Saturday, December 28, 2019

Ban On Cell Phone Use - 911 Words

A Ban on Cell Phone Use With the occurrence of an extreme emergency, the best thing to do would be to call 911. Without a cell phone, the options become limited to a small number. In a life or death situation, most would like to increase the chances of survival, and that can be more easily achieved with a cell phone. Calling for help would not be possible if cell phones were prohibited while driving. In some cases, many wouldn’t bring their phones with them, in order to avoid a ticket. While beneficial in an accident, cell phones can also be part of the cause of the accident. Cell phones should not be completely prohibited while driving, but there should be more regulations. Regardless of age, anyone can get distracted from a phone. The sound of a notification, or a ringtone, can often take the driver’s eyes away from the road as they look to pick the phone up. Even if a phone is on silent, many are still tempted to pick it up, just to make sure they don’t have a message. Without havi ng complete vision of the road, the chance for an accident to occur is significantly increased. Not only does it take the eyes off the road, but also it takes away at least one hand. To receive a drivers license, you must drive with both hands on the wheel at all times. Using a phone while driving can be similar to eating while driving. Both of these require the driver to have a free hand and take their eyes off of the road. A ban on cellphones would likely increase the ban of other things,Show MoreRelatedBan Cell Phone Use While Driving2242 Words   |  9 PagesBan Cell Phone Use While Driving Amber R. Muniz Kaplan University Ban Cell Phone Use While Driving   Ã‚  Ã‚  Ã‚   A cell phone wielding driver weaving in and out of traffic and drifting across lanes, because they are completely distracted by the device in their hand, may be all too familiar.  When using a cell phone while driving, it impairs the persons driving abilities as much as a person with a 0.08 blood alcohol level.  Think of the drivers that you pass daily; how many were using cell phonesRead MoreBan Cell Phones Use While Driving Essay2168 Words   |  9 PagesSAVE TEEN LIVES - BAN CELL PHONE USE WHILE DRIVING The use of cell phones and driving is an ongoing issue in today s society. A large number of teens use cell phones while driving, and the number keeps going up every day. Whether it is texting, talking, or using their navigation, using a cell phone while operating a vehicle is considered very dangerous, and is the number one distraction in the US (FCC). In addition, in many states, it is illegal, and is followed by a hefty fine if caught. TryingRead MoreNo Call or Text Is Worth a Life1540 Words   |  7 Pageshandheld cell phone could be one of the deadliest decisions you could make while operating a motor vehicle. The dangers and impact of using a cell phone while behind the wheel are numerous. One of the main reasons people still use their cell phones while driving is that there is no consistency in the laws across the country. Certain states have legislation that bans cell phone use, while other states only ban certain usage situations. Tough federal legislation is the only wa y to decrease the use of handheldRead MoreWhy Banning the Use of Cell Phones While Driving Should Be Mandatory Nationwide1039 Words   |  5 PagesWhy Banning the Use of Cell Phones While Driving Should Be Mandatory Nationwide Dimuthu perera AC1304661   SP180.0.3 Principles of Public Speaking   Assignment 6_06 8/26/13 â€Å"WHY BANNING THE USE OF CELL PHONES WHILE DRIVING SHOULD BE MANDATORY NATIONWIDE† TITLE: Why Banning the Use of Cell Phones While Driving Should Be Mandatory Nationwide? A. General Purpose: Persuade B. Specific Purpose: Persuade my audience that banning the use of cell phones while driving should be mandatoryRead MoreDistracted Driving Is The Most Dangerous Distraction Essay870 Words   |  4 Pagesprohibiting the use of cell phones while driving. Research shows that cell phone use while driving significantly increases the chance of getting into an accident. Car accidents are the leading cause of death in teenagers because a majority of them are distracted drivers. Legislators believe that laws and education will reduce the number of deaths a year. Most Americans support the laws that make distracted driving illegal (Chase). Forty-seven states, including Wisconsin and Minnesota, ban texting whileRead MoreAccidents. Modern Life Today Made People Use Too Many Times1037 Words   |  5 PagesACCIDENTS Modern life today made people use too many times on their electronic devices like laptops, cell phones, iPad, TV†¦ People started to have the cell phone addiction. They use it every time except sleeping. Having somebody use their phones while in traffic, that is one of important brings to accidents. Traffic accidents are an important problem need to find a way to cut it. When I think about distracted driving, I will think about the attention of drivers while driving, what did they do whenRead MoreSpeech Outline: Use of Cell Phones Should be Banned While Driving623 Words   |  3 PagesOutline Topic: Why Banning the Use of Cell Phones While Driving Should Be Mandatory Nationwide. General Purpose: To save lives, up to 3,000 a year in America, by reducing the number of car accidents. Specific Purpose: Keep drivers attention on the road, where it belongs. Central idea: Cell phone use while driving a vehicle should be banned nationwide because it distracts drivers and thereby causes accidents. Introduction Key point #1: Use of cell phones has proliferated to the extent thatRead MoreCell Phones While Driving Essay642 Words   |  3 PagesCell Phones and Driving In today’s society we’ve all become attached to our cell phones. Cell phones make our lives easier in many ways we can check our email, receive phone calls, send text messages, listen to music, and take pictures, all at our finger tips. With all this convenience, however there is a dangerous side to cell phones, and that’s when we use them while driving. Most of us are guilty of using cell phones while driving, but have we ever thought about its danger? Five states plusRead MoreCell Phone Use While Driving990 Words   |  4 Pages Cell phones are integral to people’s lives in Canada because they are vital communication and entertainment tools. However, the use of cell phones has remained contentious, because texting and talking on the phone are associated with distracted driving. Distracted driving is, â€Å"defined as the diversion of attention away from activities critical for safe driving toward a competing activity† (Klauer, Guo, Simons-Morton, Ouimet, Lee Dingus, 2013, p. 55). Although distracted driving is also associatedRead MoreBanning the Use of Cell Phones While Driving Should Be Mandatory Nationwide671 Words   |  3 Pagesdriving and convince the audience why it is essential to ban use of cellphones while driving should be mandatory nationwide C. Central idea: with increased use of technology and more specifically cellphones there are an increased number of accidents due to distraction because of the use of cellphones while driving. Therefore, the government should pass legislation to ban cell phone usage while driving nationwide I. Introduction Cell phones are as common in the market today as a wrist watch on

Thursday, December 19, 2019

Pros and Cons of Privatization Essay - 1136 Words

Privatisation means transferring the control of an enterprise from the government sector to the private sector. Generally, but not always, this also means transferring ownership of the Public sector enterprise as well as control. It can be accomplished by sale or lease. It can be accomplished by the government selling 100% of an enterprise, or selling 51%, or even by selling a minority stake - so long as the private sector is given full managerial control. Without transferring control to the private sector, the government can rise money by selling a smaller share, but that is not privatisation as such. PROS * Stops loss-making PSUs from adding to government debt; *†¦show more content†¦* No one worries about economizing when they spend government money, but everyone worries about spending his or her own private money. So private owners and their employees have a stronger incentive to make their own enterprise succeed; * Bureaucrats top concerns are obeying elected leaders, keeping peace with the unions, and other concerns which are essential in government. But these are not the main priorities of business. The priorities of business are cot-efficiency, competition, and satisfying the customers. So, compared to businesses, PSUs often suffer from interference or neglect. For private owners, the economic success of their enterprise is their top priority; * Even when a PSU is well-managed, cash-poor governments cannot give it the investment capital it needs for new equipment and staff-training. Private owners have better access to investment money to help the business grow. privatization change whole economies Privatisation can make poor economies richer, increasing development far beyond the immediate sectors being privatized. Basically, * It reduces the economically-crippling government debt; * It turns loss-making, tax-eating PSUs into profitable, tax-paying businesses, giving government more money to spend on infrastructure, schools and hospitals; * It provides goods and services more efficiently than under government management, generally resulting in better service andShow MoreRelatedComment on the pros and cons of privatization of social welfare services in Hong Kong society. Use the â€Å"LINK-REIT† as an example to illustrate your answer.4288 Words   |  18 PagesTOPIC 6: COMMENT ON THE PROS AND CONS OF PRIVATIZATION OF SOCIAL WELFARE SERVICES IN HONG KONG SOCIETY. USE THE LINK-REIT AS AN EXAMPLE TO ILLUSTRATE YOUR ANSWER. INTRODUCTION The Link-Reit (Real Estate Investment Trust) has long been a controversial issue ever since its launch. The issue in fact concerns the privatization of welfare services. The purpose of this paper is to review the worthiness of privatization in the midst of conflicts of interests among different groups of people in HongRead MorePrivatization, the Best Option for Social Security Reform Essay842 Words   |  4 Pagesskeptical about the future of Social Security and are worried they will not receive the full pay out of benefits in the future. In the following pages I will state the reasons why Social Security is in need of reform, describe privatization and the pros and cons, and why privatization is the best option for Social Security reform. Current problems with the Social Security fund exist, and are the reasons why Social Security is in the need of reform. According to Forbes Magazine, the fund is expected toRead MorePublic Facilities And Private Prisons1116 Words   |  5 Pagescorrectional spending and the largest prison population have impelled lawmakers and the government to look toward the privatization of prisons. Privatization of prisons is the use of private sector or corporation in financing, constructing, and managing correctional facilities as an alternative. In this paper I will discuss the history, the types, and the pros and cons of prison privatizations. Private prison can be traced back in the 17th century to the contracting out of confinement andRead MoreBusiness Entrepreneurs896 Words   |  4 PagesFinally some business owners dont pursue a growth strategy because they do not want the loss of control that results from bank debt or the sale of stock to outsiders. Question 12 What are advantages and disadvantages of privatization of state- owned business? The privatization of state-owned business enterprises is likely to continue globally for most of these enterprises must expand internationally in order to survive in the increasingly global environment. They cannot compete successfully ifRead MoreArticle Critique Of Prison Privatization967 Words   |  4 Pages Article Critiques of Prison Privatization Tammy Martin Liberty University Abstract The following paper will examine two articles pertaining to prison privatization, and the reasons for advocacy for prison privatization, or for the opposition of prison privatization. Three authors write the first article examined the authors are Shaun Genter, Gregory Hooks, and Clayton Mosher. The article is entitled â€Å"Prisons, jobs and privatization: The impact of prisons on employment growth inRead MoreSocialism And The Second Is Capitalism922 Words   |  4 Pages There are to forms of economic systems that will be explained in the paper. Both of the topics will be about the origins of each form of economic system, what each hopes to achieve, and the pros and cons. The first is going to talk about socialism and the second is capitalism. Socialism is a government run by the public rather than by private individuals. Thus, in a socialistic country, the common public owns the factors of production and makes economic decisions. Therefore individuals do not workRead MoreEducationese Power Point1012 Words   |  5 Pagesthe teacher expects on the paper. Tenure ï‚› Academic tenure refers to a policy, which gives professors and teachers a permanent contract, effectively ensuring them a guarantee of employment. ï‚› Tenure in the school can have its pros and cons. Pros, the good teachers stay, con, bad teachers stay. Assistive Technology ï‚› Assistive technology is any device that helps a person with a disability complete an everyday task. ï‚› Assistive technology is great to have in the classroom because it helps a specialRead MorePros And Cons Of Private Prisons1625 Words   |  7 PagesAs the ramifications of this controversial socio-political topic influence over 2 million people’s lives, it’s easy to see why private prisons are a significant issue in the modern world. Through my research I have found that when weighing the pros and cons of privately owned prisons on an economic and ethical level, private prisons are unethical and shouldn’t be the way the United States runs its prison system. Though an argument could be made that financial benefits could make up for the ethicalRead MorePrivatization And Deregulation Of Privatization1680 Words   |  7 Pagesperspective, privatization and deregulation of the economy are the perfect solutions to ensure that â€Å"freedom.† Privatization is the transfer of funds and management from public and governmental institutions to the private sector† (Gilroy Moore, 2010, p. 1). Privatization and der egulation work hand in hand, as deregulation limit government intervention in the private sector. This paper will examine the meaning and implications of neoliberal privatization, explore the pros and cons of privatization, andRead MoreThe Problem With Social Security Trust Fund865 Words   |  4 PagesThe option that I support would be privatization. Privatization is when individuals should become more responsible for their own retirement income and the government less. The government would provide retirees a small benefit with the most retirement income coming from the individual contributions. The pros of this are that workers might receive a better rate of return on their investment than what they receive when they are contributing to Social Security. The cons of this issue are that inequality

Wednesday, December 11, 2019

Research Proposal Smart Government in Australia

Question: Discuss about the Research Proposal for Smart Government in Australia. Answer: Introduction: The Internet of things is defined as that particular system, consisting of interconnected computer devices, computer experts and digital and mechanical components (each provided with unique identifiers), that assists in the transmission of enterprise data over the wired networks. One of the most important characteristics of the internet of things is that the entire transmission process is conducted without any human interaction (Wortmann and Flchter 2015). This report provides an insight into the research study that would be conducted with the aim of revealing how the Internet of Things can be successfully utilized for the formation of smart government in Australia. Research Aim: The proposed research work, being discussed in this report, is aimed at revealing the manner in which the Internet of things can be utilized for developing a smart government system in Australia. It is a well known fact that the organizations that include information and communication system processes in their operational activities need to implement mechanisms for ensuring the security of the data stored in the systems. Thus, the research work being discussed in the report would also consider the identification of strategies that would be useful in avoiding attacks (specifically that of ransomware and attacks on the physical components of the ICT systems) that might be launched on the smart systems to be utilized by the government. Research Objectives: Researchers Taylor, Bogdan and DeVault (2015) are of the opinion that identification of the research objectives facilitates the process of identifying the sub-divisions of the research domain that would be emphasized on. The primary objectives of the research work being discussed are: To identify the IOT techniques and procedures that can be utilized for running a smart government in Australia. To estimate the extent to which the inclusion of the IOT techniques would be effective for running a smart government in Australia. To identify the strategies and techniques that can be utilized for protecting the components of the smart systems from several cyber attacks, including ransomewares. Research Questions: According to researchers Silverman (2016)the formation of research questions helps in the identification of the particular area on which the research work should emphasize on. The researchers are also of the opinion that setting up the research questions also provides a structure to the entire study. The research study being discussed in this report would be aimed at finding the answers to the following questions: Which of the IOT techniques and procedures that can be utilized for running a smart government in Australia? To what extent the inclusion of the IOT techniques would be effective for running a smart government in Australia? Which specific strategies and technique can be utilized for protecting the components of the smart systems from several cyber attacks, including ransomewares? Background of the Topic: Researchers Gubbi et al. (2013) are of the opinion, that smart governance is basically the utilization of innovative strategies, technological tools, business policies and regulations for finding solutions to the different economical, operational and financial challenges that a business enterprise faces. According to Jimnez et al. (2014), smart governance policies essentially rely on information and communication systems for providing optimum solutions the business enterprises. Researchers Shujin and Mei (2015) are of the opinion that in the last couple of years, the growth of various internet based technologies have been boosted largely by the incorporation of the same in various private sectors. In fact, the authors have claimed that private banking, private healthcare and retail are some of those private sectors that have started taking the advantages of the Internet of Things in the most optimum manner. However, researcher Cid (2015) has pointed out the fact the government agencies are yet to utilize the advantages of such systems. Summary: The discussion made in the sections above indicate that the proposed research work would primarily be focused on the identification of the IOT tools and techniques that can be used for the running a smart government in Australia. The aim and objective of the research work has been documented in this chapter, besides setting the research questions. The consecutive sections of the report would emphasize on the reviewing existing literary works and discussing the methods to be utilized in conducting the research work. Chapter 2: Literature Review Introduction: Cybercrime is such a crime that involves a network as well as a computer. The Computer can have been utilized in a crime commission or it can also be the target (Britz 2012). Therefore, this particular section of the literature review mainly aims to illustrate and to provide the detailed overviews on the ransomware, Internet of Things, Physical Attack as well as Smart Government in the context of the topic of this study. Ransomware: Ransomware is referred to a computer malware that is capable of covertly installing as well as executing a crypto-virology attack on the computer of the victim (McGuire and Dowling 2013). This crypto-virology attack can affect it adversely as well as requires a random payment in terms of restoring it (Costin et al. 2013). The simple ransomware can lock the system in such a manner that is not hard for a person who has enough knowledge for displaying as well as reversing a message by requesting payment for unlocking it (Summers et al. 2014). The files of the victim can be encrypted by the more advanced malware by making them accessible as well as demands a rapid payment for decrypting them. Ransomware can also encrypt the entire hard drive or the Master File Table of the computer (Savage, Coogan and Lau 2015). Therefore, Ransomware is a DoS attack, which is the abbreviation of Denial-of-access attack, which prevents the users of computer from accessing the files, as it is intractable f or decrypting the files without the key of decryption (Stone 2015). This particular malware attacks are carried out typically by utilizing Trojan that has a payload, which is disguised as a justifiable file (Choi, Scott and LeClair 2016). Way of Spreading Ransomware The common way through which this kind malware spreads is through the emails. A user typically receives a spam email that can be looked genuine (Moon and Chang 2016). The message prompts the users for downloading an attachment at the time of opening the email as well as the attachment can contain malware (Kim and Kim 2015). This malware can affect the computer by taking an advantage of the vulnerability of the network. The home networks as well as the public networks are few of the most vulnerable (Kirda 2015). The ransomware can finally infect the system while the user of that particular computer visits a compromised website (Xia et al. 2012). Such websites with high risks incorporate those along with the pornography as well as gaming. Categorization of Ransomware Ransomware is taken place in two general forms such as the non-encrypting as well as encrypting ransomware (Savage, Coogan and Lau 2015). There are few variations of ransomware within those two general forms of ransomware. These are as follows: MBR Ransomware MBR is the abbreviation of the Master Root Record. It is one of the worst kinds of this type of malware (Stone 2015). It can easily affect the boot process, preventing the attempts effectively at the removal in addition to the locking out the user from the system. File encrypting ransomware This particular categorization of ransomware comes loaded with the algorithms of encryption (Choi, Scott and LeClair 2016). These algorithms can encrypt the data of the users system by making unusable as well as inaccessible (Moon and Chang 2016). A ransom note towards the user wants payment for decrypting the files (Savage, Coogan and Lau 2015). Scareware Such a ransomware works to scare the computer users in terms of paying money in order to unlock the system (Kim and Kim 2015). The common technique is for locking the system as well as for displaying a message by advising that the user has committed a cybercrime involving child pornography or fraud (Kirda 2015). This message asserts to be from the authority of the enforcement of law like FBI. This message also needs the users for paying a specific sum of money online (Choi, Scott and LeClair 2016). SMS Ransomware This non-encrypting ransomware, which was initially popular in Russia, locks the computer system (Stone 2015). Therefore, it shows a message by requiring the user send a premium message for receiving a code, which is unlocked. Internet of Things: The Internet of Things is the network of the buildings, vehicles, physical devices as well as the other items, which are embedded with the network connectivity, actuators, sensors, software and electronics that can make enable these objects for collecting and exchanging data (Xia et al. 2012). The Global Standards Initiative on Internet of Things is defined as the Information Societys infrastructure (Wortmann and Flchter 2015). The Internet of Things permits the objects to be controlled as well as sensed remotely over the existing infrastructure of the network, by implementing the scopes for more direct association of the physical world into the systems, which are based on computers (Gubbi et al. 2013). The Internet of Things also results in the improvement in the economic benefits, accuracy as well as efficiency (Perera et al., 2014). While the Internet of Things is augmented with the actuators as well as sensors, the technology becomes an instance of the more generalized cyber-phys ical systems class that also encompasses the technologies like the smart cities, intelligent transportation, smart homes as well as the smart grids (Miorandi et al. 2012). Application of Internet of Things Media the internet of things can make a scope for analyzing, collecting as well as measuring an ever-enhancing variance in the behavioral statistics (Xia et al. 2012). This datas cross-correlation could revolutionize the targeted marketing of the services as well as products. Data is the major device interconnectivity conjunction from the media perspective whilst being important in permitting more accuracy in making target (Wortmann and Flchter 2015). Thus, the Internet of things can transform the companies, media as well as governments by opening up a new era of the competitiveness and economic development (Miorandi et al. 2012). Environmental monitoring the applications in regards to the environmental monitoring of the Internet of things utilize typically the sensors for assisting in the environmental protection by monitoring water quality, soil or atmospheric conditions (Perera et al., 2014). These applications can also incorporate the areas such as monitoring the wildlife movements and their habitats. Infrastructure Management Controlling as well as monitoring operations of the rural as well as urban infrastructures like the on- and offshore-wind-farms and railway tracks is the major application of the Internet of Things (Xia et al. 2012). Manufacturing Network management and control of situation and asset management and manufacturing equipment bring the Internet of Things within the realm on the smart manufacturing and industrial applications as well (Wortmann and Flchter 2015). Energy Management Integration of the actuation and sensing systems connected to the internet is likely for optimizing the energy consumption as a whole (Turner et al. 2014). It can be expected that the Internet of Things devices would be integrated into all sorts of the devices of consuming energy as well as be capable of communicating with the utility supply organization in terms of effectively balancing the energy usage and power generation. Home and Building Automation The Internet of things devices can assist the integration of the information procession,, control as well as communications over several systems of transportation (Miorandi et al. 2012). The IoT application extends to all of the contexts of the systems of transportation. Physical Attack: The physical attack in the cyber security is nothing but a significant crime, which is mainly taken place with the help of the physical attempt to create vulnerabilities to the computer security. Therefore, a particular surface is also required in order to create a physical attack to the data in computer system of a specific user (Rid and Buchanan 2015). The surface of the physical attack is the totality of the vulnerabilities in the security for the users data in a given computer system those are present to an attacker in the similar location as the target. The surface of the physical attack to the computer system is exploitable across the threats like the social engineering intruders as well as ploys as well as rogue employees posing as the service employees especially in the public enterprises. As per the physical attack, the external threats incorporate the retrieval of the password from carelessly discarded passwords as well as hardware on the physical break-ins as well as the sticky notes. On the other hand, the physical access in terms of creating security vulnerabilities is a very direct surface of attack. An intruder can download or steal the details from the entire drive as well as extract the data those are in target at the later time, perhaps overcome the encryption with the potential CPUs or the GPCPU or the computing of General Purpose CPUs (Rid and Buchanan 2015). An physical attacker can only damage the equipments physically if the objective is merely for blocking the access or interrupting operations. The best approach to reduce the physical attack incorporate the enforcement of the secure authentication, by zeroing the hard drives before throwing out the old hard drives as well as refraining from leaving the details those are exploitable like the password reminders of sticky notes in the physical environment (Miorandi et al. 2012). Smart government: The smart government can be demonstrated as the capability off the government of the countries all over the world for understanding the unstated as well as stated requirements of the customers, visitors, residents or citizens; designing solutions for addressing those requirements and delivering the solution in an effective manner (Chourabi et al. 2012). The design of a set of processes of business as well as the underlying capabilities of Information Technology that can make enable the information for seemingly flowing across the government programs and agencies for becoming intuitive in order to provide high quality citizen services over all the activity domains and government programs. Transcending from the Open to the Smart Government for better serving the citizens The smart government maturity model should focus upon few major factors. These are as follows: The participation of thee citizens in the governmental business The enterprises are needed for engaging the public for enhancing decisions through the widely dispersed knowledge as well as enhance the public participation in government (Kirda 2015). Transparency of information in government the enterprises are needed for using technology for putting details regarding the decisions of the agency as well as agency operations online and in forums present to the public. Collaboration over the government entities for delivering better services of citizen Enterprises are needed for utilizing the innovative systems, methods and innovative tools for cooperating over all of the government levels as well as engaging the public in their government work. Smart City The Smart city is the vision of the urban development in terms of integrating several solution of ICT as well as Internet of things in a secured manner for managing the assets of the city. The city assets incorporate but are not limited to the information systems of the local departments such as schools, law management, waste management, water supply networks, power plants, hospitals, transportation systems, libraries as well as other systems (Wortmann and Flchter 2015). The smart government plays a significant role in order to develop smart cities. The objective of constructing smart city for the smart government is or improving quality of life by utilizing urban technology as well as informatics for improving the efficiency of the services and meeting the needs of the residents. Summary: This literature review section has portrayed the negative effects or the threats came from the ransomware attack as well as the physical attacks on the network security and the computer security in the context of the cyber crime. On the other hand, this section has also highlighted on the effectiveness and the application of the Internet of things over the computer and network security in order to reduce cyber crime. Furthermore, this discussion has also shed light on the activities of the smart government in order to develop smart cities in terms of mitigate the risks associated with the cyber security. Chapter 3: Research Methodology Introduction: This chapter is aimed at shedding some light on those approaches and techniques that have been utilized in conducting this particular research work. Researchers () are of the opinion that the utilization of suitable research methods would facilitate the process of understanding whether Internet of Things can be utilized to assist the formation of Smart Government in Australia. This is because the process of outlining the appropriate techniques and procedures to be used in conducting the study is dictated by the chosen methodology, thus setting the directions in which the research work would be conducted. The following sections of the chapter provide a detailed discussion on the research techniques to be utilized in conducting the research study being described in this report. Method Outline: Research Philosophy: Researcher Flick (2015) is of the opinion that the following research philosophies are utilized in conducting scientific studies: Positivism: is that particular research philosophy that helps in revealing hidden information through the application of logical deductions. Interpretivism: helps in the process of identifying those complex relationships that exist in the domain of business management. Realism: Researcher Smith (2015)is of the opinion that realism is essentially a combination of both positivism and intepretivism, thus incorporating the characteristic features of both the philosophies. Post Positivism: Researchers Panneerselvam (2014) consider post positivism as an amendment over positivism: this particular research philosophy not only includes the characteristics of positivism but also takes in consideration the very fact that the results of any research study depends in the background and experience of the researcher conducting the study. The post positivism research methodology was utilized in conducting this particular research work. The utilization of realism and interpretivism would not have been useful at meeting the objectives of this research work, while positivism would have not considered the scope of conducting further studies in the very same domain. However, since posposivitism considers the possibility of the outcomes of a study being affected by several environmental factors, the use of the same is justified. Research Approach: Researchers Neuman and Robson (2012) have identified the most widely used research approaches utilized in scientific research works as: Inductive approach is utilized when the research domain being studied is comparatively new and thus much information is not available so as to provide guidance for the new study. Figure: Research Approach (Source: Neuman and Robson 2012, pp-46 ) On the other hand, the deductive approach is utilized in conducting studies in domain that have been much researched on. The information available from the findings of the previously conducted studies can thus be utilized for the development of new theories. The research work being discussed in this report has been conducted utilizing the deductive approach. Several research studies have already been conducted on the domain of Internet of Things and the findings of these studies would be utilized for identifying the techniques using which the IOT can support the activities of Smart Governance. Thus, the selection of the approach is justified. Research Design: Researcher Pickard (2012)has made detailed discussion on the manner scientific research studies are designed. According to them, the utilization of the appropriate research design ( from those enlisted below) helps in the identification of the strategies that would be utilized for collecting and analyzing research data. Figure: Research designs (Source: Pickard 2012, pp-192) The exploratory research design facilitates the process of considering several theories and data required to conduct a research study. The explanatory research design, on the other hand, facilitates the process of identifying the causes behind the occurrence of specific incidents and their consecutive effect. Descriptive research works are conducted so as to gain detailed information regarding the topic being researched on. The research work being discussed in this report would utilize the exploratory research design, as the consideration of existing theories and concepts would be required for finding the strategies using which the IOT can be utilized to facilitate smart governance in Australia. Data Collection Procedure: Researchers Dumay and Cai (2015) are of the opinion that the collection of relevant data or information is essential for any conducting research work. The following sections of the report provide an insight into the methods and processes that would be utilized for collecting data required to conduct the study under consideration. Types of data sources: Primary and Secondary According to Neuman and Robson (2012) the different sources from which data utilized in a research study can be collected belong to the following categories: Primary sources of data: Those sources of data, that allow the collection of raw information, are considered as primary data sources. Researcher Smith (2015) point out the fact that the raw data collected from these sources require to be clarified and analyzed appropriately, so as to be utilized in any research study. Secondary sources of data: According to Lang et al. (2013), the data collected from secondary sources (like that of existing research articles, text books, journals etc) help in gaining insight into the topics being researched on, besides providing data sets that can be utilized for analytical activities. The research work being discussed in this report would utilize data collected from both primary and secondary sources of data. Experts in the domain of Information Technology would be interviewed so as collect updated information regarding Internet of Things and a review of several technical articles and literary works would be utilized to gain information regarding the various aspects of this technology and its use in running smart governance. Beside this, surveys would be conducted so as to collect information regarding the same. Data Analysis procedure: Qualitative and Quantitative Researchers Dumay and Cai (2015) consider the narrative form of information collected from primary and secondary data sources to be qualitative in nature and the statistical data available from survey to be quantitative. It has already been mentioned that both surveys and interviews would be utilized for collecting data, along with the consideration of existing literary articles. Thus, it can be said that both qualitative and quantitative data would be used in this research work. Ethical Considerations: According to Miller et al. (2012) adherence to the following ethical concepts would guarantee the standardization of the research work: Application of data: The data collected from various sources should be utilized only for the purpose of conducting the research work and not for any commercial purpose. Involvement of the respondents: No external influence would be conducted on the respondents participating in the surveys. Besides this, it is essential for maintaining the anonymity of the participants, such that their identities are not revealed in public. Chapter 4: Conclusion In the light of the discussion made in the sections above, it can be said that the proposed research work would be aimed at the identification of the IOT technologies and strategies that can be utilized in running a smart government in Australia. However, the research methods described in the report indicate that the following shortcomings would be associated with the study: The research study would utilize data collected from both primary and secondary sources so as to conduct the process of analysis. However, the validation of the data available from the secondary sources of data is near about impossible. The entire research work has to be completed within a time period of 6 moths thus imposing severe time constraint on the entire research work. Besides this, the research work has been allocated with limited budgetary resources, which might also affect the success of the study. Reference List Britz, M.T., 2012.Computer Forensics and Cyber Crime: An Introduction, 2/E. Pearson Education India. Choi, K.S., Scott, T.M. and LeClair, D.P., 2016. Ransomware against Police: Diagnosis of Risk Factors via Application of Cyber-Routine Activities Theory.International Journal of Forensic Science Pathology. Chourabi, H., Nam, T., Walker, S., Gil-Garcia, J.R., Mellouli, S., Nahon, K., Pardo, T.A. and Scholl, H.J., 2012, January. Understanding smart cities: An integrative framework. InSystem Science (HICSS), 2012 45th Hawaii International Conference on(pp. 2289-2297). IEEE. Cid, G.P., 2015. Smart Cities, Smart Governments and Smart Citizens. Costin, A., Isacenkova, J., Balduzzi, M., Francillon, A. and Balzarotti, D., 2013, July. The role of phone numbers in understanding cyber-crime schemes. InPrivacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on(pp. 213-220). IEEE. Dumay, J. and Cai, L., 2015. Using content analysis as a research methodology for investigating intellectual capital disclosure: a critique.Journal of Intellectual Capital,16(1), pp.121-155. Flick, U., 2015.Introducing research methodology: A beginner's guide to doing a research project. Sage. Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision, architectural elements, and future directions.Future Generation Computer Systems,29(7), pp.1645-1660. Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision, architectural elements, and future directions.Future Generation Computer Systems,29(7), pp.1645-1660. Harsh, A. and Ichalkaranje, N., 2015. Transforming e-Government to Smart Government: A South Australian Perspective. InIntelligent Computing, Communication and Devices(pp. 9-16). Springer India. Jimnez, C.E., Falcone, F., Solanas, A., Puyosa, H., Zoughbi, S. and Gonzlez, F., 2014. Smart Government: Opportunities and Challenges in.Handbook of Research on Democratic Strategies and Citizen-Centered E-Government Services, p.1. Kim, D. and Kim, S., 2015. Design of quantification model for ransom ware prevent.World Journal of Engineering and Technology,3(03), p.203. Kirda, E., 2015, June. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. InDetection of Intrusions and Malware, and Vulnerability Assessment: 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings(Vol. 9148, p. 3). Springer. Lang, T., Clarke, M., Newport, M., Enquoselassie, F., van Loggerenberg, F., Franzen, S., Furtado, T., Njuguna, P., Fegan, G. and Davey, G., 2013. A research methodology study to map the process of initiating and operating a randomised controlled trial of podoconiosis treatment in northern Ethiopia.Trials,14(1), p.1. McGuire, M. and Dowling, S., 2013. Cyber crime: A review of the evidence.Summary of key findings and implications. Home Office Research report,75. Miller, T., Birch, M., Mauthner, M. and Jessop, J. eds., 2012.Ethics in qualitative research. Sage. Miorandi, D., Sicari, S., De Pellegrini, F. and Chlamtac, I., 2012. Internet of things: Vision, applications and research challenges.Ad Hoc Networks,10(7), pp.1497-1516. Moon, J. and Chang, Y., 2016. Ransomware Analysis and Method for Minimize the Damage.The journal of the convergence on culture technology,2(1), pp.79-85. Neuman, W.L. and Robson, K., 2012. Basics of social research: Qualitative and quantitative approaches. Panneerselvam, R., 2014.Research methodology. PHI Learning Pvt. Ltd.. Perera, C., Zaslavsky, A., Christen, P. and Georgakopoulos, D., 2014. Context aware computing for the internet of things: A survey.IEEE Communications Surveys Tutorials,16(1), pp.414-454. Pickard, A., 2012.Research methods in information. Facet publishing. Rid, T. and Buchanan, B., 2015. Attributing cyber attacks.Journal of Strategic Studies,38(1-2), pp.4-37. Savage, K., Coogan, P. and Lau, H., 2015. The evolution of Ransomware. Shujin, D. and Mei, G., 2015. Problems in the Development of Smart Government in China and Their Solutions.Journal of Baoding University,5, p.007. Silverman, D. ed., 2016.Qualitative research. Sage. Smith, J.A. ed., 2015.Qualitative psychology: A practical guide to research methods. Sage. Stone, S.D., 2015.Small organization vulnerability to Ransomware(Doctoral dissertation, UTICA COLLEGE). Summers, S., Schwarzenegger, C., Ege, G. and Young, F., 2014.The emergence of EU criminal law: cyber crime and the regulation of the information society. Bloomsbury Publishing. Taylor, S.J., Bogdan, R. and DeVault, M., 2015.Introduction to qualitative research methods: A guidebook and resource. John Wiley Sons. Turner, V., Gantz, J.F., Reinsel, D. and Minton, S., 2014. The digital universe of opportunities: rich data and the increasing value of the internet of things.IDC Analyze the Future. Wortmann, F. and Flchter, K., 2015. Internet of things.Business Information Systems Engineering,57(3), pp.221-224. Wortmann, F. and Flchter, K., 2015. Internet of things.Business Information Systems Engineering,57(3), pp.221-224. Xia, F., Yang, L.T., Wang, L. and Vinel, A., 2012. Internet of things.International Journal of Communication Systems,25(9), p.1101.

Wednesday, December 4, 2019

Invisible Man Essays (776 words) - Racism, , Term Papers

Invisible Man The constraints described in "The Invisible Man" imply we live in a country that is divided by race, ethnicity, religion and class (prejudices towards differences). A person's life is then heavily shaped around these perimeters. Some in the minority unfortunately try to deny these barriers to entry of the American elite by ignoring warnings and repressing past and present disparities and replacing them with hope. This behavior is brought forth by the natural defiance of a human to not be made believe that he is inferior, and from the confusion between the meanings of the laws of desegregation and social integration. The story of the Invisible Man describes the hardship and reality this path leads an African American, and in reality to many Minority-Americans. The first thing our reading points out is how divided Americans are and the reasons. The most basic fact is that the majority of American citizens are white of European ancestry. As in any other country, the majority rules. In this country the majority also enjoys the contributions of their minority (from slaves to modern sweat shops, to the front lines of war, music, sports, etc). To keep receiving these benefits laws are set that enable for such activities to occur. Americans will bend over backwards when some economic or political interest is made relevant to them (WTO's real intentions for example). However, it is taboo for a white person to assimilate into a minority culture making minorities non-American. Since 1607 whites have been melting together and have homogenized the American way of life. The laws for the American way of life place the Northern Europeans on the top with all other whites under them, then all other minorities and last the black man. This can be seen throughout all of our business and political establishments. Minorities are still urged to give it their best, but their best in never respected. Even when blacks or other minorities make it into political positions of prestige, they must always watch their backs and be careful not to be discharged for not conforming. If minorities, especially blacks, do decide to conform, whites ridicule them further. They are not treated with the same comradery or given access to memberships of facilities that foster the most successful of Americans. They are psychologically abused by being made feel that they are doing the right thing but not good enough. Examples of achievements by other blacks are hung before them. But when they make it, they realize that there is nothing for them. All other races also ridicule the conformant. They label him a sell out and a hypocrite. The African-American is then put into a no-win situation. Unlike other minorities blacks born in America do not have a culture to fall back on, be proud of, and call their own. There is a missing link between the African and the black born in America. White Americans do not have a culture, but they pretend to have one by flaunting their power, money and possessions. The African American was denied the practice his own African culture during the time Africans first arrived in this country. Then there were hundreds of years of attempts to assimilate into the American culture, which increasingly burned the bridge to Africa. Today they are told that they do not have a culture unless poverty is considered one, or that what they do practice is not a socially acceptable culture (by whites of course). This leaves blacks in America nowhere. All blacks in America have to call their own is the horrifying memories of their ancestors within the last three hundred years. All they have to look forward to is the continual destruction of their race in America. In the end, the black middle class is made to feel invisible, as if they do not exist. And the poor black class is looked at as the enemy of our America. Our forefathers tried to warn blacks, but the passages of the 13th, 14th and 15th Amendments have confused many into thinking that whites do want to assimilate ( just not all of them). Unfortunately there is a misconception about these laws. These laws are desegregation laws, not social integration laws. But because they did not say, they were viewed as the ticket to being American. But recent hate crimes tell the truth. Many whites today do not consider themselves racist. They feel that they are equal and fair. But they are blind. Their upbringing has systematically taught them that they have unspoken privileges and that they