Wednesday, July 31, 2019

Impact on Local Community and Environment

2.Impact on Local Community and Environment 2.1 Image and Regeneration Environmentally Sustainable direction should be implemented from the early phases of event planning. Alternatively of concentrating on holding ‘green’ installations and equipment, the construct of sustainability should be implemented in the full determination devising procedure. Therefore holding an environmentally sustainable event should be portion of the purposes and aims. Mega events are extremely concerned about this, as undertaking environmental issues are important in winning a command. This inaugural gave London success in winning their command and the chance to host the Olympic games in 2012. In their command study London promised that 20 per cent of the Olympic Park energy comes from sustainable agencies. Besides obtaining the games London’s Environmentally sustainable direction gave the chance for regeneration of East London. Beside seting two thousand native trees and 300,000 wetland workss and reconstructing five stat mis of the River Lea, new locales and attractive forces were constructed together with new places, schools and concerns. This increased touristry in East London therefore helped in making a better image non merely for east London but besides to the full metropolis. However some aims such as edifice wind turbines were non carried out and some undertakings were merely done in order to pull tourers instead than for sustainability. Conveyance and Noise Pollution Environmentally Sustainable Management is extremely important even more so in modern twenty-four hours, as local councils have the power to prohibit an event from go oning, if they see that the event is making devastation and doing lives harder on locals. When be aftering an event the event director must maintain in head that the bulk of pollution and breaks created during an event, come from transit to and from the event. DEFRA ( 2002 ) illustrated that noise ailments to Environmental Health Officers have drastically increased over the last 20 old ages, peculiarly for route traffic. Events such as festivals are supplying transit from different metropoliss to the location and encouraging visitants to utilize public transit where necessary. During mega events such as the Olympic games public transit should be efficient for the usage of people in order to advance the usage of public transit over private transit and hence cut downing congestion. During the London Olympics in over 100 mi llion journeys were made utilizing the belowground tubing. Having scheduled transit to an event will make a flow in the figure of visitants geting during a short period therefore this will let controlling of the visitants and cut downing traffic break, congestion and noise pollution at the location. The traffic Management Plan for Isle of White 2013 established a program for â€Å"roads and paths from the ferry terminuss are free from congestion, thereby understating the impact of Festival related vehicular traffic on the route network† and hence minimising the consequence on locals. Transportation is non merely used by visitants, but besides by staff who arrive at events location yearss prior to the event. During festivals the figure of staff can make over 1,000 people. In 2010 T in the park provided staff with bikes, which were used at the site location during the set up, in order to cut down the usage of autos. This is done as portion of the understanding with Julieâ€℠¢s Bicycle in 2008 in order to cut C emanations by 40 % by 2020, which is portion of the Scots Parliament’s committedness. However this is non plenty, and efficient transit to staff should be organized so that the use of private autos to acquire to the location is reduced. Eurovision Song Contest in Malmo in 2013 decided to utilize ISO 20121 and provided free public transit to all delegates and the imperativeness. Visitors were besides encouraged to do usage of the train to acquire to the sphere in order to cut down emanations. Noise Pollution is another factor that has to be taken into consideration for event direction. In 2013, Flag Factory Festival at The Plough in Hutton was threatened by Brentwood Borough Council ‘s licensing officers due to the impact of noise on occupants. There is non much an event organizer can make to minimise noise pollution on neighbouring occupants nevertheless the Control of Noise at Work Regulations 2005 provides limitations to this issue and besides states that staff should be protected from loud noises. 3.Reducing Costss 3.1Facilities Event directors are cognizant that by implementing Environmentally Sustainable direction they are besides cutting costs, particularly in events that occur repeatedly and desire to be in the concern for the long tally. Events generate considerable sum of waste that doesn’t merely have negative impacts on the environment, but it is besides dearly-won to the organizers. In 1996 directing waste to landfill cost ?7 a metric ton and a lower rate of ?2 for inactive waste nevertheless in 2013 this increased to ?72 a metric ton which made organizers more cognizant of the waste an event generates. Melvin Benn caput of ‘Festival Republic’ acknowledges that bettering environmental public presentation â€Å" no longer merely makes environmental sense, it makes economic sense every bit good † . Events administrations are coming up with enterprises to cut down waste and have a greener event. Glastonbury sets 15, 000 bins around the site, which are clearly labeled for recy cling stuff and non recycling stuff where in 2012 trash was separated and 49 % of this was recycled. Harmonizing to the Glastonbury web site, In order to dispose of all the waste that is left behind the Festival used to pay ?780,000, nevertheless with the aid of voluntaries and initiatives the sum of money that is saved from waste aggregation is donated to charity. Assorted inducements are being placed in order to acquire the visitant to be cognizant of the environment and cut downing waste and hence cut downing costs. Festivals have set up the cup recycling enterprise where clients are rewarded with 10p ( depending on the event ) for every cup that is returned. Similarly at Christmas markets selling mulled vino and other gay drinks clients pay a little sum excess as sedimentation for their cups, which they will acquire back if the cups are returned. Nevertheless some visitants are non concerned about go forthing litter around and farther instruction should be provided to emphasize the importance of these enterprises. Another publicity by Glastonbury is ‘A collapsible shelter is for life non merely for a festival’ where visitants are encouraged to purchase a collapsible shelter, which they will utilize even after the event and therefore collapsible shelters won’t be left behind. However this is non plenty as there are still visitants who don’t fuss in taking their collapsible shelters and this is why T in the park has The International Relief Trust roll uping quality abandoned collapsible shelters. ‘Tomorrowland’ offers an option to encampment by supplying little lockable suites but harmonizing to wikifestivals.com, some suites can be up to ˆ21,000. These should be offered at a cheaper monetary value in order to promote visitants to utilize them and hence being environmentally sustainable. Organizers should happen better ways at doing their campgrounds more sustainable by supplying more information and educating visi tants on the effects that arise. 3.2 Taxes and Local economic system In mega events such as The Olympic Games and The World Cup it is in the governments’ involvement to be environmentally sustainable when be aftering events as states may be burdened with the wake these events leave on the state. When building immense substructure for such events such as stadia these can go white elephants and locals have to pay more revenue enhancements for their care. Korea-Japan World Cup in 2002 exhausted one million millions of dollars in building and refurbishing of bowl, which are now white elephants and environmental loads. These become besides immense economic loads on locals who are paying excess 1000000s annually in revenue enhancement for their care. A better hazard and environmental appraisal and farther planning should hold resulted in a better rating of future usage of these bowl which is what Russia are be aftering to make for the 2018 games as Alexey Sorokin, the CEO of the Russia 2018 LOC stated ; â€Å"But the success of the World Cup in Russ ia will depend non merely on how good it is organised, but besides on how efficaciously the installations are used after the tournament.†

Tuesday, July 30, 2019

Hamlet Theme of Appearance vs. Reality Essay

Shakespeare examines the theme of appearance and reality in his book-Hamlet. The dilemma of what is â€Å"real† is established at the very beginning of the play. Hamlet doesn’t know what to believe and devises a plan to find out. The old king Hamlet appears to be bitten by a snake, but in reality he was poisoned, the ghost appears as an apparition, but it’s actually real, and the play-with-in-a-play strongly depicts the theme of appearance vs. reality. The dead King appears to have been bitten by a snake. In reality, he has been poisoned. Everyone believes that the king died from snakebite, but once Hamlet knows the truth he is unsettled by the revelation. When Hamlet’s dead father directs his son to, â€Å"Avenge him of his foul and most unnatural murder† (1. 5. 25), Hamlet’s response shows determination to act and a curiosity to know all the facts surrounding the murder: (1. 5. 29-31) â€Å"Haste me to know’t, that I, with wings as swift, as meditation or the thoughts of love may sweep to my revenge. † Hamlet’s choice of image is significant here. A person who wants to take revenge rarely has â€Å"thoughts of love† but only concentrates upon thoughts of revenge, but Hamlet’s thirst for revenge is immediate and deep. Shakespeare also develops the theme of appearance vs. reality when Hamlet resents his mother’s insinuation that he is putting on a show of being grief-stricken. Strangely, he is the only one in the family who is truly mourning his father’s death. He replies that all outwardly signs of his grief, such as his black cloak of mourning, his tears, and his sighs, are mere appearances, not even close to the depth of the real grief in his heart (1. 2. 70-80). This theme of appearance vs. reality will play an important part in the entire play. Another example of appearance vs. reality is the Ghost that appears as an apparition from the depths of hell, when actually he is the medium of reality, revealing the facts to Hamlet. The ghost tells Hamlet that his father was murdered, â€Å"Revenge his foul and most unnatural murder† (1. 5. 25). Since Hamlet doubts the sincerity of the Ghost’s revelation, he decides to put on the appearance of being mad to see if this is true, â€Å"I’ll wipe away all trivial records ? and they commandment all alone shall live† (1. 5. 99-102). Hamlet’s decision to simulate madness as a means of enacting his revenge is important. The news that Hamlet received about his father and his mother could drive anyone insane. As a result, the line between appearance and reality becomes notably distorted as the play progresses. Guildernstern says in Act 3 lines7-9, â€Å"But with a crafty madness keeps aloof when we would bring him on to some confession of this true state. † At times it also seems that Hamlet’s appearance of madness has become a reality, (3. 1. 201-203) â€Å"You should not have believed me, for virtue cannot so inoculate our old stock but we shall relish of it. I loved you not. † Hamlet loved Ophelia so this is definitely not true, but during the course of the play, his madness seems so genuine that one wonders if he is acting. The most obvious symbol of ? appearance vs. reality’ is the play-within-a-play. The actors appear onstage and act out the events that actually happened in reality. Hamlet has carefully orchestrated this play so that he can gauge the degree of reality by Claudius’ reaction, â€Å"For murder, though it have no tongue will speak with most miraculous organ? Before mine uncle I’ll observe his looks? If ? a do blench, I’ll know my course† (2. 2. 605-610). Besides furthering the plot of Hamlet, the play-within-a-play also again develops the theme of appearance vs. reality. The fictional drama being presented before the King is a parallel to the past reality of the King, and will serve to shape the future reality of the King and several other characters. Hamlet, as director of this great deception on stage, cautions the players not to exaggerate their expressions and emotions, stating that only uncivilized â€Å"groundlings† (3. 2. 10-11) are impressed by excessive over-acting. In Act II, Scene 2, Hamlet had asked the players to give a passionate presentation of the killing of Priam by Pyrrhus. Now he specifically instructs the players to â€Å"beget a temperance† in the â€Å"whirlwind of passion† in order to give it â€Å"smoothness† (3. 2. 1-9). He tells them that the aim of the play is to hold â€Å"the mirror up to nature,†(3. 2. 23-25) saying that the representation of action should be a realistic reflection of life, with moderation as the keynote (3. 2. 1-45). Hamlet’s advice to the players is important, because it reveals his state of mind before the staging of the play indicating that Hamlet’s own mind has finally reached a reasoned balance. In summary, the theme of appearance vs.reality is so well developed that everything in the play must be questioned, for nothing appears certain. Hamlet doesn’t know who is telling the truth because of the appearance of some things. Hamlet lives in a reality that appears to be true, but appearances can be deceiving. Hamlet learned that reality is completely different from appearance. The old king Hamlet appears to be bitten by a snake, but in reality he was poisoned, the ghost appears as an apparition, but it’s actually real, and the play-with-in-a-play strongly depicts the theme of appearance vs. reality.

Induction Standard 1

Standard 1 Role of the health and social care worker Your Name: Workplace: Start Date: Completion Date: Contents 1. 2. 3. 4. 5. Responsibilities and limits of your relationship with an individual Working in ways that are agreed with your employer The importance of working in partnership with others Be able to handle information in agreed ways Questions CIS Assessment Induction Workbook – Standard One Standard 1 Role of the health and social care worker 1. Responsibilities and limits of your relationship with an individual 1. Know your main responsibilities to an individual you support Working in health and social care you will have many responsibilities to your employer and to the people you support. You may work with different individuals each with their own preferences, wishes and needs. You will find out about these by reading individuals’ care and support plans as well as communicating with them when you are together. It is important that you follow care and support plans and understand and respect what the individuals you work with say they need.Skills for Care provide a Code of Practice setting out your responsibilities. These are some of the responsibilities you will have to individuals you support: ? ? ? ? Protect their rights and promote their interests Establish and maintain their trust and confidence Promote their independence and protect them as far as possible from danger or harm Respect their rights and ensure their behaviour does not harm themselves or other people In your role, you will also be expected to: ? Uphold public trust and confidence Be accountable for the quality of your work and take responsibility for maintaining and improving your knowledge and skills Your employer may have a set of values for the service you will be providing. Locate and read your employer’s values Think about how you will adopt these values You may wish to discuss your responsibilities and the values with your supervisor / manager Page 2 of 1 9 CIS Assessment Induction Workbook – Standard One 1. Be aware of ways in which your relationship with an individual must be different from other relationships You have a professional duty of care to the individuals you support which is different to the relationships you have with your friends and family. Your role is to guide and support individuals and to help them to live as independently as possible. You should listen carefully to individuals and never put pressure on them. These are some of the ways that you can maintain professional boundaries: ? ? ? ? ? ? ? ? ? ? ? Be reliable and dependable Do not form inappropriate intimate or personal relationships with individuals Promote individuals’ independence and protect them as far as possible from harm Do not accept gifts or money from individuals or their family members Be honest and trustworthy Comply with policies and procedures or agreed ways of working Cooperate with colleagues and treat them with respect Do not discriminate against anyone Maintain clear and accurate records Continue to improve your knowledge and skills Respect confidential information and knowing when it is appropriate to share Report any concerns you may haveMore Information can be found in the GSCC Codes of Practice / Skills for Care website. http://www. skillsforcare. org. uk/developing_skills/GSCCcodesofpractice/GSCC_codes_of_practice. aspx Most of the individuals you work with will rely heavily on your support. For some individuals you might be the only person they will see during the day. Because of this, it is really important that you arrive on time. This will help individuals to feel confident that you are able to support them.Your employer may have a Code of Conduct policy which will inform you of your professional boundaries. Locate and read your employer’s Code of Conduct policy You may wish to discuss professional boundaries with your supervisor / manager Page 3 of 19 CIS Assessment Induction Workbook à ¢â‚¬â€œ Standard One 2. Working in ways that are agreed with your employer 2. 1 Be aware of the aims, objectives and values of the service in which you work Every employer will have aims and objectives. For some employers, these will be documented and for others, they could be verbal statements.Either way, it is important that you know what your employers aims and objectives are. During your induction period you will learn about your employer and how your role supports them to achieve their aims and objectives. This is important because your employer’s aims and objectives become yours while you are working and you will work together to achieve them. Find out about your organisation and your service’s aims and objectives Consider how your job role supports the achievement of these. If you are unsure, discuss with your manager / supervisor 2. Understand why it is important to work in ways that are agreed with your employer Policies and procedures or â€Å"agreed ways of working† set out how your employer requires you to work. They incorporate various pieces of legislation as well as best practice. They are there to benefit and protect you, the individuals you support and your employer. They enable you to provide a good quality service working within the legal framework and most importantly aim to keep you and the individuals you support, safe from danger or harm. Policies and procedures are essential pieces of information hat will support you in your role and will enable you to work professionally and safely. You are being paid (unless you are an unpaid carer) to do a job for your employer. If you do not follow their agreed ways of working, you could cause harm to yourself or others and you could find yourself subject to capability or disciplinary procedures which could lead to dismissal or even prosecution if you break the law. You do not need to know every word of every policy but you will need to know what policies exist and what they cov er so you can refer to them when you need to.Page 4 of 19 CIS Assessment Induction Workbook – Standard One 2. 3 Know how to access full and up-to-date details of agreed ways of working relevant to your role It is important for you to know where the most up to date written copies of policies, procedures, guidelines and agreed ways of working are kept that relate to your role. There may also be procedures for your specific work location(s). It is useful if your employers’ policies and procedures are published on their website as you will be able to access the most up to date copies at any time.Policies and procedures are often made available for anyone to read as public documents because the Freedom of Information Act allows anyone to ask for copies, so it is often easier to publish them on a website. Sometimes policies and procedures are kept in a folder in the office. It is essential that you make time to familiarise yourself with policies, procedures and agreed ways o f working as they will affect the way you do your job. Locate and familiarise yourself with your employer’s policies and procedures. Sometimes these might be less formally documented. In which case, discuss them with your manager / supervisor.If your employer does not have written policies and procedures, it is important that you work closely with them to understand how they would like you to deal with situations. You will also need to make sure you are aware of the legislation and legal framework which will guide you through your legal responsibilities. There is lots of information on Skills for Care’s website to support and guide you in your new role. Skills for Care set standards for training and development including the Common Induction Standards that you are currently working on in this workbook and in your induction period. ttp://www. skillsforcare. org. uk You will also find information on the resources section on the CIS Assessment website: http://www. cis-ass essment. co. uk Page 5 of 19 CIS Assessment Induction Workbook – Standard One 3. The importance of working in partnership with others 3. 1 Understand why it is important to work in partnership with carers, families, advocates and others who are significant to an individual It is essential that you work in partnership with all of the people surrounding the individuals you are supporting in order to ensure the best possible support and care is provided.This will include carers, families, advocates and other people who are sometimes called â€Å"significant others†. In order to work well in partnership, there has to be good communication and you will need to have good communication skills. Advocates are people who support individuals and help them to explain and say what they want and need to maintain their wellbeing. They help to ensure the individual’s views are heard so their needs can be met and their problems sorted out. They can act as an intermediary when th ere is a difference of opinion.Unpaid carers provide unpaid support to a relative, friend, partner etc. Significant others can be anyone who is â€Å"significant† to the individual you are supporting e. g. their partner, their children, a neighbour, their best friend, a priest, a guide dog. Other people may be able to provide useful information to support you in your work and you may be able to provide useful information to support them in being part of the individual’s lives. This is good partnership working. An example might be if there are communication difficulties.A carer or family member can share information with you about how you can best communicate with an individual. This enables the individual to be listened to and supported in ways that they desire and choose. 3. 2 Recognise why it is important to work in teams and in partnership with others You will meet new colleagues and be expected to work in partnership with other professionals. Just like working in p artnership with family members and unpaid carers, you can all work together, sharing relevant information with each other to ensure the individual receives the best support and care possible.These people could be: Doctors Other Health professionals Friends and Family Personal Budget Brokers Nurses Social Workers Advocates Physiotherapists Occupational Therapists Voluntary organisations Unpaid carers Welfare Benefit Advisors Page 6 of 19 CIS Assessment Induction Workbook – Standard One Independent Mental Capacity Advocates (IMCA) These are formally appointed specialists who can support people who do not have family and friends who can support them to make informed decisions and choices about the kind of support and care they need.The Mental Capacity Act 2005 has a set of criteria to determine whether a person is able to make informed decisions and choices and if they cannot, this is when an IMCA is brought in to help. The Mental Capacity Act provides a statutory framework for people who lack capacity to make decisions for themselves, or who have capacity and want to make preparations for a time when they may lack capacity in the future. It sets out who can take decisions, in which situations, and how they should go about this.The legal framework is supported by this Code of Practice which provides guidance and information about how the Act works in practice. The Code has statutory force, which means that certain categories of people have a legal duty to have regard to it when working with or caring for adults who may lack capacity to make decisions for themselves. This includes care and support workers and the Code provides guidance to anyone who is working with and / or caring for adults who may lack capacity to make particular decisions.The term ‘a person who lacks capacity’ means a person who is unable to make a particular decision or take a particular action for themselves at the time the decision or action needs to be taken. You will ne ed to learn more about the Mental Capacity Act (MCA) and how this affects you in your job role. The MCA is also relevant to Standard 5. Outcome 2. 1. The Department of Health provide information about MCA on their website and you can also download a copy of the Code. This is the weblink. http://www. dh. gov. uk/en/Publicationsandstatistics/Publications/PublicationsPolicyAndGuidance/DH _085476 . 3 Be aware of attitudes and ways of working that help improve partnership with others You will always need to make sure that you are doing the right things, in the right way, at the right time, for the right people, openly, honestly, safely and in a professional way. Learning from others and working in partnership is important. It will help you to understand the aims and objectives of different people and partner organisations as they may have differing views, attitudes and approaches. Page 7 of 19 CIS Assessment Induction Workbook – Standard OneIt is essential that everyone’s f ocus is on providing the best care and support to individuals, for example: ? supporting the individual to possible achieve their goals and be as independent as ? ? respecting and maintaining the dignity and privacy of individuals promoting equal opportunities and respecting diversity and cultures and values different ? ? reporting dangerous, abusive, discriminatory or exploitative behaviour or practice communicating in an appropriate, open, accurate and straight forward way ? ? treating each person as an individual utcomes for individuals sharing expert knowledge and respecting views of others to achieve positive ALWAYS FEEDBACK ANY CONCERNS YOU HAVE TO YOUR MANAGER / SUPERVISOR, EVEN IF IT FEELS MINOR TO YOU. IT COULD BE IMPORTANT EVIDENCE. 4. Be able to handle information in agreed ways 4. 1 Understand why it is important to have secure systems for recording and storing information. Current legislation requires everyone working in social care to maintain certain records and keep them secure. Different employers will keep different records and in different ways.Most of the information is sensitive and therefore not available to the general public so it is important that information is stored securely so it cannot be accessed by people who have no right to see it. Information that is sensitive is called â€Å"Confidential†. Examples of confidential records are: ? ? ? ? Care and support plans Risk assessments Personal information about individuals being supported Personal information about workers Page 8 of 19 CIS Assessment Induction Workbook – Standard One Find out what records your employer keeps and how they are kept secure 4. Be aware of how to keep records that are up to date, complete, accurate and legible. Information that needs to be recorded should always be written in a legible manner. Legible means clear, readable and understandable. It could be harmful to an individual if other people cannot read what you have written, for example in a care plan about the way the individual is feeling. Records must always be factual and not an opinion. They should include the correct date and a full signature of the person writing the record. It is also recommended to use black ink. Some documents will only accept black ink.Information must not be crossed out or covered using correction fluid. Always record any information given to you by an individual even if you think it is trivial because it might help someone else. Always check an individual’s care and support plan before working with them as there may have been changes since you last worked with the individual, even if it was only a short time ago. 4. 3 Be aware of agreed procedures for: – Recording information – Storing information – Sharing information Records can be stored electronically on computers or as paper documents which can be typed or handwritten.Computers must be password protected and it is recommended that individual documents are also password protected. Documents being sent by email should be encrypted and protected. Confidential paper documents must be stored in a locked cupboard or cabinet. Access to all information should be restricted to those people to whom the information is relevant The recording, storing and sharing of data is covered by: Data Protection Act 1998 Freedom of Information Act 2000 Caldicott Principles Page 9 of 19 CIS Assessment Induction Workbook – Standard OneThe Data Protection Act is the main piece of legislation covering recording, storing and sharing information. The main principles are: ? ? ? ? ? ? ? ? Be secure Be adequate, relevant and no excessive Be processed fairly and lawfully Be kept no longer than is necessary Be obtained only for lawful purposes Be accurate Be observant of a person’s rights Not be transferred to countries outside of the European Union The Freedom of Information Act says that most public authorities have a legal obligation to provide infor mation through an approved publication scheme and in response to requests for information.If you work for a local authority, your employer will have one or more specialists responsible for requests made under this Act. You will need to find out who this is and what procedures you should follow if a request for information is made direct to you. Caldicott Guardians are experts on confidentiality issues and access to individuals’ records. They can give advice on any concerns you may have about a case. They are senior people nominated in organisations who are responsible for safeguarding the confidentiality of individuals’ information.Two key components of maintaining confidentiality are the integrity of information and its security: ? ? Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats. The Caldicott principles and recommendations apply specifically to information that identifies individuals and emphasise the need for controls over the availability of this information and access to it. The six Caldicott principles are: ? ? ? ? ? Justify the purpose(s) of every proposed use or transfer Don't use it unless it is absolutely necessary Use the minimum necessary Access to it should be on a strict need-to-know basis Everyone with access to it should be aware of their responsibilities Understand and comply with the law Page 10 of 19 CIS Assessment Induction Workbook – Standard One The Information Commissioner’s Office is the UK’s independent authority set up to uphold information rights in the public interest, promoting openness by public bodies and data privacy for individuals.Their website has lots of information about recording, storing and sharing information under the Data Protection and Freedom of Information Acts. http://www. ico. gov. uk Your employer may also have policies and procedures or ag reed ways of working explaining how data should be recorded, stored and shared. Find out what records your employer keeps and how they are kept secure 4. 4 Be aware of how and to whom to report if you become aware that agreed procedures have not been followed The paperwork you complete and things you record in your work setting might be needed as legal documents by the police or for use in court cases.This is one of the reasons why it is so important to have good recording skills. If you use a computer in your role, make sure you know how to use the files and programs properly, including how to make sure records and emails are secure. There have been several high profile cases reported in the press over the last couple of years where people’s personal data has been mistakenly made public by negligent staff, for example, leaving computer records stored on a data memory stick in a public place in error. Computers and memory sticks must be secure and password protected and never left unattended, for example, on the back seat of a car.If you become aware of any situation where you suspect or know that the agreed procedures have not been followed or are not being followed by yourself or another person, you have a duty of care to report the situation immediately to your manager or supervisor. Page 11 of 19 CIS Assessment Induction Workbook – Standard One Questions: Role of the health and social care worker 1. 1 Know your main responsibilities to an individual you support What are your main responsibilities to the individuals you support and in your role? 1 2 3 4 5 6How will you protect the rights of individuals and promote their interests? What are the values for the service you will be providing? Page 12 of 19 CIS Assessment Induction Workbook – Standard One How would you use these values in your work with individuals? 1. 2 Be aware of ways in which your relationship with an individual must be different from other relationships How does your re lationship with the individuals you support differ from your relationship with your friends? What could you do to maintain professional boundaries? 1 2 3 4 5 Page 13 of 19CIS Assessment Induction Workbook – Standard One An individual you support says you can have their Tesco club card points as they do not have a club card themselves to collect the points. The points turn into free shopping vouchers. What should you do? You are beginning to have personal and intimate feelings about an individual you support. What should you do? 2. 1 Be aware of the aims, objectives and values of the service in which you work What are the aims and objectives of your employer? How does your role contribute to the aims and objectives of your employer?Page 14 of 19 CIS Assessment Induction Workbook – Standard One 2. 2 Understand why it is important to work in ways that are agreed with your employer Why is it important to follow policies, procedures or agreed ways of working? What could hap pen if you do not follow agreed ways of working relevant to your role? 2. 3 Know how to access full and up-to-date details of agreed ways of working relevant to your role Where can you find up to date policies, procedures and details of agreed ways of working relevant to your role? 3. Understand why it is important to work in partnership with carers, families, advocates and others who are significant to an individual How can working in partnership with family members be of benefit to the individual you are supporting? Page 15 of 19 CIS Assessment Induction Workbook – Standard One 3. 2 Recognise why it is important to work in teams and in partnership with others Why is it important to work in partnership with other professionals? What is meant by each of these terms: Carers: Advocates: Significant Others:IMCAs: 3. 3 Be aware of attitudes and ways of working that help improve partnership with others What can you do to promote good partnership working with other professionals? 1 2 3 Page 16 of 19 CIS Assessment Induction Workbook – Standard One 4. 1 Understand why it is important to have secure systems for recording and storing information. Why is it important to have secure systems for recording and storing information? Give 3 examples of the types of confidential information that are kept by an employer: 1 2 3 4. Be aware of how to keep records that are up to date, complete, accurate and legible. What are the principles of good record keeping? How would having an accurate record of what has happened benefit the individuals you support? Page 17 of 19 CIS Assessment Induction Workbook – Standard One 4. 3 Be aware of agreed procedures for: – Recording information – Storing information – Sharing information What legislation covers recording, storing and sharing information? How can information stored on a computer be protected from being seen by people who shouldn’t see it?How can paper based information be protected from being seen by people who shouldn’t see it? 4. 4 Be aware of how and to whom to report if you become aware that agreed procedures have not been followed Who should you contact if you are concerned that procedures have not been followed? Page 18 of 19 CIS Assessment Induction Workbook – Standard One Shall we find out what you have learnt? Now that you have completed this section you can have a go at the online assessment for Common Induction Standard 1. To do this you will need to visit www. cis-assessment. co. k and log on by entering your username and password in the boxes provided. You will then be able to select Common Induction Standards then Standard 1. Don’t forget to read the instruction page before you start. Once you have completed this assessment and had a discussion about the results with your manager or supervisor, you may want to do a little more learning and / or return to your results and record additional evidence. You can also print out the results pages (which include any additional information you have added) for your Induction Folder and CPD Portfolio. ttp://www. cis-assessment. co. uk Copyright note for Managers and Employers The workbook(s) can be completed online or on a printed copy. You can make any changes, deletions or additions to suit your circumstances. You can personalise the workbook(s) by adding your organisation’s name and logo. Please make sure that CIS-Assessment is credited for putting the workbook(s) together and providing them without charge. You cannot copy, reproduce or use any part of the workbook(s) for financial gain or as part of a training event that you are profiting from. Page 19 of 19

Monday, July 29, 2019

A close reading of a specific and familiar space Essay - 1

A close reading of a specific and familiar space - Essay Example In ancient period, most houses were divided into two parts at a point one third of the way across its length using a small lattice work wall reaching the top of the house. The main area is reserved for human living and was covered by a layer of black clay and cow dung that women polished over it with a stone. The other reduced area paved with flagstones was meant for animals. These rooms had only one entrance and the house was organized in such a way that one end has provisions ready for consumption like flour, figs, and leguminous plants that had been preserved. Near the door, there was water jars while on the stable part from any type of tool and equipments, a number of straws and hay for animals were stacked up and this region is where the children and the women sleeps especially in winter. The male on the other hand, slept on the larger area as a symbol of authority as they were known to have visitors and could share the room. A number of items inside this house have different na mes with different meanings. For instance, kanun was the upper part of the stable where kitchen earthenware was kept (cooking pot, ladle, and dish for cooking bannock). A fireplace was also on the woman’s side and was place of cooking. The male sleeping area is usually dark since it symbolize place of intimacy and recreation. After birth, boys and girls were isolated based on their sexes and introduced to their roles within their early stages of life. However, males needed to undergo additional cultural rite to make them courageous and face the outside world suitably. Women stayed within the house most of the time as their duties were mainly cooking and washing dishes while male perform their duties outside herding or hunting for food.. The division of labor was so significant that women were to remain in the dark part of the house. These

Sunday, July 28, 2019

Bailing out Corporate America - Reflective Paper Research

Bailing out Corporate America - Reflective - Research Paper Example Sound familiar, as you can see, it was written in 1991. This very same scenario can be seen in new articles from 1943, 1980, 1991, and now 2008. The American people say that they do not want to reward greed by bailing out the corporations but greed is not the real problem. The real problem is that it fails the American dream. How might we define the American dream? It is more than cars and money. James Adams was the first to actually attempt to define it. That definition was of â€Å"a land in which life could be better and richer and fuller for everyone, with opportunity for each according to ability or achievement.† This is a dream that European upper classes might have some difficulty in interpreting and now many of our own are having trouble hanging on to. Americans have become weary and mistrustful of it. It is a dream about a social order in which each man and woman shall attain their fullest potential of which they are innately capable of being recognized by others for what they are regardless of the circumstances from which they came. This is the dream that is being lost to Americans who are working hard and losing to companies who are not. From the time we are young children, we are taught, if we work hard and do well, we will be rewarded. Essential to the American dream is the belief that you will be rewarded if you are successful. This is so much a part of the society and culture that it also becomes part of the ethics of the culture. If you work hard throughout your life, you will have what you want and maybe more. This is where the anger really comes from. Greed is part of the American dream. All Americans are greedy. Americans do not hope to have just enough, they hope to have everything they can get but they expect to get it by working hard, doing a good job, and being successful (Sandel, 2009) anything else is considered theft. Why then, are we rewarding with millions of dollars those companies

Saturday, July 27, 2019

Human Resources Management Aspects Essay Example | Topics and Well Written Essays - 2250 words

Human Resources Management Aspects - Essay Example Equal Employment Opportunities and affirmative action are terms that people commonly use in their daily lives without understanding their real meaning, the difference between them, and their application in human resource management. Equal employment opportunities and affirmative action are the principles that were set by the government and aim at ensuring fairness in workplaces since they prohibit any form of discrimination. I have seen people treat each other differently because of their different nationality, race, ethnicity, or gender. Learning this course was important since I now understand that Equal Employment Opportunity is a principle, which forbids discrimination of any type whether racial, gender based or ethic based, against any employee or persons seeking employment (Ulrich, 2005). Without this principle, it is obvious that the hiring process, promotions, access to professional development opportunities would be faced by prejudice. Learning what affirmative action is was another significant aspect in this unit. Affirmative Action is a remedy or a principle used to handle or address past cases of discrimination. Affirmative action thus ensures that organizations commit to overcome discrimination, which starts with addressing past discriminative actions and seek to eliminate all barriers that should limit or prevent professional development of any individual. The affirmative action was enacted to ensure organizations establish measures to improve the participation. of females, persons with disability as well as minority groups. For example, I have seen some organizations advertise certain jobs in women magazines to ensure that they increase the chances of women being the main applicants. It is not a new phenomenon to hear of cases where employees have been treated unjustly because of their race, marital status, disability, transgender status, sexuality, or other factors such as carer’s responsibilities. It was interesting learning that the above actions are unlawful. However, it is not a new phenomenon to hear of cases where an employer or manager who sacked an employee, for example, just because she was pregnant or because she or he was disabled and could not handle certain tasks. This is wrong since ones colour, gender or physicality does not demonstrate or even determine his or her capability. Everyone should thus be given equal opportunity to confirm their potential (Ulrich, 2005). EEO requires employers to avoid using selective criteria to offer jobs or promotions to certain groups of people particularly the minority. However, affirmative action is results oriented and is meant to correct underutilization of minority groups, which often result if employment, promotion, and career development opportunities are given equally without considering diversity. This course exposed me to the challenges faced by managers and supervisors during the hiring process since all their

Friday, July 26, 2019

Product Placement in the UK Assignment Example | Topics and Well Written Essays - 500 words

Product Placement in the UK - Assignment Example The move has been approved in recognition of the crisis that the industry is in because of declining ad revenues and to make sure that the British broadcasting networks are not rendered uncompetitive due to unnecessary restrictions. However the government has drawn the line on product exposure in children shows and the exposure of products such as alcohol, tobacco or those food products considered unhealthy.( Campbell Denis ‘TV product placement: Bradshaw bans nasties’) If we look at product placement through the marketing mix (4 P’s) perspective we can clearly see that this is a form of promotion, something that manufacturers might invest in as an alternative to advertising. If we analyze the efficacy of product placement using the tools of brand recognition and recall research indicates that brand recall and recognition was significantly improved with product placement activity. However research has generally been contradictory on whether it affects brand attitude change. These findings indicate that product placement could play a beneficial role on new product launches when achieving brand recognition is a key goal.( Kaijansinkko Riku ‘Product Placement in Integrated marketing communications strategy’) Another interesting analysis of product placement indicates that it maybe more effective then advertising because the consumers are not expecting this kind of stimuli when they are watching television or a film. This ‘Von Restorrf’ effect however maybe affected in the UK by the controversy that product placement has generated which will probably result in consumer’s expecting product placement.( Kaijansinkko Riku ‘Product Placement in Integrated marketing communications strategy’) This issue is now very pertinent for discussion after have being approved very recently on the 9th of February 2010. Although it was being discussed last year it was still far from being approved (which puts a totally different perspective on things)

Thursday, July 25, 2019

Economic Performance of Former USSR States Essay

Economic Performance of Former USSR States - Essay Example This discussion focuses on the economic performance of the former USSR states after independence and the economic relations between these countries as well as their trade, population, GDP growth, investments and debts. The essay highlights the GDP growth and economic performance of the countries like Belarus, Ukraine, Moldova, Latvia, Turkmenistan, Russia and other nations which have recently gained independence and separated from the former Soviet Union. Despite having been a part of one of the greatest superpowers, these countries except Russia are no longer prominent on the world map. Since gaining independence these former Soviet states are becoming increasingly strong in terms of economic growth and performance with relations between the states growing even better. Yet there remain several issues that suggest that these countries will have to recreate and restructure their economic strategies to emerge as economically powerful as the more advanced economies. In this review, a co mparative analysis is provided showing economic growth and performance of the former Soviet states, their internal and external relations with neighboring countries and other former Soviet states as well as their comparative GDP and population growth. The objectives of the essay would be: 1. to identify the key players in post USSR countries 2.to discover the economic relations between the CIS countries and the level of their interdependency, and 3. to rank the major former Soviet states’ performance using country growth criteria. ... Considering the transient aspect of the former Soviet states' economy, Kalantaridis (2007) highlighted the role of entrepreneurs in shaping the nature of evolving institutions. The former Soviet nation states could still be considered as transient and evolving, although the permanence of such institutions is key to stability and economic growth. The post Soviet restructuring and reconstruction of political, social and economic systems have had considerable and differential impact on the economy. The more advanced economies of the post Soviet nation states that have now joined the European Union are economically stronger although countries which are further East have seen a decline in growth of gross domestic product followed by recession although with some gains to a wealthy minority (Edwards, 2006). The reason for the fall of GDP may be due to the significant necessity for restructuring, rise in costs, and privatization. Edwards (2006) distinguished between four groups of Soviet eco nomies2. The central and Eastern European accession states to the EU have open economies with better growth, more private sector involvement and foreign direct investments. The Balkan states of the South east European regions are marked by transitional recessions and worsened income inequality whereas Russia has implemented partial economic reforms. The remaining nation states have seen declining economic growth mainly due to fall of income. As Desai and Olopsgard have suggested, "popular support for market-oriented reform in transition economies rises and falls with unemployment and job creation" 3. Thus the implementation of market oriented reforms that would be imperative for economic

Obama's Policy in Afghanistan Essay Example | Topics and Well Written Essays - 2000 words

Obama's Policy in Afghanistan - Essay Example Obama was likely to bring the ray of hope for the people of America. But for Obama it was a test of all his managerial and leadership skills. One of the major challenges that newly became president faced was making policies for Afghanistan. But before discussing Obama’s Afghanistan policy in detail it is very important to have a clear idea about the major incidents in Afghanistan over the past few years and how intensely America is associated with Afghanistan. After 9/11 America got itself directly involved in the biggest war against terrorism in Afghanistan as the country believed that Osama Bin Laden was the master mind behind 9/11. Laden was the founder of terrorist group Al Qaeda and was hiding in Afghanistan where he got support from Taliban. Thousands of US troops were deployed in Afghanistan with the objective of defeating Taliban and Al-Qaeda by catching Osama Bin Laden and other leaders of Al Qaeda and Taliban. On December 07, 2001 Kandahar which was a Taliban stronghold fell down and Bin Laden along with Mullah Mohammed Omar who was a Taliban leader escaped. On December 16 Tora Bora, the mountain cave where Taliban and Al Qaeda took shelter, also fell down. An interim government of six month was formed in Afghanistan and Hamid Karzai, was selected as the chairman of this government. In 2002 Karzai was elected as president of Afghanistan, although other Afghan factions were not happy regarding this. But on January 04, 2004 they a ll agreed on a constitution which made the way for elections (Guardian, A chronology of events in Afghanistan since the attacks of September 11 2001). Finally in October presidential election took place and in November Karzai was declared to be the winner. In the meanwhile international community was providing financial aid with the purpose of rebuilding the country. Despite of falling of most of the Taliban and Al Qaeda strongholds, several small and medium scale attacks were made from their end on

Wednesday, July 24, 2019

Polo Activity in Wellington Assignment Example | Topics and Well Written Essays - 1000 words

Polo Activity in Wellington - Assignment Example On the other hand, the National Horse Show brings in another $8.5 million which further highlights the importance of these three events not only in the tourism but also the real estate and other services industry in Wellington (Palm Beach County Club 1). The discussed origin of how Wellington becomes synonymous with polo shows that the economy has directly and indirectly invested in this revenue generating activities. Before the height of its popularity, initial investment has amounted more than just monetary but intensive and extensive marketing campaigns in order to promote these activities. Currently, these initial investments are being continued through the form of expenses in order to finance taking care of horses which are used for the race. Economic Research Associates estimates that Palm County Beach Equestrian residents are pouring in $121 million each year for the care of their 11,000 horses (Gasset and Gasset 5). With the vibrant outlook for the polo events in Wellington together with the expected increase in the GDP of the community, induced investments are also projected in the medium term. Among this is Mark Bellissimo's plan of the making the showground in Wellington part of a "multi-billion dollar 140 acre show facil ity with varied year round Equestrian events" (Gasset 3) adding that he wants to make this the "Center of The Equestrian Universe" (Gasset 3). The magnitude of how these investments in ensuring that these polo events will be as exciting, prestigious, and attractive to tourists and fans together with the revenue generated by the events can be measured by looking at these at an economic standpoint. It should be noted that the investments poured in as well as revenues generated are magnified when taken into account how these are used and passed on to the different economic players in the community. Economically speaking, the total amount of revenue and investment brought in Wellington by polo should be multiplied by Keynes' multiplier in order to really calculate how much wealth it created for the community (Brue and McConnel 225). In the case of Wellington, the huge number of fans which devote their time and money in watching the tournaments do not only shore in direct income but promoted the creation and development of vibrant service, real estate, and tourism industries which gives livelihood and revenue to Wellington. The role of investments in pump priming the economy can be illustrated by the plans of making the community an even more developed venue for polo events. For instance, when Mark Bellissimo finally puts into practice his plan of renovating the Wellington showground, we assume that this will be in an amount of $1 billion for simplicity. This amount of investment will be used to finance the sourcing of input, payment for labor, machinery, and other necessities. Thus, this $1 billion is passed on to these economic players in forms of payments, salaries, and wages. As a result, they will have a higher disposable income which they can spend for the purchase of goods and services. On the other hands, goods and other service providers will have higher revenue where they can use in order to produce more of their products. This process of wealth creation goes on and on. As an example, this paper will look at how investment creates

Tuesday, July 23, 2019

Balloon Frame Constructions Essay Example | Topics and Well Written Essays - 250 words

Balloon Frame Constructions - Essay Example The studs of wood are used to erect walls from the foundation up to the roofline that is long, concealed and is obstructed by the ventricle channels. The floor joint are normally hung from the wall studs. .Incase fire elapses in this kind of construction it spreads from the lower floors up to the floor level which leads to the collapse of the structure (Avillo, 2002, p.123). The ventricle combustion spaces are found between the walls of the studs of a balloon frame building enhancing the spread of fires from one door to the next. In case the fire spreads into the stud space or if it originates from the stud place it easily spreads from the ventricle cavity into the horizontal joints and into the attic space. When re-modeling a balloon frame building, fire stopping techniques may or may not be installed .The reason for this decision is because installation of the fire protective mechanisms can be an expensive process. It has been observed that the sprinklers cannot be used in extinguishing fires in the balloon fire structures. The basement of the balloon-frame building can easily catch fire; this is because it has an impediment access to the entire structure through using the unfirestoppable walls.

Monday, July 22, 2019

U.S. War on Terror-Iraq Essay Example for Free

U.S. War on Terror-Iraq Essay The U. S in the aftermath of terrorist incidents on September 11 in the mainland America embarked upon an anti-terrorist campaign in the world. In a following state of the union address by the president of the U. S. , Iraq was declared to comprise the â€Å"axis of evil†. President George W. Bush affirmed that the Iraqi regime exhibited its grave aggression toward United States, and hankered after to build up â€Å"weapons of mass destruction† for more than a decade. Bush further illustrated the Iraqi government as a grave and growing danger as it might employ â€Å"weapons of mass destruction† to blackmail or attack the US. He further showed a connection between Saddam Hussein’s government and terrorist groups. Bush declared that the United States of America will not permit the worlds most dangerous regimes to threaten us with the worlds most dangerous weapons. (U. S. Executive Office. 2002) Vice President Dick Cheney re-emaphzised the threat from Iraq and stated that we now know that Saddam has resumed his efforts to acquire nuclear weapons. He also declared that many of us are convinced that Saddam will acquire nuclear weapons fairly soon†¦containment is not possible when dictators obtain weapons of mass destruction and are prepared to share them with terrorists who intend to inflict catastrophic casualties on the United States. † Earnest preparations were set in motion to launch a military invasion against Iraq. An attempt at cobbling coalition of countries on the pattern of 1990 antedating the gulf-war 1 fell miserably short of its intended objectives, as U. K alone notably contributed towards the war plan, in addition to mere token contributions from Australia. As military mien and might were accumulated around Iraq with fanfare fro the purpose of war, a resolution was presented to the united nations security council as a product of after thought on the part of the U. S. and on the promptings of the British prime minister . The underlying in tent in the resolution was the conferment of legitimacy upon the anticipated invasion of Iraq. The UN resolution 1441 passed unanimously on November 8, 2002 sanctioned U. N. inspection teams to bring about disarmament of Iraq. (U. N. Security Council, 2002) The use of military force was not envisaged by the majority of the Security Council members to affect disarmament. The US and its allies moved another resolution in the council to sanction use of military force against Iraq. However, due to the inability to secure required number of votes for its passage in the SC, the resolution was withdrawn by the Y. S. The eagerness to rationalize its war efforts against Iraq led the U. S. to project shifting rational of war from disarmament of Iraq suspected to be in possession of the weapons of mass destruction, to the regime change, through bringing about political liberation and introduction of democracy in Iraq, to some others. Finally, the real motives underlying the military invasion of Iraq could not remain without coming to surface. The issue of the justification of Iraq war, once surveyed with the advantage of retrospection, imparts invaluable lessons. The doctrine of preemption contained in a document entitled The U. S. National Security Strategy was announced in September last, the epoch making events leading to the war against Iraq are the subject matter of the ensuing discourse. An astounding paradox, the war though as a mean to purge Iraq of its presumed stock of the WMD is proclaimed part of the U. S anti-terrorism campaign in the world, however, any established definition of terrorism is not yet recognized by the U. N. the substantive ramifications of such an omission are to be realized. The Iraq situation in the aftermath of war and U. S. military occupation bears an historic significance for the Islamic civilization. The outcome in the Iraq conflict, as in such instances of military occupation gathered from history, of course, will depend upon the response the Muslims are able to forge over a period against the extraordinary challenge that has come to emerge. The chief UN weapon inspector, Dr. Blix told the UNSC in a crucial report that no WMD were discovered in Iraq by the UN team. At the same time, the report maintained that Saddam Hussein had not accounted for any banned weapons. Dr. al-Baradei reported that inspectors found no evidence that Iraq had restated its nuclear weapons program. No Iraqi cooperation was needed for the inspection work, because in nuclear verification, particularly with an intrusive verification system, the presence ore absence of a nuclear weapons program in a state could be assessed even without the full cooperation of the inspected state. The U. S foreign secretary at that time Mr. Collin Powell addressed the UN SC and sought to make a case against Iraq of ‘denial and deception’. (U. S. Department of State, 2003) The satellite pictures from Iraq of the apparent evidences for the manufacture of rockets exceeding UN permitted dimensions an ranges , and for rocket launchers exceeding the size needed for limited range missiles, were beamed at the screens in the UNSC and around the world. Artistic renderings of the mobile laboratories for producing bio and chemical weapons were presented and a claim , on the basis of information gathered from defectors , was made that there were at least eighteen such laboratories in the possession of Iraq. Mr. Powell recounted that Iraq had failed to account for Anthrax and other lethal bio and chemical weapons, which according to the UN inspectors report in the 1998, Iraq was suspected of owning. Included in the evidence among the aerial photographs of the buildings was an â€Å"organizational chart† of supposed al-Qaeda operations in Iraq, a couple of tare recordings that lent themselves to varied interpretations and a large number of undated reports by unnamed Iraqi defectors. Further, in the report, the secretary made a case that Iraq had repeatedly tried to import sophisticated parts that could be used in a gas centrifuge to produce enriched uranium. In particular, that Iraq had sought â€Å"high-specification aluminum tubes from eleven different countries†. Mr. Powell admitted the fact that â€Å"there is controversy about what these tubes are for â€Å". Iraq explained that the tubes were for missiles, and that the UN experts agreed that the tubes were consistent with Iraq’s view point and â€Å"not directly suitable† for a centrifuge. According to Mr. Powell the debate missed the point: Iraq had no business buying the tubes for any purpose, for those are banned. The early reviews of Mr. Powell’s performance were mixed. In the U. S. audience he changed so many minds that half of all Americans were than ready to go to war immediately, compared with only a third the previous month, according to the Newsweek poll . In contrast among the member states of the UN, Mr. Powell’s case for a US –led war on Baghdad as a â€Å"smoking mirrors† and nothing to do with reality, and plain wrong. He described the presentation by Mr. Powell before the UNSC as a compelling case and sound argument only for the unknowing. Some critics suggested the entertainment of skepticism concerning Mr. Powell’s report. Previous instance s of the use of disinformation by the US government to drum up support for war was cited. These included from relatively subtle measures like the doctoring of satellite photos to convince the Saudi government that Iraq was amassing troops for an invasion of Saudi Arabia in 1990, to incredibly crude ones like the continuing claims by the U. S. officials, including Mr. Bush, that â€Å"Iraq† expelled weapons inspectors in 1998. However as covered in the press at the time, the inspectors were withdrawn at the behest of the U. S. The doctrine of preemption was declared in a document, â€Å"the National Security Strategy of the United States† on September 20 during an address by the president at the WestPoint. A law was also passed ,The USA PATRIOT Act, commonly known as the Patriot Act, is an Act of Congress that United States President George W. Bush signed into law on October 26, 2001. The acronym of USA PATRIOT ACT stands for â€Å"Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001. This act broadens the authority of US law enforcement agencies to a large extent for the sake of fighting terrorism on the soil of United States and abroad. The most important provisions of the Act includes that the law enforcement agencies has been made immensely powerful and they have been allowed to search telephone, e-mail accounts, medical records, financial records and many other things, restrictions and limitations have also been loosed on intelligence gathering related to other countries within the United State . the authority of the Secretary of Treasury has been increased greatly and now he can monitor and control the financial transactions, particularly those involving foreign individuals and entities. The â€Å"Patriot law† also enhances the discretion of law enforcement agencies and immigration authorities so that they can now detain and deport immigrants suspected of terrorism-related acts with more ease and less restrictions. This act also sheds its light on the definition of terrorism and domestic terrorism is included in its domain. The significance of the ‘doctrine of preemption’ resides in the fact that it represented a remarkable departure from the historical policy of the U. S. as followed by successive American presidents. (ALCU) Although Patriot act provides surveillance agencies with great powers to search and eavesdrop to intercept and counter any terrorist activity but critics of the Act has illustrated that Patriot Act forfeited legal and constitutional shields of liberty and privacy for American citizen. For example, Susan Herman views that Patriot Act is against the spirit of cherished American ideals of freedom and democracy. She described that Patriot act lack a balance between rights of the American citizens and the President’s initiative to curb the terrorist activities. She says that Presidential powers in Patriot act are imperative for the protection of American citizen’s from future terrorists attacks but he is also responsible to â€Å"preserve, protect and defend the constitution† that safeguards the privacy and individuals rights of the people. (Herman, 2002) The policy of deterrence and containment has been pursued by the U. S to prevent wars. The knowledgeable persons view this enunciation of the recent national security policy, to be a paradoxical approach in the historical perspective, for it envisages resorting to war in order to prevent it. The justification of the doctrine is perceived by its source to reside in the logic that, â€Å"given the goals of rogue states and terrorists, the U. S. can no longer solely rely on a reactive posture †¦we cannot let our enemies strike first. As a matter of common sense and self defense, America will act against such emerging threats before they are fully formed. † The newly conceived U. S. strategy is fraught with serious consequences , due to its unilateral appropriations of the prerogative to impose its authoritative order upon other nations in the world by the U. S. it makes no pretensions of referring to any legal or moral framework that is subscribed to in the world. the sovereignty of states , guaranteed in the UN charter as sacrosanct and forming one of the fundamental principles of international relations since the Treaty of Westphalia 1648, has been exposed to a hazard unknown in the world before. The UN sanctioned inspection process was proceeding satisfactorily as acknowledged by other veto-using members of the council. However, the U. S. and its allies presented a resolution in the SC to require its authorization for the immediate use of force against Iraq to bring about disarmament. As become evident that the proposed resolutions would not come to muster the requisite number of votes in the council for its passage, and there loomed the inevitable threat of vetoes from France and Russia, the US deemed it convenient to withdraw the proposed resolution. The new doctrine, tested on the grounds of its initial application in Iraq, is a counter to international law and a subversion to the collective security system of the UN . the essential element of the collective security system of the UN is the prohibition of arbitrary use of force under all circumstances, it is the prerogative of the UNSC to determine in each instance the nature of the conflict, the threat arising from it, and the measure to be adopted against an aggressor. The doctrine of preemption is a usurpation of the UNSC’s role as an international collective peace-keeping organization. The outcome of war in Iraq-the removal of Saddam Hussain , regime change and occupation of Iraq – is by no means a validation of the doctrine. As a matter of fact , abysmal failure to establish the discovery of WMD and the US not becoming a force of liberation for the people of Iraq , who are in agitation to restore their independence from foreign occupation, such aftermath of war on Iraq provides a censure, and not the justification, for the doctrine. The international commission of jurists (ICJ), in response to the ultimatum issued by Mr. Bush warning Saddam Hussein to leave Iraq within forty eight hours, declared that invasion of Iraq would be illegal and tantamount to a war of aggression. The Geneva-based non-governmental body, comprised of sixty eminent jurists, expressed its deep dismay for the reason that,† a small number of states are poised to launch an outright illegal invasion of Iraq which amounts to a war of aggression. † The ICJ insisted that without SC authorization, no country could use force against another country except in self-defense against an armed attack. It emphasized that â€Å"there was no other plausible legal basis for the invasion of Iraq than a UNSC resolution that sanctioned it. † A critical analysis of the facts and events related to the US war on Iraq harbors a wealth of lessons, which should be the subject matter of another discourse. In the aftermath of the terrorist incident s of September 11, the US has demonstrated a gradual yet persistent shift away from internationalism. The abandonment of the Kyoto protocol –the treaty establishing the international criminal court –the repeal of Anti-Ballistic missile Treaty, non-compliance with the UN Resolution 1441, launching of the invasion of Iraq without the sanction of the UNSC, the assassination attempt at Saddam-in strict legal sense and before the formal declaration of war- and the disinclination from the involvement of the UN in the administration of post-war Iraq, are the instances of the US international conduct, among others. The rational of war against Iraq, after undergoing changes as adjustments for the purpose of plausibility, has finally emerged to be the control of rich oil reserves in Iraq, reconstruction, contracts for the US construction conglomerates, and far wider strategic aims in the middle-east. Such aims include the building of military basis in Iraq and conversion of the middle-east into a â€Å"free trade zone,† as announced by the US president. To sum up, despite controversies related to the Iraq war, what is needed for Iraq both by U.S government and Iraqi nations is, as enunciated in the national security strategy of the US as well, to provide for the common defense. It is anticipated that with vision and valor the present and historic crises the world of crescent will be cope with by overcoming implicit dangers, and harnessing opportunities. Noteworthy it is, the word crisis in an ancient oriental language is comprised of two meanings at once, the danger and opportunity.

Sunday, July 21, 2019

Modern State System in International Relations

Modern State System in International Relations What is the most significant feature of the modern state and how has it shaped international relations? The core of the early modern period to vast histories of sovereignty and state formation is a topic mentioned in some of the work done by the most influential political theorists of the past century. However an attempt of understanding the nature of political consciousness requires a historical understanding of the theoretical evolution of the modern state itself. This, in turn, requires an understanding of earlier state formations and ideologies that has influenced the evolution (Nelson, 2006). In this essay, I will discuss the topic of the modern state, its significant feature and how modern state has shaped international relations. In discussing the features, this essay also aims to identify and define the term state, its components and how modern state transformed, followed by the main significant feature and its impact towards the new era of international relations. The modern state is believed to have risen between the fifteenth and eighteenth centuries in Europe, and later spread to the rest of the world through conquest and colonialism. This ideal of modern state comprises of four defining characteristics that is bureaucracy, legitimacy, territory, and sovereignty (external and internal). States uses these four characteristics to provide their citizens goods such as security, a legal system, and infrastructure (Drogus Orvis, 2014). A failed state or â€Å"weak state† is a state-like entity that cannot coerce and is unable to successfully control the inhabitants of a given territory (Clark Golder, 2012). They are incapable of providing these goods, and once a state has become weak, it loses effective sovereignty over part of its territory. The most definitive terms of state comes from the German political sociologist and economic historian Max Weber (1864–1920). Max Weber claims that â€Å"the state is human community that successfully claims the monopoly of the legitimate use of physical force within a given territory†. He argued that â€Å"the state cannot be defined in terms of its ends and ultimately, one can define the modern state only in terms of the specific means peculiar to it, as to every political association, namely, the use of physical force† (Weber, 1958) . There are two recent definitions of a state, the first by a sociologist named Charles Tilly and the second is by the Nobel-laureate economist, Douglass North. According to Tilly, states are â€Å"relatively centralized, differentiated organizations, the officials of which, more or less, successfully claim control over the chief concentrated means of violence within a population inhabiting a large contiguous territory† (Tilly, 1985). On the other hand, Douglas North says that â€Å"a state is an organization with a comparative advantage in violence, extending over a geographic area whose boundaries are determined by its power to tax constituents† (North, 1981). There are three components to the modern state comprises of territory, people and central government. Territory comprises of the element on which its other elements exist. People are every territorial unit that participates in international relations supports human life. Central government is the members of the st ate designated as its official representatives. Some of the significant features of modern state may be the dominant form of political authority and imagination today but it has taken many and specific forms across the world without completely removing or overruling older languages of power and public authority. According to Weber, the modern statemonopolizesthe means of legitimate physical violenceover awell-defined territory. Monopoly on force– has the right and ability to use violence, in legally defined instances, against members of society, or against other states. Legitimacy/authority– its power is recognized by members of society and by other states as based on law and some form of justice. Territoriality– the state exists in a defined territory (which includes land, water and air) and exercises authority over the population of that territory. Sovereignty the idea that there is a final and absolute authority in the political community’, with the proviso that ‘no final and absolute authority exists elsewhere. Constitutionality Impersonal power The public bureaucracy Citizenship (Pierson, 1996) The most significant feature of modern state is undoubtedly the monopoly on force. All states will at least use the threat of force to organize public life. The fact that dictatorships might use force should not hide the fact that state rule in democracies is based on the threat of force (Mandisodza, 2012). This explains why North and Tilly only claim that states must have a â€Å"comparative advantage in violence† or have control â€Å"over the chief concentrated means of violence†. More important than the actual monopolization of violence may be the inauguration of a unitary order of violence. Violence and the threat of violence continued to be a chronic feature of the daily life (Pierson, 1996). A state is more than a government. A state is the medium of rule over a defined or sovereign territory. It is comprised of an executive, a bureaucracy, courts and other institutions. In a broad sense, any polity, any politically organised society, can be viewed as a state and various criteria can be used to distinguish between different kinds of state. However, according to Phillip Bobbit, state loses its legitimacy when it can no longer fulfil the function of maintaining, nurturing and improving the condition of its citizen (Axtmann, 2004). Some of the highlighted developments that was identified as essentially undermining the legitimizing premise of the nation-state to improve the wellbeing of the people were; first, the recognition of human rights as norms that require adherence within all states regardless of their internal laws; second, the development of weapons of mass destruction that render the defence of state borders ineffectual; third, the proliferation of global and tran snational threats that no nation-state alone can control or evade; fourth, the growth of global capitalism, which curtails the capacity of states for economic management; and, fifth, the creation of a global communications network that penetrates borders and threatens national languages, customs, and cultures (Bobbitt, 2002). These developments and the loss of legitimacy of nation-state, has led to a new constitutional order, which is the modern state. Changing  interpretations of the modern state  would certainly provoke conflicting views of sovereignty in the context of international relations. Modernization has brought a series of benefits to people such as equal treatment of people with different backgrounds and incomes, lower infant mortality rate, lower starvation-caused death, lower cases of fatal diseases, and so on. However, there are also the negative sides of modernity pointed out by sociologists and others. Technological development and environmental problems such as pollution are another negative impact of modernity. Additionally, the declining definitions of human nature, human dignity, and the lack of value in human life have all been indicated as the impact of a social process/civilization that reaps the fruits of growing privatization, as well as a loss of traditional values and worldviews. Because states needed to acquire greater wealth to finance military and political endeavours, a competitive state system b ased on the support of wealthy aristocrats emerged. This also contributed to the rise of mercantilism, and, ultimately, a modern capitalist economy (Farr, 2005). In conclusion, while many of these features of modern state have been rendered, histories seem to suggest those aspects may not be simple exceptions to the essential characteristics of modernization, but mandatory parts of it. As we approach the end of an era of a politically sovereign nation-state, we are also beginning to recognize that state’s self-sufficiency is hard to achieve. As a result, modern wars were categorised into two, either imperialistic wars designed to allow powerful states to become more self-sufficient by taking control of populations, territories and resources to be used for that purpose, or nationalist wars designed to reunite parts of the nation with the national state (Elazar). What is needed is a new kind of imperialism that is adequate to a world of human rights and cosmopolitanism value. Yet the weak still need the strong, and the strong still need an orderly world, in which an efficient and well-governed export stability and liberty, and openness f or investment and growth seem eminently desirable. But it leaves many question unanswered, and above all we are still left wondering how different states will be in the future. References Ahmad, R.E., Eijaz, A., 2011, â€Å"Modern Sovereign State System is under Cloud in the Age of Globalization†, South Asian Studies – A Research Journal of South Asian Studies, Vl.26, No.2, pp.85-297 Axtmann, R., 2004, â€Å"The State of the State: The Model of the Modern State and its Contemporary Transformation†, International Political Science Review, Vol.25, No.3, pp.259-279 Bobbitt, P., 2002, â€Å"The Shield of Achilles: War, Peace and the Course of History†, London: Allen Lane. Bobbitt, P., 2002, The Archbishop is Right: The Nation-State is Dying, The Times Clark, W.R., Golder, M., Golder, S.N., 2012, â€Å"Chapter 4: The Origins of the Modern State†, Principles of Comparative Politics, Vol. 2, pp1-66 Closson, S, Kolsto, P, Seymour, L.J.M., Caspersen, N, 2013, â€Å"Unrecognized States: The Strugge for Sovereignty in the Modern International System†, Nationalities Paper: The Journal of Nationalism and Ethnicity, Routledge Publishing, Vol.41, pp.1-9 Drogus, C.A., Orvis, S., 2014, â€Å"Chapter 3: The Modern State†, Introducing Comparative Politics: The Modern State, Sage Publication CQ Press, 2nd Edition Farr, J., 2005, â€Å"Point: The Westphalia Legacy and The Modern Nation-State†, International Social Science Review, Vol. 80, Issue 3/4, pp.156-159 Mann, M, 1993,â€Å"A Theory of The Modern State†, The Sources of Social Power Volume 2, The Rise of Classes and Nation States 1760-1914, Cambridge University Press, Vol.2, pp.44-89 Morris, C.W, â€Å"The Modern State†, Handbook of Political Theory, Sage Publications, pp.1-16 Nelson, B.R, 2006, â€Å"State and Ideology† The Making of the Modern State – a Theoretical Evolution, Palgrave Macmillan, pp.1-177 Netzloff, M., 2014,â€Å"The State and Early Modernity†, Journal for Early Modern Cultural Studies, University of Pennsylvania Press, Vol. 14, No.1, pp.149-154. North, D.C., 1981, â€Å"Structure and Change in Economic History†, New York: W. W. Norton Company. Pierson, C, 1996, â€Å"The Modern State: The Second Edition†, Routledge Taylor Francis Group, pp.1-206 Sidaway, J.D., 2013, â€Å"The Topology of Sovereignty†, Geopolitics, Department of Geography, National University of Singapore, Vol.18, No.4, pp.961-966 Tilly, C., 1985, â€Å"War Making and State Making as Organized Crime† Peter Evans, Dietrich Rueschmeyer, Theda Skocpol (eds.), Bringing the State Back In, New York Cambridge University Press. Weber, M, 1958 [1918]. â€Å"Politics as a Vocation†, Weber: Essays in Sociology, New York Oxford University Press. pp. 77-128. Chapter 3: The Modern State, http://www.chsbs.cmich.edu/fattah/courses/introPolSc/ch03state.htm Conflict Resolution and Sustainable Peace Building – The Post Modern State,http://www.world-governance.org/article86.html?lang=en Mandisodza, G.J.T., 2012, â€Å"Chapter 4: The Origins of a Modern State†, https://files.nyu.edu/sln202/public/chapter4.pdf The Problem with Sovereignty: The Modern States Collision with the International Law Movement, http://www.isn.ethz.ch/Digital-Library/Articles/Special-Feature/Detail/?id=135613contextid774=135613contextid775=135611 The Rise and Fall of the Modern State System, http://www.jcpa.org/dje/articles/risefall-state.htm#top 1

Biometric Technologies: Advantages and Disadvantages

Biometric Technologies: Advantages and Disadvantages Abstract There have two aims of this project. Firstly is to provide an objective analysis of available biometric technologies, to identify their strengths and weaknesses and to investigate a broad range of application scenario in where biometric techniques are better than traditional recognition and verification method. Another aim is to develop a product. Now a day most of the online banking and financial organization are trying to convert their existing online banking in open source Java or in some other open source platform, so that it could be more reliable, secure and difficult for the hacker to hack such open source management system. Most of the systems are still using the login ID and password typing functionality which is not secure at all as anybody can steal password by using a hidden Keystroke logger or like this sort of software and another problem is user need to remember so many password and user ID for different web services. From a statistical observation it found that more than 70% people write down their Username and password, which can be stolen, lost and can be misuse by others. If the organizations could integrate secure fingerprint or any other biometrics built in functionality then it could be more secure, reliable, easier and hassle free for the user. To get ride from such problem I have tried to develop such a model of secure web service integrating with fingerprint recognition where users no need to remember or insert anymore user name or password. Although there has lots of password replacement fingerprint software available in the market but as my knowledge such software doesnt work for completely platform independent (Java based) secure web service. I have used platform-independent Java 2 Platform Enterprise Edition (J2EE), Netbean, Jboss server, sql data base and open source bio-sdk to develop this model. Preface Although this web service has integrated only with the fingerprint functionality due to limitations of hardware and other resources but in here has critically investigate about the strengths and the security hole of other biometric functionality, so that in future such biometrics functionality can be imply. Another constraint with regard to this report is time. To provide more strength and security for that system, many features could be added like development of better algorithm to fix the security hole of the fingerprint software. To cope with the time changes are an inevitable part of the software or web service development but many have been entirely avoided in this case as they would not have added any value to the principal purpose of this project. Problem Areas for that Project Biometrics is a young technology, therefore relative hardware is not that available in the local market and they are so expensive to buy personally. Unfortunately there is no biometrics hardware in the CMSs hardware lab. As well as there is no biometrics software or equipment. It was requested to buy some hardware for this thesis purpose but unfortunately the university was not agree to buy or manage anything which is related to biometrics. Many companies of this biometrics fields were requested personally to help or give information regarding their product but they denied for the marketing reason. There was no biometrics related books in the university library. Moreover the library was unable to provide. So without any technical and theoretical support it was really hard to gain new idea and to make a new product which is related to the biometrics. Some biometrics hardware has been bought personally for this thesis. With the extraordinary help, advice and encourage from the supervisor this work has been done. Section One: Background Literature of Biometrics Chapter 2: Background Literature of Biometrics Now a day biometrics is a well known term in the information technology. The origin of the word biometrics comes from Greek language. Bio means life and metrics means measurement. So the biometrics is related to the measurement of a living thing. But in the information technology it means an automated process where a human is recognised or identified using his/her physiological or behavioural characteristics. The specific physiological characteristics is collected, quantified, measured, compared with the previous stored characteristic and decided. So it is the process for the identification not any innovation. 2.1 A short history of biometrics: In the normal life a person has been recognised or identified based on face, body structure, height, colour, hair etc. So in that sense the history of biometrics identifiers or characteristics is as old as mankind history. In the ancient East Asia, plotters used their fingerprint on their products which is the identification of individual. In the ancient Egypt the people use some characteristics such as complexion, eye colour, hair, height to identify trusted traders. But for a long time biometrics had not been considered as a field of study. At the late 1880, the biometrics gained the interest as a field of study. The credit was Alphonse Bertillon who was an anthropologist and police clerk. He was tried to identify convicted criminal to others. He first discovered and mentioned that some physical measurement of an adult human is invariant of time. These combinations of measurements are different to human to human. So these measurements can be used to recognize an individual from other (Scottish Criminal Record Office, 2002a). His theory was known as Bertillonage or anthropometry. That time his theory was appreciated and thought to be well established. The main measurements which he suggested are given in the picture 2.1. But in the year 1903, it was found that his theory was wrong for the identical twins. That time an identical twin was found, according to his theory they are single person. So the new theory or new characteristics were looking for the identification. It was said that Sir Edward Henry was the first who interested on finger print for the purpose of identification. He was an Inspector General of Bengal police. In 1986, he ordered to record the prisoners fingerprint as an identification measurement. He tried to introduce the classification system of the fingerprint. In the year 1901, Sir Henry was joined as Assistant Commissioner of the Scotland Yard. After then a finger print bureau was established. That time the failure of the anthropometry system made the finger print system well known. Finger print system was started to use for the purpose of identification of a person. The system is used as same way still today. Automated system to read finger print was first introduced in the early 1970s. The first finger-print measurement device was first used in 1972 which was known as Identimeter. This device was used at Shearson Hamil named Wall Street Company. The purpose of this device was time keeping and monitoring. Day after day the interest of this biometric system was increased. The decrease of the hardware cost of the computer and improvement of the algorithm increase the research of the biometrics. 2.2 Biometric characteristics: 2.2.1 General requirements for a characteristic using as a biometric identifier: In the biometric history section, it has been discussed that several characteristics were consider as an identifier of human. But many of them were rejected. According to the Amberg 2003, if a characteristic can be considered as an identifier for the biometric purpose then it should mitigate some requirements such as university (Every human should have that characteristics), uniqueness (That characteristic should be different person to person), permanence (that characteristic should be permanent) and collect ability (that characteristic should be able to collect and that should also be measurable). There are some additional requirement can be applied with a these requirement such as performance (It accuracy should be high, it should need minimum resources), acceptability (it should be accept everywhere and it should also be acceptable to the future users), fraud resistance (It should have higher security level and can be resistance to fraudulent), cost effective (it users benefit sho uld be many times higher then its using cost). 2.2.2 Classification of the characteristics which can be used as biometric identifiers: Biometrics characteristics or identifiers can be categorized into two groups. They are Physiological type and Behavioural type. Physiological type: This type of characteristics is related to human body or anatomy. Finger print reading, DNA analysis and face of individual which are frequently used as biometric identifiers of this type. The use of retina and the iris will be prospective future. This type pf characteristic can be divided as genotype and phenotype. A group of people can have the same genotype characteristics. Blood group, DNA analysis these are the two most commonly used genotype characteristics. In contrast to genotype characteristics, phenotype characteristics can be having only single individual, so this type of characteristics is different from person to person. Finger print, retina and iris are this type of characteristic. Behavioural Characteristics: This type of the characteristic is related to human behaviour. Signature is the most commonly used characteristics of this type. Human voice analysis and key stoke is another two characteristics which are now also be used. This kind of characteristics is the indirect measurement of the human body. This type of characteristics has been learned or trained; therefore these can be different from time to time. But when a human reach in a certain age, the change of behaviour is negligible, therefore these type characteristic used as identifiers. In the 2.2 the frequently used biometrics characteristics have been shown. 2.2.3 Contrast of the biometrics characteristics: A contrast of biometrics characteristics has been given in the table 2.1. Table 2.1: A contrast of the biometrics characteristics (Jaine et al. 1999) From the table 2.1, it has been said that the physiological characteristics have the better performance then the behavioural characteristics. From the table 2.1, it has also been seen that some biometrics trait can be regarded more universal, unique and permanent then the other. Such as Iris, DNA, body odour and finger print. But the Iris, DNA and body odour are promising, they need future research and Experiment. Their cost is high, so they are not cost effective. So, now in present the finger print is one of the most accepted biometric traits. 2.3 Establish Identity Now a day society has been changed significantly. In the past, everyone of a community knew everyone. But now a day, globalization has been changed the situation. Peoples are now interconnected electronically. They are mobile all around the world. So establishing identity is one of the most important task. 2.3.1 Resolving identity of an individual: There are two fundamental problems occurs for this purpose. They are authentication and identification. Authentication problem: This problem is also known as verification. This problem arises to confirm or denied anyones claimed identity. When any person claimed an identity then this operation process required a comparison. The comparison occurs between submitted biometric samples and the stored samples for the claimed identity. This process is called a ‘one to one comparison. For an example an ATM (automatic teller machine) can be considered. For ATM machine the authentication problem has been solved in a two stages process. First stage is to possess a valid ATM card. The second stage is to know the PIN (Personal Identification Number). If anyone know the other persons PIN and possess his/her correspondence ATM card then that person can claimed the identity of the original ATM card owner identity. This kind of fraud activities have been increasing day after day. According to Jain Et Al, 1999, In 1996 ATM associated swindle activities valued in USA 3 billion US dollar. In the oth er hand biometrics system promotes a system which can overcome this authentication problem. Recognition problem: This is also known as identification problem. This problem occurs when a person has been identified from a set template of database. In this problem the persons data has been compared against the data from the database. It is ‘one to many system. An example would help to clear the concept. To identify a criminal a law enforce officials some time lifted finger print or other data from the crime scene. After then they compare the data with the stored data of known criminal. By this way they might be able to identify the criminal. According to the UK Biometrics Working Group (2002), all the biometric matters does not included in the title of verification and identification. Therefore three more pair of terms has been introduced. These three pairs are (1) Positive claim of identity and negative claim of identity, (2) Explicit claim of identity and implicit claim of identity, and (3) Genuine claim of identity and imposter claim of identity. Positive claim of identity is also known as positive identification. In this process the claimed persons identity should have to be enrolled before and known to the system. An example would help to realize the process. An online email account customer enters his or her login name and password into the system, the system compared the combination of these two against a set of data where customer data has been stored before. If the combination of the login name and password has been matched then the user has been verified. The process needs only the login and pass word nothing else. So the email provider does not know who is actually using the account. Negative claim of identity has been known as negative identification. In this process the claimed persons identity has not been stored before. So the claimed person can enters only one time, after entering his/her identity has been stored in the system and he or she cannot enters again. Such kind of example is American Social Security. According to the Jain Et Al, 1999, around a billon of US dollar has been taken away annually by using multiple identities from the social security welfare in USA. In the case of Explicit Claim of Identity, a person unambiguously declares his identity to the system. The claim may be negative claim or positive claim. His/ her submitted identity has been compared with the stored data in one to one comparison. (One to one comparison has been described in the authentication section). Using ATM card is an example of the positive explicit claim of identity. To realize the negative explicit claim of identity, consider an air port where the face recognition system has been established. If a passenger is similar to a known terrorist person then the system would raise the alarm. Then the passenger needs to claim the explicit negative claim of identity. So the passengers other identity such as finger print, iris etch has been compared against that known terrorist in one to one basis comparison. Implicit claim of identity can be positive or negative claim. In this process a persons identity has been compared in ‘one to many comparison basis against all stored identities. When anyone claims an honest claim to be himself or herself then it is called the genuine claim of identity (UK Biometric Working Group, 2002). In this case his / her identity has been truly matched with the stored identity. Imposter Claim of Identity is the process where anyone claims to be someone else is deceit or false (UK Biometric Working Group, 2002). In this case submitted identity does not match with the stored identity. 2.3.2 Verification Technique: According to the Mitnick, 2002, the Verification technique can be divided into three types. They are (1) Knowledge based verification technique, (2) Token based verification technique and (3) Biometric based verification technique. Knowledge based verification system: In this process some information has been used, that information is secret (combination of pass word/PIN/Memorable words etc), usually the person of the original identity has been supposed to be acquainted with secret information. People may travel from distance to distance, so that their memorable secret information will be with them. So it can be said that it will be suitable to use from a distance or remote place. But this type of authentication has some serious drawbacks. By using Trojan horses and Spywares a hacker can know the others secret information. Trojan horses and Spy wares are able to send the key stoke as email. So this knowledge based verification is not a secure system. Most of the times people use their known name as secret information for the knowledge based verification system. So, it might be possible for the others to guess. Sometimes people do not change their secret information in the knowledge based verification system for a long time. Their secret information is not secure. Sometimes they keep their initial secret information, so that it might be easy to hack. Many types of hacking methods have been developed such as dictionary attack, Hybrid methods, brute force attack etc. In comparison to other technologies, this is cheap and has a large level of security stage. Token based verification system: In this system the claimed identity person should have something which should be used with the secret information. ATM card is an example of the token based verification system. It can be said that it is more secure then the knowledge based verification process because if the token has been lost or stolen then its user can notify. Biometric verification system: In this system users biometric distinguishing characteristics such as finger print, face, signature, etc have been used which represents the users appearance. These characteristics are moved with the users they are more secure compare to the other two systems. It is quite impossible to use by the unauthorized person. But this system is relatively costly. Actually no system is fully secure. All of the three systems have some serious drawbacks. Secret information can be hacked, unauthorised person can stole the token and use that and it is also possible to copy biometric information and later replay those (Woodward Et Al. 2003). In order to counter these drawbacks, multiple verification systems can be used. ATM card is an example of the combination of knowledge based verification system and token based verification system. If in the future, the iris scanner is available then it will be more secure if iris scanner has been used with the ATM card. 2.4 The components of a general biometric system and their function: A general biometric system can be divided into five subsystems. They are: (1) Data acquisition system, (2) Data transmission system, (3) Signal processing system, (4) Data storage system and (5) Decision making system. In the 2.2 a general biometric system has been shown. Data acquisition system: It has been assumed that every biometric system has two characteristics. They are uniqueness and repeatability. Uniqueness represents that every persons biometric trait is different. It will not be same for the two persons. The repeatability represents that the biometric trait will be same over time. In this acquisition system the sensors measure the users biometric characteristics. These characteristics are said as samples which have definite attributes. The type of presentation and the reader quality can affect the sample qualities. Data Transmission system: Most of the cases the data collection and processing is not at the same location. So there is a one subsystem which function is to transfer the data. In the data transmission system, compression and expansion has been functioned depend on the size of the sample. The standard protocol has been used for compression and expansion. When the facial image has been sent JPEG format has been used. WSQ format has been used for transferring the data of fingerprint and CELP format has been used for the voice. Data processing system: there are three parts of signal processing system. They are: (1) feature extraction section (2) quality control section, and (3) pattern matching section. At the extraction section the appropriate biometric data has been split from the background information of the sample. This process is called segmentation. For an example, in a face detection system facial image has been separated from the wall or other back ground. After the extraction the quality has been checked. If the quality of the data is very poor then another sample has been asked. After this section, the pattern matching process has been started. After then the decision making section. Featured data from the pattern matching section has been stored to the storage section depends on the function of the overall biometric section. Data storage section: From the pattern matching section, some featured of data has been stored as data storage section as template. The main purpose is to compare with the incoming feature. If the overall system is based on one to one matching then the data storage section can be decentralized but if the overall system has been functioned for the one to many matching then the central data base has been needed. Decision making system: Quality score and the matching score have been sent to the decision making section from the processing section. The decision making system decide the sample has been accepted or denied. The policy is specific depends on the system security expectation. If the number of false non match incident has been increased then the number of false match will be decreased. 2.5 Performance of a biometric system: The main focus of a biometric system is to ensure the security where only the authorised used can be accepted and non authorised users are denied. The system processing speed is usually given to less priority. The main considerable factors of a biometric system are mainly described by some terms such as Failure to En-roll Rate (FTE), Failure to Acquire Rate (FTA), False Acceptance rate (FAR), False Rejection rate (FRR), False Match Rate (FMR), False Non Match Rate (FNMR) etc. False Match Rate (FMR): This represents the serious type of fault of a biometric system. This occurs when an authorised users biometric information match to an unauthorised persons identity. In this case the signal processing system produces a high matching score of a non corresponding template. False Non Match Rate (FNMR): In this case the authorised persons biometric features are unable to produce enough high matching score to qualify. This is the opposite of FMR. One of the main reasons of FNMR is partially less quality of the biometric features. Comparison of FMR and FNMR for the different biometric system: The main aim of a biometric security system is to reduce the rate of False Match Rate (FMR). On the other hand if the False Non Match Rate can be reduced then the system will be more fast and reliable. But all the time there is a relationship between FMR and FNMR. In the 2.4, relationships have been shown for different biometric system. Higher False Match Rate (FMR) is not acceptable, but for the low FMR the False Non Match Rate (FNMR) is considerably higher in every system. Failure to En-roll Rate (FTE): Sometimes the biometric system cannot make a valid template for some users. Although biometric characteristics are universal but some case there are differences. For an example for a very low number of peoples finger print cannot be enrolled in the system such person who use their hands aggressively such as construction workers or carpenter. So Failure to En-roll rate is the ratio of the number of the people whose biometric features cannot be enrolled to system to the number of the total person who use the system. In the 2.5 a practical test result has been shown where Failure to En-roll (FTE) has been measured for the different system (Mansfield Et Al.2001). Failure to Acquire Rate (FTA): Sometimes the system cannot acquire data of the desired quality due to the readers/sensors, instrumental problem, environmental problem, noise level of data, background data etc. Simply Failure to Acquire Rate (FAR) represents those biometric sample which cannot get high quality score to go the decision making section. False Acceptance Rate (FAR) and False Rejection Rate (FRR): these two terms are related to the False Match Rate and False Non Match Rate. False Acceptance Rate (FAR) and False Rejection Rate (FRR) are related to the whole biometric system. On the other hand the False Match Rate and the False Non Match rate are related to the single matching process. So in the case of FAR and FRR, Failure to Acquire Rate of the system should be included. According to Mansfield Et Al.2001, relationships can concluded as follow: FAR (Ï„) = (1-FTA) FMR (Ï„) FRR (Ï„) = (1-FTA) FNMR (Ï„) + FTA Here, FAR- False Acceptance Rate Ï„- Decision threshold FTA- Failure to Acquire Rate FMR- False Match Rate FRR- False Rejection Rate FNMR- False Non Matching Rate Each point of the receiver operating characteristics (ROC) curves is corresponded to a definite threshold decision making score which has a particular False Rejection Rate and False Acceptance Rate. For the Forensic purpose, False Rejection Rate should be lowest and for the high security access purpose, False Acceptance Rate should be lowest. Section Two: Biometric Technology 2.1 Physiological Biometric In this section has mentioned about the pattern of fingerprint, hand geometry, pattern of iris, facial, retinal and vascular characteristics as a possible biometric identifier. 2.1.1 Fingerprint Pattern Fingerprint is the oldest, popular and definitely the most widely publicly acceptable mature biometric identifiers. It perfectly meets the necessary criteria for of a biometric identifier like universality, distinctively, persistent and collectability. They are impressions of the friction ridges on the surface of the hand. In the most application and in this thesis as well, the primary concern is focused on the ridges located above the end joints of fingers. However, in certain forensic applications, the area of importance is broader including the fingers, the palm and the writers palm (WOODWARD ET AL. 2003). Since early 1970 Federal Bureau of Investigation (FBI) has initiated extensive research and development efforts on fingerprint identification. Their main aim was to invent an automated fingerprint identification system (AFIS), so that it could be helpful for forensic purposes (RUGGLES 1996). 2.1.1.1 Feature and Technology There are two main elements in fingerprint matching technique: firstly minutiae matching and secondly pattern matching. In the bellows shows regarding the primary technique that analyzes basic minutia types: Macroscopic overview, universal pattern matching, focus on the integral flow of ridges -these could be categorized into three groups: loops, whorls and arches. Every individual fingerprint should be fit into one of these three categories that shown in the bellows Now a day most of the application depends on the minutiae matching. If a fingerprint scan device capture a typical fingerprint image then there could be identify around 30 to 60 minutia patterns. Federal Bureau of Investigation (FBI) has confirmed that it is not possible for two individuals, even for monozygotic twins also to have more than eight common minutiae. For matching minutiae are examine with type, shape, co-ordinate location (x,y) and direction. In the bellows has shown about the automated minutiae matching process based on these attributes: In the above describes a case in where the input image (in left) is trying to match against a stored template (in right). 39 minutiae were detected in the input, while the template contained 42 different minutiae. The matching algorithm identified 36 matching data points. (Source: Prabhakar 2001) In the above , inputted image (in left) has detected 64 minutiae while in the template (in right) contain 65 different minutiae. The algorithm identified 25 completely non-matching data points. There need a scanning or capture device to obtain such images. Since 1970s, lots of researches have been done to develop and improve such devices. As a result optical, capacitive, ultrasonic, thermoelectric, radio frequency and touch less scanners has invented and now a day most of them become less expensive and available in the market. Optical device / scanner: The first method to capture the fingerprint image was the optical scanning technique. Frustrated total internal reflection is the main principle of the operation of such scanner. In that case the finger is placed on the glass platen and illuminated by the laser light. The surface of the finger reflects certain amounts of light depending on the depth of the ridges and valleys and then reflectance is captured by a CCD (charge-coupled device) camera that constitutes of an array of light sensitive diodes called photosites (OGORMAN 1999). The big advantage of such device is they are cheaper among all of the automated biometric devices and also available in the local market. The disadvantage for such device is: it could be easily fooled by impostors. The latent fingerprint left on the scanning surface, its a big drawback of such device as anybody can collect the latent fingerprint image from there to spoof. Optical Scanner â€Å"Digital Persona† has used to integrate the fingerprint scanning support for the product of that project are using popular U.are.U fingerprint recognition systems depicted in the below . In October 2003, the US Department of Defence has chosen digital persona scanner to secure network security at desktops in its offices in Washington, D.C. (digital persona 2009). Capacitive Scanner / devices: since their first appearance in 1990, such devices have become very popular. A capacitive scanner is a solid-state device, which incorporates a sensing surface composed of an array of about 100.000 conductive plates over which lies a dielectric surface. When a user touches the sensor, the human skin acts as the other side of the array of capacitors. The measurement of voltage at a capacitor decreases with the growing distance between the plates. Therefore, the capacitance measured at the ridges of a fingerprint will be higher than the capacitance measured at the valleys. These measurements are then analyzed in a way similar to a sonar scan of the ocean bottom, resulting in a video signal depicting the surface of the fingerprint (OGORMAN 1999). The advantage of capacitive scanners is its very high accuracy rate. Another big advantages that they are much harder to fool than optical scanners since the process requires living tissue. As the users need to touch the silicon chip itself, solid-state scanners are susceptible to electrostatic discharge (ESD). Recent chip designs were specifically developed to withstand high levels of ESD and frequent handling. modern capacitive device manufacturer like Veridicom claims that their chips will survive around 1 million touches (Ryan 2002). Thermoelectric device: It is silicon based. It measures the difference of temperature between the ridges touching the surface of the sensor and the valleys distant from them (OGorman 1999). Although thermal scanning is very promising but it is still an uncommon method. A company named Atmel proponents of this technique. It uses finger sweep method to capture fingerprint in a tiny si