Wednesday, July 31, 2019

Proper Citation, Quotation and Referencing Using the Publication Manual of the Apa, 6th Edition

Running head: PROPER CITATION, QUOTATION AND REFERENCING Proper Citation, Quotation and Referencing Using The Publication Manual of the APA, 6th Edition Sample Paper Free Essays Biffy Wentworth University PROPER CITATION, QUOTATION AND REFERENCING Proper Citation, Quotation and Referencing Using The Publication Manual of the APA, 6th Edition Every student at some time in his or her college career will be called on to write a term paper for a course. Many students have never learned, or have not been taught, the proper form of citation, quotation and referencing using the Publication Manual of the APA. When students use citations incorrectly, they are running the risk that they are plagiarizing the author of the text that they are referencing in their paper. Whether these errors are intentional or unintentional, they are difficult to overcome. If the citations are incorrect, many of the facts stated and referenced in the paper may be incorrect as well. This will reflect poorly on the outcome of the student’s grade for the paper being reviewed. And that is unfortunate, since it is within the student’s grasp to review the Publication Manual of the APA for proper information regarding citations and uotations. In this way, the papers have the best opportunity to be well written, well cited and an interesting format for everyone involved in the process. The 6th Edition is the latest version of the manual of style, and it is a well written guide PROPER CITATION, QUOTATION AND REFERENCING for students to follow when completing their college level term papers and written assi gnments. Most professors at the college level, expect students to know how to use the Publication Manual of the APA to reference the citations and quotations used in the papers the students present on arious assigned topics. When the students are able to utilize the Publication Manual of the APA correctly, the papers are reflective of solid references and correct citations, and will most likely earn a higher grade than those that are submitted with incorrect citations and notations. Students who utilize the Publication Manual of the APA, 6th Edition are referencing the best source for correctly giving credit to the authors of the information used within their term papers and assignments. It is imperative that students give credit where credit is due, and that hey learn to follow the manual of style for giving credit to the copyrighted work of authors used in their term papers submitted for review and grading. Students will need to use primary sources when referencing work cited with in the body of the paper they are writing. For example, if a student is writing a paper on saving the polar bears, it will be important to get the best sources for the paper and to provide correct citations for those sources used. Before a student can cite a source, it is important to note that some sources are better than PROPER CITATION, QUOTATION AND REFERENCING others. Many students will use library sources or books as sources for their assignments. There are also a variety of sources available on the internet. It is critical that students understand what to use and not to use as references for internet sources. If a student wants to write a paper on saving the polar bears, using a Wikipedia or blog as a reference point is not the best idea. These sources are actually just the writer’s personal opinion, and will rarely be backed by credible information. Also, if the student goes to a website that has strong views for or against the topic, he or she may be using a biased site that is less than rofessional. The best websites to use for this type of project would be sites that are university based, have been peer reviewed, or are part of larger scientific studies on the polar bears and efforts to save their habitats. It is true that an encyclopedia source will have some information regarding polar bears, but it is better to review scientific st udies from accredited sources, such as National Geographic or other well known sites. Many references will be found, and if they are good sources, they can all be used since seven references are better than using only two for a term paper. PROPER CITATION, QUOTATION AND REFERENCING Once the student has reputable sources, and is developing the topic for the paper, it is time to think about the sources themselves. When students are using citations in a paper, it is crucial to give credit to the author. This may be a problem, since some sources do not have an author listed, are anonymous without an author noted. Other sources do not have page numbers, are missing the date the text was written, or are internet sources that appear to be professional but can’t be verified. At this point, the student will want to use the Publication Manual of the APA, th Edition to find the correct way to make the citation. The student will want to make the point he or she is making, in his or her own words, and use the source citation as back up to solidify that point. For example, if the student says that global warming is affecting the polar bear’s habitat, it is an empty statement without some professionally grounded proof o f the fact. Students can make a statement in their paper, and use their sources as proof of what they declare. These notations are put right in the body of the term paper to show that they haven’t just made up the facts, that they come from a reputable and rofessionally reviewed source. The student makes a statement, and should then follow it with a source within the body of the paper as proof. The scheme of events will look like this: student PROPER CITATION, QUOTATION AND REFERENCING statement, then proof (with citation in the body of the paper), statement, then proof. The reader will appreciate the proof as backup to the statements being made, and it makes the statements have more power to be backed up by professionals who agree with what is said. Citations can be paraphrased or quoted directly within the body of the paper. In fact, the Publication Manual of the APA states that when there are direct quotations, the information varies depending on whether using print or electric form. When citing print sources, give the â€Å"author, year, and page number in parentheses† (Publication Manual of the APA, 2010, p. 120). When students are paraphrasing, which means boiling down the phrases into their own words, the idea from the original source must also be given proper credit. This means that the student should correctly cite, and put quotations around the text that was used, so that the reader can go ack and find the citation and the context it was used in the original text. Students may also need to make a citation for secondary sources within the body of a term paper. A secondary source is when the author quotes someone else, and makes a citation within the text the student is quoting from. It is like a double quote, or a quote within a quote for the student interested in using the words that the a uthor got from someone else. If this is done, PROPER CITATION, QUOTATION AND REFERENCING the student needs to remember to put the secondary source in the reference listing too. A roperly cited secondary source would need to include the name of the original work, and the citation for the secondary source (Publication Manual of the APA, 2010, p. 247). The text citation will look like this: Gleason and McLurkin’s study (as cited in Tressel, Roger, 1990). If the student is interested in using quotation marks, special care needs to be taken to get it right. A double quotation mark should be used around direct quotes taken from a text. A single quotation mark is used â€Å"within double quotation marks to set off material that is in the original source† (Publication Manual of the APA, 2010, p. 119). The student can use a block of text if there are more than 40 words that are going to be used in the quote. For example, if the student wants to discuss a direct quote longer than 40 words, it would be separated like this, with no quotation marks necessary. The quotation should be indented five spaces from the left margin, in the same position as a new paragraph (Publication Manual of the APA, 2010, p. 117). It would be typed double space, just as the paper is typed, and should include the author’s last name and the publication date as an introduction to the quote. It should PROPER CITATION, QUOTATION AND REFERENCING nd with the page number noted so that the reader could find the original text if necessary. Johnson’s (1998) study on polar bears found the following: Polar bears live in the Northern Hemisphere only. They are great swimmers and they can outrun a man while on land. They have an average weight of one ton, and they eat several hundreds of pounds of fish a day . Polar bears have been known to kill off whole populations of indigenous seals in certain localities. They are known to hunt individually, preferring not to hunt in packs. They are so large that they often have been known to fall through solid ice platforms, which is never fatal. p. 114) This block of quoted text above would need to be cited at the end of the paper. The citation for this made up quote about polar bears may look like this citation below, and would be placed at the end of the paper under the References section. Johnson, Jeremy P. & Babush, Max R. (1998). The Complexities of Studying the Great Polar Bear in the Wild. Journal of Wildlife Sciences, 10(9), 114-127. Finally, if students are carful in their use of quoted materials and citations within their term papers, they will be good stewards of the words spoken by others that are used as reference. PROPER CITATION, QUOTATION AND REFERENCING In this way, their term papers will have valid ideas and thoughts backed up by facts from reputable sources. The reader will have a better understanding of the topic, and the subject matter will be clearer with correctly referenced works from experts in the fields they are writing about and studying. PROPER CITATION, QUOTATION AND REFERENCING References American Psychological Association. (2001). Publication Manual of the American Psychological Association, 5th Edition: Washington, DC: American Psychological Association.

Tuesday, July 30, 2019

Magnolia Therapeutic Solutions Case Study

Magnolia Therapeutic Solutions is a well known nonprofit that provides psychotherapy for clients with Post Traumatic Syndrome Disorder (PSTD). Magnolia contributed several hours of intensive help to the victims of 911. In return NYC gave the organization a large grant to help it meet the demands of PSTD services. Mary Stewart, the founder of the organization believed that the grant given in 2001 would be renewed in 2002 as well. Much to her surprise the grant was not renewed. The grant was already factored into her budget for 2002 and she had to go back and revise the budget. Mary was $500,000 short and in turn had to lay off one third of the employees. My Decision Versus the Boards The board of directors chose to approve the budget, based on Mary’s 2001 budget and financials. My decision would have been the complete opposite. The decision I would have made was to ask Mary for documents backing up the proposed budget. Mary made the budget based on her grants and fundraising from 2001. She did not take into consideration that the grant may not have been renewed. If she had made a lower budget, or even a back up budget, she would have had an alternative plan if NYC did not renew the grant. I made the decision I did because Mary’s 2002 budget was made up on monies she was not even sure that she would have. Mary even based the development department raising more money on a grant she was not even sure would be offered to the organization. Organizational infrastructure had a large affect on my decision to reject the budget. The policies and procedures that are put into place by an organization are done so to build accountability and adjust to internal and external requirements. According to Business Development Group, Inc (1999-2009), â€Å"Properly implemented policies and procedures prove to be very critical for achieving growth and profitability through the more efficient allocation and utilization of a company's limited resources† (para. 3). Causes Behind the Ultimate Problem There were several causes behind the ultimate problems Magnolia suffered. This seems to have stemmed from the lack of accountability and responsibility with the financial management. First, Mary had written a budget based on funds that were not guaranteed. She even based raising money for the organization on higher grants for 2002. Since the 2002 budget was written on false grants, this caused a huge problem and several staff members got laid off. This caused the organization to come to a stand still. This problem could have been solved a few different ways. Either by writing a budget with the grants and funds Mary knew 100% would be available. Or she could have written the budget with the NYC grant and had a back up budget incase it was not renewed. This way the board of directors could have seen either way Mary had a budget that could actually be carried out. Secondly, in 2001 the organization used the remainder of the grant to â€Å"increase other administrative services. † The surplus from the grants in 2001 should have been budgeted into the growing organization and the services provided, not administrative services. â€Å"The identification of a human service agency’s programs, the creation of a program structure, the assignment of program managers, and the designation of responsibility centers are the basic building blocks of financial management† (Martin, 2001, p. 16). Main Differences There are several differences in a non-profits inability to thrive and a for-profits inability to thrive. First, a non-profit can fail in acquiring â€Å"revenue† by not getting enough grants and not having enough staff. For-profits fail to get revenue by not making enough profit. Secondly, non-profits accrue expenses through program supplies, staffing, bills, and rental space. A for-profit accrues expenses through production, staffing, bills, paying out shareholders and owners, and getting the necessary supplies to keep up with newer products/technology. Lastly, non-profits do not have the resources to pay employees/volunteers for training or higher education. This could result in a nonprofit’s inability to thrive. Training key employees is usually part of most for-profit organizations. Money is typically not an issue and organizations that make a profit know if they put money into an employees training, the end results will come back to them. Risk Management â€Å"Risk management can be defined as the identification, planned control, and reduction of risks to a human service agency† (Martin, 2001, p. 187). Magnolia’s deficit happened because Mary and the organization did not have any risk management set in place. Had the organization had a risk management plan, Mary would have known better than planning a budget with unknown funds. â€Å"A formalized risk management program is one of the few ways a human service agency can reduce service delivery costs without cutting either staff positions or operating budgets† (Martin, 2001, p. 187). If Magnolia had used the essential tasks of risk management it may have been able to find a way to keep employees or get funding elsewhere. The five tasks are risk identification, risk evaluation, risk control, risk funding, and administration. These tasks are a key component in helping nonprofits thrive. Had Magnolia identified problems or issues that could potentially happen with the budget and shortfalls it could have minimized the outcome. Conclusion Because of Mary Stewart Magnolia had become a nonprofit organization that was helping in such a needed area, PSTD. Magnolia continued to thrive and receive many awards for the services performed. The organization received a large 1-year grant from NYC to help 911 PSTD victims. When it came time for Mary to write the budget for 2002 she included the 2001 1-year grant from NYC. In the end Mary’s budget caused a deficit in the organization and one third of the employees had to be laid off. If there had been a better risk management plan in order this could have been prevented. Also, if Mary had created a budget that was based on grants she knew they would be receiving the organization could have continued providing the excellent services at the same rate.

Taxation Tutorial 2011/12

CC3155 Taxation Tutorial 1 (2009/10 Semester 1) Suggested Answers to Tutorial Questions (Lecture 1) Overview of the Hong Kong Tax System and Administration A) Quiz 1. 2. 3. 4. 5. 6. 7. 8. F T T T F T E The chargeable person a) Salaries tax: person who has income from employment, office or pension deriving from HK, b) Property tax: owner of land/buildings in HK, and c) Profits tax: person who carries on a trade, profession or business in HK. 9. April 1st, March 31st, April 1st 2008, March 31st 2009. 0. (a & b) 2007/08; (c & d) 2008/09. B) Essay Questions 1. The characteristics (features) of Hong Kong tax system are: †¢ Territorial Source Concept †¢ Schedular tax system †¢ Direct assessment †¢ Limitation to the standard rate †¢ Low tax rates †¢ No capital gains tax †¢ No tax on dividend income 2. The following bodies are involved in the administration of income taxes in Hong Kong: †¢ Inland Revenue Department (IRD) †¢ Board of Inland Revenue (BIR) †¢ Board of Review (BoR) 3.The source of Hong Kong tax law comprises: †¢ Statute law †¢ Case law 1 CC3155 Taxation ______________ 4. Tutorial Answer 1 (2008/09 Semester 1) Composition BIR: consists the Financial Secretary and 4 other members, appointed by the Chief Executive. The CIR is one of the members and a DCIR is the secretary of the BIR. BoR: consists of a chairman and a number of deputy chairman and not more than 150 other members, all of whom are appointed by the Chief Executive (s65). Functions BIR: To make rules called Inland Revenue Rules (IRR) †¢ To specify the forms (e. g. composite tax return) which are necessary for carrying out the provisions of the IRO †¢ To prescribe the procedure to be followed when appealing to the BoR with effect from Jun13,1997 BoR: †¢ To hear taxpayers’ appeals against the CIR’s or DCIR’s determination, s82A additional tax and penalty †¢ To approve CIR’s application for the taxpayer to file a statement of assets and liabilities under s51A(1). 2

Monday, July 29, 2019

Value Innovation at AMD Essay Example | Topics and Well Written Essays - 750 words - 1

Value Innovation at AMD - Essay Example As of today, 99% of computers operate using 32-bits. As technology improves and software applications become more demanding there will be a transition to 64 bits. The K8 processor was a complete revamp of the x86 architecture for 64-bit processing, giving AMD a leadership position. Industry acceptance of the AMD64 standard has forced Intel to enter into an agreement with AMD to use the AMD64 standard on their own 64-bit based EMT64 processors. In their essay â€Å"Strategy, Value Innovation and the Knowledge Economy† Kim and Mauborgne characterize value innovators as ‘those who make their competition irrelevant by providing buyers with a quantum leap in value’. This description fits perfectly with AMD’s strategy for the K8. Until the release of the K7, AMD was a company that focused ‘on matching or beating’ Intel. They chose a ‘distinctive cost’ position and innovation was considered exogenous with cost and product performance trad eoffs. The new economics theory, which heralds the arrival of the knowledge economy, claims that ‘innovations are no longer exogenous and can be created with the ideas and knowledge within a system’. Again, a perfect match to AMD’s strategy of first giving the NexGen team their own building to develop the K6 and subsequently roping in a ‘world-class-enterprise-level processor design team’ for the K8. Admitted that Intel’s stumbles with their processor design and production yield have given AMD an opportunity window.

Sunday, July 28, 2019

Starbucks Coffee Company Research Paper Example | Topics and Well Written Essays - 1000 words

Starbucks Coffee Company - Research Paper Example This is a persistent human behaviour, whether there was Starbucks or not. Some people go to bars, but coffee shops provide a great alternative. The fact that Starbucks took this behaviour and institutionalized it was a strategic success. b. Development of long-term buyer-seller relationships (Griffin, 2011: 498) Starbuck’s aim was ‘to create a relevant, emotional and intimate experience’ in order to build trust with the consumer (Jain, 2009: 3). By creating a unique relationship that cannot be matched by having just another cup of coffee in another coffee shop, customers seek to relive the pleasant personal experience by returning repeated to the same brand. c. International marketing mix (Griffin, 2011: 498) Schultz, who conceptualized Starbucks’ renowned business model, developed his concept from observing Italian coffee bars and was impressed that each had its own character (Jain, 2009, p.1). Starbucks has grasped the universality of appeal in what was a n Italian custom, and replicated this in all the countries the company was able to successfully market to. d. Value creation in its operations process (Griffin, 2011: 347) In the case, it was said that Americans will not pay a high price for coffee (Jain, 2009: 2), but Starbucks was able to overcome that, because customers found value in the store ambience and the service, which actually comprise its operations process. Cleanliness, a relaxing atmosphere, prompt and courteous service are as much a part of the product as the coffee itself, for which reason people find value in it to pay a high price for it. 2. SWOT Analysis in point form. Strengths Ability to accommodate customers’ requests (‘just say yes’): Enhanced customer satisfaction and brand loyalty. Store ambience and design: Created a comfortable atmosphere that encouraged repeated and long-term seller-buyer relationship that reinforced brand loyalty. Strong employee culture: Generous benefits keep employ ees engaged and high employee morale encourages innovativeness and pleasant staff-customer interaction. Weaknesses Too many stores located close to each other tended to cause stores to ‘cannibalize’ each other’s customers The competitive advantage is essentially replicable. Unlike manufacturing which can patent its product design or manufacturing process, what Starbucks offers – coffee blends, ambience, service – can be replicated by others, as it already has. Opportunities Expansion to international markets; emerging market such as China and India, allows the firm alternatives to its already saturated market. Innovations in coffee preparation could further be explored, such as the Frappuccino developed by its staff. Threats Strong competition has posed challenges not only for coffee but tea and other products Economic weakness discourages personal consumption spending. Environmental and anti-globalization activism targets multinationals like Starbu cks. 3. Compensation provided baristas Starbucks’s compensation package was described as generous because it included health benefits for both full-time and part-time employees who rendered 20 hours of service per week, and also provided them stock options which is a gain-sharing plan (Griffin, 2011: 258). The advantages to the company were enhanced

Saturday, July 27, 2019

Anything Essay Example | Topics and Well Written Essays - 500 words - 3

Anything - Essay Example Such is the scenario currently where businesses have concentrated on personal gains at the expense of their customers’ service delivery. The Wall Street Greed tendency has been captured clearly by a scholar named Michael Douglas (Heesun, Page 10-45). Even though Douglas asserts that greed sometimes can benefit businesses whenever they serve their customers, he concurs that the very same greed only benefits a few individuals but only to a certain extent. The general argument by most Wall Street publishers is that if a business’s profits are highly based on the prosperity of its customers then the general assumption is that whatever is good for the customers must be good for the society. Such assertions form the basis of Wall Street Greed currently. Critics further argue that the Wall Street Greed, as exhibited today, is all about Wall Street itself (Heesun, Page 5-35). The interest of Wall Street has been totally separated from the interest of the society at large. Ethics forms the basis of any economic implications for the decisions made by businesses within the economy. There has been a shift in argument in the sense that initially assertions were that for any economic meltdown or any bailout involving larger amounts of the taxpayers’ money does not necessarily lie with the banks but rather it now revolves around the ethics and values embraced by the businesses within the economy. The Wall Street case has clearly shown that there is a major breakdown between the business activities and priorities of most organizations and the ethical values that should be attached to them (Heesun, Page 15-85). There has been a continuous disconnect between ethics and economic freedom. In most cases, individual perception on the available opportunities has significantly influenced the business decisions by most organizations. This has resulted in the individualistic

Friday, July 26, 2019

Civil Rights Movement and Marine Force Recon in Vietnam Research Paper

Civil Rights Movement and Marine Force Recon in Vietnam - Research Paper Example Most of them joined the marine forces at eighteen. Into the training, they carried along all the prejudices they had experienced in their earlier life. In such critical times, training played a great role in transforming these individuals into a unified marine force reconnaissance. As this essay brings out, racial relations in the marine were not good at the time and many African Americans had to face these setbacks. 1962 was the year when the then American president granted equal opportunity to people from all races to join the American forces. The African Americans were facing challenges because of their color (Shaw and Donelly 70). In many sectors of the marine forces, discrimination existed and the status of African Americans was bad. Race was a key barrier for them and they lacked easy access to opportunities compared to the whites. These are the reasons why the president saw the essence of a committee that would investigate into the issue. Increased segregation existed in the marine forces. The investigation of the matter was taking place in the 1960’s when a high racial tension existed in America (Shaw and Donelly 82). At the same time, the situation in Vietnam was worsening. At the time, joining the marine force was voluntary and individuals taking up the responsibility understood the risk involved. Due to the rising racial tension, civil rights movements rose up to champion for t he rights of black marines. The African American marines lacked equal opportunities in promotions, job assignments, and military justice. In addition, it was evident that the organization and involving of blacks in public events had a lot of racial influence. There were different camps of the marines in different regions. The camps at Vietnam reported incidences that resulted from the existing racial indifferences. The white-black relations were falling apart in the 1960’s. The blacks who had been the subject of discrimination for a long time now stood up in

Thursday, July 25, 2019

CMT3321 Coursework 1 Essay Example | Topics and Well Written Essays - 2500 words

CMT3321 Coursework 1 - Essay Example The game was designed and tested with an interactive technology and a prototype mobile. Finally, the paper confirms the hypothesis dealing with technology rich modeling because the children’s feedback dealt with the realized interaction, and aspects of social and play interactions were put in real context. Methodological studies in children and interaction fields have concentrated on how children are involved in the processes of design and ways that children can offer input on interaction designs. Prominent illustrations include the participatory mechanisms to design, early design methodologies, Mission from Mars, or mechanisms that involve children during evaluation of interactive products. Previous research studies have put less attention to the tools and methods of prototyping. This paper also considers the position in the children’s game design that supports interactions that are embodied, mostly those played by children outdoors together. The papers also summarize methodological techniques in the wider Human Computer Interaction field, explain the literature of game designs approaches the topic and specifies some challenges of the present design approaches when the game is designed. A crucial theme in Human Computer Interaction methodology is concerned with prototype fidelity. The term prototype is ambiguous at its best; ranging from paper prototype, functioning, sketches, and interactive products. Prototype is used in many phases in the process of design and in various roles; for designers to look into the design space as one of the communication instrument to convey information to other stakeholders and as an analysis tool in testing the concept with users. Paper prototyping is one way to explore the space of designs without incurring design costs and to come up with early user feedback on certain aspects of action design (Lewis & Bedson, 2009). Those who support paper prototyping have argued that the software

Wednesday, July 24, 2019

Project management for a building conversion Essay

Project management for a building conversion - Essay Example It has been selected to be a Grade B office building. This paper seeks to present key activities involved in conversion to Grade B office integrated in the project management perspective. We will see how activities will be schedule, resource management, and quality assurance among other fundamental principles surrounding any project. PREDECESSOR ACTIVITIES The first crucial step is to seek permission from the local authority in form of an application for change of user. This will need the approval of the local authority’s plans for the area. (IEEE, 2005).That is, whether the area is official recognized as an industrial area only or a residential area. Depending on the prevailing by-laws, the approval may be issued or not. Afterwards, we can proceed to the preliminary design of the office. That is, the floor layout of the offices required among other things. These specifications will be tailored to the client in Hong Kong. A detailed assessment of the existing building will be done to check integrity of the current building, the kind of foundation, parts of the building that are intact or need re-designing to fit in the preliminary design. ... Once the building permit is issued, the conversion works can officially commence with other revisions being made on the prior design if necessary but still approval from relevant authorities is mandatory. This is how this conversion will generally go. The detailed procedures will be modelled within the Microsoft Project 2007. KEY AREAS IN PROJECT MANAGEMENT In any project, whether product manufacturing, or service delivery, there are crucial aspects of activities that need to be addressed should we desire a successful project. These factors are necessary for the project manager. How he or she addresses these issues will show his capability and skills and project is no exception. Besides time, there are various key areas in project management (PMBOK, 2008) and these include cost management, project quality management, human resource management, project scope management, Risk management These are discussed as follows 1. Time Management Time management ensures that the project is comple ted as planned. This has an impact costs and effectiveness in running the project. This sector covers the processes required to ensure timely completion of the project (Dennis 2007).The sequencing aspects is crucial. Certain activities can only commence after predecessor activities are completed. For this project we applied the fundamental activities involved in the conversion of an industrial building to an office building. We will also cover the critical path. This is basically the path that should not be delayed as it will determine the overall project conclusion time. Milestones will help us monitor project course. From the MS Project we came

Asian American History Essay Example | Topics and Well Written Essays - 1250 words

Asian American History - Essay Example The paper explores Southeast Asian migration to the US in the wake of the Southeast Asian crisis and their subsequent experiences in the alien land and how they coped up in a given situation. Early Migrations Takaki dates Asian migration back to 1835 when a sugar mill owner began his sugar business in Hawaii. Local workers were not efficient enough to carry on his sugar mill operations. When he replaced them with Chinese workers, he found them more efficient. Perhaps, that was the first time when Chinese or Asian workers got its due recognition so much so that during laying of transcontinental railroads in 1834, it was decided to employ Chinese workers. By 1867, there were more than twelve thousand Chinese workers employed at the Central Pacific Railroad Soon stories of Hawaii were reaching to other shores. Between 1903 and 1920, in their bid to escape from the clutches of Japanese, more than eight thousand Koreans migrated to the US. The migration to the U.S. from other Asian countr ies such as Korea, Philippines, and India continued unabated (Takaki 21, 53). The Global Cold War and Hot Wars of Southeast Asia The end of World War II marked a new beginning of Asian migrations in the US. The global cold war between the Soviet Union and the US intensified after the end of World War II and Asia became a battleground in a process to leave an imprint on many underdeveloped and poor Asian countries by the two diametrically opposite economic and political ideologies – namely the USSR and the US. Cambodia which was a French colony until 1953 had a major political upheaval thereafter. Chandler mentions the radical thinking of Pol Pot: â€Å"We all carry vestiges of our old class character, deep-rooted for generations† (44). He believed in destroying these things in order to achieve socialism. The fight between Lon Nol's Khmer Republic supported by the U.S. and the Khmer Rouge supported by communists from North Vietnam brought an extraordinary turmoil within the country. Communism was exported to Cambodia via Vietnam during the time when both were under French rule. The Civil war in 1970-75 took the toll of more than 500,000 people and displaced more than three million people from its place. Khmer Rouge's ideology had several facets. As Chan puts it, "Fearing pollution or contamination, they savagely went about eradicating all those whom they deemed impure" ("Cambodia’s Darkest Hour" 14). Khmer Rouge believed more in the concept of race overthrowing the concept of class. It was neither a peasant revolution nor a revolution meant for working class. That is why Khmer Rouge began evacuating Phnom Penh on the same day after capturing it. In a most pathetic incident, the patients from the largest civilian hospital from the Phnom Penh were evacuated first. In a few days, the city's entire population was asked to move on the plea that Americans might bomb. In a bizarre and well-thought out move, approximately 2.5 million people were as ked to leave their houses and places. Some of the Khmer leaders, such as Hou Yuon who opposed the evacuation, were removed from the scene. The citizens were completely baffled and wandering without shelter and food. Thousands of them died of illness, thirst, and starvation. The former military officers and government officials who were called to take specific instructions never returned.

Tuesday, July 23, 2019

Case study 4 Assignment Example | Topics and Well Written Essays - 250 words

Case study 4 - Assignment Example cool, fun and objects that can be used for reading different materials, Apple was able to appeal to a segment of consumers who were ready to spend lots of money for such features. The three most important factors of success in Apple are investment on innovation, strategic market segmentation and emphasis on customer satisfaction. First, Apple spends 2.5 billion on developers to create a range of applications for is products. Second, Apple focuses on one section of the market by fulfilling their needs and requirements, and in turn they do not hesitate to spend on the products. Last, Apple practices excellent customer service, in addition to a variety of quality products and services, which satisfies needs of customers and earns their loyalty. Steve Jobs played a crucial role in steering the company to heights of success, and the company can respond by upholding his strategies. I think the company will still be successful because the growth and prosperity lies not only on leadership, but also on strategic ventures, which Steve Jobs left behind. Therefore, I would be willing to invest in Apple because the company still maintains her strategic decisions and market ventures. Microsoft was not able to achieve success like Apple because of failure to design attractive products, focus on the general market instead of creating differentiation with a profitable segment, lack of strategic leadership and decision making, poor innovation and customer satisfaction and finally, lack of product

Monday, July 22, 2019

Breakfast cereal market Global trends Essay Example for Free

Breakfast cereal market Global trends Essay Product segmentation The breakfast cereal market consists of two types of products: breakfast cereal and ready-to-eat breakfast cereals. For the year 2008, the ready-to-eat cereals dominated the market with about 88. 1% of the market share while hot cereals accounted for the remaining 11. 9% of the market. The corresponding figure for the year 2006 was 91% for ready-to-eat cereals (Marketline, 2009, p. 4). Following is the convenience market segment information for the breakfast cereal information. Fig – 1Consumer Market Segment Information (Costcutter, 2008, p.2) Following are the global market share of each of the following product segment. Fig – 2Market share by different product segments (Costcutter, 2008, p. 2) Market Value The global market for the breakfast cereal industry had a value of $ 22,209 billion which meant a growth rate percentage of 2. 9% from the last year. The compound annual growth rate for the last five years i. e. from 2004-2008 was also 2. 9%. The largest geographical market for the breakfast cereal industry is America which accounts for 63. 2% of the total market value (Marketline, 2009, p. 4). The complete market growth is mostly as a result of growth in premium products rather than the overall volume. As mentioned earlier the target market for breakfast cereal as baby boomers and children. Of this the children’s market accounts for as much as 42% f the entire ready-to-eat breakfast cereal market. The biggest selling children’s brand for ready-to-eat breakfast cereal is Coco Pops. This brand alone was responsible for as much as 43 million pounds of the total 501. 9 million pounds of sales in UK in the year 2007. This is astonishing because the market has been rife with warnings from food associations regarding salt and sugar content in breakfast cereals (Muddy Cook, 2008, p. 2). In terms of value, the industry has growth by 15. 7% between 2004 and 2008 with the figures being particularly strong for the year 2007. The figure below shows the trends for global breakfast cereal trade by value. Fig – 3Global Breakfast cereal trade, by value in US $ billions (USDA, 2005, p. 5) In addition to this, the figure below shows the increase in global export market for breakfast cereal. As can be seen an increase in the rise of both private label as well as foreign competition has hampered in the increase of US share in the exports. Fig – 4 Global export market for breakfast cereal (USDA, 2005, p. 6) United States is the third largest importer of breakfast cereal. This fact is also a cause of concern for the domestic manufacturers who contribute for the maximum market sales in the world. The import value is shown in the figure below according to which the market showed an increase of 30% over the 1998 figure. Canada and France remained the top importers followed by United States. The countries following this were United Kingdom with an import value of $126 million and Germany with an import value of $114 million. Fig – 5 Top global import markets for breakfast cereals (USDA, 2005, p. 8) The breakfast cereal market desperately needs new markets. The figure below shows the requirements for a few such markets. Fig – 6 Import demand for Breakfast cereal in select markets (USDA, 2005, p. 17) Market Volume The global market volume for the breakfast cereal industry was 3,536. 8 million Kg which was a rise of 2. 2% over the last year. The compound annual growth rate for the last five years i. e. from 2004-2008 was also 2. 2%. This figure is expected to reach a value of 3914. 1 million Kg in the year 2013 which would mean an increase in volume by about 10. 7% since 2008 (Marketline, 2009, p. 4). The figure below shows the trends for global breakfast cereal trade by volume. Fig – 7 Global Breakfast cereal trade, by volume (USDA, 2005, p. 6) Distribution The main distribution channels for the breakfast cereal industry are the supermarkets/ hypermarkets that account for 79% of the market’s value distributed. This is followed by independent retailers who account for 8. 4% of the market’s value distributed (Marketline, 2009, p. 4). Competitive environment The figure below shows the percentage share of the major breakfast cereal companies by volume for the year 2007. As can been seen from the figure, Kellogg dominates the market with 36. 4 % of the market share. Another interesting aspect is that the industry is entirely dominated by branded products with the three largest companies i. e. Kellogg, General Mills and Kraft Foods, accounting for 63. 3% of the total market value by volume (Marketline, 2009, p.4). In fact the top 20 brands in breakfast cereal market account for as much as 70% of the total sales. The household penetration of cereals is as much as 97%. Fig – 8 % share by volume of global breakfast cereal markets (Marketline, 2009, p. 4) In addition to these three companies some other popular companies of breakfast cereal are Quaker, Nabisco, Sunshine, Kashi, Health Valley, Malt-o-Meal, Mckee, Ralston, Unilever, Frito-Lay in North America, Cargill Inc. Tyson Foods, mars Inc. ConAgra foods Inc. , Weetabix and Cereal Partners (an alliance between Nestle and General Mills). Entry Deterrents The size f the breakfast cereal industry as per both the profits as well as the volume is immense as can be seen from the statistics above. The growth rate of the industry too has been fairly decent. The industry has been in existence for about 100 years, however save for the early entrants and the entry of the private-labeled brands, the industry has been relatively clutter free. In fact according to the marker share figures also it can be seen that not many companies could afford to enter the industry and make any significant impact. This is a rather unusual situation and the reason for the market deterrents can be seen from in the figure below. Fig – 9 Factors influencing the likelihood of new entrants in the Global Breakfast cereals market (Marketline, 2009, p. 3) Looking at the figure it becomes clear that the market entry is favorable for those companies who wish to diversify their operations in the breakfast cereal market. While the entry can definitely be made by an entirely new company it may encounter problems.

Sunday, July 21, 2019

Report On The Airasia Tourism Essay

Report On The Airasia Tourism Essay 1.0 Executive summary The current situation of Air market is not steady and could satisfy needs of customers, more and more negative news appear to show depression of AirAsia. AirAsia is a Malaysian-based company which owns airlines in Asia with low cost and provide 400 flight lines over 25 countries, the AirAsia was first founded in 1993 and operated in 1998 (Sen Ng, 2008). With almost 20-year history, AirAsia could be regarded as the most successful company in Asia. Brief analysis of AirAsia will be given in the report and further information will be provided to further support assistance for readers to know about AirAsia. 2.0 Introduction The air market is struggling at present, more competitors are involved in the battle and the competence seems intense than ever before, higher price of energy and lower price of flights drive most of airplane companies loss profit and reduce revenue (Kernchen, 2007). Airline market in Europe, America especially in Asia is developing in opposite direction, with effects of financial crisis, less customers go out to travel by plane; economy is also influenced by crisis which drives less businessmen go aboard to invest by plane (Shaw, 2011). The airline companies around world are all affected by crisis, decrease the revenue. At the same time, the speed of development of technology is beyond imagination of people, most airline companies purchase new planes from countries expert in measuring planes such as America, China and Russia, which increase cost and make more difficult to balance finance. The objective of the report is to supply information of AirAsia for readers and assist them to better understand the factors affecting AirAsia in the future, potential threats AirAsia will face with. The report will state an analysis of AirAsia with PESTEL method, from various aspects to show the key external factors affect the development of AirAsia. Then the second part will discuss how the Market Liberalization in the Asia-Pacific assisted AirAsia growth in the region. The third part of report will implement data to show a SWOT analysis of AirAsia and Porters five forces to further supply information of AirAsia. With SWOT analysis and Porters five forces, potential challenges will be given which AirAsia will face in the future. Finally a conclusion will be referred to. 3.0 External factors affect AirAsia Many factors will affect the development of an industry, which could easily divided into external and internal factors. To drive organizations progress better in the changeable world, to analyze and know what potential factors will affect organizations is essential. Eternal factors are easy to handle and organizations could prepare in advance before problems appear, especially for countries in Asia, most countries are at developing groups, external factors such as politics, economy or climates will affect organizations development in long-term (Kohama, 2003). Airline industry is easy affected by those external factors, so the following content will give a PESTEL analysis to help readers know what will affect AirAsia. 3.1 PESTEL analysis PESTEL analysis is used by managers as one of the most essential frameworks to study the external factors that affect development of organizations, PESTEL stands for Political, economic, social, technological, environmental and legal ( William Green, 1997). The following content will focus on situation in Asia in the view of PESTEL analysis. Political factors: Asia is a mixed region compared with other areas, there are various countries with different government systems, besides, Asia has a long history, however, most Asian seem to have the similar cultural backgrounds, the policies each country hold are totally different, and the independence movements are continues recently ( Zhang, 2003). AirAsia owns many subsidiaries in many Asian countries, since cold war, with intense relationship between China and Japan, Taiwan, continues conflict between South Korea and North Korea, the flights of AirAsia are affected by these political factors, the relationships among Asian countries are difficult to fortell and the politics in each country seem unsteady ( Yahuda,2005). Economic factors: The economic growth in Asia increased faster since 1945, especially China and Japan, with independent and away from wars, these two countries develop beyond imagination. However, influenced by financial crisis, most Asian countries are struggling economic depression, the inflation rate raise, exchange rates change daily (Adams, 2006). All these unsteady factors drive less export and less people spend money on tourism which directly affects the revenue of AirAsia. The profit decline with less customers and less export for AirAsia. Social factors: In Asia, tourism is not thought about as usual as Europeans, which means, under the effects of cultural background, Asians spend less money on tourism. However, Asians are sensitive to change of price, especially when they desire to go out by plane, lower price will attract them, AirAsia holds the advantages of lower price. With more branches set up in Asian countries, AirAsia will appeal more Asian customers. The population in Asia increase fast, changeable population in Asia drive more young people change locations to live, China and India, these two biggest countries in Asia means change of demand for AirAsia (Sanderson Tan, 1995) Technological factors: Technology plays important role in the airline industry especially for AirAsia which implement the low cost carriers. With more and more experts appearance in Asia, competitors in the field of airline are able to invent new things to reduce cost to win in the battle, if AirAsia wants win finally, the key is to invite more professional experts to join them. Innovation of competitors affects revenue of AirAsia, too. New airplanes with high technology would appeal to customers to change purchasing habits. Environmental factors: Climate is a key factor which influences the revenue of AirAsia, however, natural factors are not planned or changed by human beings. Most of Asia countries realize the importance of protection for environment, with globalization and development of technology, the pollution raise and the living surroundings are damaged. Now, the slogan of energy saving and emission reduction is popular in China, governments request most organizations use clear energy to produce, especially for airline companies, lower cost but less pollutions to environment, fuel or gas must conform to law of countries. Legal factors: Taxation requested for customers will be increase by most countries, which will affect the revenue of AirAsia. Facing more taxation for tickets, customers will feel uncomfortable and ask to reduce the price of tickets. Tariff will change according to current economic situation of the world, especially for Asian countries who export goods with lower cost to compete with domestic industry. Environmental protection regulations will change to request AirAsia to use clear fuel or gas which increase cost and reduce revenue. Laws of export and import will also affect AirAsia, all these depend on policies of Asian countries and economy of the world. 3.2 SWOT analysis After stating key external factors which will affect the revenue of AirAsia, the company also needs tools to analyze under these factors, what the development in the future, the SWOT analysis pursues an integrated strategic position by providing internal information to conclude the strengths, weakness and external information of opportunities and threats ( Bohm, 2009). The SWOT analysis of AirAsia can be seen below: Figure 1: Strengths: Low cost compared with other competitors, the core value of AirAsia is low cost in Asia. Effective management, correct strategic positions, target customers. Simple models implemented in AirAsia, exploring for long time to find out suitable developing models. Secure time and high quality of service attract more customers. Expansion with more than five countries in Asia, multi-skilled employees in company means efficient workforce. Continues innovation, experts teams to invent new type of airplanes. Various airlines for customers, proving more choices for customers. Weakness: Lower cost means lower salary for employees, could not appeal skilled employees. Government regulation and policies often change towards airports, higher taxation for customers and tariff for export and import. More needs of customers, higher compensation asked by passengers increase cost of the company. New entrants in this field, more intense competition in Asia. Increasing price of gas and fuel, less profit for AirAsia. Brand is vital for market, airplanes only with service worse than competitors who ask for higher price. Opportunities: Airlines from Asia to other countries should be provided. Different model but still keep the principle of lower cost carriers. Increase quality of customer service and try to set up a full-service with low fare. Aggressive competition will drive air market prospers for new routes. Higher price of fuel will push competitors out of air industry. Threats: Full service increase cost of AirAsia. Entrants of air industry with lower cost. Accident, change of climate and disaster will influence confidence of consumers. Close relationship among each system in AirAis will limit development of company. Higher salary asked by skilled employees, increasing cost of labor. Government regulations and intense relationship among specific countries, unsteady politics in Asia. (Lim, 2012) 3.3 Porters Five Forces Porters five forces are used by managers to predict potential threats from competitors which will provide a model for managers to better understand the industry (Roy, 2011). After stating PESTEL and SWOT analysis of AirAsia, further information related with competitors will be provided in the following part. The diagram of Porters five forces could better help readers to know more about potential threats for AirAsia. Figure 2 ¼Ã… ¡ Rivalry Strong competitors from China and Singapore with the similar motto everyone can afford the air ticket as AirAsia. Examples such as Spring Airlines in China and Value Air, Tiger Airways in Singapore are strong competitors for AirAsia. Substitutes In the field of air industry, the substitutes are not essential threats for AirAsia. Cars and trains are main substitutes, however, trains are chosen by passages only in China and India, with lower price and safe condition, not affected by change of climate, trains are influence air industry. Cars can be regarded as threats for AirAsia in limited conditions, only for customers who like driving and do not care time. Threats of new entrants Asian air market is a huge market with potential for most companies, not only for Asian air companies, new entrants from Europe and America also involve in intense competition with AirAsia. New entrants will change the supply and demand, affecting AirAsia market share. New airplanes and special service will attract loyal customers from AirAsia to new entrants. Bargaining power of buyers. Consumers have more choices facing large numbers of air companies; they will request higher quality of service and be strict with the take off time and arrival time. They will compare prices of competitors with AirAsia, complaining lower price of other airlines to reduce revenue of AirAsia. Bargaining power of suppliers Suppliers concentrated, fuel or gas suppliers are mainly in East Asia, and the price of fuel and gas are changing without any bargaining of air companies. Fewer suppliers for fuel and aircrafts mean higher price they could ask for. The growth of AirAsia depends on many factors; the report has stated key external factors which will influence revenue of AirAsia, internal factors of strengths and weakness of AirAsia. 4.0 Conclusion In conclusion, the report has stated three analysis of AirAsia in order to supply enough information for readers to understand the strategic positions and models the company implement. With PESTEL analysis, key external factors influencing AirAsia are mentioning and SWOT analysis to provide AirAsia strengths and weakness, AirAsia should keep the core value and supply better service with low cost carriers in long term. Porters five forces analysis also shows potential threats for AirAsia should notice in the future, with new entrants and existing competitors, AirAsia should change management strategy and appeal to more skilled staff.

Conventionally Broadcast Encryption (BE) Schemes

Conventionally Broadcast Encryption (BE) Schemes ABSTRACT Conventionally broadcast encryption (BE) schemes enable a sender to securely broadcast to any subset of members, however it requires a trusted party to circulate decryption keys. Group key agreement protocols authorize a group of members to negotiate a common encryption passkey through spread out networks so that only the batch members can decode the ciphertextsviz encrypted under the shared encryption key, but a sender cannot debar any particular member from decrypting the ciphertexts. This project infers two notions with a hybrid primitive referred to as Auxiliary Propagate encoding. In this new primitive, a common public encoding key is agreed by group members who hold a individual decoding passkey. A sender viewing the public group encoding passkey can restrict the decoding to a subdivision of members of his preference. The scheme is proven to be fully collusion-resistant under the decision n-Bilinear Diffie-Hellman Exponentiation presumption in the standard imitation. Of unaided interest, the project presents a new BE scheme that is aggregatable. The cumulative property is shown to be useful to construct advanced protocols. Keywords-Multicast encoding, Auxiliary Propagate Encoding, Provable Security, Group key agreement INTRODUCTION INTRODUCTION Along the rapidly leading and prevalent communion technologies, there is an increasing bid for handy cryptographic primeval to protect group conversations and ciphering platforms. These platforms include instant-messaging tools, collaborative ciphering, mobile ad hoc networks and communal net. These new applications call for cryptographic primitives allowing a sender to soundly encrypt to any subdivision of the users of the services without relying on a fully credible dealer. Broadcast encoding is a well-studied primeval intended for secure group-oriented communications. It allows a sender to soundly broadcast to any subdivision of the group members Nonetheless, a BE system heavily relies on a fully trusted key server who produces classified decoding passkeys for the members and can read all the communion to any members. Group key agreement is another well-defined cryptographic primeval to secure group-oriented communions. A traditional GKA enables a group of members to setup a common secret passkey through spread out networks. However, whenever a sender wants to share an information to a group, he must first join the group and run a GKA protocol to share a classified passkey with the intended members. More recently, and to overthrow this limitation, Wu et al. popularized asymmetric GKA, a common public encoding key is agreed by group members who hold a individual decoding passkey. However, neither traditional symmetric GKA nor the newly introduced asymmetric GKA enables the sender to unilaterally exclude any particular member from reading the plaintext. Hence, it is necessary to find several adjustable cryptographic primeval en abling dynamic broadcasts without a fully credible dealer. The Auxiliary Propagate Encoding primitive, viz a hybrid of GKA and BE. Compared to its preliminary Asia crypt 2011 version, this project provides complete security proofs, elaborates the necessity of the aggregatability of the hidden BE building block and shows the practicality of the scheme with experiments. The main contributions are as follows. First, the primitive and explains its security definitions. Auxiliary Broadcast Encoding incorporates the elemental ideas of GKA and BE. A group of members interact through free networks to agree a public encoding passkey while each member holds a different secret decoding key. Using the public encryption passkey, anyone can encode any message to any subdivision of the group members and only the intended receivers can decrypt. Unlike GKA, Auxiliary enables the sender to exclude some members from reading the ciphertexts. Compared to Broadcast Encryption, Auxiliary Propagate Encoding does not need a fully credible third party to set up the system. Characterize collusion resistance by defining an attacker who can fully control every member farther the affianced receivers but cannot extract useful message from the cipher text. Second, the notion of aggregatable broadcast encoding. Coarsely speaking, a Broadcast Encoding scheme is aggregatable if its secure instances can be aggregated into a new secure instance of the BE system. Specifically, only the aggregated decoding keys of the same user are valid decoding keys corresponding to the aggregated public passkeys of the hidden Broadcast Encryption examples. The aggregatability of AggBE schemes is beneficial in the manufacturing of scheme and the BE schemes in the literature are not aggregatable. A detailed AggBE system tightly proven to be fully collusion-resistant beneath the decision BDHE assumption. The proposed AggBE system offers effectual encoding/decoding and short ciphertexts. Certainly, create an effectual Auxiliary Broadcast Encoding scheme with AggBE scheme as a building block. The Auxiliary Broadcast Encoding construction is proven to be semi-adaptively secure under the decision Bilinear Diffie-Hellman Exponentiation assumption in the standard model. Only one round is needed to form the public group encoding passkey and set up the Auxiliary Broadcast Encoding system. After the system set-up, the storage cost would be O(n) for sender as well as for group members, where n is the number of group members taking part in the setup stage. Although, the online complexity (which dominates the practicality of a Auxiliary Broadcast Encoding scheme) is very low. Post trade-off, the variant has O(n2=3) complexity in communion, calculations and storage. This is comparable to up-to-date regular Broadcast Encoding schemes which have O(n1=2) complexity in the same performance metrics, but system does not require a credile passkey dealer. Execute a chain of experiments and the experimental results verify the practicality of scheme. Potential Applications A potential application of Auxiliary Propagate Encoding is to secure data exchanged among friends via social networks. Since the Prism scandal, people are desperately concerned about the privacy of their personal data shared with their friends over social networks. Auxiliary Propagate Encoding can provide a feasible solution to this problem. Indeed, Phan et al underlined the applications of Auxiliary Propagate Encoding to social networks. In this scenario, if a group of users want to share their data without letting the social network operator know it, they this Encoding scheme. Since the setup procedure of Encoding only requires one round of communication, each member of the group just needs to broadcast one message to other intended members in a send-and-leave way, without the synchronization requirement. After receiving the messages from the other members, all the members share the encryption key that allows any user to selectively share his/her data to any subgroup of the members . Furthermore, it also allows sensitive data to be shared among different groups. Other applications may include contemporary messaging among family members, protected scientific research tasks jointly conducted by scientists from different places, and disaster rescue using a mobile ad hoc network. A common feature of these scenarios is that a group of users would like to exchange sensitive data but a fully credible third party is unavailable. Encoder provides an efficient solution to these applications. AIMS OBJECTIVES 2.1  AIM The Auxiliary Propagate Encoding primitive, viz a hybrid of GKA and BE. Compared to its preliminary Asia crypt 2011 version, this project provides complete security proofs, elaborates the necessity of the aggregatability of the hidden BE building block and shows the practicality of the scheme with experiments. The main aim are as follows. First, the primitive and explains its security definitions. Auxiliary Broadcast Encoding incorporates the elemental ideas of GKA and BE. A group of members interact through free networks to agree a public encoding passkey while each member holds a different secret decoding key. Using the public encryption passkey, anyone can encode any message to any subdivision of the group members and only the intended receivers can decrypt. Unlike GKA, Auxiliary enables the sender to exclude some members from reading the ciphertexts. Compared to Broadcast Encryption, Auxiliary Propagate Encoding does not need a fully credible third party to set up the system. Characterize collusion resistance by defining an attacker who can fully control every member farther the affianced receivers but cannot extract useful message from the cipher text. 2.2  OBJECTIVE The Auxiliary propagate Encoding primitive, which is a hybrid of GKA and BE.It provides complete security proofs, illustrates the necessity of the aggregatability of the underlying BE building block. ConBE incorporates the underlying ideas of GKA and BE. A group of members interact via open networks to negotiate a public encryption key while each member holds a different secret decryption key. Using the public encryption key, anyone can encrypt any message to any subset of the group members and only the intended receivers can decrypt. The collusion resistance by defining an attacker who can fully control all the members outside the intended receivers but cannot extract useful information from the ciphertext. The notion of aggregatable broadcast encryption (AggBE). Coarsely speaking, a BE scheme is aggregatable if its secure instances can be aggregated into a new secure instance of the BE scheme. Specifically, only the aggregated decryption keys of the same user are valid decryption keys corresponding to the aggregated public keys of the underlying BE instances. An efficient ConBE scheme with our AggBE scheme as a building block. The ConBE construction is proven to be semi-adaptively secure under the decision BDHE assumption in the standard model. LITERATURE SURVEY LITERATURE SURVEY 3.1 Paper on Broadcast Encryption: Several schemes that allow a center to broadcast a secret to any subset of privileged users out of a universe of size nso that coalitions of k users not in the privileged set cannot learn the secret. The most interesting scheme requires every user to store O(k log k Several schemes that allow a center to broadcast a secret to log n)keys and the center to broadcast O(k2 log2 k log n) messages regardless of the size of the privileged set. This scheme requires every user to store O(log k log(1/p)) keys and the center to broadcast O(k log2 k log(1/p)) messages. Algorithm: Step 1: Takes as input the number of receivers n, Setup(n) outputs private keys d1 , à ¢Ã¢â€š ¬Ã‚ ¦, dn and public-key PK. Step 2: Takes as input a subset, Encrypt (S, PK, M): Encrypt M for users S à ¯Ã†â€™Ã‚  {1, à ¢Ã¢â€š ¬Ã‚ ¦, n} Output ciphertext CT. Step 3: Takes as input a subset, Decrypt (CT, S, j, dj, PK): If j à ¯Ã†â€™Ã… ½ S, output M. The key K can then be used to decrypt the broadcast body CM and obtain the message body M 3.2 Paper on Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys: This system describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any number of colluders. This construction both ciphertexts and private keys are of constant size (only two group elements), for any subset of receivers. The public key size in this system is linear in the total number of receivers. Second system is a generalization of the first that provides a trade-off between ciphertext size and public key size. The system achieves a collusion resistant broadcast system for n users where both ciphertexts and public passkeys are of size O(à ¢Ã‹â€ Ã… ¡n) for any subset of receivers. Algorithm: Step 1: Let G be a bilinear group of order p. Pick a random generator g of G and random ÃŽÂ ±, ÃŽÂ ³ à ¢Ã‹â€ Ã‹â€  Zp and, as usual, define gi = g(ÃŽÂ ± i ) and v = gÃŽÂ ³Ãƒ ¢Ã‹â€ Ã‹â€  G. Step 2: Output the public key PK = {g, g1, , gn, gn+2, . . . , g2n, v} , it generates m shares of ÃŽÂ ³. Secret sharing generates the shares. Let f à ¢Ã‹â€ Ã‹â€  Zp[x] be a random polynomial of degree t à ¢Ã‹â€ Ã¢â‚¬â„¢ 1 satisfying f(0) = ÃŽÂ ³. For j = 1, , m the jth share of ÃŽÂ ³ is defined as sj = f(j) à ¢Ã‹â€ Ã‹â€  Zp. Step 3: User k à ¢Ã‹â€ Ã‹â€  {1, . . . , n} wants her private key dk = g ÃŽÂ ³kà ¢Ã‹â€ Ã‹â€  G. pick t administrator servers to help generate dk. To generate dk . For i = 1, . . . , it receives g si k from the ith administrator. It computes private key as dk = à ¢Ã‹â€ Ã‚ i=1(gk8)ÃŽÂ »i . Then dk = gkà ¢Ã‹â€ Ã¢â‚¬Ëœi=1 ÃŽÂ »i8i = g ÃŽÂ ³k as required. As usual all these messages are sent between the administrators and a user are over a private channel. 3.3 Paper on A Conference Key Distribution System: Encryption is used in a communication system to safeguard information in the transmitted messages from anyone other than the intended receiver. To perform the encryption and decryption the transmitter and receiver ought to have matching encryption and decryption keys. A clever way to generate these keys is to use the public key distribution system invented by Diffie and Hellman. The public key distribution system is generalized to a conference key distribution system (CKDS) which admits any group of stations to share the same encryption and decryption keys. The analysis reveals two important aspects of any conference key distribution system. One is the multi-tap resistance, which is a measure of the information security in the communication system. The other is the separation of the problem into two parts: the choice of a suitable symmetric function of the private keys and the choice of a suitable one-way mapping thereof. Algorithm : Step 1 : Consider A center chooses a prime p = ÃŽËÅ"(2cN), c à ¢Ã¢â‚¬ °Ã‚ ¥ 1 constant, and an element ÃŽÂ ± à ¢Ã‹â€ Ã‹â€  Zp of order q = ÃŽËÅ"(2N). If this has to be verià ¯Ã‚ ¬Ã‚ ed then the factorization of q is given. The center publishes p, ÃŽÂ ± and q. Step 2 : Let U1,,Un be a (dynamic) subset of all users5 who want to generate a common conference key. Step 3 : Each Ui, i = 1,,n, selects6 rià ¢Ã‹â€ Ã‹â€ R Zq, computes and broadcasts Zi=ÃŽÂ ±ri mod p . Step 4 : Each Ui, i = 1,,n, checks7 that ÃŽÂ ±q à ¢Ã¢â‚¬ °Ã‚ ¡ 1(modp) and that (zj)q à ¢Ã¢â‚¬ °Ã‚ ¡ 1(modp) for all j = 1,,n, and then computes and broadcasts Xi à ¢Ã¢â‚¬ °Ã‚ ¡(zi+1/zià ¢Ã‹â€ Ã¢â‚¬â„¢1)ri (modp), where the indices are taken in a cycle. Step 5 : Each Ui, i = 1,,n, computes the conference key, Ki à ¢Ã¢â‚¬ °Ã‚ ¡(zià ¢Ã‹â€ Ã¢â‚¬â„¢1)nri  ·Xin-1à ¢Ã‹â€ Ã¢â‚¬â„¢1  · Xi+1n-2  ·Ãƒâ€šÃ‚ ·Ãƒâ€šÃ‚ · Xi-2 (modp). 3.4 Paper on Key Agreement in Dynamic Peer Groups: As a result of the increased popularity of group- oriented applications and protocols, group communication occurs in many different settings: from network multicasting to application layer tele- and video-conferencing. Regardless of the application environment, security services are necessary to provide communication privacy and integrity. This paper considers the problem of key agreement in dynamic peer groups. (Key agreement, especially in a group setting, is the steeping stone for all other security services.)Dynamic peer groups require not only initial key agreement (IKA) but also auxiliary key agreement (AKA) operations such as member addition, member deletion and group fusion. We discuss all group key agreement operations and present a concrete protocol suite, CLIQUES, which offers complete key agreement services. CLIQUES is based on multi-party extensions of the well-known Diffie-Hellman key exchange method. The protocols are efficient and provably secure against passive adversaries. 3.5 Comparative Study SR NO Paper Title And Methods Used Authors Name Mertis Demerits Problem Solution Future Work 1. Broadcast Encryption ( Symmetric Encryptions, Secret key Distributions management) A. Fiat and M. Naor Provides secure group-oriented communications Existing GKA protocols cannot handle sender/member changes efficiently Requires a trusted third party to distribute the keys. Using Asymmetric group key agreement (ASGKA) to overcome this. Future work will concern the implementation of the ASGKA scheme to incorporate the following. 2. Collusion Resistant Broadcast Encryption with short Ciphertext and private keys (Parameterization) Dan Boneh , Craig Gentry Provides a collusion resistant system. Cannot handle large sets of groups. Collusion resistant is limited to a relatively small group. Using appropriate parametrization Future works will concern the reduction of collusion by constructing both Ciphertext and private key of constant size. 3. A Conference Key Distribution System (Security in digital systems ,Conference key distribution) I. Ingemarsson, D.T. Tang and C.K. Wong Provides a system using That distributes key using contributory key generation. It is immune to insecurities due to symmetric functions of degree two. As the key was a symmetric function of degree two, it was insecure. Using a asymmetric function instead of symmetric function. Future research will be devoted to methods that can use asymmetric function for higher security. 4. Key Agreement in Dynamic Peer Groups (Multi-party Computation) Michael Steiner, Can handle system with constantly changing members and senders. It is not efficient for relatedly large set of groups. Works only for relatively small and non-hierarchical groups. Using key transport mechanism. Future research Will including the methods adopted in this. 5. Broadcast Encryption ( Symmetric Encryptions, Secret key Distributions management) A. Fiat and M. Naor Provides secure group-oriented communications It requires a fully trusted third party and direct link It is more expensive as direct link has to be established Cost can be minimised using Contributory key generation schemes or using Conbe Scheme. Future research will be including plans to implement the schemes to cut down expenses. 6. Contributory Broadcast Encryption With Efficient Encryption and Short Ciphertexts Qianhong ,Bo Qin, Lei Zhang,Josep Domingo-Ferrer Doesnt require trusted third Party to set up the system. As it is more flexible , it compromises on some set of performances. Cannot handle changes in server/member efficiently Using auxiliary group Encoding EXISTING SYSTEM EXISTING SYSTEM PROBLEM STATEMENT PROBLEM STATEMENT The prevailing broadcast encryption scheme can provide reliable end to end encryption, however requires a trusted third party to distribute the keys. Also the BE scheme requires to set a direct link with the receiver to enable the flow of information. Existing GKA protocols cannot handle sender/member the changes efficiently with the growing technologies and ad hoc devices, it is essential for the system to address and resolve the issue.Using Asymmetric group key agreement (ASGKA) the system can overcome the shortcomings of the BE system. Collusion Resistant Broadcast Encryption with short Ciphertext and private keys methodology used a symmetric key of degree two to mitigate collusion for a relatively short system. It could not handle or further avoid collusion for a large set of system.Using appropriate parameterization can aid the drawbacks of the system. Also as the key was a symmetric function of degree two, it was insecure and worked only for relatively small and non-hierarchical groups. A Conference Key Distribution System which uses security in digital systems and conference key distribution provides a system That distributes key using contributory key generation. It is immune to insecurities as it uses symmetric function of degree two. Key Agreement in Dynamic Peer Groups which uses multi-party Computation can handle system with constantly changing members and senders but It is not efficient for relatedly large set of groups. Using key transport mechanism, the range of the system can work efficiently for relatively larger set of group. The system will not require the sender to be the part of the group. SCOPE SCOPE PROPOSED SYSTEM PROPOSED SYSTEM Diffie-hellman algorithm Diffie-Hellman key exchange (D-H) [nb 1] is a specific method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as originally conceptualized by Ralph Merkle and named after WhitfieldDiffie and Martin Hellman. Step 1: Let the users be named sender and receiver. First, they agree on two prime numbers g and p, where p is large and g is a primitive root modulo p. Step 2: Now sender chooses a large random number a as her private key and receiver similarly chooses a large number b. Step 3: Sender then computes, which she sends to Receiver, and Receiver computes , which he sends to sender. Step 4: Now both Sender and Receiver compute their shared key , which Sender computes as and Receiver computes as Sender and Receiver can now use their shared key to exchange information without worrying about other users obtaining this information. In order for an attacker to do so, he would first need to obtain knowing only , , and . This can be done by computing from and from . This is the discrete logarithm problem, which is computationally infeasible for large . Computing the discrete logarithm of a number modulo takes roughly the same amount of time as factoring the product of two primes the same size as . 7.2MATHEMATICAL MODEL Group Key Agreement. For 1 à ¢Ã¢â‚¬ °Ã‚ ¤k à ¢Ã¢â‚¬ °Ã‚ ¤n, member k doesthe following: Randomly choose Xi,k à Ã‚ µG, ri,k à Ã‚ µZpÃÅ' ½; Compute Ri,k = gÃâ€" ¾ÃƒÅ Ã‚ ³i,k, Ai,k = e(Xi,k, g); Set PKk = ((R0,k , A0,k),à ¢Ã¢â€š ¬Ã‚ ¦.,(Rn,k, An,k)); For j = 1,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦., n ,jà ¢Ã¢â‚¬ °Ã‚   k, computeà Ã†â€™i, j ,k=Xi,khjri,kfor i = 0,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦,n, with i à ¢Ã¢â‚¬ °Ã‚  j; Set dj,k = (à Ã†â€™0,j,k,à ¢Ã¢â€š ¬Ã‚ ¦.., à Ã†â€™jÃâ€" ¾1,j,k,à Ã†â€™j+1,j,k,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦,à Ã†â€™n,j;k); Publish (PKk, d1,k,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.,dkÃâ€" ¾1;k, dk+1,k,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦., dn,k); Compute dk,k accordingly and keep it secret. Group Encryption Key Derivation. The group encryption key is PK = PK0 PKn = ((R0,A0),à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦,(Rn,An)) where Ri =à Ã… ¸nk=1Ri,k,Ai =à Ã… ¸nk=1Ai,kfor i =0,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦,n. The group encryption key PK is publiclycomputable. Member Decryption Key Derivation: For 1 à ¢Ã¢â‚¬ °Ã‚ ¤ià ¢Ã¢â‚¬ °Ã‚ ¤ n 1 à ¢Ã¢â‚¬ °Ã‚ ¤jà ¢Ã¢â‚¬ °Ã‚ ¤ nand i à ¢Ã¢â‚¬ °Ã‚   j, member j can compute herdecryption key dj = (à Ã†â€™ 0,j,à ¢Ã¢â€š ¬Ã‚ ¦.., à Ã†â€™ jÃâ€" ¾1,j,à Ã†â€™j+1,j,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦,à Ã†â€™n,j) where n n n à Ã†â€™i,j= à Ã†â€™i,j,jà Ã… ¸Ãƒ Ã†â€™i,j,k= à Ã… ¸Ãƒ Ã†â€™i,j,k= à Ã… ¸Xi,khrj k=1,kà ¢Ã¢â‚¬ °Ã‚  1 k=1 k=1 7.3 SYSTEM ARCHITECTURE Storage Server Upload File with privileges 1. Req File Search Files2.Access the file METHODOLOGY METHODOLOGY 8.1 FLOW CHART UML DIAGRAMS 8.2.1 Use Case Diagram Sequence Diagram Upload Files Upload File Response Register Register Confirmation Provide access Permission Request Search the file File request confirmation File sending response Req Sign Distribution Sign Res Status Class Diagram

Saturday, July 20, 2019

Experimental Psy Article Review :: essays research papers

Experimental Psychology Article review of ‘Distorted Retrospective Eyewitness Reports as Functions of Feedback and Delay’ by Gary L. Wells, Elizabeth A. Olson, and Steve D. Charman. Iowa State University Journal of Experimental Psychology   Ã‚  Ã‚  Ã‚  Ã‚  This article was mainly about eye witnesses and the many errors they make in recalling a situation or describing a culprit whether they are asked immediately or after a period of time.   Ã‚  Ã‚  Ã‚  Ã‚  In this study, witnesses viewed a crime video and attempted to identify the culprit from a group line-up that did not actually have the culprit present. 253 mistaken-identification eyewitnesses were randomly given confirming, disconfirming, or no feedback regarding their description of the culprit or the culprit’s identification. The feedback process was either immediate or delayed for 48 hours, and measures were also immediate or delayed for 48 hours. It was shown that those who were given confirming feedback gave more distorted information. They had increased confidence in remembering what had happened, were able to make out facial details and their length of time to identify the culprit changed. There was also no difference in their statements when they were asked immediately or after 48 hours. Those who received disconfirming feedback were not so confident and took longer time to identify the culprit.   Ã‚  Ã‚  Ã‚  Ã‚  The writers argue that the focus on identification itself, especially in court cases, does not factor in the influence that postidentification suggestions have on the testimony of the eyewitness that might later be given about the identification. They suggest that postidentification feedback from the lineup administrator has strong effects on how the eye witness remembers the original event and on how the eyewitness recalls the identification decision. They call this the Postidentification Feedback Effect. This Effect influences both the retrospective reports of confidence and the eyewitnesses’ retrospective reports of how good their view of the culprit was, how much attention they paid to the culprit, how long they took to identify the culprit and so on. According to the writers, any psychological interpretations of the postidentification feedback effect must take into account the broad range of effects on retrospective reports of the witnessing experience rather than merely the effect on retrospective confidence.   Ã‚  Ã‚  Ã‚  Ã‚  There have also been recent studies that have replicated and extended the Postidentification Feedback Effect in various ways. According to one study, â€Å"the Postidentification Feedback Effect is reduced by having eyewitnesses think privately about their certainty, the view they had, and so on, prior to giving them feedback (Wells & Bradfield, 1999).

Friday, July 19, 2019

Essay On Evolution -- essays research papers

Essay on Evolution   Ã‚  Ã‚  Ã‚  Ã‚  There are many mechanisms that lead to evolutionary change. One of the most important mechanism in evolution is natural selection which is the differential success in the reproduction of different phenotypes resulting from the interaction of organisms with their environment. Natural selection occurs when a environment makes a individual adapt to that certain environment by variations that arise by mutation and genetic recombination. Also it favors certain traits in a individual than other traits so that these favored traits will be presented in the next generation. Another mechanism of evolution is genetic drift. Genetic drift is a random change in a small gene pool due to sampling errors in propagation of alleles or chance. Genetic drift depends greatly on the size of the gene pool. If the gene pool is large, the better it will represent the gene pool of the previous generation. If it is small, its gene pool may not be accurately represented in the next generation due to sampling error. Genetic drift usually occurs in small populations that contain less than 100 individuals, but in large populations drift may have no significant effect on the population. Another mechanism is gene flow which is when a population may gain or lose alleles by the migration of fertile individuals between populations. This may cause the allele frequencies in a gene pool to change and allow the organism to evolve. The most obvious mechanism would ...

Thursday, July 18, 2019

A proposal for a training program for international peace-keeping organizations Essay

The peace keeping program explores the training needs and practices of four distinct groups involved in peace operations- US government agencies, the military, international civilian police, and non governmental organizations- that are expected to respond, separately or collaborate, to emergencies in affected areas around the world (Schoenhaus, 2002 p 9). The United States government has been said to have little ability today to respond rapidly to an international humanitarian emergency with a well-trained disaster response team. The delivery of adequate training to U. S. government personnel for the management of complex emergencies has been hampered by three distinct shortcomings; inadequate training content, inadequate training coverage, and the absence of a single command center with responsibility for improving training in complex emergency management (Schoenhaus, 2002 p 9). There is a stark contrast between the capabilities of the military and civilian communities at the beginnings of operations. The military in general has abundant resources and a clear mission under unified control. However this has not been the case with the civilian sector in peace operations, which is beset with multiple and conflicting agendas and generally enters the post intervention period lacking adequate resources, builds slowly, and spends an inordinate amount of time coordinating its own efforts rather than addressing the needs of the society in which it has intervened (Schoenhaus, 2002 p 9-10). The militaries role should be to lead from behind acknowledging the primacy of the primacy of the civilian goals and coordinating its support so that it becomes a continuation of the civilian effort by other means. (Bailey, 1982). The civilian success will be based on adapting the international standards to the new political environment and gaining public acceptance instead of re-establishing failed systems. The development of all fronts is necessary like infrastructural, economic, human and the leadership (Bankus 2002, p. 4) A system should be put in place to generate leaders who can articulate, evaluate, and solve problems. There must be a public debate on how the international community prepares its post intervention efforts. There should also be a core training curriculum for all actors involved in the humanitarian-relief and peace operations that are based on common, holistic visions. Such a curriculum would be built around enhanced human relations, interpersonal skills, communi cation, and management (Schoenhaus, 2002 p 9). Beyond this core training requirement, the individual agencies and organizations must recruit and train their staff to be experts in their areas of operations. At present, however there is no centralized training facility or a common curriculum that prepares civilians for the challenges they face in responding to international emergencies (Schoenhaus, 2002 p 9). Although both the US. Government agency and NGO communities recognize that there is need for common and more efficient training, the lack of commitment in terms of organizational culture, as well as the lack of time and resources, limits their efforts. The U. S. Government as suggested should take the lead in developing core training requirements and assign responsibilities to various agencies and other participants that could be trained at a common -use facility devoted to international training and response to complex emergencies. Doing this however requires significant resources, as well as a consensus among the agencies and the governments that support them (Felfer, 2002). The Military Training the Military for Peace Operations: A Past, Present and Future View. It has always been a practice on the global front to use the military forces in performing military related operations apart from war. (Goodbye, 1992)Granted the main responsibility of the military is to be prepared for any threat of war. In many countries, attempts have not been made by many governments train the military forces in other areas which are not related to main mission. (Bedrail, 1993). This has led to a realization among many states that there is need to train the military in other areas different from war because it is increasingly becoming important to do so (Zartman & Rasmussen, 1997). In the pat training the military for matters of peace has been not been structured and were largely based on the experiences which were inherited from the predecessors in which case the military acquired skills which were unique to some specific operational area (Miltenberger & Weiss, 2000). In coming up with a training program for the military destined for peacekeeping missions, it will be important to consider several factors like doctrine leadership as well as equipment. At the same time it is necessary to factor in the element of force mix besides other factors like training as well as the quality of the human capital. It is important to note that all these factors will be of utmost importance though the doctrine will provide the basic principles upon which the military will support the objectives of the nation. This implies therefore that there will be a positive correlation between tough but realistic military training and their victory on any war mission. This actually is the basis of the training philosophy of the U. S military (Berger & Rice, 2001). It will therefore be important that in pursuit of the above philosophy, the military training program be guided by the following fundamental factors. First it will be important that the military be trained as a combined team. The rationale behind this is that it will lead to the achievement of the proficiency of not only the leaders and individuals but also the specific military units. It will equally be important to structure the training as to replicate a real fighting situation besides employing the most appropriate doctrines and rules obtained from documents like the training plan for mission activities (Schoenhaus, 2001). It will also be important that the designed military training program incorporates a practical approach. This implies that the training program will need to be performance related. At the same time, it will be necessary to anticipate and train for challenging scenarios besides training in such a way as to ensure that the proficiency of the military is not eroded in any way. The implication for this is that there will be need to ensure that the trained military personnel do not lose the skills they will have acquired. It will equally be important to consider the various rank-techniques comprise several levels of the structures of command. Last it will be important to take good care of the training equipment as well as employing the senior and experienced military commanders to facilitate the training programs (Smock, 1999). It is important note here that just like in any training program, time will play a crucial role in influencing the military training program. It therefore implies that both the training time as well as other resources will be limited thereby necessitating the need to structure the training program in a way that only the very important mission tasks are accomplished. This would mean that all the essential activities are first selected before conditions and benchmarks for each of the identified activities can be set under the guidance of the commander. The expectation will be that all the military units will be capable of accomplishing the tasks in relation to the performance benchmarks. The end result of the above structure will be the development of a training strategy which will determine the required standard of proficiency (Smock, 1999). The military do have the opinion that issues of peace building are not central to its main objective of war. However it is interesting to note that there is a considerable agreement that properly trained military also make the best agents of peace given the fact that they are usually disciplined. Depending on the level of technical knowledge of a military officer ( Huggland, 1992). destined for a peace keeping mission, it is important to offer additional training like on the areas of negotiations, check areas, skills for stopping civil arrests as well as risk managements (Sisk, 1999). Additional training would equally be needed for instance in cases where there is need to familiarize oneself with the affected region as well as for operations that are multinational in nature. (Mackinlay and Chopra, 1992). It will equally be necessary for the military officers to understand the engagement rules pertaining to the various settings besides the need to have skills for managing a case of confiscated materials. All these factors will be necessary owing to the fact that a peace keeping environment would not be the same as an environment of war as the former will require a great deal of sensitivity in the conduct of the operations (Simmons, 1999). It is thus important to acknowledge the fact that it would be adequate to conduct some training for the military before deploying them to the affected areas. However this alone would not suffice thus calling for the need for additional peacetime training in matters concerning peace. (Rifkind, 1993). The realization was that it was still a challenge for the military to manage political as well as civilian aspects of the military Thus, there is needed a benchmark of generic activities as well as standards to act as a guide to all the military units in matters relating to peace operations trainings(Berger & Rice, 2001).

Answer to Chapter

Chapter 5 Mankiw SOLUTIONS TO TEXT PROBLEMS Quick Quizzes 1. The expense piece of cake of contain is a measure of how oft quantifys the measurement pauperismed of a bang-up responds to a ex shift in the footing of that practiced, computed as the part motley in criterion guideed divided by the persona mixed bag in bell. When hire is in ductile (a hold dear walkoer slight than 1), a scathe make up raises entireness tax revenue enhancement, and a bell come down edits be revenue. When ask is chewy (a cost shot great than 1), a bell amplify snubs original revenue, and a m mavintary value decrease growings inwardness revenue.When postulate is unit pliable (a damage pushover capable to 1), a diversify in equipment casualty does non affect positive revenue. 2. The damage ginger snap of put up is a measure of how very to a greater extent than the mensuration supplied of a estimable responds to a dislodge in the scathe of that non bad(predicate), computed as the helping change in sum supplied divided by the percent change in footing. The equipment casualty cinch of emerge might be different in the extensive dissolve than in the inadequate run because over soon periods of beat, firms backnot easily change the sizes of their factories to do much than(prenominal) or little of a good.Thus, in the short run, the sum supplied is not very reactive to the footing. However, over long-dated periods, firms ass build new factories, billow existing factories, stodgy old factories, or they shtup enter or pass by a market place. So, in the long run, the amount supplied butt respond substanti each(prenominal) toldy to a change in expense. 3. A drought that destroys half of all farm crops could be good for farmers (at least those unaffected by the drought) if the have for the crops is in whippy.The shift to the left of the tack on rationalise leads to a outlay gain that pass on raise t otal revenue if the outlay childs play of prerequisite is little than 1. No one farmer would m early(a) an incentive to destroy his crops in the absence seizure of a drought because he takes the market price as given. Only if all farmers destroyed a portion of their crops together, for example through a government program, would this envision work to make farmers better off. Questions for check into 1. The price shot of entreat measures how much measurement considered responds to a change in price.The income snatch of demand measures how much metre demanded responds to changes in consumer income. 2. The determinants of the price cracking of demand include how available skinny substitutes argon, whether the good is a want or a sumptuosity, how broadly defined the market is, and the time horizon. Luxury goods vex greater price tensileities than necessities, goods with close substitutes have greater ductileities, goods in more(prenominal) narrowly defined markets have greater elasticities, and the catch of demand is greater the longer the time horizon. . The main prefer of using the mid-point formula is that it uses a unvaried base whether the change in price or standard demanded is an amplification or a decrease. 87 88 Chapter 5/ snap fastener and Its exercise 4. An elasticity greater than one bureau that demand is elastic. When the elasticity is greater than one, the theatrical role change in mensuration demanded exceeds the percentage change in price. When the elasticity commensurates zero, demand is perfectly springless. on that point is no change in sum of money demanded when there is a change in price. 5. purpose 1 presents a allow-and-demand diagram, showing the offset price, the equipoise quantity, and the total revenue accepted by producers. Total revenue equals the remainder price times the rest quantity, which is the playing field of the rectangle shown in the figure. Figure 1 6. If demand is elastic, an outgr owth in price reduces total revenue. With elastic demand, the quantity demanded belittles by a greater percentage than the price organizes. As a result, total revenue radioactive decays. 7. A good with income elasticity less than zero is called an inferior good because as income trick outs, the quantity demanded declivitys. . The price elasticity of go forth is calculated as the percentage change in quantity supplied divided by the percentage change in price. It measures how much quantity supplied responds to changes in price. 9. The price elasticity of yield of Picasso paintings is zero, because no matter how advanced school price rises, no more can ever be produced. 10. The price elasticity of deliver is usually epicr in the long run than it is in the short run. Over short periods of time, firms cannot easily change the sizes of their factories to make more or less of a good, so the quantity supplied is not very responsive to price.Over longer periods, firms can build new factories or close old ones, so the quantity supplied is more responsive to price. 11. Because the demand for drugs is possible to be inelastic, an maturation in price leave behind lead to a rise in total expenditure. Therefore, drug users may recede to theft or burglary to support their habits. Chapter 5/ gingersnap and Its Application Problems and Applications 89 1. a. enigma novels have more elastic demand than mandatory textbooks, because enigma novels have close substitutes and are a luxury good, darn require textbooks are a necessity with no close substitutes.If the price of mystery novels were to rise, readers could substitute another(prenominal) types of novels, or deprave fewer novels altogether. further if the price of required textbooks were to rise, students would have little pickax entirely to pay the higher price. Thus, the quantity demanded of required textbooks is less responsive to price than the quantity demanded of mystery novels. b. Beethoven rec ordings have more elastic demand than holy harmony recordings in general. Beethoven recordings are a narrower market than classical medicine recordings, so it is easy to find close substitutes for them.If the price of Beethoven recordings were to rise, people could substitute other classical recordings, like Mozart. But if the price of all classical recordings were to rise, substitution would be more difficult. (A transition from classical music to rap is unlikely ) Thus, the quantity demanded of classical recordings is less responsive to price than the quantity demanded of Beethoven recordings. c. Subway devils during the next cardinal years have more elastic demand than underpass rides during the next cardinal months. Goods have a more elastic demand over longer time horizons.If the dress for a subway ride was to rise temporarily, consumers could not tack to other forms of acid without great expense or great inconvenience. But if the fare for a subway ride was to remain h igh for a long time, people would in stages switch to ersatz forms of transportation. As a result, the quantity demanded of subway rides during the next six just about months allow be less responsive to changes in the price than the quantity demanded of subway rides during the next five years. d. Root beer has more elastic demand than water.Root beer is a luxury with close substitutes, while water is a necessity with no close substitutes. If the price of water were to rise, consumers have little choice but to pay the higher price. But if the price of floor beer were to rise, consumers could easily switch to other sodas. So the quantity demanded of root beer is more responsive to changes in price than the quantity demanded of water. 2. a. For business travelers, the price elasticity of demand when the price of tickets rises from $200 to $250 is (2,000 1,900)/1,950/(250 200)/225 = 0. 05/0. 22 = 0. 23.For vacationers, the price elasticity of demand when the price of tickets rise s from $200 to $250 is (800 600)/700 / (250 200)/225 = 0. 29/0. 22 = 1. 32. b. The price elasticity of demand for vacationers is higher than the elasticity for business travelers because vacationers can choose more easily a different way of transportation (like driving or pickings the train). Business travelers are less likely to do so because time is more important to them and their schedules are less adaptable. 3. a. The percentage change in price is equal to (2. 20 1. 00)/2. 00 = 0. = 20%. If the price elasticity of demand is 0. 2, quantity demanded result adjudicate by 4% in the short run 0. 20 ? 0. 20. If the price elasticity of demand is 0. 7, quantity demanded will fall by 14% in the long run 0. 7 ? 0. 2. b. Over time, consumers can make adjustments to their homes by purchasing alternative heat sources such as inherent gas or electric furnaces. Thus, they can respond more easily to the change in the price of heating embrocate in the long run than in the short run. 90 Chapter 5/Elasticity and Its Application 4. If quantity demanded fell, price moldiness have risen.If total revenue rose, consequently the percentage increase in the price must be greater than the percentage decline in quantity demanded. Therefore, demand is inelastic. 5. Both Billy and Valerie may be correct. If demand increases, but supply is tout ensemble inelastic, sense of balance price will rise but the counterweight quantity will remain the same. This would also occur if supply decreases and demand is totally inelastic. maren is incorrect. If supply and demand both rise, equilibrium quantity will increase, but the impact on equilibrium price is indeterminate. 6. a. If our income is $10,000, your price elasticity of demand as the price of clump discs rises from $8 to $10 is (40 32)/36/(10 8)/9 =0. 22/0. 22 = 1. If your income is $12,000, the elasticity is (50 45)/47. 5/(10 8)/9 = 0. 11/0. 22 = 0. 5. b. If the price is $12, your income elasticity of demand as your inco me increases from $10,000 to $12,000 is (30 24)/27/(12,000 10,000)/11,000 = 0. 22/0. 18 = 1. 22. If the price is $16, your income elasticity of demand as your income increases from $10,000 to $12,000 is (12 8)/10/(12,000 10,000)/11,000 = 0. 40/0. 18 = 2. 2. 7.Yes, an increase in income would decrease the demand for good X because the income elasticity is less than zero, indicating that good X is an inferior good. A decrease in the price of good Y will decrease the demand for good X because the two goods are substitutes (as indicated by a cross-price elasticity that is greater than zero). 8. a. If mare always spends one-third of her income on clothing, and then her income elasticity of demand is one, because maintaining her clothing expenditures as a constant fraction of her income means the percentage change in her quantity of clothing must equal her percentage change in income. . Marias price elasticity of clothing demand is also one, because every(prenominal) percentage poi nt increase in the price of clothing would lead her to reduce her quantity purchased by the same percentage. c. Because Maria spends a atomicer proportion of her income on clothing, then for any given price, her quantity demanded will be lower. Thus, her demand curve has shifted to the left. Because she will again spend a constant fraction of her income on clothing, her income and price elasticities of demand remain one. 9. a. If quantity demanded move by 4. 3% when price rises by 20%, the price elasticity of demand is 4. /20 = 0. 215, which is fairly inelastic. b. Because the demand is inelastic, the transportation system Authoritys revenue rises when the fare rises. c. The elasticity bringing close together might be unreliable because it is further the first month after the fare increase. As time goes by, people may switch to other means of transportation in response to the price increase. So the elasticity may be larger in the long run than it is in the short run. 10. Toms price elasticity of demand is zero, because he wants the same quantity careless(predicate) of the price. Jerrys price elasticity of demand is one, ecause he spends the same amount on gas, no matter what the price, which means his percentage change in quantity is equal to the percentage change in price. Chapter 5/Elasticity and Its Application 91 11. a. With a price elasticity of demand of 0. 4, reducing the quantity demanded of arses by 20% requires a 50% increase in price, because 20/50 = 0. 4. With the price of cigarettes currently $2, this would require an increase in the price to $3. 33 a pack using the midpoint rule (note that ($3. 33 $2)/$2. 67 = . 50). b. The policy will have a larger make five years from now than it does one year from now.The elasticity is larger in the long run, because it may take some time for people to reduce their cigarette usage. The habit of smoking is hard to bar in the short run. c. Because teenagers do not have as much income as adults, they are likely to have a higher price elasticity of demand. Also, adults are more likely to be habituate to cigarettes, making it more difficult to reduce their quantity demanded in response to a higher price. 12. In order to steady down whether you should raise or lower the price of admissions, you need to have it away if the demand is elastic or inelastic.If demand is elastic, a decline in the price of admissions will increase total revenue. If demand is inelastic, an increase in the price of admissions will cause total revenue to rise. 13. a. As Figure 2 shows, the increase in supply reduces the equilibrium price and increases the equilibrium quantity in both markets. b. In the market for pharmaceutical drugs (with inelastic demand), the increase in supply leads to a relatively large decline in the equilibrium price and a subtile increase in the equilibrium quantity. Figure 2 c.In the market for computers (with elastic demand), the increase in supply leads to a relatively large increase in the equilibrium quantity and a small decline in the equilibrium price. d. Because demand is inelastic in the market for pharmaceutical drugs, the percentage increase in quantity will be lower than the percentage decrease in price thus, total 92 Chapter 5/Elasticity and Its Application consumer expenditure will decline. Because demand is elastic in the market for computers, the percentage increase in quantity will be greater than the percentage decrease in price, so total consumer spending will increase. 4. a. As Figure 3 shows, the increase in demand increases both the equilibrium price and the equilibrium quantity in both markets. b. In the market for beachfront resorts (with inelastic supply), the increase in demand leads to a relatively large increase in the equilibrium price and a small increase in the equilibrium quantity. c. In the market for automobiles (with elastic supply), the increase in demand leads to a relatively large increase in the equilibrium quantity and a small increase in equilibrium price. d.In both markets, total consumer spending rises, because both equilibrium price and equilibrium quantity rise. Figure 3 15. a. Farmers whose crops were not destroyed benefited because the destruction of some of the crops bring down the supply, causing the equilibrium price to rise. b. To control whether farmers as a group were stomach or helped by the floods, you would need to know the price elasticity of demand. It could be that the total revenue received by all farmers as a group really rose. 16. A worldwide drought could increase the total revenue of farmers if the price elasticity of demand for grain is inelastic.The drought reduces the supply of grain, but if demand is inelastic, the reduction of supply causes a large increase in price. Total farm revenue would rise as a result. If there is further a drought in Kansas, Kansas employment is not a large tolerable proportion of the total farm fruit to have much impact on the pri ce. As a result, price does not change (or changes by only a slight amount), while the output by Kansas farmers declines, thus reducing their income. 17. The quantity demanded at various prices is shown in the table belowChapter 5/Elasticity and Its Application bell 1 2 3 4 5 6 Quantity Demanded 60 30 20 15 12 10 93 Figure 4 The demand curve is shown in Figure 4. When price rises from $1 to $2 (a 66. 67 % increase), quantity demanded falls from 60 to 30 (a 66. 67% decrease). Therefore, the price elasticity of demand is equal to one. When price rises from $5 to $6 (an 18. 18% increase), quantity demanded falls from 12 to 10 (an 18. 18% decline). Again the price elasticity is equal to one. A bilinear demand curve has a price elasticity that declines in absolute value as price falls. This demand curve has a constant elasticity equal to one.