Thursday, October 31, 2019
Semantic technology for improving business process management and Essay
Semantic technology for improving business process management and E-Business - Essay Example From traditional to contemporary perspectives, core objective of the businesses has been to manage business operations so that enables business to achieve the competitive advantage over competitors (Dean, DiGrande, Field, and Zwillenberg, 2012). Since introduced information technology has been a constantly upgrading paradigm and so business are attempting to align the functions developing more concrete connections within and outside business environment; hence, entire stakeholders. Technology expansion has changed the perspectives and businesses are now being viewed as system having core components of input, process and output. Around these core components, business processes are continuously evolving for improvement with changing dynamics mainly arising from other perspectives. Broadly the sequence can be regarded as the information technology to recent integration of semantic technology in business processes. Thereby, the report herein attempts to explore the contribution of semantic technology in improving specific business areas of business process management and e-business conduct. In addition to specifically explore the understudy perspectives the report has developed the detailed reference with respect to technological banking leader Citibank. DISCRIPTION OF THE THEORY SEMANTIC BUSINESS PROCESS MANAGEMENT Business process management has over years achieved success to a great extent automating the critical components of the life cycle of business process. Semantic business process management has an objective of attaining process space in an organization to an increased level of knowledge. Success in achieving the process space in the organization benefits business with reasoning with respect to entire business processes including combination as well as execution of process. Integration of semantics technologies in business process management is achieved with the use of ontology that f acilitates the semantic information to the business process. Further, business process automation is enhanced with provision of the semantic web techniques. Business ontology is build using conceptualized core Semantic Web Services as well as Web Service Modeling Language. Sample organizational is depicted in the image below: (Pedrinaci, Domingue, and Brelage, ) As visible from the image above the organizational ontology has various segments and connection between the resources, structure, functions, policies, setup and strategies. The interconnection built between various aspects being facilitated by the core components of the semantic integration in the business process. These interconnections enhance the role of bidirectional interconnection in the business process. Hence, business process management has gained gain efficiencies in entire processes specifically the bottleneck avenues of business processes. ORIGIN AND EVOLUTION OF THEORY Over years of development, information syst ems are attempting to enhance the dual perspective in the computersââ¬â¢ languages; first, increasing computers capacity to enhance understanding the human language with greater comprehension and intelligence while second refers to techniques aimed at providing existing content with labeling related to the domain (Mika, Elfring, & Groenewegen, 2006; Warren, Thurlow, & Alsmeyer, 2006). Further, semantic technology enables metaphorical as well as logical analysis from the queries in the similar context in which it is asked irrespective of the language as well as pattern it is asked and hence
Tuesday, October 29, 2019
I could not decide the research question. Could you decide it and Paper
I could not decide the question. Could you decide it and write for me - Research Paper Example If an individual tests positive on a genetic test, they have a genetic predisposition to a disease, which is defined by the National Institutes of Health (NIH) as ââ¬Å"increased susceptibility to a particular disease due to the presence of one or more gene mutations, and/or a combination of allelesâ⬠¦ that is associated with an increased risk for the disease, and/or a family history that indicates an increased risk for the diseaseâ⬠(National Library of Medicine 2010). Knowledge of a genetic predisposition allows an individual to take preventative measures to limit the effects of a disease or to otherwise prepare for the onset of a disease. Because genetic testing is extremely beneficial as it can provide an individual with information about their susceptibility to a disease and allow them to take preventative measures or screening measures, healthcare organizations and institutions should promote mandatory genetic screening for children among indigenous populations. The problem of informed consent and genetic screening has been a widely debated issue, particularly in medical field. For instance, most guidelines expressed by medical organizations contained recommendations against testing adolescents and children for hereditary late-onset diseases. It is important to remember that respect for the individual and valuing of autonomous decision-making are the moral and ethical cores underpinning informed consent. This written, and often oral, process provides important information that aids potential participants in their decision to participate in a research study. By providing adequate and comprehensible information, an informed consent enables independent decision-making and may minimize participant harm. Basic ethical principles such as beneficence, nonmaleficence, fidelity, integrity, justice, and respect for persons help guide our understanding of informed consent; however, the practical application of such a process is rarely as simple or
Sunday, October 27, 2019
Three Major Categories Of Software
Three Major Categories Of Software Software can be divided into three major categories according to popularity: application software, system software, and web applications. Within each category there are dozens, if not hundreds, of specialized software types, but for the purpose of this study, we will concentrate on the most popular software type of each category. Software applications refer to programs on a client machine which are written to perform specific tasks. Nowadays, there is a wide range of software applications being developed including word processing programs, database management tools, photo editing software, etc. But during the last decade the web has become the new deployment environment for software applications. Software applications that were previously built for specific operating systems and devices are now being designed specifically for the web (web-enabled). Because of this new movement, and as the web becomes increasingly a universal interface for software development, the software industry is experiencing a major evolution toward web-related software applications (Festa 2001). For example, the recent release of Googles Chrome web browser which was specifically designed to enable the execution of web applications and services in the web browser confirms this trend. As the web evolves, the surrounding and supporting technologies are becoming more complex. This is especially relevant in web-enabled applications such as web browsers, email/news clients, VoIP and chat clients which allow the interaction with the web from the client side. Web browsers specifically have become the doorway to the Internet and are currently the most widely used applications and the standard tool for consuming Internet services. This evolution toward web-related applications had a direct impact on the security of such applications. For instance, vulnerabilities and attacks against web browsers became more popular as such attacks compromise the security and privacy and have serious implications for web users. Once a web-related software is infected, the users web interaction can be fully exposed to the attacker. For instance, an infected web browser can expose the victims web addresses, data typed into forms, user sessions and cookies. Moreover, vulnerability risks in a web browser can have a serious implication for intranets (Anupam and Mayer 1998). Most users use the same browser to access information on the intranet as well as the Internet. A user who has been attacked through vulnerable web browser has compromised his or her firewall for the duration of the browsing session (c). Examples of such vulnerability risks against web browsers include key loggers. Key loggers are a form of spyware which can be installed through vulnerability in a web browser and then logs all pressed keys whenever a user visits a certain online banking web site. The increase in vulnerability risks in web-related software is related to the exponential growth of the Internet. As we enter through the second decade of the 21st century, the rapid adoption of the Internet market along its ubiquitous presence will continue to make Internet technologies such as web-related applications a prime target for attackers as they constitute the largest mass of victims. Hypothesis 1a: Vulnerability type will be highly positively related to web-related software applications Hypothesis 1b: Frequency of vulnerability will be highly positively related to web-related software applications Hypothesis 1c: Severity of vulnerability will be highly positively related to web-related software applications System Software: System software refers to the set of computer programs which are required to support the execution of application programs and maintain system hardware. Operating systems, utilities, drivers and compilers are among the major components of system software. Such components are the enablers and service providers to software applications. Among these components, the operating system is the most popular and important one. The operating system market for client PCs has evolved along the lines predicted by theories of increasing returns and network externalities (Shapiro and Varian 1999). But with this increase in network externality, there has been a dramatic increase in vulnerabilities (cite xxx). For instance, between 2007 and 2009, the number of operating system vulnerabilities almost doubled from 220 to 420 vulnerabilities (CVE 2010). Such increase in vulnerabilities can be caused by several reasons. First, network externality implies larger user base which makes operating systems an a ttractive target for hackers. In addition to that, viruses and worms can spread more rapidly because of the large installed user base and network effect. Second, the architecture of some operating systems like Windows allows vulnerabilities to gain a direct access to the operating system files through external scripts; meaning that if malicious scripts are sophisticated enough, they can exploit system files through software applications or through system software directly. And last, the fame factor for discovering vulnerabilities in systems with significant installed user base make them potentially significant target for hackers. Lately, new technologies such as web-based cloud computing, virtualization and Just enough Operating System (JeOS) have been gradually diminishing the importance of the traditional operating system (Geer 2009). With cloud computing technologies, users can access web applications through their web browser; meaning that an OS like Google Chrome will only be needed to run the web-browser. Moreover, with virtualization technology a personal computer or a server is capable of running multiple operating systems or multiple sessions of a single OS at anytime without having the user rely on a single OS. Similarly, Just enough Operating System (JeOS) focuses on running applications which require minimal OS. As these technologies are gaining popularity and becoming more adopted by users, the role of an OS is starting to decrease so does its network externality. With this is mind, we hypothesize that attackers interests and vulnerability risks will gradually shift to other technologies as they become more popular. Hypothesis 1d: Vulnerability type will be positively related to system software Hypothesis 1e: Frequency of vulnerability will be positively related to system software Hypothesis 1f: Severity of vulnerability will be positively related to system software Web Applications: The remarkable reach of web applications into all areas of the Internet makes this field among the largest and most important parts of the software industry. As of today, the Internet consists of hundreds of thousands of small and large-scale web applications ranging from e-Commerce applications to social networking sites to online gaming. This popularity has attracted large user base which made web applications lucrative targets for attackers to exploit vulnerabilities. Web applications are currently subject to a plenty of vulnerabilities and attacks, such as cross-site scripting (XSS), session riding (CSRF) and browser hijacking (Mansfield-Devine 2008). Hence, the landscape of vulnerabilities has changed significantly during the first decade of the 21st century. Previously, buffer overflow and format string vulnerabilities accounted for a large fraction of all vulnerabilities during the 1990s, but as web applications became more popular, new vulnerabilities and attacks such as SQL injections and XSS attacks exceeded earlier vulnerabilities. According to CVE surveys, security issues in web applications are the most commonly reported vulnerabilities nowadays. In response, web application vendors dedicated more resources towards securing their products as they tend to receive more attention as potential targets because of their large pool of possible victims (Mercuri 2003). The problem of web application vulnerabilities is becoming more complicated with the recent movement towards Web 2.0 technologies. The landscape of Web 2.0 enables new avenue of vulnerabilities by using sophisticated scripts on the client side. Moreover, Web 2.0 websites are becoming riskier than traditional websites because they use more scripting capabilities to allow users to upload content, share information and gain more control. Despite the growth of web applications and Web 2.0, these technologies are still limited by the available resources such as network bandwidth, latency, memory and processing power. More specifically, its argued that web applications are constrained by the capabilities of the web browser they are running in. With this drawback, web application users will ultimately have to rely on their own resources to accomplish magnitudes of tasks. Compared to system and software applications, we hypothesize that web applications will continue to experience vulnerability risks but at a lower rate than other popular software. Hypothesis 1g: Vulnerability type will be least positively related to web applications Hypothesis 1h: Frequency of vulnerability will be least positively related to web applications Hypothesis 1i: Severity of vulnerability will be least positively related to web applications Targeted Operating System Software producers often create applications to run on a single or a combination of operating systems (OS). From a software viewpoint, maintaining security is the obligation of both the OS and the software program. But since computer hardware such as the CPU, memory and input/output channels are accessible to a software programs only by making calls to the OS, therefore, the OS bears a tremendous burden in achieving system security by allocating, controlling and supervising all system resources. For the most part, each of todays streamlines OSs has a main weakness. For instance, earlier OSs such as Windows NT, UNIX and Macintosh had a weakness in their access control policies (Krsul 1998). Such OSs didnt specify access control policies very clearly which meant that applications that ran by users inherited all the privileges that the access control mechanisms of the OS provided to those users (Wurster 2010). An access control policy requires an OS to give a program or a user the minimum set of access rights necessary to perform a task. In his work, Denning (1983) illustrated the working of an access control policy which typically consists of three entities namely, subjects, objects and access rights matrix. Subjects refer to users or domains whereas objects are files, services, or other resources and access rights matrix specifies different kinds of privileges including read, write and execute which are assigned to subjects over objects. A configuration of the access matrix d escribes what subjects are authorized to do. Vulnerabilities in OSs tend to rely on weaknesses in configuration of access control matrices to gain access to software applications and system software. This creates a serious problem since vulnerabilities can exploit software applications through the OS gain access and ultimately take over the system. An example of an access control policy failure is Java virtual application. The Java virtual machine was among the applications which defined, and enforced its own access control matrix. Its sandbox was compromised of a number of OS components which ensured that a malicious application cannot gain access to system resources. But once the access control mechanism of the virtual machine fails, a malicious applet can be given access beyond the sandbox (McGraw and Felten 1997). Meaning that the OS can allow a malicious applet full access to the users files because to the OS there is no difference between the virtual machine and the applet. Moreover, even with an access control policy in place, consideration must be given to system design. The OSs which are in use today have different architectures and are designed with different kernels without considering security and controlled accessibility as significant design criteria. For instance, a large portion of UNIX and Linux vulnerabilities result from boundary condition errors which are commonly known as buffer overflow (cite xxx). These boundary conditions result from a failure to properly check the bound sizes of buffers, arrays, strings. Attackers tend to exploit this weakness in UNIX and Linux OSs to gain access to system software and software applications. On the other hand, vulnerabilities in Windows OS tend to be evenly divided among exceptional conditions, boundary conditions and access control validations (cite xxx). With these types of vulnerabilities root break-in and execution of arbitrary code are common types of attacks. When it comes to writing software for different platforms, programmers must acknowledge the potential vulnerabilities and threats targeting their software. Since different OSs have different vulnerabilities, the task of designing a secure application tend to become much difficult since they have to consider vulnerability risks of each OS. Therefore we hypothesize that: Hypothesis 5a: Vulnerability type will be positively related to software which target more operating systems Hypothesis 5b: Frequency of vulnerability will be positively related to software which target more operating systems Hypothesis 5c: Severity of vulnerability will be positively related to software which target more operating systems Software Free Trial Free trial strategy is used by many vendors to promote and sell their goods. This strategy is especially popular and found to be effective to promote and sell digital goods such as software and music. Unlike physical goods, the intangibility of digital products prevents consumers from assessing the products before the consumption and adoption (Heiman and Muller 1996). Such uncertainty of product functionality reduces consumers motivation to adopt the product and is considered a source of market failure. Nowadays, offering software free trial at a low marginal production cost has resulted in the prevalence of free trials strategy. For the software market, there are two strategies of free trial, namely a fully functional free version with limited trial period (time locked version) and a limited functional version (demo version). Each of these strategies has its own advantages and disadvantages. For instance a demo version has an advantage of capturing the network effect from both trial users and the buyers. In contrast, some consumers may find it adequate to use only the limited functionalities provided in the demo version rather than purchasing the full version software. Similarly, offering time locked software version can negatively affect the software vendor as consumers with limited usage can utilize this short-term to fully take advantage of the free trial without buying the full software product. Based on these trial strategies, there have been numerous studies regarding the effect of free trial on software learning curve (Heiman and Muller 1996), software piracy (Chellappa and Shivendu 2005) and software performance (Lee and Tan 2007). For this study, we are interested in measuring the effect of free trial strategies on software vulnerabilities. Although software vendors often release demo or time locked versions, such versions can still contain good source of information for the attackers. Attackers typically misuse the trial versions to look for, find and exploit vulnerabilities. Furthermore, attackers can reverse engineer the limited code and find vulnerabilities (Sutherland et al. 2006). This technique has become particularly important as the attacker can apply vulnerabilities found in free trial versions to exploit full version software. Moreover, there are many hacker groups on the internet who specialize in cracking free trial and full versions software and releasing them on the internet under what is known as warez. Such groups usually compete with one another to be the first to crack and release the new software. These cracked versions (warez) can also serve as potential targets for attackers looking for vulnerabilities. Hence, while providing free trial versions of software by software vendors is a marketing strategy, vendors should also expect such free versions can become targets for vulnerabilities and early exploits. Hypothesis 6a: Vulnerability type will be positively related to software which offer trial versions Hypothesis 6b: Frequency of vulnerability will be positively to software which offer trial versions Hypothesis 6c: Severity of vulnerability will be positively to software which offer trial versions Software License The diversity of the software business model drives the need for different types of software licenses. A software license is a legal agreement forming a binding contract (relationship) between the vendor and the user of a software product and its considered an essential part in the evolution of the software to a market product. Software license is regarded as one of the fundamentals of OSS as there are currently close to 73 different licenses (Perens 2009). Most OSS licenses are classified based on the restrictions they impose on any derivative work (Lerner and Tirole, 2005). Examples of OSS licenses include GPL, LGPL and BSD. General Public License (GPL) is currently the most popular OSS license which states that any derived work from other GPL software has to be distributed under the same licensing terms. The Lesser GPL (LGPL) and the Berkeley Software Distribution (BSD) are other popular alternatives to GPL with similar characteristics. OSS projects rely heavily on code reuse as shown by DrDobbs (2009). In their work, 1311 OSS projects were analyzed and 365000 instances were found of code reuse among those projects. In principle, most of the OSS licenses allow programmers to modify and reuse existing code. This degree of code inheritance can have positive and negative effects on the security of the software. In their work, Brown and Booch (2002) discussed how reuse of OSS code can inherent insecurities and talked about the concerns which companies have regarding OSS code and how it was developed and in particular the origins and the reuse of its code. Indeed an analysis study by Pham et al. (2010) suggested that one of the key causes of vulnerabilities is due to software reuse in code, algorithms/standards, or shared libraries/APIs. They proposed the use of new model which uses algorithm to map similar vulnerable code across different systems, and use the model to trace and report vulnerabilities to software vendors . Reuse of OSS software has caused concerns as developers might inherent vulnerabilities from existing code but regardless of the open source community or software vendors positions on this debate, the possibility of security issues by reusing OSS code has been sufficient to the point where some vendors stopped reusing OSS code in their software. From a security perspective and when it comes to reusing OSS, vendors tend to follow one of the following approaches. Abandon OSS software; only reuse code which has been extensively reviewed; or maintain a relationship with the OSS community and get involved with the development process (Brown and Booch 2002). Its our belief that licenses which allow developers to reuse source code will be more susceptible to vulnerabilities than closed source proprietary licenses. Meaning that software licenses which allow code reuse are more likely to inherit or contaminate derivate work. In contrast, commercial licenses which dont share or allow code reuse are less susceptible to inherit or contaminate vulnerabilities. Hypothesis 4a: Vulnerability type will be positively related to open source software licenses Hypothesis 4b: Frequency of vulnerability will be positively related to open source licenses Hypothesis 4c: Severity of vulnerability will be positively related to open source licenses Source Code Availability Security of open source software (OSS) and closed source software has been a hot topic with many arguments repeatedly presented. Advocates of OSS argue that more reviewers strengthen the security of the software as it eases the process of finding bugs and speeds it up given enough eyeballs, all bugs are shallow (Raymond and Young 2000). Opponents of this idea disagree and claim that not all code reviewers and testers have enough skills and experience compared to code reviewers at companies who are more skilled at finding flaws. The argument is that oftentimes code reviewers and testers need to have further skills other than programming such as cryptography, stenography and networking. Moreover, proponents of closed source software claim that security by obscurity is the main strength of closed source software since its harder to find vulnerabilities when the code is not accessible. However, proponents of OSS argue that its possible to gain access to closed source code through publicl y available patches and disassembling software (Tevis 2005). Its important to note that the impact of the availability of source code on security depends on the open source development model. For instance, the open source cathedral model allows everyone to view the source code, detect flaws/bugs/vulnerabilities and open reports; but they are not permitted to release patches unless they are approved by project owners. OSS projects are typically regulated by project administrators who require some time to review and approve patches. Attackers can take advantage of the availability of source code and published vulnerability reports to exploit them (Payne 2002). However, proponents of OSS argue that vulnerabilities in OSS projects can be fixed faster than those in closed source software because the OSS community is not dependent on a companys schedule to release a patch. Despite the continuous debate on OSS security, advocates from both sides agree that having access to the source code makes it easier to find vulnerabilities but they differ about the impact of vulnerabilities on software security. First of all, keeping the source code open provides attackers with easy access to information that may be helpful to successfully launch an attack. Publically available source code gives attackers the ability to search for vulnerabilities and flaws and thus increase the exposure of the system. Second, making the source code publicly available doesnt guarantee that a qualified person will look at the source and evaluate it. In the bazaar style environment, malicious code such as backdoors may be sneaked into the source by attackers posing as trustful contributors. For instance, in 2003 Linux kernel developers discovered an attempt to include a backdoor in the kernel code (Poulsen 2003). Finally, for many OSS projects there is no a priori selection of program mers based on their skills; project owners tend to accept any help without checking for qualifications or coding skills. Given the issues surrounding source code availability in OSS, we hypothesize that making source code publically available will induce attackers and increase vulnerability risks. Hypothesis 1a: Vulnerability type will be positively related to source code availability Hypothesis 1b: Frequency of vulnerability will be positively related to source code availability Hypothesis 1c: Severity of vulnerability will be positively related to source code availability Software Programming Language Selecting a suitable programming language is one of the most important decisions which have to be made during software planning and design. A chosen programming language has direct effect on how software ought to be created and what means must be used to guarantee that the software functions properly and securely. Software programs which are written using an insecure language may cause system dependent errors which are known to be difficult to find and fix (Hoare 1973). For example, buffer overflows vulnerabilities and other low-level errors are well known issues in C and C++ languages (Cowan 1999). As of today, there exist numerous programming languages but the topic of security in programming languages has been widely disregarded as its believed that programming errors and flaws should be eliminated by the programmers themselves. Current approaches to this issue are essentially ad hoc where best programming practices and secure programming techniques are implemented during or after the design stage. Although this approach helps in preventing coding errors and flaws by relying on programmers skills and experience, it is difficult to say with any certainty what vulnerabilities are prevented and to what extent. More importantly, the ad hoc approach doesnt protect against new and evolving vulnerabilities as it only handles known vulnerabilities and specific coding flaws. In his paper, Hoare (1974) stated that a programming language is secure only if the compiler and run time support are capable of detecting flaws and violations of the language rules. The main issue with this statement is that current compilers and debugging tools are not reliable since they parse code differently; therefore, its impossible to guarantee the same results for programs. Additionally, such tools dont help the programmer in finding vulnerabilities or flaws as they only report syntax errors. Typically, compilers and debugging tools dont allow for security checks on debugging runs, therefore no trust can be put in the results. An evolving trend in secure programming has been the use of formal language semantics. Formal language semantics try to reason with and prove security properties of the code. For example, in their paper, Leroy and Rouaix (1998) developed a formal technique to validate a typed functional language to ensure that memory locations always contain appropriate values to avoid buffer overflow vulnerabilities. Although the use of formal language semantics has been advocated (Dean et al. 1996, Meseguer and Talcott 1997, Volpano 1997), it wasnt widely adopted among programmers. When it comes to software languages, security is essentially dependent on numerous factors such as language developers, programmers and debugging tools. With so many factors, we believe that correlating software language with vulnerability risks will be insignificant. Hypothesis 2a: Vulnerability type will be insignificantly correlated with software language Hypothesis 2b: Frequency of vulnerability will be insignificantly correlated with software language Hypothesis 2c: Severity of vulnerability will be insignificantly correlated with software language Targeted Software Users There are many different types of computer users with a wide range of background, skills, and learning habits. Computer users are typically classified into two distinct groups, namely sophisticated and novice (unsophisticated) users. Sophisticated users have an advanced understanding of computer and Internet technologies; they tend to be more security-aware. Novice users refer to non-technical personnel who are not experienced with computers and the Internet; they rely on computers for simple tasks such as word-processing, spreadsheets, and occasional web surfing. Such users are more prone to security issues due to their inexperience. For instance ignoring software updates and security patches, failing to run essential protection utilities such as an anti-virus or firewall applications are typical security issues with novice users. Because of differences in experience level between both groups, some argue that vulnerabilities affect novice users more than sophisticated ones. Although this might be true for viruses and worms and old vulnerabilities, but when it comes to dealing with zero-day vulnerabilities everyone becomes a victim regardless of their sophistication level. Zero day vulnerabilities refer to unreported exploitable vulnerabilities for which a patch is not available from software vendors (cite xxx). Moreover, when it comes to attackers and potential targets, eventually everyone is a target. Despite the type of computer users, the objective of vulnerability attacks is to hack as many computers as possible with the least amount of effort (Spitzer 2002). Attackers tend to focus on a single vulnerability and use automated scanning tools to search for as many systems as possible for that vulnerability. Such automated tools are often called autorooters and can be designed to scan a specific network for vulnerable machines or scan a range of IP addresses until a victim is found. Its important to note that these tools dont distinguish between software user s as they look for any vulnerable target in sight. Hypothesis 8a: Vulnerability type will be insignificantly correlated with to targeted software users Hypothesis 8b: Frequency of vulnerability will be insignificantly correlated with to targeted software users Hypothesis 8c: Severity of vulnerability will be insignificantly correlated with to targeted software users Software Price Software price plays an important role in modifying the individuals attitude toward the software in many ways. For example, research studies which looked at software piracy found that software price to be a significant factor (incentive) which influenced the intention to pirate (Gopal and Sanders 2000). In their work, Peace et al. (2003) conducted a survey of 201 respondents and found that software price was among the major reasons for illegally copying software. Following the same analogy, studies have shown that attackers attitudes and hackers motivations for finding vulnerabilities are associated with several factors such as: peer approval, self esteem, politics, publicity, financial gains, curiosity and sabotage (Shaw et al. 1999). Within the hackers community, hacking achievements typically help individuals gain higher and more respectable status as it refers to the persons skills and mastery level. Reaching a higher status is oftentimes associated with noteworthy achievements such as hacking popular software. For those hackers who seek publicity or peer approval, they tend to target software with large user base due to their significant reach. So despite software price, hackers look for vulnerabilities in open source and proprietary software as long as there is a significant user base. Similarly, infamous social networking sites such as Facebook and Myspace are constant vulnerability targets regardless of their service cost. Outside the hackers community, hackers incentives tend to vary among political reasons (example: Google-China Hacking 2010), financial gains (example: ransom money attacks), self esteem and sabotage. Again, by analyzing each incentive, we find that software price doesnt play any role in v ulnerability risks. We therefore hypothesize that: Hypothesis 7a: Vulnerability type will be insignificantly correlated with to software price Hypothesis 7b: Frequency of vulnerability will be insignificantly correlated with to software price Hypothesis 7c: Severity of vulnerability will be insignificantly correlated with to software price
Friday, October 25, 2019
How typical are The signalman by Charles Dickens, The monkeys paw Essay
How typical are The signalman by Charles Dickens, The monkeys paw by W.W Jacobs and The red room by H.G Wells of the gothic genre? Gothic stories were written in the middle of the eightieth century these include ââ¬ËFrankensteinââ¬â¢ written by Mary Shelley and ââ¬ËJane Eyreââ¬â¢ written by Charlotte Bronte. Other gothic stories also include ââ¬ËThe Signalmanââ¬â¢ by Charles Dickens, ââ¬ËThe Monkeys Pawââ¬â¢ by W.W Jacobs and ââ¬ËThe red roomââ¬â¢ written by H.G wells. Gothic stories were started by Horace Walpole who wrote ââ¬ËThe castle of otrantoââ¬â¢ in 1765. Gothic stories tend to include the supernatural, isolated places such as derelict houses and castles also in graveyards this is so the setting and atmosphere will be eerie and spooky also gothic stories will contain some sort of death or ghosts. For example in ââ¬ËThe Signalmanââ¬â¢ there is a ghost, it is set in an isolated place and it makes the plot mysterious. One of the ways what gothic stories are written is in short stories. The first short story is ââ¬ËThe signalmanââ¬â¢ by Charles Dickens. The story begins with the narrator who is standing at the top of a hill calling down to the signalman. The narrator then approaches the signalman and thinks that he may be a ghost. ââ¬Å"This was a spirit, not a man.â⬠The word ââ¬Ëspiritââ¬â¢ suggests that the signalman may be supernatural. This is ironic because the signalman thinks that the narrator is a ghost as does the narrator think the signalman is a ghost. The signalman invites the narrator into his box because he realised that he wasnââ¬â¢t a ghost and they talked after a while the narrator left the signalman and returned the next day. ââ¬Å"â⬠¦turned his face towards the little bell when it did not ring, opened the door of the hut and looked out towards the red ligh... ... him and Herbert dies so it brings the genre of death and ghosts into the story. The setting and atmosphere of ââ¬ËThe Monkeys Pawââ¬â¢ is of a gothic genre because the house is set in the middle of nowhere and it is lighted by candles and a log fire that will create dark shadows. ââ¬Å"The candle end, which had burned below the rim of the china candlestick, was throwing pulsating shadows on the ceiling and wallâ⬠¦Ã¢â¬ This quote is typical of the gothic genre because it tells us that the house is shadowed and it is candle lit so it will cause areas of the house to remain in darkness. In conclusion ââ¬ËThe Monkeys Pawââ¬â¢ is typical of the gothic genre because it does contain a sense of supernatural because the paw grants wishes and it made the son come alive again so this is also suggests ghosts. This can be also linked to the mystery of the paw and the thing at the door.
Thursday, October 24, 2019
Carol Ann Duffy Study Notes
1. ââ¬ËLITTLE RED CAPââ¬â¢ ââ¬ËLRCââ¬â¢ is a poem written by Carol Ann Duffy, and is the first poem in the anthology ââ¬ËThe Worldââ¬â¢s Wifeââ¬â¢, published in 1999. By interpreting the fairytale of Little Red Riding Hood in her poem, Duffy recounts her ten years of marriage to Adrian Henri, who was twenty-three years old her senior. She places herself as the character of Little Red Cap and Henri as the wolf. Duffy also alludes to fairytales such as ââ¬ËSleeping Beautyââ¬â¢ in ââ¬ËQueen Herodââ¬â¢ or more traditional stories like ââ¬ËThe Hunchback of Notre Dameââ¬â¢ in ââ¬ËMrs. Quasimodoââ¬â¢.In ââ¬ËLRCââ¬â¢, however, Duffy uses the fairytale staple of the woods, symbolically a rite of passage, to represent her change from a naive teenager to a woman who gains sexual maturity and independence, as a woman and a poet. a. Form and structure: POV of Little Red Cap? by extension, this is the POV of Duffy when she was younger? access true st thoughts of the character ? also allows the reader to see how she progresses from a naive young teenager who is struck by the wolfââ¬â¢s (and by extension Henriââ¬â¢s) sophistication and, more importantly, physical features to someone who has seen past this illusion and is more mature . Key features: Duffyââ¬â¢s use of the fairytale? seeing through illusions to find truth, leading to transformation? the illusion that Little Red Cap has to see through ? also may contain a moral, as fairytales do. While LRRH may have focused on never trusting strangers, this one may be about learning to trust and know yourself before anything else (girl gains independence at the end- ââ¬ËI took an axeââ¬â¢, etc. )? links to self-discovery? Duffy also subverts the original tale by removing the passive female protagonist who gets saved by a man, into someone who asserts her independence by taking ââ¬Ëan axe to the wolfââ¬â¢ herselfSetting? contributes to the theme of self-discove ry and awakening ? we begin ââ¬Ëat childhoodââ¬â¢s endââ¬â¢, where ââ¬Ëthe house petered outââ¬â¢ ? there is a sense of safety and innocence lost, as she is on her own ? the listing in the first stanza presents a world that encapsulates childhood (ââ¬Ëplaying fieldsââ¬â¢), work (ââ¬Ëfactoryââ¬â¢) and retirement (ââ¬Ëallotmentsââ¬â¢) ? she has left the microcosmic reality of childhood, inside her house, and is surrounded by this vast expanse of life? sense of being overwhelmed? but before she can join them she must go through the woods? ymbol of a rite of passage? somewhere unknown, fearful that LRC must traverse through in order to come out the other side with her ââ¬Ëflowers, singing all aloneââ¬â¢ Characterization of LRC? throughout the poem, the dynamic of the relationship between LRC and the wolf, as well as the states of each character change ? represents Duffyââ¬â¢s changing and growing dissatisfaction in her marriage to Henri? charact er represents Duffy at age sixteen (young)? described as ââ¬Ësweet sixteenâ⬠¦waifââ¬â¢, emphasizing her innocence and naivety ? casual tone (ââ¬ËYou might ask why. ), again highlights her juvenility, which attracts her to the more mature wolf? attraction causes whirlwind romance (ââ¬ËI clung till dawn to his trashing furââ¬â¢/ ââ¬Ëmy stockings ripped to shredsââ¬â¢) ? emphasized through violent verbs, and her need to seek justification (ââ¬Ëwhat little girl doesnââ¬â¢t dearly love a wolf? ââ¬â¢)? suggests she doesnââ¬â¢t really know what she is doing? so, it takes ââ¬Ëten years in the woodsââ¬â¢ to come out the other side? she undergoes her rite of passage? represents the disillusionment caused during the final years of Duffyââ¬â¢s marriage? fterwards, she gains independence (repetition of ââ¬ËIââ¬â¢), and by doing so she finds her own voice within her femininity in the final lines of the poem (ââ¬ËI come with my flowers, singin g, all aloneââ¬â¢) Characterization of the wolf? represents the older Adrian Henri ? character progresses in the opposite way of LRC ? he starts off at a higher status, but falls from grace at the 6th stanzaââ¬â¢s turning point ? introduced in stanza 2? Duffy emphasizes his masculine, physical qualities (ââ¬ËWhat teeth! ââ¬â¢), emphasized by allusions to the original tale, as well as the regular rhyme scheme (focuses on ââ¬Ëhairy pawââ¬â¢, ââ¬Ëbearded jawââ¬â¢)? lso creates a juvenile tone, emphasizing LRCââ¬â¢s schoolgirl attraction to him, and how he has the upper hand status-wise ? portrayed as mysterious, sophisticated and confident (contrasts with juvenility of LRC)- ââ¬Ëred wine staining his bearded jawââ¬â¢- it is red wine, not blood? also has connotations of illusion? however, in the 6th stanza she sees through the illusion ? realizes the ââ¬Ëgreying wolf howls the same old song at the moonââ¬â¢? implies that she was only taken by the i nitial lust for him, but that she has become bored and dissatisfied over time? caesura and parallel structures (ââ¬Ëyear in, year outââ¬â¢) emphasize this? o she emasculates him (ââ¬Ëone chop, scrotum to throatââ¬â¢), relinquishing him of his power, becoming independent In conclusion, Duffy manages to explore the themes of self-discovery and independence as she takes a look back at her 10-year marriage to Adrian Henri. She cleverly places herself and Henri as the characters Little Red Cap and the wolf, subverting the traditional fairytale of Little Red Riding Hood and by doing this, uses the fairytale staple of seeing through illusions. Finally, Little Red Cap emerges out of the woods, completing her rite of passage.
Wednesday, October 23, 2019
Which Contribute to Low Health Expectancy in Developed Countries
Outline the factors which contribute to low health expectancy in developed countries. Identify and assess possible solutions to reduce this problem. Health expectancy is ââ¬Å"the number of years a person can expect to live in good healthâ⬠. (New Zealand Ministry of Social Development, 2010). It reflects concern about the quality of life. Furthermore, low health expectancy means that people live in poor health which is affected by diseases and disability. Many factors contribute to low health expectancy, including smoking and obesity.Society should pay more attention to solve these problems to increase health expectancy. This essay will outline the factors which lead to low health expectancy, and then discuss the possible solutions to reduce the problem. First of all, it is obviously smoking is a factor leading to low health expectancy which is very common in developed countries. To begin with, smoking prevalence in European countries is 32% which is an extremely high number (W HO, 2012). In addition, there are some diseases caused by smoking is a well-known fact, such as lung disease and stroke.However, people arenââ¬â¢t aware that how serious it is the smoking problem affect to peopleââ¬â¢s health. In fact, WHO (2008, p. 14) points out ââ¬Å"smoked tobacco in any form causes up to 90% of all lung cancers,â⬠and a dozen different kinds of cancer and chronic disease are caused by smoking. To sum up briefly, smoking has a very serious impact on peopleââ¬â¢s health and life in developed countries. Then, this problem could be solved by reducing smoking prevalence and improving peopleââ¬â¢s awareness of the risk of smoking.The solutions will focus on three aspects which are individual, tobacco industry and the government. Firstly, the solution for individual is quit smoking. Quit smoking is the direct effective way for smokers to increase health expectancy. According to WHO (2012), there are three-quarters of smokers want to quit smoking. How ever it is clearly that the number who quit smoking successfully is far below this data, the main reason for the failure is smokers are addicted to nicotine. The nicotine in tobacco is not only causing a variety of diseases but also leading a highly addictive (Hammond, 2009. . Secondly, the solution for the tobacco industry, they could do the appropriate measures such as add health warnings on tobacco packages, health warnings on tobacco packages increase smokersââ¬â¢ awareness of their risk (WHO, 2008, p. 34). But unfortunately, the tobacco industry would not be willing to do it unless the policy requires them to do so. However, the relevant policies in many developed countries are lacking. So if the national laws and regulations force the tobacco industry to do it then the solution would be more effective.Thirdly, the solutions for government, the government should ban on tobacco advertising and raise tobacco taxes. WHO (2008, p. 37) states that if the government ban on tobacco advertising that the tobacco sales will have up to 16% decrease. In addition, increase tobacco taxes could raise the price of tobacco. According to WHO (2008, p. 39) that ââ¬Å"increasing the price of tobacco through higher taxes is the single most effective way to decrease consumption and encourage tobacco users to quitâ⬠. In conclusion, the smoking problem will be solved by joint efforts of the whole community.Apart from that, another important factor which decreases peopleââ¬â¢s health expectancy is obesity. WHO (2012) states that obesity will become a major factor lead to lower health expectancy in the later parts of this century. Moreover, in developed countries obesity is a very severe problem that affects over 20% of adults on average (OECD, 2011). Furthermore, according to WHO (2012), obesity is the main reason which causes cardiovascular diseases, diabetes, and several types of cancer. That means overweight people are expected to have a low health expectancy.To so lve the problem of obesity, the solution could be considered from three aspects. The first aspect is at the individual level, people should reduce the energy intake from total fats and take regular physical activity to prevent overweight, because obesity is caused by high-energy food intake and lack of physical activity (WHO, 2012). But obviously, this need people have a strong self-control, also diet and excessive exercise may be able to cause the other health problems. The second aspect is about the food industry, the main source of the high-energy food is processed food.Therefore the food industry should reduce the content fat, sugar and salt in processed food, and try their best to provide fresh food, such as fruit, vegetables and nuts. However, the more healthy food will bring about higher prices, and then people will spend more money to improve the quality of their food. The third aspect is about the government and social organizations. The Government has a responsibility to h elp people to improve awareness of the prevention of obesity and to build more public exercise facilities. In terms of social organization, they should cooperate with the Government to implement the policy about obesity.For example, the advertising industry should increase the number of public service advertising about to improve peopleââ¬â¢s awareness of the risk of obesity? However, this will take a long time and a lot of money. To conclude, healthy expectancy is the indicator of the quality of life. This essay has discussed that health expectancy is reduced by negative factors including smoking and obesity. So it is necessary to analyse these factors, identify and assess the solutions from the aspects of individual, organization and the government to solve the problem, and then to improve people's health expectancy and the quality of people's lives.References Hammond, S. K. (2009). Global Patterns of Nicotine and Tobacco Consumption. Berlin Heidelberg: Springer-Verlag New Zeal and Ministry of Social Development. (2010). Health expectancy. Retrieved October 17, 2012 From: http://socialreport. msd. govt. nz/health/health-expectancy. html OECD. (2012). Obesity update 2012. Retrieved October 17, 2012. From the OECD website: http://www. oecd. org/els/healthpoliciesanddata/49716427. pdf WHO. (2012). Facts and figures. Retrieved October 17, 2012. From: http://www. euro. ho. int/en/what-we-do/health-topics/disease-prevention/tobacco/facts-and-figures. WHO. (2012). Obesity. Retrieved October 21, 2012. From: http://www. euro. who. int/en/what-we-do/health-topics/noncommunicable-diseases/obesity WHO. (2012). Obesity and overweight. Retrieved October 21, 2012 From the World Health Organization: http://www. who. int/mediacentre/factsheets/fs311/en/ WHO. (2008). WHO Report on the Global Tobacco Epidemic, 2008: The MPOWER package. [Electronic version]. Geneva: World Health organization.
Subscribe to:
Posts (Atom)