Monday, March 30, 2020
The Metamorphosis Essays (607 words) - Absurdist Fiction
The Metamorphosis When he lifted his head a little, he saw his vaulted brown belly, sectioned by arch-shaped ribs, to whose dome the cover, about to slide off completely, could barely cling. His many legs, pitifully thin compared with the size of the rest of him, were waving helplessly before his eyes. Gregor Samsa has gone through a metamorphosis. This change has turned Gregor into a monstrous vermin. Kafka expresses the anxieties, inner terrors, and cynicism, which fill Gregors life, throughout the novel, metamorphosis. The main theme of the story is the effect of others control on a person such as Gregor's relationship with his family, and how the people around him controlled his life. He realized that he would be his own person when he could escape from his familys control, even if the only escape was death. Gregor was the most unselfish person in The Metamorphosis. This characteristic shows with his dedication to his work. He was the only family member with a job, believing he was the only one capable of it. His only hobby was fretwork, sitting alone in his room. His devotion to his work was remarkable. In all of the five years he had worked for his fathers creditor, he had never once been absent. Gregor always tried to help out, and he never asked for anything. He was never understood, nor was he liked or associated with. We already know he had no friends. Also, who ever like him, or thought anything of him, slowly became less and less associated with him and/or had disbelieves in him. His boss even accused him of stealing, just because he wouldnt open the door. We see Gregor could not be accepted or understood by the ones that need to understand him most. He died from a lack of love and respect from his family, the ones whom he needed love from the most. Kafka used the constant setting of the Samsa household to show the true repercussions of the metamorphosis. It is here that Gregor is truly dehumanized. No longer can he stand the taste of what used to be his favorite dish. He is reduced to a vermin who feeds on rotted, decaying food and who finds the presence of fresh food repulsing. The very means by which he sustained himself is not fit for a human, but rather for a dependent beast. After Gregor dies, at the end of the story, his parents notice that his sister has grown up into a beautiful woman and they feel that it is time for her to get married. This means that they used Gregor as the pawn that went out and supported them. Now that his sister is grown up they can force her into marrying a rich man. Then they would be well off for a long time to come. They can now control the daughter like they did Gregor. Gretes new husband can support the whole family. Once she is married, she too will then become a pawn, a victim of her parents control. It comes to be that a person could die from lack of love and too much control. We see that Gregors going through a metamorphosis and changing into a bug, proved to characterize what he was. It shows what his life was about. The bug represents the anxieties, inner terrors, and cynicism. One of the definitions of the word bug is an unexpected defect, fault, flaw, or imperfection. This is what became of Gregor, all because of lack of love, and too much control. English Essays
Saturday, March 7, 2020
The Inciting Incident How to Write One Correctly to Hook Readers
The Inciting Incident How to Write One Correctly to Hook Readers The Inciting Incident: How to Write One Correctly to Hook Readers Your inciting incident has the power to influence readers to 1) buy your book and 2) pull them in for the remainder of it.In order to get readers to keep reading, your book needs something to trigger that.Sometimeseven starting your story out strongly isnt enoughAnd that means you need a powerful and inticing inciting incident.Heres how to write an inciting incident:Know why the inciting incident mattersLearn what an inciting incident isEnsure it changes the characters life foreverMake sure it draws a line between old life and newIt must kick off the main plotLearn from inciting incident examplesNOTE: We cover everything in this blog post and much more about the writing, marketing, and publishing process in our VIP Fiction Self-Publishing Program, in addition to your 1-on-1 coaching with a bestelling fiction author. Learn more about it hereWhy Inciting Incidents MatterBy the time you get to Death Wish 5, Charles Bronson has run out of reasons to seek vengeance on the world. You can o nly have everyone (and everything, if you count the house and the dog) you love destroyed by violence so many times before it stops being much of a motivation.In action films (and thriller-type novels), the setup for revenge often comes down to quickly killing a loved one. But the 80s are over and motivations need to resonate with an audience that rightly finds some quick woman-in-a-refrigerator to be as irredeemable as it is lazy.When writing a book, you need to incite your hero to action by giving them a reason.Your reader needs to be on board with that reason. Barring that, your reader needs to understand the reason. Failing that, your reader shouldnââ¬â¢t hate your reason.The difference between an antihero and a villain often comes down to a mixture of how they handle an Inciting Incident and the scope of the incident.A villain will want to burn the world because they lost face to the protagonist. An antihero might decide to shoot every criminal they see because children murd er, for example.Before we get lost in the weeds, letââ¬â¢s break it down and ask the big question.What is an inciting incident?An inciting incident is a specific event at the beginning of a story that kicks off the main plot by forcing your main character into it. The inciting incident changes your characters life forever.A good Inciting Incident contains the following four qualities:Creates a Story Question that the Climax must answerIs Sufficient and Kickass: The stakes matter, the presentation WOWs!Sets a ToneTruly Motivates a Character (internally, not superficially)Essentially, an Inciting Incident gives the hero a reason. This reason must be sufficient to the character in question and also sufficient to the story in question. In the Matrix, the Inciting Incident for Neo comes from learning that he is in a simulation. He is offered a choice between learning about that world or going blissful ignorance.In Romeo and Juliet, the star-crossed lovers meet and fall in love at a party, setting them on a course that leads to tragedy.Katniss, an independent girl with skills and a drive to protect others, sees her sister drawn to be Tribute in the Hunger Games.Mild-mannered office worker Richard Mayhew has a job, a fiancà ©, and no real problems in his life until he canââ¬â¢t help but rescue a wounded girl he sees on the street in Neverwhere.All these examples show inciting incidents that start their respective stories.Each of these inciting incident examples reveals something about the protagonist and the world they live in. They donââ¬â¢t just set the story in motion; they give us a reason to want to see our heroes succeed.How do they accomplish this? They do so by deftly ticking off all four boxes without ticking off the reader.How to Write an Inciting Incident do it WellAs stated above, if youre writing a novel, you need an inciting incident. The key here is to do it well by including the necessary elements to do just that.Heres what an inciting incident needs to do:Alter a heroââ¬â¢s life in an irreversible wayDraw a Line between mundane life and the QuestKick Off the storyââ¬â¢s MAIN plotlineLetââ¬â¢s walk through what each of these means as well as examples to bring them to life.#1 Alter a heros life foreverTheres really one main objective of an inciting incident and if you fail this part, the rest of the book will be hard to construct.Your inciting incident must, above all else, alter your characters life forever.Without this very element, its very hard to convince your readers to buy into the story.If your readers can sit back and say, or they could just not do it. to whatever the inciting incident is and their life would be u nchanged, youve created a lot more work for yourself when it comes to the plot.The idea behind this is that if your characters life is changed forever, they dont have a choice but to move forward with what has happened.And that forward momentum is what you need to keep readers engaged.#2 Draw a line between normal life and the new normalThere needs to be a stark contrast between what your characters life looks like now versus what its about to look like after the inciting incident.Why?Because readers want to know that your character cant just go back to how things were. Otherwise, whats the point of them continuing on this journey?With the inciting incident (and really the setup of your story), you are making a promise to the reader about what will happen in your story. If you dont draw a line between the old and whats to come, they wont be interested in finding out whats to come because it wont feel like a mystery.#3 Kick off the storys MAIN plotlineYour inciting incident has to be related to the main plot of your story. If the inciting incident is unrelated to what the main plot points are, youve done something wrong.A common mistake authors make with this is using a big, tense moment as the inciting incident in order to draw intrigue, but then in the next chapter, introducing the real main plot elements.If your story can work separately from the inciting incident, its not done correctly. Go back and tie it into the main plot.An example of this would be Katniss Everdeen in The Hunger Games.The main plot is her journey to survive the Hunger Games. The inciting incident is when she volunteers as tribute to replace her sister in the games.Had the inciting incident not happened (volunteering), the main plot would not exist (Katniss surviving the games).An example of how this could not go well is if the author decided to use a raid or a brawl of some sort as the inciting incident, and then making Katniss be chosen for the games. These elements would not be tied in this instance and it wouldnt be as intriguing or as good of a story.Inciting Incident ExamplesOne of the best ways to get the hang of what an inciting incident really is, is to read and learn from some examples.Here are 4 inciting incident examples to help you learn how to do this well.Inciting Incident Example #1 The MatrixFor Neo, the choice represents an important internal motivation for his character. He doesnââ¬â¢t choose red vs blue pill because he wants to find out whatââ¬â¢s going on, he NEEDS to know.The events leading up to this choice have already illustrated his deep #2 Romeo and JulietThe titular characters met and fall in love. As has been said, you can redo this story with anything, like 2005s pirates and ninjas, and by the end, the audience will demand to know why pirates and ninjas canââ¬â¢t be in love. Or vampires and werewolves, if Underworld is more your thing.The Inciting Incident creates a story question about love and its consequences which the Climax delivers on. It reveals the character of both Romeo and Juliet as they feel truly, without the pretense of the society they live in. The costumes and masks of the party keep their prejudices out, revealing an inner truth.Whether you enjoy a stage production, an older movie, or the Baz Luhrmann version, the party sets a tone for the rest of the events. The presentation leading up to the moment of love discovered feels earned even after a thousand iterations. We root for the characters because we are practically programmed to do so.Finally, the line is drawn between each characterââ¬â¢s former life and their new reality of being in love. Nothing about their old prejudices continues forward. The consequences of the main plotline stems from this moment.Inciting Incident Example #3 The Hunger GamesKatniss offers herself up literally as ââ¬Ëtributeââ¬â¢ to save her sister. Itââ¬â¢s character motivated, it sets a tone, and it stuns the crowd. This Inciting Incident creates an echo that follows the character as the story question becomes about the purpose and meaning of sacrifice.The separation between the world of the District and the world of the Games themselves is inexorable and clear cut. The film uses a diluted and diffused palette for the earlier scenes, giving way to a brighter almost saturated pallet for the games. In the book, the prose shifts, becoming more playful and les terse. In both cases, the audience knows which world they are witnessing.The story happens because of this decision.All of this is sufficient, but Collinââ¬â¢s pulls it off in three words. Well, almost, the setup makes the specific Inciting Incident possible.The main plotline occurs, in almost a cheat, at the titular Hunger Games.Finally, the stakes matter to Katniss personally. She saved her sister. The further ramifications that change the society also stem from this incident, but they donââ¬â¢t have to.If the book ended with her sacrifice it would still be sufficient.Inciting Incident Example #4 NeverwinterGaiman uses the Inciting Incident figuratively for the reader and literally for the character of Richard Mayhew. The moment that Richard notices Door, he crosses over from the real world to the realm of London Below.The distinction between the two worlds is irrevocable but not obvious to the intractable Richard, at least not at first.Meeting Door is both an Inciting Incident personally for Richard, who must help because you help people when you see they need it, and a deeply revealing part of his character development. The naiveite that comes with it almost gets him killed quite a few times, but the character line is there.The WOW! of the moment comes from the way Richard entirely focuses on the wounded girl, Door, and totally ignores his blathering fiancà © who demands Richard make a decision, on the spot, between helping the wounded waif and staying engaged.Much like in the Matrix, this is no kind of choice at all. Richard canââ¬â¢t not help.The stakes donââ¬â¢t seem high to Richard, but the reader soon learns that without aid, the men who wounded Door would have caught up to her.Finally, the Incident creates a story question about both Richard and Door, how they interact with the world(s) they interact with and who they are. All of which has a pay off in the Climax.How the Inciting Incident Shapes Your StoryAs you see, the Inciting Incident does a lot with very little. The best of them seem to be almost happenstance, a nearly throwaway event that makes an impact on the characters and the world(s) around them.Even something simple can be used as an iceberg tip, drawing the reader down a rabbit hole (for a fifth example of this EXACT thing) into the world of your story.Be cautioned! These examples represent everything going right and fulfilling the Musts to be sufficient. Losing one of the Musts alone can cause a story to stumble out of the gate.It is possible to recover, but never ideal. Consider the Inciting Incident of The Phantom Menace (picking on a poorly executed story is low fruit, but thatââ¬â¢s the point). Anakin is discovered because they need a part to fix a ship to get back on the ââ¬Ërealââ¬â¢ adventure of protecting Padme. The Incident has prophetic potency but its lack of both a clear separation between the mundane and the quest and its failure to set the stakes leave the audience baffled and relying on external information to care.The Inciting Incident can be thought of as the first major hurdle you need to jump to make a story kickass. If you stumble, even a little, on that first hurdle getting to the finish line and medalling in the event isnââ¬â¢t impossible, but it sure as hell isnââ¬â¢t going to be easy.Start Working Toward a Powerful Story TODAYSometimes getting started is the hardest part. When you have a coach, someone you can work with 1 on 1 to take your story idea to the next level, your progress (and future publishing goals) are better for it.Check out this free training to learn how you can get started.
Thursday, February 20, 2020
Since the mid-nineteenth century income inequality across nations has Term Paper
Since the mid-nineteenth century income inequality across nations has increased dramatically. Discuss the sources and consequenc - Term Paper Example Nineteenth century witnessed collapse of pre-modern empires like the Roman Empire (Mokyr 40). As a result, new political entities, including the British and German empires came into existence. These changes created corresponding dynamics within economic sectors in affected regions. Since then, the world continues to experience shifts in economic dynamics from one region to another. Numerous theories strive to explain causes and consequences associated with these economic shifts. In order to understand what really happens, it is appropriate to look back at history and identify what caused economic changes at those times. Subsequently, we will be able to explain current economic inequality witnessed in modern societies across the world. Introduction In this context, political and social changes that took place during industrial revolution makes 19th Century the starting point of contemporary economic disparities. This period saw the rise of European powers into leading advancement in e xplorations and social modernization. Great Britain championed industrial revolution, which totally changed productivity and wealth creation across the globe. It was during this time that scientists came up with numerous breakthroughs in the field s of mathematics, electricity, chemistry and metallurgy (Mokyr 43). As a result, Great Britain and other European nations resolved to engage in industrial production of goods and mining activities. In this case, new resources that were not discovered and exploited in earlier empires came into existence. Improvement of transport networks through railway lines and establishment of urban settlements changed ways of living. On the other hand, Japan, Germany, and Portugal embarked on programs meant to spark modernization within their economic sectors. Great Britain led the world into abolition of slave trade in Europe, America, and Brazil. As a result, adoption and application of Liberalism started prevailing in modern government systems. Liber alism translated into the economic system of capitalism, which advocated for liberalized pursuit of economic goals by individuals within the society. Therefore, those who had access to key raw materials could utilize them for profit and wealth generation (Mokyr 44). On the other hand, poor citizens of these empires were employed in mines and industries as casual laborers. In this regard, integration of Liberalism and Capitalism marked inception of economic and income inequalities. In addition, globalization derives its roots from this period when economic performance of one nation could influence performance in another related country. Colonization spread into Africa and Asia where colonizers acquired additional wealth from unexploited territories. As a result, the scramble and partition of Africa by Europeanââ¬â¢s major powers influenced economic changes through wealth acquisition from the colonies. All these economic changes resulted in advancement and increase of economic dist ribution and income inequality in the world. Income Inequality: Definition In this context, income inequality or economic inequality refers to distribution of assets and factors of production within a given economic region under consideration. Factors of economic production include major assets like land, capital, and labor. Income inequality changes depending on the period of time and economic
Tuesday, February 4, 2020
Service learning Assignment Example | Topics and Well Written Essays - 500 words
Service learning - Assignment Example This implies that every member of the society is equally important and holds the potential to make positive contributions consequently leading to the overall societal development. Racism is a global problem that can affect anyone since it arguably depends on an individualââ¬â¢s location. For example being white in America and other Western countries is seemingly a free ticket from racism unlike other races such as Asians. However, this privilege is limited to regions where the highest percentage of inhabitants are white. For example, during a tour to Africa with my family we encountered an incident where we were overcharged simply due to the divisions and notions created by race. There was no considerable benefit to the oppressors apart from the extra cash of course. Nonetheless, racism is seemingly double sided since in some instances I get served first regardless there being people from a different race that had arrived earlier. Stereotyping is a common practice in the society and can either be positive or negative. For example, the stereotype that all politicians are selfish or that girls are not good at sports or that all Muslims are terrorists or all women like make-up. Going by this examples it is evident that stereotypes are specific to particular groups such as politicians, girls, Muslims, and women respectively. Additionally, stereotypes are seemingly true but the main contestation is the generalization that is not necessarily true. For example, a relatively high number of women like and frequently use make-up. However, there is also a relatively high number of women who do not wear make-up and in fact do not like it. The theory of voluntary oppression is deeply rooted in the provisions that for oppression to occur one must belong to a group that is facing oppression. This is despite the fact that the particular individual in play may not be directly affected. This implies that an individual is oppressed simply due to the fact that they
Monday, January 27, 2020
Heart Rate Changes In Different Genders Physical Education Essay
Heart Rate Changes In Different Genders Physical Education Essay This report sets out research based on prior experience and literature carrying out the study of relations between exercise and respiration eventually resulting in variation in pulse rate. In essence the research proposal seeks to understand more about the effect and cause relationship to come out with precise results. The report details the methodological issues connected with the research and it explores the choices and assumptions necessary in planning the research. The aim of the study was to see the effect of age and gender on pulse rate variation in response to exercise. For this investigation we made sure the practical is safe because we would not do things that would affect people and also we would not be dangerous to others. We needed to use pulse-meter to check pulse rate down every finding. In our research it was expected that the pulse rate would increase during the time of exercise and also the breathing rate would be faster than normal and that gender and age would affe ct the pulse rate of people. The weights (dumbles) were given to the subjects to use for five minute and one of us assisted them to make sure they used the weights properly. The pulse rate was noted down before the experiment with the help of pulse meter and was recorded again after carrying out the five minute round of exercise with the weights. The ages and gender were also noted. The results of the experiment proved that the pulse rate increased by a substantial amount after the exercise had been completed and that females had a higher pulse rate than men. Moreover, it was seen that age mens ages increase, their pulse rate increases and there was no correlation between females ages and their pulse rates. This experiment tests the effects of age, gender and exercise on pulseà rate. Pulse rate represents the beating of the heart, specifically theà ejection of blood from the left ventricle to the general circulation of the body.à Before the start of exercise, your pre-exercise heart rate usuallyà risesà above normal, and this is called an anticipatory response. Duringà exercise, respiration increases based on the amount of activity beingà done. When exercise is being completed, there is an increased demandà for gas exchange, due to the circulatory system being under continuousà stress. Oxygen consumption increases rapidly, as well as carbon dioxideà production.à Regular exercise also produces changes in circulation. The blood flowà to working muscles increase, and this means that more oxygen andà energy can be delivered to the muscle cells. Blood volume and theà number of red blood cells also increase with this large flow, andà oxygenà levels rise conside rably.à In our experiment we have decided to test a type of exercise;à use of weight (dumbles). This will affect various parts of the body and is designedà toà build up stamina and keep a regular heart beat. Objective This experiment aims to discover how exercise canà affect the pulse rate of any given individual by testing their pulseà rate after different amounts of exercise and how gender and age affects the pulse rate. Literature Review Research has shown that the pulse rate of men is slower than the pulse rate for women. Different researches have been conducted on the effect of exercise on the health of human being. The studies were intended to examine the influence of exercise on pulse rate, heart rate and fitness of people. Experts from cardiac health suggest that the best way to keep hearts healthy is a balanced diet, avoiding smoking, and regular exercise. Exercise that is good for your heart elevates your heart rate. The American Heart Association recommends to do exercise that increases your heart rate to between 50 and 75% of your maximum heart rate. They recommend getting at least 30à minutes of exercise on most days of the week (AHA, 2006). The American Heart Association also suggests that pulse rate for woman is considered normal if it is between 70-80 beats per minute. However, pulse rate may be affected by variables such as age, sex, physical fitness, some drugs/medication, genetics and anxiety. A study of (WebMD Medical Reference from Healthwise) revealed that your pulse changes from minute to minute. It will be faster when you exercise, have fever or when you are under stress. It will be slower when you are taking rest. The institute also did an experiment to see the pulse rate difference in males and females. The results of the experiment were that the pulse rate of the females was in fact higher than the male pulse rate by six beats.à The overall female average was 85 beats per minute and the overall for males was 79 beats per minute. Scott Roberts, Ph.D., FACSM, FAACVPR, is an assistant professor in the Department of Physical Education and Exercise Physiology at California State University, Chico. His primary area of expertise is Clinical Exercise Physiology. He has authored and co-authored 10 fitness and exercise science books and over a hundred articles and chapters in books. His studies tell that women have a higher Heart Rate response than men. This response compensates for the lower stroke volumes women have compared to men. The average amount of blood pumped out of the heart per minute is referred to as cardiac output. Another research by the American Journal of hypertension concluded that there was no influence of the exercise on pulse rate, blood pressure level and rates of hypertension of the elderly population of ages 50 and above. But the research showed that regular exercise can develop better health and fitness in the younger population. According to (Silverstein, Alvin Dr., et al, The Circulatory System Canada; Fitzhenrey and Whiteside Ltd.à 1994), age also affects the pulse rate.à The usual pulse rate for a baby embryo is 150 b.p.m. (beats per minute).The average pulse rate of an infant140 b.p.m and 90 b.p.m in seven years old.à A man from 30-40 years old usually has a pulse rate of approximately 72 b.p.m; this differs from 76-80 b.p.m for a woman of the same age.à Elderly people have the lowest of the other age groups, which is around 50-65 b.p.m.à Women usually have higher pulse rates than men.à Another difference among pulse rates is physical activity. Exercising, such as playing sports, speed your pulse rate up and almost double the speed of your heart.à A study from Brigham and Womens Hospital also conveys the message that the human health can be judged by four vital signs which are Pulse rate, Body temperature, Respiration rate and the Blood pressure. All of these signs can be controlled and regulated by doing regular exercise. Like all other researches Texas Heart Institute also came up with a thought that exercise can help your body in many ways. Aside from helping you to keep a healthy body weight, exercise increases your mobility, protects against bone loss, reduces your stress levels and pulse rates, and helps you feel better about yourself. And research has shown that people who exercise are less likely to develop heart disease, high blood pressure, and high cholesterol levels. People of any age or fitness level can benefit from some type of exercise, be it running, walking, ballroom dancing, water aerobics, gardening, or any activity you choose. A study from NEMA (National Emergency Medicine Association) shows that many athletes have pulse rates in the 40 60 range depending on how fit they are. In general a lower pulse rate is good and exercise programs helps doing so. In addition to that declines will be seen in resting heart rate, blood pressure, and stress levels as well. Overall body changes will also be experienced including weight loss and increase of lean body mass. Hypothesis Development Null Hypothesis H0 = There is no relationship between the age, gender and pulse rate. HO: p à ¢Ã¢â¬ °Ã 0 Alternative Hypothesis HA = There is a relationship between the age, gender and pulse rate. HA: p = 0 Theoretical Framework The dependent variable here is the pulse rate which changes when exercise is carried out. So, exercise, gender and age are the independent variables which can be manipulated to determine the change in pulse rate. Some intervening variable also interrupt the independent variable and create a discrepancy in the results. Identification of Variables Independent Exercise Age Gender Dependent Pulse Rate Intervening variables Such as illness, faulty tools etc. DIAGRAM Dependent Variable Independent Variables Age Gender Exercise Pulse Rate Intervening Variables illness, faulty tools Methodology Nature Of study the nature of the study is hypothesis testing. Data Collection The data for our research was obtained through experiment and some secondary sources of information, which included internet articles, journals and books. Population Our target population consisted of males and females living in Lahore. Sample The sample comprises of 1070 people, half males and half females. Instruments The instruments used were two dumbles weighing 5 kg each, a stopwatch and a pulse meter. Procedure: The methodology was based on field Experiment research. 1070 people (half males and half females) were approached in different parks and market areas of Lahore. Convenience sampling was used i.e(willing people were chosen to be a part of the experiment). Their pulse rates were recorded before exercise. They were each asked to use lift two weights of 5 kg each for five minutes. Their pulse rate after the exercise was then recorded using the pulse meter. Their age and gender was recorded. The results were then recorded in SPSS and conclusions were drawn based on the collected results. Reliability The reliability of the instruments was ensured through test-retest method. For test-retest reliability method five males from the sample were chosen. Their pulse rate before exercise was recorded twice after a time interval of two minutes. The results obtained in both the attempts co-related to a high degree (Co-efficient=0.87). Validity The content validity is ensured since the pulse meter is measuring the pulse of a person per minute. Results The results of the experiment are as follows: Descriptives: The results show that the mean values of pulse rate in males are lower than the mean values of the pulse rate in females. This shows that females have a higher pulse rate than men. The results also prove that the pulse rate increases after exercise, as the means of the pulse rates before exercise are lower than the means of the pulse rates after exercise. N Minimum Maximum Mean Std. Deviation Without Exercise male 1070 55 105 85.09 10.227 With Exercise male 1070 82 144 116.03 13.118 Valid N (listwise) 1070 N Minimum Maximum Mean Std. Deviation With Exercise Female 535 96 144 120.41 10.060 Without Exercise Female 535 70 105 92.19 6.373 Valid N (listwise) 535 Correlation: The table below shows a weak positive correlation between age of males and their pulse rate without exercise. This means that as the ages of males increase, their pulse rate increases. The value is significant. Age Without Exercise pulse Age male Pearson Correlation 1 .270(**) Sig. (2-tailed) .000 N 535 535 Without Exercise pulse males Pearson Correlation .270(**) 1 Sig. (2-tailed) .000 N 535 535 ** Correlation is significant at the 0.01 level (2-tailed). The table below shows that there is almost no correlation between the age of females and their pulse rate without exercise. This means that the two variables are not related. Age Female Without Exercise pulse Age Female Pearson Correlation 1 .043 Sig. (2-tailed) .317 N 535 535 Without Exercise pulse female Pearson Correlation .043 1 Sig. (2-tailed) .317 N 535 535 Graphical representation of results Discussion We are of the view that when the body is exercising the muscles respire toà produce energy, so the muscles can contract. Oxygen is needed for thisà process; the oxygen is carried in the hemoglobin of the red bloodà cell. The heart and lungs need to work harder in order to get aà greater amount of oxygen to the muscles for respiration. In muscle cells digested food substances are oxidized to release energy. Theseà oxidation reactions are called cellular respiration. When muscles useà oxygen in order to respire the process is called aerobic respiration:à The heart rate rises because during exercise, cell respiration in theà muscles increases, so the level of carbon dioxide in the blood rises.à Carbon dioxide is slightly acid; the brain detects the rising acidityà in the blood, the brain then sends a signal through the nervous systemà to the lungs to breathe faster and deeper. Gaseous exchange in theà lungs increases allowing more oxygen into the circulatory syst em and removing more carbon dioxide. The brain then sends a signal to theà senatorial node to make the heart beat faster. As a result the heartà rate would rise.à The length of exercise isà increased; the number of beats per minute will rise. The number ofà beats per minute rises steadily because the amount of exercise is gradually increased. The heart reacts to this by increasing the numberà of times per minute that it beats so that the muscles have enoughà oxygen and glucose to work with the greater amount of exercise. In a trial the body temperature of theà exerciser will rise. The heat of the body will increase the heartà rate which will adversely affect our results, making them lessà accurate and reliable. We cannot control if the body heats up duringà exercise, only to the extent of using a fan to cool the epidermis ofà the skin which would lower the temperature of the blood, thus reducingà the bodys core temperature. This would then keep the heart ra te at aà more natural level when a sample will be exercising. The intervening variables which may act at the point of time and are hard to calculate may affect the findings but we are trying to minimize the chance of error by taking measures. Although exercise increases pulse rate, age and gender definitely have an impact on it also. We saw that as age in men increases, their pulse rate also increases, whereas in females, there is no correlation between the age and pulse rates. Moreover, the mean values of pulse rates for females are higher than the mean values of pulse rates for men. Acknowledgements Our debt to people who have supported us in this whole project is enormous. We highly appreciate their complete support, interest, patience and lucid explanations. We highly appreciate the coordination of individuals most of whom we didnt know who cooperated and showed their consent to complete our research. We are really thankful to Mr. Humair Hashmi who taught and led us to the path of attaining a successful Research. References http://www.sciencedirect.com/science?_ob=ArticleURL_udi=B7CVK-4HCDTJ6-3_user=10_rdoc=1_fmt=_orig=search_sort=d_docanchor=view=c_acct=C000050221_version=1_urlVersion=0_userid=10md5=c933d0d1170fe63eac5d49a773503097 www.coursework.info//Investigation_to_see_the_effect_of_exerc_L47472.html wiki.answers.com//Why_is_the_pulse_rate_high_after_exerciseà www.studentcentral.co.uk//Investigation_to_see_the_effect_of_exerc_L100012.html http://www.cheathouse.com/essay/essay_view.php?p_essay_id=91613 www.jstor.org/stable/80790à http://www.standards.dfes.gov.uk/schemes2/science/sci5a/sci5aq7?view=get http://journals.cambridge.org/action/displayFulltext?type=1fid=793376jid=ECPvolumeId=2issueId=04aid=793364 www.tki.org.nz/r/science/science/isact_pulse_rates_e.phpà http://www.molecularstation.com/research/effect-of-exercise-and-massage-on-the-pulse-rate-arterial-pressure-and-electrocardiogram-in-patients-during-cardiological-rehabilitation-after-myocardial-infarction-5767998.html http://www.123helpme.com/view.asp?id=121764 lose-5-pounds.homeunix.net/effect-of-exercise-on-pulse-rate-pulse-rate.htm ccgi.dcpmicro.plus.com//files/pdf//exercise%20pulse%20rate.pdfà www.patentstorm.us/patents/RE40401.html www.sd67.bc.ca/schools/salc/biology%2012//bplab.pdfà www.umm.edu//what_effects_does_exercise_have_on_other_conditions_000029_8.htm www.deniseallen.org/images/lecture/module3/bplab001.pdf www.8starshop.com//exercise-stop-watch-calorie-heart-pulse-rate-counter.html jp.physoc.org/content/76/1/39.full.pdf http://cgi.ebay.co.uk/Exercise-Stop-Watch-Calorie-Heart-Pulse-Rate-Counter_W0QQitemZ250512726867QQcmdZViewItemQQimsxq20091012?IMSfp=TL091012157003r8163 AHA, 2006. Target Heart Rates, American Heart Association [accessed June 20, 2006 http://www.americanheart.org/presenter.jhtml?identifier=4736. WebMD Medical Reference from Healthwise http://www.webmd.com/heart-disease/pulse-measurement American Journal of Hypertension http://www.nature.com/ajh/journal/v18/n4s/abs/ajh2005608a.html Brigham and womens Hospital http://brighamandwomens.staywellsolutionsonline.com/Library/Encyclopedia/85,P00866 Texas Heart Institute http://www.texasheartinstitute.org/HIC/Topics/HSmart/exercis1.cfm NEMA (National Emergency Medicine Association) http://www.nemahealth.org/programs/healthcare/heart_rate_pulse.htm
Sunday, January 19, 2020
1-Year Marketing Plan Essay
Introduction This one-year strategic marketing plan for Great Gaming Graphics (3G) has been created by its founder to obtain additional private funding for the company. Great Gaming Graphics has been launched two years ago and the discrete graphic chip prototypes that got developed during this time shows great promise, offering computer gaming graphic speeds in excess of 220% compared to the competition. The prototypes have been put on graphic card reference boards for standard PCââ¬â¢s and distributed to PC Gaming Review sites, PC Gaming magazines and PC Game companies for testing/review purposes and the reception was extremely positive. Alongside with this the Gaming Review Sites and Magazines published their findings in their publications and the reception of the general public (through letters, blogs) has been extremely enthusiastic. The next step in the process is to bring the prototype to market (expected launch is Q3 2015 and evaluate entry into new markets (mobile and High Performance Computing) See more:à The Story of an Hour Literary Analysis Essay Mission Statement Great Gaming Graphics mission statement is as follows: ââ¬Å"The best Gaming experience in the world. Period!!!!!!!â⬠The Productà 3G has developed graphic chips for the PC gaming market. The graphic chips (lower end model 3G100 and higher end model 3G200) offer substantially higher frame rates per second with the maximum feature set enabled (Anti-Aliasing at maximum) than the competition. The experience for the video gamer is that games can run with live like graphic experience on large resolution screens (including 4K screens) without any stutter of the motion (at least 60hz up to 4K resolution). Consumer Product Classification Gaming Graphics Cards are shopping products. Consumer usually spend 1-3 month researching the product they are looking at buying and replace their cards within 12-36 month, depending if they are hardcore or casual gamers. Gamers usually have a graphic chip brand affiliation (either AMD or NVidia), but will sway to another brand if the performance is at least 20% higher forà the same price. Graphic Cards are usually ordered through online retail outlets like Amazon, Newegg and TigerDirect. Target Market The target market for the 3G products are computer gamers (Males in the age group 14-50 years old), PC/Notebook OEMââ¬â¢s (HP, Dell, Lenovo, ASUS, MSI etc.) and Graphic Card Manufactures. The gaming market represents at least 100 Mio people globally, based on the best-selling computer games ever sold. The target audience for the product is split into three distinctive groups: The Casual Gamer The term ââ¬Å"casual gamerâ⬠is often used for gamers who primarily play casual games, but can also refer to gamers who play less frequently than other gamers. Casual gamers may play games designed for ease of gameplay, or play more involved games in short sessions, or at a slower pace than hardcore gamers. The types of game that casual gamers play vary, and they are less likely own a dedicated video game console. The casual gamer represents approx. 80% of the gaming market. The casual gamer will upgrade his gaming experience from build-in graphics (at time of purchase of the PC/Laptop), if the price is low enough to justify the upgrade. The price a casual gamer is willing to pay for a better gaming experience is up to $50. Mainstream Gamer A mainstream gamer is a player with a wider range of interests than a casual gamer and is more likely to enthusiastically play different types of games, but without the amount of time spent and sense of competition of a hardcore gamer. The mainstream gamer enjoys games but may not finish every game they buy and doesnââ¬â¢t have time for long MMO (Massive Multiplayer Online) quests. The mainstream gamer represents approx. 15% of the gaming market. The mainstream gamer will seek out the best bang for the buck regarding his/her gaming experience and is willing to spend up to $200 for a graphic card. Hardcore Gamer A hardcore gamer is a player that spends the majority of his/her free time with gaming. The hardcore gamer is very competitive, often owns the latest high-end technology (High-End PCââ¬â¢s, Consoles, Multi-Monitor Setup, 7.1 Soundà System etc.), are very technology savvy and often seek out and participate in gaming communities. The hardcore gamer represents only about 5% of the gaming market, but a large part of the earnings for the gaming hardware producers, because the margin of the high-end products are substantially higher than in the other categories. The hardcore gamer will seek out the best performing product, no matter what the price is. Some hardcore gamers install up to 4 graphic cards (with a total price of up to $3000 for the Graphic System alone) to have the best gaming experience possible (very high resolution across multiple screens and all graphic options enabled for the best experience) Competitive Situation Analysis Analysis of Competition using Porterââ¬â¢s 5 Forces Model Competitive Rivalry The discrete PC graphic card market generates approx. $6 billion revenue annually on a global scale. The two competitors in this market are AMD (Radeon) and Nvida (GEForce) with a roughly equal market share of about 20% each. Even though Intel is considered to be the market leader in PC graphics, they only have CPU embedded graphics with low performance/features and are currently not considered a competitor. NVidia has recently released an upgraded product line (Mainstream to High-End), with performance increases of approx. 20% across the product line and power reduction of approx. 25% compared with the previous models. Pricing got slightly reduced within the classification of their products (~$200 Mainstream, ~$300 Enthusiast, ~$600 High-End) to gain market share against its only competitor who hasnââ¬â¢t upgraded its product line yet. Nvidia is still producing its upgraded product line in a 28nm process and is not going to 20/16nm before the end of 2016. 3Gââ¬â¢s current prototype is already produced in 20nm and is slated to be on 16nm at Q1/2016, which gives it an even greater greated competitive advantage over Nvidia, considering that smaller structures allow substantially faster performance of graphic chips while at the same time reducing power requirements. AMDââ¬â¢s current product line is still based on the three year old Graphics Core Next (GCN) design, which has been refined over the years but is clearly at its limit. Power consumption of AMD poweredà graphic cards is almost twice of Nvidiaââ¬â¢s and more than 4 times of the 3G prototype. 3G has a clear advantage against both competitors, considering that 3Gââ¬â¢s high-end prototype is currently 220% faster than either competitor, with a power use advantage of at least 50% which results in not only a lower power bill for the end consumer of the graphic card but as well reduced cost for cooling components. Additionally the low power requirements allow the use of smaller and cheaper power supplies, which is going to reduce the overall cost of a PC gaming machine even further. One large advantage of the reduced power requirements is that the graphics chip can be used in the upcoming STEAMOS machines (small form factor PC gaming machines, which resemble video game consoles) without sacrifice to performance. Threat from New Entrants There is a potential that ARM (with Mali) and Qualcomm (Adreno) redesign their current SoC (System on a Chip) products and license it to third parties to produce discreet graphic chips. Both companies offer their current products only in the mobile market (Phone/Tablets), which is high volume with a substantially lower margin per chip sold than the discreet PC graphic market. Alongside with this, both companies are in a very good position to drive power requirements even further down, considering their experience with the low power requirement of battery operated systems like phones and tablets. Threat from Buyers The following two potential issues arise from an end customer perspective. 1. Competitive products catch up or exceed with 3Gââ¬â¢s product performance at the same price point, which will lower the appeal for end-consumers to use the 3G product. 2. A change in gaming habits to games that donââ¬â¢t have the high graphic power requirements and therefor curbing demand for the overall discreet graphic chip market. Threat from Suppliers Considering the initial lower volume of the product for production in a Semiconductor Fab (TSMC, Samsung etc.) 3G might get bumped to a lower priority if larger customers of the Fab are asking for a larger part of the capacity, due to higher demand. There is a limited amount of Fab Capacity available and it is not easy to move to another Fab (ramp-up time approx. 6 month). Therefor the contracts with the Semiconductor Fab have to be structured in a way to have a guaranteed amount of product delivered (with penalties associated if not fulfilled) plus a contractà clause to allow ramp up of production by 10% on a monthly bas e. Once 3G is getting bigger, it might make sense to pursue a dual supplier strategy, with the advantage of not relying on a Single Fab to produce all graphic chips and the disadvantage alongside with this with not getting high enough volume discounts. Threat from Substitutes One potential issue arising in the future is that IGP (Integrated Graphic Processing) units that are part of a CPU (Intel, AMD and SoCââ¬â¢s) are becoming powerful enough to play the most demanding games and therefor a dedicated Graphic Chip is not going to be required anymore. At this stage this is not a threat for the next 3 years (according to 5 year roadmaps of potential CPU/SoC providers), but could certainly change in the future. It takes 2-3 years to develop a competitive product and there is usually enough advanced notice in the market that a new competitor is going to enter the specific segment. SWOT Analysis In this first paragraph, please introduce the SWOT analysis. For more information, see the recommended text. This section is laid out to summarize the analysis in a table, and is then followed by more detailed explanations of each item. Please see specific instructions in the four sections below the table. STRENGTHS *indicates core competency *Worldclass ASIC Engineering Team Experience of the Executive Management Team Strong capital base WEAKNESSES Only two Graphic Card Manufacturers signed up to produce Graphic Cards based on 3G chips No PC OEM relationships established yet No reputation yet OPPORTUNITIES Approaching the mobile market (Phones/Tablets), with either licensing the technology to SoC companies Finance the game development efforts of Independent Game Companies to focus their efforts specifically on the 3G product Develop out of the existing product a GPGPU, to be used in Supercomputers. THREATS Competition (AMD and NVdia) moving to new Fab technology faster than 3G, removing the advantage on the power front Competition launching new designs that are as efficient as 3Gââ¬â¢s, but with the advantage of greater brand recognition Game Developers hitting a plateau with their new generation of games, that donââ¬â¢t require anymore improvements on the graphics card front Strengths 3Gââ¬â¢s first strength is having a world-class ASIC (Application Specific Integrated Circuit) engineering team. The members of the team have on average 15 yearsââ¬â¢ experience in the field of development of low power and high performance ASIC and some of the members of the 3ZG engineering team have been instrumental on developing in the past key products in the graphics card market. The second strength of 3G is the extensive experience of the executive management team. The CEO of 3G used to serve as the president of AMD (direct competitor) for over 10 years. The Sr. Vice President of engineering was the head of engineering at 3DFX in 2001 and after the acquisition of 3DFX by NVidia, he served as the head of engineering products until joining 3G. The Executive Vice President of Sales and Marketing has over 20 yearsââ¬â¢ experience in building rapid growth sales and marketing teams in seven companies. The third strength/advantage 3G has is its strong capital base. 3G got ove r the past 2 years funding from venture capital in excess of $175 million and currently still has $100 million in the bank, which at current and planned spending levels should sustain the company for another 30 month. Weaknesses The first weakness in 3Gââ¬â¢s strategy is that 3G has only managed to sign-up two mid-tier Graphic Card Manufactures (EVGA and XFX). The Graphic Cards Manufactures use the reference boards 3G delivers and implement their own cooling solution plus additional tweaks to boost performance of the cards by 5%-10%. A large part of the Mainstream and Hardcore Gamers like to buy their graphic cards from the top graphic card companies (ASUS, MSI, GigaByte), due to the custom designs and extended warranties. This might limit the initial availability of cards in the market until 3G can sign-up the top graphic card companies as well. The second weakness in the strategy is that 3G has not established any relationships with PC OEMââ¬â¢s (Dell, HP, Lenovo etc.),à which will limit the initial exposure of the product to the mainstream and hardcore gaming user. 3G will start pursuing 6 month after the launch of the product the PC OEMââ¬â¢s, to start including the lower end 3G products in their offerings. The third weakness in the strategy is that 3G doesnââ¬â¢t has the reputation of the two main competitors. AMD and NVidia have both been in the graphic card marketplace for almost 20 years and the end consumer knows what to expect from both companies. 3G is new to the game and will need to build this reputation over time to gain the confidence of the gamers. Opportunities Additional opportunities persist for 3G in several areas that can be explored once 3G had a successful launch of its core product and got additional funding for development. The first opportunity is in the mobile market (phone/tablets). 3G is actively looking into creating reference designs for the mobile market that satisfy the unique requirements present (very low power, with fast performance). The big advantage of the mobile market is that the volumes of the market are extremely high (total annual volume in excess of 1 billion units) and 3G would only need to license the product to SoC companies (e.g. Samsung, MediaTek, Apple, Allwinner) versus getting into production as well. The second opportunity for 3G is the GPGPU (General Purpose Graphic Processing Unit) market, to develop cards that will power Supercomputers. The current prototype is already ahead of the completions (NVidiaââ¬â¢s Tesla and Intelââ¬â¢s XEON Phi) and this is a very high margin, but low volume market that will give 3G additional market recognition. The third opportunities for 3G is to finance the game development of up-and-coming independent game developers to specifically optimize the games for the 3G product line. AMD (with Mantle) and NVidia (with PhysX) have been quite successful with the strategy to boost the sales volume of their products. Threats 3G wants to look at potential threats that can derail the strategy in the future and has identified the following three areas: The first threat is that 3Gââ¬â¢s competitors are moving faster to a new fab technology than currently presented in their roadmap, which would allow them to come closer to 3Gââ¬â¢s low power requirements and allows them as well to boost the performance of their current generation of graphic chips without redesign.à The second threat comes from 3Gââ¬â¢s competitors launching radically new design concepts for their graphic cards, which are equal or better to 3Gââ¬â¢s design. This would remove 3Gââ¬â¢s current advantage entirely and 3G would potentially lose market share. The third threat not only for 3G but as well for 3Gââ¬â¢s competitors comes from Gaming Developers hitting a plateau with their next generation of games, which wonââ¬â¢t require anymore additional performance from graphic chips. The graphic chip market is largely driven by game developers putting graphic features in place that require substantial upgrades to older gaming platforms. One example of developers driving the graphics chip market was the release of Crysis by Crytek in 2007, which was not playable (with all graphic options enabled) even on high-end hardware available at the time. It took almost four years to have powerful enough graphic chips to be able to play the game with all options enabled, which gave the gamer an almost super realistic view. Market Objectives (launch Q3 2015) During the next year, 3G seeks to achieve the following objective using their marketing mix, including product, price, place (distribution), and promotion strategies. Successful launch of the 3G graphic chip/card on a global scale.
Saturday, January 11, 2020
Internet Security Essay
During the past ten years, the intensiveness and variety of electronic financial transactions have increased dramatically. The last decade was characterised by the rapid spreading of financial transactions involving the use of online and/ or remote mechanisms. E-services and e-transactions have become an essential element of the postmodern technological reality. As the number of online financial services increases, so do the number and variety of security threats. Small and large companies are equally vulnerable to the risks of security breaches in various types of financial transactions. These threats are becoming more and more complex and can take full advantage of the existing network and application vulnerabilities. The current state of technology provides numerous solutions to the existing and emerging security threats; however, the success of the proposed countermeasures will depend on how well businesses realise the seriousness of the major security threats and are prepared to invest additional resources in the development and implementation of the complex security strategies. Security threats and statistical information: The current state of literature A wealth of literature was written about the most serious security threats and the financial losses which security breaches and various types of system vulnerabilities cause to large and small businesses. The period between 2006 and 2008 was marked with the slight decrease in the number of financial frauds and security breaches in financial operations: U. S. Federal Trade Commission asserts that frauds as a percentage of online revenue in the United States and Canada has decreased slightly over the past few years and stabilised at 1. 4 percent in 2008 (Paget 2009). Meanwhile, the losses caused by security breaches and financial fraud display a marked increase ââ¬â in 2008 alone, the American market lost over $4 billion due to security breaches and financial frauds (Paget 2009). This is a 20 percent increase compared with 2008 (Paget 2009). Given the new trends in technology-related financial services and businessesââ¬â¢ striving to reduce their transaction costs, the development of new methods of e-payment and the use of open architectures will create new technological challenges for professionals and new fraud opportunities for hackers (Glaessner, Kellermann & McNevin 2002). The current state of literature provides the basic overview of the most serious security threats and proposes unique solutions businesses and individuals can take to address these threats. Financial transactions and security threats: what literature says The discussion of security threats in the context of e-financial transactions is one of the most popular topics in scholarly literature. Today, the rapid growth of wireless technology and the increasing role of wireless solutions in daily financial operations turn electronic security into the issue of the major public concern. Numerous authors tried to identify the most important security threats and to categorise them according to their severity and define the risks they pose to the stability of the financial e-flows. For example, Glaessner, Kellerman and McNevin (2002) state that the most frequent problems in the financial transactions arena include (a) insider abuse, (b) identity theft, (c) fraud, and (d) hacking. Cate (2005) concentrates on the discussion of identity-based fraud and suggests that account fraud, true identity fraud and synthetic identity fraud are the three most frequent forms of security threats in online financial transactions. In this context, Keller et al. (2005) seem the most objective and detailed in their observation of the existing security threats and financial transaction issues. According to Keller et al. (2005), the first generation of vulnerabilities started in the middle of the 1980s and took a form of boot viruses that affected computers and networks over the course of weeks; the next generation of viruses was spread by means of macros and e-mails. Denial-of-service attacks became prevalent in the middle of the 1990s and still present one of the basic problems in financial transactions domains (Keller et al. 2005). New types of threats include worms that affect individual and multiple computers and networks, and can easily self-replicate to infect large number of users (Keller et al. 2005). Trojans are used extensively to steal passwords or create back doors on computers, compromising network security (Keller et al. 2005). Keller et al. (2005) believe that the rapid expansion of spyware and malware are of particular concern to IT specialists and business people ââ¬â these programmes are downloaded into computers without usersââ¬â¢ knowledge or consent, typically run in the background, track personal information and execute damaging commands. Statistically, every PC contains approximately 27. 5 pieces of various malicious programmes (Keller et al. 2005). Fortunately, IT professionals actively work to develop effective countermeasures against the most sophisticated security threats. Financial transactions and security threats: Potential solutions Given that malware presents one of the most serious issues in the field of electronic financial transactions, numerous authors sought to offer their solutions to the problem. Vlachos and Spinellis (2007) provide an overview of the so-called Proactive malware identification system, which is based on the computer hygiene principles and demonstrates relative effectiveness in combating the risks of malware in financial transactions. Vlachos and Spinellis (2007) call the proposed algorithm PROMIS and base it on a peer-to-peer architecture; the choice of the P2P architecture is justified by the fact that P2P networks often become a propagation vector for various types of malicious software. The P2P architecture used by Vlachos and Spinellis (2007) contains two types of nodes, the member and the super nodes, and all nodes wishing to participate in the discussed P2P networks must authenticate themselves to the super nodes. PROMIS nodes generally fulfill the two basic types of operations ââ¬â a Notifier daemon regularly checks the log files on the security applications, while a Handler daemon analyses the incoming rates from other peers of the group and computes a global malicious activity rate (Vlachos & Spinellis 2007). The researchers use experimental design to prove that the performance of the P2P group improves proportionately to the number of P2P members. Extensive simulations suggest that PROMIS has a potential to protect the operating networks from known and unknown worm activity (Vlachos & Spinellis 2007). That during virus epidemics PROMIS exploits only specific vulnerabilities and leaves all other systems intact is considered as one of the basic systemââ¬â¢s benefits (Vlachos & Spinellis 2007). However, Vlachos and Spinellis (2007) are not the only professionals in the field of financial security. The fact is in that malware is often associated with denial-of-service attacks, which continue to plague the Internet. Malware substantially lower the bar for massive distributed denial-of-service attacks (Wang & Reiter 2008). Unfortunately, the current state of protection against DoS attacks is passive by nature and does not offer incentives to the owners of the Internet networks to protect their computers from the risks of malware (Wang & Reiter 2008). Wang and Reiter (2008) suggest that client puzzles be a potentially effective mechanism against DoS attacks in financial transactions. Client puzzles imply that ââ¬Å"a client solves a computational puzzle for requesting service before the server commits resources, thereby imposing a massive computational burden on adversaries bent on generating legitimate service requests to consume substantial server resourcesâ⬠(Wang & Reiter 2008). End-to-end puzzles imply that each client bidding for a financial service from the Internet server must present his solution to a puzzle; meanwhile, the server will allocate its limited resources to the bidders who solve the most difficult puzzles (Wang & Reiter 2008). In this system, an adversary cannot seize the financial and informational resources of a victim without committing its own resources first (Wang & Reiter 2008). These systems are effective in mitigating DoS threats at all application layers and can be readily interoperable with various legacy systems (Wang & Reiter 2008). These, however, are unique technological solutions to the existing security threats. Other authors offer less sophisticated but no less effective ideas of how to deal with security threats in financial transactions. According to Corzo et al. (2008), Automated Banking Certificates (ABC) can be readily used to timely identify unauthorised financial transactions. In the current system of electronic transactions, a financial transaction is considered authentic if it (a) is performed by an authorised entity; (b) has not been altered since the moment it was generated; and (c) is not a replay of another valid transaction (Corzo et al. 2008). Unfortunately, current banking systems can identify non-valid and fraudulent transactions only by means of audit after the transaction took place; as a result, there is an urgent need to develop a mechanism which will trace and identify fraudulent transactions before and while they are taking place (Corzo et al. 2008). An ABC is a data structure which allows monitoring the relationships between various transactions within one workflow (Corzo et al. 2008). A complete ABC allows tracing operations within workflows that go beyond the boundaries of one financial institution, as long as their tasks are related (Corzo et al. 008). The use of ABCââ¬â¢s in the current system of financial transactions proves that the task of identifying an unauthorised user is absolutely achievable. The use of network smart cards is another potential solution to the existing and emerging security threats. A network smart card ââ¬Å"is a smart card that is an Internet node and is accessible from the Internetâ⬠(Lu & Ali 2006). The Smart Card stores user information and provides this information only to the trusted client or server, as soon as the user authorises the service or transaction (Lu & Ali 2006). Smart cards are beneficial in the sense that they can create and maintain secure Internet connections with another Internet node, a web server or a web browser (Lu & Ali 2006). As long as the smart card sends selected user information directly to the service provider, this information does not go through the local computer and the threats of identity theft or similar security breaches becomes minimal (Lu & Ali 2006). Unfortunately, the effectiveness of these developments is yet to be discovered. Meanwhile, companies continue using more traditional solutions to their security issues. The current research suggests that AdAware and Spybot are the most common tools used by businesses to deal with such threats (Keller 2005). Moreover, despite the availability of effective tools that cost little or nothing at all, many businesses recognise that they do not use any spyware at all (Keller 2005). As a result, businesses either lose significant material resources or fail to timely identify the emerging threats. The case is particularly difficult with the so-called insider threats, when security threats are being born from within the business entity. For example, in 2008, the FBI alleged that a former Intel employee copied top secret documents that posed a threat to the future of the whole company and its business projects (Patel 2009). The cases when bank workers become the basic sources of the security threats and the initiators of the complex financial frauds are not rare. As a result, the success of financial transactions, their security, and the technical safety of consumers depends on how well companies realise the seriousness of the security threats and whether they are prepared to deal with them. The current state of technology provides numerous solutions to the security issues in financial transactions, and businesses can secure themselves from the potential risks and failures by using the proposed technological Internet solutions at low or no cost. Conclusion The past years have been marked with the rapid increase in electronic financial transactions. The use of online and/ or remote mechanisms in financial operations has already become an essential element of the daily business routine. Financial transactions are associated with numerous security threats, including identity fraud, insider abuse, and the use of malware and denial-of-service attacks to access and steal personal user information. The current state of literature provides numerous solutions and ideas, which businesses could use to address the existing and emerging security threats. Smart cards, automated banking certificates, and the use of client puzzles are just some out of many ways to address security threats in financial transactions. Unfortunately, businesses often neglect the existing technological opportunities and do not deem it necessary to use effective protection from the real security threats. As a result, the effectiveness and safety of financial transactions largely depends on how well businesses realise the seriousness of the discussed threats and are prepared to invest additional material resources in the development of effective security strategies and solutions.
Subscribe to:
Posts (Atom)