Sunday, December 29, 2019

My Philosophy of Education Essay - 1519 Words

Philosophy of Education If I had to pick one view that is most compatible with my own view and learning and teaching it would have to be Constructivism. If I got to choose another one I would go with Cognitive. Constructivism is a view that focuses on the active role of the learner and a Cognitive view sees learning as an active mental process of receiving, remembering, and using knowledge. Both of these views see the role of students as an active role; an involved role. I believe that we learn knowledge and change our behavior based upon this knowledge; instead of the other way around. I used to be somewhat of a behaviorist in that I put too much of the teachers focus on the behavior of the students. I have began to stray away†¦show more content†¦Just because something was used and found to be successful in the past doesn’t mean it should be used now; and if it’s won’t work I’m obviously not going to use it. A good combination of views and techniques is the most suffice way to obtain a philosophy of your own. Every pure philosophy, by itself, has faults. I refuse to rely on one point of view to be the guideline to how I prepare my students for the future. There is a certain code if you will to how a teacher should act and just as important how he should present himself. I assumed that these rules were a given; that everyone automatically knew them. Unfortunately I was wrong. Some of today’s teachers do not know anything about either of these guidelines. A teacher should not only dress accordingly but more importantly act appropriately. Showing kindness to all of ones students should be a main priority. Avoid becoming a pushover, but become a friend to your students. This is where I think my old philosophy became a little too idealistic. I touched on this earlier and once again I think that the teacher student relationship has become too impersonal and a friendship between a teacher and a student is not very common in today’s classroom. A friendly, trusting teacher-student relationship is hard to obtain. A mutual respect can be more easily obtained and will create a better more effective learning environment. I t is also important that aShow MoreRelatedMy Philosophy On The Philosophy Of Education844 Words   |  4 PagesIn mathematics, as in life, everything must be brought to the simplest of terms. I base my teaching philosophy on the foundation that every student is capable of learning mathematics. I will strive, as a teacher, to ensure that my students are able to have a strong foundation of mathematical skills when they leave my classroom. Some students believe that they are not mathematically gifted; therefore, incapable of learning mathematics. I believe to the contrary, all students with motivation, sustainedRead MoreMy Philosophy On Philosophy Of Education852 Words   |  4 PagesMy Philosophy of Education My philosophy of education is founded on a belief that all students have a desire to learn and to feel accepted. Learning takes place when students are able to have their specific needs meet inside the classroom, to feel accepted in the environment, and find the learning to be meaningful. I believe that before learning can take place a proper educational environment must be present inside the classroom. In order to make any classroom work I believe you need meet three criteriaRead MoreMy Philosophy Of Education As A Education864 Words   |  4 Pagesdifferent philosophy of education, and what purpose education serves in a child’s life. The five philosophies of education that we recognize are: Essentialism, Perennialism, Progressivism, Social Reconstructionism, and Existentialism. I would most recognize my philosophy of education as Essentialism. Essentialism has been a dominant influence in American education since World War II. It focuses on core curriculum of traditional academic topics. I believe that the purpose of education is teachingRead MoreMy Philosophy of Education824 Words   |  4 Pages13 February 2011 My Philosophy of Education I believe that progressivism educational philosophy most closely matches my educational ideals. In my opinion based on the progressivism educational philosophy, the purpose of education is to enable students to learn useful knowledge that has meaning to them in the future. Thus, the most useful education for students is the skill of â€Å"learning how to learn†. When students understand the methodsRead MoreMy Philosophy Of Education And Education1038 Words   |  5 PagesMy Philosophy of Education When trying coming up with a personal philosophy of education, I had to ask myself what the purpose of education is. To me, the purpose of education is to teach students knowledge that is needed to make it through school and to succeed in the world after graduation. Anyone can go into teaching, but not every teacher can teach. Teachers go above and beyond to introduce methods, philosophies, and strategies to help their students learn, as well as, retain the informationRead MoreMy Education Philosophy 1511 Words   |  6 PagesPersonal Mission Statement Education is the imparting and acquiring of knowledge and skills through teaching and learning. As an educator, my personal mission statement is to master my subject area in order to serve as a role model for my students thereby producing students who thoroughly understand the subject matter, and who develop holistically. In order to achieve this goal I must have a set education philosophy with a strong Christian worldview. I must also have a general understanding of theRead MoreMy Philosophy Of Education1056 Words   |  5 PagesPhilosophy of Student Engagement My philosophy of education is that every child should receive high quality education that is inclusive, relevant and meaningful to their life. I am a firm believer of making pedagogy relatable to my students. My vision is driven by my personal experiences with the American school system. I was what is thought of as â€Å"A child at risk†. I am an immigrant, black, Muslim student. My life is transactional as I am a part of multiple marginalized groups. Most of my teachersRead MoreMy Philosophy Of Education And Education864 Words   |  4 PagesPhilosophy of Education Children are the future and their education is the key to our society’s success. When considering this, I realize I have an immense responsibility as an educator. The main focuses of my teaching are active learning, building character within students, and providing meaningful curriculum. I want to create a comfortable setting where every student feels safe to learn. In many ways, my philosophy agrees with the holistic approach to education. I feel this challenges the studentRead MoreMy Philosophy on Education814 Words   |  3 PagesMy Philosophy of Education I think when I made the decision to become a teacher I was not thinking the seriousness of this decision. When we become teachers we also become the molder that will shape our student to be successful in life. But when you decide to become a teacher in a Christian school you are not only shaping this student to be successful in life but we are also shaping their Christian mind to do things with a feeling knowing that they are shape and where made by the image of GodRead MoreMy Philosophy Of Education1015 Words   |  5 Pagesimmediately sparked my interest in becoming an educator and share my personal beliefs on the important aspects of education. In addition to this, I will present various traits I believe are essential and critical for teachers to successfully fulfill their role as an educator. During my elementary years, I developed an urge to frequently ask many questions during the school day. Being able to question anything was astonishing to me. This was because my parents were unable to answer my questions and help

Saturday, December 21, 2019

Essay about Did the North Win the Civil War before it Began

Did the North Win the Civil War before it Began? I agree with the idea that the North had won the Civil War before it began to the extent of Lincoln’s conservative political stands. Trying to receive the favor of the South while winning in the North would require Lincoln to take neutral stands in heated political issues like slavery. It wasn’t really wan by the North until he broke away from these stands to enact the Emancipation Proclamation and turn the tides of war in favor of the North. â€Å"This Lincoln always publicly condemned the abolitionists who fought slavery by extra constitutional means – and condemned also the mobs who deprived them of their right of free speech and free press.† (Holfstadter, Lincoln and the Self-Made†¦show more content†¦It would be like a baseball team fighting to protect their right to play with footballs. The South’s dominating strategy in winning the civil war was attrition. They believed they could wear down the political will of the North if they held out long enough to make the Northerners tired and question value of the means to achieve the ends. Military stalemates, guerilla war tactics and inconclusive battles would help the South achieve this goal. â€Å"Confederate armies did not have to invade and conquer the North: they needed only to hold out long enough to force the North to the conclusion that the price of conquering the South and annihilating its armies was too high, as Britain had concluded in 1781 and as the United States concluded†¦Ã¢â‚¬  (Why Did the Confederacy Lose?, pg 117)The South really enjoyed McClellan’s performance in the Southern theatre with his tendency to retreat when he could have won. This was another helpful hand the South would need to cause attrition. In response, Lincoln knew he had to do two things to prevent attrition a nd win the war more quickly. He needed to fire McClellan, and shift the theme of the war in the view of the North so that it would not lose its thunder. He did this by issuing the Emancipation Proclamation and converting the war for unionism into the war for morality. TheShow MoreRelatedTo What Extent Do You Agree or Disagree with the Idea That the North H1086 Words   |  5 PagesI agree with the idea that the North had won the Civil War before it began to the extent of Lincoln s conservative political stands. Trying to receive the favor of the South while winning in the North would require Lincoln to take neutral stands in heated political issues like slavery. It wasn t really wan by the North until he broke away from these stands to enact the Emancipation Proclamation and turn the tides of war in favor of the North. This Lincoln always publicly condemned the abolitionistsRead MoreThe War Between The North And The South993 Words   |  4 Pagesbetween the North and the South. There is many reason into why the United States had a war between the North and the South. The United States was divided depending on location and personal sentiments. People in the United States sometimes think that this war was only fought over slavery, but there was many reason in why the Union and the Confederate States of America fought. The war was fought on many reason such as the idea of slavery, states’ rights, trade, and tariffs. The Civil War lasted forRead MoreThe Battle of Fort Sumter Essay1497 Words   |  6 PagesThe firing on that fort will inaugurate a civil war greater than any the world has yet seen†¦you will lose us every friend at the North. You will wantonly strike a hornet’s nest which extends from mountains to ocean. Legions now quiet will swarm out and string us to death. It is unnecessary. It put us in the wrong. It is fatal. –Robert Toombs. (Boerner paragraph 2). The Civil War impacted the course of history forever. But it had to start somewhere and the Battle of Fort Sumter marked the start.Read MoreEconomic Factors of the Civil War1457 Words   |  6 PagesThe Civil Wars outcome could have gone either way, on one hand you have the North, which had the industrial advantage, and the South on the other who had a home field advantage and better generals too. The war pitted brother against brother and father against son, and lost many wives their sons and or husbands. The victory of the North was due to many economical factors that hindered, and ultimately defeated the South. The North was the industrial part of the country. It depended on its factoriesRead MoreThe North s Technological Advances939 Words   |  4 PagesAdvances The Civil War was a time of one country divided among itself because of the freedoms of slaves. When Abe Lincoln was first elected that was the South’s turning point but the attack on Fort Wagner was the beginning battle to a war between States. One result of the Civil War was that Congress put into action the 13th amendment, banning slavery. The North were fighting for the freedom of slaves while on the other hand the South opposed this and fought to keep slavery legal. The North had many thingsRead MoreThe Civil War Was A Devastating Time For The United States Of America883 Words   |  4 PagesThe Civil War was a devastating time for the United States of America. During this time the United States was divided. The Civil War was a four year long battle. It is known as one of the bloodiest battles ever fought. Consequently it was fought between people of the same country. We were divided between the North and the South. The cause of the Civil War was slavery. The North was a gainst it and wanted slavery abolished. On the other hand the South did not want to part with slavery. Both the NorthRead MoreThe Lost Cause : The Lost Cause Of The Civil War1572 Words   |  7 Pages The Civil War ravaged the country. The number of American casualties during the Civil War was greater than the number of casualties that occurred during every other war with American involvement combined. The South was particularly devastated; most of the war was fought there. The plantation economy that the South had relied on for 200 years had been dismantled by the Emancipation Proclamation. Entire cities, such as Richmond, Virginia, had been burned to the ground, and it seemed as thoughRead MoreKamal Abokor . 2/06/2017. Period 7-8. Research Paper.1583 Words   |  7 PagesNashville on the Civil war The Battle of Nashville was an important battle in the Civil war which took place in December 1864 during the Civil War, The once powerful Confederate Army of Tennessee was nearly destroyed when the Union Army led by Ulysses S. Grant swarmed over rebel trenches around Nashville. That represented the end of large scale fighting in the American Civil War. The Battle of Nashville was a two day long Campaign that was crucial in determining the outcome of the Civil war and gave theRead MoreReasons For The Civil War1516 Words   |  7 PagesKaylea Simas U.S. History Mr. Burkey 11 December 2015 The Civil War There had been many misunderstandings between the North and the South in the years that led up to the Civil War, but the most tragic misunderstanding of all was that neither side realized, until it was too late, that the other side was desperate. Not until the war had actually begun would men see that their rivals really meant to fight? By that time it was too late to do anything but go on fighting. Southerners had been talkingRead More The Killer Angels and the Battle of Gettysburg Essay822 Words   |  4 Pagesto be free, and their desire to set slaves free was the cause of the Civil War. Just before the Battle of Gettysburg, Colonel Lawrence Chamberlain of the 20th Maine gave a speech to a group of mutineers. He told them that the war in which they were fighting was unlike any war in history. The war in which they were fighting was not for money, property or power. It was a war to set other men free. After the battle began, Sergeant Tom Chamberlain asked a group of prisoners why they were

Friday, December 13, 2019

What role can Youth Workers play in Reducing Anti Social Behaviour Free Essays

Abstract This paper is a research proposal which seeks to address the potential that youth workers have in reducing anti-social behaviour. This proposal seeks to take a case study approach to anti-social behaviour whilst utilising a number of governmental policies and practices which exist across a wealth of social work areas and youth work practice areas. Introduction The practice of youth work takes place within a trusted part of the spectrum of social work provision (Dept. We will write a custom essay sample on What role can Youth Workers play in Reducing Anti Social Behaviour? or any similar topic only for you Order Now for Education and Skills, 2005). The history of youth work can be traced back to the late 1880s and can found within an informal voluntary religious setting (Infed, 2014). It was, however, the Albemarle Report (Ministry of Education, 1960) which concretised the service within societal dynamics and within youth cultures. Within this approach a defined route to what youth work should incorporate, as well as highlight its role, was highlighted. Recent years, however, has seen the service being impacted by changes brought about through altered central government policies (Courree, 2012). During this time, youth work services has been subject to reform and has been incorporated into the auspices of the Integrated Youth Support Services (Infed, 2014), and utilised as a tool for reducing anti-social behaviour Recent years have seen anti-social behaviour become a dominant issue in community relations. Within their detached roles, it can be considered that youth workers have the potential to improve social dynamics and to reduce instances of anti-social behaviour. However the extent to which youth workers can effect change needs to be addressed. Background and Rationale for the study Youth work is a contested area of social work provision and its professional definition has been affected by a series of wider ranging work practices (Infed, 2014). Sercome (2010) also agrees that what constitutes as youth work is not an easy task but he produces a list of roles that are akin to that of both Infed (2014) and the National Youth Agency (2014). These roles serve to define youth work as a process which ‘helps young people learn about themselves, others and society, through informal educational activities which combine enjoyment, challenge and learning’ (National Youth Agency, 2014: n.p.). However, it is also evident that youth work also takes place within the modern social work context of multi agency practices. This outcome places youth workers at the centre of the plethora of criminal and social policies that are designed to counter anti-social behaviour. Detached youth work is a distinctive form of social work which interacts with young people using constructive dialogue and within the spectrum of personal and social development (Federation for Detached Youth Work, 2013). This form of youth work utilises principles of informal education in order that young people can be engaged in order to address a number of issues that exist in their lives. As a result youth workers now operate in a more robust legal framework which incorporates a multitude of legislative criteria and partner agencies, this can include but is not limited to, law enforcement agencies, education services, housing trusts, social services and medical services. This perspective is particularly applicable where knife crime as well as other forms of anti-social behaviour, are considered. Anti-social behaviour became an issue for the incumbent Blair administration in 1997. The Labour party manifesto for that election claimed that Labour wanted to see ‘communities that are safe†¦ (and)†¦ where mutual respect and tolerance are the order of the day’, adding, ‘these are things we must achieve together as a country’ (Labour Party, 1997: n.p.). As a result the Labour Government drafted the Anti-Social Behaviour sytem and incorporated programmes such as the Respect Agenda, which included a task force and related action plans (Millie, 2009). Youth workers play a central role in reducing anti-social behaviour. In the Tower Hamlets areas of London, anti-social beahviour conttitues to dominate local service provision and underpinning policies.The administartive wings of the area have been criticised for not resolving cases quickly (Tower Hamlets Homes, 2012). Similarly it is noted that the area is one of the most prevalent in London for instan ces of knife crime (Citizen Report UK, 2013). Knife crime has long been associated as being a criminal activity which is predominately carried out by young people (11 Million, 2009), and as such, falls within the remit of youth work. It is to be noted that youth workers may come into contact with service users who are engaged in anti-social behaviour on a regular basis whose behaviour is being dictated by a social, emotional or behavioural disorder. Cefai and Cooper (2006) argue that such a premise is not uncommon and argue that these conditions are a persistent factor in anti-social behaviour. They argue that these conditions are ‘characterised by their effect of being socially disruptive or disruptive to the development course of the individual (Cefai and Cooper, 2006: 18). McVie (2010) highlighted that there was a correlation between instances of, and the prevalence of poverty, low self esteem, knife crime, and gang membership. Within this narrative a number of associative links between what constitutes as being delinquent or anti social behaviour and knife crime. An earlier report by 11 Million identified a similar number of sociological factors which will aid a young person to turn to anti-social behaviour, and in particular knife crime. However McVie (2010) noted that those young people who can be classed as being persistent knife carriers consisted of only a small percentage of the overall knife carrying population. AS such it can be argued that knife crime occurs within two very distinct groups; persistent offenders and occasional offenders (McVie, 2010). Within this the aforementioned sociological and behavioural incorporation of low educational levels, behavioural issues and deprivation can be considered to be a factor. At this point it is worth remembering that Tower Hamlets is one of the poorest areas of London. As such there is a correlation between academic theory, statistics and environmental reality. Indeed this is a factor which 11 Million (2009) detected. Further to this a subsequent report, the Kinsella Report (2011), highlighted poverty as being a contributory factor in the perpetuation of this particular anti-social behavioural act. Aim and Objectives of the Study The aim of this study is to investigate and examine the roles of youth workers and assist the reduction of anti-social behaviour in the Tower Hamlets borough of London. To do so the proposed study has three main aims; Define anti-social behaviour in context with social exclusion and social work practice Identify and explain the current roles of youth workers in assisting authorities in combating anti-social behaviour. Assess the efficacy of contributory elements of knife crime in order to assist the wider youth work sector in helping reduce anti-social behaviour In responding to these tree aims, it is proposed that the question of what role can Youth Workers play in Reducing Anti Social Behaviour will be addressed. Literature Search Strategy The literature review will primarily involve the collection, collation and analysis of previous primary and secondary data sources and studies. These studies will be sourced from a number of online academic databases and will include statutory reports, academic research studies, state policy documentation and other regulatory statements as well as responses from professional bodies. In addition to this, the incorporation of secondary data such as academic perspectives and media sources will provide for a review of the discourse that resides within this area of debate. In effect, data sources of this type can be classified as multiple data sources. Here it is to be noted that multiple source datasets are capable of being interrogated, broken down and reclassified into specific policy and practice areas as well as time based datasets (Cohen, Mannion and Morrison, 2013). In essence, it is proposed that the approach being utilised for this research is based upon desk based research. Stud ies of this type can also known as descriptive research studies and involve a number of research areas that are related to the issues surrounding this particular study area (Cohen, Mannion and Morrison, 2013). Ethics and anti-oppressive practice considerations Since this paper is based upon a methodology which utilises descriptive research it will not require the involvement of participants within any subsequent research. As such, there are no ethical guidelines relating to the management or safety of participants. However it is to be remembered that descriptive research studies are subjective and it is possible that the inclusion of a number of case studies, or examples, can be influenced by personal perspectives and biases (Cohen, Mannion and Morrison, 2013). It is to be noted however, that every step will be taken to ensure that this issue does not impinge upon the study; this includes conscious or unconscious bias. Project outline Chapter one will consist of the introduction; this will include relevant background information, rationale, methodology, scope and constraints as well as overviews of the literature review. Additionally it will include an abridged findings section. Chapter two, the literature review, will consist of a review of primary and secondary resources. This will include, but not limited to, regulatory frameworks, state policies, professional literature and previous academic research studies. The third chapter will focus upon the Tower Hamlets area of London from a case study perspective. Within this Chapter, the level of anti-social behaviour, youth work initiatives, responses and results will be considered. This case study will be compared against information raised within the literature review in order to inform best practice in this area. the analysis section, will counteract the initial findings from the literature review and assess these against further data in order to assess how youth workers can help reduce anti-social behaviour. The final chapter, the findings of the study, will highlight where and how, if any, youth workers can help reduce anti-social behaviour. This chapter will also provide a series of recommendations for further research. Project timetable Weeks 1 – 4: Identification, collection and collation of primary and secondary sources in order to inform the literature review. Weeks 4 – 8: Literature review, first and second draft. Weeks 9 – 10: Finalise literature review and investigate areas for service provision in relation to reducing anti-social behaviour. Weeks 10 – 12: Findings section, first and second draft Weeks 12 – 14: Finalise the analysis chapter in order to highlight areas for recommendations for youth work service changes in order to address issues related to anti-social behaviour. Weeks 14 – 15: Complete findings and recommendations chapter. Weeks 15 – 16: Complete the first, introductory chapter. Week 17: Publish the final research study. Bibliography 11 Million, (2009), Young people, and gun and knife crime: a review of the evidence, London: Centre for Crime and Justice Annetts, J., Law, A., McNeish, W., Mooney, G., (2009), Understanding Social Welfare Movements, Bristol: Policy Press. Cefia Cooper, (2006), Social, Emotional and Behavioural difficulties in Malta: An educational perspective, (J), Journal of Maltese Educational Research, Vol. 4 (1), pp. 18-36. Citizen Report UK, (2013), London Knife Crime Offences by Borough 2007 to 2013, (online), available at http://www.citizensreportuk.org/news/2013/06/25/london-knife-crime-offences-by-borough-2007-to-2013/, (Accessed on 25/11/14). Cohen, L., Manion, L., Morrison, K., (2013), Research Methods in Education, (5th edition), London: Routledge Falmer Courree, F., (2012), The History of Youth Work in Europe: Relevance for Youth Policy Today, Volume 3, Strasbourg: Council of Europe. Dept. for Education and Skills, (2005), Targeted Youth Work: A Guide, London: HMSO. Federation for Detached Youth Work, (2013), What is Detached Youth Work?, (online), available at http://www.detachedyouthwork.info/more_about_detached_youth_work.htm, (accessed on 23/10/14). HM Government, (1983), Mental Health Act (1983), London: HMSO. HM Government, (2003), Every Child Matters, London: HMSO. HM Government, (2004), Children Act (2004), London: HMSO. HM Government, (2005), Mental Capacity Act (2005), London: HMSO. HM Government, (2013), Anti-Social Behaviour, (online), available at https://www.gov.uk/asbo, (accessed on 23/10/14). Infed, (2014), what is Youth WorkExploring the History, Theory and Practice of Work with Young People, (online), available at http://infed.org/mobi/what-is-youth-work-exploring-the-history-theory-and-practice-of-work-with-young-people/, (accessed on 23/10/14). Kinsella Report, (2011), Tackling Knife Crime Together: A Review of Local Anti-Knife Crime initiatives, London: HMSO. Labour Party, (1997), New Labour: Because Britain Deserves Better, (online), available at http://www.politicsresources.net/area/uk/man/lab97.htm, (accessed on 22/10/14). McDonald, R., (1997), Youth, The `Underclass’ and Social Exclusion, London: Routledge. Millie, A., (2009), Antisocial Behaviour, Maidenhead: McGraw-Hill. Ministry of Education (1960) Albemarle Report: The Youth Service in England and Wales, London: HMSO. National Youth Agency, (2014), What is Youth Work?, (online), available at http://www.nya.org.uk/about-nya/what-is-youth-work, (accessed on 23/10/14). Poverty.org, (2012), Poverty indicators: Relative poverty, absolute poverty and social exclusion, (online), http://www.poverty.org.uk/summary/social%20exclusion.shtml, (accessed on 23/10/14). Priory Group, (2012), Behavioural, emotional and social difficulties (BESD), (online), available at http://www.priorygroup.com/Conditions/Specialist-Education-and-Fostering-Conditions/Behavioural-emotional-and-social-difficulties-BE.aspx, (accessed on 23/10/14). Sercombe, H., (2010), Youth Work Ethics, London: Sage. Tower Hamlets Homes Anti Social Behaviour Service, (2012), Anti-Social Behaviour: Everybody’s Business, London: Tower Hamlets Homes. How to cite What role can Youth Workers play in Reducing Anti Social Behaviour?, Essay examples

Thursday, December 5, 2019

Document Analysis of John Browns Address to the Virginia Court free essay sample

The address given by John Brown to the Virginia court was his final words before execution on charges of treason. The charges were given because of a raid that he directed with the intent to take federal weapons which is an act of treason. On October 16th-18th, 1859, the radical abolitionist John Brown led a group of white and black men, including two of his sons, on Harpers Ferry, Virginia. Brown’s goal was to seize the federal arsenal, arm the local slaves, and fight a way into the North as described in this primary source in court. This raid was not surprising because of his abolitionist background and insanity as described by the Robert E. Lee who led the Union Army that suppressed the revolt. The group held up in a fire department and was attacked by Lee’s soldiers. The failed attempt resulted in Brown’s capture, trial, and execution on December 2nd. We will write a custom essay sample on Document Analysis of John Browns Address to the Virginia Court or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This episode of slave resistance was the last major rebellion contributing to the secession of the South and, eventually, the Civil War. Purpose: John Brown had a a few purpose for delivering this address. Obviously, it was given in response to charges accumulated from the raid, and the address also makes several points explaining his defense. Brown stated that he did not intend to fire a single gun but wanted simply to take slaves from plantations and lead them to northern states or Canada. Brown also stated that he did not induce the others involved in the raid to join him which lessened his crime in his mind. To the charges he addressed, â€Å"I never did intend murder, or treason, or the destruction of property, or to excite or incite slaves to rebellion, or to make insurrection. Though he denied the charges, one can infer that Brown really did want a slave uprising to occur in the South due to his strong abolitionist morals and beliefs. If the raid were to be successful, Brown would not stop with those slaves, but rather continue his forced manumission of the South. Brown’s impression of the trial was one of satisfaction, but he argued that â€Å"it is unjust that I should suffer such a penalty [of death]. † He made this argument because his intent was not to start this uprising but, instead, to be an act of defiance that he knew would indirectly cause a mass insurrection in the South. Value: John Brown’s address is not a historical landmark and was a less significant historical document that had minimal aftermath; however, it provides a specific example of responses in court giving insight into how acts of slave resistance are dealt with legally. Brown gives this document a unique texture because of his eloquence in court compared with his savagery in the raid. Overall, he is given the status of a martyr with his words: â€Å"I submit [to death]: so let it be done! † Brown reveals a very different side of his personality in which he is a dignified martyr. He predicts that slavery will never end peacefully in the country whose â€Å"rights are disregarded by wicked, cruel, and unjust enactments†. Historians can use this document today to show people strong in their beliefs who act upon them, and although some failed in their efforts, their cause was strengthened. Limitations: The address made by John Brown contains several limitations that affect its credit as a historical source. A significant limiting factor is that there is only one opinion to explain the raid. Brown had a biased opinion mainly because of his childhood having been greatly influenced with abolitionist morals and beliefs. One would think that Brown’s address would be biased in spite of his numerous accusations, but he speaks as if he had nothing to lose. The aiding and abetting criminals in the raid would not have delivered a speech as dignified and passionate as Brown’s but would obviously be similar in their renditions of the event. To fully understand Brown’s raid, historians would need to consult Robert E. Lee’s notes. After viewing both sides of the story, a historian can either choose a side or make an inference that incorporates both.

Thursday, November 28, 2019

E-Transaction free essay sample

Thus the aspect of electronic-Transaction which has being given to the 21st century as a result of hard work and ingenuity on the part of computer programmers and engineers, is the process of exchanging goods for services or vice versa, with interested clients within or outside the immediate environment over the web. The aspect of E-Transaction is a relatively small aspect of the larger body called Electronic-Commerce, which is commonly known as e-commerce or e-comm, which refers to the buying and selling of products or services over electronic systems such as the Internet and other computer networks. Looking at the current case in the country, where most of the transactions handled are still done manually it would help to bring the innovative idea of a web based transactional environment where individuals can see and make certain of the financial status which their accounts possess. With careful consideration of our case study of Benson Idahosa University’s Bursary Department, it would prove both beneficial to students and staff alike, as well as help to save considerable effort. We will write a custom essay sample on E-Transaction or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page 1. 2 STATEMENT OF THE PROBLEM The E-Transact System is an example of the form of web based applications under Ecommerce which is created to better help individuals maintain a safe, efficient, and quick way to make transactions. The project attempts to address the following issues: * Help put an end to the claims of missing fees, tellers or receipts by students. * Make the long process of verification of payment a lot less difficult. * Give parents and guardians relief when payments are made as opposed to not knowing if the child has actually paid the fees or not. . 3 AIM AND OBJECTIVE OF THE STUDY The aim and objective of the study include the following: * Encourage the development of online business/commerce based management applications in Nigeria. * Increase the awareness of the web based Electronic Transaction application to the general public. * Development of a new and better means of handling transactions. * Outline the benefits of adopting this system in Nigeria. * Help people to understand the need and i mportance for an Electronic-Transaction software. 1. 4 RESEARCH METHODOLOGY When taking into consideration the nature of the project a number of possible ways will be employed in the effort to gather the necessary information which will help in the considerable awareness for this project. These means include Resource Material, Observation and Research and Site Visit. 1. 4. 1RESOURCE MATERIAL This is a process that involves the gathering of information from books, magazines, journals and other materials that are related to the subject of the study. This will involve getting definitions and meanings of some terms used in the business. Definitions and meanings can also be obtained from the dictionary. These books can either be purchased or found in the library. 1. 4. 2OBSERVATION This process involves the physically monitoring and watching the various processes or tasks involved in handling transactions. Observation can be conducted in a formal or informal way. Apart from monitoring the various tasks involved, participation can also be adopted as an observation technique. By participating in these activities It would become easier to understand and appreciate the effort that are required in transaction management as well as determine how the new system will work. . 4. 3RESEARCH AND SITE VISIT The internet can be considered as a vast collection of resources and materials that relate to any area or field of knowledge. Research and site visit involves searching through the internet for materials and information that relate to the project. During the project many sites will be visited that will supply the relevant information, some of these sites also provide the opportunity to downlo ad these materials for free without incurring any cost whatsoever. 1. 5 SCOPE OF STUDY This project aims at the bursary department of the Benson Idahosa University. This department already has the necessary items/Equipment for this project such as an internet connection, a network, computers, and stock pile of student’s information. All this items/equipment is essential for this project to function properly. 1. 6 LIMITATIONS During the course of this study factors may be encountered that may affect the pace at which the research is conducted, these factors include: * Availability of internet connections to obtain materials. Lack of material on the internet, in libraries and from individuals to sufficiently and adequately explain the concept of the E-Transaction to the general public. * Writing of the project while still carrying on with school work. 1. 7 SIGNIFICANCE OF THE STUDY The importance of this project to the general public likewise the staff and students of the university of Benson Idahosa University can be seen as a rapid means of reducing the stress o f entering data manually, having bulky paper work, reducing long hours of unnecessary waiting just for the paper work to be proceed and subsequently waiting for receipts. CHAPTER TWO LITERATURE REVIEW 2. 1HISTORY OF ELECTRONIC-TRANSACTION 2. 1. 1Early development The growth of automated information services in Nigerian universities began to accelerate as from about 1990, when the World Bank intervened with a loan to improve the institutional capacities of the Nigerian Universities, and with specific focus on automating the universities. Before then, a 1987 conference jointly organized by the National Universities Commission and the British Council had recommended that management information systems be introduced into the Nigerian university system (Abdulkadir, 1995). The MIS project commenced with a workshop in 1989 for Academic Planners and Bursars of Nigerian universities, followed in 1990 by the setting up of a technical committee to design hardware and software prototypes for the project. These initiatives, along with the World Bank intervention, eventually led to the introduction and development of university databases through the Nigerian Universities Management Information System (NUMIS), electronic connectivity through the Nigerian Universities Network (NUNet), automation of university libraries through the TINLIB library software, and the computerization of accounting processes through the computerized accounting system (CAS) for Bursary departments of the universities. NUMIS strives to increase control, access and updating of information, production of regular reports, and effectiveness in management decision making, whereas NUNet aims at setting the pace and direction for networking computer and information resources in the universities through intra-campus, inter-university and global electronic connectivity. While CAS has been transforming the data operations of the Bursary departments of Nigerian universities, much does not appear to have been achieved in the bibliographic automation of university libraries through the implementation of the TINLIB software. However, there is an emerging hope to rejuvenate the libraries through the on-going National Virtual Library Project, approved by the Federal Executive Council in January 2002 (National Interest, 3 January, 2002). Despite these laudable initiatives however, the anticipated technological transformation of the universities appears to be have been very slow. Thus considering the part of the computerized accounting system (CAS) for Bursary departments of the universities, it would then prove most effective to look into the areas of E-commerce and Transaction before looking at the aspect of E-Transaction Transaction can be seen as a means of communication between two individuals, companies, organization, etc. where goods and services are exchange or vice versa. Transaction is a discrete activity within a computer system, such as an entry of a customer order or an update of an inventory item. Transactions are usually associated with database management, order entry, and other online systems. (According to the Microsoft Computer Dictionary, Fifth Edition) Thus to put Transaction in the much more Simpler definition it would be an instance of doing business or an act of negotiation as a means of communication between individuals, companies, countries, etc. Electronic commerce, commonly known as  e-commerce  or  e-comm, refers to the buying and selling of  products  or  services  over electronic systems such as the  Internet  and other  computer networks (â€Å"According to Wikipedia†). Short for electronic commerce. Commercial activity that takes place by means of computers connected through a network. Electronic commerce can occur between a user and a vendor through the Internet, an online information service, or a bulletin board system (BBS), or between vendor and customer computers through electronic data interchange (â€Å"according to Microsoft Computer Dictionary†) . Electronic commerce is generally considered to be the sales aspect of  e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of business transactions. Originally, electronic commerce was identified as the facilitation of commercial transactions electronically, using technology such as  Electronic Data Interchange (EDI)  and  Electronic Funds Transfer (EFT). These were both introduced in the late 1970s, allowing businesses to send commercial documents like purchase orders or invoices electronically. The growth and acceptance of credit cards, automated teller machines (ATM) and telephone banking in the 1980s were also forms of electronic commerce. Another form of e-commerce was the airline reservation system typified by Sabre in the USA and Travicom in the UK. Beginning in the 1990s, electronic commerce would include  enterprise resource planning  systems (ERP),  data mining  and  data warehousing E-commerce has grown in importance as companies have adopted Pure-Click and  Brick and Click  channel systems. We can distinguish between pure-click and brick and click channel system adopted by companies. * Pure-Click companies are those that have launched a website without any previous existence as a firm. It is imperative that such companies must set up and operate their e-commerce websites very carefully. Customer service is of paramount importance. * Brick and Click companies are those existing companies that have added an online site for e-commerce. Initially, Brick and Click companies were skeptical whether or not to add an online e-commerce channel for fear that selling their products might produce channel conflict with their off-line retailers, agents, or their own stores. However, they eventually added internet to their distribution channel portfolio after seeing how much business their online competitors were generating. In their summary of the findings from the eighth survey, the Researchers report that â€Å"e-commerce is taking off both in terms of the number of users Shopping as well as the total amount of people who are spending via Internet based transactions† E-commerce can be divided into: i. E-tailing or virtual storefronts on Web sites with online catalogs, sometimes gathered into a virtual mall ii. The gathering and use of demographic data through Web contacts iii. Electronic Data Interchange (EDI), the business-to-business exchange of data iv. E-mail and fax and their use as media for reaching prospects and established customers (for example, with newsletters) v. Business-to-business buying and selling vi. The security of business transactions Business models across the world also continue to change drastically with the advent of Ecommerce and this change is not just restricted to USA. Other countries are also contributing to the growth of Ecommerce. For example, the United Kingdom has the biggest e-commerce market in the world when measured by the amount spent per capita, even higher than the USA. The  internet economy  in UK is likely to grow by 10% within the years 2010 to 2015. This has led to changing dynamics for the advertising industry. Amongst emerging economies, Chinas Ecommerce presence continues to expand. With 384 million internet users, China’s online shopping sales rose to $36. 6 billion in 2009 and one of the reasons behind the huge growth has been the improved trust level for shoppers. The Chinese retailers have been able to help consumers feel more comfortable shopping online. Ecommerce is also expanding across the Middle East. Having recorded the world’s fastest growth in internet usage between 2000 and 2009, the region is now home to more than 60 million internet users. Research by four economists at the University of Chicago has found that the growth of online shopping has also affected industry structure in two areas that have seen significant growth in e-commerce,  bookshops  and travel agencies. Now considering the aspect of Electronic-Transaction it is technically defined as the processing and transmission of digitized information related to products and services. Or as a discrete packet of data transmitted in the course of conducting business activities online, whether in the form of a message, automated transaction or other types of digital communication (History of E-commerce, E-transaction n. d. ). 2. 2 E-TRANSACT SYSTEM An Electronic Transaction software is a web based application which deals with the sale or purchase of goods or services whether between business, households, individuals, governments and other public or private organizations conducted over computer mediated networks. The goods and services are ordered over those networks, but the payment and the ultimate delivery of goods or service may be conducted on or off-line. E-Transaction system should have i. Trustworthiness of the transaction – parties must have faith that records are authentic and unaltered. ii. Authentication of electronic signatures- person signing is the same who has identified himself. Depending on the type of electronic signatures used and the level of security inherent in that signature it is possible that the electronic signatures may be subject to greater risk of repudiation than handwritten ink signatures. iii. Data integrity – accuracy and completeness of information – ensuring that no alteration has been made intentionally or accidentally iv. Integrity – must ensure non-repudiation and authenticity. Document must be the same as that sent by the sender. Document must not be altered either in storage or transmission v. Retention of records –for a minimum period and in manner which would make it admissible in court of law as evidence – in case of a dispute Electronic transactions, and in particular electronic commerce, are dependent upon a supportive and responsive payment infrastructure in which both buyer and seller have confidence. This must be supported by a financial sector that fully participates in and embraces electronic commerce solutions. The financial sector will be encouraged to facilitate small and medium size enterprises as they seek to access the global market place through web sites and internet portals so taking advantage of lower costs and niche marketing. Electronic Transaction with specially provided E-Transact cards and the provision of online banking services must become standard characteristics of ife in this new Millennium. Wider international access within the existing card system has resulted in the imposition of a risk premium for non – secure transactions. In the financial sector, the dematerialization of cheque by electronic facility reduces the cost of passing these through the clearing system. The commercial banks estimate the savings in this regard as being in the billions of dollars while, the Central Bank, which presides over clearing house activities, will also benefit fro m lower costs. The Government will work closely with the financial sector to foster the safety and soundness of electronic payments, ensure adequate levels of consumer protection and remove legislative, regulatory and administrative hurdles that limit the digital transfer of payments. * CONSUMER PROTECTION The growth of electronic transaction has the potential to offer substantial benefits to consumers. These benefits include: i. Greater convenience. ii. Increased choice (leading to greater competition). iii. Lower prices (through the removal of intermediaries between the producer and the consumer). iv. More information on products. v. Ability to personalize products. vi. Improved after sales services. Electronic transaction will particularly benefit members of society who are unable to participate in the traditional marketplace. For example, those who live in rural areas will have access to a range of goods and services normally only available in urban areas. In addition, people who have an illness or a disability will also benefit from the convenience of online transacts. However, electronic transaction will not realize its full potential until consumers have confidence in its efficacy. For electronic transaction to flourish consumer confidence is imperative and this will be supported through public education and public and private sector cooperation, buttressed by a clear, consistent legal framework. A number of key issues need to be addressed to ensure that there is a safe and efficient online environment that consumers will trust. These key issues are: a. Information the provision of adequate information to consumers b. Payment establishing secure methods for paying online c. Jurisdiction – nternational agreement on the appropriate jurisdiction for consumer contracts d. Privacy – protection of personal information in the online environment The Government will encourage the private sector to adopt self-regulatory mechanisms and codes of practice in electronic commerce so that regulatory intervention by Government in the Electronic Market is minimal. Further, the Government will seek to promote alternative dispute resolution mechanisms, which will a llow consumer’s fast, effective and fair redress for fraudulent, deceptive or unfair business practices online. Transaction based application retrieved march 17th 2012) 2. 3SECURE E-TRANSACT PROTOCOL SET Protocol Secure Electronic Transactions (SET) is an open protocol which has the potential to emerge as a dominant force in the securing of electronic transactions. Jointly developed by Visa and MasterCard, in conjunction with leading computer vendors such as IBM, SET is an open standard for protecting the privacy, and ensuring the authenticity, of electronic transactions. This is critical to the success of electronic commerce over the Internet; without privacy, consumer protection cannot be guaranteed, and without authentication, neither the merchant nor the consumer can be sure that valid transactions are being made. The SET protocol relies on two different encryption mechanisms, as well as an authentication mechanism. SET uses symmetric encryption, in the form of the aging Data Encryption Standard (DES), as well as asymmetric, or public-key, encryption to transmit session keys for DES transactions (IBM, 1998). Rather than offer the security and protection afforded by public-key cryptography, SET simply uses session keys (56 bits) which are transmitted asymmetrically – the remainder of the transaction uses symmetric encryption in the form of DES. This has disturbing connotations for a secure electronic transaction protocol – because public key cryptography is only used only to encrypt DES keys and for authentication, and not for the main body of the transaction. 2. 3. 1SYMMETRIC AND ASYMMETRIC ENCRYPTION IN SET In the SET protocol, two different encryption algorithms are used –Data Encryption Standard (DES) and RSA. The DES algorithm has been used since the 1970’s. It is believed by some that the National Security Agency (NSA) of America played an invisible hand in the development of the algorithm (Schneier, 1996), and that they were responsible for reducing its key size from the original 128-bits to 56. DES quickly became a federal standard in 1976, and has been used ever since. In the SET protocol, a DES 56-bit key is used to encrypt transactions. This level of encryption, using DES, can be easily cracked using modern hardware. In 1993, a brute-force DES cracking machine was designed by Michael Wiener – one which was massively parallel. For less than a million dollars (well within the budget of many large companies), a 56-bit DES key could be cracked in average time of 3. 5 hours. For a billion dollars, which might be considered small change for a military or security organization such as the NSA or a foreign power, a parallel machine can be constructed that cracks 56-bit DES in a second (Schneier, 1996). Clearly, this is of great concern, since DES encrypts the majority of a SET transaction. As the power of computers grows, and the cost diminishes, such code-crackers may become more and more common. 2. 3. 2TRANSACTION AUTHENTICITY Authentication is an important issue for users of electronic commerce. Consumers must have faith in the authenticity of the merchant, and merchants must have faith in the authenticity of the consumer. Without authentication, any individual could pose as a merchant, and besmirch a merchant’s good name by failing to deliver goods and billing up credit card bills. Without authentication, any individual could pose as a consumer, ordering costly goods to an abandoned house or apartment, and defrauding the merchant. Without authentication, an individual could pose as a willing buyer, accept the goods, and then repudiate the transaction. Authentication is critical to achieving trust in electronic commerce. Authentication is achieved through the use of digital signatures. Using a hashing algorithm, SET can sign a transaction using the sender’s private key. This produces a small message digest, which is a series of values that sign a message. By comparing the transaction message and the message digest, along with the sender’s public key, the authenticity of the transaction can be verified. Digital signatures are aimed at achieving the same level of trust as a written signature has in real life. This helps achieve non-repudiation, as the consumer cannot later establish that the message wasnt sent using his private key. IMPORTANCE OF SECURE E-TRANSACTIONS Secure electronic transactions will be an important part of electronic commerce in the future. Without such security, the interests of the merchant, the consumer, and the credit or economic institution cannot be served. Privacy of transactions, and authentication of all parties, is important for achieving the level of trust that will allow such transactions to flourish. However, it is important that the encryption algorithms and key-sizes used will be robust enough to prevent observation by hostile entities (either criminal or foreign powers). The ideal of the secure electronic transactions protocol (SET) is important for the success of electronic commerce. However, it remains to be seen whether the protocol will be widely used because of the weakness of the encryption that it uses. Secure E-Transact Protocols Retrieved April 2nd 2012) 2. 4ESSENTIAL FEATURES OF AN E-TRANSACT SYSTEM Enabling technologies refer to the web-based platforms and programs upon which Business-to-business (B2B) and Business-to-consumer (B2C) web sites are constructed. While many business people may want to focus strictly on online selling and buying and leave the technical aspects to IT specialists, they still need to have a sound understanding of these key under-the hood enabling technologies to better appreciate their full e-business potential and limitations. The technologies are encryption, Secure Sockets Layer (SSL), SET, and Smart Cards. 2. 4. 1ENCRYPTION Encryption is the process of making data unreadable to everyone except the receiver. The process has four key elements: a. Authentication This allows customers to be sure that the merchant they are sending their credit card details to be who they say they are. It can also allow merchants to verify that the customer is the real owner of the credit card. b. Integrity This ensures that a third party has not tampered with the messages during the transmission. c. Non-repudiation This prevents customers or merchants from denying they received or sent a particular message. d. Privacy This prevents third parties from reading intercepted messages. The main elements of an encryption system are the plaintext, the cryptographic algorithm, the key, and the cipher text. The plaintext is the raw message or data that are to be encrypted. A cryptographic algorithm, or cipher, is a mathematical set of rules that defines how the plain text is to be combined with a key. The key is a string of digits. The cipher text is the encrypted message. Types of encryption in common use are: SECRET-KEY Secret-key encryption involves the use of a single key that is shared by both the sender and the receiver of the message. After creating the message, the sender encrypts it with their key and passes it to the recipient who then decrypts it by using a copy of the same key used to encrypt it. Secret-key encryption does have some limitations, particularly with regard to key distribution. For privacy to be maintained, every transmitter of messages would need to provide a different key to everyone they intend to communicate with; otherwise, every potential recipient would be able to read all messages whether it was intended for them or not. PUBLIC-KEY Public-key encryption involves the use of two keys: one that can be used to encrypt messages (the public key); and one that can be used to either encrypt them or decrypt them (the private key). These key pairs can be used in two different ways to provide privacy or authentication. Privacy is ensured by encoding a message with the public key, because it can only be decoded by the holder of the private key. Authentication is achieved by encoding a message with the private key. Once the recipient has successfully decrypted it with the public key, she can be assured it was sent by the holder of the private key. Since the public key can be made widely available for example, from a server or third party public-key cryptography does not suffer from the same key distribution and management problems as the secret-key system. One disadvantage of the public-key system is that it is relatively slow. Therefore, when it is being used only for authentication, it is not desirable to encrypt the whole message, particularly if it is a long one. To get around this, a digital signature is used. Digital signatures are implemented through public-key encryption and are used to verify the origin and contents of a message. 2. 4. SECURE SOCKETS LAYER (SSL) Netscapes Secure Sockets Layer (SSL) protocol is currently the most widely used method for performing secure transactions on the web and is supported by most web servers and clients, including Netscape Navigator and Microsoft Internet Explorer. The Secure Sockets Layer (SSL) protocol provides several features that make it particularly suitable for use in e-c ommerce transactions. Privacy is guaranteed through encryption. Although information en route can still be intercepted by a third party, they will be unable to read them because they wouldn’t have access to the encryption key. Integrity is also ensured through encryption. If information is received that will not decrypt properly, then the recipient knows that the information has been tampered with during transmission. Authentication is provided through digital certificates. Digital certificates provide the basis for secure electronic transactions as they enable all participants in a transaction to quickly and easily verify the identity of other participants. Essentially, SSL is secret-key encryption, nested within public-key encryption that is authenticated through the use of certificates. The reason that both secret key and public-key encryption methods are used is because of the relatively slow speed of public-key encryption compared to secret-key encryption. Initially, the client and server exchange public keys, and then the client generate a private encryption key that is used only for this transaction. This is referred to as a session key. The client then encrypts the session key with the servers public key and sends it to the server. Then for the rest of the transaction, the client and the server can use the session key for private-key encryption. 2. 4. 3SECURE ELCTRONIC-TRANSFER (SET) PROTOCOL SET is the Secure Electronic Transactions protocol developed by Visa and MasterCard, specifically for enabling secure credit card transactions on the Internet. It uses digital certificates to ensure the identities of all parties involved in a purchase and encrypts credit card information before sending it across the Internet. Like SSL, SET allows for the merchants identity to be authenticated via digital certificates; however, SET also allows for the merchant to request user authentication through digital certificates. This makes it much more difficult for someone to use a stolen credit card. A further advantage of SET is that the merchant has no access to credit card numbers, and thus another source of fraud is eliminated. There are many pilot schemes that use the SET protocol, but mainstream adoption has been slower than predicted. The main reasons behind this are the growing acceptance of SSL for secure credit card transactions and the complexity and cost of the SET system. In a typical SET transaction, there is private information between the customer and the merchant (such as the items being ordered) and other private information between the customer and the bank (such as the customers credit card number). SET allows both kinds of private information to be included in a single, digitally signed transaction. Information intended for the bank is encrypted using the banks public key while information for the merchant is encrypted with the merchants public 2. 4. 4SMART CARDS Although similar in appearance to a normal credit or debit card, smart cards differ in at least three key ways they store much more data, are password protected, and incorporate a microprocessor that can perform processes such as encryption. Although relatively unknown in North America, smart cards are by no means a new invention. Their use in Europe is widespread for applications such as credit cards, telephone payment cards and the payment of road tolls. France is the leading adopter, having started issuing cards in 1967, and now has some 25 million cards in circulation. However, their use is predicted to grow rapidly worldwide over the next few years on the back of the Internet, e-commerce explosion. i. STORAGE OF ENCRYPTION KEYS Smart cards can provide a very secure way of generating, storing, and using private keys. In its most basic implementation, smart cards can be used to store private keys and digital certificates protected by a password. Security can be further enhanced by using a microprocessor within the card to generate the public and private key pairs and to perform the actual encryption. Data to be decrypted or digitally signed are passed to the card where the microprocessor performs the operation and then passes the data back to the computer. That way the key never leaves the card and is therefore not vulnerable to attack by rogue programs scanning the computers memory for keys. ii. ELECTRONIC PURSES Many applications in place today use a smart card as a replacement for cash because of the higher security they offer over standard credit cards. Although most of these systems (for example, Mondex, Visa Cash, CLIP and Proton) were developed for point-of-sale applications, their use is likely to extend to web commerce, because they provide an easy and secure way to handle cash transactions. iii. USER PROFILE PORTABILITY One factor that could potentially restrain the growth of web commerce is restricted access to the Internet. Although the number of home and office computers with Internet access is continually growing; it is still not universally available and even the introduction of low-cost access devices (for example, Web TV) will not solve this completely. Also, even those with individuals with Internet enabled computers are unable to access them when away from their office or desk. (Essentials of a Secure E-Transaction System) 2. 5BENEFITS AND LIMITATIONS OF AN E-TRANSACT SYSTEM With software developed certain benefits the user can derive from its use are carefully put into consideration, thus making it needed and relevant for utilization. Below we take look at some of the benefits/advantages that E-Transact system has to offer, as well as certain limitations that leaves room for further improvement in terms of future development of better, faster and safer systems. . 5. 1Benefits of the E-Transact system * Reduction of Cost and Wasted Time: Cost and Time are both examples of transaction objectives which aid in the progress of business. By making use of the online E-Transact system many cost can be reduced thus enabling the proper utilization of resources. Since the information can be shared across a long range or short range network, users no longer have to print documents and print them to the recipients, rather the document or file is uploaded and sent directly to the recipient hat requires its immediate use, thus printing and postage cost are reduced. * Reduction of Risk and Potential Errors: One important element that affects a transaction is information. Without information from the consumer or merchant, no work or task can be performed. Information is an element in E-Transaction that is never constant. New and current information is required for a proper system to function effectively, the latest information is always available as soon as it is published, minimizing the risk of working on old information, aiding in the business. * Access to Information: Better access to information and reduction of the response time for RFI (Requests for Information), CO (Change Orders) and specifications clarification. Information no longer has to be passed on from one person to another before getting to the desired destination, instead that information can be accessed easily from anywhere in the world just by gaining an access point to the server where the information is being stored. * Authentication of Information The struggles of information in the global modernisation of the world will not loss its major role seeing as information is the very reason for the system. Individuals have often said there is a misrepresentation of information during payment, receiving of goods or vice versa. With this system no room is given for such lapse seeing as not just any individual except the administrator and the owner of the specific E-Transact card is permitted access to the information of such a profile. 2. 5. 2Limitations of the E-Transact system With every system comes their benefit as well as its limitations, and amongst a few these drawbacks include: * Security: The word security describes the assurance that something of value will not be taken away. In an online-Transact system, security is an aspect that should certainly not be overlooked. Many actions and task performed online are usually open to security risk. The possibility of sharing information in an online-Transact system demands security measures. The issue of trust is a major issue in the setting up of such an on online-Transact system some clients would be completely trustworthy whilst others would need to be checked all the time. There is definitely a need to ensure that people are encouraged to see this technology as a benefit rather than a threat. | * Infrastructure and difficult Internet Access: An online-Transact system requires infrastructure to be put in place to function properly and effectively, companies and organizations need to have the infrastructure necessary to support them (i. e. network systems, hardware, etc. ). Most companies don’t have this infrastructure and don’t want to, or have any intentions to change their organizations. The internet is a technological concept that is fast growing across the world. It is a global network of computers across the world through the use of a satellite or telephone system, for sharing information and access data from anywhere in the world. As popular and wide spread as the internet is, most companies do not have any internet connections, which may be as a result of the cost of purchasing one. Without the acquisition of an internet service, the online-Transact system cannot function at all. * Need for Training: Every year, new and better technological tools are developed for solving one problem or another. Each new application developed comes with a form of documentation or manual to help the user to understand how the system works. But apart from understanding the new system they have to be familiar with the workings of the systems. Employees must be familiar with technological solutions; otherwise they need to be trained, which slows down the advancement of the project. Training is a factor that affects two important project objectives, which include: Time and Cost. Some employees are not keen on using new technologies and think they will need too much time to learn and understand it. . 6SUMMARY In summary we have been able to see the history of Transactions, E-Commerce as well as a little on E-Transaction, what an E-Transaction system is all about, secure e-transact protocol as it helps make E-Transactions better and safer, the benefits and limitations of the system (which could be considered as the advantages and disadvantages), essential features that are looked at to prove and pr ovide essential safety, make business transactions flow easily as well as put both clients and service providers at easy when a transaction is being, or has already being conducted. Thus far it has shown that the involvement of an E-Transact system not only to the university system but the world at large would be of tremendous help in the mobilization of the financial department to a better and safer atmosphere for conducting transactions. CHAPTER THREE SYSTEM ANALYSIS AND DESIGN 3. 1SYSTEM ANALYSIS System Analysis is one example of the many phases that form the System Development Life Circle, (SDLC) which is a step-by-step approach to the development of a complex system. System Analysis has to do with the gathering and use of important information pertaining to a certain system. In a more plain definition, system analysis has to do with the collection of data, understanding of the processes involved, and identification of problems and recommendations that wholly affects the performance of the system or is the process of analysing a system with a view of bringing out the problems in the existing system and consequently proffering an alternative method usually a computerized system to curb the problems in the system. System analysis helps to provide a new efficient system which satisfies the need of the user or organization as well as giving room for future enhancements and improvements by providing answers to the following questions such as: What is being done, How is it being done, Who is doing it, When is he doing it, Why is it being done and How can it be improved? During the system analysis a thorough investigation of the old or existing system in use is carried out in order to properly understand the information flow, the limitations and weaknesses the current system possesses, providing of solutions to these limitations which may include the improvement of the existing system or development of a complete system from scratch. The existing system used in Benson Idahosa University and around most part of the country today enables the students or staff to be able to perform their daily duties only within the organization. For example, the administrative staffs in the school is only allowed to issue clearance to students who have paid within the school environment, that means the staff has to be present in the school during the time period when the clearance of students as well as the receiving of bank statements is meant to hold. Similarly, other responsibility that takes the administrative staff away from the school may arise; this eventually would have a negative effect on the students which means that the student might not cover the necessary clearance time for the semester or session. These responsibilities may be official or unofficial, but the fact still remains that the students will be affected either way. This E-Transact System provides a lime-light solution for both the administrative staff and the Student by giving them the opportunity to have payment as well as updating of their respective account details online without any of the regular hiccups. The system also provides an avenue for the administrative staff to leave messages pertaining existing debts or overpayments made by students, so as to avoid further accumulation of debts or excess money. All the operations of the existing system can be seen and done easily by the new system with new added features such as checking in advance for the amount of the next session or semester fees as well as other payment details such as accommodation, health, sports etc. nd leaving the students messages informing them of either change in payment details or outstanding debts, thus substituting or reducing the operations of the old system which simply involves the administrative staff going to work every morning in a defined location, carrying out his daily duties within the defined location (such as attending to students account details, attending staff meetings, submission of monthly report to head of department (C. F. O. ) etc. ). Categorically, the new system defines a new approach to Staff operation, with respect to accounts of students, the E-Transact system gives the administrative staff a new definition of accounting, where less stress is used, convenience is considered and for the students, it provides or gives them a new means of getting their clearance done as well as the extra and on time information from any part of the country. 3. 1. 1THE EXISTING SYSTEM The existing system is one which involves a lot of stress and paperwork which can eventually become cumbersome as time goes on. Students are force to work around with large sum of money from one bank to the designated banks of payment, where of course students would then have to take a long period of time before the funds can be processed, thus making the whole day a waste of time and energy. After which the student has to wait for the bank to send verification to the school showing the student has made such a payment of fees and sometime sending verification from the bank to the school might take a long time. Then there exists the issue of students not paying the fees thus using it for other ill relevant things and therefore missing the dead line for the registration exercise. Thus after careful examination of the existing system where a number of flaws exist such as the issue of missing funds, misplaced tellers/receipts and others, it would then be futile to continue to practice this method of transacting business. 3. 1. 2PROBLEM OF THE PRESENT SYSTEM Problems of the existing system can be viewed in the following perspectives The Administrator’s Perspective 1. Some administrator’s do not regularly show up for work due to reasons such as family crises, emergencies etc. 2. Official responsibilities such as seminar, conferences etc. , may tend to take the administrator away from the school environment thereby making them to miss the clearance of students. 3. They sometimes come late to the office thereby reducing the amount of work that would have achieved in that day. 4. Time allocated to the clearance process might be inconvenient for the administrator thereby causing lateness to the hall of registration or missing the clearance for that day completely. 5. Since every administrator for each department has to be present in school there is limited office space there by causing congestions in some offices. 6. Student account cards can be misplaced or stolen. The Student’s Perspectives 1. Clearance time might be too lengthy for some students who have a low tolerance for the congestion thereby making it difficult for them to patiently wait their turn. 2. Due to illness or certain emergencies students miss the clearance for the day. 3. All important points mentioned by the administrator during the clearance might not be taken down by the students exactly the way it was said. 4. There are no means of nowing exactly how much the student is meant to pay as some payments might be overlooked or not properly recorded. 5. Once there is an urgent call for the student, he is bound to miss the clearance for the time he is away from the school which means there is no room to make up for the lost time and have his/her registration done. 6. Studen t’s receipts or tellers can get missing or stolen. Poor dissemination of information Due to the fact that administration members usually do not attend meetings as earlier stated, information is not properly communicated to them, and in most cases the information is not communicated at all. When such a situation occurs it not only increases the clearance time, but affect how the accounts are handled, which if not handled properly will cause the to be distracted from his studies for no reason. Cost This will save the department a lot seeing as a lot of the normal paper, stamps, and ink to be bought would eventually reduce. No central back-up Each administrator is responsible for the information they are given to work with and handle. Most administrators go home with such information, and others can only access this information either pending the arrival of custodian of the needed information or the next meeting when the information is brought. Without a central back-up system were information can be stored and access by administrators, if the custodian who is responsible for the information happens to suffer an ill-fated situation, such information will be held down pending their recovery from such a fate. This then slows down progress for the students as well as the administrators. 3. 2SYSTEM DESIGN 3. 2. 1DEFINITION System design is the process of planning a new system based on the findings of a system analysis. The purpose of system design is to document exactly how the new system should work. In essence, this means preparing a detailed specification for the new system. This deals with the basic structure of the new system, its functionality, its specification, its user requirements and a complete breakdown of how this new system works. The completed design of the new system will provide satisfaction to the user’s needs and requirements. The design will also help for maintenance later in the life time of the system. Some design tools used include: functional diagrams, hierarchical-input-process-output (HIPO) Charts, input-process-output (IPO) charts and Flow Charts. These design tools are used to describe the process involved in the various segments of the new system. These design requirements are specified in line with the user requirements, goals and objective. Normally, the system design proceeds in two stages: * Preliminary or general design * Structure or detailed design Preliminary or general design In design, the features of the new system are specified. The costs of implementing these features and the benefits to be derived are estimated. If the project is still considered to be feasible, we move to the detailed design stage. Structure or detailed design In the detailed design stage, computer oriented work begins in earnest and also it is at this stage that design of the system becomes more structured. Structured design is a blue print of a computer system solution to a given problem having the same components as the original problem. Input, processing, and output specification are drawn up in detail. 3. 2. 2STEPS INVOLVED IN SYSTEM DESIGN The following steps are involved in system design * Input requirement * Output requirement * File and storage requirement Process * Control and backup * Personnel and procedures Input requirement Before data can be received as output, information first has to be fed to the system (which is called the input), processed and then displayed as the desired output. The system is an interactive one and the information is inputted into the system via keyboard. The system will be able to acc ommodate data entry in an interactive mode promptly with proper validation and access authorization. It will be able to accept the necessary data, view and record data. So the proposed system will have the facility to modify data where necessary. Output requirement One major thing that is of great interest to the administrators and the users (students and parents alike), is the output produced by the system (i. e. Online E-Transact software). It is very important to state the output that the system will produce at the early stages of system design. I. e. what must be produced? It dictates to a large extent how the input, processing and storage are to be handled. The output specifications of the system include: * Actual fees payment page: this page displays all payments made by the student and all outstanding payment not yet made. Information or data display page: this shows the user or admin any information which is entered into the system such as: registration information, new E-Transact card numbers, details of the fees to be paid, user information. File and storage requirement Here what the system needs to properly function is stated. These include the sizes, contents, organization, media devices, formats, access restricti ons, and locations for all files the system will use. The inputs which are keyed into the system will be stored and saved in a database. The analyst has to decide whether a new database needs to be established or if an existing one can be used. The database server used here is MySQL, the data would be called â€Å"etranzact_db†. The database would contain tables for different individual purposes with records that would be retrieved to serve their respective purposes. The storage device that is used is the hard disk drive. Processing Here a description of the various processing steps that are needed to convert input into output is given in detail. This involves the use of dataflow diagram and the program design aids to fully document the operation of the new system. The analyst should consider if there would be any new required hardware necessary for processing. The system authenticates details supplied by users comparing them with what is already available in the database. If there is a match between both data, then access to system will be granted otherwise such a user will be denied access and will be given an opportunity to retry entry into system by logging in again. This is done, in order to restrict access to the system by unauthorized users. Control and backup Apart from the output being considered to be one of the most important parts of the system, another aspect that should be taken very seriously is control and backup. System controls are put in place in order to make sure that data are input, processed and output correctly and to prevent data destruction, unauthorized program modification and access, fraud and any other tampering that might occur. System backups are copies of essential data and program files that are made periodically to protect against inadvertent loss or malicious damage. Personnel and procedures The last aspect that need to be considered are the people who will make use of the system and the procedures that they will have to follow in order to make use of it as well. The new system will be accessed by users and the companies of administrator who alone has access to the system database. He controls the actions that will occur from the back-end and monitor what the various users are doing and inputting as well. SYSTEM FLOW CHART A graphical map representation of the path of control or data through the operations in a program or an information-handling system. Symbols such as squares, diamonds, and ovals represent various operations. These symbols are connected by lines and arrows to indicate the flow of data or control from one point to another. Flowcharts are used both as aids in showing the way a proposed program will work and as a means of understanding the operations of an existing program. It is also a pictorial representation of an algorithm or program. It consists of a set of symbols. Each symbol represents a specific activity. A typical problem involves accepting input, processing the input, and displaying the output. The flowchart shown in fig 3. 1 shows a simple algorithm of the new system as thus; once the user accesses system and is sent to the index page (which is the first page displayed), he/she can login as a user or admin. If the user has an account and has being approved by the admin, they will have access to the system and be taken directly to the user main page, where they will be able to see and know about their fees both pending and paid, while the admin will be taken to the manage user page where he can activate new users who have just registered, or the manage account and fees page, where he can start a new account and add users to it and make any changes where necessary. IS USER USERNAME amp; PASSWORD CORRECT IS USER USERNAME amp; PASSWORD CORRECT IS ADMIN USERNAME amp; PASSWORD CORRECT IS ADMIN USERNAME amp; PASSWORD CORRECT LOGOUT LOGOUT USER MAIN PAGE USER MAIN PAGE START START STOP STOP LOGOUT LOGOUT USER LOGIN PAGE USER LOGIN PAGE ADMIN LOGIN PAGE ADMIN LOGIN PAGE NONO MANAGE FEES RECORD MANAGE FEES RECORD MANAGE STUDENT’S ACCOUNT MANAGE STUDENT’S ACCOUNT YESYES FIG 3. 1 FLOWCHART OF THE SYSTEM Actual fees payment Information amp; data display page Actual fees payment Information amp; data display page Login info Register student Create account Manage student records Manage fees records User management Login info Register student Create account Manage student records Manage fees records User management Login access Login access INPUTADMIN OUTPUT Actual fees paid Actual fees paid PROCESS USER OUTPUT FIG 3. 2 IPO Diagram DATA DICTIONARY A data dictionary defines each term encountered during the analysis and design of a new system. It is a feature of a database (or a tool) where the data to be used in the database are properly defined and linked as to their length, location etc. It helps the user to know the type of data in the database and the restrictions if any. Below are some examples of data dictionaries used for certain modules in the project. User Work module (front-end) * The user inputs their username and password * If they do not have an account, click on the ‘register’ link that displays another page were they will be able to fill out a form to register for an account * Once granted access to the system the user is to follow the respective instruction as to which faculty and subsequently department. * It then takes the user to the various fees allocation and subsequently asking which amount the user wishes to pay. 4. 6IMPLEMENTATION GUIDELINE User Training Requirement

Sunday, November 24, 2019

About the Roman Historian Livy

About the Roman Historian Livy Name: Titus Livius or Livy, in EnglishDates: 59 B.C. - A.D. 17Birthplace: Patavium (Padua), Cisalpine GaulFamily: Unknown, had at least one child, a sonOccupation: Historian The Roman annalistic [year-by-year] historian Titus Livius (Livy), from Patavium (Padua, as its called in English), the area of Italy in which Shakespeares Taming of the Shrew took place, lived about 76 years, from c. 59 B.C. to c. A.D. 17. That hardly seems long enough to have finished his magnum opus, Ab Urbe Condita From the Founding of the City, a feat that has been compared with publishing one 300-page book each year for 40 years. Most of Livys 142 books on the 770-year history of Rome have been lost, but 35 survive: i-x, xxi-xlv. Division of Ab Urbe Condita Contents of Ab Urbe Condita Libri I-XLV I-V: Origins to Gallic sack of RomeVI-XV: To beginning of Punic WarsXVI-XX: First Punic WarXXI-XXX: Second Punic WarXXXI-XLV: Macedonian and Syrian Wars After dispensing with 365 years of Roman history in only five books (averaging ~73 years/book), Livy covers the rest of the history at the rate of about five years per book. Livys Morality Although were missing the contemporary portion of his history, there seems little reason to believe that Livys Ab Urbe Condita was written as an official Augustan history, aside from the fact that he was a friend of Augustus, and that morality was important to both men. Although Livys status as the official Augustan historian is debated, Paul J. Burton (following T.J. Luce, The Dating of Livys First Decade, TAPA96 (1965)) dates the start of Livys historical writing to 33 B.C. before the Battle of Actium and the year (27 B.C.) Octavian conventionally qualifies as emperor.Livys role in the history of literature and the theater for which see Heroes and Heroines of Fiction, by William Shepard Walsh and the visual arts, especially Botticelli, comes at least in part from Livys moral stories of The Abduction of Virginia and The Rape of Lucretia. In his preface, Livy directs the reader to read his history as a storehouse of examples for imitation and avoidance: What chiefly makes the study of history beneficial and fruitful is this, that you behold the lessons of every kind of experience as upon a famous monument; from these you may choose for your own state what to imitate, and mark for avoidance what is shameful.... Livy directs his readers to examine the morals and policies of others so that they can see how important it is to maintain standards of morality: Here are the questions to which I should like every reader to give his close attention: what life and morals were like; through what men and what policies, in peace and in war, empire was established and enlarged. Then let him note how, with the gradual relaxation of discipline, morals first subsided, as it were, then sank lower and lower, and finally began the downward plunge which has brought us to our present time, when we can endure neither our vices nor their cure. From this moral perspective, Livy depicts all non-Roman races as embodying character flaws that correspond with central Roman virtues: the Gauls are factious and headstrong, and lack staying power; while the Greeks are better at talking than fighting, and immoderate in their emotional reactions [Usher, p. 176.] Numidians are also immoderate emotionally since they are too lustful: above all barbarians the Numidians are steeped in passionsunt ante omnes barbaros Numidae effusi in venerem. [Haley] Historical Evaluation of Livy With history as his vehicle, Livy displays his rhetorical flair and literary style. He engages the attention of the listening audience through speeches or emotive description. Occasionally Livy sacrifices chronology to variety. He rarely explores contradictory versions of an event but selects with an eye to championing Romes national virtues. Livy acknowledged a lack of contemporary written records from which to verify facts from Romes beginnings. Sometimes he mistranslated Greek literary sources. Without a background in practical military affairs or politics, his reliability in these areas is limited. However, Livy supplies myriad mundane details that are unavailable elsewhere, and, therefore, he is the most important source for Roman general history for the period to the end of the Republic. Sources Include: Stephen Usher, The Historians of Greece and Rome The Last Republican Historian: A New Date for the Composition of Livys First PentadPaul J. BurtonHistoria: Zeitschrift fà ¼r Alte Geschichte, Bd. 49, H. 4 (4th Qtr., 2000), pp. 429-446. ï » ¿Livy, Passion, and Cultural StereotypesS. P. HaleyHistoria: Zeitschrift fà ¼r Alte Geschichte, Bd. 39, H. 3 (1990), pp. 375-381

Thursday, November 21, 2019

GLobal Warming Research Paper Example | Topics and Well Written Essays - 1000 words

GLobal Warming - Research Paper Example That global warming has happened in the recent past is evident from the rise in the mean temperature of the earth’s atmosphere. Many ecosystems will be unable to adapt suitably to such rapid changes in climate and this will lead to extinction of some animal species. In addition to the impact on ecosystems, human agriculture, health and water resources are all being affected by global warming sparking wide spread apprehension across the globe. Scientists agree that human activities have led to release of green house gases that in turn are responsible for global warming during the last century. This has been especially marked during the last 50 years. As humans began to use petroleum and burn coal and oil to heat their cities and run their machines, levels of carbon dioxide have risen by almost 30%. The concentration of nitrous oxide and methane that are by products of farming, coming from rice fields and cattle have also risen by 10 – 15 %. In 2002 about 40% of U.S. carbon dioxide emissions were a result of the burning of fossil fuels for the purpose of electricity generation. Coal accounted for 93 percent of the emissions from the electric utility industry. Statistics show that of the total energy consumption in the US every year, almost 85 % comes from gas and petroleum products and coal. (American Gas Association) About 33% of U.S carbon dioxide emissions come from the burning of gasoline in engines of cars and light trucks. Hence the second biggest sources of these green house gases are road vehicles and industries. Emissions from airplanes and buildings add their own percentages of Carbon Dioxide to the atmosphere and aid global warming. It has been found that water vapor in the atmosphere - a powerful greenhouse gas, has been increasing, due to warming caused by carbon dioxide, methane and other green house gases. Deforestation is yet another major cause of

Wednesday, November 20, 2019

Annotated bibliograhphy Bibliography Example | Topics and Well Written Essays - 250 words

Bibliograhphy - Annotated Bibliography Example Although most human resource managers find implementing work-life programs challenging and expensive, Lockwood suggests that any organization that intends to attract the right talents and gain competitive advantage must consider implementing a work-life program since it offers a win-win solution. This article satisfies the study objectives since it discusses the challenges facing human resource in the present day society as regards increased need for work-life program. The world has witnessed rapid technological advancements in the recent past. In this journal article, Kamal and Ashish Kumar investigate the impact that technological advancements witnessed in the recent past has had on human resource performance. The authors note that the recent technological advancements such as computers have transformed human resource functions in a big way. The authors note that the integration of technologies, such as computers has changed how the human resource managers process payrolls and record information among others. Additionally, the authors reckon that the integration of technologies in human resource management has improved how HR keeps records and information in an organization. Therefore, the authors advise that HR managers should ensure that they keep up with new technologies to enhance the performance of their HR functions. This paper satisfies the study objectives since it explores the impact of technology on HR

Monday, November 18, 2019

Aviation Inspection and Maintenance System Research Paper

Aviation Inspection and Maintenance System - Research Paper Example 996), since the beginning of the FAA regulation scheme, FAA maintenance personnel have been required to be certificated in order to perform various tasks in keeping aircrafts under repair and airworthy. Moreover, there are other mechanics that are granted inspection authorization by FAA to perform required inspections on all aircrafts operating in the national airspace (Eichenberger, 1996). Furthermore, federal aviation regulations have been put in place to regulate maintenance and inspections and define operating limitations for aircrafts having different kinds of certifications (FAA, 2008). The federal aviation regulations provide five regulation options that should be adapted by all the aircrafts operating in US airspace. These are the continuous airworthiness inspection program, inspection program used by air taxi operator, inspection program used by air travel club, a manufacturer’s inspection program and any other inspection program developed by the owner and approved by the administrator (King, 1986). According to Patankar and Taylor (2004), to reduce the aviation risks, aviation maintenance strategy should optimize the contribution of people and information through technical support. However, Garland et al. (1999) indicate that human factors such as the individual differences of aviation inspectors have a very great influence on the process of inspection and maintenance of aviation facilities and equipment. Several factors resulted in occurrence of this accident. One of the key factors is the failure of an air traffic control system to facilitate the dissemination of key, available wind information to the air traffic controllers and the pilots due to poor maintenance. In this case, both the pilot and the traffic controllers were not aware of the presence and effect of the gusting wind that was being experienced at the airport. It is clear that if the two were aware they could have chosen to delay the flight or could have chosen another runway and the