Friday, November 29, 2019

Establishing Facility Management Company in Dubai

The Conceptual Framework for the Analysis This paper proposes the establishment of facility management firm that can offer professional counsel on the sales of real estate in Dubai. The target will be to deliver services that can connect the sellers and buyers where all pay for the services delivered (Emmett Biddle, 2010).Advertising We will write a custom research paper sample on Establishing Facility Management Company in Dubai specifically for you for only $16.05 $11/page Learn More This aspect implies that the sellers pay commissions to this company in order to facilitate management and sales of the real estate (Blackwell, 2008). There will be licensed agents to provide services to the two transacting parties. This company will be owned by several investors as well as an inventor. In a bid to create an overlay insight of the core operating principles of the company, the costs targeted for the company start up are listed below. Figure 1: Start up ( Li Zhang, 2011) The customers will list their real estates in an internationally accessible network of sellers and buyers through highly skilled agents. In a bid to facilitate this outcome, the agents will get commissions, 24/7 access to office, webpage, marketing ads, and full brokerage support among others. On the other hand, the buyers will be able to inform the agents about their sales’ requirements via a comprehensive interview (Panacek, 2008). The Key Success Factors for this Business Idea The strengthening economy of Dubai has elicited attention to the real-estate demands where many people need to purchase homes (Sachdeva, 2009). This company can take advantage of these market variations in order to grow with the industry (Collis Hussey, 2009). The company may develop a marketing strategy to notify people through the social media and mass media about the present of these real estates and the company. The first key aspect to develop within the market is a powerful bra nd that people cannot exempt. The other success factor will be the market segmentation based on their capabilities to sell and follow up the process.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The sellers will be one class of segmentation whereas the buyer will make the other. Another category will include the people who are willing to lease their property in respect to their regulations (Grant, 2010). The company will set funds to boost training, market the brand name, and update its goals regularly. Operating Model Framework The company sales will involve listing of the sellers and applying the marketing tactics in order to seek clients. Furthermore, it will develop a way of locating and watching homes in respect to the specifications of the buyers which is inclusive of relocating the clients from one location to the other (Grewal Levy, 2010). Clients relocating to regio ns beyond this company’s coverage will be advised to visit the relevant firms with good relations. New properties will also be listed prior to search of individuals willing to lease under their program. Once the property has been listed on the company’s marketing platform, the agents are allowed to seek connections for sales and use a support program to reach the clients (Hisrich, Peters Shepherd, 2013). Operation Management The brokers of the company will possess the authority to sponsor the incoming listing of real estate agents as stipulated by the license of brokerage. The joining agents will be admitted for training and enlightenment about the prevailing list, photography and other vital documents (Alkhafaji Aslin, 2013). The training will be updated progressively as changes develop within the system. The company will target to attain 15 licensed agents during its preliminary operations. Therefore, there will be no employee working for the company but rather con tractors working under commissions. The commissions of licensed agents may be set at 3% on either side segment of buyer or seller. The company will receive 25% of this commission. In essence, an agent who manages to buy and sell a property will manage a commission of 6%. This form of management is deemed fair as it meets the purpose of the mission. The management of real estate company follows a unique strategies approached by many researchers as the most effective (Jenster Hussey, 2001).Advertising We will write a custom research paper sample on Establishing Facility Management Company in Dubai specifically for you for only $16.05 $11/page Learn More The brokerage firm acts a link between an agent, seller and buyer. All these three parties are liable to the company’s terms and conditions in order to facilitate convenient transactions. The operation management of this company can have roles of monitoring the activities and behaviours of these pa rties and rectifying the issues that may arise. In essence, the brokerage firm must be able to control people using rules, penalties, commitments, promotion and classifications in order to create a competitive outcome. Model of Stakeholders and Clients Relationships The clients and stakeholders will be connected by the need to lease, buy, and/or sell a property. The first interaction between the client and stakeholder involves arresting issues that may arise in the process of purchasing and listing. Essentially, the main target of these relationships will be to satisfy the clients within all possible limits. The first client is the seller who seeks listing of their property under the company. As the first clients, the company must ensure that these basic resources owned by the individuals remains under their watch. Dissatisfaction may trigger clients to change the firm managing the property. Furthermore, these client are the most relevant when marketing the brand of the company as t heir presence marks the presence of the business. The buyers are the second vital elements of the business model as they facilitate the attainment of the organizational goals. After a property has been sold, the company appears as a reliable entity in selling them which dictates the future preferences by other such sellers. Satisfaction must be ensured in order to prevent clients from tainting the company image. The final relationship involves the agents who attend the requirements of sellers and buyers as well as bring them to the company. A company that offers the best commissions have high chances of being preferred by the agents when making sales. Facility Management Scope, Enhancement and Innovation The facility management scope will be restricted to the four mentioned entities incorporating selling, buying, leasing, and referring of properties. In a bid to meet these entities of the business model, the company will develop establish a commission based agent program that can li st and find clients with different needs regarding real estates. A company must also enhance its brand by marketing through such available channels as mass and social media (Mangold Faulds, 2009). As the business grow and becomes competitive, other tactics must be developed to foster change and boost the revenue earned by the company. References Alkhafaji, A Aslin, R 2013, Strategic management: Formulation, Implementation and Control in a dynamic environment, The Haworth Press, New York.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Blackwell, E 2008, How to prepare a business plan, 5th edn, Kogan Page, London. Collis, J Hussey, R 2009, Business research: a practical guide for undergraduate postgraduate students (3rd ed.), Palgrave Macmillan, Basingstoke, Hampshire. Emmett, R Biddle, J 2010, Research in the history of economic thought and methodology a research annual, Emerald, Bingley, UK. Grant, R 2010, Contemporary strategy analysis, 7th edn, John Wiley Sons, Hoboken, NJ. Grewal, D Levy, M 2010, Marketing, 2nd edn, McGraw-Hill Irwin, Boston. Hisrich, R, Peters, M Shepherd, D 2013, Entrepreneurship, McGraw-Hill/Irwin, Boston. Jenster, P Hussey, D 2001, Company analysis: determining strategic capability, Wiley, Chichester. Li, Y Zhang, Q 2011, â€Å"The Application of Principal Component Analysis on Financial Analysis in Real Estate Listed Company†, Procedia Engineering, vol. 15, pp. 4499-4503. Mangold, W Faulds, D 2009, â€Å"Social media: The new hybrid element of the promotion mix†, B usiness Horizons, vol. 52 no. 4, pp. 357-365. Panacek, E 2008, â€Å"Survey-based Research: Performing the Survey†, Air Medical Journal, vol. 27, no. 2, pp. 64-66. Sachdeva, J 2009, Business research methodology, Himalaya Pub. House, Dubai. This research paper on Establishing Facility Management Company in Dubai was written and submitted by user Xavi A. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Leadership in and Organization

Leadership in and Organization Free Online Research Papers How do your organization’s leaders influence your organization’s culture? How does the leadership of your organization achieve organizational goals? Leadership is the practice of influence that stimulates subordinates or followers to do their best towards the achievement of desired goals. Where there is an organized group of people working towards a common goal, some type of leadership becomes essential. The leader stimulates what is best in us; he unites and concentrates what we feel only groupingly and scatteringly. An organization’s leader influences organization’s culture by building up confidence and zeal among people to move towards the common objectives. A leader influences the behavior, attitude and beliefs of his subordinates. 1.The leader should communicate effectively and follow the principle of motivation. 2.He should listen to his subordinates properly and should consult the group in framing the policies and lines of action. 3.He should implement authority whenever necessary to implement the policies. Good leadership improves motivation and morale of employees. It acts as a motive power to group efforts as it rectifies the imperfectness of the formal organizational relationships. By helping in cooperation and coordination of different departments working in an organization, good and effective leadership helps achieve organizational goals. Can someone who is a leader not be a manager? Why or why not? Can someone who is a manager not be a leader? Why or why not? A leader cannot essentially be a good manager. Because what a manager needs to have, a leader might not possess all the qualities of a good manager. A good manager has the knowledge of the organization, has technical knowledge and administrative ability to instruct and inspire. A leader can inspire people, communicate well and can even secure cooperation but without knowledge of the organization and technical knowledge, he cannot manage the complete organization effectively and efficiently. It is must for a person who is controlling an organization to have the subjective and theoretical knowledge of the work and operations that his organization performs. Moreover, leadership is only a part of management as it includes planning, organizing, leading and controlling. A manager can always be a leader because the definition of a good manager includes a good leader as well. A manager who cannot be a leader is not a good manager then. As we all know, apart from the qualities mentioned above, a manager should have the ability to instruct, inspire and finally lead. A good manager always possesses the qualities of a good leader. Since only good leadership secures effective management, a manager should be able to boost up morale of his subordinates and lead his team of workers. So, a manager can definitely be a good and effective leader. What are some skills that leaders need to possess? How can managers develop leadership skills? A successful leader secures desired behavior from his followers. It depends upon the quality of leadership he is able to provide. A leader to be effective must possess certain basic skills and qualities. Some of them are as follows: 1. Good personality 2. Emotional Stability 3. Sound education and professional competence 4. Initiatives and creative thinking 5. Good understanding and sound judgement 6. Communicating Skills 7. Ability to guide and teach. 8. Courage to accept responsibility 9. Self confidence, diligence and industry. By regular introspection of himself, his work and relations with the employees, by being in constant touch up with the colleagues, by learning from his mistakes and by experience, a manager will learn and develop his leadership skills. By listening to his employees and their innovative ideas and by appreciating their feelings, a manager can learn to be an effective leader. One another essential requirement that a good leader should always possess is honesty and integrity of character. 1.Dont use the power of your position to get things done 2.Dont think of employees as things that need to be controlled or managed 3.Judge your success by the success of your team 4.Include humour in your diet while managing people How has management changed due to the increased role of globalization? Would a good leader in one country automatically be a good leader in another country? What characteristics should a leader have to make them successful globally? The changing economic world is throwing new challenges to the managers. The management concepts and practices are shaping ‘tomorrow’s history’. A number of challenges are taking place which are influencing the work of managers. One of them is Globalization. GLOBALIZATION: Most of the countries have opened up their borders to foreign products as well as foreign producers. The companies of developed countries are foreign countries by opening manufacturing facilities there. It involves an active international involvement by the company and most importantly, the managers. Now, the change has led the management to license or franchise to another firm the right to use its brand name, technology or product specifications which ultimately has led to create great burden on the managers. Managements of global companies are adjusting their organizational structures as per the requirements of the situation. The managers are being taught to be global in approach. A good leader in one country is not automatically a good leader in another country. Even though due to universality of principles of management, a leader might not have any problems in managing people (employees). But due to changed economic, political, social and cultural environment, a manager is bound to have some problems in managing work, customers and operations. The different regulations of the political system, different taste of consumers and different standard of living is for sure are big problems for a manager to deal with. That is why companies going global prefer to hire the manager of the country that are entering their operations into since that manager will be familiar to his home markets and consumers’ tastes. Characteristic of a successful global leader are: 1.Possessing A Global Mind Growth 2.Having the Necessary Competencies, Abilities and Emphasizing Meritocracy 3.Having the Character or Ballast 4.Having Creative, Innovative and Refreshing Approaches to Solve Problems 5.Being Positive 6.Co-operating and Collaborating 7.Being Culturally Sensitive and Empathetic CONCLUSION: Leaders just have to grow their teams as companies. Organizations and nations have to look for various ways to harness knowledge and respond faster to overcome difficult times. The overall challenge here is not only to design fresh and innovative approaches, maintaining high output/ sales and high touch with both employees and customers alike, but also creating or having successful work teams/ units, resilient Companies, and successful societies. Research Papers on Leadership in and OrganizationMoral and Ethical Issues in Hiring New EmployeesBringing Democracy to AfricaThe Project Managment Office SystemOpen Architechture a white paperMarketing of Lifeboy Soap A Unilever ProductIncorporating Risk and Uncertainty Factor in CapitalInfluences of Socio-Economic Status of Married MalesAnalysis Of A Cosmetics AdvertisementWhere Wild and West MeetResearch Process Part One

Thursday, November 21, 2019

Quantitative Article #2 Research Paper Example | Topics and Well Written Essays - 1000 words

Quantitative Article #2 - Research Paper Example 137). The second population under study included emergency department (ED) nurses working at the Prince of Wales Hospital in Shatin. A sample of 22 patients that needed NG tube reinsertion of tube placement check that presented themselves at the hospital participated in the study. The sample precluded patients who had certain medical complications including those who experienced vomiting tachypnea, and fever (Ho, Rainer & Graham, 2013, p. 138). Non-probability sampling was applied for the patients since not all patients had an equal chance of representation. Those with complications did not have a chance to be included as part of the sample. For the patients, accidental sampling was applied considering that only those patients who met the criteria and availed themselves at the hospital during the study period were featured in the study. Although opportunity sampling is often associated with bias and therefore reduces the representativeness of the sample and the generalisability of th e findings of the study, it was appropriate for this study since the samples were later randomized which served to increase the generalisabilility of the findings. The sampling plan applied was also appropriate considering time constraints and the limited number of patients that visit the hospital who are part of the population under study. While a sample of 22 patients seems small, the number has the capacity to produce reliable and generalizable results. A sample of 30 nurses participated in the study. The sampling of nurses was done in two stages. Given that all the nurses in the hospital had equal chance of participating in the study, probability sampling applied for the first stage of sampling. The second stage of sampling was based on convenience sampling considering that all those who returned their questionnaires featured in the study irrespective of

Wednesday, November 20, 2019

Aspect of Contract and Tort in Business Essay Example | Topics and Well Written Essays - 2250 words

Aspect of Contract and Tort in Business - Essay Example The second part of the report will also outline the effect of exemption clauses in attempting to exclude contractual liability. A) What is a contract? A contract comes into existence when two or more people agree to a certain course of conduct (Hofman. 1999). The law gets involved where one party does not carry out his contractual obligations. However, not every agreement is a contract given that in order for it to be binding in law, it must comply with a number of essentials. A contract is based on agreement and in order to express this agreement, there must be among other things an offer and acceptance. Thus, legal systems that follow the English system also require some form of consideration before the contract is binding. Therefore, the General Manager of Budgburys should bear in mind that his organisation offers products which are acceptable. According to Harvey v Facey [1893] AC552, every contract consists of an offer made by one party and accepted by the other. Thus, an offer is an invitation to enter into a binding agreement (Gibson, 1988). Elements of a contract in business From the definition above, it can be noted that not every agreement is therefore a contract (Gibson, 1988). In order for the agreement to be binding in law, it must comply with with a number of essentials. ... Implied prohibition occurs when statute without expressly prohibiting an act provides a penalty for the performance of the act. It has to be observed that in business, contracts under the credit agreement must be in writing and contain certain prescribed matter (Gibson, 1988). Impliedly prohibited contracts include the sale of liquor without a valid licence. The essential in the formation of the contract is the aspect of consideration. There is need to consider the capacity of the person involved in a contract to acquire legal duties. As such contracts involving minors, drunk persons as well as mentally ill persons are considered as void. Another essential tenet of the formation of a valid contract is that the parties must communicate their intentions to each other. Hofman (1999) posits to the effect that if a reasonable offeree believes that there has been an offer, the law will likely to agree given the cornerstone of contract law theory is that contracts should protect reasonable reliance. Whether written or agreed verbally, a contract is binding and it is a reflection of what has been agreed by two parties involved. This is reflected in the case of Watermeyer v Murray 1911 AD 61 at 70. As such, if a person makes an offer without realising it but reasonable people would rely on it, then the offeror is bound. The golden rule in this case is that the offeror must not make offers which he may not be able to fulfil given that these can negatively impact on his business. Another important aspect that must be taken into consideration by Mr Budgburys is the aspect of acceptance. In this case, acceptance shows consent which is an essential part in the formation of a valid contract. Once the offer

Monday, November 18, 2019

Warehousing and Inventory Management Essay Example | Topics and Well Written Essays - 2000 words

Warehousing and Inventory Management - Essay Example Raw materials, components, and finished goods are among the most common material one can find in a ware house. The history of warehousing can be traced back in the form of granaries that were supposed to store food. As the world came to know about sea routes and trading through sea routes that was the time warehouses found its first form. Port was the centre of warehouses followed by rail road stations. Among the very first organization was American Warehousemens Association, 1891, that was established to manage the warehouses and protect the rights of the one who give to store from rail road companies control over freight depots. War World true was the time when warehousing was groomed and new techniques and methods were implemented from efficiencies and design was modified as well for effectiveness. In the late twentieth century, warehouses was supposed to lose its importance among the industries because of many technological improvements, the IT hype and methods like Just In Time inventory system that don’t have essential place for the warehouses. But in21st century they are coming back with more than just storage facility. Warehouses are supposed to be 3rd party logistics in now days. 1. To store the seasonal products especially the agriculture commodities those are seasonal and were not available throughout the year. This was the need to have a proper storage in order to maintain and preserve the excess to use throughout the year. Management and monitoring of materials in warehouses can be done through software that came under the head of Warehouse Management System. (WMS) Today, there are warehouses that care completely automated and optimized in terms of effectiveness and efficiencies. There are automated warehouses without any labour and shift goods from a point to another through automated mobile shelves. In the fast pace world of today, the power of automation is hard to

Saturday, November 16, 2019

Strategies for Breaking Wireless Protocols

Strategies for Breaking Wireless Protocols CHAPTER 1 INTRODUCTION 1.1 Background Starting of wireless Network is a result of a research Project carried out by University of Hawaii. Initially its called as Aloha net, but later it used to call as Wireless Local Area Network or WLAN. At the beginning of aloha net, is capable of transferring 1 to 2 mbps data. But over the last few years aloha net changed to WLAN and it came with so many enhancements to the initial technology. Newer days, wireless networks become more popular than the wired networks. The main reason for this is, wireless networks are high in portability and the flexibility, increased productivity, and lower installation cost. Wireless Network Devices let Users to move their laptops from one place to another without warring about their network connectivity. Minimizing the wiring gives the maximum flexibility over the network and it reduces the wiring cost for the whole network infrastructure. However, when we comparing the security factor, wireless networks are more vulnerable to attack by outsider than the wired network. Main reason for this is, anyone can see and make the initial connection through the wireless network. But establishing the initial connection in a wired network is bit difficult than the wireless network. Loss of confidentiality like password cracking and man in the middle attacks are typically associated with wireless networks. Some other way, this kind of attack can easily practise in wireless Networks rather than the wired network. Even though a wireless network has this kind of problems, its not a failed concept. The main reason for that is we can protect a wireless network in maximum and make invincible from unauthorised users or attackers. Configuring the wireless devices correctly and accurately can minimize the attacks. We are going to discuss about this topic in future. 1.2 Objectives Breaking wireless protocols is the main objective in this project. Mostly the WEP, WPA and WPA2 will be my major preference. So the goal of this research is break the wireless protocol and get data from the wireless devices and the network. 1.2.1 Comparison of Hacking Tools Available. There are lots of tools that can use to hack a wireless protocol. Some of the tools are very user friendly. We can install it on our Windows Based Systems and it does our work very easily. Those tools are 100% Graphical User Interface and very easy to use. AirCrack-ng Windows version is the common example. But Some Other tools are available; we need to have some technical knowledge to use those tools. Mainly those tools run on command base mode and running platform is Linux. These tools do not provide any graphical user Interface, and bit difficult to learn without any proper guidance. But the final result is very accurate than the windows version. The major difference between these two types of tools are the software which runs on linux is more accurate than the Windows version. So I have decided to use Linux version hacking software to carry out my testing. But to hack a wireless network we need few of software to download from the internet. And then we can install those on a Linux machine and we can start the research. But, I think its very easy to use a one operating System rather than struggling with lots of softwares. So I decided to download latest version of worlds famous Hacking Operating System â€Å"Back Track†. It has built in hacking tools that need to hack a wireless network. 1.2.2 Downloading related software. Back Track is free to download, and its open source. Anyone can download Back Track from its developers web site www.backtrack-linux.org for free. So I have downloaded the latest version of Back Track v4 to carry out my research. We will discuss about BackTrack in further chapters. 1.2.3 Cracking WEP Using AirCrack-ng In order to crack a WEP Password, I have chosen few amazing tool. That is BackTrack 4 Hacking Operating System. It has all the hacking tools to crack a WEP Network. Airodump-ng can use to get the information about the wireless network and then I can use the Aircrack-ng to crack the password. 1.2.4 Cracking WPA Using AirCrack-ng We Can Use the same Process to Crack the WPA using AirCrack-ng. Same as in WEP I am going to use the Airodump-ng and Airoreply-ng to collect all the informations about the wireless Network and AirCrack-ng to decrypt the Password. 1.2.5 Cracking WPA2 Using Cowpatty In here, I am going to use a special cracking Software to crack WPA2. The software is Cowpatty. Cowpatty bit different than Aircrack-ng. And cowpatty specially designed to crack WPA and WPA2 Passwords. All these tools are built-in tools which we can find in the BackTrack4 Linux based operating system. So I dont need to download these softwares from the internet. 1.3 Dissertation Structure This Documentation mainly divided in to 4 Main Chapters. Including entire Practical and theoretical concepts. Chapter 1: Introduction In this section, I am going to give a introduction about what is wireless Network, Start of the Wireless Network and Basic Problems that wireless Networks faced. In the Second Section explain about the whole Research objectives and aims. Chapter 02: Literature Review This Chapter Consist all the theoretical informations relating to my research. In here I am discussing about wireless Networks and its Types, Wireless Network Devices, Security Methods that WLAN Uses, WLAN Security Protocols, Deep discussion about WEP, WPA and WPA2, Protocol Hacking tools like Air Crack-ng, Cowpatty, and Hacking Methods that use by the Hacking tools. Eg: Dictionary Attacks, Brute Force Attacks etc. Chapter 03: Methodology In here, I am going to show my Practical Work that I have done all over my research. Installing the Hacking OS, Use of Hacking tools, Problems Faced all over the project and the final results will be my main concerns. Chapter 04: Result and Discussions In this section I am comparing all the results I have gain all over my project. Chapter 05: Conclusions This Chapter will be my conclusions of the Research. In here i am planning to compare my final result and the objectives in my initial project proposal. CHAPTER 02 Literature Survey 2.1 Wireless Networks Wireless Networks enables to communicate devices without any physical media. These Networks are divided to three main categories according to their communication level. Those are, Wireless Local Area Network, Wireless Wide Area Network, Wireless Personnel Area Network. Wireless Wide Area Network has larger coverage than the WLAN and WPAN. WWAN uses 2G or 3G Cell Phone Networks to connect each and every device in the network. WLAN represents local area network that connected using wireless access point or a wireless router includes 802.11. WPAN is a small network topology. This includes Bluetooth and Infrared technologies. 2.1.1 Wireless Local Area Networks As I Mentioned earlier, Wireless LANs has more portability and flexibility over traditional Wires Local Area Networks. In WLAN, All the Computers and other devices connect to each other using Wireless Access Points also called as APs. And Access points communicated with the Wireless Network Adaptors that fixed in to computers. Access Points normally has coverage are up to 75-100 meters. In that area users can move their laptops and other wireless devices while maintaining their network connections. We can connect access points together and expand the wireless LANs coverage. In my thesis, I am going to discuss more about wireless LAN in further chapters. 2.1.2 Wireless Wide Area Networks This is the most familiar wireless Network type for everyone. This networks are Combinations of few WLANs. In these networks, Antennas acts as the access point for all WLANs. There are connections between Antennas to Antennas, to expand the Service of the network. Mobile Phone Networks also a good example for WWAN Networks. 2.1.3 Wireless Personnel Area Networks These Networks are so smaller when comparing to the other networks. It does not give much coverage as other 2 network type we discuss earlier. And this network does not require Main Access Point to make the connection with other WPAN Devices. Source WPAN device directly connect to the other WPAN device when its needs to transfer data. 2.2 Wireless Local Area Networks This is the most important topic of my thesis. We are going to discuss about this topic all over the project. As I mentioned in my objectives I am going to analyse the security of WLAN and Break few of WLAN Protocols. Before that we need to get a clear Idea about â€Å"What is WLAN?† and â€Å"How it operates?† WLAN is same as the wired Local Area Network. But the only difference is, its using wireless method to connect all devices. WLAN combined with the Client Station and the Wireless Access point. The Client Station connects to the AP (Access point) using the wireless Network Adaptor. We can connect the wireless adaptor to the computer using Personal Computer Memory Card International (PCMCIA) slot or using the USB Port. IEEE 802.11 is the Standard of WLAN technology. The coverage of the Wireless network totally relay on the Strength of the Wireless Access Point. Normally its can covers up to 75-100 meters circular area. 2.2.1 Architecture of 802.11 Standards This architecture allows initiating a peer to peer connection between Client Station and the wireless Network based on access point in an infrastructure network (WLAN). The coverage area of an access point called as a â€Å"Cell†. A Cell also called as â€Å"Basic Service Set† (BSS). The collection other cells of the infrastructure network called as Extended Service Set (ESS).Any access point that work with 802.11 standards has this 2 data sets for their functionality. BSS is the most important data set in the Access point. BSS contain all the information about wireless Network. This is the security key negotiation protocol of the Access point. BSS consist of APs Hardware name, Communication protocol informations, Signal strength etc. The Access Point identify in the WLAN using a specific identifier. This is called as â€Å"Basic Service Set Identifier† (BSSID). When Laptop or any other wireless device needs to connect to wireless network via access point, the guest station (Eg: Laptop) searches for the available access points in the area by releasing discovery packets. If there any access points available, APs respond to the guest station by sending the BSSID. Normally BSSID is in a Human Readable format. BSSID also called as â€Å"AP Name or Router Name† by Technical personals. This identifier always represents a Specific Access point. Likewise each and every access point of the network has its own BSSID. NOTE: BSSID is very important to accomplish my main objective of the project. We need to retrieve the routers BSSID before we crack the routers password. We can discuss about the retrieving methods in future chapters. 2.2.2 Advantages of WLANs Following are the advantages. Increased Mobility- Users can be mobile while accessing to all the network resources. Fast Installation Installation of the network is very quick since there no adding wires like wired network. Flexibility anyone can easily install and uninstall a small wireless Network. 2.2.3 Wireless Protocols Use in Wireless Networks There are 3 main wireless protocols use by the 802.11x wireless networks. Those are, Wired Equivalent Privacy This Protocol primarily protect the WLAN uses being a victim from eavesdropping. WEP uses 64 bit RC4 key to generate encrypted data and then those encrypted data transferred over the network. Wi-Fi Protected Access This is introduced by the Wi-Fi Alliance to overcome certain restrictions in WEP. This uses Temporal Key Integrity Protocol (TKIP) to encrypt the wireless data packets. Wi-Fi Protected Access Version 2 This is the latest movement in wireless LAN Protocols. Only the Difference is WPA 2 introduces new AES algorithm to be much more secure than the WPA. These 3 protocols widely using in wireless Networks. Every protocol has significant advantages and disadvantages. In the next chapter I am going to illustrate features, advantages and disadvantages of each and every protocol. 2.2.4 Wired Equivalent Privacy (WEP) WEP is an authentication protocol that use in 802.11 wireless networks to secure all the transmitting data. This protocol introduced in 1997 and main intention was increasing the confidentiality of the data than wired network. Any wireless network that uses WEP encrypt the data packets using RC4 cipher stream generated by a 64 bit RC4 key. IEEE 802.11 has few basic features when it comes to Security. These concerns provide a better security for the wireless environment. This all security elements embedded in to the wireless network protocols. Following are the basic security concerns in a wireless Network. Authentication This is the main goal of the wireless protocols. This means identifying the Client Station by using a password. If any client station failed to comply with this requirement the AP will deny giving the access to the Client Station. Integrity In here, the data should not be changed while it transmitting from the AP and/or to the AP. That mean those data should not be a victim of active attack. Confidentiality in this goal, the Protocol should protect the security of all data elements that transmit. In other word, the data should not be a victim of passive attacks. 2.2.4.1 Authentication 802.11 Networks have 2 kinds of authentication methods. â€Å"Open System Authentication† and â€Å"Shared Key Authentication†. 802.11 Authentication Open System Authentication Shared Key Authentication Any Client Station can join The Station should Provide the To the network without authentication Network password in order to join Network In Open system authentication does not use any cryptographic password to gain access to the network. Any client station can connect to the network and use the network resources. As an example, Internet facilitys in a public locations like Air Port or a Bus Station. In these places anyone can connect their Laptop or PDAs to the Wireless Access Point and start browse the internet. No Password required at all to login to the network. In open system method, the client station sends its MAC address just as a reference to the Access point. Then the AP makes that client as a member of that APs network. The major problem with this authentication mode is its vulnerable to attack. Shared key authentication is password based authentication model. The client must have the password to make the connection with AP. when client made a request to the AP that asking the connection, the AP generate a challenge and send it to the client station. If the client station responds to that challenge correctly AP gives the permission to be a member of wireless network. Figure 2.7 give the clear idea about the Shared Key authentication. Authentication Request Challenge Response Confirm the Result 2.2.4.2 Integrity 802.11 Standards also concerns about the integrity of the data transmitted. This always checks the data content whether it got changed while happening the transmitting process. It uses Cyclic Redundancy Check (CRC) approach to check the content of data. Once the CRC completed those data encrypted by using the RC4 key Stream. On the receiving end, data will be decrypted and again check for CRC to check the integrity of the data. If the receiving end CRC value does not match with the initial CRC value the data will be rejected and retransmitting will be required. WEP Uses an algorithm called Stream Cipher to encrypt all the data. It expand short version of key in to a random key stream. The sender encrypts the Plain text along with the Short key and creates the cipher text. In the receiver end has the same short key to decrypt the data. Once the data stream received by the recipient, it uses the short key to generates cipher text back to plain text. If one data bit lost on its way to the destination, the decryption process will mislead the data in to incorrect information. To prevent this problem WEP has â€Å"Cyclic Redundancy Check† to keep up the Message Integrity correctly. 2.2.4.3 Privacy 802.11 standards use cryptographic techniques to support Privacy. It uses RC4 Symmetric Keys to protect the data. Normally 802.11 standards support different cryptographic key lengths to protect the data from a attack. Generally, WEP supports 40 bit cryptographic key size for the shared key. But numerous vendors support different key sizes like 104 bits and 128 bits. Increasing the key size increases the security of the cryptographic technique. 2.2.4.4 Problems with WEP Even though WEP has so many security measurements to protect the transmitting data, it has few failures. These failures make the way, an attacker to break the security of WEP and lost the Integrity and privacy of the transmitting data using WEP. 2.2.4.4.1 Shared WEP Key WEP Uses single security key to Access the network. So this key should be distributed to all the users who access the network. So this security key might go to an attacker very easily who trying to get the access to the network. 2.2.4.4.2 WEP Key Size As I mentioned earlier, WEP uses 40 bit Cryptographic Key Size. This key can be crack very easily regardless of the time. So the encryption key is not sufficient to provide a better security for data. 2.2.5 Wi-Fi Protected Access This is a WLAN protocol created by the Wi-Fi alliance. This is created because of several weakness of the WEP Protocol. WPA has some advanced features when comparing with WEP. To get the optimum performance from the WPA, The WPA protocol implements the majority of the IEEE 802.11i standard, and was intended as an intermediate measure to take the place of WEP while 802.11i was prepared. Specifically, the Temporal Key Integrity Protocol (TKIP), was brought into WPA. TKIP could be implemented on pre-WPA wireless network interface cards that began shipping as far back as 1999 through firmware upgrades. Because the changes required fewer modifications on the client than on the wireless access point, most pre-2003 APs could not be upgraded to support WPA with TKIP. Researchers have since discovered a flaw in TKIP that relied on older weaknesses to retrieve the key stream from short packets to use for re-injection and spoofing. [wiki/WPA] 2.2.5.1 Features of WPA WPA uses Temporal Key Management (TKIP) as its Key encryption system. WPA does, Data Encryption and Discretion based on TKIP technology. It uses 128 bits for encryption using RC4 cipher. 2.2.5.2 Temporal Key Management TKIP along with the WPA has introduced three security features to overcome some security issues that come with WEP networks. TKIP mixing the security key with the initialization vector before it pass it to the cipher routine. In our case TKIP uses RC4 as the cipher. This method avoids certain kind of key attacks that came along with WEP. And then, WPA protects the data packets against reply attacks by implementing a sequence counter to the data stream. Finally its implements a message integrity check called â€Å"MIC† to check the consistency of the data stream. As i mentioned earlier, TKIP uses Rivest Cipher 4 (RC 4) as its cipher. Rekeying, also an important feature of TKIP. And the most important feature is TKIP always ensure to send data with a Unique Encryption key. But in certain situations it uses same mechanism like WEP. So TKIP also vulnerable to some kind of attacks which WEP faces. Any how the advance development of Message Integrity Check, Isolated Key Hashing on every packet, Sequence Counter prevents those attacks successfully. The Best thing is TKIP resolving most of the problems came along with the WEP. The next section discuss about that. 2.2.5.3 Michael Message Integrity Code Unlike WEP, WPA uses special feature to check the integrity of the transmitted message. This is called as Message Integrity Code (MIC). This is also called as Michel. This is a short cryptographic checksum that use to authenticate a message. This is also known as Message Authentication Code (MAC). This is a 64 bit algorithm that controls several types of attacks like, Splicing Attacks, Payload Truncation, and Fragmentation Attacks. 2.2.5.3 Extensible Authentication Protocol (EAP) EAP is an Authentication Method that widely use in wireless networks. This is not specifically designed for wireless networks. This can be use to authentication in wired network as well. EAP use to transmit the packets containing Authentication informations. WPA and WPA2 Networks supports 5 EAP Authentication Mechanisms as it Authentication Standards. Those are, EAP-TLS, EAP-SIM, EAP-AKA, PEAP, LEAP. 2.2.5.3.1 EAP-TLS EAP-Transport Layer Security is well known among Protocol for wireless communication. TLS provide very strong confidentiality for the User Credentials. This uses PKI to secure the communication between the AP and the RADIUS Server. EAP-TLS is the original, standard wireless LAN EAP authentication protocol. Although it is rarely deployed, it is still considered one of the most secure EAP standards available and is universally supported by all manufacturers of wireless LAN hardware and software. [Wiki/EAP] A compromised password is not enough to break into EAP-TLS enabled systems because the hacker still needs to have the client-side private key. The highest security available is when client-side keys are housed in smart cards. This is because there is no way to steal a certificates corresponding private key from a smart card without stealing the card itself. [Wiki/EAP] 2.2.5.3.2 EAP-SIM EAP for Subscriber Identity Module used for authentication and Session key distribution using the Global System for Mobile Communication (GSM) SIM. [Wiki/EAP] 2.2.5.3.3 EAP-AKA EAP for Authentication and Key Management Agreement is used for Authentication and session key distributing using the Universal Mobile Telecommunication System (UMTS). [wiki / EAP] 2.2.5.3.4 PEAP PEAP is a joint proposal by Cisco Systems, Microsoft and RSA Security as an open standard. It is already widely available in products, and provides very good security. It is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create a secure TLS tunnel to protect user authentication. [Wiki/EAP] There were two PEAP sub-types certified for the updated WPA and WPA2 standard. They are: PEAPv0/EAP-MSCHAPv2 PEAPv1/EAP-GTC The terms PEAPv0 and PEAPv1 refer to the outer authentication method, the mechanism that creates the secure TLS tunnel to protect subsequent authentication transactions. EAP-MSCHAPv2, EAP-GTC, and EAP-SIM refer to the inner authentication method which facilitates user or device authentication. [Wiki/EAP] 2.2.5.3.5 LEAP The Lightweight Extensible Authentication Protocol (LEAP) A proprietary EAP method developed by Cisco Systems prior to the IEEE ratification of the 802.11i security standard. [Wiki/EAP] LEAP uses a modified version of MS-CHAP, an authentication protocol in which user credentials are not strongly protected and are thus easily compromised. Along these lines, an exploit tool called ASLEAP. [wiki/EAP] 2.2.6 Wi-Fi Protected Access 2 WPA 2 implements IEEE 802.11i standards same as the WPA. WPA 2 supports Advanced Encryption Standards as the encryption cipher. This is an encryption standard that implement by US Government. 3 block of ciphers available in the AES. Those are AES 128, AES 192, and AES 256. In WPA2, Advanced Encryption Standards using counter Mode-Cipher Block Channing to provide the high confidentiality to the data. [Microsoft] WPA2 architecture must contain following network components to provide better security to the network. An Authentication Server to authenticate the users, Robust Security Network to maintain the pathways of associations, and AES based methodology to provide the privacy, integrity and authentication. The authentication server holds all the user name and passwords of the users of wireless network. When a user wants to connect to a network that uses WPA, The User must provide His / her identical user name and password when the network asks for it. Then the AP sends that informations to the Authentication server to verify the validity of the user to access network resources. Once the authentication server gave a positive feedback, the user allows connecting to the network otherwise the request will be discarded. 2.2.6.1 The Four way Hand Shake The Authentication Process has 2 Parts, the access point (AP) still needs to authenticate itself to the client station (STA), and keys to encrypt the traffic need to be derived. The earlier EAP exchange has provided the shared secret key PMK (Pair wise Master Key). This key is, however, designed to last the entire session and should be exposed as little as possible. [1] Therefore the four-way handshake is used to establish another key called the PTK (Pairwise Transient Key). The PTK is generated by concatenating the following attributes: PMK, AP nonce (ANonce), STA nonce (SNonce), AP MAC address, and STA MAC address. The product is then put through a cryptographic hash function. [1] The handshake also yields the GTK (Group Temporal Key), used to decrypt multicast and broadcast traffic. The actual messages exchanged during the handshake are depicted in the figure and explained below: [1] 2.2.6.2 Group Key Hand Shake The GTK used in the network may need to be updated due to the expiry of a preset timer. When a device leaves the network, the GTK also needs to be updated. This is to prevent the device from receiving any more multicast or broadcast messages from the AP. [2] To handle the updating, 802.11i defines a Group Key Handshake that consists of a two-way handshake: [2] The AP sends the new GTK to each STA in the network. The GTK is encrypted using the KEK assigned to that STA and protects the data from being tampered using a MIC. The STA acknowledges the new GTK and replies to the AP. [2] 2.3 Differences between WEP, WPA and WPA2 2.3.1 Encryption Methods WEP uses only one encryption method for the whole network, but in WPA, encryptions are dedicated for every user. One user has its own encryption method. 2.3.2 Authentication In WEP Authentication, it uses Open or Shared key authentication method. In WPA operates on Pre-Shared Key Method. As well as WPA uses an authentication server to validate the user and it using EAP to send all the informations to the Server. But WEP does not use any authentication server. 2.3.3 Security Protocols and Key Streams WEP uses WEP as their Security protocol. This is a primary wireless protocol that has few loop hols for attackers, in WPA use Temporal Key Integrity Management as the security protocol. WPA 2 uses bit advanced security protocol than both of the WEP and WPA. It uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP). WPA and WEP both use Rivest Cipher 4 as their cipher, but WPA 2 uses Advanced Encryption Standards. WEP uses 40 and 104 bits key length for the encryption key. WPA use 128 bit for the encryption and 64 bit for the Authentication. WPA2 uses 128 bit key streams for the both Encryption and the authentication. 2.3.4 Data Integrity and Key Generation WEP use Cyclic Redundancy Check 32 bit Method to check the Integrity of the data. WPA use Michael Message Integrity Code to check the integrity of data. WPA2 has CBC-MAC for that operation. WEP does the key generation by using Concatenation. In WPA used â€Å"Two phase mixing function (both TKIP and RC4)†. WPA2 doesnt require any key generation. 2.4 Security Threats Associated with Wireless Networks As Discussed above, nowadays wireless networks become more popular than the wired networks. Many organisations including Commercial Companies, Hospitals, government offices and most of the houses use wireless networks to facilitate different services. But the problem is WLAN are not 100 percent protective from attacks. 802.11x networks are vulnerable to certain attacks. There are thousands of papers and reports available in the internet that describes those kinds of attacks and security threats to WLANs. These security threats mainly target on Confidentiality, Integrity and Network availability. WLAN attacks normally divide in to 2 types. Those are â€Å"Active Attacks† andâ€Å"Passive Attacks†. Then those 2 main classes sub divided into types of attacks. 2.4.1 Active Attacks Active attacks are the most dangerous attack type. In here, hacker or the unauthorised party gain access to the system and do the modifications to the system or the message transmitting. This outcome a receiving an incorrect message stream or a file to the recipient. Active attacks result a loss of integrity of the network. Active attacks are possible to detect by using special software like packet monitors. But the problem associated with this kind of attacks are, its difficult to prevent these kinds of attacks. Active attacks can be sub categorised in to 4 Methods of attacking. Following explain those, 2.4.1.1 Masquerade In here, Attacker imitates as an authorised user in the network and gains the access to the network. This kind of attacks can be happened in few ways. The first consideration is authorised user give away the password to an unknown person or a group of people. So automatically they are possible to get access to the system. The other consideration is hacker can use some software pieces to collect the passwords or access keys of authorised users. There are many methods to perform this kind of attack. Installing Key Board Activities Recording software is a very successful method to collect these kinds of informations. 2.4.1.2 Reply The Attacker can monitor the transmissions of the source and destination machines and re transmit the informations as a legitimate user. So the attackers computer acts as the Source and destination accordingly, to get the actual source and Destinations informations. Reply attacks are offline attacks. The attacker first gathers all the data and then later decrypts that information. This informations could be users authentication session informations that carries WLAN password. 2.4.1.3 Message Modification In here, attacker tries to modify a particular message or informations. This could results a transmitting wrong informations to the legitimate user. 2.4.1.3 Denial of Service This is a very popular attack type and very easily does in a WLAN environment. The main goal of this attack is make the network unavailable to the users. it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely [wiki]. This attacks cause Loss of Network a

Wednesday, November 13, 2019

Gender and Sexuality in Sports Essay -- Gender Athletics Essays

Gender and Sexuality in Sports When individuals, male or female, decide to enter a non-traditional sport for his/ her gender, there will inevitably be benefits and costs. Because sports themselves are divided along gender and race lines, one would expect that individuals who intend to play a sport deemed by culture and by society as counterintuitive are bound to be criticized and alienated because of their choices. Difference automatically threatens conventions, traditions, and expectations, and hence, it threatens the individuals who belong to that traditional sphere. Because sports are affected as much by funding as they are by issues of diversity and accessibility, the following questions address those issues: which group of people have access to what sports (the type of resources a school has determines the number of athletic opportunities and leagues that are available), what racial groups are represented more in which sports (African Americans are over represented in basketball but they are under represented in iced hockey, whites are over represented in winter sports but they are underrepresented in football), and how do those two questions overall affect a society and culture's response to "deviations?" Generally, society has certain gender constructions that apply directly and indirectly to sports. Men are primarily thought of as physically stronger, more aggressive, and more physically active. Hence, men involved in sports are seen as fulfilling part of their experiences as men. Because they are men and because society has all these expectations about men and their physical abilities, sports becomes an arena in which men can prove, assert, and measure their manhood. In past generations, men could assert their masculin... ...ge, it is important that men and women challenge society's convenient notions about masculinity, femininity, and culture. Men and women in sports must use their art and their talents to question not only the validity but also the premise from which expectations, criticism, and conflict arise. Being involved in sports, regardless of its effects on one's personal life and regardless of the barriers that are created especially to hinder individuals from making choices, opens doors to others who are interested in pursuing a nontraditional sport and who need the support of others like them. Ultimately, the sports world must help validate individuals and their abilities; individuals must defy the sports world and its expectations when its intent is to perpetuate and create divisions among men and women, among homosexuals and heterosexuals, and among races and ethnicities.

Monday, November 11, 2019

Mirror, Mirror on the Mind Essay

The sight of a stranger’s foot getting hammered induces an instant surge of sympathy within us. Watching a friend nauseate after eating something repulsive quickly causes our own stomachs to turn. This ability to understand and relate to another individual’s internal state has provided great motivation for research. One source of explanation arose from research on mirror neurons-which fire both during execution and observation of a behaviour (Rizzollati & Arbib, 1998). This particular class of neurons plays a crucial function in human social interactions. The importance of the mirror neuron system (MNS) for communication can be understood through its influence on nonverbal communication including facial expressions and hand gestures and verbal language. Furthermore, disorders affecting human communication-such as autism and schizophrenia-convey the impression of stemming from a malfunctioning MNS. Generally, human social interaction involves both verbal and nonverbal forms of communication. Obvious examples of nonverbal communication are facial expressions and hand gestures. A recent functional magnetic resonance imaging (fMRI) study by Montgomery and Haxby (2008) found evidence supporting the claim that the MNS contains distinct representations for facial expressions and hand gestures. Particularly, this study examined the inferior parietal lobule and the frontal operculum as the potential MNS brain regions involved in nonverbal communication. Further evidence comes from another fMRI study by Montgomery, Isenberg and Haxby (2007)-which demonstrated the activation of the MNS during hand movements used to manipulate objects and hand gestures used to communicate. A third fMRI study by Van, Minderaa and Keysers (2007) highlighted similar results by examining other putative MNS brain regions-inferior frontal gyrus, posterior parietal cortex, insula and amygdala-thought to be associated with facial expressions. Activity spontaneously increased in the MNS of participants that produced and observed certain facial expressions (Van et al., 2007). A study by Enticott, Johnston, Herring, Hoy, and Fitzgerald (2008) demonstrated an associations between mirror neurons and facial emotion processing. Instead of using fMRI as a method of analysis, Enticott and colleagues (2008) used the transcranial magnetic stimulation (TMS) technique. In brief, much evidence supporting the involvement of the MNS in the processes of facial expression and hand gesture exists. Such forms of communication form the basis for the later, more complex, verbal language development. Taking this thought further, verbal language also seems to be linked to the MNS. Firstly, Rizzollati et al. (1998) marked the discovery of mirror neurons in the F5 area within the monkeys’ frontal cortex. This primate-specific F5 area has been considered to be the homolog of the human Broca’s area, which is a region crucial for language (Rizzollati et al., 1998). With this in mind, Horwitz et al. (2003) demonstrated that both spoken and signed language are associated with mirror neurons firing in Broca’s area as a result of the production of language. In addition, an fMRI study by Aziz-Zadeh, Wilson, Rizzollati, and Lacoboni (2006) made evident that the MNS of the premotor cortex is activated both when participants observed mouth, hand and foot movements and when participants read phrases related to these body parts. Overall, these findings suggest that indeed the MNS influences verbal language. Moreover, another way of understanding the importance of the mirror neurons’ influence on human social interaction is by considering the consequences of a malfunctioning system. Autism spectrum disorder is characterized by social and language impairments. In other words, individuals with autism tend to be less interactive when it comes to communicating with others. Part of the MNS-the posterior inferior frontal and rostral inferior parietal areas are affiliated with social behaviour and imitative learning; however these areas have deficits in autistic individuals (Locoboni & Mazziotta, 2007). In one study individuals with autism spectrum disorder showed significantly different electroencephalography (EEG) recordings of mirror neurons compared to a control group consisting of healthy individuals (Oberman, Hubbard, McCleery, Altschular, Ramachandran, & Pineda, 2005). Similarly, schizophrenia is another disorder characterized by deficits in social communication, especially of the nonverbal type. Research by Kato Y., Muramatsu, Kato M., Shibukawa, Shintani, and Mimura (2011) using magnetoencephalography recordings on the right inferior parietal cortex showed atypical mirror neuron activity in non-treated schizophrenia patients. Likewise, similar results were found in a study that tested mirror neuron activity using TMS,; it was demonstrated that during action observation a reduction in motor facilitation occurs in schizophrenia patients (Enticott, Hoy, Herring, Johnston, Daskalakis, & Fitgerald, 2008). Clearly, communication impairments observed in individuals with autism and schizophrenia are influenced by the MNS. In conclusion, human social interaction is influenced by mirror neurons. Evidence supports this statement through research done on the involvement of the MNS in nonverbal communication, including facial expressions and hand gestures and verbal language. Research has also suggested that an impaired MNS negatively affects social interaction, which is exemplified in the cases of autism and schizophrenia. Taken as a whole, combining mirror neurons’ role in imitative behaviour and social interaction-the process through which humans possibly acquire new social knowledge becomes evident. Additionally, the presence of mirror neurons in primates as well as humans provide evidence for the development of social interaction over the course of evolution. Thus, in order to further strengthen their existing relationship, future research should examine the co-evolution of mirror neurons and social interaction.

Saturday, November 9, 2019

Define Cultural Tourism And Urban Conservation Tourism Essays

Define Cultural Tourism And Urban Conservation Tourism Essays Define Cultural Tourism And Urban Conservation Tourism Essay Define Cultural Tourism And Urban Conservation Tourism Essay Chapter 1 Introduction 1.1 Introduction Malaysia is an attractive touristry finish which offers a broad scope of touristry chance. Tourist can see in different type of activities including cultural, nature, urban, beach resort, island or Highlandss. Tourism sector generated RM 53.40 million in 2009 and it is expected to continually turn in 2010. This enables touristry as one of the of import sectors lending to the Malaysia s economic system. In conformity with the declaration of the Comprehensive Development Plan ( CDP ) as the construction program for Iskandar Malaysia in Johor Bahru, Johor Bahru metropolis Centre will be developed as a urban vivacious metropolis. One of the aims from the development program is to conserve heritage value and historical edifices in Johor for accomplishing holistic development. Conserving and continuing heritage and historical country non merely critical in inheriting traditional civilization but it could besides function as attractive forces for heritage touristry ( Hollinshead, 1988 ) . 1.2 Problem Statement Quickly growing of economic system stimulates development of metropoliss. In order to get by with the job of urban metropolis image and intensive land usage, cultural and historical edifices in the center of the metropolis are used to be sacrificed to give manner to the modern designed high-rise edifices. However, there was a contrast in urban development recently whereby as a consequence from the turning of urban competition, planetary metropolis formation and nomadic capital flows, the more alone, typical and particular a metropolis is, the more likely it has to win ( Askew A ; Logan, 1994 ; Yuen, 2005 ) . This changes lead to the tendency of heritage and historical preservation to specify individuality of the community. This state of affairs is best shown by the development policy implemented by Singapore in the early 1970s and late seventiess ( Lee, 1996 ) . In the early 1970s, dilapidated shophouses in the Central Area of Singapore were demolished to do manner for modern high-r ise edifices. However, by late of 1970s, the authorities policy shifted from renovation to preservation. Transformation and alterations in urban development shows the of import of heritage preservation for the interest of urban competition and planetary metropolis formation. Though preservation is of import to keep cultural value of heritage and historical edifice, yet, the construct of preservation should non simply concentrate on the physical heritage preservation but should included the intangible portion of heritage value in which is best illustrated by the local community activities. Yuen ( 2005 ) explained both landmarks in the reinforced environment and general civilization of a topographic point contribute to formation of topographic point individualities and vicinities. A heritage site is simply a historical relic or important landmark of a finish. However, if there is connexion between the local community and the physical edifices, it would convey a life to the site and finally make individuality and sense of topographic point in the locality. Jonker s Walk in Malacca is best index for sense of topographic point and individuality of the locality, besides as the Urban Heritage. Harmonizing to Shuhana, 2004, street represents people s perceptual experience of metropolis character and individuality. This is because since the early civilisation happened in the universe, human used to set up and develop their community get downing from street. Street is said to be another chief properties demoing local individuality as socio-economy activities evolves bit by bit until it forms today metropolis. In brief, urban preservation comprises of both retaining the historical edifices physically and rapid Restoration to heighten ethic-based activities to make strong sense of topographic point and topographic point individuality of a metropolis ( Lee, 1996 ) . Johor Bahru metropolis has been awarded its metropolis position in 1994. Power ( 2001 ) described metropolis Centre as a topographic point of cultural magnets, singular edifices, attractive streets, public assets and societal assets centered. Johor Bahru metropolis Centre is a vivacious metropolis where major economic activities, administrative organisations and singular historical edifices converged. Over old ages of urban development, the Johor State Government has decided to take enterprises for Johor Bahru metropolis greening in order to renew the metropolis. Iskandar Malaysia ( once known as Iskandar Development Region, IDR and South Johor Economic Region, SJER ) was launched on 30 July 2006. It is one of the five economic development corridors established under the 9th Malaysia Plan. The schemes of put to deathing the regional economic development program are carried out through the Comprehensive Development Plan, CDP. The Comprehensive Development Plan lays on the 10 rules of Islam Hadhari ( Civilization Islam ) taking in accomplishing holistic and sustainable development in the part. The execution of legion investing and development undertakings in line with the Iskandar Malaysia in Johor province purposes in accomplishing holistic and sustainable socio-economic development laid on the 10 Islam Hadhari ( Civilization Islam ) rules. Besides that, the aims of the Johor Bahru City Transformation Plan as one of the development undertakings under 10th Malaysia Plan, is to transform Johor Bahru metropolis into a modern and dynamic urban Centre through betterment on substructures, public utilities, waterway cleaning and security. Both undertakings portion one similarity that is betterment on substructures and public comfortss. The transmutation program besides focuses on conserving and continuing the interior metropolis of Johor Bahru as one of the schemes in accomplishing the aim. Bing the State Capital for about 155 old ages, Johor Bahru metropolis Centre is abounded with the alone features of multiethnic civilizations and impressive historical edifices. Such historical edifice includes State Secretariat Building ( Bangunan Sultan Ibrahim ) , Grand Palace and Royal Abu Bakar Musuem, Railway Station Keretapi Tanah Melayu Bhd ( KTMB ) , Sultan Abu Bakar Mosque, Jahor Bahru Chinese Heritage Musuem, Johor Chinese Old Temple and more than 200 old shophouses ( pre-war edifice ) within the Johor Bahru interior metropolis. These edifices serve as important landmark of the metropolis. Harmonizing to the Comprehensive Development Plan, Johor Bahru metropolis Centre will be earlier designated as heritage precinct. However, harmonizing to Shackley ( 1998 ) , over-use of heritage assets can trip physical impairment ; harm its touchable and intangible values which will finally cut down tourer experience. Mckercher ( 2001 ) responded to Shackley statement by adding significance to its contrast, under-use can take to missing ability to coevals of gross for preservation work or a loss of local support for keeping the assets attraction, peculiarly if public resources are needed to back up its operation. This issue has been loosely discussed and studied in which nexus to the heritage touristry direction and urban direction construct. Millar ( 1989 ) explained the construct of heritage touristry direction is about saving of alone properties of heritage sites to enable the properties to be continually attractive to the tourers. Mc Grill ( 1998 ) clarified the aims in urban direction which is to be after for provide and keep a metropolis s substructure and services and to guarantee that it is in a fit province. The thought merges from both constructs is that, it is of import to pull off the heritage site in order to maintain and keep the attraction of the heritage assets. The cultural value and physical value of the historical relics is closely related. Bing the representors of the yesteryear, it is of import that the representors tell and present as what it should hold to, enable tourers to experience the existent historical experience. In order to continue and conserve the heritage value, the term urban preservation and urban direction has been introduced in 1950s and 1960s through the literature. Steinberg ( 1996 ) identified five major facets in urban preservation which are political facet, cultural facet, societal facet, economic facet and urbanisation facet. In Wong et Al ( 2006 ) survey, six listed standards for urban direction for metropolis development: betterment in physical conditions, economically feasible, socially just, culturally sustainable, environmentally sustainable and institutionally feasible so has a really same significance of the five facets proposed by Steinberg ( 1996 ) , for betterment in physical conditions and environmental sustainable can be classified as urbanisation facet whilst institutionally feasible can be classified as political facet. Both surveies emphasized on the same facets. This shows that every facet is important in success of urban preservation and demand to be conside red when carried out the preservation schemes to guarantee it run into the aims of urban preservation for regeneration intent. Although past research has been done on the important of each facet towards urban preservation and urban direction, yet, there is no research done in analyzing the feasibleness of transforming Johor Bahru interior metropolis as a cultural touristry metropolis utilizing the abovementioned facets. Although there are attempts putted on the preservation of heritage and historical value of Johor Bahru interior metropolis by the province authorities through series of proposed program. However, it is of import for the local community ( stakeholder of the peculiar country ) to be cognizant and act providentially towards the authorities planning. The research inquiry from the treatment is whether the Johor Bahru interior metropolis is executable to be developed as Cultural Tourism City? 1.3 Research Aims Based on the research inquiries above, the aim of the survey is as the followers: To reexamine the feasibleness facets of urban preservation and rehabilitation. To look into the feasibleness of transforming Johor Bahru interior metropolis as a Cultural Tourism City. 1.4 Scope of Study The research country will merely concentrate on Johor Bahru interior metropolis country merely. The targeted respondents are different in every phase of informations collect. However, the targeted respondents can be summarized as panel of expert, local authorization officers, Iskandar Development Region Authority ( IDRA ) officers and local stakeholders of Johor Bahru interior metropolis. 1.5 Significance of Study Upon completeness of the research, it will lend to the academic and cognition with the application of urban preservation, town planning, installations direction and touristry direction in sustainable and holistic development of historical interior metropolis in an urban metropolis. The research will add value to the bing cognition by uncovering the practicableness of integrating the theoretical cognition in the existent universe. Furthermore, completeness of the survey is important to the State Government, local authorization and touristry decision makers as it serves as counsel for implementing development and betterment relevant schemes in relation on transforming the metropolis. Besides, it is important to the existent estate professionals because they will be cognizant on the alterations of land usage and zoning of the metropolis country which will finally impact the market value of the environing belongings. On the other manus, installation direction squads will be alarm on the demand for conserving and keeping old edifices in Johor Bahru metropolis Centre country. Last, the local community will be good from the research as upon the completion of the research, local community will be cognizant on the of import of their function in lending to the attempt of preservation of Johor Bahru interior metropolis. This is because planning is a failure if the local themselves are guiltless on the current personal businesss and development to be carried in their country. 1.6 Research Methodology This survey is divided into five phases in order to take the writer to accomplish the research objectives. The flow of this research is shown in the Figure 1.1 Phase 1: Research Background The chief intent of this phase is to place and bring forth a conceptual construction of the survey. Topic of the survey is foremost identified. Issue related to the subject is discussed and reviewed with back uping facts. Next, the aims and range of survey is determined. Last, significance of the survey as to whom and how it is good is identified. Phase 2: Literature Reappraisal Theoretical information on features that define cultural touristry and urban preservation is gathered and reviewed. Fundamental for urban preservation and urban direction is reviewed through literature in order to obtain the model and construct for the subject. Besides that, brief debut on historical background of selected sites will be introduced in this phase. The related information can be obtained through diaries, conference proceedings, undergraduate and graduate student undertaking and related mentions books. This secondary information serves as the basic in back uping the survey and fixing the questionnaires. The five facets which are political facet, cultural facet, societal facet, economic facet and urbanisation facet in urban preservation revealed from past research will be used as cardinal for appellation of questionnaires. Phase 3: Datas Collection Collection of primary informations sing urban preservation and land usage schemes of urban development in transforming Johor Bahru interior metropolis will be done through multi-approach technique. Data aggregation will be carried out in several phases to garner relevant informations for survey of five different urban preservation for cultural touristry facets which are political, cultural, societal, economic and urbanization facets severally. Expert judgement, interview, observation and questionnaires will be utilized to garner informations. An open-ended questionnaire, together with the Comprehensive Development Plan will be used to obtain adept judgement. Structured inquiries for interview will be designed for construction interview. Questionnaires will besides be designed and distributed to the local stakeholders in the survey country. Observation will be done on the survey country to look into and make stock list of historical edifice in the survey country. Phase 4: Datas Analysis Main undertaking in this phase is to analyse informations gathered from the study. Datas obtained from the interview would be analyzed utilizing both quantitative and qualitative technique. Datas obtained from interviews will be analyzed qualitatively by utilizing thematic analysis. Whilst informations obtained from questionnaires study will be analyzed quantitatively through descriptive analysis, cross tabular matter and frequence analysis. Findingss from analysis will so be discussed to place the feasibleness of the Johor Bahru interior metropolis to be developed as cultural touristry country. Phase 5: Decision and Recommendation Decision for findings in the survey will be made in this phase. Strength of Johor Bahru interior metropolis to be developed as cultural touristry metropolis will be highlighted in the decision. Suggestions on get bying failing ( if any ) of the interior metropolis will besides be focused at the terminal of this phase. Future recommendation will be stated at the terminal. 1.7 Summary of Research Methodology Purpose Phase End product Determine the subject, issue, aims, range and significance of the survey. ( I ) Research background Topic, issue, aims, range and significance of the survey are identified. Define cultural touristry and urban preservation ; reviewed construct and cardinal for urban preservation. Literature reappraisal Relevant constructs and fundamental of cultural touristry and urban preservation are reviewed. Identify targeted respondents ; design and distribute questionnaires ; interview panel of expert. Data Collection Response from targeted respondent are collected. Analyze informations and discourse the findings. Datas Analysis Datas are analyzed and discussed. Strength and failing of the survey country identified. Conclude the findings ; do recommendations and suggestions. Decision and Recommendation The findings are concluded ; recommendations and suggestions are stated. 1.8 Chapter Agreement The survey consists of six chapters. The agreement of the chapters is as follow: Chapter 1: Introduction Introduction to the subject and research background is discussed in this chapter. The job statement sing the research subject, aims of the survey, range of survey, significance of the survey, research methodological analysis and chapters arrangement were highlighted in the chapter. Chapter 2: Urban Conservation and Cultural Tourism Theoretical information on definition and account of urban preservation and cultural touristry is foremost discussed. Fundamental for urban preservation and urban direction is gathered through literature reappraisal. Detailss on the five facets in urban preservation and urban direction for cultural touristry will be discussed in deep in this chapter. Chapter 3: Case Study: Johor Bahru City Centre This chapter is focused on the debut of the historical background of Johor Bahru metropolis Centre, brief description on the tourer reaching tendencies and the kernel of Comprehensive Development Plan of Johor State. Historical edifices and cultural finishs in the Johor Bahru interior metropolis will be introduced at the terminal of the chapter. Chapter 4: Research Methodology Detail description on research methodological analysis used in this survey is discussed in the chapter. The description on research design, research procedure, informations aggregation attack, respondents choice and informations analysis method is focused in this chapter. Author will utilize multi-approach technique ( adept judgement, interviews, observation and questionnaires ) to garner relevant informations. Both quantitative and qualitative analysis will be utilized for informations analysis. Qualitative analysis ( thematic analysis ) will be used to analyse informations obtained from interview whilst quantitative analysis ( descriptive analysis, cross tabular matter and frequence analysis ) will be used to analyse informations obtained from questionnaires study. Chapter 5: Datas Analysis and Findingss Data collected is being analyzed utilizing relevant analysis tools and analysis techniques. Findingss will be presented utilizing relevant mold technique to develop better apprehension towards the result of the survey. Discussion on the findings is the chief focused in this chapter. At the terminal of the chapter, strengths and failings of Johor Bahru interior metropolis to be developed as a cultural touristry metropolis will be identified. Chapter 6: Decision and Recommendation Decision from the findings will be made to confirm whether the findings achieve aim of the survey. Suggestions and recommendation in get bying the failings ( if any ) will be made at the terminal of the survey.

Wednesday, November 6, 2019

What You Need to Know About Becoming a Paramedic

What You Need to Know About Becoming a Paramedic As a general rule, a paramedic is not someone you want to see- if they show up, that means something has likely gone very wrong. But as emergency first responders, they’re definitely the people you want on call for when things do go wrong. Paramedics are often the first on the scene of an accident, illness, or crisis. They perform immediate life-saving measures, if necessary, and stabilize patients en route to a hospital or doctor’s office for further diagnosis and treatment. The Day-to-DayLicensed paramedics, who are among the most skilled emergency responders, do not work in a 9-to-5 setting. Rather, they work in shifts around the clock, and are often on call at all hours, including weekends and holidays. The â€Å"office† may be a dispatch center or on the road in an ambulance, traveling to and from emergency calls. Paramedics provide emergency medical care and rescue services based on incoming calls or requests and can be employed by private ambulance compani es, fire departments, hospitals, or other rescue agencies.Also, know that paramedics are not interchangeable with Emergency Medical Technicians (EMTs). They go above and beyond first aid and basic patient transport, having the extra training and licensing that allows them to perform advanced medical intervention if necessary- intubating patients so they can breathe, inserting IV lines, and administering medications.Becoming a paramedic is definitely not for the faint of heart. Even though the stereotypical â€Å"blood and guts† aspect is only a small part of what paramedics do (which also includes helping chronically ill patients in addition to accident victims or those with sudden or acute sickness), paramedics are often called to dangerous and active rescue scenes. Stress and on-the-job injuries can result from the hectic life of a paramedic, so potential candidates should be aware of the risks.For more on the daily life of a paramedic, read about it in this Lifehacker inte rview with Paramedic Andy Orin or watch this video interview with Paramedic Kelly Grayson.The RequirementsParamedics need to complete a postsecondary degree program, pass an exam, and apply for a license. The paramedic course of study usually takes 1,200 to 1,800 hours to complete. And although every state requires paramedics to be licensed, each state may have different requirements, so be sure to check out your own state’s regulations.The SkillsParamedics receive training in a number of areas, including:CPR and first aidPatient airway treatment and managementPharmacology (medications)Traumatic injury managementInserting IV linesBasic patient medical careManaging acute conditions (such as diabetic shock, strokes, or heart attacks)General clinical trainingThe PayPer the U.S. Bureau of Labor Statistics (BLS), paramedics earn a median salary of $31,700.The OutlookThere’s no shortage of emergencies, unfortunately, so the demand for these highly skilled, essential first re sponders will continue to grow. The BLS expects that the demand will expand at least 24% by 2024, significantly faster than most other jobs and industries.The life of a paramedic is one of both hectic activity (when things are busy) and anticipation (down time when no calls are coming in). It’s an extremely demanding, stressful, and challenging field, to be sure- but if you have a fondness for adrenaline and the ability to stay icy cool under the hottest pressure, then it just might be the right Allied Health career for you to consider.Interested? APPLY HERE

Monday, November 4, 2019

Port Maritime Legislation Assignment Example | Topics and Well Written Essays - 250 words

Port Maritime Legislation - Assignment Example Majorly the Smart Port Security Legislation has in place a strategic arrangement that boosts the international supply chain security through partnerships in fighting vices such as terrorism. The legislation also has modalities for recognizing the shipper programs of other nations that are trusted, while fostering its main objective of enhancing the security of supply chain. This enhancement of security is done through identification of security gaps within the supply chain and making them more secure in the whole supply chain beginning from the manufacturing process to the supplies stage (Klein, 2011). The Safe Port Act is an amendment of the 2002 Homeland security act for the establishment of a domestic office for nuclear detection within the homeland security department. The safe port legislation has preconditions for putting in place standards and equipment for scanning and radiating all the containers getting into the United States ports. This legislation specifies protocols to follow for responding to emergencies, which involves cooperation across the private sector, federal, local and state administrations. With this legislation, there is stipulation for inspecting containers christened â€Å"high risk† before they can arrive into the United States. Apart from those provisions, the legislation reinforces custom trade partnerships especially that work towards mitigating terrorist activities. According to Klein (2011), the Small vessel Security strategy attends to the risk that of smuggling of mass destruction weapons or terrorists into America. Other risks it attends to include the possibility of the small weapons being used as platforms for launching weapons either directly or indirectly though the water ways. Apart from addressing these threats, it gives descriptions of the small vessels and their suitable operating environments. The objectives of this

Saturday, November 2, 2019

The social determinants of healthcare delivery service Essay

The social determinants of healthcare delivery service - Essay Example Social determinants of health can be regulated to improve the health conditions of countries. Through the adequate distribution of resources, the government can ensure that people have awareness about their health and have access to health care whenever they require it. Effective management and distribution of health care resources not only entails the treatment of a disease, but also its prevention. Preventing the occurrence of a disease can save a lot of resources not only financially, but also in terms of the staff, hospital resources and time that are spent on treating it. Obesity is becoming a serious health condition in the US and is starting to be referred to as an epidemic (Mechanic 112). Obesity is a global problem and more than 1.6 billion people all over the world are overweight. Of these figures, 300 million people are considered to be clinically obese, with a large proportion of overweight and obese people living in developed countries (Oxford Business Group 187). The obesity epidemic is at its very worst in the in the US (Plunkett). In the US, one person dies due to a health condition associated with obesity (Ayres). The US government spends $2 trillion annually on healthcare; about 76% of this sum is spent on the treatment and management of chronic diseases like diabetes, cancer, cardiovascular diseases and strokes. All of these diseases are linked to obesity. In an article published by Why, an organization working for the elimination of hunger and poverty in the US, it was reported that two-thirds of the Americans are overweight, and one-third are obese (Ayres). The annual health care costs of obesity have doubled in the past ten years in the country. A recen t research conducted by the government documented that the costs of obesity are as much as $147 billion a year (Ayres). Moreover, it has been reported that the number of obese children have increased very rapidly and this has had profound impacts on their health. In fact, according