Wednesday, October 30, 2019
The religious aspect of young goodman brown Research Paper
The religious aspect of young goodman brown - Research Paper Example The story of Brown alerts one to the dangers that are inherent in the puritan life that stifles the creativity of man and the only recourse that his imagination has is to resurface in his dreams where they display an unhealthy tendency to distort the boundaries between reality and illusion. Much of the analysis of this short story has followed the contributions of psychoanalysis to our understanding of the nature of dreams and the repressed. They have helped in the understanding of the story as one that critiques the excessive control of religion over the life of an individual. Hawthorneââ¬â¢s critique is leveled against the religious fervor that the puritan establishments of New England, where the story is set, has displayed, since the migration of people from England to America in search of a new colony to create a land that would be a model to the rest of the planet in their adherence to Christian ideals. Hawthorne deals not only with Christian ideas but also with the prejudice s that Christian settlers had regarding Native American religion and rituals. Relegated to the margins of the white settlements, these original inhabitants of America are labeled as the friends of the devil. Hawthorneââ¬â¢s story of Goodman Brown manages to have some sympathy for the condition of the Native Americans but is guilty on many an occasion of referring to the devil and the powwow in the same breath. But then, the entire story revolves around a recognition of the fact that everybody is a sinner, at least in the mind. Hawthorne sets his story in the forest near the village of Salem. The forest, according to Reginald Cook, is set in opposition to the house which represents the outward appearance of the man and his spotless reputation. The forest on the other hand, abounds in ââ¬Å"demonic presencesâ⬠and ââ¬Å"ancestral spiritsâ⬠that represent elements of pagan religions that are set in opposition to the Christian atmosphere of the house and the village (Cook ). It is implicit that civilization is necessarily Christian and the absence of Christianity means an absence of a civilized ethos. This amounts to a rejection of extremely complex religious beliefs that other cultures, including Native American civilizations, had. This was a very important aspect of the puritan establishment which used religion as a cover for the imperial designs of Britain. By belittling the beliefs of a certain civilization and setting oneself as the person who needs to introduce civilization in a particular place, one fails to incorporate in oneââ¬â¢s way of living, which is what religion essentially is, the beliefs of anther community that may serve to enhance the quality of oneââ¬â¢s life. Brown, as well as critics of Young Goodman Brown is often guilty of mistaking appearance with reality, says David Levin in his essay, Shadows of Doubt: Specters of Evidence in Hawthorneââ¬â¢s ââ¬Å"Young Goodman Brownâ⬠(Levin). The appearance of the devil may be connected to the real devil, since there are enough indications to that effect. However, other characters can merely be a figment of the imagination of the character in the story. In any case, there is a great deal of ambiguity regarding the fact as to whether the events in the story are real or an illusion. The illusionary nature of the events may be interpreted as a dream or as an imagined
Monday, October 28, 2019
GS1140 Assignment 1 Essay Example for Free
GS1140 Assignment 1 Essay The problem that I have chosen to write about is very personal to me. The problem I had was that I was not making enough money to survive on a monthly basis. I had a choice to either look for a job that paid better or go back to school. I began looking for another job but with my lack of a degree, I still wouldnââ¬â¢t be making enough to really have the life I want. I began thinking about school, but I needed to decide what I wanted to do with my life. I had spent my entire adult life as a wife and a mother and didnââ¬â¢t worry or think about a career or furthering my education. With my children all grown and on their own, and recently becoming single it was time to make a decision about furthering my education. I decided if I was going to pursue a degree there were four very important items that I needed to look consider: What to get the degree in; Where to go to get the degree; How much it would cost me; And how long it would take. I began considering the things I enjoyed doing and whether or not I could make a career out of any of them. I have been an Administrative Assistant/Bookkeeper for about 12 years and it seemed the logical choice to get my degree in Accounting or Business but it wasnââ¬â¢t of very much interest to me. I began talking to people who really enjoyed their jobs how they knew what it was they wanted to do in their chosen career. ââ¬Å"Do what makes you happy.â⬠Was the first thing my mother told me and my dad said, ââ¬Å"If you have a job you enjoy, you will never have to work a day in your life.â⬠I have always enjoyed working on computers, trying to figure out how to do different things. When my computer would act up, I would try to fix it myself before I would have someone else try to fix it. It interested me and so I began looking at different degrees available in the computer or IT field. I decided that this is where I want to pursue my degree. I started looking into different schools in my area and what was available for a degree in Information Technology. There were several classes available at several local community colleges. I began to look into the different classes I would need to take but was extremely confused about all the differentà pre-requisites and classes open. I had decided I was going to go and talk to a counselor at one of the community colleges when someone mentioned ITT Technical Institute to me. After looking online at the website, I concluded that this would be my first stop of my journey to a higher education. I called and made an appointment to talk to someone and go over my different options. Since my finances were such that I was barely making it now, the cost of school was a very big factor to me. I couldnââ¬â¢t afford to pay up front for school. I wasnââ¬â¢t sure about any programs available to me to assist with the financial aspect of my pursuit to further my education. The lady in the finance department at ITT Tech was very helpful in answering my questions about financial aid and the different scholarships and grants available. I found that I can receive a scholarship through the school that will cut down my tuition cost and with financial aid the balance will not be due until after I finish my schooling. This was a huge relief for me to not have to come up with the money upfront. School was really looking like a definite possibility to me at this point. The last question I needed answered was how long would it take for me to finish my education. The program at ITT Tech was set up in a way that I would be able to obtain my Associates of Science degree in as little as 21 months. Unlike a regular community college, I would not have to worry about the different pre-requisites and whether or not I would be able to find an open class. They addressed all my questions and concerns, set up the classes as I needed them, and provided the necessary books and reference material. Working full time, I didnââ¬â¢t want to have to worry about which class I needed to take first and in which order to take them. I really liked this approach and it was one of the deciding factors for me to enroll. In conclusion, I saw a problem that needed to be fixed in my life and am on my way to remedying that challenge. I researched all my options on how to fix the problem. I asked necessary questions and set my game plan in motion and am taking the necessary steps to further my education, better myself, as well as set an example for my children and others that itââ¬â¢s never too late to go back to school and learn something you love.
Saturday, October 26, 2019
Mediaââ¬â¢s Role In Body Images Essay -- Media Advertisements Advertising
Mediaââ¬â¢s Role In Body Images Authors can effectively get their point across by using different rhetorical techniques. In the two articles that I will examine, the authors mainly used a pathos appeal. Authors use pathos to get a social and emotional application across to the reader. Another rhetorical technique that is used by many authors is ethos. Ethos is a technique that can be used by an author saying that since they are perhaps a doctor or may have belonged to a certain organization for a long time, then they know more about a topic than somebody who may not have had the same moral values or interests. Logos, or the logic that the reader may conclude from the author, is an additional rhetorical technique that is commonly used by authors. These three appeals are the best way for an author to get his point of view across to the reader. Authors that are writing about the same topic might not use the same appeals, nor may they use identical appeals in the same way. Consequently, Colleen Thompso n author of Society and Eating Disorders and David Butler author of Slim Pickings are both getting the idea that society and the media play a role in the behavior of how people feel about their bodies, but they use different appeals to get their points across. The two articles, written by Thompson and Butler, deal with the issue of how people, especially females, deal with the mediaââ¬â¢s role concerning weight issues. As the year 2000 rolled in, actressesââ¬â¢ and modelsââ¬â¢ body weight decreased, and their waiflike bodies became more noticeable in the publicââ¬â¢s eyes. Many little girls grow up idealizing the people in the public eye, giving them the idea that they must look a certain way, which is not a healthy way.... ...ns where you can find out about weight loss & fitness. Thompson has links that can help out people. She has a bunch of icons to click on; for example, if you want to know signs of problems you can click on signs, or if you want to get help you can click on either getting help or therapists. Even though Thompsonââ¬â¢s article is less appealing to the eye, she has more icons that can help someone better understand problems that are associated with media and weight loss. Butler and Thompsonââ¬â¢s articleââ¬â¢s are very informative, and help people to better understand the problemââ¬â¢s people are faced with today. Even though both authors use different techniques to get the reader to better understand how they feel about their topic, the reader can learn from both papers. I feel that these two authors used very good techniques, and they are both respectable papers.
Thursday, October 24, 2019
The Stamp Act
Jamie Brissette Hist310 Tue/Thur 9am #2 paper The Stamp Act Riot, 1765 Francis Bernard wrote the document ââ¬Å"Stamp Act Riot, 1765â⬠about the colonies response to Parliaments stamp act. The colonies or the Stamp Act Congress questioned whether it was right for Parliament to tax the colonies. In doing so Parliament created a rebellion within the colonies who only wanted a say in their Government and decisions being made. If Parliament had treated the colonies better, respected their rights to govern themselves, and had given them a say maybe this would not have contributed to the series of events leading up to the Revolutionary War. Bernard 106) The Stamp Act was an important act introduced by the British Prime Minister George Grenville and it was passed in March 1765 by the British Parliament. (Henretta 137) Its purpose was to raise money for the British army stationed in the American colonies. The Stamp Act required tax stamps for public documents such as newspapers, legal documents, customs documents, licenses, playing cards, deeds, and almanacs. Since Britain was left with a large national debt from the Seven Yearsââ¬â¢ War, the British government felt that since the colonies benefited that they should contribute to the expenses.As Francis Bernard describes theà American coloniesà acted strongly against this matter. This all took place in Boston Massachusetts. During the summer of 1765, because of the Stamp Act, there were many protests in the colonies. These protests involved everyone from civic leaders to street mobs. In many cities and towns the slogan became ââ¬Å"no taxation without representationâ⬠. The Sons of Liberty were a secret organization that often organized these protests. Many acts of violence and a lot of pressure centered towards the Stamp Agents, by fall almost all Stamp Agents resigned.The Virginia Assembly declared that the Stamp Act was unjust and illegal. The assembly passed resolutions against taxation by the Bri tish Parliament. The Massachusetts House of Representatives invited all of the colonies to send delegates to a General Congress. The colonies that accepted the invitation and sent delegates to the General Congress were New York, New Jersey, Connecticut, Maryland, Delaware, Rhode Island, Pennsylvania, South Carolina, and Massachusetts. In October of 1765 in New York City a Stamp Act Congress was held. It was represented by nine colonies.The Stamp Act Congress declared that stamp taxes could not be collected without the peopleââ¬â¢s consent and that the colonistsââ¬â¢ right to be taxed was only by their own elected representatives. Merchants agreed not to import British goods until the law was repealed. That led to the British Parliament being bombarded by petitions from English merchants not importing their goods. Many English political leaders argued that the law was unenforceable. (Bernard 106) Finally on March 4, 1766 the Stamp Act was repealed by the British Parliament. The unity of the American colonists in their opposition towards the Stamp Act contributed to this appeal.The Stamp Act was one of the many events leading up to colonist having enough and wanting to govern themselves. This Act and the protests leading up to the appeal help create American Nationalists who wanted to separate from Britain. The conflict between the British government and the American colonists over the Stamp Act is considered one of the causes of the American Revolutionary War.Sources www. online-literature. com www. wikipedia. com Documents for American History Chapter 5, 5-4 ââ¬Å"The Stamp Act Riot, (1765) by Francis Bernard, pages 106-107 America A Concise History by James A Henretta pages 137-138 The Stamp Act ââ¬Å"No taxation without representation! â⬠(Americas Past and Promise) That was the colonistââ¬â¢s famous saying. The colonists were being taxed with no say in parliament. They were getting taxed with the Stamp Act, the Tea Act, and the Sugar Act, but those were only a few. Eventually the Stamp Act was successfully repealed, yet the Stamp Act was the catalyst for the American Revolution. The stamp Act was the first attempt for Brittan to directly tax the colonists. (Mason Lorna) Brittan thought that since they owned the colonists they could tax them, and the colonists would and have no say.Brittan put a tax on all diplomas, wills, playing cards, and other everyday advertisements. (Mason Lorna) ââ¬Å"Brittan stated that all documented papers had to contain a stamp that said the items were taxed. â⬠said Bilven junior. Stamps were very expensive then and not many people could afford them. The October delegates met and stated that the colonist will not be able to have a ny say in parliament. This mad the colonists enraged. This was the cause of the first true rifts between the patriots and the loyalists. The colonists held an orderly Stamp Act congress to protest the law.The colonists rioted in seaport towns. (Bilven junior) Most assemblies believed that they had the right to decide on their own laws. Men who sold stamps were threatened or their houses were set on fire. The houses of the people who approved this act were also set on fire by the colonists. The colonists started to boycott the English goods that had to be stamped, and this started to make the imports go down. Colonists drew up petitions stating that the right to tax belonged to assembly colonies. The colonists were very unhappy with this tax and started to do just about anything to get rid of it.Benjamin Franklin was one of the very important people who stood up to Brittan and got the Stamp Act repealed. Benjamin Franklin argued and warned the English that the continuation of this ta x could lead to rebellion. In 1766 well law abiding business men repealed the Stamp Act. Though the Stamp Act was only one out of the many taxes that Brittan placed on the colonists, the stamp act was the most important. The Stamp Act was a big help in starting the Revolutionary war. The Stamp Act was also one out of the many to get repealed so quickly. The Stamp Act was not only a loss to the colonists, but a great benefit also.
Wednesday, October 23, 2019
Garbage and Recycling
One of the most pressing environmental issues facing the contemporary society is the issue of garbage. As much as the global population continues to rise, people have become more wasteful and the products of modern convenience such as plastics have rendered the earth a dumping ground for non biodegradable refuse. This problem crosses all international boaders and touches of all the world people. Although some specialists argue that recycling is not good and beneficial from an economic perspective, some people believe it will reduces the need for new landfills, creates job, saves energy, and conserves resources. Increasing in Population results an increase in waste which requires finding and buying more landfills to bury the increasing amount waste, and this is becoming a very serious problem in many areas around the world. The question is how can government find a place for the huge quantities of material where does not affect humans health. Every Canadian knows that Toronto has world-class garbage problems. A growing number of Torontonians feel uncomfortable about shipping garbage to distant landfill sites. Until 2010, our trash will continue to be shipped to Michigan, and then it will be dumped at a newly purchased landfill site near London, Ontario (News at U of T). But within the next four or five years, the city needs to choose more alternate method for dealing with residual wastes. Diseases from poisonous gases and micro-organisms in the air near garbage dumps and poisoning by polluted underground water and soil may result in serious health problems too. The UN Development Programme (UNDP) estimates that more than five million people die each year from diseases related to inadequate waste disposal systems. Therefore, Landfills are not seen as attractive additions to the neighborhood. Neighborhoods are concerned about not only health hazards but also noises, increased traffic, lowered property values, toxic gases and effluents, and all these problems mean for the government spending more money to overcome such problems, but recycling seems to be the only solution. Recycling can reduce some of these costs, and communities can even make money by selling certain recyclable materials (Lopez). Many people think that landfills and incinerators are more cost- ffective than recycling, but it is not true. Statistics show that when recycling programs are designed properly, they save at least as much money as landfills an incinerators would. A large percentage of waste that is brought to the landfills can be recycled or reused. By paying close attention to what we are putting in our garbage cans and recycling materials whenever possible we can increase the stream of goods produced by recycling rather than using up precious space and money in landfills. Recycling not only cut down our litter it can add to our growing economy by saving energy. Energy savings can be seen when most materials are recycled. One example of valuable energy savings is the recycling of aluminum cans. It takes 95 percent less energy to recycle an aluminum can than it does to make a new can from bauxite ore (denver). Plastic bags made from recycled polythene rather than virgin materials save two thirds of the energy required for production and reduce the water used by almost 90% , or recycling a single glass bottle can save enough energy to light a 100-watt light bulb for 4 hours (Thrope). According to the U. S. Environmental Protection Agency, in 2000, recycling resulted in an annual energy savings of at least 660 trillion BTUs, which equals the amount of energy used in 6 million households annually (Denver). Companies that make new products from recycled material use 30 percent less energy. That's because they don't have to process the raw materials from scratch. For example, a company in Cedar Rapids, Iowa, called Cedar River Paper makes cardboard boxes by recycling paper products from all over the Midwest. If Cedar River Paper didnââ¬â¢t use recycled materials, they'd use up a lot of a trees ââ¬â and a lot of energy to cut them down, transport them hundreds of miles and grind them into paper pulp (Rinaldi). http://www. alliantenergykids. com/stellent2/groups/public/documents/pub/phk_ee_001509. hcsp Recycling generates significant economic benefits by creating jobs for communities. In fact, the Office of the Federal Environmental Executive estimates that recycling and remanufacturing industries account for approximately one million manufacturing jobs and more than $100 billion in revenue. As a matter in fact, the drive for efficient handling and use of recycled materials spurs innovation which is a key to long-term economic growth. Recycling is a very important step in slowing down and eventually stopping wasting of earth's natural resources. In other words, The less we concentrate on recycling, the more we will rely on use natural resources which will results in depletion of the worldââ¬â¢s natural resources and the increase of garbage mass. By reusing materials and re-manufacturing them into new products we are reducing the amount of virgin natural resources that we need to use. . For example, for every ton of recycled paper that we use we can save 17 trees (denver),but unfortunately, paper and its derived products such as carton are now being recycled successfully everyday. Can you imagine that 44 million newspapers are thrown away every day in the United States. This is like throwing 500 000 trees into a landfill each week. The loss of natural resources affects animals too. Our landfills are taking over animalââ¬â¢s habitats and causing many species to become endangered. For example, Animals like black footed ferrets and prairie dogs are in danger of becoming extinct (Baron). We should think broadly because recycling has a large impact in our economy over the past few decades. Although recycling of wastes entail large hidden costs in collecting, sorting, and manufacturing, it can solve issues concerning landfills. When we recycle our waste products rather than throw them all in the garbage we save room in landfills. Recycling plants also create many more jobs than people would think. Recycling activities around the country promote community development while reducing the need for new landfills, preventing pollution, saving energy, and preserving natural resources. The economic value of clean air, water and land is significant, but difficult to quantify. Since recycling plays an important role in protecting these natural resources it must be attributed an economic value in this context, as well (Rinaldi).
Tuesday, October 22, 2019
buy custom Abstinence Movement essay
buy custom Abstinence Movement essay INTRODUCTION Abstinence movement is an initiative that aims to bring awareness to the youth in terms of leading responsible lives. Being responsible for oneself is centered on being aware of the changing times and being able to remain moral even at tempting times. This research paper details the motives of the abstinence movement under the understanding of morals as depicted in the novel Abstinence Teacher. The aim and purpose of this paper is not evaluating the novel, but using the novel to bring out the insight of the abstinence movement. The novel rotates around the lives of Ruth, Tim, Jaonne, Maggie, Eliza, and a Pastor. These characters in the novel are essential details whose understanding of sex education explains what abstinence movement focus on and the challenges it faces. The significance of this study is to enlighten the Diasporas on the advantages of sex education in the society. The youth are the future of any state of country, with this in mind the paper discusses what benefits of the abstinence movement to the youth taking into account lives of some characters in the novel Abstinence Teacher. Upon the aspects of the abstinence movement that are discussed in this paper include: The role of religion and its teachings in shaping the lives of the youth; the external pressure that makes the lives of youths be immoral; understanding of parents and the impact this understanding has on their children; the right way to deal with those desperate to change their ways. As for the characters in the novel, some odd understandings of sex education or sex itself and lack of self-realization are depicted. Their role in bringing out the phenomenon of the abstinence movement is utilized in this study using their actions and states of understanding. Ruths feminism and Tims realization that he does not belong to The Promise Keepers are some of the issues that this paper takes a toll on to relate to the abstinence movement. (Perrotta, 2008) The impact of religion on the youth Tim has been absorbed into the church. The church is not a responsibility but a place to get spiritual nourishment. The fact that Tim doesnt realize that the church is an addiction that he has developed, the responsibility of church goes beyond the personal mental state of an individual but to the specific religion one belongs to. The impact of the church to the people and its contribution to the abstinence movement is tremendous as discussed below. Religion has a great effect on the lives of youth in terms of their achievements, aspirations and self-image. These help the young people in their future physical, socioeconomic and mental welfare. Once self-esteem is improved, it will reduce such factors as: delinquency, alcohol and drug use, poor academic performance, the number of children born to unwed mothers and other varied destructive behaviors such as family violence. Information on how to improve the self-image or self worth of a person can be gotten from sources like in seminars, from self-help books with bible teachings. Adolescents seek ways on how to become independent from their parents without even realizing who they truly are. This is why teachings on self worth will help them try to identify who they are so that they avoid getting into trouble and into some unruly behaviors. (Harrison, 2000: 13) Self worth helps the youth to know how to respond to peer-pressure and how they think and experiment on such issues as experimenting with sex and use of drugs. Religion is a great force behind the forces of self-esteem and should therefore not be ignored when instilling these virtues into the young people. Feelings of self worth are diven by religious activities, beliefs, and activities. The insight of one being a child of God, an imminent purpose of life and an involvement in a caring organization may help strengthen the self-worth of people and not just the young alone. This will therefore make the young try to formulate the teachings of the bible hence living a moral life. Such teachings of the bible include the consequences that are attributed to the rebellious people and disobedient children to their parents that lead to lack of self-respect, which in turn leads to loss of contact with God. Although there are great controversies among different people whether religion really affects the way in which the youth behave, the fact is that the young people with a Christian understanding are less likely to get involved with negative behaviors as compared to those without a Christian upbringing. Many churches, according to findings, teach people to have good and morally upright morals and a positive image about themselves; this therefore may influence the youth to have self-evaluations in a positive kind of way. Once the youth attain this virtue of self worth they will definitely start performing in their class work since they believe in themselves and what they are capable of doing. Factors that lead to immorality in youths Taking a look at Ruth in the Novel Abstinence Teacher, it is clear that lack of sex education in her life has a tremendous contribution to her feminism. The fact that she felt bad when her daughter Maggie prayed in some event, points out that out of the most important factors of parenting. In the abstinence movement some of the most important pillars of shaping a young ones life is by pointing them the right way. However, there are many factors that lead to immorality in youths. Unless these factors are looked into, the success of the abstinence movement would be difficulty to achieve. The factors are described below and how they can be dealt with. (Cornog, 1996) Several factors lead to the unruly behaviors in the youth and some are external while others are internal psychological problems. Peer pressure is the greatest of all the factors. Most youths do things so that they can belong to a certain type of group of their fellow teens and not because they enjoy it. Some young people get into immoral behavior because their parents are not good to them and they therefore want to feel good bout themselves and have people who can appreciate them and get into sexual activities when they satisfy their partners in bed. Some parents have a way of not accepting anything their children do and always think they are wrong and this is what leads to the rebellious attitude, to prove a point. Parents therefore end up losing their children without knowing in the first place that they themselves contributed greatly to their behaviors. Very few of the youths however involve in irresponsible sexual behavior by lack of knowledge. There are those who are simply ignorant on the consequences sex may have in their lives and therefore need to be guided to avoid temptations and avoid people manipulating them into it. The society has also contributed greatly to the sexual decay in the world. Many people view sex as an ordinary thing and will even find it odd when someone is past the teenage period and still a virgin. In some colleges and universities it is even worse since one is openly ridiculed by their friends once they find out that they are virgins and therefore people do everything so that they can avoid such embarrassment. (Halstead Reiss, 2003) Other factors that lead to sexual practices among the youth include poverty and trying to live up to certain standards. Most parents cannot provide for everythingg that their young adults need. Girls end up engaging in sex with elderly men for the money while the boys go for mature elderly women for the money. Mostly the college and university-going students do this, as they want to keep up with the latest fashions and the parting life that is a bit costly. The right way to deal with those who want to change their lives Therapy is not an old means of dealing with troubled lives, but in sex education it is the responsibility of the society; starting from the parent level to religion level. Going the bible way, keeping in mind that Christianity is the largest religion, some of the teaching in the bible can be good examples for application in the abstinence movement. Some of these teachings are discussed under the light that Ruth does not provide them to her daughter, but they would be of great help if she had. The bible condemns premarital sex before marriage and calls it fornication, which is a sin. Fornication happens when people not married engage in sex and this category captures the youth. 1 Corinthians 6:13 says that the body is not meant for sexual immorality but for the Lord, and the Lord for the body. This therefore means that the bible does not support sexual practices between or among individuals if they are not married since the body is holy and belongs to God. Anyone willing to follow the right path in life should shun sexual practices before marriage as it is a shameful act that leads to many negatives effects such as: school dropouts caused by unprotected sex between the youth who do not have knowledge on contraceptives. Sexually transmitted infections which are very shameful; poor performance since attention will drift from class work and the time that should be spent reading will be used for the sex escapades and feelings of fear since one will be suspecting of being sick sexually or pregnant. A factor to consider is that fifty percent of the people who have HIV are between eighteen and twenty four years of age due to irresponsible sexual behaviors. It is therefore wise to abstain since the contraceptives used like the condom are not one hundred percent safe. They can allow some viruses to penetrate and we do not want to be a victim of such life changing blunders that we can avoid. What the Bible preaches is abstinence by people who are unmarried. For the married, sex is basically meant for re-creation, that is, to bear children. Take a second and think about how different the world would be if people did not engage in premarital sexual practices. There would be no unwanted pregnancies, many deaths caused by abortions, poor lifestyles caused by the youth burdening their parents with an extra child from premarital sex, and sexually transmitted diseases. Why God prohibits premarital sex is to protect women from bringing up fatherless children, protect children from having parents who were not prepared for them or do not want them at all. (Kehily, 2002) CONCLUSION As much as The Abstinence Teacher is involved to figure out what is good for the abstinence movement. The roles of the characters provide us with insight of people and their understanding of sex education. Religion plays an important role in shaping the lives of the youth and the sexually confused. It does so by providing teachings that are aimed at bringing light to the youths through the teachings of the bible. Ruth and Tim are self absorbed to mentalities they do not quite embrace effectively. The problem is because they are not aware of sex education and the importance of self recognition. Buy custom Abstinence Movement essay
Monday, October 21, 2019
Causes of the French Revolution (1789-1799) essays
Causes of the French Revolution (1789-1799) essays In the 1700's there was social unfairness in France. Taxes and laws were different in each province causing confusion and injustice. Louis XIV and Louis XV both left big debts when they died, and this made France nearly bankrupt. The clergy and nobles had plenty of money but the king couldn't tax the wealthy. Louis XVI asked the First and Second Estates to accept a land tax, but they refused. In 1789, the country was in need of money and almost completely broke. The French Revolution was the result of the unhappiness of the French majority with their government of that time. One of the main reasons for their unhappiness was the legal division among the social groups that had been ongoing for several centuries. The French were divided into three estates, religious leaders or clergy making up the first estate, nobles in the second, and the peasants and commoners the last estate. An important part of the third estate was the large, wealthy middle class that included traders, government officials, and lawyers. The third estate was bothered by the fact that they were the only providers of their country's tax revenue. Many of them were extremely economically important but unrecognized as they belonged to the third estate, not the first or second. When the king was trying to tax the second and third estates it made those people angry, and that meant that the whole country was feeling the need to rebel, so the French revolution was inevitable. During that period of time, their king, under an absolute monarchy and by divine right, governed France where the right to rule was thought to have come from God. In the 18th century, French writers began questioning this right and raising radical ideas about freedom and human rights. One particular idea that inspired the French revolution was the suggestion that the right to govern the country came from the people. The French government had run up a high debt due to fighting in the Seven Years' Wa...
Sunday, October 20, 2019
Research Paper Abstract on Child Abuse
Research Paper Abstract on Child Abuse Research Paper Abstract on Child Abuse Child abuse is defined as a non-accidental behavior by parents, caregivers, or any other adults that is outside the norms of conduct and can cause physical or emotional harm to a child or a young person (Bromfield, 2005). There are five main types of child abuse: physical abuse emotional maltreatment neglect sexual abuse the witnessing of family violence Physical abuse is defined as a non-accidental use of physical force that can cause harm to a child. This includes: shoving, hitting, slapping, shaking, throwing, punching, kicking biting, burning, strangling and poisoning (Bromfield, 2005). It doesnt matter whether an adult had an intend to cause a child harm or not, if an action lead to harm, it is regarded as abusive anyway. Physical abuse can also depend on the age of a child and the nature of the behavior: an action which can be regarded as dangerous and potentially harmful for a child of a certain age can also be regarded as physical abuse. Emotional abuse is defined as an inappropriate verbal or symbolic act towards a child that can lead to childs problems on a psychological level. There are five main kinds of psychological maltreatment: rejecting: the adult refuses to acknowledge the childs worth and the legitimacy of the childs needs; isolating: the adult cuts the child off from normal social experiences, prevents the child from forming friendships, and makes the child believe that he or she is alone in the world; terrorizing: the adult verbally assaults the child, creates a climate of fear, bullies and frightens the child, and makes the child believe that the world is capricious and hostile; ignoring: the adult deprives the child of essential stimulation and responsiveness, stifling emotional growth and intellectual development; corrupting: the adult mis-socializes the child, stimulates the child to engage in destructive antisocial behaviour, reinforces that deviance, and makes the child unfit for normal social experience (Garbarino et al. (1986) p. 8) Another kind of abuse is neglect. It means that either parents, or caregivers do not provide children with enough care as it is expected compared with the norms of society. It consequently can affect childs physical and psychological development. Types of neglect include: physical neglect: characterized by the care givers failure to provide basic physical necessities, such as safe, clean and adequate clothing, housing, food and health care; emotional (or psychological) neglect: characterized by a lack of caregiver warmth, nurturance, encouragement and support (note that emotional neglect is sometimes considered a form of emotional maltreatment); educational neglect: characterized by a care givers failure to provide appropriate educational opportunities for the child; and, environmental neglect: characterized by the care givers failure to ensure environmental safety, opportunities and resources (Dubowitz, Pitts, Black, 2004) Sexual abuse is defined as a use of a child in any sexual activity, with or without consent, and often without childs understanding. Sexual abuse can happen within a family between family members, with an adult with no familiar relation to a child, or an adult that is in a position of power and authority over the child. Witnessing of family violence is a kind of an abuse that happens when a child is present while a family member is subjected to any kind of violence. Some researches however tend to include this type of an abuse in an emotional type of an abuse. Bibliography Bromfield, L. M. (2005). Chronic child maltreatment in an Australian Statutory child protection sample (Unpublished doctoral dissertation). Deakin University, Geelong. Dubowitz, H., Pitts, S. C., Black, M. M. (2004). Measurement of three major subtypes of child neglect. Child Maltreatment,9(4), 344-356. Garbarino, J., Guttmann, E., Seeley, J. W. (1986). The psychologically battered child: Strategies for identification, assessment, and intervention. San Francisco, California: Jossey-Bass Inc. How to Write a Research Paper Abstract on a Social Topic: A research paper abstract is a concise summary of your research project; therefore, you should include here major highlights of your work and pointers to what you will discuss further. It is important to describe specifically your work, not your topic in general. Another tip is to keep the language of your research paper abstract neutral. Since it is a social topic, it is possible to become emotionally attached to the topic throughout research, which can show in the language of the whole paper. That kind of tone in a research paper is inadvisable. Do you need a custom research paper aboutà Child Abuse or abstract? Contact our research paper service to order a 100% non-plagiarized paper of high quality.
Saturday, October 19, 2019
Personality Approach Paper Research Example | Topics and Well Written Essays - 1000 words
Personality Approach - Research Paper Example Symptoms of schizophrenia as per the DSM IV include: delusions, hallucinations, disorganized speech, catatonic behavior and negative symptoms like affective flattening (DSM IV). Schizophrenia is a complex disorder. Patients suffering from schizophrenia lead chaotic lives, with little or no contact with reality. The biological approach The biological approach to psychology believes that behavior has some biological roots and part of human behavior is predetermined biologically. The supporters of biological approach claim that the functioning of a living organism can be explained and treated on basis of its biological structure and bio chemical composition (Weiten, 2007). Nature versus nurture has been an ancient debate among psychologists. The biological approach suggests that nature has a stronger role than nurture; which implies that behavior is determined by genes. With the decline of behaviorism, the belief that our environment can change us into anything is dying out and the biol ogical approach is meeting greater acceptance. The biological approach offers a threefold explanation of personality. First is the one by Eysenck, which maintains that individual differences in behavior of humans are based on physiological variations. Second explanation of personality as per the biological approach is that of temperaments. ... According to this view point, humans inherit behavioral traits from their ancestors and therefore react to situations like their ancestors did (Burger, 2008). Biological approach to schizophrenia Several twin and adoption studies have revealed genetic ties of schizophrenia. Twin studies are common in biopsychology since in case of twins who are not separated, the environment is usually the same, therefore any discrepancy among behavior of twins (especially monozygotic ones) can be attributed to genes (Burger, 2008). According to Gottesman (1991), cited in Myers (1992), adoption studies have confirmed a genetic link in schizophrenia. This is in accordance with Eysenckââ¬â¢s idea that the genetic makeup of humans actually determines the behavior. Etiology of schizophrenia other than ââ¬Ëgeneticââ¬â¢ includes hormonal imbalances in the brain and structural and biochemical abnormalities of brain. The Dopamine hypothesis has gained quite a lot of popularity in this regard. It pos its that schizophrenia is related to excess activity of neurotransmitter dopamine in the brain. According to Andreasen and colleagues (1994), patients with schizophrenia have larger Cerebrospinal Fluid volumes as compared to healthy persons. The same findings were also confirmed by Staal and colleagues (2000). Schizophrenia runs in families and can be inherited (Alloy & Jacobson, 1999). This is in line with the evolutionary theory of personality as discussed in the previous section. Treating schizophrenia: the biological approach The biological approach offers various ways of treating Schizophrenia. Each one is discussed as follows: Anti Psychotic Drugs The most common and basic treatment for schizophrenia is via anti psychotic drugs. These are medications from a psycho active group and
Friday, October 18, 2019
Security of an Organisation and Civil and Criminal Law Essay
Security of an Organisation and Civil and Criminal Law - Essay Example The likelihood of occurrence of the threat posing the risk will determine the need for intervention in the activities within a facility. In other words, Security may be considered assured freedom from poverty or want, precautions taken to ensure against theft, espionage, or a person or thing that secures or guarantees. According to Fischer and Green, (2004, p. 21) "security implies a stable, relatively predictable environment in which an individual or group may pursue its ends without disruption or harm and without fear of such disturbance or injury." These are the primary reasons underlying the widening horizons and increasing scope of the security industry. The security requires manifold diversification of deployment of manpower. Thus, the security industry is a diverse and a specialty industry that has a requirement for both generic and domain-specific skills (Hesse & Smith, 2001; Manunta, 1996) and is a relatively young and emerging discipline, continues to expand (Fischer & Green, 2004). However, this expansion has resulted in limited tertiary education programs and research to determine the knowledge structure of security. Security in a wider sense applied to a polity may be expanded to consider national security and the defense of a nation which is managed and secured through the use of force and control by armed forces. The power to control is exercised through laws to control a state's citizens and aliens. Security necessarily implies policing of a public which includes citizens and aliens with the aid of the armed forces, state police armed with various civil and criminal laws. It is also considered useful in the prevention of crime, risk management or loss prevention. This diversity results in a society that has no clear understanding of what security is, but has the divergence of interests from many stakeholders. A traditional definition of security is the provision of private services in the protection of people, information and assets for individual safety or community wellness (Craighead, 2003). Thus more and more business and commercial establishments are bending towards increased security services in preventing undesirable, unauthorized or detrimental loss of an organizations assets. But security may present very different meaning to different people given time, place and context. It has been suggested that security has to have a shared definition among many disciplines, that this is essential and urgent (Manunta, 1996) This is more so in view of the fact that current international fight against terrorism and related threats has given the security a new meaning and dimension encouraging the scholars to study the subject with diverse perspectives, in national, domestic and international fields. The security to the organization can be studied from two perspectives. Traditionally, the security threat perception of a business organization has been different from the security threat perception of a country.
The Impact of E-Services on Socio-Economic Development in South Africa Research Paper
The Impact of E-Services on Socio-Economic Development in South Africa - Research Paper Example Accessibility to e-services has a high potential to add value to marginalized communities (Heeks, 2010), reduce poverty (Cecchini and Scott, 2003) and spur development. However, accessibility is not enough. Other factors must be put into account when making decisions on information technology developments for optimal benefits to all stakeholders and de-marginalization of marginal groups. E-services have revolutionized the global market to levels never imagined before; however, the true impact has not been quantified since the concept is new and has not been widely adopted, nor has it stabilized. Background The World Bank classifies the economy of South Africa as an upper-middle income economy, being the largest economy in Africa in terms of GDP per capita. However, over a quarter of South Africans are unemployed and a similar number lives on less than 1.25 US dollars per day; it is this population that e-services target most since they are primarily unbanked by the conventional comme rce systems. The economy is an amalgamation of primary, secondary and tertiary industries, though it has shifted in the recent years towards being a tertiary economy, an industry that contributes about 65 percent of GDP (OECD, 2010). Despite the continuous growth of the online industry, the country still lags behind the worldââ¬â¢s leading economies in terms of volumes and amounts spent in online transactions. Laws and policies passed and implemented in the recent years have increased access to e-services by the population mainly by increasing competition among service providers, which results in reduced prices for accessing and using e-services. For instance, the Telecoms Amendment Act of 2001 introduced a competing network provider for Telkom, such that for the two to attract and retain customers, they had to reduce the costs of their services (Z-Coms, 2002). Elimination of monopoly was the first step towards liberalization of the telecommunications sector, which was achieved b y the Electronic Communications Act (ECA) of 2005. Finally, the Electronic Communication and Transactions Act of 2002 that was aimed at facilitation of e-transactions, e-governance, and other services introduced reliable and universal access to e-services. Context Cieslikowski et al. (2008) state that the world has seen exponential growth in coverage by mobile networks for both developed and developing countries; hence the impact of use of these devices cannot be ignored. For instance, money transfer services whereby money is sent through a mobile network and collected from a local retail outlet, have changed how the low-income communities transfer their money. Before the introduction of services like these, the poor had little or no access to banking and money transfer services, mainly because of high rates or the location of the banking institution in cities. In this case, ICT enabled the rural folk to have access to services that were previously a preserve of the rich. Further ch anges are expected on migration to digital terrestrial television migration, as digital signal will include all communication services bundled. Therefore, everyone will be able to access services with relative ease, and the government will use these channels to communicate matters on policy and development (Gupta and Shah, 2012). However, for these benefits to be enjoyed by the common citizen,
Thursday, October 17, 2019
The History of the United States Research Paper Example | Topics and Well Written Essays - 750 words
The History of the United States - Research Paper Example The civil war arose when the US people fought over power, land. (Burke 12). The Southerners felt threatened since they were thriving well in the slave trade. They feared the north might interfere with the growth of the trade which was booming at that time. It might be said with conviction that it is indeed slave trade that leads to the division of America into two, but there are other reasons. At that time, the Southerners whose daily lifestyle relied much on plantation farming and could, therefore, not do without slaves and the slave trade. They wished that it could grow and even spread in the west. In the contrary, the northerners who were politically and economically doing well posed a threat to the Southerners. So for the survival of the union of the American state, it was necessary that the slave trade was not tempered with, but left to grow (Burke 27). However, in 1860 when Abraham Lincoln became president, the union of American states came to a point where enough is enough. Wh en he publicly made his intentions clear to stop growth of the slave trade but not slavery, he compelled South Carolina followed by six other American southern states to withdraw from the union. This lead to the Civil war that lasted for four years after the seven states united and named Jefferson Davis there president. On15th of April 1861 due to break up of the states there followed a lot of fights and states of unrest battles with the first reported incidence being on July 21st 1861. At this point nothing, much could be done to stop the war anticipated. President Lincoln gave a decree that soldiers be reinforced around Fort Caswell and Fort Johnson but was all in vain due to luck of cooperation from some of the states like Missouri, North Carolina and Tennessee (Finney 33). There was some response to the presidentââ¬â¢s order from some companies from Pennsylvania who offered and provided soldiers on the 18th of April 1861. Between 18th and 19 of April soldiers managed a little to destroy points where weapons were kept in Virginia. At this juncture, President Lincoln pronounced the closer of states belonging to the Confederate. When the soldiers of the Union dared to pass through the Confederate states, Baltimore soldiers went on a rampage as a retaliate gesture. This made Lincoln add more closure by including Virginia and North Carolina in the list of sates closed. On the 20th of April 1861, there was an attempt by the Federal soldiers to Attack Virginia among other states. However, there was help by the Confederates who happened to save a lot of valuable staffs making the Federal soldiers retreat. On the seventh 25th of April the same year there was more reinforcement in Washington DC. On 29th, an election was held (Keifer 46). The governor was given the power to select commissioners by the Legislative body at Tennessee so the commissioners can be in accordance with the Confederacy. Voters who were supporting the re-evaluation of the conditions leading to the breakup of the United States Where joined hand in hand by The North Carolina legislative body. In May 17th North Carolina and Confederacy join hands. The voting was only restricted among the legislative body, and the citizens were not allowed to participate (Long 77). Conclusion A lot of activities was done at the legislative level most of which were being decided by the power of the ballot box. In the war, many civilian lost their lives; the national government became stronger
It is said that Mark twain in his writing tried to release human mind Essay
It is said that Mark twain in his writing tried to release human mind from moral, religious and literary standards and show the - Essay Example ââ¬Å"There was things which he stretched, but mainly he told the truth.â⬠(Twain 72b). Twainââ¬â¢s attempt to release the mind of humans from the standards that has been set for them by the society could be seen in Huckleberryââ¬â¢s Finn when he wrote that, ââ¬Å"But I reckon I got to light out for the territory ahead of the rest, because Aunt Sally sheââ¬â¢s going to adopt me and sivilize me, and I canââ¬â¢t stand it. I been there before.â⬠(Twain 569). Twain used the character of Huckleberry to show an individualââ¬â¢s attempt to break away from the standard that the society set for him. Mark Twain used the character of Huck to show the extent at which humans tried to free themselves from what was perceived as societal norms and values. Huckleberry kicked against his adoption by Aunt Sally as he knows that Sally is someone that would likely try to instill some societal values and norms in him and he has not come to terms with this fact. The truth of life according to Mark Twain is a situation where humans can be made to enjoy life without anybody setting standards and values for them. Mark Twain believes that people should be made to do the things they feel is the best for them without being conformed to some stereotyped rules and precepts. This way, people would not have to live a hypocritical life and a life of lies and deceit.
Wednesday, October 16, 2019
The History of the United States Research Paper Example | Topics and Well Written Essays - 750 words
The History of the United States - Research Paper Example The civil war arose when the US people fought over power, land. (Burke 12). The Southerners felt threatened since they were thriving well in the slave trade. They feared the north might interfere with the growth of the trade which was booming at that time. It might be said with conviction that it is indeed slave trade that leads to the division of America into two, but there are other reasons. At that time, the Southerners whose daily lifestyle relied much on plantation farming and could, therefore, not do without slaves and the slave trade. They wished that it could grow and even spread in the west. In the contrary, the northerners who were politically and economically doing well posed a threat to the Southerners. So for the survival of the union of the American state, it was necessary that the slave trade was not tempered with, but left to grow (Burke 27). However, in 1860 when Abraham Lincoln became president, the union of American states came to a point where enough is enough. Wh en he publicly made his intentions clear to stop growth of the slave trade but not slavery, he compelled South Carolina followed by six other American southern states to withdraw from the union. This lead to the Civil war that lasted for four years after the seven states united and named Jefferson Davis there president. On15th of April 1861 due to break up of the states there followed a lot of fights and states of unrest battles with the first reported incidence being on July 21st 1861. At this point nothing, much could be done to stop the war anticipated. President Lincoln gave a decree that soldiers be reinforced around Fort Caswell and Fort Johnson but was all in vain due to luck of cooperation from some of the states like Missouri, North Carolina and Tennessee (Finney 33). There was some response to the presidentââ¬â¢s order from some companies from Pennsylvania who offered and provided soldiers on the 18th of April 1861. Between 18th and 19 of April soldiers managed a little to destroy points where weapons were kept in Virginia. At this juncture, President Lincoln pronounced the closer of states belonging to the Confederate. When the soldiers of the Union dared to pass through the Confederate states, Baltimore soldiers went on a rampage as a retaliate gesture. This made Lincoln add more closure by including Virginia and North Carolina in the list of sates closed. On the 20th of April 1861, there was an attempt by the Federal soldiers to Attack Virginia among other states. However, there was help by the Confederates who happened to save a lot of valuable staffs making the Federal soldiers retreat. On the seventh 25th of April the same year there was more reinforcement in Washington DC. On 29th, an election was held (Keifer 46). The governor was given the power to select commissioners by the Legislative body at Tennessee so the commissioners can be in accordance with the Confederacy. Voters who were supporting the re-evaluation of the conditions leading to the breakup of the United States Where joined hand in hand by The North Carolina legislative body. In May 17th North Carolina and Confederacy join hands. The voting was only restricted among the legislative body, and the citizens were not allowed to participate (Long 77). Conclusion A lot of activities was done at the legislative level most of which were being decided by the power of the ballot box. In the war, many civilian lost their lives; the national government became stronger
Tuesday, October 15, 2019
Procopius secret history Essay Example | Topics and Well Written Essays - 750 words
Procopius secret history - Essay Example Justinian is presumed to be of average height, he is not tall or short. He is also described as moderately flabby and not thin. The author continues to describe Justinian as healthy looking. His physical appearance is not affected even when he fasts for two days. In contrast, Justinian has a different character from his attractive appearance (Halsall 1). This makes it difficult to describe Justinian. Justinian is illustrated as amenable and villainous. People may refer to him as a moron. Justinian is never honest with any individual, but all the time crafty in his actions and words. Nonetheless, he is tricked by any person who wants to delude him. In addition, Justinianââ¬â¢s personality is an unusual mixture of wickedness and foolishness. His contradictory characteristics combine in his makeup. Justinianââ¬â¢s Administration Justinian changes the countryââ¬â¢s laws and regulations as soon as he takes charge. He reintroduces into the administration whatever elements of the s ociety that are forbidden. In contrast, Justinian repeals all customs or practices that were previously set up. Moreover, Justinian abolishes existing agencies and creates different ones to manage the public issues of the state. He also alters the structures of the army. He changes the regulations and laws of the military. He makes all these changes, not for any advantage or improvement of justice, but to make everything recent and named after him (Halsall 1). His foolishness is further highlighted when he renames institutions and structures he is unable to alter. Justinian also does everything to acquire property, including looting and killing. He accumulates property through looting. He grabs the houses of the wealthy and searches for more property. He shares a part of his loot with barbarians. Justinianââ¬â¢s Laws He has a thought of killing more people in the state and gaining more property. He promotes frontier warfare, and civil strife to conquer the Romans. He creates a ne w way of eliminating his people. He sets up new laws that abolish previous religious beliefs, for example, he calls for the abolishment of heresies, used by the Christian faithful in the Roman Empire. He replaces the religious beliefs with the orthodox dogma, theeatening. For example, he proposes loss of the hereticââ¬â¢s entitlement to give possessions to his household or further relatives. These laws make the heretic churches extra wealthy. These depict a vast wealth disparity between the heretic churches and the entire Roman Empire administration (Halsall 1). He also enforces a law that prosecutes offences regardless of the time they occur. Period of Existence The writer lived in a period of dictatorship and inadequate freedom. This is because this period had a lot of restraints. There are a number of suggestions that the administration of Justinian has not been efficient as perceived. People were forced to move from the state to other areas (Halsall 1). The people spread to d ifferent cities and countries. This is because they were escaping prosecution from the administration. Conclusion From the beginning, the resource characterizes Justinian as an individual with different characters from his appearance. This is because he never practices honesty with any person and is always crafty in his actions and words. He is also depicted as evil and foolish because he get whatever he wants through any means and can be easily tricked by anyone. The work
Monday, October 14, 2019
Amazon Ebusiness Essay Example for Free
Amazon Ebusiness Essay Amazon was founded in 1994, spurred by what Bezos called regret minimization framework, his effort to fend off regret for not staking a claim in the Internet gold rush. Company lore says Bezos wrote the business plan while he and his wife drove from New York to Seattle , although that account appears to be apocryphal. The company began as an online bookstore; while the largest brick-and-mortar bookstores and mail-order catalogs for books might offer 200,000 titles, an online bookstore could offer more. Bezos named the company Amazon after the worlds largest river. Since 2000, Amazons logotype is an arrow leading from A to Z, representing customer satisfaction (as it forms a smile); a goal was to have every product in the alphabet. In 1994, the company incorporated in the state of Washington, beginning service in July 1995, and was reincorporated in 1996 inDelaware. The first book Amazon.com sold was Douglas Hofstadters Fluid Concepts and Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought. Amazon.com issued its initial public offering of stock on May 15, 1997, trading under theNASDAQ stock exchange symbol AMZN, at an IPO price of US$18.00 per share ($1.50 after three stock splits in the late 1990s). Amazons initial business plan was unusual: the company did not expect a profit for four to five years. Its slow growth provoked stockholder complaints that the company was not reaching profitability fast enough. When the dot-com bubble burst, and many e-companies went out of business, Amazon persevered, and finally turned its first profit in the fourth quarter of 2001: $5 million or 1à ¢ per share, on revenues of more than $1 billion, but the modest profit was important in demonstrating the business model could be profitable. In 1999, Time magazine named Bezos Person of the Year,à recognizing the companys success in popularizing online shopping. Amazon.com products and services: Amazon product lines include books, music CDs, videotapes and DVDs, software, consumer electronics, kitchen items, tools, lawn and garden items, toys games, baby products, apparel, sporting goods, gourmet food, jewelry, watches, health and personal-care items, beauty products, musical instruments, clothing, industrial scientific supplies, and groceries. The company launched Amazon.com Auctions, a Web auctions service, in March 1999. However, it failed to chip away at industry pioneer eBays large market share. Amazon.com Auctions was followed by the launch of a fixed-price marketplace business, zShops, in September 1999, and the now defunct Sothebys/Amazon partnership called sothebys.amazon.com in November. Auctions and zShops evolved into Amazon Marketplace, a service launched in 2001 that let customers sell used books, CDs, DVDs, and other products alongside new items. Today, Amazon Marketplaces main rival is eBays Half.com service. In August 2005, Amazon began selling products un der its own private label, Pinzon; the trademark applications indicated that the label would be used for textiles, kitchen utensils, and other household goods.In March 2007, the company applied to expand the trademark to cover a more diverse list of goods, and to register a new design consisting of the word PINZON in stylized letters with a notched letter O whose space appears at the one oclock position.. Coverage by the trademark grew to include items such as paints, carpets, wallpaper, hair accessories, clothing, footwear, headgear, cleaning products, and jewelry.On September 2008, Amazon filed to have the name registered. USPTO has finished its review of the application, but Amazon has yet to receive an official registration for the name. Amazon MP3, its own online music store, launched in the US in September 25, 2007, selling downloads exclusively in MP3 format without digital rights management.[This was the first online offering of DRM-free music from all four major record companies. In August 2007, Amazon announced AmazonFresh, a grocery service offering perishable and nonperishable foods. Customers can have orders delivered to their homes at dawn or during a specified daytime window. Delivery was initially restricted to residents of Mercer Island, Washington, and was later expanded to severalà ZIP codes in Seattle proper. AmazonFresh also operated pick-up locations in the suburbs of Bellevue and Kirkland from summer 2007 through early 2008. In 2008 Amazon expanded into film production, producing the film The Stolen Child with 20th Century Fox. Amazon.com has incorporated a number of products and services through development and acquisitions. The Honor System was launched in 2001 to allow customers to make donations or buy digital content, with Amazon collecting a percentage of the payment plus a fee. The service was discontinued in 2008. and replaced by Amazon Payments. Amazon launched Amazon Web Services(AWS) in 2002, which provides programmatic access to latent features on its website. Amazon also created channels to benefit certain causes. In 2004, Amazons Presidential Candidates allowed customers to donate $5ââ¬â200 to the campaigns of 2004 U.S. preside ntial hopefuls. Amazon has periodically reactivated a Red Cross donation channel after crises such as the 9/11, Hurricane Katrina, and the 2004 earthquake and tsunami in the Indian Ocean. By January 2005, nearly 200,000 people had donated over $15.7 million in the US. Amazon Prime offers two day shipping with no minimum purchase amount for a flat annual fee, as well as discounted priority shipping rates. Amazon launched the program in the continental United States in 2005, in Japan, the United Kingdom and Germany in 2007, and in France (as Amazon Premium) in 2008. Launched in 2005, Amazon Shorts offers exclusive short stories and non-fiction pieces from best-selling authors for immediate download. By June 2007, the program had over 1,700 pieces and was adding about 50 new pieces per week. In November 2005, Amazon.com began testing Amazon Mechanical Turk, an application programming interface (API) allowing programs to dispatch tasks to human processors. In March 2006, Amazon launched an online storage service called Amazon Simple Storage Service (Amazon S3). An unlimited number of data objects, from 1 byte to 5 gigabytes in size, can be stored in S3 and distributed via HTTP or BitTorrent. The service charges monthly fees for data stored and transferred. In 2006, Amazon introducedAmazon Simple Queue Service (Amazon SQS), a distributed queue messaging service, and product wikis (later folded into Amapedia) and discussion forums for certain products using guidelines that follow standard message board conventions. Also in 2006, Amazon introduced Amazon Elastic Compute Cloud (Amazon EC2), a virtual site farm, allowing users to use the Amazon infrastructure to run applications rangingà from running simulations to web hosting. In 2008, Amazon improved the service adding Elastic Block Store (EBS), offering persistent storage for Amazon EC2 instances and Elastic IP addresses, static IP addresses designed for dynamic cloud computing. In 2007 Amazon launched Amapedia, a wiki for user-generated content to replace ProductWiki, the video on demand s ervice Amazon Unbox, and Amazon MP3, which sells downloadable MP3s. Amazons terms of use agreements restrict use of the MP3s, but Amazon does not use DRM to enforce those terms. Amazon MP3 sells music from the Big 4 record labels EMI, Universal, Warner Bros. Records, and Sony BMG, as well as independents. Previous to the launch of this service, Amazon made an investment in Amie Street, a music store with a variable pricing model based on demand. Also in 2007 Amazon launched Amazon Vine, which allows reviewers free access to pre-release products from vendors in return for posting a review, as well as payment service specifically targeted at developers, Amazon FPS. In November 2007, Amazon launched Amazon Kindle, an e-book reader which downloads content over Whispernet, via the Sprint Nextel EV-DO wireless network. The screen uses E Ink technology to reduce battery consumption. In 2008 Amazon stated that its Kindle-based library included 200,000 titles. In December 2007, Amazon introduced SimpleDB, a database system, allowing users of its other infrastructure to utilize a high reliability high performance database system. In August 2007, Amazon launched an invitation-only beta-test for online grocery delivery. It has since rolled out in several Seattle, Washington suburbs. In January 2008 Amazon began rolling out their MP3 service to subsidiary websites worldwide. In December, 2008, Amazon MP3 was made available in the UK. In September, IMDB and Amazon.com launched a Music metadata browsing site with wiki-like user contribution. In November, Amazon partnered with Fisher-Price, Mattel, Microsoft and Transcend to offer products with minimal packaging to reduce environmental impact and frustration with opening clamshell type packaging. Amazon Web Services launched a public beta of Amazon Elastic Compute Cloud running Microsoft Windows Server and Microsoft SQL Server. Amazon Connectenables authors to post remarks on their book pages to customers. WebStore allows businesses to create custom e-commerce websites using Amazon technology. Sellers pay a commission of 7 percent, including credit-card processing fees and fraud protection, and a subscription fee ofà $59.95/month for an unlimited number of webstores and listings. Why Amazon.com is successful as a business on internet and has excellent capabilities supported by information system and e-commerce? Amazons initial business plan was unusual: the company did not expect a profit for four to five years. Its slow growth provoked stockholder complaints that the company was not reaching profitability fast enough. When the dot-com bubble burst and many e-companies went out of business, Amazon persevered, and finally turned its first profit in the fourth quarter of 2001: $5 million or 1à ¢ per share, on revenues of more than $1 billion, but the modest profit was important in demonstrating the business model could be profitable. In 1999, Time magazine named Bezos Person of the Year, recognizing the companys success in popularizing online shopping. Amazon changed the way it does business through the years. First it was an online book seller. Next it expanded into selling music and videos. Then it offered toys, consumer electronics and software to its customers. These were linked with a host of new products until this very day. Amazon has a constantly evolving product line. Its competitors have a hard time catching up with the innovator. During its initial years of operation, Amazon was not making any real profit. It practiced instead the habit of reinvesting its income into new markets. This it did to make possible for its customers to make wider choices for the companys offerings. Inventory management is an important function for any business and its efficient implementation can play a major role in reducing costs within a company. Policies, procedures, and techniques employed in maintaining the optimum number or amount of each inventory item. The objective of inventory management is to provide uninterrupted production, sales, and/or customer-service levels at the minimum cost, Levi D. S. et al (2003). Levi explains that a high-quality inventory management system provides a smooth and efficient supply chain by reducing costs and time. Initially when a company is established, key individuals may perform su ch tasks as purchasing, manufacturing or inventory control with little problem in terms of overlapping functions. But as a company expands it may be necessary to concentrate on core functions in the aim to have specialized personnel in every department. Each function has an important part to play in the supply chain. The correct management ofà inventory enables a company to reduce liabilities and cost of overstocking, to streamline operations and to have better utilized staff. Amazon.com, the worlds largest online retailer and one of the nations biggest book sellers, is one of the iconic companies of the Internet era, Eells S. (2010), and by realizing the importance of inventory management can only improve its supply chain. From the text we can see that when CEO Jeffrey P. Bezos went about setting up Amazon.com, he had a clear aim to offer customers a wide selection of books but at the same time did not want to spend time and money on opening stores and warehouses and in dealing with the inventory. Bezos was hesitant in deciding to maintain Amazons own warehouse but realized that this was the only way for the company to keep customers satisfied. Internet shopping was rapidly expanding and with Amazon now stretching its ranges from not only books but to CDs, toys and hardware, they too were a growing industry. Amazon began setting up warehouses throughout the US, strategically placing them in states with little or no sales tax in order to reduce costs. These warehouses were very well maintained and completely computerized, with each item having a separate code which made inventory management a lot easier. Within the large warehouses, Amazon held all products which were available on the website. This was not always a good idea as it cost Amazon money in order to stock these goods. In the holiday season of 1999, Bezos was determined not to disappoint any customers; therefore he ordered larger amounts of every product. With this large amount of inventory, Bezos found it very diffic ult to manage, so aimed to rearrange the warehouses to accommodate the demand in different regions. They then decided to outsource some of its routines activities so that they could concentrate more on their core competencies. Deciding whether to outsource or not was a difficult decision for Amazon but seen in the Strategic outsourcing book by Greaver M. (1999), he explains that there quiet a number of reasons how outsourcing can be a major advantage. These points are broken into 6 headings; 1. Organizational reasons Enhance effectiveness and focus on what you do best and also makes the company more flexible 2. Improvement driven reasons Improve operating performance and also management and control 3. Finally driven reasons Reduce investment assets and free up these resources for other areas of the business 4. Revenue driven reasons Gain market access andà business opportunities along with accelerating expansion 5. Cost driven reasons Reduce cost through superior provider performance and lower cost structure 6. Employee driven reasons Increase commitment and energy in non c ore areas. Amazon decided to outsource its inventory management, and with this they decided not to stock every item offered on its site. It stocked only the most popular and frequently purchased items and as for the other items, they were requested from the distributor on ordering. The item would be sent to Amazon, unpacked and finally sent to the customer. Amazon entered into an agreement with Ingram Micro Inc. to use its knowledge and experience in the electronic goods and supply chain management in order to provide logistics and order-fulfillment services for desktops, laptops and other computer related accessories. From the case, Kevin Murai, President, Ingram Macro U.S. informs everyone the advantages in which they can offer to Amazons supply chain and satisfaction of customers, ââ¬Å"The customer fulfillment services we are providing to Amazon.comââ¬â¢s computer store will minimize the number of touches to the product, while ensuring a seamless shopping experience for Amazons customers from start to finishâ⬠. A collaborative approach was obvious from this. A collaborative partnership has become an alternative approach to care, replacing traditional hierarchical approach as the desired approach to care. The features of collaborative partnerships are (1) Power sharing and sharing of expertise; (2) the pursuit of mutually agreed on, person centered goals and, (3) a dynamic process that requires the active participation and agreement of all partners in the relationship, Elsevier M. (2006). Both Amazon and Ingram Micro both shared the passion for customer satisfaction which was the main driving force to the success of their partnership. Amazon has identified its core competencies as: customer convenience and accessibility, massive selection, personalized service, quality of the site content, quality of its search tools and price, Mulqueen K. (2009). By entering into this partnership it gives Amazon more quality time to put into its core competencies. During the initial stages of Amazons warehousing, it aimed to have every item in stock in o rder to maximize customer satisfaction. By having this inventory, it would enable Amazon to meet the needs of the customers when they purchased the goods online. When the customer chooses the item, Amazon takes it from inventory and sent it to the respectiveà customer. We can see the logic in which Bezos takes as he is aiming to satisfy every customer in order to build a positive image and reputation of the company. Holding this much inventory on the other can be quite costly and also for a small business which Amazon was when taking on this method can be very difficult to manage. Amazons warehouses were a quarter mile long and 200 yards wide storing millions of books. Each warehouse cost Bezos around 50 million and not only this he started to realize that having all these large amounts of stock was unutilized cash which could be used to improve the business elsewhere. The below image (fig 1.1) gives you an idea of the scale of the warehouses and how an effective inventory management structure is vital. Learning from the difficult holiday season of 1999, Bezos outsourced some of their core competencies in order to pay more attention to othe r areas of the business. In our opinion this was a step in the right direction as when Amazons partners shipped the goods Amazon revamped the layout of their warehouses which makes the items easier to find and allowed customer orders to be sorted more efficiently. In early 2001, when Amazon partnered with Ingram Micro Inc., we feel that this was the correct decision for Amazon in the aim for efficient inventory management and it didnââ¬â¢t take long for changes to be made to the stocking of inventory. Amazon decided to stock only the most popular and most frequently purchased. If an item which wasnââ¬â¢t in stock, Amazon simply ordered in from the distributor and who then shipped it to Amazon where they would unpack it and send it to the customer. This may seem like a longer process but we feel this step which significantly reduce costs and better utilized Amazons finances. This is evident from the case as in December 00; their gross profit was 656.8 million where it was almost doubled in December 02 where the profit was 1,074.9 million. By doing this method, inevitably Amazon reduced holding costs. This method was proving to be a positive for Amazon as the improved inventory management helped Amazon record its first ever profit in 2001. From being initially in a deficit of $2.86 billion seven years earlier, Amazon recorded a net profit of $5 million in the fourth quarter of 2001. By Amazon outsourcing its inventory management, we could see the improvements almost immediately from their financial reports in the case. It is clear in our opinion, that Amazon made the right decision when outsourcing this function. It has reduced cost by keeping fewer inventoriesà and at the same time has partnered with a company with a great deal of expertise in the technology functions which can again be a major positive for the company. This shows again that outsourcing the inventory function was the correct decision for Amazon. The transfer of Amazons inventory management as shown in the case was a positive influence on the company and we feel that it was a successful task. The reason for this is simple; Amazon has tried and tested various inventory techniques from when it was first established. At first Amazons inventory was too great and was seen to be unutilized cash. Bezos realized that this unutilized cash could possible to used to benefit over departments within the company. The task of outsourcing this area made a profit for the company immediately, at the end of 2001, Amazon had a sales record of 1.1 billion which was a 15% increase on the same period of the previous year. Then again in 2002, we can see from the case that Amazon recorded sales of 3.93 billion which was a 26% increase on the year previous. These figures show that the task of outsourcing inventory for Amazon was an important function which has shown to get record sales for the company and along with the expertise given by Ingram Micro was overall a positive influence on the company. Overall, Amazons decision to outsource its inventory management and concentrate more on other funct ions within the business was the correct decision in our opinion. This is proven by the increase in profit since doing so. Amazon managed to outsource this function and still satisfy their customers which is one of their core values along with being innovative. According to businessweek.com, Amazon in 2010 had a net income of $231 million in comparison to $177million in 2009 which again is an indication that the companyââ¬â¢s decisions have only had a positive impact as the company continues to grow. This is a positive for the company but in comparison to its main competitor, EBay had a net income of 397.65 million in 2010 which is also seen on businessweek.com. This shows that there is a lot of work done but still in order to compete with its competitors it must still strive to improve. Amazon prides itself on a strong brand, excellent customer service and a well designed, easy to use website. Its use of E-Business strategies enables the company to cut costs better than its competitors and empower its customers by offering them choice. It could be argued that Amazonsââ¬â¢ most valuable asset is its CEO and Founder Jeff Bezos. Bezos innovative style has grown the company fromà strength to strength and latest figures, according to the website www.siliconrepublic.com show an increase in profit of 36% to $12.95bn for 2010 from a sink to 3.7pc from 5pc at the end of 2009. In 2001, Amazons CEO, Jeff Bezos welcomed competitors rather than fighting them. This decision was initially seen as somewhat controversial. According to Vogelstein (2003) the decision caused such a stir in the book-publishing community that the Authors Guild formally stepped in. They wanted used books sold on a different page from newly published ones. Amazon was able to do this as a result of its efficient inventory management. Vogelstein (2003) states that Amazons warehouses are so efficient that they need to be replenished 20 times per year and they can now handle three times the volume they handled in 1999. The net result of this initiative is increased profits as can be seen from the case. The success of Amazon can be attributed to E-Business. Tedeschi (1999) state; Business on the Internet is cutting significant cost out of the supply chain, with better procurement and resource planning. With Amazon, these cost savings are passed onto the end customer. Through price comparison and transparency on its webpage, customers could make informed decisions based on price. This created massive popularity with its customers. E-Business also creates brand strength. According to Matthewson (2002) a recent survey demonstrated the importance of online brand building, as it showed that six out of ten internet users directly typed into their browser the address of the brand they are interested in buying. The website is said to attract 81 million unique visitors each month .Amazon has capitalized on this process known as cyber-branding. This essentially promotes the company through superior customer service. Its logistics in both inventory efficiency and technology gives it a superior edge over its competitors. Its operations are very efficient due to the strategic locations of its warehouses and headquarters, which have enabled Amazon to cut a lot of its costs. The market in which amazon.com operates and how it is organized by region and country: Amazon.com has always sold goods out of its own warehouses. It started as a bookseller, pure and simple, and over the last decade has branched out intoà additional product areas and the third-party sales that now represent a good chunk of its revenue (some estimates put it at 25 percent). Both retailers and individual sellers utilize the Amazon.com platform to sell goods. Large retailers like Nordstrom, Lands End and Target use Amazon.com to sell their products in addition to selling them through their own Web sites. The sales go through Amazon.com and end up at Nordstrom.com, Lands End.com or Target.com for processing and order fulfillment. Amazon essentially leases space to these retailers, who use Amazon.com as a supplemental outlet for their online sales. Small sellers of used and new goods go to Amazon Marketplace, Amazon zShops or Amazon Auctions. At Marketplace, sellers offer goods at a fixed price, and at Auctions they sell their stuff to the highest bidder. Amazon zShops f eatures only used goods at fixed prices. If an item listed on zShops, Marketplace or Auctions is also sold on the main Amazon.com, it appears in a box beside the Amazon.com item so buyers can see if someone else is selling the product for less in one of the other sales channels. The level of integration that occurs on Amazon is a programming feat that few (if any) online sales sites can match. Another sales channel called Amazon Advantage is a place where people can sell new books, music and movies directly from the Amazon warehouse instead of from their home or store. Sellers ship a number of units to Amazon, and Amazon handles the entire sales transaction from start to finish. In all of these programs, Amazon gets a cut of each sale (usually about 10 percent to 15 percent) and sometimes charges additional listing or subscription fees; in the case of Amazon Advantage, the company takes a 55 percent commission on each sale. The Advantage channel is something like a consignment setup, a sales avenue for people who create the ir own music CDs or have self-published a book and are simply looking for a way to get it out there. One of the latest additions to Amazons repertoire is a subsidiary company called Amazon Services. Through Amazon Services, Amazon sells its sales platform, providing complete Amazon e-commerce packages to companies looking to establish or revamp their e-commerce business. Amazon sets up complete Web sites and technology backbones for other e-commerce companies using Amazon software and technology. Target, for instance, in addition to having a store on Amazon.com, also uses Amazon Services to build and manage its own e-commerce site, Target.com. But selling goods isnt the only way to makeà money with Amazon.com. The Web sites affiliate program is one of the most famous on the Web. Through Amazons Associate Program, anyone with a Web site can post a link to Amazon.com and earn some money. The link can display a single product chosen by the associate, or it can list several best seller products in a particular genre, in which case Amazon updates the list automatically at preset interv als. The associate gets a cut of any sale made directly through that link. The cut ranges from 4 percent to 7.5 percent depending on which fee structure the associate signs up for (see Amazon Associates for complete program details). The associate can also take advantage of Amazon Web Services, which is the program that lets people use Amazons utilities for their own purposes. The Amazon Web Services API (application programming interface) lets developers access the Amazon technology infrastructure to build their own applications for their own Web sites. All product sales generated by those Web sites have to go through Amazon.com, and the associate gets a small commission on each sale. References * about Ingram Micro. [Online] Available from: http://phx.corporate-ir.net/phoenix.zhtml?c=98566p=irol-aboutIMOverview * Aryasri A R (2007) Managerial economics and financial analysis, 3rd Ed, Tata McGraw-Hill, New Delhi * Bolumole, Yemisi A., Frankel R., Naslund D, 2007. ââ¬Å"Developing a Theoretical Framework for Logistics Outsourcingâ⬠, Transportation Journal, [e-journal], Vol. 46 Issue 2, p35-54, 20p, , Available through: Business Source Premier database [Accessed 18 February 2011] * Coltman et al (2000) E-Business: Revolution, Evolution or Hype? (Online) Available http://www.uazuay.edu.ec/bibliotecas/e-business/E-business_Revolution_Evolution_or_Hype.pdf * Dickenson et al (1999) Strategic Analysis Recommendation: eBay, restructuring Process to Retain and Grow Core Business, Pacific Lutheran University. * Eell S. (2010) Amazon.com Inc. [Online] Available: http://topics.nytimes.com/top/news/business/companies/amazon_inc/index.html * Elsevier M.(2006) The Collaborative Partnership approach to Care, Ann Millar, Toronto Canada. * Downes Mui (1999) Unleashing the Killer App: Digital Strategies for Market Dominance, Harvard Business School Press. * Galente J. (2010) Amazon.comââ¬â¢s Profit Forecast Falls Short of Estimates [Online]. Available: http://www.businessweek.com/news/2010-10-21/amazon-com-s-profit-forecast-falls-short-of-estimates.html * Gitman McDaniel (2008) The Future of business: The Essential, South-Western Cengage Learning, OH * Greaver M (1999) Strategic Outsourcing: A Structured Approach to Outsourcing Decisions and Initiatives, AMACOM; illustrated edition, NY. * Hardman R (2009) Santas not so little helper: Todays the busiest online shopping day of the year. So are they ready at the biggest grotto this side of Lapland? [Online] Available: http://www.dailymail.co.uk/news/article-1233766/Santas-little-helper-Todays-busiest-online-shopping-day-year-So-ready-biggest-grotto-Lapland.html * Ingram Micro Talks Cloud With Amazon, Rackspace, Salesforce.com. [Online] Available from: http://www.mspmentor.net/2010/06/07/ingram-micro-talks-cloud-with-amazon-rackspace-salesforce-com/ * Ingram Micro reports about increasing business demand in iPad. [Online] Available from: http://iphoneroot.com/ingram-micro-reports-about-increasing-business-demand-in-ipad/print/ * Johnson et al (2008) exploring corporate strategy, text and cases, 8th ed, prentice hall, NY * Kardes Gurumurthy (1992) Order-of-Entry Effects on Consumer Memory and Judgment: An Information Integration Perspective, Journal of Marketing Research, 29 (3), pp. 343ââ¬â357 * Lankford W.M., Parsa F (1999). Outsourcing: A primer, Journal of Management Decision, [e-journal], Vol. 37 Issue 3/4, p310, 7p, Available through: Business Source Premier database [Accessed 18 February 2011] * Levi et al (2003) Design and Managing the Supply Chain, Concepts and strategies and case studies, Second edition, The McGraw ââ¬â Hill companies, NY. * Matthewson J (2002) E-Business: A jargon-free practical guide, Butterworth-Heinemana, Oxford * Mulqueen K. (2009) Consulting For Human Resources Organizational Development Training, [Online] Available: http://www.consulting4hr.com/articles.html * People carrying dollar. [Online] Available from: http://www.shutterstock.com/pic-18434335/stock-photo-people-carrying-dollar.html * Save money buying used books at Amazon.com. [Online] Available from: http://jeremy.zawodny.com/blog/archives/006969.html * Sanders et al (2007) A Multidimensional Framework for Understanding Outsourcing Arrangements, Journal of Supply Chain Management, [e-journal], Vol. 43 Issue 4, p3-15, Abstract only. Available through: Business Source Premier database [Accessed 18 February 2011] * Scandoval (2002) How lean can Amazon Go? (Online) Available http://news.cnet.com/2100-1017-886784.html * Tedeschi R (1999), A Market that Dwarfs Retail E-Sales, New York Times,
Sunday, October 13, 2019
Image Based Steganography Using Lsb Insertion Technique Computer Science Essay
Image Based Steganography Using Lsb Insertion Technique Computer Science Essay The Data transmitted comes in many forms and it is used for more than one application. Communications should be done secretly. Secret communication varies from level of security needed such as banks , in credit card payments and secured communication related to corporate systems .Steganography is an art of embedding a secret message into a normal message. Steganography is used in watermarking for protecting data copyrights .Unsurprisingly, methods of Steganography change because innocuous spam contents are growing frequently by embedded texts Cryptography is technique used to make secret message scribbled for third party and are normally used in WEB. The encrypted message is targeted by attackers in cryptography because it hides the message content. An another data hiding technique known as watermarking used for embedding and hiding, some symbol data or digital manifest in the digital valuable data like photo picture, digital movie, musical sound etc. Watermarking purpose is mainly used to protect ownership or copyrights of the data. In this technique, hardness of embedded evidence and hidden evidence are very small and is important. In this technique the important information is present in external information which can be seen. In the Steganography technique, confidential information made invisible for a human eye by embedding it as a dummy data such as a speech sound and a digital image. Steganography contains another research topic called as steganalysis which is used to find a stego file from the available files. Steganalysis is used in detecting suspicious image file. The suspicious image files are embedded with the crime associated information The information hiding capacity is limited in traditional Steganography. These techniques can hide 10% or less than 10% data of a carrier data. The principle of these techniques is to replace frequency components of carrier or to swap LSB bits of multivalued image with secret information. In Steganography, image is used as a carrier data and it embeds secret information in bit planes .In Steganography, replacing noise like reg ion without disturbing the image quality is termed as B.P.C.S Steganography..BPCS Steganography is known as Bit plane complexity segmentation Steganography. BACKGROUND HISTORY: Steganography is derived from a Greek word which means as a covered writing or hidden writing. In Steganography stegos means cover and grafia means writing. THEORY: Steganography used to hide confidential information from human eyes by embedding it in a carrier data such as a digital image or a speech sound. A carrier data is consists of color images having RGB color components in a multi-bit data structure. The embedded information is evoked by means of special extracting program and key .The techniques of Steganography different from file camouflage or file deception technique. File deception is used for hiding secret data in system file and it almost looks as a Steganography. But, it is a one of easy method to disguise an secret-data file as a regular file and is possible in files which have dont care option. For example, Word file or JPEG image OR MPEG will allow for adding an extra data (extension) at the end of a usual file. After adding an extra data, the JPEG image, word file or MPEG looks as original image and original sound, or document on system.People may think this is due to Steganography. The lengthy files are easily noticed by engineers. Therefore file deception and Steganography are different. The Steganography softwares that are available in the market are based on file deception. In Steganography, if output file size is increased by embedding the information then the program is called as File deception. A secret data can be made unreadable by encrypting the data. The secret data should be encrypted to make it unreadable for third party. With the help of data encryption, secret data can be safe. Data encryption depends on a data scrambling and it uses a secret key. Data encryption can create a doubt to the people that owner of the data is hiding something in an image. In data encryption we can find easily that he is hiding something in a image. Therefore encryption of data is not enough. Steganography is the solution for data encryption. There are two types of data in Steganography .they are secret data and carrier data. Secret data is very valuable when compared to the carrier data. Carrier data is a type of dummy data which is not so important but it is needed. The data which is embedded is called as stego data. If we want to recover the secret data , we can extract that data from stego data. We need a special program or a key for data extraction.. The carrier is image data which has color components of red green and blue colors in 24 bit pixel structure. The figure below shows an example of carrier image and stego image. The secret data is embedded in stego image. http://www.datahide.com/BPCSe/images/stegano-scheme.jpg Steganography is a method of hiding the secret data by fixing it in media data .For example in the figure a secret data is embedded but we cant find in which place the secret data is embedded. The data which is embedded will be very safe in the Steganography because it will hide content of the message and location of hidden image. There are many methods to embed the data .but; it is very hard to find about the method used in embedding the message.. Steganography collaborates with cryptography to embed the encrypted data safely. In Steganography, Stego data will not have any evidence about the embedded data. The Steganography user should discard the original carrier data after embedding such that it will not allow comparison of stego and original data. Embedded capacity should be larger. BPCS method is the method available method for image Steganography. If anyone detect the Steganography image, it is very difficult for him to retrieve the hidden image. There are three basic ways to hide a message in image. They are Injection, substitution and generation. Using Injection method we can find in which place data to be inserted and using substitution we can find least significant bits for hiding the message. Using generation method we can create a new file based on the hidden information. Method of implementation: Least significant bit insertion is one of the important methods of implementation. In this method , the LSB bits of byte is altered so that it form bit string and represents a embedded file. By changing the LSB bits, it will cause some small differences in color which are not noticeable to human eye. After that an image is compressed and a text message is hidden in image .In LSB method, LSB bits of the covered image are changed to form embedded information. Embedding a message into cover image will result a stego image. For normal vision, the appearance of stego image will be same as cover image because of small changes of pixel values. Therefore there is no significant difference. The embedded message is sequentially embedded in covered image so that it is simple for other third party to recuperate the message by retrieving the pixels consequently which starting from the first pixel of the image. Steganography uses a key which as a better security. It is difficult to recover the emb edded image without valid key. LEAST SIGNIFICANT BIT INSERTION Least significant bit insertion is the common technique used in Steganography. In LSB method, an image is used. An image is more than strings and string of bytes. Each byte in an image represents different colors. The last few bits in a color byte do not hold much significance as the first few bits. Therefore only two bits differ in last few bits that represent a color which is undistinguishable to human eyes. In LSB method, least significant bits of a cover image are altered such that we can embed information. The example shows how letter A is hidden in first 8 bytes of 3 pixels in a 24 bit image. Since the 8 bit letter A requires only 8 bytes to hide it, ninth byte of the 3 pixels used to hide the next character of the hidden message. Example shows that in a 24 bit image, letter A can be hidden in first 8 bytes of 3 pixels Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) A: 01000010 Result: (00100110Ã 11101001 11001000) (00100110Ã 11001000 11101000) (11001001Ã 00100110Ã 11101001) The five underlined bits are the 5 bits which were altered. With LSB insertion technique, on an average half of the bits of an image are changed. A is a 8 bit letter and requires 8 bytes for hiding. The ninth byte of 3 pixels is used for hiding next character of secret message. The slight variations of this technique allows a message to embed into two or more least significant bits per bytes, and increases the information hidden capacity of the cover object .but cover object is degraded and easily detectable.LSB insertion is easy to implement and is also easily attacked if the modifications are done wrongly. Improper modifications in color palette and normal image calculations will demolish hidden message. Image resizing and image cropping are some examples of image manipulations. Applications of Steganography: Steganography is applicable the following areas. 1).Private communication and secret data storing. 2).Security of data. 3).Accessing the control system for distributing the digital content 4).Media data base systems. The application area of Steganography differs based on the features utilized in a system. 1).Private communication and secret data storing: The secrecy of embedded data is important in this area. Steganography provides capacity for hiding the existence of secret data and Steganography makes very hard to detect the embedded data in a image and Steganography strengthens the encrypted data. In Steganography, select a carrier data according to the size of embedded data. Carrier data should not be effective. Now embed the secret data using an embedding program with the help of a key. To recover the embedded data, an extracting program is used with a key. Before starting the communication in this case, Key negotiation is used 2).Security for a data: Steganography is used in military applications for maintaining the secret data .In military secret information should be very secure to avoid sudden attacks on them from enemies. Steganography can hide the existence of contents of data but it cannot hide the presence of data. Data should not be larger than carrier image .Steganography strengthens the secrecy of the data. Fragility of the embedded data is advantage for this application area. Embedded data can be rather fragile than robust. But embedded data is fragile in most of the Steganography programs. No one can change or tampered the data .If anyone changes or tampers the data, and then it can be easily detected by the extraction program. 3). Accessing the control system for distributing the digital content : In this application, embedded data is explained to publicize the content. Here embedded data is hidden data. Digital contents are being commonly distributed by internet. Some music companies release the music for free in some web sites and in some sites it charges for the music downloads. Digital contents are equally distributed to user who accesses the web pages. Even it is possible to send digital content to e-mail messages it takes more time. We can to upload any content on the web page; we can issue a special access key to extract the content. In Steganography a prototype of an access control system is developed for distributing the digital content through internet. This can be explained by following steps. 1).The content owner will classify his digital content in a folder and embeds the folder according to Steganography method by accessing the folder access key and uploads embedded content on web page. 2).On the web page, owner will explains the contents clearly and publicises it worldwide and gives his contact information on web page. 3).The owner will receive access request from the customer who visited that web page. Then owner creates an access key and provides it to the customer for free or charge. 4).Media database systems: In this type of application secrecy of data is not important, converting two types of data into one data is important. Photos, Pictures, movies and music will come under media data. For example the media data for a photograph will contain about the title of the photo and date and time of a photo and it also contain about the camera used to take that photograph. Data hiding in .bmp images: There are several formats exists for an digital image. .BMP, JPG, GIF are some formats .Each format is associated with advantage and disadvantages. Because of its simplicity, windows BMP file offers more advantages. It has an advantage of widely spreader and the information contained is minimum .Bmp file is a binary file.bmp file is divided into four sections such as file header, color table, image header and pixel data. To know about size of the image file header are used and also to learn where actual image data is located within the file. The Image header gives information about the image and its data format such as width and height of the image. Image header also gives information such as how many bits are used per pixel and checks whether the image data is compressed data or uncompressed data. Depending on the image data, color table will be present. When color table is not present, a set of bit masks are used to extract the color information from the image data. When dealing wi th 24-bit image, color table is not present. When dealing with 8-bit image, color table consists of 256 entries. Each entry consists of four bytes of data. In these four bytes of data, first three bytes are blue, green and red colors values .The fourth byte must be equal to zero because it is not used. In 8-bit format, each pixel is represented by single byte of the data which is index in to color table. In 24-bit format, each pixel I represented by RGB component values .The pixel data holds entire hidden data and there are changes by one pixel value either positive or negative. IMAGES IN MATLAB The data structure in MATLAB is array, it is set of real or complex elements. MATLAB suits better in representing the images. images are stored as two dimensional array or matrices where each element of matrix determines one pixel in displayed image. DIGITAL IMAGE PROCESSING Image is a two dimensional function f(x, y). Whereas x and y are spatial co-ordinates. The amplitude of f at f(x, y) is called as intensity image. Image is defined as digital image if values of f, x, y are of discrete quantities. Digital image processing is defined as a process of a digital image using a digital computer. The digital image contains finite number of elements. Each element as its location and a value and elements are called as pixels. Image plays an important role in human life. The analysis of an image depends on vision and image processing. At one end of vision there are no clear cur boundaries in continuum. Let us consider three types of process in continuum. They are low level, mid level and high level process. Low level process involves operations like reduction of noise, sharpening of image, and adjustment of contrast. Mid level operations involve segmentation, object description. These operations will be helpful in reducing a object and for classifying object. In mid-level process , inputs are images and output are extracted from input images. High level processing involves operations like ensembling of objects and some functions that are involved with human vision . Definition for an image: Image is a two dimensional function f(x,y) , x y are spatial co-ordinates. Amplitude of f at x, y is called as intensity of image. Gray scale image: It is function of two spatial co-ordinates of image plane. On image plane I(x,y) is intensity of image at x,y. Color image. Image is represented by three functions R, G, B. RGB is a three colors red green and blue. The image as continuous amplitude and is continuous with x, y. The amplitude of image should be digital for converting an image to digital image. Conversion of co-ordinate values of an image into digital values is called as sampling. Converting the values of amplitude into digital values is called as Quantisation. Coordinate convention : Sampling and quantisation result a real number matrix.The digital images are represented in two ways.By sampling f(x,y) , an image with M rows and n columns resulted and the size of that image is MxN .The coordinate values are of discrete quantities.In many books that are related to image processing it is mentioned that origin of image is at (xylem)=(0,0) .the next coordinates are at first row of image and it is given as (xylem)=(0,1).Here it is importent to keep note that (0,1) is used to signify second sample along first row. Toolbox uses the word race instead of using xylem to indicate rows and columns. Toolbox employs spatial coordinates less frequently. Image as matrices: A digital image is represented by a function F(0,0) f(0,1)f(0,N-1) F(1,0) f(1,1)f(1,N-1) F(xylem)=f(M-1,0) f(M-1,1)f(M-1,N-1) In above equation f(M-1,N-1) can be defined as a digital image. In this array , each element is called as image element and picture element. In MATLAB, digital image is represented as F(1,1) f(1,2)f(1,N) F(2,1) f(2,2).f(2,N) . . F=f(M,1) f(M,2) ..f(M,N) If f(1,1)=f(0,0) then it represents they are identical. F(x , y ) denotes that elements are located in row p and column q. Lets take an example f(8,7). Here elements are located at eight row and ninth column. In a MxN matrix, M denotes number of rows and N denotes number of columns. Here MxN matrix is called as column vector and 1xN matrix is called as row vector and 11 matrixes is defined as a scalar quantity. In matlab, matrix is stored variables A, real array, and so on .The variables in matlab matrix should contain letters and numbers. F(x,y) is a roman and Italian notation that are used in matlab for mathematical expressions. How to read image in MATLAB: The function imread is used to read an image in MATLAB. The syntax for reading an image is imread(filename).The different formats used in MATLAB are TIFF PNG JPEG XWD GIF BMP .TIFF is a tagged image file format and is represented as .tif and .tiff. PNG is a portable network graphic and it is represented as .png. JPEG is joint photograph experts group and are represented as .jpg and .jpeg. GIF is a graphic interchange format and are denoted as .gif. BMP is bitmap window and are recognised as .bmp. XWD is X window dump and are recognised as .xwd. The filename contains image file EXAMPLE : >> f = imread (8.jpg); In this command, it reads jpeg image into image array f and single quote delimits the filename of a string. In a MATLAB, semicolon is used for suppressing output and if we wont use semicolon it displays result in that line. The symbol >> denotes that starting of a command. This symbol is shown in matlab command window. In command line, path is not included in filename. Imread reads the file in a current directory. If it is not read in the current directory window, we can find that file in MATLAB search path. We can read an image from directory that includes full path or relative path in filename. Example : >>f=imread (E:jaichestxray.jpg); Therefore it reads the image from jai folder on E drive >>f=imread(.jaichestxray.jpg); Therefore it reads an image from a sub directory jai of current working directory. Current directory displays MATLAB current working directory on matlab desktop toolbar. TIFFS, JPEG, GIF, BMP, PNG, and XWD are the popular image formats and these formats are supported by imread and imwrite functions. In a image the dimensions of rows and columns are given by size of a function >>size (f) In MATLAB this function is useful in determining the size of an image. >>[M,N]=size(f); The syntax returns number of rows and columns. M is number of rows and N is number of columns and f gives the size. How to read a graphic image: In a graphic file format, imread can be used to read an image. For storing an image pixel , most of the formats uses 8 bit and are stored as class uint8 in matlab and if the file supports 16bit data , MATLAB stores image as class uint16. How to display image: The function imshow is used for displaying an image in MATLAB. The syntax for displaying a image is imshow(f,g) In the above syntax f is array of image and g is used for displaying number of intensity levels. G defaults to 256 levels if it is omitted by syntax imshow(f,{low high}).If the values are less than are equal to low then it displays as black and if values are greater than are equal to high then it displays as white. If the values are not less than and not greater than and are in between then it displays as intermediate intensity value by defaultly. Therefore the final syntax is Imshow(f,[ ]).The variables which are high will have maximum value and low variables will have minimum value. The function imshow will display positive and negative valued images. Pixval function are used for displaying the intensity values individually. Pixval function displays cursor on the image. In a figure window, Move the computer mouse on the image so that intensity values and position of cursor is displayed. The color components such as red green and blue are displayed when working with color image. The Euclidean distance of initial and cursor positions can be displayed by pixval and this can be done by clicking left side button on mouse.Click the x button for closing the window. >>imshow(f) If there is a semicolon at ending, it will not have an effect so it is exception of using semicolon. MATLAB can replace an image with new image by displaying another image using imshow. Use the function >>figure, imshow(g) for keeping first image as output second image.The statement >>imshow(f),figure , imshow(g) is used for displaying both and first and second images .If different commands delimits commas and semicolons then more than one command is written on the line. To suppress the outputs of a screen from command line , the semicolons are used. HOW TO WRITE IMAGE : The function imwrite is used for writng an image in MATLAB. The syntax for writing an image is Imwrite (f,filename).In this syntax , filename contains a string .file extension format should be a recognised format. >>imwrite(f,patient10_run1,tif) Or >>imwrite(f,patient10_run1.tif) This command is used for writing f to a TIFF file patient10_run1:.In current directory window imwrite will save the file if the file does not have information about the path. Depending on the selected file format ,imwrite is having other parameters. The most important formats are JPEG and TIFF .so it is important to focus on these two file formats.The syntax imwrite is applied to jpeg images Imwrite(f,filename.jpg,,qualityq) Here q is the integer and its value ranges between 0 and 100.In compression of jpeg image ,if the number is less than the degradation will be higher. This can be explained by the following example. Here q=25 Then the syntax is >>imwrite(f,bubbles25.jpg,quality,25) If an image is has q=15 then it has false shape which is hardly visible.this effect pronounces as q=5 and q=0.compress the image with q=25 for an expectable solution .compression can be achieved by obtaining details of image file by using imfinfo The syntax is Imfinfo filename Filename refers the complete filename of image that is stored on disk.this can be explained by following example >>imfinfo bubbles25.jpg It displays output in following way. filename: bubbles25.jpg and filemoddate :08-jan-2009 12:30:25 and filesize :13849 format:jpg format version : width : 715 height : 687 bit depth :8 color depth :grayscale format signature: comment: { } The filesize is expressed in bytes. The number of bytes in original image multiply width and height by bit depth and divide the obtained result by 8 therefore we get result as 491205.We can obtain the ratio of compression by dividing the file size.(491205/13849)=35.46 therefore compression ratio is achieved and it is 35.46.Maintain the quality of image consistently. The reduction of stoage space transmits 35times of the uncompressed data per unit time. Iminfo displays the information field and are captured by a variable for some computations. >>k=iminfo(bubbles25.jpg); Here k is assigned to a structure variable. The variable k as information and it is generated by command imfinfo. The information that is generated by imfinfo command is added to structure variable by a field that are separated from k by dot. The height and width of a image is stored in k.height and k.width Consider the structure variable k for changing the ratio of compression bubbles25.jpg >>k=imfinfo(bubbles25.jpg); >>image bytes=k.width*k.height*k.bit depth/8; >>Compression_ bytes =k.filesize; >>Compression_ ratio=35.16 Imfinfo can be used in two different ways. One method is type imfinfo bubbles25.jpg at prompt then it displays information on screen. Second method is type K=imfinfo(bubbles25.jpg) then it generates the information that are stored in k variable. The two different ways of calling the function imfinfo is an example of command_function duality. In general imwrite syntax is applied to tif images only Imwrite (g,filename.tif,compression,parameter resolution,[colres rowers] The parameter will have one of the principal values such as none it indicates no compression and pack bits indicates compression of pack bits and ccitt indicates compression of ccitt. By default ccitt is for binary images.1*2 is an array and it contains two integers that gives resolutions of row and column in dot per unit. If the dimensions of image are in inches then colres will have number of dots per inch in vertical direction and it is same for rows in horizontal direction . >>imwrite(f,sf.tif,compression,none,resolution.[300 300]) Multiply 200 dpi by ratio 2.25/1.5 then we get 30dpi to determine values of a vector.if we compute manually , we can write >>res=round(200*2.25/1.5); >>imwrite(f,sf.tif,compression,none,resolution,res) This syntax is like an argument for nearest integer. The number of pixels is not changed by using these commands but there is a change in scale of the image. These processes are useful in controlling image size without loosing its resolution. On matlab desktop , it is necessary to export images to disk. It is true with plots. In a figure window, there are two ways for exporting the contents. First method is , in a figure window select file option in menu and then choose export option. Using this option user can choose the location, format and a filename. Using print command we can obtain the control on export parameters.The command isprint-fno-dfileformat-rresno-filename. In figure window no refers to the number of a figure and file format refers to file format that are available. The resolution in dpi is referred as resno. The filename is used for assigning a file. If we type print at the prompt, MATLAB prints contents of the displayed last figure window. How to write a graphic image: In a graphic file format, imread can be used to read an image. For storing an image pixel , most of the formats uses 8 bit and are stored as class uint8 in matlab and if the file supports 16bit data , MATLAB stores image as class uint16. In a graphic image format, the function imwrite is used to write an image to graphic file .The basic syntax imwrite takes image variable and image filename. How to resize an image: The function imresize is used to change the size of image. Using the imresize function we can fix the output size Image cropping: The function imcrop is used for cropping an image. Using imcrop, we can crop the rectangular portion of an image. The imcrop function is used for displaying an image in a figure window and we can crop the image in a figure window. DATA CLASSES: The pixel values are not limited to integer values in matlab. The MATLAB supports various data classes for representing the pixel values. There are three types of data classes .they are numeric data class and char class and logical class. Char class is the ninth entry in data classes and logical data class is the last entry. The numerical calculations in MATLAB are done in double quantities so data classes encounters frequently in image processing applications. The class unit 8 is found when reading the data from a storage device and 8 bit images are commonly found .The two data classes logical data class is of less degree and unit 16 forms the primary data class. Ipt functions support all data classes. To represent a number, data class double requires 8 bytes. Uint8 and int 8 requires one byte and uint16 and int16 requires 2 bytes. The various data can be described as follows. The data class double can be described as double_precession, floating_point numbers. Uint8 ranges from [0, 255] and it is an unsigned 8bit integer and it is of one byte per element.Uint16 is a unsigned integer and ranges from [0, 65535] and it is of 2 bytes per element. Uint 32 is an unsigned integer and ranges from [0, 4294967295] and it is of 4 bytes per element. Int 8 is an 8bit signed integer and it is of 1 byte per element an d ranges from [-128,127]. Int 16 is a 16 bit signed inter whose is range is of [32768, 32767] and it is 2 bytes per element. Int 32 is a 32 bit signed integer of range [-2147483648 , 21474833647] and it is of 4 bytes per element. Single is a single_precession floating_point number with the values and ranges 4 bytes per element. Char is called as character and it ranges of 2bytes per element. Logical is a data class, whose values are 0 to 1 and it is of 1byte per element. Char data class holds characters in Unicode representation. The char string is simple 1*n array. The values of logical array are 0 and 1 .Using logical function each element is stored in the memory. TYPES OF IMAGES There are four types of images that are supported by MATLAB. They are Intensity image, binary image , indexed image , R G B image. Most of the image processing operations are performed by binary image or intensity image. Intensity image: Intensity image is a data matrix and its values are represented within some range by intensities. The Intensity image is stored as a single matrix in MATLAB In intensity image, image consists of intensity or gray scale values. Intensity images are represented by arrays in matlab. In intensity image, images are repr
Subscribe to:
Posts (Atom)