating or a long term relationship. The Disadvantages of Online Dating: As discusses above, online dating sites provides an unlimited access to potential dates profile. This means people find hard to commit to a single person when they have variety of other options available at fingertip. People see this as a casual dating or a hook up opportunity rather than finding a serious love. Online dating builds a lot of unrealistic expectations. People over the digital platform portray themselves according to their own choices. Airbrushing pictures, exaggerating about the personal information is seen as an easy medium to impress the potential date irrespective of the reality (Hancock, Toma Ellison, 2007). When one is involved in online dating there are chances that they have a long distance relationship surviving on the technology. You cannot actually know about the person living or chatting on the other side and they may not be reliable partners as they represent themselves on internet (Adams, 2015). Safety is the major drawback in online dating services. People often join these sites with an expectation to find a romantic relationship but end up being harassed mentally and emotionally. There are a lot of cases where two people came close and sometimes exchanged intimate photos which got leaked over internet. The harassment faced online can lead to consequences such as suicide. Another problem with online dating is internet connectivity; there are some areas which are still not technologically advanced which means it is difficult to avail the benefits of dating services in such areas. Also, even if someone finds their date in some other country or any far distance may create distance issues which may prove to be a hindrance in maintaining a long term relationship. Online dating also gives an implied authority to the potential dates to access the personal information shared during chatting or through the personal profile which includes pictures and other personal information, the information can be stored easily and may be used against the owner of that information. The most common type of activity is cyber bullying. There are people who are only involved in online dating to satisfy their sexual needs and they engage in conversation with individuals and deceive them by misrepresenting about their identity and leave them once there purpose if fulfilled. Creating a false profile is an easy way to trap innocent people who want to involve in a serious relationship but end up being exploited and harassed sexually (Smith Duggan, 2013). References Adams, R., 2015, 7 Drawbacks of Online Dating, According To Science, Accessed from https://www.huffingtonpost.in/entry/online-dating-science_n_7745108 on 19 May 2017. Hancock, T.J., Toma, C. Ellison, N., 2007, The Truth about Lying in Online Dating Profiles, Accessed from https://collablab.northwestern.edu/CollabolabDistro/nucmc/p449-hancock.pdf on 19 May 2017. Hitsch, G., Horatacsu, A., Ariely, D., 2010, Matching and Sorting in Online Dating, American Economic Review, Accessed from https://home.uchicago.edu/~ghitsch/Hitsch-Research/Guenter_Hitsch_files/Online-Matching-Sorting.pdf on 19 May 2017. Nicholson, J., 2014, Pros and Cons of Online Dating, Accessed from https://www.psychologytoday.com/blog/the-attraction-doctor/201404/pros-and-cons-online-dating on 19 May 2017. Rosenfeld, J.M., Thomas, J.R., 2012, Searching for a Mate: The Rise of the Internet as a Social Intermediary, Accessed from https://web.stanford.edu/~mrosenfe/Rosenfeld_How_Couples_Meet_Working_Paper.pdf on 19 May 2017. Smith, A., Duggan, M., 2013, Online Dating Relationships, Accessed from https://www.pewinternet.org/files/old-media/Files/Reports/2013/PIP_Online%20Dating%202013.pdf on 19 May 2017.

Monday, May 4, 2020

Security in Cellular Networks and Security in Wireless Sensor Networks

Question: Describe about the security in cellular networks and security in wireless sensor networks? Answer: Introduction Networks are evolving in its shape and functionalities very rapidly. Other than traditional networks, now we can see, different kinds of data communication networks around us. In our day-to-day life, we use numerous amounts of networks. Other than computers, we can use mobile and other types of cellular devices to access the Internet. Thus there are various techniques behind these facilities. Certainly a network of cellular devices, will not have the same component of a computer network, but the functionalities are quiet similar. These cellular networks also facilitates voice communication along with data transmission, internetworking. Thus the technologies are more complex. On the other hand, cellular networks are quiet new now in terms of data communications. Advancement in information and communication technologies are making these networks more robust and functional still there is a long way to go. Other than the technologies and functionalities, a big issue with any type of information sharing network is security. For cellular network, security of the data is essential. A common IT buzzword in recent days is Internet of Things. Other than computers, mobiles etc. there are number of smart devices now a days. Those devices share data across network and Internet. These devices are tiny sensors and the networks they are connected to are generally wireless networks. A wireless sensor network will have limited objective and functionalities, but they also take part in internetworking, data communication etc. Thus it also has security issues. (Vacca, 2013) In the rest of this report, I will be discussing the security in cellular networks and wireless sensor networks in details. The technologies used in both cases will be critically reviewed and several security aspects will be discussed. Technical Description Topic 1 Security in Cellular networks Cellular communication has become an important part of the communication networks around the world. Other than using voice-based communication through cellular phones, now Internet can be accessed through cellular networks. Activities like monetary transactions, sending important communication messages etc. are now very common. Day by day new services are being added over cellular networks. Cellular networks are solely dependent on wireless communication media and networks. There are many advantages of cellular networks. But there are certain disadvantages and security issues too. Limitation of wireless communication media has imposed several difficulties on the implementation of security principles like confidentiality, integrity and authentication to the cellular networks. (Mishra, 2008) Generation and Technologies behind Cellular Networks Cellular networks are working since 1980s. There are a number of generations of cellular networks. Each generation has its own technologies, benefits and challenges. The generations so far are, 1G, 2G, 3G and 4G. 4G cellular networks are rolling out but currently; the mostly used cellular network is the use of 3G networks. During the 1980s, 1G networks were used. It has a maximum of 9.6 Mbps speed. It was known as Advanced Mobile Phone System or AMPS in US and Nordic Mobile Telephony or NMT in European countries. The data used to be transmitted in a continuous waveform through analog modulation technologies. 1G cellular networks had security issues like lack of encryption, misuse of frequency spectrum etc. Then 2G cellular networks came into the picture and still these networks are in use in various parts of the world. These networks are also called Personal Communication Services or PCS. In 2G, digital modulation had been introduced. It overcomes various limitations of 1G. Technologies like Code Division Multiple Access or CDMA, Time Division Multiple Access TDMA, digital AMPS, Global system for Mobile Communication or GSM communication, Personal Digital Cellular or PDC etc. are used in 2G, in different countries. 1G communication networks were improved into 2G cellular networks. But the improvements were mainly in case of voice communication. Data transmission was still poor. An improvement of 2G, called 2.5G helped in better data communication over 2G networks. It bridged the gap between 2G and 3G networks. Technologies like EVDO, High Speed circuit switched data or HSCSD, enhanced GPRS, and EDGE etc. are examples of 2.5G cellular networks. (Halonen, et al., 2004) Then it was 3G networks. It provides faster Internet surfing than previous generations, supports video telephony. The main technologies used in 3G cellular networks are, CDMA 2000, Wideband CDMA or WCDMA, Time Division Synchronous Code Division Multiple Access or TD-SCDMA. Before fully deployment of 3G cellular networks, 4G cellular networks have started to be introduced in various parts of the world. 4G cellular networks will provide faster data transmission than 3G. It is expected that it will support near about 20 Mbps data rates. 4G supports wide array of next generation Internet technologies like Mo-IP, IPv6 etc. It will be cheaper yet more powerful. It is capable of supporting communication among mobile vehicles up to 250km/hour speed. (Pierre, 2010) Technologies in 2G and 2.5G The most widely accepted cellular technology is 2G and its later version of 2.5G. Short Messaging Service or SMS is a service in cellular networks than transfers text based messages between two cell phones. Larger messages are broken down into pieces before transmitting. Some other technologies in 2G and 2.5G networks are, High-Speed Circuit-Switched Data or HSCSD It provides faster data transmission than GSM. The speed can go up to 115 Kbps. But, it cannot carry larger bursts of data. And, that is why; GPRS is more popular than HSCSD. General Packet Radio Service or GPRS GPRS provides data transmission for larger bursts of data. This is facilitated by addition of two components in the cellular networks. Those are Service GPRS support Node or SGSN and Gateway GPRS support Node or GGSN. SCGN helps in implementing security in the access control and mobility. On the other hand GGSN supports connection to external packet switched networks. (Heine Sagkob, 2003) Enhanced Data Rates for GSM Evolution or EDGE This is a standard used in GSM technology. It is based on GMSK modulation techniques and uses 8PSK modulation. The data rate can go up to 384 kbps. (Seurre, et al., 2003) Cellular Digital Packet Data or CDPD This is a data service based on transmission of data packets. It is also able to detect some idle voice channel and further use of those channels for traffic management without harming voice communication. There are different variations of this technology in different countries. For example CDMA is used in USA for primary 2G networks, CDMAOne or IS-95a is the primary CDPD technique. It was capable of serve number of users than GSM and TDMA. The speed can go from 14.4 kbps to 115.2 kbps with CDMATwo extension. In 2.5G cellular networks, there are two techniques of CDMA. Those are 1xEVDV and 1xEVDO. The former one is used for data and voice transmission based on one radio frequency channels. The other one is used for same purpose but through separate channels. (Arokiamary, 2009) Technologies in 3G cellular networks 3G are focused on mobile networking based on worldwide standard and through a common frequency band. A new mobile network infrastructure called International mobile telecommunications 2000 or IMT 2000 was developed for supporting 3G cellular networks worldwide. 3G can support data transmission rate up to 2Mbps in 2 GHz frequency range. The main objectives of 3G cellular networks were set as, Supporting a wide range of services for voice and data communication without limitations of the geographic location. Supporting coverage of the network over a wide area and accommodating different kind of mobile stations. Supporting and expanding the services beyond constraints like inefficient spectrum, radio transmission, system economics etc. Supporting best QoS. Supporting an open architecture for easy deployment of different types of application. Supporting a modular architecture so that the size and complexity of the systems becomes manageable. 3G technologies are based on UMTS. UTMS provides Radio Access Network or RAN and the core network or CN. A RAN can have GSM, GPRS systems with connection to packet switched CNs even circuit switched CNs. To transit into a 3G network, it needs to connect to UTRAN systems. A UTRAN system has several sub systems. Each of these sub systems will have a Radio Network Controller or RNC. These are connected to a number of Base Transceiver Stations or BTN. UTMS provides the basic security implementation in 3G networks. (Hu Qian, 2013) Security in Cellular networks There are different kinds of security issues and attacks in cellular networks. These issues are closely related to the architecture and technologies of different cellular networks. With the advancements of cellular networks through different generations, these issues and attacks have become more common that there are difficulties in conforming to the basic security principles of confidentiality, integrity and availability. The security issues in cellular networks are, Confidentiality As the scope and application of cellular phones and networks in sensitive data transmissions are rising up, the confidentiality of all the information is becoming a serious issue. Integrity Integrity of the data and voice communication through the cellular networks is an essential part. It ensures that data has been transmitted properly from the sender to the receiver and no data is lost or modified whilst transmission. Authentication There is huge number of subscribers in cellular networks. It needs authentication to ensure that each of these subscribers are legitimate. 3G networks allow communication from people to different parts of the world. There may be problems related to cross-regions and cross service providers. Authentication may become an issue in cellular networks. A good authentication method will help to overcome these issues. Other security concerns are related to proper access control, web services and operating systems used in the cellular devices etc. some of the security issues are, Access control Access control to the data in the cellular devices may become an issue if there is any restricted data sharing among devices and across the networks. Web services Web services in cellular devices makes the devices and data exposes the devices and data to risks related to HTTP protocols. For example, issues like denial of services or DoS, buffer overflow, viruses etc. Operating system Cellular devices are small devices. There are different kinds of operating systems on different platforms, vendors etc. compatibility among these heterogeneous operating systems is an issue and may open up several security loopholes or vulnerabilities. Location detection Due to the privacy protection issues of the user, the actual location of a cellular device needs to be hidden. But, as the cellular networks are moving towards IP based networks, there are common issues that link to access point location etc. and this is leading towards the compromise of privacy, location, detection and sharing. Content Download Cellular networks let the user download different type of content from different sources just like traditional computer networks and Internet. Whilst downloading, adware may affect the user, and that may become a security issue. While the content is downloading, another issue is digital rights management. Users may download copyrighted content such as music, images, video etc. and there may be violation of the digital rights. Malware and virus Malware and viruses have become a daunting issue in case of cellular networks and cellular devices also. Liberty is the first virus that affected cellular networks and this was a part of a large occurrence of denial of service or DoS. Security of cellular devices The physical security of a cellular device is also a security issue. As these devices contains data, so there may be unauthorized access to those data and breach of security. Different types of attacks Different types of security attacks also affect cellular networks. The infrastructure is open to different types of attacks. They are as follows; Denial of Services or DoS and Distributed DoS or DDoS. Jamming of channels Eavesdropping Unauthorized access Forgery of message Man in the middle Message replay Session hijacking Etc. Counter measures There are several counter measures of the security attacks in cellular networks. Some of those are, In case of 3G cellular networks, UTMS is common and good security architecture. It has been developed based on the security measurements in 2G networks. Thus the robustness of the 2G networks are retained. Further the security implementations are extended. (Kaaranen, 2005) Wireless application protocol or WAP. Interlayer security in 4G networks. Use of cryptographic algorithms in data communication. Use of firewalls and antivirus. Use of advanced OS like Android etc. that have in built security infrastructure. Critical Review Cellular networks are widely used for long time. There are lots of technology and security measurements available for cellular networks. Wireless communication channels have some inherent security issues. Those are more prone to various information security attacks. But in case of cellular networks, security seems to be an important consideration and there are several counter measurs available to different types of cellular networks. Technical Description Topic 2 Security in Wireless Sensor Networks A wireless sensor network is a wireless communication network of tiny actuators and sensors. Wireless sensor networks have some specific purpose and usually those are used for monitoring different attributes of the environment. The micro sensors are low power and low computing resource devices. In a remote wireless sensor network, huge numbers of sensors are deployed densely. These sensors nodes are used to perform signal processing, routing and data communication. These are self-configurable in nature, scalable and have longer lives. In spite of several advantages and applications of WSN, there are significant security concerns. (Liu Ning, 2007) Architecture of a Wireless Sensor Network A WSN has different constituting components. Those are, a. Sensor nodes These sensor nodes are called sometimes as motes. A node can perform specific monitoring activities or routing activities. Thus a router in a WSN will have additional routing functionalities. Nodes do not interfere with one another. b. Gateway A gateway supports communication between nodes and external network like Internet. c. Network manager A network manager configures the network, schedules the communication process, manages and monitors the routing process, routing table etc. d. Security manager It manages the generation of data, storage and management of the same securely. (Sohraby, et al., 2007) Security analysis of a WSN The nodes in a WSN are simple enough and that makes the WSN simpler and popular. But this simplicity makes these networks more vulnerable from the security view point. WSNs suffers from different kinds of security attacks. For example, eavesdropping, injection of bits, packet replay etc. To make a WSN secure, it needs successful implementation of all security principles like confidentiality, integrity and availability along with other kind of security mechanisms and techniques. (Lpez Zhou, 2008) Attackers can easily mock a legitimate sensor code, damage any node. All these are easy with the sensor nodes as there is very little scope to secure these nodes. Those are low power consuming and limited computing resource devices. Thus implementation of some security measurements on those devices is really challenging. Some of the important and common categories of security attacks on WSNs are, Denial of Service or DoS There are several attacking techniques to attack a WSN. In a DoS attack the WSN network is made unavailable to the legitimate users. Or the capacity of the network is reduced deliberately so that the network fails to perform its activities. Different techniques of DoD attacks are, Jamming in physical layer. This is done by sending an interfering radio signal to the radio frequencies of the WSN. Basically, it is a process of interrupting the WSN by sending some interfering signal. Tampering in physical layer by causing damage of nodes. For example, reverse engineering can be used for this purpose. Collisions, exhaustion, unfairness etc. in data link layer. Homing, spoofing, flooding, black holes etc. in networking layer. De-synchronization, flooding etc. in transport layer. Interrogation attack in data link layer. Sybil Sybil is malicious device illegitimately taking on multiple identities type of attacks in WSNs. A single node can have multiple presence in a WSN as a result of this attack. Thus, it will reduce the effectively and fault tolerance of the network. The routing protocols are ale affected by this attack. Sybil attack can happen in physical layer, data link layer and network layer. In data link layer, the technique is data aggregation and voting. Wormhole In this kind of attack, an adversary sits near the base station and creates a wormhole in the network. Under this attack, the messages from the adversary are tunneled to one part of the network through some low latency link, then those are replayed in other parts of the network. A compromised node can play the role of the adversary. This attack happens in network layer. This is basically a routing based attack to disrupt the whole network. Black hole Black hole or sink hole attacks are carried out by compromising a node that is more attractive to its neighbor nodes in terms of some routing algorithm implemented in that WSN. This kind of attacks can be a part of another attack like selective forwarding. This type of attacks happen in network layer. Routing Information Manipulation Attacks of this type happens due to manipulation of routing information of the network. Selective Forwarding This kind of attack happens in network layer. Malicious nodes work like black holes. Messages are dropped by those nodes. Or the adversary can use these nodes to forward selective messages to the network. Flooding with Hello Packets Hello packets are forwarded by different protocols in a WSN. This is for knowing which nodes are within the range of data transmission. There may be some laptop class attack that may broad case information with more transmission power and convince some other node that the node is within the range. As a result it may take part in data transmission of the victim network. This happens in network layer. Spoofing Spoofing of the acknowledgement messages is very common in a WSN. This special kind of spoofing is called acknowledgement spoofing. There are various other types of attacks. Some of those are, cloning, impersonation, eavesdropping, traffic analysis, mote class, laptop class invasive and non-invasive etc. Counter measures Several countermeasures have been taken to secure WSNs from these wide ranges of security attacks. But the inherent architecture and constraints of a WSN makes those more prone to attacks. Still there are counter measures to combat with these attacks. Some of those counter measures are, a. Link layer security for outsider attacks Simple encryptions and authentication at link layer can save from major outsider attacks. This is done by a globally shared encryption public key. Attacks like wormholes, flooding by hello packets etc. can be prevented in this way. Even if an advisory is stopped from joining to a network, he/she cannot stop from being attacking the network through wormholes kind of attacks. Other link layer security mechanisms like described above cannot save a WSN from insider attacks like black holes, selective packet forwarding etc. b. Countermeasures for Sybil attacks Insider attacks are originated from within the network. Sharing of a global key can help the insider attacker to masquerade any node. There should be verification of the entities. Public key cryptography can help in this case however, generation and verification of digital signatures is not possible by the sensor nodes. A possible solution is to use unique symmetric key by each node, acquired from some trusted base station. Protocols like Needham-Schroeder can be used for verification the identities. To prevent insider attacks from a stationery network is possible by enforcing limitations on some compromised node. c. Countermeasures for help packet flooding Verification of a bi-directional sink can be useful to prevent attacks from hello packet flooding. d. Countermeasure for wormhole and black home attacks These kind of attacks are difficult to deal with. When these two types of attacks are combined in some network, then it becomes more difficult. Wormholes use some out of band and private channel for attack. This is generally invisible to the rest of the part of the WSN. On the other hand black holes or sinkholes are difficult because in this cases, the adversary use remaining energy of the nodes. The routing topology is used and the verification is harder. Routes having minimum hop count to a base station, can be verified easily. But in case of a wormhole attack, the hop count may be completely misinterpreting. Sinkholes can be easily created as there is no defender to verify the identity. A detection technique for wormholes can be very time consuming and requires high synchronization. Thus is not usable in sensor networks. (Patil Szygenda, 2013) Other types of countermeasures can be, Use of probabilistic selection and leveraging of global knowledge. This is difficult to implement due to the self-organizing nature of the nodes. There may be authenticated flooding and broadcasting. Critical Review Wireless sensor networks are an emerging field. These are being used for various types of networks and applications. In most of the cases those are used for monitoring purpose. Sensor networks are also a type of wireless networks but there are inherent differences between sensor networks when compared to IP networks. Thus, there are several other specific issues related to sensor networks. There is no issues with performance of the sensor networks. But as already described, security is a serious issue with sensor networks and there is some relation of security to performance. Rather there is a trade of between these two. Conclusion In this paper, two topics in network security has been discussed in details. The topics are security in cellular networks and security in wireless sensor networks. Both of these networks are different than traditional computer networks, quite new in operation. Both of these are becoming stronger with researches and application. However, security is a common issue for both of these. Types of security attacks and counter measures are different in both of the cases. In this paper those security aspects and counter measures are discussed in details. References Arokiamary, V. J., 2009. Mobile Communications. s.l.:Technical Publications. Chandrasekhar, V. Andrews, J. G., 2009. Spectrum allocation in tiered cellular networks. IEEE Transactions on Communications, 57(10), pp. 3059-3068. Halonen, T., Romero, J. Melero, J., 2004. GSM, GPRS and EDGE Performance. s.l.:John Wiley Sons. Heine, G. Sagkob, H., 2003. GPRS. s.l.:Artech House. Hu, R. Q. Qian, Y., 2013. Heterogeneous Cellular Networks. s.l.:John Wiley Sons. Kaaranen, H., 2005. UMTS Networks. s.l.:John Wiley Sons. Liu, D. Ning, P., 2007. Security for Wireless Sensor Networks. s.l.:Springer Science Business Media. Lpez, J. Zhou, J., 2008. Wireless Sensor Network Security. s.l.:IOS Press. Mishra, A., 2008. Security and Quality of Service in Ad Hoc Wireless Networks. s.l.:Cambridge University Press. Nichols, R. K. Lekkas, P. C., 2002. Wireless security. New York: McGraw-Hill. Patil, H. K. Szygenda, S. A., 2013. Security for Wireless Sensor Networks using Identity-Based Cryptography. s.l.:CRC Press. Pierre, S., 2010. Next Generation Mobile Networks and Ubiquitous Computing. s.l.:Idea Group Inc. Seurre, E., Savelli, P. Pietri, P.-J., 2003. EDGE for Mobile Internet. s.l.:Artech House. Sohraby, K., Minoli, D. Znati, T., 2007. Wireless Sensor Networks. s.l.:John Wiley Sons. Vacca, J. R., 2013. Network and System Security. s.l.:Elsevier.