Wednesday, July 31, 2019

Porters Forces Cruise Industry Essay

Porter’s Six Forces I. Threat of New Entrants: Low * Barriers to entry: High * High Capital Requirements: The capital required to start up a cruise line is one of the key factors contributing to this industry’s high barriers to entry. With the average cost of building a cruise ship rising, the amount of capital needed to start up a cruise line is estimated at one billion dollars. Therefore discouraging any new entrants into the industry. * High Brand Equity: A cruise line’s brand awareness and reputation are significant factors to the industry’s high barriers to entry. Cruising is a risk-averse activity, which influences consumers to trust and purchase from established cruise lines. That being said it would be difficult for any new entrants with low brand equity to successfully compete with this oligopolistic industry. (Dowling, 2010) * High Economies of Scale: The cruise line industry has a major cost advantage over any new rival based on two types of economies of scale. These cost savings contribute positively to the liners profitability. * Economies of Destiny: These â€Å"mega-ships† are built with a large number of cabins and lower berths aiding in the spread of substantial fixed costs over many passengers. Therefore, resulting in lower unit costs and making the product much more appealing and affordable to more parts of the population by achieving a break-even point at lower prices. Cruise liners also have a strong incentive to reach high utilization ratios in order to achieve such economics, which result to such discounting. (Dowling, 2010) * Economies of Fleet Size: This is where fixed costs that require a substantial financial capital such as research, design, construction, training, sales, administration, marketing and advertising are spread over a large number of ships. (Dowling, 2010) II. Rivalry Among Existing Firms: High * High Concentration Ratio: The cruise line market is characterized by high concentration, as there are a few but strong market players that make up 90% of market share. The two leading players, Carnival and Royal  Caribbean, account for 75% of the market with each owning a portfolio of lines catering to a specific market. A high concentration ratio allows existing firms to work together in the market and reduces the likelihood of intense price competition between the leading players. This allows them to achieve mass-market penetration. (Cruise Watch) * High rate of industry growth: The cruise industry has had a steady growth over the last five years with a 7.8% increase. The growth increase and high concentration intensify the competition among the leading players to seek ways of gaining a competitive advantage. â€Å"New ships, global destinations, itineraries, and innovative shipboard facilities have driven constant growth in cruise passengers. â€Å" (CLIA) * High competitor diversity: Cruising is characterized by high heterogeneity and this offers the chance for diversification both vertically (quality) and horizontally (variety). (Dowling, 2010) Because of this there is an intensive and ongoing commitment to provide a superior product by offering distinct services, activities, and appealing itineraries that reflect the interests of today’s traveler. Therefore, although the market is oligopolistic which keep competitive pricing low, competitors must make there cruise the most appealing to gain a competitive advantage. * High exit barriers: Cruise companies have high exit barriers due to the difficulty the company may have selling their assets. Cruise lines require large capital requirements that strap the company from leaving the industry and face difficulty when trying to find any potential buyers. III. Threat of substitutes: Medium * Types of available substitutes: In the leisure-industry substitutes includes resorts, theme parks, traveling by air or land, and various other vacation destinations. Research shows that in 2011 only 3% of Americans have vacationed on a cruise, leaving a vast percentage of the population choosing alternative vacations. * Distinctiveness of cruise experience: Cruising is perceived as a more expensive vacation alternative compared to land-based trips, however there is a strong belief among consumers that cruising offers high value for the price consumers pay. Cruising is looked at a full package by offering bundles of travel packages including airfare, dining, itineraries, resort stay, and multiple other amenities. Therefore, a cruise  offers a distinctive type of experience that most consumers would choose over various other traveling substitutes. (UCLIA) IV. Bargaining power of buyers: Medium * Travel agencies: Travel agencies have strong relationships with the cruise industry as they book around two thirds of their cruise. Although this percentage is declining due to the growth of consumer knowledge and technology the percentage of cruisers using travel agents is relatively strong. (UCLIA) * Low price sensitivity: As cruising may be categorized as a luxurious leisure-activity, its target market on average have high annual income of $82,000 – $97,000 with the average age of a cruiser being in their late forty’s. Therefore, they are not as sensitive to pricing, as the price of a cruise vacation is relatively low to the average income of the target market. * Peak seasons: During peak seasons when demand exceeds capacity buyers have lower bargaining power as opposed to when ships offer last minute discounts in order to avoid any empty berths. Therefore making the bargaining power of the buyer medium as competition is relatively high during these seasons, and extreme discounts are offered when demand decreases. * Low threat of backward integration: The huge amounts of capital required to purchase a cruise ship along with the various amenities included make it extremely difficult for any consumers to provide themselves with the cruising experience. Therefore, lowering the bargaining power of the buyer. V. Bargaining power of suppliers: Medium * Fuel and Ships: The bargaining powers of fuel and ship suppliers are relatively high. An increase in the price of fuel not affect the fuel cost of the ship but will cause an increase in the ticket price in order to make up for increased cost. As there are a limited amount of ship building lots and ship builders cruise lines must accept the number given to them. If they do decide to switch builders switching costs are very high because the ship builder owns the design of the ship he builds and therefore the company must raise a large amount of capital in order to go back to the drawing board. * Food and other suppliers: However on the other end most all other suppliers in the hospitality leisure-industry have low buying power. This is because there are many different substitutes available and multiple  suppliers to choose from ranging from food, drink, and alcohol to many others. This makes the bargaining power of suppliers on the other end very low. VI. Relative power of the stakeholders/ Complimentors : High * Rapid Growth: The rapid growth in the cruise industry has resulted in spiked environmental stress and awareness. The cruising destinations offered are frequently those in threatened environments such as the Mediterranean and Caribbean. There are many ways cruise lines can team up with other stakeholders in order to reduce the environmental impact of this growing market. They can work together with local governments and communities to develop management plans for sustainable growth, create standards, and increase their passenger and crew awareness of environmental issues. Companies may also directly contribute to sustainability by investing in local community projects and organizing on-board fundraising. (Mittermeier) * Governments: â€Å"Governments are responsible for enacting policies that protect natural and cultural resources, and providing a supportive enabling environment, for example, by offering financial or business incentives to cruise lines and local businesses for responsible management and operational practices.† (Mittermeier) Therefore, companies must maintain a positive and trusting relationship between governments and other stakeholders in protecting the environment. This will ensure the passengers on board will enjoy a safe vacation and the destinations remain healthy and attractive to the passengers who will visit in the future. Work Cited: Cruise market watch . (n.d.). Retrieved from http://www.cruisemarketwatch.com/market-share/ CLIA. (n.d.). Profile of the u.s. cruise industry. Retrieved from http://cruising.org/pressroom-research/cruise-industry-source-book/profile-us-cruise-industry Cruise lines international association, inc.. (2012, February). Retrieved from http://www.cruising.org/sites/default/files/pressroom/2012CruiseIndustryUpdat eFinal.pdf Dowling, R. K. (2010). Cruise ship tourism. CABI. Mittermeier, R. (n.d.). Sustainable stewardship. Retrieved from http://www.worldcruiseindustryreview.com/feature_articles/WCR017/Sustainable.pdf Rodrigue, J., & Notteboom, T. (1998). The geography of transport systems. Routledge. Retrieved from http://people.hofstra.edu/geotrans/eng/ch7en/appl7en/ch7a4en.html Wheelen, T. L., & Hunger, J. D. (2012). Strategic management and business policy. (13 ed., pp. 159-161). New Jersey: Pearson.

Tuesday, July 30, 2019

Atticus Finch In Harper Lee’s To Kill A Mockingbird Essay

In Harper Lees To Kill a Mockingbird, Atticus plays a major role in his children growth and development. He is a role model to his children and to Maycomb, one of the few willing to take actions against prejudice. His actions can be summed up in one great quote of Thomas Jeffersons These truths we hold to be self-evident: that all men are created equal, that they are endowed by their creator with certain inalienable rights. Atticus does not approve of racism, and teaches his children to judge by character, not race. Atticus thinks that even black men have at least one right, the right of justice. He expresses his belief in this phrase. But there is one way in this country in which all men are created equal- there is one human institution that makes a pauper the equal of a Rockefeller, the stupid man the equal of an Einstein, the ignorant man the equal of any college president, and that, gentlemen is a court. (Lee 205) This quote shows Atticus passion for justice and equality, saying that all are equal in this court, and that you should judge a man by his economic or mental aptitude, nor by the color of his skin. He means by this statement that you should be unbiased and fair when making a decision, or even a persons fate. Atticus believes all people have their flaws and strengths, and should be judged as such, not by their gender, social standing, or color. He shows this in a moving quote, You know the truth, and the truth is this: that some Negroes are immoral; that some Negro men are not to be trusted around women – black or white. But his is a truth which applies to the human race and to no race in particular. (Lee 204) Atticus once again sets the scales of equality even with this statement, explaining his moral code of justice, and how each and every person should judge each other equally. Jems breakdown whenever the court room is mentioned is evidence of this point. Atticus believes that any man using a man of any other color is inferior even to the man he is using. He illustrates this a talk with Scout, Youll see white men cheat black men every day of your life, but let me tell you something and dont you forget it-whenever a white man does that to a black man, no matter who he is, how rich he is, or how fine a family he comes  from, that white man is trash. (Lee 220) Atticus means that if you take advantage of someone or treat them as though they were Less equal, then you, yourself, are you are a horrible, inferior person. On the other hand, if you treat everyone as your equal then they are your equal. Atticus believes in what Martin Luther King later put to words in his famous I Have a Dream speech, That men would not be judged by the color of their skin, but by the content of their character. Throughout To Kill a Mockingbird Atticus has been a role model and mentor to his children by condemning racism and all that it stands for. 1. Harper Lee’s To Kill a Mockingbird2. The Declaration of Independence, Thomas Jefferson3. I Have A Dream, Martin Luther King Jr.

The Educational Reforms Policy Education Essay

The Educational reforms policy has extremely valued the betterment in the instruction sector in Pakistan as stated by Education reforms Policy 2009. On the other manus national authoritiess and employers have argued that it is of import for all sectors of instruction to fix persons who are able to believe good and for themselves ( Pithers, Rebecca sodden 2010 ) . The states with most economic growing and development have rather a good educational substructure and as stated above, They work rather difficult on supplying quality instruction through available resources. Therefore we have a job of importance of incorporating critical thought with the current educational reforms. In this assignment I will foreground some of the instruction sector reforms along with the construct of critical thought. First portion constitute of state portfolio, followed by the work of authorities in the instruction sector and it as the instance survey which is subsequently on followed by an history of the policy of authorities and schemes it presented which shows the complete scenario subsequently on an history on critical thought and it ‘s usage has been elaborated while the decision highlights how it can be used to better the bing authorization of instruction reforms.1.2 Country portfolio:Pakistan became an autonomous state in 1947 when British India split into a Muslim province of Pakistan and a mostly Hindu India. The state is a federation of four states, each one with a parliamentary system, federally administered Tribal Areas and Islamabad Capital Territory. The four states are Punjab, Sindh, Khyber Pakhtunkhwah ( KPK ) and Balochistan. Pakistan is situated in South Asia, surrounding India to the East, Iran to the South West, China to the North East, and Afghanistan to the West and North. To the South is the Arabian Sea. Pakistan is an Islamic Republic. Since 1947 the state has experienced a assortment of democratic and military authoritiess. Pakistan has approximately 162 million dwellers ( 2005 estimation ) . Most, 97 % of the population is Muslim. The state is composed of several cultural groups of which Punjabi is the largest and rest include Pashtuns, Balochi and Sindhi while several smaller cultural groups. Punjabi is one of the most widely spoken linguistic communication along with Urdu as the official linguistic communication and English as the linguistic communication of disposal. The public is immature and fast turning with a mean age of 19.58 old ages and a public growing rate of 2.03 % . The state has an estimated literacy rate someplace between 48 % and 54 % depending on the beginnings and the definitions used ( 10 years+ or 15 years+ ) with large gender differences and differences between rural, tribal and urban countries. 32 % of the public lives below the poorness line. The chief employment is within agribusiness sector ( 42 % ) , while 38 % of the human resource work in services while 20 % in industry. The state has been hurt from long internal differences, a low degree of foreign investing in the private sector and wars with India. However, in recent yesteryear, helped by macroeconomic betterments and an addition in industrial production, Pakistan has practiced a positive ec onomic disposition, with an one-year growing in GDP of 6.1 % . The Fundamental law from 1973 ( article 33 ) needs development of an instruction policy to safeguard the saving, pattern and ascent of Islamic political orientation and rules as enshrined in the instructions of the Quran and the Holy Prophet. The National Education Policy ( 1998-2010 ) clearly states the aim of doing Islamic instruction the codification of life incorporated in all signifiers of instruction. The instance survey:1.3 Education Sector Reforms.The Government ‘s I-PRSP sets endeavoring marks for polishing instruction sector results and the Government has moved to set in topographic point programs to accomplish these marks. The Federal Minister of Education used an Education Sector Reform ( ESR ) plan in 2001 which seeks to offer national leading around the Education For All program every bit good as reference major sectorial issues. The ESR wants to turn to these achievements have been challenged in the past few months, and the Pakistan economic system has been adversely affected by the post-September 11th events. The Government is at work to remain the declared class of action and endure to turn to the organisational reform docket. Some of the critical letdowns of the yesteryear in the instruction sector by supplying resource mobilisation and use, and presenting institutional reforms at every degree of instruction to progress in administration. Goals are set for increasing literacy, gross primary registration, in-between school and secondary registration and higher instruction, by the twelvemonth 2004. The attack for traveling towards these aims include a assorted figure of constituents and investings at all degrees of instruction, including an ample sum of literacy programme, enlargement of primary and simple degree instruction, conveying up of a proficient watercourse at secondary school degree, polishing quality of instruction through instructor preparation which is one of chief procedure of educational reforms, higher instruction sector reforms which chiefly aims at instruction higher than class 12, and public private subdivision partnerships. In add-on, the ESR includes new open uping plans in scrutiny betterment, a countrywide instruction appraisal system illustration of which are the HEC and quality confidence programmes, picture text edition libraries, along with early childhood instruction known chiefly as baby's room and an â€Å" follow a school † plan. The Islamabad Capital Territory is being utilized to prove a figure of the assorted enterprises consisting the e nlisting of instructors on contract bases, implementing preparation exercisings for caput instructors and instruction centres to assist better instructors ‘ educational cognition, promotion of entry makings for instructors and presenting a instructor focused codification of moralss to work out chronic instructor absenteeism. In the context of devolution/decentralization, administration betterments constitutes sturdily in the ESR. Mechanisms are being established to reorganise school control and citizens community boards, provide assorted extra resources for instruction and rationalisation of supervisors to territory degrees. The said Citizen Boards and School Management Committees are given duty for some elements of monitoring and supervising of instructor public presentation which is a critical portion of this country. Self-acting monitoring plans will besides be set up to grade policy and pattern. The ESR puts a high precedence on consolidation of public private partnerships in the conveyance of instruction services. Encouragements to the private sector to set up schools, peculiarly in rural countries and urban slums would be rather utile in this respect which include proviso of free of cost or concessional land, non commercial services rates, generous grant of charters, and exclusion of certain types of dues and revenue enhancements. The Government has besides taken the chief function in reformation of the Nationwide Education Foundation supplying it with greater independency under the Societies Act. The Sindh Government ‘s â€Å" Adopt a School † plan has been rather positive in intriguing corporate and other financess to concern text editions, schools uniforms, and other commissariats every bit good as preservation of edifices, and is being replicated in diverse parts of the state. In add-on the Government plans to absorb private sector and NGO schools into the Education Management Information System ( EMIS ) and the National Education Assessment agreement at national and provincial degrees. In tantamount with the federal authorities ‘s ESR creativeness, provincial authoritiess, wherever duty for instruction remainders, are besides get downing to set in topographic point steps that address some of the most cardinal jobs of the system, such as naming instructors to account through a re-certification procedure, associating wage with public presentation ( attending ) , assignment of new instructors on contract bases and specifically for school with assorted researching ways to run all available underutilized school edifices. Each state has begun to quite earnestly supervise teacher presence and subjective grounds of that has been provided in many countries. To spread out installations, a new start has been prepared on a large backlog of postponeded care and the plan of alot new militias has been rationalized. Education sections are holding duties of stock lists fresh schools and look intoing options for their use, inter alia through â€Å" undertaking out † bat tles.Theory used:The direction scientific discipline position of the popular organizational acquisition theory, specifically the ‘technical ‘ strand, has been used and applied to this peculiar survey ( Addleson, 1996 ; Easterby-Smith 1997 ) . It foresees that the university administration is infact a system that aligns its purposes to particular action programs to gain awaited results ( Agyris & A ; Schon, 1978 ) . As the university replies to alterations in its ambiance, it is possible that it will besides redefine its purposes or at least alter its action programs in order to obtain satisfactory results as it often adapts to its unstable ambiance. The state of affairs in which the university maps has been considered by worsening and intermittent authorities support, increasing societal authorization for higher instruction, increasing independency and answerability as required by the appraisal and quality bureaus. The reaction of the university can be a new or a counter active action program could be started by a feedback cringle when the anticipated results have non been attained. In the same manner, the responses of the university administration can be so prevailing that they move the said purposes or programs ( bing norms or values ) that will besides do new action programs to obtain satisfactory consequences. Curative programs or incremental fluctuations are the most common in university organisations ( Boyce, 2003 ) although considerable alterations in the usual norms have besides been reported ( for illustration Clark, 1998 ) . This theoretical statements have been applied as an interpretative model within which the responses of the university to public sector reforms have been evaluated. Similarly, as it is thought of, critical thought involves aptitudes in add-on to certain temperaments. They are brought to bear in placing a trouble and its associated conventions ; clear uping and concentrating the job itself ; and analyzing, understanding and doing usage of deductions, inductive and deductive logic, every bit good as judging the legitimacy and dependableness of the premises, beginnings of informations or information which is available ( e.g. Kennedy, Fisher and Ennis, 1991 ) .3. The educational reforms instance:The chief aim of authorities policy in the past few old ages has been to better the degree and quality of schooling in Pakistan. The authorities vision is to spread out primary instruction and this step can be used to measure whether authorities schools have augmented their coverage, by increasing registrations quicker than the growing in public, particularly at the lower degree because that degree forms the nucleus of the knowing population. Literacy and primary school registration rates in Pakistan have displayed development during last five old ages but they are still hanging behind other states of the part. Deficit of resources and deficient proviso of comfortss and preparation are the primary troubles in instructing and spread outing instruction. The present authorities ‘s program for the sector includes implementing the operation and usage of bing schools, developing the quality of instruction, spread outing registration, polishing entree to instruction and increasing the primary instruction system. Under the 18th constitutional amendment during the reign of General Pervez Musharraf ordinance and direction of the instruction sector has been devolved to the states. They are now held responsible for the assorted cardinal countries of the instruction sector i.e. course of study and course of study, centres of excellence, standardisation of instruction up to intercede degree ( Grade 12 ) and it besides includes the Islamic instruction. Planning and policy and standardisation of instruction beyond Grade 12 are covered under Federal Legislative List which is an of import factor in relationship to the reforms in this country. All the states have emphasized their committedness to the National Education Policy 2009.3.1 National Educational Policy 2009The National Educational Policy ( NEP ) 2009 is an accomplishment which aims to turn to a figure of assorted aims including: oˆ? quality and measure of instruction in schools and college instruction oˆ? cosmopolitan primary instruction which is a portion of UN docket oˆ? improved Early Children Education ( ECE ) known as baby's rooms oˆ? improved installations in primary schools both in rural and urban countries oˆ? change overing primary schools to simple schools oˆ? detaching categories XI-XII from college instruction oˆ? following a comprehensive definition of ‘free ‘ instruction which will supply instruction to every citizen oˆ? accomplishing regional and gender para particularly at simple degree in order to continue gender equality oˆ? provide demand based accomplishments and increase in the portion of resources for instruction in both public and private countries The policy besides defines the motivations of authorities at the federal every bit good as the provincial degree in the country of instruction. The National instruction scheme is being applied through a figure of different strategies and one of the of import strategy in this respect is the Quality Assurance Programme.3.2 Quality Assurance ProgrammeHarmonizing to information from HEC ‘s web site, the mission of the Quality Assurance Programme is to present an integrated quality and confidence direction service for higher acquisition where ends of the strategy are: aˆ? To analyze the spreads in the background of quality of higher instruction in Pakistan aˆ? To run into the tests of planetary adaptibility in higher instruction aˆ? To better the criterions of higher acquisition in cross-cutting countries and assorted degrees aˆ? To develop a executable and maintainable mechanism of quality confidence in the higher instruction sector of the state An adviser of Quality Assurance in HEC is in charge for induction of the Quality Assurance Programme. Under the Quality Assurance Programme, a Quality Assurance Committee was established in 2003. The commission is made of Vice Chancellors from assorted universities with the aim of holding representation from smaller and medium universities and universities for adult females and to better geographical equality. The Team has an extended end to guarantee the appraisal, betterment and publicity of higher instruction. The Committee articulates policies, steering rules and significances for higher instruction establishments, organize programs for the development of the establishments ( in cooperation with the establishments ) and sets up national or regional appraisal councils to transport out enfranchisement of establishments. One of the first undertakings of the commission was to decide on the Ranking of Universities. The ground for this judgement was to: â€Å" advance positive competition and Foster betterment in criterions of higher instruction programmes † ; â€Å" Harmonizing to the Powers and Functions of the Commission as stated in â€Å" Ordinance No. LIII of 2002, Para 10, Clause vitamin E † the Higher Education Commission may put up national or regional rating councils or authorise any bing council or similar organic structure to transport out accreditation of Institutions including their sections, installations and subjects by giving them appropriate evaluations. The Commission shall assist construct capacity of bing councils or organic structures in order to heighten the dependability of the rating carried out by them. † Accreditation councils in Pakistan have been established for calculating and technology, while councils for accreditation are besides planned for agribusiness, concern and instruction. National Computing Education Accreditation Council ( NCEAC ) NCEAC is another organic structure that is bettering the quality of instruction pupils receive in topics in applied scientific disciplines, calculating, technology and engineering instruction in the universities and assorted related establishments of higher instruction in Pakistan. The aims of the said councils are to vouch quality in calculating degree plans in educational establishments by guaranting that programmes run into certain distinguishable criterions or standards. It shall be obligatory for all relevant academic programmes delivered by public and private sector organisations to be accredited by NCEAC. It is besides an aim to guarantee transparence of tantamount survey programmes.4. Critical thought:Evaluation is considered as a nucleus ability. Attitudes or temperaments such as a ‘spirit of enquiry ‘ are besides seen by some writers in the field as really of import ( e.g. Ennis, 1993 ; Perkins, Jay and Tishman, 1993 ) . For illustration, Ennis ‘s position of critical thought involves wide temperaments, movable over different spheres such as being ‘open-minded ‘ , ‘drawing indefensible guesss carefully ‘ and ‘considering the credibleness of grounds ‘ . These capablenesss and temperaments occur with in a planetary mentality in which thought is abstracted as a type of reasoned statement with an explicitly societal dimension ( Kuhn, 1991 ) . Kember ( 1997 ) , after analyzing the available published research grounds, it is suggested that learning attacks in third instruction may be influenced by interaction of factors. For illustration, one factor, course of study made, was seen to act upon university and college lectors to be more subjective in nature when learning instead than on the development of critical thought. This may be due to the fact that content is normally specified far more to the full than perchance generalizable the abilities. It seems excessively that instructors are presented small aid in lighting what is encompassed in the impression of ‘good ‘ thought. Thus they are non clear on what it is they are supposed to be assisting pupils to come on. Not amazingly, deficiency of lucidity about the ability of critical thought leads to misperception about how good thought might be measured ; appraisal and rating of critical thought has been greatly neglected worldwide ( e.g. Kennedy et al. , 1991 ) . Continuing confusion about these jobs seems sometimes to take to education attacks to problem-solving which are dubious to develop more widely movable generalizable critical thought aptitudes and mentalities. Research in the UK farther instruction sector, where the growing of work related thought has been highlighted since the late eightiess, provides illustrations of instruction which is changing with this purpose. Teaching activities probably to develop critical thought were known to be rare in Social Care courses. This was a surprise, provided that the classs in this zone were an induction into a profession which values critical scrutiny ( Anderson et al. , 1997 ) . Bloomer ( 1998 ) reported a similar tendency based upon his research of a scope of assorted programmes taking to the General National Vocational Qualifications ( GNVQ ) . In these classs pupils engaged in much activity, although it seldom included critical scrutiny. However, there appears to be a deficit of published research which examines the advancement of critical thought during degree-level classs. In a survey of critical thought affecting 256 Scots and Australian university pupils analyzing instruction, an enterprise was made to size critical thought utilizing the Smith-Whetton Critical Reasoning Test ( CRT ) , a moderately valid and dependable standardised psychological trial with assortments available for both states viz. UK and Australia ( Pithers and Soden, 1999 ) . Average CRT sums were equated for class campaigners with grades and those who had no grade, every bit good as for stage ( twelvemonth ) of class. Overall, it was found that there were no notable between-group CRT differences for alumnus V non-graduate students or for phase or stage of the class. In fact, alumnus appliers had CRT tonss non significantly greater than nongraduates nor did last phase ( Years 2 and 3 ) pupils, on a average mark, achieved significantly better tha n Stage 1 pupils. As a whole, these consequences propose that the kind of critical thought restrained by the CRT, based on Ennis ‘s ( 1993 ) construct which is drawn shortly, was non being good developed in the third instruction class examined in both states. Nor did the critical thought abilities and temperaments measured by the CRT appear to hold been developed significantly by the pupils during their old survey at degree degree. Furthermore, CRT mean tonss for these pupils were non signi. cantly higher than the normative sample agencies provided in the CRT Manual ( Smith and Whetton, 1992 ) for schoolleavers who had taken scrutinies measure uping them for university entry ( e.g. in the UK, A-levels ; in Australia, HSC-level ) . In a subsequent paper ( in readying ) the writers report cases of critical thought in a sample ( n = 40 ) of essays for a similar grade class whose programme aims included the development of abilities encompassed by the term critical thought ; these abilities were described explicitly in class forms issued to lectors and pupils. Cases of critical thought were rare and there was a high frequence of averments without justification. Lectors, coachs and pupils seemed non to portion an apprehension of what it means to believe critically. These findings, possibly, should non be viewed as surprising, given the published literature over a comparatively long period about the patterns which inhibit critical thought ( e.g. Raths et al. , 1966 ; Sternberg, 1987 ) . Evidence that pupils enter higher instruction with developing ability to believe critically is another statement for happening effectual steps to advance this ability. Kuhn ( 1991 ) supposed that thought as statement was variably implicated in the beliefs people hold, the opinions they make and the decisions they arrive at ; it was at the bosom of mundane thought. Among Kuhn ‘s ‘skills of statement ‘ are the ability to suggest sentiments alternative to one ‘s ain and to cognize what grounds would back up these, to supply grounds that at the same time supports one ‘s ain sentiments while refuting the options and to weigh the equity of one ‘s ain cogent evidence and that of others. Kuhn provided cogent evidence that none of these aptitudes is widespread in the grownup population in the USA, even among those wh o have had a college instruction. In a UK engagement, Anderson et Al. ( 1997 ) confirmed that pupils ‘ thought, as conceptualized in Kuhn ‘s theoretical account, could be meaningfully improved ( over that of a control group ) in the normal course of study by infixing steps flinging the chief subjects in the literature reviewed in this paper. The better measure and quality of accounts the pupils incorporated into their study lettering by the 4th month of the invasion were still evident at the terminal of the academic twelvemonth. Many authors have highlighted that thought and content are closely related. These staffs imply that larning to believe involves larning to utilize content in in turn more sophisticated ways in understanding the universe. Barnet ( 1994, p. 153 ) suggested that an educational purpose should be the growing of wisdom, corporate exchange, and a acknowledgment even a review of interior appraisals ‘ . Bonnett ( 1995 ) claimed that any appraisal of ‘good thought ‘ which fails to afirm the dependability of content is likely to be lacking. Indeed there is sound matter-of-fact grounds that good cognition and good thought are Inseparably tied up ( Bereiter and Scardamalia, 1993 ; Chi, Glaser and Farr, 1988 ) . It appears critical therefore that critical thought is teached in the class of learning subject cognition and implemented through the available agencies at manus. Combination of these thoughts with the descriptions of critical thought already outlined, it appears that one direct and effectual step lectors and instructors could put in in their instruction is to set far more accent on the specific signifiers of concluding within their ain subject country and to supply illustrations of how these signifiers of thought can be applied both within and outside of that subject. Another of import strand in the discourse on ‘good thought ‘ which helps to mix the thoughts antecedently outlined is the impression of self-regulation of thought ( e.g. Schunk and Zimmerman, 1994 ) . The guess is that this metacognitive ability, for illustration, affecting perceptual experience, review, opinion and determination devising, are all factors which allows people to orchestrate and self-regulate their ain acquisition strategies and those capablenesss are included in the term ‘critical thought ‘ . It is critical to add them in the instruction reforms as stated by the groundss shown above where we see a deficiency of any existent important factor that indicates a motion towards foregrounding the accomplishment of term critical thought in the instruction reforms mandate.5. Decision:On the bases of the thoughts originating from the current reforms performed by the authorities in bettering the quality of instruction every bit good as the surveies of doing pupils more of a critical mind, the demands of the twenty-four hours are non merely to spread out the current instruction substructure but to do pupils a more critical minds so that better Human resource is available at every degree of the authorities and private sector. ( Pithers, Rebecca 2010 ) It will be really hard for a state that has so many jobs including the first and foremost of security issue since the government alteration in Afghanistan. The primary issues included in this respect are: unrest in the Baluchistan state and tribal countries, a batch of resources traveling waste on protection of atomic assets of the state along with a menace of confrontation with the adjacent India. At the minute the instruction reform looks to be concealing behind these issues of security, poorness and wellness. It is rather likely to stay like that unless a strong committedness from a sure authorities is shown. I suggest that the undermentioned docket should be entered into the instruction policy and implemented through the Quality confidences plans in order to develop critical thought in the pupils and better instruction in Pakistan. Research grounds suggests that larning to believe good needs to be acknowledged explicitly as an purpose and appropriate alterations made to classs. Lonka and Ahola ( 1995 ) interpreted their consequences as proposing that there are two qualitatively different ways of come oning in psychological science surveies: high-quality active acquisition, which may be decelerate in the beginning, but provides qualitatively better consequences in the long tally, and extremely structured lecture/tutorial instruction, which is related to success in early stages of analyzing. There would look to be benefits in passing the full grade course of study, so that the sum of freshman subject specific information could be reduced to let the pupils clip to prosecute in activities which are likely to develop their rational abilities. The inquiry of how much subject cognition is good for pupils demands to be revisited. Research suggests excessively at all educational degrees that staff development enterprises may necessitate to concentrate more on instructors ‘ constructs of instruction and learning if they are to set up the instruction methods suggested in a generative manner. In fact some empirical research specifies rather strong relationships between instructors ‘ constructs and instruction attacks ( Kember, 1997 ) .Teachers or lectors who are merely wining the guidelines in plan paperss do non look to learn rational well. Kember suggests that constructs of instruction can be summarized in footings of two wide alliances labeled teacher-centred/contentoriented and student-centred/learning-oriented.The teacher-centred orientation comprises beginnings that instruction is about leaving information or conveyance planned cognition, whereas the student-centred orientation includes beliefs that instruction is about easing apprehensions, advancing theoretical alteration and rational developm ent. It will be about clip that Pakistan ‘s instruction reform policy put a serious idea of presenting it into the current instruction scenario.

Monday, July 29, 2019

The Cliff Dwellings of the Anasazi Essay Example | Topics and Well Written Essays - 500 words

The Cliff Dwellings of the Anasazi - Essay Example However, regardless of the taxonomical ways in which current scholars debate the issue, the fact of the matter remains that a thriving civilization once existed in the Four Corners region and regardless of how it is called or classified, exhibited many of the same indicators that are currently attributed to the Anasazi people. As a function of better understanding this level of classification, this brief essay will seek to introduce the known facts, briefly discuss some myths and stories that exist with relation to these people, and settle upon a preliminary understanding of whether or not such a people group existed. One particular fascinating aspect of the myth and reality that has defined a further understanding of the Anasazi people is the evidence that archeologists and historians have recently uncovered with relation to the complex network of road systems that seemingly were built during this particular period of civilization within the Americas. The road system has long been discussed as part of Pueblo mythology and was not believed to actually exist (Kloor 22). However, due to recent studies and archeological research it has been proven that the road system does indeed exist. The root reason for this road system is still a topic of dispute due to the fact that many scholars believe and argue that the road system was economic in origin; as with almost all road construction that has taken place since the dawn of time. However, others indicate that the road system may have had the purpose of providing a way for the lost souls of ancestors to find their way back and forth between ceremonial c elebrations and other important events (Anasazi Culture 1). Although the debate is ongoing, there is a level of evidence from current Pueblo mythology that lends the most credence to the secondary interpretation alongside the fact that the true nature and level of development of the Anasazi economy are not known to a well enough degree to indicate that such an

Sunday, July 28, 2019

Employment System in Middle East Essay Example | Topics and Well Written Essays - 2250 words

Employment System in Middle East - Essay Example In the third section, a linkage is created between the poverty and employment. In the forth section, linkage of social welfare and employment is created and finally in the last section conclusion is given. Middle Eastern countries comprise of the following countries, i.e. Iran, Iraq, Kuwait, Bahrain, Oman Qatar, Saudi Arabia, UAE, Yemen, Israel, Jordon, Lebanon, Syria, Turkey, Cyprus, Egypt, Gaza Strip and West Bank. Not all of these countries are well established but there is a good demand of employment in these countries, especially Africa and Dubai. The Growth level in this system is emerging with the passage of time but unemployment rate has not declined to a greater degree. There is still a large amount of population unemployed. This paper focuses on the linkage between the poverty and employment & social welfare and employment. The section three and four will emphasize the two concepts in detail. In 2004-2006 when all the rest of the world was going through a recession in the employment industry, some middle-eastern countries passed through the job creation phase. There was employment opportunity in these areas because the private sector showed major development. There were a lot of foreign and domestic investments made by the local and foreign companies that boosted, enhanced and created job opportunities for the unemployment class. These job opportunities catered well as not only were the demand of the young, energetic, talented and capable people met but also these unemployed workers now were provided with the platform where they could put their best efforts to achieve their potential goals. But it sad to state that apart from all the opportunities, the unemployment level in the Middle East was still very high and a major sector of the workforce still remains unemployed. Middle East is also faced with another disappointing workforce practice, i.e. discrimination has been observed in the middle-eastern countries, as women who are a foremost source still experience through a high level of unemployment rate. It has also been stated that middle-eastern women are more talented and educated than as compared to men but regardless of all the efforts made they are still lacking far behind. This discrimination is widely observed in Egypt. The Middle East is experiencing high economic growth rate and it has been stated that from 2004 to 2006, its real GDP per capita had a 4.0 percent annual increase. But despite all these growths, Middle East also suffers from 25 percent youth employment (which is the recorded as the highest among all regions). Among the employed the highest level are new job seekers of age range of 15- 24 years who account for 50 percent of the unemployment in the region. On the other hand young people with secondary and post secondary education are also faced with employment issues such as mismatching skills and long queues for

Saturday, July 27, 2019

The U.N Humanitarian intervention in Syria PART 2 Case Study

The U.N Humanitarian intervention in Syria PART 2 - Case Study Example Article 1 and 2 of the Charter of the United Nations outlines the importance of recognizing the sovereignty of nations and their self-determinacy (Repertoire of the practice of the security council 1). The charter prohibits member states from forcefully intervening in the internal affairs of other states unless they either successfully seek the approval of the UN Security Council or react to protect their borders from external forces. This has played a major role in the humanitarian intervention, or lack of, in Syria. It has offered an obstacle for any nation willing to intervene in order to end the current crisis present in Syria. This restriction also covers the establishment of no fly zones and providing weapons to the rebel forces in Syria (United Nations 1). It is believed that powerful nations with permanent seats in the Security Council have used this provision to scuttle any attempt of intervention in Syria with Russia and China being the key accused. When the allegations of the use of chemical weapons by the government of Syrian on civilians and rebels in the region of Ghouta on 19 March 2013 surfaced, the United Nations embarked on a fact finding mission and presented a damning report that highlighted the use of sarin on civilians (United Nations 1). Consequently, the UN Security Council during its sittings showed a rare unity and passed Resolution 2118 in an attempt to ensure that the use of chemical weapons on civilians is not repeated. The resolutions demanded the destruction of the chemical weapons and prohibited the manufacture, accumulation and transfer of chemical weapons by Syria. Failure to adhere to the conditions set, the Security Council may impose penalties on Syria as per Chapter VII of the UN Charter (Repertoire of the practice of the Security Council 1). The United Nations, together with the League of Arab States, has played a key role in the search of a peaceful political solution in Syria.

Friday, July 26, 2019

Week 6 BUS Essay Example | Topics and Well Written Essays - 500 words

Week 6 BUS - Essay Example This condition is fundamental in case of any litigation. A mortgage refers to a document given by a lender of property, especially land, in order to create a lien on the particular piece of land. A mortgage involves two parties to the mortgage contract. These are the mortgagee and the mortgagor. The mortgagor is the borrower while the mortgagee is the lender of the property in quest. A mortgage contract also involves mortgage transfers, which are contacts involving banks. There are conditions, which must be fulfilled before a mortgage contract is enforceable in law are that the contract must be in writing. The particular document, which is used in the transfer of a mortgage, is called an assignment of a mortgage. According to Frank and Bahaudin, the mortgage contract gives the mortgagee the right to dispose the property in the event the mortgagor fails to cover the property debt (47). In a mortgage contract, either the mortgagee or the mortgagor with regard to the theory applied can hold the title of the property. In the case of a title t heory state, a borrower transfers the title to the lender over the period of the loan. Conversely, a lien theory state is a scenario in which the buyer of the mortgage holds the title of the property in quest. A mortgage is different from a deed on the issue of foreclosure. The document relating to the closure of escrow differentiates a mortgage from a deed. A covenant entails a pledge of property with an aim of securing a loan. In this regard, it is almost similar to a mortgage. A covenant involves a trust or and a beneficiary. In this case, the tutor is the borrower while the beneficiary is the lender of the property. The beneficiary is also known as a trustee, who holds legal title to the contractual property. The beneficiary helps in the selling of property, especially at auctions. The trustee can resort to the move when the borrower

Thursday, July 25, 2019

Analysis of a real life rhetorical situation Essay

Analysis of a real life rhetorical situation - Essay Example She also pointed out that the baby just needed supervision while playing with her toys making sure that the baby would not put anything in her mouth and would not be climbing furniture. She further reasoned that the baby was also easy to entertain with her blocks and her other toys. I was concerned about watching the baby because I had little experience watching over babies. I did not know how to change a diaper, nor did I know how to feed the baby her formula. I also did not know what to do in case the baby cried. My friend further reassured me that she just changed the baby’s diaper and she also just fed the baby so the baby would not need any changing or feeding in the next two hours. And by then, my friend said she would already be back from her errand. This rhetorical situation that I found myself in mainly involves my friend and her intention or goal to get me to watch her baby for about an hour. Her attitude is earnest as she is posing her request; she is worried about leaving her baby, but she knows she cannot take her baby with her. My friend is a full-time mother and has been married for 3 years now to a sales representative for a pharmaceutical company. Her extended family lives in another state and she and her husband moved in next-door about a year ago. She has credibility in her words and her actions because I could see she is distraught and worried about not having enough milk to feed her baby, but she is also concerned enough about my capabilities in caring for her baby. She takes the time to instruct me on what to do and what not to do while caring for the child. As an audience to this rhetorical situation, I am a student who is currently staying, for the weekend, at my parent’s house. My parents are away for th e weekend and I am alone in our house. I have had little experience caring for children as I am an only child and single. I am reasonably convinced that I would be able to watch the baby for about an

Wednesday, July 24, 2019

Economic Globalisation Essay Example | Topics and Well Written Essays - 2000 words

Economic Globalisation - Essay Example Opponents, however, are more likely to view globalisation as a nefarious plot for the global promotion of the capitalist interests of multinational/transnational corporations culminating, not only in the increased poverty of LDCs but, in the subjugation of nation-states to multinational corporations. While conceding that both perspectives are exaggerated, the following paper shall, through a review of the definition of economic globalisation and the role of global trade and multinational corporations therein, establish economic globalisation as primarily favouring the capitalist interests of transnational corporations. Globalization, by the very nature of its definition as the globalisation of capital, favours capitalist interests, is founded upon the promotion of free trade and actively promotes the interests of multinational corporations. ... Of all the various definition forwarded for globalisation the most accurate, and comprehensive, is probably that forwarded by Held and McGrew (2002, 249-250) and which maintains globalisation to be an economic phenomenon whose intent is the globalisation of capital and the imposition of a capitalist economic agenda upon the International Political Economy (IPE). Globalisation, according to the latter definition, is the removal of capital controls to facilitate the unobstructed movement of funds and resources across national borders (Soros, 1998). Such globalization of capital is further significant because it implies reduced control over trade, foreign investment and multinational corporate activities. As stated by the pro-globalization economists, the removal of capital controls implies, "not only an increase in productive capacity but also improvements in methods of production and other innovations; not only an increase in wealth but an increase in freedom" (Soros, 1998). As may be inferred from the presented definitions, economic globalisation is the removal of artificial barriers to trade, involving the imposition of capitalism upon the global political economy and, as such, ultimately serves the interests of multinational corporations through the facilitation of their capacity it engage in trade, as in the unfettered movement of capital goods across national boundaries. Consequent to economic globalisation, and bearing in mind the stated definition, "The modern system of independent nation states and distinct national economies is being replaced by a single transnational political economy. Power and authority are steadily shifting to global institutions and corporations. National

Managing for the future Essay Example | Topics and Well Written Essays - 6250 words

Managing for the future - Essay Example A detailed analysis of the management efforts put by the organizational leaders in the past decade would be presented later on. Additionally, the company’s management competence in the three chosen spheres would be examined by contrasting their past performances against their present proficiency in these aspects and by developing the scenario of the future in which the company would operate. This paper in no way presents a business report of ExxonMobil or its market analysis. It aims at successfully achieving the objective of this study, i.e., to make a historical analysis of the company, to study the management’s competence and to make a forecast of the company’s stand in the near future. The study is initiated with the key concepts in relation to the company background. Then the current achievements of the company will be discussed in light of these concepts and the critical view of the activities of the company would be presented in accord with the theoretical models and existing public opinion that affects the operations of the company. ExxonMobil: Company Profile Exxon Mobil Corporation, known as ExxonMobil, is a multinational corporation based in America (Exxonmobil, 2013a). It is the largest international publicly traded oil and gas company in the world with its headquarters located in Irving at Texas in the United States (Fleminggulf, 2013). The company came into being in its present form after the two companies Exxon and Mobil merged on November 30 in the year 1999. After the merger of Exxon and Mobil, the company has become a powerful organisation globally. The industry is becoming increasingly more competitive with the passing of each day and ExxonMobil is now considered an efficient global competitor. The performance of the company affects the world economy to a great extent. In 2012 ExxonMobil and Rosneft (a Moscow based oil and gas company) forged a joint venture for materializing a sweeping plan of exploring the massive shale formation in the Arctic and Siberian region. Exxon has announced that once this objective becomes successful the joint venture between the two companies would yield up to US $500 billion in different investments to be made by the companies in the future years. Presently, the company along with the â€Å"state owned Turkiye Petrolleri AO (TPAO)† (Fleminggulf, 2013) of Turkey is negotiating with the Turkey government to explore the estimated â€Å"15 trillion cubic feet of recoverable shale gas† (Fleminggulf, 2013) reserves located in Turkey. Currently, the company supplies energy to the other countries. It helps these countries particularly the growing economies in advancing themselves and improving the living standards in their countries (Exxonmobil, 2013b). The company goals are aligned with their social responsibilities and it utilizes its business strengths to establish an example of corporate citizenship that might be emulated by other companies. Defining the conc epts In this section the different concepts related to the three chosen areas for this study would be defined and explained. Every business operation is run with a profit motive. Popular belief holds that success is measured in business through measurement of the company’s financial returns, amount of dividend pay-outs and also the company’s liquidity standings. These are the financial measures of busines performance that concentrates mainly on the

Tuesday, July 23, 2019

Tetracycline Antibiotics Essay Example | Topics and Well Written Essays - 250 words

Tetracycline Antibiotics - Essay Example Chlortetracycline was the first compound from this class which was successfully used to treat diseases of bacterial origin. They are one of the most widely used classes of antibiotics today and several thousand of varieties have been synthesized till date (Aleksandrov & Simonson, 2008). Chlortetracycline and Oxytetracycline are obtained from Streptomyces Aure-Facie ns and Streptomyces rumors respectively (Goodman & Gilman, 2001). Other semi synthetic tetracyclines are Tetracycline, Methacycline, Doxycycline, and Minocycline.All tetracyclines are congeners of polycyclic naphthalene carboxamide and chemical substituents and their position determine the type of tetracycline (Goodman & Gilman, 2001). Chemically Tetracyclines are polyketides and comprise of a naphthacene ring structure (Thiele-Bruhn, 2003). They are amphoteric compounds and are relatively stable in acids. They are sparingly water soluble while the solubility of corresponding hydrochlorides is much higher. They strongly ab sorb light and are therefore subject to photodegradation.Tetracyclines are basically bactericidal in action and do so by inhibiting bacterial protein synthesis (Goodman & Gilman, 2001). They do so by binding to the 30 S bacterial ribosome, thereby preventing access of aminoacyl tRNA to the acceptor site on the mRNA-ribosome complex. The active transport system found in the bacterial cells enhances the passage of the tetracyclines into them by the process of passive diffusion through the hydrophilic channels.

Monday, July 22, 2019

Most Violated School Policies Essay Example for Free

Most Violated School Policies Essay The formation of character is one of the most important features of the educational system at the University of Baguio. For this reason, the imposed discipline, while observant to the rights and feelings of others, is firm, especially when the reputation of the student body and institution is at stake. Students are expected to manifest both within and outside the University, the respect for order, morality, personal honor, and rights of others, which is required of God-fearing men and women. (UB student handbook, Article XIV: 2010 Edition) Schools have policies that are being implemented for the general welfare of its constituents. These policies provide a set of rules that the students, teachers, etc. should follow. These rules are necessary for the order and uniformity of the students within the school premises. Even with the presence of these rules, some of the students violate them disregarding the sanctions that go along with it. The word policy originated from the Latin word politia or polity. Defined as a definite course of action adopted for the sake of expediency, facility, etc.; an action or procedure conforming to or considered with reference to prudence or expediency. (http://dictionary.reference.com/browse/policy) Educational policies are significant because these are rules that are used in schools to discipline students. These rules determine how effective and efficient the school is in managing students and personnel. The policies have great influence in the quality of education in an area. Educational policies are important because effective policies can help students in school on their day to day activity. For a policy to become effective, it must have a well-pronounced outcome, assumptions should be clear and explicit, linkage to organizational direction must be present, due process in the development has to be observed, the priority should be on the public interest, expectations have to be made, the policy must be both efficient and effective, results should be stated in measurable terms, evaluation of results should be capable, funding and allocation of resources must be appropriate, accountability should not be vague, it should be lawful and administered, it must be based from history, ideas have to be verified before implementation, and the policy results should be well stated. (http://manuals.ucdavis.edu/resources/coordinators.htm) One of the factors why students violate school policies can be explained through their different behaviours. Behaviour is the manner of behaving or conducting oneself; the aggregate of all the responses made by an organism in any situation. (http://dictionary.reference.com/browse/behavior) Based on Operant Conditioning of B.F. Skinner â€Å"All behaviour caused by external stimuli and all behaviour can be explained without the need to consider internal mental states or consciousness.† It means that the actions done by students are responses to its environment. (http://www.learning-theories.com/behaviorism) Another type of behaviourism is Radical Behaviourism which is the connection to role of emotions and the major differences in the acceptance of mediating structures and etc. In order to resolve this problem the group found out that the best solution is the use of Biometric identification systems which can be grouped based on the main physical characteristic that lends itself to biometric identification. There are different kinds of biometric system in which the fingerprint biometrics is the commonly used one. There are also other biometric identification systems such as the hand geometry, palm vein authentication, retina scan, iris scan, face recognition, signature, and voice analysis. There are biometric systems that are composed of more than two physical characteristics to be identified. Statement of the Problem 1) What are the reasons why these students violate such policies? 2) What are the most common policies that are violated by the violators? 3) How can the proposed biometric ID system control students from violating the wearing of ID? Scope and Delimitation This proposal was limited only to the students of the University of Baguio including the administrative staff, teachers, faculty and utilities. Significance of the Study With the help of this proposal, the University of Baguio would be able to control every entrance and exit of the school. The act of not wearing IDs for the students would no longer be possible because they will not be able to enter the school without their IDs. The biometric ID system would strengthen the security of the academe for the safety of the students. The time when the students would enter and leave their classes would be monitored. The system would be able to determine if the students will skip their classes. Also, the entry of thieves and pick-pocketers within the school premises would no longer be possible due to this proposal. With this modernized system to be established in the University, all of the students and personnel of the school will benefit from it. FRAMEWORK The leniency of the marshals in checking the ID’s and proper wearing of uniforms, students not following the rules and regulation of the school and to monitor the entrance and exit of the students of University of Baguio within the school’s vicinity are the reasons why the researchers proposed an ID Biometric System. The students violated the above mentioned rules due to leniency, habitual actions of students, laziness, and unwanted behaviours of students. Some students just wanted to violate such policies because they thought that it was a fun and interesting thing to do. If the proposed project will be fully implemented, there will be organization in the school campus and an effective monitoring of the passage ways in entering and going out of the school. Based on these factors that we have retrieved on the data that we have collected, the theory that would best support our proposal is the belief theory. We chose this theory because we, the researchers, believe that the proposed biometric ID system will work and we will therefore translate these beliefs into action. The researchers foresee that this would be able to control the reoccurring problems that are being done by the University of Baguio students and that is the reason why we have made this very proposal. DEFINITION OF TERMS * Biometric – pertaining to, noting, or using a person’s unique physical and other traits for the purpose of identification and security. * Coincide –to occupy exactly corresponding or equivalent positions on a scale or in a series * Identification – psychological orientation of the self in regard to something (as a person or group) with a resulting feeling of close emotional association. * Implementation – the act of implementing, or putting into effect. * Policy – a definite course of method of action selected from among alternatives and in light of given conditions to guide and determine present and future decisions. * Proposal – An act of putting forward or stating something for consideration. * Scanner – a device sensing a recorded data. * System –a group of devices or artificial objects or an organization forming a network especially for distributing something or serving common purpose. * Units – a piece or complex apparatus serving to perform one particular function ASSUMPTION The group assumed that if the proposal is to be approved by the Board of Directors, it would be implemented immediately. The ordered units will be put up to the designated areas and the Biometric system will start functioning. With the new system of the school, there will be an organization in school activities. The school then will be a safe and humane place to study. CHAPTER II REVIEW OF RELATED LITERARTURE I. EXECUTIVE SUMMARY In the millennial years rapidly advancing technological world, the issue of security is becoming a more and more pressing matter. Computer crimes and identity theft related crimes are becoming more rampant and apparent, requiring better solutions to cope with them. One of the proposed methods for solution for future high-technology security issues lies in the field of biometrics. Biometrics defined simply in its regard to security matters is any method or technology which uses biological measurements to facilitate authentication for verification or identification of a particular user. Although still in major phases of development, biometrics is seen as a highly valuable initiative to one day replace present day security authentication practices due to its ideal concept of being virtually risk free and non-inaccurate. This paper will analyze all aspects concerning biometrics including its overall concept, how a biometrical authentication system works, controversial issues concerning its implementation, its current uses in technology, business, and governmental agencies and its future developments. II. CONCEPT OF BIOMETRICS IN SECURITY A. TWO CATEGORIES Biometrics can be subdivided into two main categories. These include physiological and behavioral categories of specific measurements. Physiological measurements include biological characteristics inherent to individual human beings. Some of these would include facial structure, fingerprints, hand structure, iris and DNA structure of a particular person. Behavioral measurements measure dynamics in individual behaviors. Some of these would include keystroke behavior, signature and voice recognition. B. VARIOUS METHODS FOR COLLECTING MEASUREMENTS FACE: Facial recognition involves technology which scans the face and interprets the data as recognizable characteristics of a particular user, including the size and shape of the face and their relationship to each other. Facial recognition is a natural method that humans use to identify people they come into contact with, but it is not an easy method to duplicate for identification on a biometric system. This is due to changes such as plastic surgery, weight gain or weight loss which can cause the results to be inaccurate. Another emerging method of collecting biometric information involving the face is facial thermograph which detects and measures the heat patterns created by the branching blood vessels within the face and emitted through the skin. FINGERPRINT: Fingerprint analysis has been around for centuries as a means of identifying people. It has been evidenced that ancient Chinese used fingerprinting to sign legal documents as long ago as 1000 BCE. Fingerprint analysis involves examining the ridges on an individual fingerprint in order to match them to a specific owner. HAND: Hands can be analyzed and measured in a few different ways. Aside from fingerprints, another way to use hands in biometrical analysis is through hand geometry which measures and compares the different physical characteristics of a persons hand such as shape and size. Another method concerning hands is palm vein authentication which uses an infrared beam to penetrate a persons hand and measure the complexity of the vein patterns within that persons hand. This specific method is more useful than hand geometry measurement because palm vein patterns are internal to the body, and difficult to be counterfeited by an illegitimate user. EYES: Eyes can be used in two different ways as a part of a biometrical scrutiny process. Iris scanning involves analysis of the rings, furrows, and freckles in the pupil of the eye of a particular human. Retina scanning involves analysis of the capillary blood vessels located in the back of the eye. DNA: DNA verification uses analysis of genetic information found within a specific persons DNA code (or genetic code) as a means of identifying that person. DNA analysis is often used now as a method for identifying paternity of a persons child or in forensic crime investigations as a evidence for convicting individuals for crimes such as murder or rape. ODOR SCENT: Odor and scent analysis is a fairly new development in biometrical analysis and is based on a theory entitled individual odor theory. This theory is premised on the notion that each person has a particular and unique scent. In forensics, odor analysis has been used to identify people by the use of blood hounds (dogs). VOICE ANALYSIS: Voice analysis involves analyzing of the pitch, tone, cadence, and frequency of a particular users voice to facilitate authentication. Voice analysis can technically be seen as both a physiological trait as well as a behavioral trait because voice is not only inherent to a specific person, but also the way that person speaks is also a unique and measurable trait. SIGNATURE: Signature analysis analyzes the way a person writes his/her signature as a basic means of identification. Although handwriting techniques vary for individuals throughout their lifetimes, handwriting identification is seen as a scientifically reliable criterion for measurement. KEYSTROKE: Keystroke analysis measures the dynamics of a persons typing rhythms to facilitate authentication of a particular person. Keystroke analysis may be more useful than other methods of identification because unlike other biometrical authentication methods, keystroke dynamics can still be measured throughout the computer session even after the access control point has been successfully passed by the user. GAIT: Another new developing biometrical technique is one which measures gait which is a persons particular way of walking and facilitating motion. Gait can be used effectively to recognize people coming in from a distance. COGNITIVE BIOMETRICS: Cognitive biometrics is also a developing method in biometrics which uses measurements of brain activity responses when triggered by specific stimuli and matched within a computer database as a means for authentication of a particular user of the system. Currently, systems which utilize this kind of method are being created to trigger responses to odor stimuli. In the future, other triggers may be used to create responses. C. PARAMETERS Given the various methods for collecting biometrical data, each of these techniques must pass a set of parameters to a degree in order to be considered as a viable method for integration within a biometrical system. These parameters include: UNIVERSALITY: The principle of universality stipulates that every user should have the characteristic. Sometimes, in some cases this may not be true as it the case of a person with no hands who cannot use a hand analysis machine for verification. UNIQUENESS: The principle of uniqueness involves the degree of how separable the biometric characteristic is between each individual person. PERMANENCE: The principle of permanence involves how well the technique used for measuring is resistant to changes such as aging, human developmental processes such as pregnancy, or things such as plastic surgery. COLLECTABILITY: The collectability principle is related to how easy the method is to acquire. Easier methods, as well as more sanitary methods are more ideal for a viable biometrical system. PERFORMANCE: The performance principle is concerned with the accuracy, speed and the strength of the technology used to authenticate the user. ACCEPTABILITY: The acceptability principle is related to the degree of social approval for use of the technology as a means for collecting biometrical data. CIRCUMVENTION: Circumvention involves, the biometrical systems ease of adaptation to a substitute should the system need one. 1. COMPARISON OF VARIOUS METHODS WITH PARAMETERS (Based on the Comparison of Various Biometric Technologies table by A.K. Jain, et. al. 2004) FACE: Facial scanning has a high level of universality because it is virtually impossible for any living human-being to possess no form of a face. Facial scanning scores low in its level of uniqueness due to the fact that it can be difficult to distinguish characteristics from person to person at times. This is due to some people having similar features which may be hard to distinguish. In the case of identical twins, this may not be a useful means for authentication at all. Facial scanning scores a medium ranking under the permanence factor. This is due to the fact that although a persons actual facial characteristics never change, they are subject to transformations such as aging, weight gain or loss, and alterations such as plastic surgery or accidents. As far as collectability, facial scanning scores a high mark due to the fact that, going along with its high level of universality, every living human-being does have a face which is easy to locate on a human body. Facial scanning is low in performance because it can tend to be highly inaccurate due to the dynamical aspect of human faces. Facial scanning also scores high in acceptability as a comfortable and accepted way people would want to collect their biometrical data, but it scores low in circumvention because it doesnt have an easy substitute which can replace it. Facial thermograph scores high in universality, uniqueness, collectability, acceptability, and circumvention. It scores low in permanence and medium in performance. FINGERPRINT: Fingerprinting scores medium in its level of universality. This is due to the fact that although all people inherently possess fingerprints at birth, fingerprints can still be damaged via rare skin diseases or through loss of fingers, abrasions, etc. Fingerprinting has a high level of uniqueness and a high level of permanence. Fingerprinting has a medium level of collectability and performance due to the fact that although it is easy to acquire for measurement, there is a 5% failure to enroll rate which exists for everyone even with good sensors and analysis software. Fingerprinting has a medium level of acceptability by the public as a means for collecting data. This is because although it is an easy method of measurement, it may be unhygienic, inaccurate as well as easy to duplicate unlawfully. Fingerprinting has a high level of circumvention due to its ease of adaptation to a substitute if deemed necessary. HAND: Hand geometry scores medium in its universality, uniqueness, permanence, performance, acceptability, and circumvention. Hand geometry scores high in its collectability aspect. Hand vein analysis also scores medium in universality, uniqueness, permanence, collectability, performance, and acceptability; but it scores hi gh in circumvention. The overall reason why hand analysis carries a medium ranking in virtually all the parameters listed is because of a human-beings ability to live without them. EYES: Eye analysis provides for a more accurate analysis approach in a biometric system. Iris scanning scores high in universality, uniqueness, permanence, performance, and circumvention. This is due to the complexity and exclusivity of iris patterns which does make them a better choice method of biometric authentication. Iris scanning received a medium score in collectability and a low score in acceptability due to the complexity of the method and its suitability to the general masses. Retinal scanning also received similar scores, scoring high in universality, uniqueness, performance, and circumvention; receiving a medium score in permanence, and low scores in both its collectability and acceptability. DNA: DNA analysis has split results, scoring high in universality, uniqueness, permanence, and performance, and scoring low in collectability, acceptability, and circumvention. Although DNA can be extracted from a numerous amount of different ways, a method of extracting DNA in order to be used in a biometrical authentication system cannot be done without seeming invasive or unsanitary. Also, many people may be concerned with privacy matters concerning DNA analysis. ODOR SCENT: Odor and scent analysis scores high in universality, uniqueness, and permanence. Although scents can be masked by deodorants, fragrances and lotions, the underlying biological scent of a person cannot be concealed. Odor analysis also scores low in collectability, performance, and circumvention, with a medium score in acceptability. VOICE ANALYSIS: Voice analysis scores medium in its universality and collectability. It scores low scores in uniqueness, permanence, performance, and circumvention, making it not an ideal method for use in a biometrical system. This is because not only does a persons voice change throughout time, but people can knowingly change their voice or use technology to change their voice (such as a recording) in order to dupe a system. Voice analysis scores high in acceptability due to the simplicity of the method. SIGNATURE: Signature analysis scores low in universality, uniqueness, permanence, performance, and circumvention. It scores high in collectability, and acceptability. Signature analysis may not be an ideal method for authentication because although graphology experts can distinguish identities through meticulous handwriting analysis, it may be more difficult for a biometrical system to accurately analyze differences in handwriting for each individual person. This is because a persons handwriting can change depend on various things such as the mood of the person. Also some people may write similarly or use forgery to try to dupe the system. KEYSTROKE: Keystroke analysis is another method which may be seen as not as reliable as some of the other methods for collecting biometric information. Although it has the advantage of being able to simultaneously authenticate a user while he/she is still within the work session, keystroke analysis scores low for universality, uniqueness, permanence, and performance. It also has medium scores for collectability, acceptability, and circumvention. This may be due to the behavioral aspect of typing which can be easily changed if a person learns to type in different ways. GAIT: Gait scores medium in universality and circumvention. Gait has low scores in uniqueness, permanence, and performance. Gait also has high scores in collectability and acceptability. Of all the various methods for collecting biometric data, some of the most reliable methods (according to the table by A.K. Jain et. Al) are iris scanning, retinal scanning, facial thermograph, fingerprint analysis, and DNA analysis. Some of the least reliable methods are keystroke analysis, signature analysis, and voice analysis. Overall, it appears that physiological data is seen as a more reliable method for collecting data than behavioral data. III. BIOMETRIC SYSTEM A. BIOMETRIC SYSTEM A biometrical system although seemingly complicated, has only two main steps, regardless of the methodology or the technology used to facilitate it. The system begins with a process called enrollment which is when the biometric information from individual users is collected and stored within a database and translated into a code or graph. In some instances data may be stored on a smart card which can be carried away with the user. The next operation of the biometrical system is called testing. During this portion of the system, biometrical data is detected and compared with that which is in the database. In order for a biometrical system to be robust, it is necessary that the storage and retrieval of data within the system be highly secured. (http://upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Biometric_system_diagram.png/800px-) A biometrical system can carry out two main functions. These include verification or identification. In verification, the systems objective is to authenticate the user in conjunction with another method such as a smart card, a username, or a password. With identification, the systems intention is to authenticate the user only on the basis of the biometrical data alone. The goal of this function is to identify the user according to the closest match within the allowable limit of the system. B. PERFORMANCE MEASUREMENTS The performance of a biometric systems technology can be broken down into a variety of probability descriptions. These descriptions indicate the level of accuracy the system is able to achieve. FAR- The first measurement is entitled False Accept Rate. This measurement determines the likeliness of a biometric system incorrectly accepting access to the system by an un-authorized user. This measurement is calculated by dividing the number of false acceptances by the number of times an identification attempt has been made. FRR- The second measurement is called a False Rejection Rate which measures the probability that a biometric system will incorrectly reject an authorized user from using the system. This number is calculated by dividing the number of false rejections by the number of authentication attempts. EER- Equal error rate stands for the rate at which FAR and FRR are equal. This measurement can be used to compare two different biometric systems. Whichever biometric system has a lower EER is considered to be a more accurate system than the other. ROC- Receiver operating characteristics deals with the systems accuracy within certain environments as it relates to False Rejection and False Acceptance Rate results. FTE- FTE stands for failure to enroll rate. This measurement is calculated as a percentage of the data which failed to pass through the system due to invalidity. Failure to enroll typically happens when the sample data is of poor quality and does not match the data which is stored in the database of the system. FTC- FTC is the failure to capture rate. This measurement measures the probability that the system will fail to pick up on a biometric characteristic when it is presented accurately. High calculations of this measurement typically mean that this authentication method will be difficult as well as frustrating to use. C. SUSCEPTIBLE AREAS OF ATTACK FOR BIOMETRICS The three most susceptible areas of vulnerability for attack of a biometric system are: 1) Copied-biometric attacks- where the attacker obtains a substitute for the true biometric sample in order to cause proper authentication to occur via the normal system procedures. 2) Replay attacks- where perpetrators obtain valid templates from the original user and then use them to directly dupe the biometric system. 3) Database attacks- where perpetrators access a template database and obtain the ability to replace valid templates with invalid ones. IV. ISSUES WITH BIOMETRICS A. IDENTITY THEFT ISSUE Although the ideal goal of biometrical authentication is to have ultimate prevention of identity theft, the issue of an illegitimate user having the ability to commit identity theft still exists within biometrics and can have even more dire circumstances than with non-biometrical authentication systems. Depending on the method used to collect the biometrical data, a persons identity can be stolen easily. An example of this would be in the case of fingerprints which can be taken from inanimate objects such as glassware or metal objects and then duplicated in order to be used to dupe a biometrical system. The main problem concerning this issue is in the fact that if an individuals identification is stolen by another, the legitimate user may never be able to undo the damage which has been created because, unlike with non-biometrical authentication, once biometrical data has been compromised, it is compromised for the entirety of the legitimate users existence. One proposed possible solution for solving the issue of identity theft is to only use a portion of the biometric data, so that if the data does become compromised, it will not be entirely lost. This way, if one part of the data is stolen, another part of the original users biometric data can be used to replace it. B. PRIVACY ISSUE Privacy can also be a staggering issue with the implementation of a biometrical system from a societal standpoint. Many people may not care to have all of their biological characteristics recorded on some medium for a variety of reasons. One concern is that if information is recorded on systems used at more than one location or by more than one entity, an individuals movements can be tracked preventing anonymity. Safety of the legitimate users can become compromised, if malevolent individuals choose to target that person in order to obtain their goal. Another issue regarding privacy involves physical harm which can be done to an individual using a biometrical system. Physical harm can occur by use of unsanitary instruments used in the technology to obtain the biometrical information, which may cause the system to be considered unsafe. Another issue regarding privacy lies with the administrative ability to misuse users biometrical data without the consent of those users. Currently, few regulations exist to protect biometric information of individuals. C. SENSOR OBSTACLES Different types of technology (hardware software) used within different biometrical systems can counteract one another, making it difficult to have standardized biometrical data. One of the reasons this problem exists is because each vendor of biometrical technology generates their own encryption methods for the recorded information. Unfortunately, many of these encryption methods do not coincide with one another making the use of biometrical systems more difficult and less efficient. The only way unification of the different biometrical systems can occur is by a standardizing process which would require exposing of all the concealed data. Unfortunately, this can also present a serious threat. D. FAILURE TO MEET PARAMETERS Another issue concerning implementation of biometrics is in the issue of a systems failure to meet parameters. In order for biometrical data to be interminable, the biological characteristic must be unique, universal, acceptable, collectible, reliable in regards to the performance and circumvention of the technology used to collect the data, but most importantly, the data must be permanent, which is the most fragile issue concerning the parameters of biometrical data. Unfortunately, most if not all biological characteristics are not guaranteed to be permanent. Many of them can be compromised via accidents, health problems or alterations such as surgery. V. CURRENT USES OF BIOMETRICS Although the field of biometrics as a whole is still in need of major development before widespread implementation will ever occur there are some entities including private industry and governmental agencies which currently utilize biometrical technology. Certain examples of American organizations which currently use biometric technology include: 1) Walt Disney World: Walt Disney World uses fingerprint analysis technology to authenticate the fingerprints of guests in order to ensure that season tickets are used by the authorized ticket owner. This is in order to prevent lost sales through ticket sharing, as well as thefts. 2) First Tech Credit Union: First Tech Credit Union is an Oregon based credit union which utilizes keystroke recognition technology for authentication of users on its online website. 3) Casinos: Over 100 American casinos such as the Imperial Palace casino in Las Vegas use facial recognition technology to identify and prevent known cheaters or dishonest patrons from entering into their establishments. 4) Missing Childrens Clearinghouse: A West Virginia based organization entitled Missing Childrens Clearinghouse uses biometric technology which utilizes scanned digital photographs to search for missing children. 5) Citibank Singapore: Citibank in Singapore uses fingerprint scanning technology for customers who use their clear platinum card for point-of-sale purchases. 6) Coca Cola: Coca Cola uses hand scanning machines to replace time cards for employees in order to document worker time keepinsg records. 7) Welfare crack-down: New Jersey as well as six other states use biometric technology to crack down on individuals who abuse the welfare system by claiming benefits in multiple names. 8) Notebooks: Computer products such as the Compaq Armada E500 are being developed to use fingerprint scanning technology to verify the identity of the user. 9) Prisons: Up to 100 American Prisons use biometric technology to regulate methadone dispersement among prisoners. VI. FUTURE DEVELOPMENTS IN BIOMETRICS Since the occurrence of the September 11, 2001 terrorist attacks, a surge in the demand for biometric technology has begun. Stocks in publically trade biometric companies such as Visionics, Viisage Technology, and Indentix have soared with the overall biometric technology industry projected to have revenues approaching $10 billion dollars annually by 2020. Emerging trends for future uses of biometric technology seem to lean more towards law enforcement, homeland security, and security within certain types of private industry such as in airport security or finance. Many credit card companies such as Mastercard and Visa are beginning to implement biometric authentication methods to verify card users. Also, the Immigration and Naturalization Service may begin implementing biometric technologies to identify illegal immigrants. Certain types of biometric technology which are becoming more widespread include access control facial recognition technology which is used to permit only authorized individuals to enter upon certain facilities, facial recognition passive surveillance technology which is used to monitor premises in order to identify possible terrorists or suspect individuals, and alert management which includes the use of real-time technology in association with biometric technology to provide security alerts of potential security breaches. Applications which use biometric technology will also have an effect on commerce, particularly in e-commerce to provide extra security for online purchases, and installation within certain personal items such as cars and cell phones. VII. CONCLUSION Although not that long ago, the concept of having biometric technology as a part of our mainstream society may have been seen as a science-fictional impossibility, technological innovation has grown to the point where it is becoming more and more of a reality. Although we are not quite ready for widespread implementation of this technology, as the need for better hi-tech security increases, research as well as investor and consumer confidence and innovation within the biometric industry is also expected to improve. Although no single biometric system method is without flaws, combinations of these various methods and technologies may provide the ideal security that we hope to attain one day. CHAPTER III METHODOLOGY There was difficulty in determining the real students of the University of Baguio because of the hard-headed students who cannot abide with the simple rules and regulations which was the reoccurring problems of the security. Due to this problem, the â€Å"mandos† and â€Å"magnas† can easily enter the school’s premises victimizing a lot of students. This was one of the reasons why such simple violations became a huge problem for the school. Regarding this matter, the group came up with an idea for a topic for their action research. Before they finalize their topic, the group went to the Office of the Student Affairs and interviewed the dean to know which rules are commonly violated by the students. After the interview, the group determined that the rules which are commonly violated are: a) wearing of I.Ds inside the school campus; and b) wearing of uniforms on the designated days. The group then convened and finalized their topic that would focus on â€Å"A proposed Biometric ID system to control the reoccurring violations by University of Baguio students.† Since there was already a topic to be talked about in the research, the group started to gather data which were relevant to the research proper like that of related studies and researches and terms that are significant to the study. After collecting relevant information for the research, the group prepared communication letters addressed to the deans of the different schools of the University and respondents likewise with the survey questionnaire. Upon approval of the deans of the different schools, the group administered the questionnaires to the respondents. The survey forms were distributed to the eleven schools of the University having ten (10) respondents each to see which results have the same percentage which were used to know the reasons behind these actions. After distributing the survey questionnaires, the group then retrieve the questionnaires and start tabulating the results. The tabulated data showed the reasons why the students violate these simple policies of the school. The result of the survey supported the proposal that were passed to the Board of Directors. The group then proposed the biometric ID system that will be put up in every entrances and exits of the buildings in the University. The biometric ID system will most likely be very costly but disregarding such amount, the administration will approve it and immediately ordered the said system. By the time the systems that had been ordered arrive, the people designated by the higher ops will put up such systems on the designated areas to make the University a safe and humane place to study. CONCLUSION In light of the findings, the following conclusions are hereby presented: Not wearing of ID has been a habit of the students. Sometimes the teachers themselves forget to check their students ID. The security guard also are not lenient in checking the IDs of these students. Because of this attitude most number of the student no longer uses their IDs. The students think that it is just fine not use their IDs. The researchers are found out that the school really need a biometric ID system. Approximately, one unit of the biometric system will cost more or less two hundred fifty thousand pesos. In such case the University of Baguio can still afford this system since it does not only help the students but it can also secure their safety With the help of this proposal it will lessen the burden of the security personnel. This proposal can also lessen the number of students violating the proper use of IDs. In such situation students can no longer use any ID because of the presence of finger prints. The students whether they like it or not would still be forced to use their IDs. Also, this proposal can help in the security of the school campus because outsiders can no longer come in because of the presence of finger prints. RECOMMENDATION Drawing from the conclusions that the researchers arrived at, the following recommendations are forwarded. The researchers would recommend the strict implementation of the rules and regulations of the university and the maintenance of the biometric ID system. In addition, each of the gates should be closed. Also, the lenient checking on the wearing of IDs should be done. The guards should monitor every student entering the university. In case the students lost their IDs, we recommend that a password that would allow them to enter would be provided by the OSA during the time of the ID’s loss. BIBLIOGRAPHY BOOKS * Addiction Today, Sept. 27, 2008. Prisons Use Biometrics to Manage Methadone. * Germain, Jack M., Sept. 11, 2003. Beyond Biometrics: New Strategies for Security. * New York Times, Nov. 15, 2008. Technology and Media, a Surge in the Demand to use Biometrics. * Osborn, Alice, Aug. 17, 2005. Future of Biometrics-Trends and Emerging Uses for Biometric Technology. * Panko, Raymond R., Corporate Computer and Network Security. New Jersey: Prentice Hall, 2004. * Risk Management, Mar. 15, 2005. Biometrics: The Future is Now. * Technology and Human Values Senior Seminar, 2008. Biometrics. * Tilton, Catherine J., Feb. 2006. The Role of Biometrics in Enterprise Security. * Wikepedia, Nov. 13, 2008. Biometrics.† ONLINE * http://www.addictiontoday.org/addictiontoday/2008/09/prisons-use-bio.html. * http://www.ecommercetimes.com/story/31547.html?wlc=1226777438 * .http://query.nytimes.com/gst/fullpage.html?res=9F06E0DB163EF934A25751C1A9679C8B63sec=spon=pagewanted=1 * http://www.video-surveillance-guide.com/future-of-biometrics.htm * http://www.riskmanagementmagazine.com.au/articles/FF/0C02DDFF.asp?Type=124Category=1240 * http://www.dell.com/downloads/global/power/ps1q06-20050132-Tilton-OE.pdf . * http://en.wikipedia.org/wiki/Biometrics#cite_note-jain_short_article-20 .