Tuesday, December 31, 2019

Prescription Drug Abuse - 2011 Words

Cultivating a Solution for the Youth of America Prescription drug abuse has become an epidemic across the United States, destroying and affecting many lives of young Americans. Why do so many people abuse prescription drugs? Many think that prescription drugs are safer and less addictive than â€Å"street drugs.† After all, these are drugs that moms, dads, and even kid brothers and sisters use. The dangers are not easily seen, but the future of America’s youth will soon be in severe danger if the problem is not addressed. It will continue to get worse if action is not taken soon. Prescription drugs are only safe for the individuals who actually have prescriptions for them because a doctor has examined these people and prescribed the†¦show more content†¦Education is the next stepping stone to the ultimate goal of prevention. According to The USA Today, 95% of unintentional poisoning deaths in the United States are drug overdoses and the number nearly dou bled from 1999 to 2004 (â€Å"A Tragic Reminder† 3). Both parents and children alike do not understand the dangers that prescription drugs may bring (Parenting of Teens 1). After the recent death of actor Heath Ledger, his father issued a statement that said, â€Å"Heaths accidental death serves as a caution to the hidden dangers of combining prescription medication, even at low dosage† (â€Å"A Tragic Reminder† 1). Parents need to examine all areas of the problem and be aware of the lurking dangers. If more of the population understood the true threats that lie within the medicine cabinet, then young people today would have a much brighter outlook upon the future. Their outlook would not be based on the knowledge of how to use modern medicine for the betterment of our country and not its internal destruction. Today there are many myths regarding both legal and illegal drugs. Examples of these myths include the idea that marijuana causes people to become v iolent and the idea that aspirin is safe (Corder 3). In actuality, many have died due to hemorrhages as a result of aspirin abuse (Corder 3). Myths concerning drugs encircle American society; it is important for parents to maintain communication with their children in regard toShow MoreRelatedPrescription Drug Abuse And Prescription Drugs Essay1413 Words   |  6 PagesMost people are familiar with prescription medications; almost everyone has taken them at one point or another during their lifetime. Not all prescription drugs are addicting, but a large number of them are. Prescription drug abuse is a disease that has become a major problem in the United States, which affects over six-million Americans. Prescription drug abuse not only affects the individual, but can additionally have far-reaching consequences that affect family, personal health, employmentRead MoreDrugs And Prescription Drug Abuse2022 Words   |  9 Pagesoverview of the increased use of pharmaceuticals and prescription drug abuse in the US. The section continues with the relationship between illicit drugs and prescriptions, adolescents’ abuse, personal and social factors; then concludes with the theoretical approach. The Social-Ecological Theory, will be applied in researching prescription drug abuse, possible influences and protective factors in adolescents in relation to prescription drug abuse, to develop focused intervention strategies and educationalRead MoreTeen Abuse Prescription Drug Abuse1422 Words   |  6 Pagesleading drugs used and abused by teenagers in America. According to Elizabeth Larsen, â€Å"The Centers for Disease Control classifies prescription drug abuse as the worst drug epidemic in United States history† (Larsen p.4). This is the worst drug epidemic in history because of the percentage of teenage usage. Based on different studies, pills are the most commonly abused drug among twelve- and thirteen- year olds because of how easy they are to acces s. In fact, many teens that abuse prescription medicationRead Moreprescription drug abuse1523 Words   |  7 Pagesï » ¿Prescription Drug Abuse Millions of people throughout the world are taking drugs on a daily basis. If you were to ask someone why they take prescription drugs, most people would be taking them for the right reason. However, it’s estimated that twenty percent of people in the United States alone have used prescription drugs for non-medical reasons.1 Prescription drug abuse is a serious and growing problem that often goes unnoticed. Abusing these drugs can often lead to addiction and even deathRead MorePrescription Drug Abuse And Prescription Drugs1487 Words   |  6 PagesPrescription Drug Abuse Prescription Drug Abuse has increased in an alarming rate over recent years! Prescription drug related deaths now outnumber those from heroin and cocaine combined. The abuse in prescription drugs in America goes back more than a hundred years ago. Prescription drug abuse is the use of a medication without a prescription, in a way other than prescribed, or for the experience or feelings elicited. Although prescription medications are intended to help individuals, they canRead MorePharmacists and Prescription Drug Abuse1420 Words   |  6 Pagesof the highest rates for prescription drug abuse, and overdose in the nation. In order to change this it is important to understand what pharmacists do, their role in prevention, and the severity of prescription drug abuse. Pharmacists are known to dispense prescription drugs to patients and inform them about their use; However, one aspect of their career most people overlook is that Pharmacists must keep a sharp eye out for criminals looking to abuse these prescribed drugs. First, here is some importantRead MorePrescription Drug Abuse. Did You Know That Prescription1173 Words   |  5 PagesPrescription Drug Abuse Did you know that prescription drug abuse is one of the leading causes of death in the United States? â€Å"According to the Journal of the American Medical Association, two-hundred and ninety people in the United States are killed by prescription drugs every day. (White)† That number is growing every year due to the lack of knowledge of prescription drugs and the potential harm they can cause. Many people are under the misconception that prescription drugs are safe becauseRead MoreTeenage Prescription Drug Abuse Essay1427 Words   |  6 PagesTeenage Prescription Drug Abuse Years ago, the common image of an adolescent drug abuser was a teen trying to escape from reality on illegal substances like cocaine, heroin, or marijuana. Today, there is a great discrepancy between that perception and the reality of who is likely to abuse drugs. A teenage drug abuser might not have to look any further than his or her parent’s medicine chest to ‘score.’ Prescription drug abuse by teens is on the rise. Also, teens are looking to prescription drugsRead MoreThe Problem Of Prescription Drug Abuse1461 Words   |  6 Pages(Quotes about Drug Abuse). This quote by Wayne Gerald Trotman describes how heartbreaking it is to contemplate on exactly how many people’s lives have been adversely impacted as a result of abuse. Child abuse, animal abuse, and sexual abuse are all major types of abuse; however, prescription drug abuse is a problem that is drastically skyrocketing in today’s society. While other addictions and abuses are equally signif icant, it is imperative that people put a stop to prescription drug abuse using twoRead MorePrescription Drug Abuse Among Adolescents1628 Words   |  7 PagesNursing Informatics Quality Improvement Prescription Drug Abuse Among Adolescents Have you ever heard these words –hillbilly H, a-minus, red birds, Vitamin R, and roses? There is no question that we have heard some of these words. Yet, what is unexpected is they are all code words used by teens for prescription drugs (National Institute on Drug Abuse, 2016). Prescription drug abuse among teens has rapidly increased, and has become a public health concern. (Milner, Ham, Zamboanga, 2014.) With

Monday, December 23, 2019

Causes And Effects Of Autism - 2108 Words

When someone mentions electric shock therapy what comes to your mind? Is there a connection somewhere in your family tree to ‘Fragile X’? Are there toxins in the air that are more dangerous than we think? Can watching too much television while you are pregnant actually be harmful to your unborn baby? What could all of these questions possibly have in common? The answer is Autism. Imagine the overwhelming joy of holding your healthy newborn child and counting ten perfect fingers and toes. It is hard to believe, when you look at his big blue eyes and dimples, that he could ever be anything less than perfect. But two years later, you hear the words â€Å"your child has autism†, and can’t help wondering if you are responsible in some way. Thesis Statement There is growing evidence that the rapid rise in reported cases of autism is caused, and influenced equally, by genetic and environmental factors. Environmental factors include a broad range of influences as varied as parental age, birth complications and maternal nutrition at conception, vaccines and exposure to pollution during early brain development. Most genetic factors are considered in combination with environmental ones. It is believed that over time genetic changes brought on by the environment are passed on to future generations predisposing them to disorders as autism. While thousands of dollars and countless studies claim to have found a concrete link between environmental and genetic factors and the newShow MoreRelatedCause and Effect of Autism852 Words   |  4 PagesMarch 2015 Cause and Effect of Autism Hundreds of kids are being diagnosed with Autism (a developmental disorder) every year. A number of possible causes of Autism have been suspected but not proven which involve, diet, digestive tract changes, mercury poisoning, the body’s inability to properly use vitamins and minerals, and vaccine sensitivity. Genetic factors are of importance because identical twins are more likely than fraternal twins or other siblings to both have Autism. Autism appears withinRead MoreWhat Do We Know About Autism Spectrum Disorder?1390 Words   |  6 PagesAbout Autism Spectrum Disorder? Actress Holly Robinson Peete once stated, â€Å"I m not a doctor or scientist. I m just a mom. But I do think there s a genetic predisposition, and there are environmental triggers. I feel like that combination, in my child s case, is what resulted in autism.† Holly Robinson could have not said it in a better way. What is the cause of autism? Is autism solely caused by genetics or a combination of genetics and environmental influences? What does make up autism spectrumRead MoreA Variable Developmental Disorder1533 Words   |  7 PagesAutism Introduction Alexis Wineman the first woman with ASD to participate in the Miss America competition. While Alexis was in middle school she was diagnosed with PDD-NOS which is a form of ASD. She felt different at an early age, and only struggled more as she got older. As she got older she had to overcome the challenges that came with having ASD, such as: communication problems, speech impediments, sensitivity to loud sounds, and other sensory-related issues. Bullying was also a problem becauseRead MoreMusic And Children With Autism881 Words   |  4 PagesInformative Speech Topic: Music and Children with Autism Purpose: To inform audiences about the effect of music to the children with autism Thesis: Music effect children with autism in a powerful significant way. Introduction: †¢ Do you know that 1 in every 68 children in the United States has an autism? (Miriam, 2014) †¢ Boys are more likely to have autism than girl. †¢ What is autism means to us? In 1943, according to Dr. Leo Kannar who was the first described autism as a distinct condition that caused byRead MoreAutism Is A Fast Growing Disorder1699 Words   |  7 PagesIntroduction: Autism is a fast growing disorder in the United States, the symptoms start occurring in between the ages of 2 to 3 years old. The cause of this epidemic has remained unknown, but several hypotheses have been studied. Throughout those couple of years, children get as many as 32 shots at least (â€Å"Child and Adolescent Schedule†). Parents all over the world have came to concern that vaccines can develop autism. Many studies have came about through this year with vaccines causing Autism in childrenRead MoreChild Development and the Impact of Autism1273 Words   |  6 Pagesidentified the cause or effect I am analyzing in my thesis? Yes, I am analyzing cause and effect between autism and children. 2. Have I explained the cause-and-effect relationship convincingly? Yes, I have provided researched examples of the cause and effect relationship between autism and children. 3. Have I organized my causes and/or effects logically? Yes, I have organized my causes and effects throughout the paper. 4. Have I used sound logic? Yes, I have backed up my cause and effect ideasRead MoreBaby Immunizations - The Vaccination Dilemma. Loving-Attachment-Parenting.Com.1279 Words   |  6 Pagesare in vaccines. Children are expected to receive 32 vaccines by the age of two, most of them containing various toxins. These toxins are in vaccines in order to attempt to strengthen the immunity over the disease; however, they are also known to cause multiple serious diseases. The information from this article relates to my TED talk because children are expected to have multiple shots by the age of two which may lead to dangerous health problems. This will strengthen my position because it hasRead MoreEssay about The Signs and Effects of Autism1370 Words   |  6 PagesThe Signs and Effects of Autism Autism is a rare disease that has been noticed for centuries. The purest form of autism (high IQ and almost normal behavior yet still self-contained) occurs in about â€Å"one in 2,000 people†. When the many other forms of autism are added in, the ratio is â€Å"one in 750†. Autism is found in every race, ethnic group, nation, and social standing, although â€Å"males outnumber females by four or five times† (â€Å"Autistic Disorder† – 2). Autism is a broad range of disordersRead MoreTreating Autism Spectrum Disorders1025 Words   |  5 PagesAutism spectrum disorders are a class of developmental brain disorders with symptoms that range widely with each affected individual. Autism is a disorder that varies in severity of social interaction and communication that can benefit from the help of different types of treatment. Asperger syndrome, Rett syndrome, autism, pervasive development disorder, and non pervasive developmental disorder are disorders on the autism spectrum with differing levels of intensity. Treatments for autism includeRead MoreThe Anti Vaccine Movement1426 Words   |  6 Pagesto autism. The claim that the MMR vaccine causes autism is not backed by any scientific evidence and therefore should not be believed. Autism is a developmental disability that is caused by differences in how the brain functions. People with autism may communicate, interact, behave, and learn in different ways and show repetitive behaviors. About 1 in 68 children have been identified with autism in communities across the United States. According to the myth, children seemed to develop autism shortly

Sunday, December 15, 2019

Zachman Framework Free Essays

THE ZACHMAN FRAMEWORK FOR AND ENTERPRISE ARCHITECTURE KNOWLEDGE MANAGEMENT ENABLING ENTERPRISE STRATEGY What Data Function List of Processes How Where Network Who People When Time Motivation List of Goals Why List of Things List of Locations List of Organizations List of Cycles Scope Planner ENTITY = Class of Business Entities PROCESS = Class of Business Processes NODE = Class of Business Locations PEOPLE = Class of Business Organizations CYCLE = Class of Business Cycles END = Class of Business Objectives Scope Planner The Zachman Framework for Enterprise Architecture s a comprehensive classification scheme for descriptive representations (models) of an enterprise. First conceptualized nearly two decades ago by John Zachman, it has evolved to become a universal schematic for defining and describing today’s complex enterprise systems and for managing the multiple perspectives of an organization’s information and knowledge infrastructure. e. We will write a custom essay sample on Zachman Framework or any similar topic only for you Order Now g. , Semantic Model e. g. , Business Process Model e. g. , Logistics Network e. g. , Work Flow Model e. g. , Master Schedule e. g. , Business Plan INTERVISTA INSTITUTE EXECUTIVE EDUCATION Business Model (Conceptual) Business Model (Conceptual) ENTITY = Business Entity RELATION = Business Relationship I/O = Business Resources PROCESS = Business Process NODE = Business Location LINK = Business Linkage PEOPLE = Organization Unit WORK = Work Product TIME = Business Event CYCLE = Business Cycle ENDS = Business Objective MEANS = Business Strategy Owner Owner Intervista’s Enterprise Architecture courses provide you with an in-depth understanding of the Zachman Framework and the key success factors for implementation. Over 5000 IT and Management Executives from all sectors have chosen Intervista for their professional development and strategic advancement. To learn more about our Enterprise Strategy, Enterprise Architecture and Knowledge Management Executive Education programs call 1-800-397-9744 or visit us at: www. Intervista-Institute. com e. g. , Logical Data Model e. g. , Application Architecture System Model (Logical) e. g. , Distributed System Architecture e. g. , Human Interface Architecture e. g. , Processing Structure e. . , Business Rule Model System Model (Logical) TIME = System Event CYCLE = Processing Cycle ENDS = Structural Assertion MEANS = Action Assertion Designer ENTITY = Data Entity RELATION = Data Relationship I/O = User Views PROCESS = Application Function NODE = IS Function LINK = Line Characteristics PEOPLE = Role WORK = Deliverable Designer Technology Model (Physical) e. g. , Data Design e. g. , System Design e. g. , Technology Architecture e. g. , Presentation Architectur e e. g. , Control Structure e. g. , Rule Design Technology Model (Physical) Builder ENTITY = Table/Segment/etc. RELATION = Key/Pointer/etc. I/O = Data Elements/Sets PROCESS = Computer Function NODE = Hardware/System Software LINK = Line Specifications PEOPLE = User WORK = Screen/Device Formats TIME = Execute CYCLE = Component Cycle ENDS = Condition MEANS = Action Builder www. zifa. com e. g. , Data Definition e. g. , Program e. g. , Network Architecture e. g. , Security Architecture e. g. , Timing Definition e. g. , Rule Specification Detailed Representations Subcontractor ENTITY = Field RELATION = Address I/O = Control Block PROCESS = Language Statement NODE = Addresses LINK = Protocols PEOPLE = Identity WORK = Job TIME = Interrupt CYCLE = Machine Cycle ENDS = Sub-condition MEANS = Step Detailed Representations Subcontractor www. ZachmanInternational. com Example Example Example Example Data Function Network Organization Example Example Schedule Strategy FUNCTIONING ENTERPRISE For the Enterprise Architecture Executive Education schedule call Intervista Institute at 1-800-397-9744. www. Intervista-Institute. com Copyright 2003, Intervista Inc. All rights reserved. Framework by permission John A. Zachman. How to cite Zachman Framework, Essay examples

Friday, December 6, 2019

Project Management Application

Question: what project management is all about? Explain. Answer: If I have to answer what project management is all about, I would probably say that it is an application of knowledge and experience relying on which managing the procedure and methods for developing a project for achieving business goals can be accomplished. I have gained all project management concepts from my previous experience, where I worked as a project manager at an e-commerce firm in Australia. I also had learned that how people cooperate with each other for achieving business goal working as a single team. Being in the designation of a project manager, it is my responsibility to monitor the production of goods, maintaining a partnership with the actual manufacturers and then maintaining warehousing and purchasing details. I also have to implement my insights and knowledge in developing the system while keeping a good interpersonal relationship with everyone at my workplace. When my professor gave our class to write a reflective discourse on managing projects, I decided that I could reflect my personal experience to complete this assignment. My perception is that a project manager only analyses projects and have to plan for the best output within limited time, budget, and looking at the risks involved. However, a person who is serving in the designation of a project manager knows that their role is beyond the job description written in the appointment letter. Starting from the gathering requirements of the product and goods that are high in demand for supply chain and inventory management planning, I had served my intellect at every stage of the business. I came across the situation when some working personnel are facing issues with the current inventory management system and I tried to resolve the situation by redesigning system for them that is fully customized. However, it was I, who planned the project from gathering goods from actual manufacturers and then stores them according to their type for developing an effective inventory management system . According to me aproject manager should communicate with every level and should learn how their leadership skills will make everyone convinced to use their designed system. During my employment, I have also understood the concept of earned value management system (EVMS) where I can give my project status to my authorities and project sponsors. While managing projects for inventory management, I also learned about how to communicate with the suppliers so that they can gain my valuable insights for increasing the sale of my company along with boosting their profitability. This way I can develop my leadership skills that will be beneficial for main the forthcoming years for better career opportunity. Hence, I realized that project manager not only maintains the stockings and supply management, but they also assess the entire business approach minutely and develop the project according to the consumer's need. For instance, when I saw that sale of electronics products is high than home decors and clothes sale, I put more emphasis on the electronics goods and types and focus on their sale. This can be done by developing the Information technology devices like Point of Sale (POS) software where the employees can analyze stored products at inventory levels on an item-by-item basis so that it is easy to monitor sales data and maintain a sales history within less interval of time. As a result, employees did not have to spend much time in calculations as the total summation of the sale is evaluated automatically with the help of modern devices accurately by integrating barcode scanners and POS system. Moreover, apart from my personal experience when I went through other theories and concept of project management, I came to know that employee feedback also plays a crucial role in this field. If I started implementing something that I personally feel will be productive for the organization, it is not necessary that all employee will support my decision. Hence, I have to seek feedback and constructive criticism for improving the existing system. I also have learned that if employees at ground-level are befriended with you and shares negative feedback, it is important that without getting disappointed we have to look on that particular matter, it will be beneficial for the organization. Thus, an ability to be an active listener is essential along with the capacity to define the project a project manager is developing, reviewing the project estimates and the techniques used by the project team. Additionally, in the monitoring and control stage of a project, maintaining quality project is the most difficult step that a project manager is facing. As the quality of a project begins at the beginning of each project, a project manager should use quality assurance reviews to ensure that theobjectives are achieved with the help of the technologically advanced project in the business like in e-commerce firm, implementation of the IT devices helps in increasing the product sales. In real life also, we need to plan our activities to obtain maximum efficiency at minimum cost and this planning technique helps me in my profession. All these experience will not only benefit my choice of profession, but it will also boosts my knowledge to manage project according to the organizations need.

Friday, November 29, 2019

Cross Cultural Conflict in “the Tigers Daughter” of Bharati Mukherjee Essay Example

Cross Cultural Conflict in â€Å"the Tigers Daughter† of Bharati Mukherjee Essay Bharati Mukherjee, an Indian born American novelist, is a familiar voice in the Indian Diaspora. Her fiction truly reflects the temperament and mood of the present American society as experienced by immigrants in America. She depicts the cross cultural crisis faced by her women in her novels. She found herself difficult to adapt to the culture, customs, and traditions, which she depicts through her female protagonists’ cultural crisis. Bharati Mukherjee’s first novel The Tiger’s Daughter (1972) deals with an upper class Bengali Brahmin girl named Tara Banerjee Cartwright, who goes to America for higher studies.. This paper throws light on the cross cultural conflict of the 22-year old heroine when she revisits India after a seven year stay in the United States. It highlights the cultural turmoil faced by Tara when she refuses to accept Calcutta as her home again. This paper also analyses how Tara, caught in a gulf between the two contrasting worlds, leads to her illusion, depression, and finally her tragic end. The author also attempts to portray how the novelist herself intimately projects her own self through the heroine in this novel. **************** The Tiger’s Daughter and Wife are about two different problems of expatriates. The Tiger’s Daughter, Mukherjee’s first novel, is about the cultural conflict of Tara Banerjee Cartwright, a Benghali Brahmin girl, who goes to America for higher studies at the age of sixteen. We will write a custom essay sample on Cross Cultural Conflict in â€Å"the Tigers Daughter† of Bharati Mukherjee specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Cross Cultural Conflict in â€Å"the Tigers Daughter† of Bharati Mukherjee specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Cross Cultural Conflict in â€Å"the Tigers Daughter† of Bharati Mukherjee specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Having married a white American, she returns home for a holiday trip to visit her parents. .The fusion of the Americanness and Indianness in the mind of Tara and the resulting of split personality due to the cultural conflict is the theme of the novel. In â€Å"The Tiger’s Daughter† Mukherjee creates a heroine Tara, who like herself, returns to India after several years in the West to discover a country quite unlike the one she remembered. Memories of a gentle Brahmin lifestyle are usurped by new impressions of poverty, hungry children and political unrest. At the age of fifteen Tara goes for higher study. â€Å"For Tara Vassar had been an unsalvageable mistake† (10). In Poughkeepsie Tara senses discrimination when her room mate refuses to share her bottle of Mango chutney. So she feels sad and homesick. She is unable to share her thoughts with pale dry skinned girls. Chowdury observes in this connection : She had been desperately homesick, lonely, and desperate to belong in fact she was in the typical position of an immigrant. She had to adjust to things which had been outside the purview of her previous idea of life as a hole. 82) Like other Indians she defends her family and her country. She also prays to Goddess Kali for strength, so that she would not break down before Americans. New York has driven to despair. Here, in the beginning she could not digest the culture of the States because of her deep-rooted Indianness. As ill luck would have it, Tara falls in love with an American named David and marries him. David is total ly western and Tara finds it difficult to communicate the finer nuances of her family background and of her life in Calcutta. It was because of the cultural difference. â€Å"Her husband asked naive questions about Indian customs and traditions. She felt insecure in an alien atmosphere. Madison Square was unbearable and her husband was after all a foreigner† (Shoba Shinde , quoted in R. K Dhawan 50). In the second part, when Tara visits India after seven years, she fails to bring back her old sense of perception and views India with a keenness of a foreigner. She is now totally Americanized. In India she finds herself a total stranger in the inherited milieu. She experiences a cultural shock. Tara is confused because â€Å"her old milieu, her family, her ideas of yore seem to confront the ‘American’ Tara as it were. †(Enakshy Chowdury 82). She feels herself a misfit at her home and among friends. Tara finds in India nothing to her liking and she realizes that there is no escape from Calcutta. As Shoba Shinde has rightly observed, â€Å"An immigrant away from home idealises his home country and cherishes nostalgic memories of it† (58) and Tara does the same in America. When she comes back to India, she confronts a restive city which forces weak men to fanatical defiance and dishonesty. In spite of her European personality, the Indian pulse vibrating in Tara makes her realise that the life of Calcutta in spite of all the dark spots and drawbacks, has its own life which is found nowhere else and which her husband David would not be able to able to realise. However, the Americanism dominates her Indianness and she looks at her home trough her Americanised eyes. She is no more an Indian identity and is always in clash with the culture of her native soil. The clash is deeply felt in the psyche of Tara who finds it difficult to adjust with her friends and relatives in India; and sometimes with the traditions of her own family. At the Bombay airport she responds to her relatives in a cold and dispassionate manner. When her relatives call her â€Å"Tul Tul† it sounds strange to her Americanised ears. The railway station looks like a hospital with so many sick and deformed men sitting on the bundles and trunks. In the compartment she finds it difficult to travel with Marvari and a Nepali. Now she considers America a dream land. When surrounded by her relatives and vendors at the Howrah railway station Tara feels uncomfortable. It is likely that she hates everyone and every thing in India where she was born, brought up and taught many values because of her acculturation in America. Her personality now resists to digest the changed atmosphere in her native place and in her friends. Slowly her changed personality makes her a misfit in the company of her old friends.. She feels alienated when her relatives call her ‘Americawali’ and her husband ‘mleccha’ The foreignness of her spirit refuses to establish an emotional kinship with her old friends and relatives. The greatest irony of her return is that she feels loneliness in her native land. Tara’s mother Arati is a saintly woman and she spends a great deal of time in her prayer room. At home Tara is compelled to lead a pious life. Her mother urges her to sit and listen to Sanskrit slogans, but she tries to tolerate prayers and Saraswathi Poojas. For Tara, who could sing ‘ Ragupati ragava raja ram’ it has now become artificial to sing the song after her return from America. Tara’s mind is constantly at conflict with the two personalities – one of an Indian and the other of an American. Caught in the gulf between these two contrasting worlds, Tara feels that she has forgotten many of her Hindu rituals of worshipping icons she had seen her mother performing since her childhood. It is the American culture that has covered Tara like an invisible spirit or darkness. In the deepest core of her heart, Tara has an intense desire to behave like an ordinary Indian but her re-rooted self in America made such common rituals alien to her. . She realises that she has become rootless now. She is convinced of her â€Å"†¦ little death, a hardening of the heart, a craking of axis and centre† (54) When her mother requests to share piety with the family, she thinks â€Å"†¦ in the end she would not stay† (54). She has become an outsider looking at her own life, from outside. She sees everything with an American eye and comments on everything from the point of view of an Americanised Indian. She finds herself marginalized on the psychological level and suffers from a split self. Meena T Pillai rightly observes: She came to India expecting admiration, glamour and heroism. But when she doesn’t get these, she is stung and depressed†¦ This is exactly Tara’s predicament. Neither can she comprehend Calcutta, nor can she reach out its teeming masses. † (129) The third part of the novel deals with Tara’s life at Calcutta with her Catelli- Continental friends. She hopes that her friends would offer peace to her confused mind. To her surprise, they behave in a different way. â€Å"Her friends let slip their disapproval of her, they suggested her marriage had been imprudent, that seven years abroad had eroded all that was fine and sensitive in her Bengali nature† (The Tiger’s Daughter 55) The attitude of er friends that they approve foreign manner, foreign etiquette, foreign fashions but they do not approve the foreign marriage ironically makes a criticism of the conservative attitude of the Indians who feel crazy for foreign things and dresses and items but they do not approve marriage with foreign people. The novelist , through Tara, calls them â€Å"racial purists† (The Tiger’s Daughter 86) When Tara writes to Da vid regularly she fails to communicate her feelings and failures in her homeland. Tara becomes confused for she cannot share her feelings with her American husband. She remains a foreigner both to her husband and to her friends. Her foreignness seems to be a ‘double-edged weapon’ M. Sivaramakrishna comments on her feelings of rootlessness and lack of identity thus: Tara in The Tiger’s Daughter fins it difficult to relate herself to her family ,city, culture in general since her marriage to an American, her western education are enough signs to brand her as an ‘alienated’ westernized woman. The implicit logic is that since she is exposed to the west and has absorbed its values she must be necessarily alienated. (74) Tara is able to understand the changes in her personality due to her total Amricanisation. Inspired by her Westernization, she cannot face the disease and despair, riot and poverty of people in Calcutta. There occurs a conflict in her mind between her old sense of perception in Calcutta and her present changed outlook. Jasbir Jain observes in this connection: Tara’s consciousness of the present is rooted in her life in the States and when she looks at India anew it is not through her childhood associations or her past memories but through the eyes of her foreign husband David. Her reactions are those of a tourist, of a foreigner (13) Tara’s stay in the States has changed her view and vision of India. It has opened her eyes to the gulf between the lives of the poor and those of the rich in her own country. Being a westernized Indian she looks at India as a land of the poor living in a poor environment and suffering from starvation and disease. The fourth part of the novel deals with Tara’s visit to Darjeeling and her coming back to Calcutta with the sense of boredom and alienation and her final victimization in a mob. Unable to reconcile with these things, Tara feels like going back to America. But to entertain her, her friends makes her a trip to Darjeeling to spend her summer. But Tara gets consolation and peace nowhere. She becomes upset when a heart specialist passes sarcastic remarks on her: â€Å"I think your years abroad have robbed you of your feminine propriety† ( The Tiger’s Daughter, 187 ). At Nayapur , when she happens to meet one Marvari named Tuntunwala , it leads to her claustrophobic rape by this wicked man. But Tara hides this incident of seduction from others for fear of disgrace. She could not share her knowledge of Tuntunwala with any of her friends. In a land where a friendly smile, an accidental brush of fingers, can ignite rumors – even lawsuits how is one to speak of Mr. Tuntunwala’s violence (199) Here, because her acculturation, Tara looks down upon Indian culture, as a typical westerner. She is unhappy about the conservative culture of India in which she was brought up as an orthodox girl in a disciplined rural environment. The ending of the novel is full of rapid and violent incidents. Calcutta is burning with the violent agitations of labourers against their masters. The discovery that Tara makes at the end of the novel is that the greenery and the forests that she had associated with the India of her childhood, her version of pastoral – were no longer there, something or the other had â€Å" killed â€Å" them (The Tiger’s Daughter 207 ) â€Å"In New York she had dreamt of coming back to Calcutta, but â€Å"the return had brought only the wounds† (The Tiger’s Daughter 25 ) When everything becomes frustrating and horrible to Tara, she finally decides to go back to America. While returning home, after booking a flight ticket to New York, Tara becomes a victim of violence, caused by the violent agitators. The irony of the novel is that Tara who survived racial hardships in a foreign country comes to her native soil seeking peace is at last killed in her native land. Her desire to find a peace of love and security ends in frustration of death. Bharati Mukherjee’s life is a story of exile, expatriation and dispossession that constitute her unique diasporic consciousness which is responsible for her creative expression. Therefore, her writings largely reflect her personal experience in cross cultural boundaries. Bharati Mukherjee’s protagonist Tara suffers from the cultural turmoil as the novelist herself suffered in her real life. It seems that the novelist, in fact, projects herself through the character of Tara, a victim of split personality and identity crisis. One can find Mukherjee’s shadow behind her characters. This novel is autobiographical for it reflects the cross cultural experience of Mukherjee and her feeling of disinheritance Thus, the novel is designed to capture the predicament – the cultural conflict of someone returning to one’s homeland after a period of self-imposed exile: to such a person, home will never be home again, and a life in exile in an alien country or the expatriation is more desirable than what â€Å"home† has become. References Mukherjee, Bharati. The Tiger’s Daughter. Houghton Miffin, 1972 Chowdhury Enakshi. â€Å"Images of Women in Bharati Mukherjee’s Novels† Literary Voice. No. 2. Oct. 1995 Dawan, R. K. The Fiction of Bharati Mukherjee: A Critical Symposium. New York: Prestige Books, 1996. Iain, Jasbir. Foreignness of Spirit : the world of Bharati Mukherjee’s Novels. Journal of Indian Writing in English,13, 2 ( 1985) Shinde, Shoba. Cross Cultural Crisis in Bharati Mukherjee’s Jasmine and The Tiger’s Daughter,† R. K. Dhawan and L. S. R. Krishnasastri (Eds). Commonwealth Writing: A Study in Expatriate Experience. New Delhi , Prestige Books, 1994 Sivaramakrishna, M. â€Å"Bharati Mukherjee† M. S. Prasad (Ed). Indian English Novelists. New Delhi: Sterling,1982 www. wikipedia. com

Monday, November 25, 2019

Impact of the Civil War essays

Impact of the Civil War essays War, for the most part, has been glorified. The stories have been packed full of honor and bravery in the face of danger. Join the Army, its an adventure, the government tells me and my peers. Though if you sat down with someone whos seen war, the blood soaked battle fields, their dead friend with a bayonet sticking out of his chest, theyll tell you a different story about war. Stripped of its honor and bravery its nothing more butchery. As horrible as it may seem I regretfully think that its here to stay. Well just keep making bigger and better weapons until we blow each other to hell and wipe the Earth clean of all human life. Allan Nevins feels that war is atrocious and overly glorified. He spoke of the Civil War in particular. Possibly one of the bloodiest in our history and the sod thing is that we were killing our own people. Nevins believes that war had two sides the glorious and the terrible. The glorious is represented in things such as statues, poems, and novels (Nevins pg 212). The terrible is represented in pictures of the battlefields and the stories told by those that were there. The battlefield surgical facilities during the Civil War were of the same caliber of those in Napoleons time(Nevins pg 215). Many of the wounded soldiers received no attention for at least a couple days. By that time many had died of shock(Nevins pg 215). From a passage out of Battles and Leaders , General John D. Imboden speaks of soldiers in his forces saying things like,My God! Why cant I die?,My God! Will no one have mercy and kill me?, and Stop! Oh, for Gods sake stop just for one minute; take me out and leave me to die on the roadside.(Nevins pg 216) The war brought with it immorality and neglect. Many large cities were equipped with saloons, brothels, and casinos (Nevins pg 220). Perhaps the largest impact of the war w ...

Thursday, November 21, 2019

Affect of team sport on children Essay Example | Topics and Well Written Essays - 500 words

Affect of team sport on children - Essay Example Children who get involve in team sports from a very early age tend to learn more than those who lag behind in physical activities (Taylor, Blair and Cummings). Sports deal with three basic spheres of personality development; physiological, psycho-social, and cognition. The biological growth of a child is optimized through physical activity. It offers development of muscles, increases in height, prevents obesity, and induces the habit of regular exercise. Social facilitation is the phenomenon that explains why people tend to perform well in an activity while doing it with others. The idea of promoting children to play team sports is to use the principle of social facilitation, in order to motivate them to strive hard towards achieving their goals. Another important role of sports in early years of life is related to cognitive development. Sportsmen spirit and fair play are the two qualities that are best learnt by getting involved in sports. Coordination and cooperation are the two main elements of a team sport. One of the purposes of encouraging children to involve in team based sports is to sharpen their social skills. A team is no less than an organization that offers interdependence between team members. A child can learn a lot of things by playing team sports. These games offer children an opportunity to learn how to behave in an organization. Further, a child, who is regularly involved in playing team sports, learns how to deal with competitive environment. Team sports, enhance interpersonal communication skills, moreover, they teach tolerance and acceptance within an individual. The quality of teamwork determines the success of an organization; a successful organization is one in which all the team members work in collaboration to each other (Cabane and Clark). Collaboration refers to the synchronization of individual activities in pursuing a single goal. For instance, in soccer the main aim of a team is to score maximum goals, however, there are only two

Wednesday, November 20, 2019

Dissertation- The Importance of human resources development for Dissertation

- The Importance of human resources development for competitiveness in organization - Dissertation Example Date: †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Statement 2 This dissertation is the result of my own independent work/investigation, except where otherwise stated. Other sources are acknowledged by citations giving explicit references. A bibliography is appended. Signed: †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Date: †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Statement 3 I hereby give consent for my dissertation, if accepted, to be available for photocopying and for interlibrary loan, and for the title and summary to be made available to outside organizations. Signed: †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Date: †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ [Please check with university requirements for this section] D e d i c a t i o n [Please fill as required] A c k n o w l e d g m e n t s [Please fill as required] Thank you!!! Contents D e d i c a t i o n 2 A c k n o w l e d g m e n t s 3 Contents 4 List of Figures 7 List of Tables 8 A b s t r a c t 9 Chapter 1 10 Introduction 10 1.1 Overview 10 1.2 Aim of the Study 11 1.3 Objectives of the Study 11 1.3 Methodology Overview 12 1.4 Overview of Chapters 12 1.5 Summary 13 Chapter 2 14 Literature Review 14 2.1 Introduction 14 2.2 Chosen Company 14 2.3 Learning Organisation 15 2.4 Training vs. Development 17 2.5 Position of Training and Development in HR 18 2.5.1 Importance and Benefits: 21 2.5.2 Impact on Employee Performance 25 2.5.3 Impact on Intellectual Capital 28 2.6 Training and Development and Competitiveness 29 2.7 Summary 32 Chapter 3 33 Research Methodology 33 3.1 Introduction 33 3.2 Achievability of Objectives 33 3.2.1 Objectives Description 34 3.3 Research Design 34 3.4 Theoretical Framework 37 3.4.1 Research Methods: 38 3.4.2 Chosen Method: 39 3.4.3 Research Validity and Reliability: 40 3.5 Limitations of the Research: 40 3.6 Summary 41 Chapter 4 42 Resea rch Findings and Analysis 42 4.1 Introduction 42 4.2 Response Rate 42 4.3 Demographic Information 43 4.3.1 Gender Distribution 43 4.3.2 Age Distribution 44 4.3.3 Level of Education 44 4.3.4 Work Experience 45 4.4 Useful Information 46 4.4.1 Working for Team 46 4.4.2 Number of Trainings 48 4.4.3 Official Trainings 48 4.4.4 Compulsion on Training 49 4.4.5 Certificate Courses 50 4.5Training and Development 51 4.6 Training and Competitiveness 59 4.7 Analysis of Findings 64 4.8 Summary 66 C h a p t e r 5 67 Conclusions 67 5.1 Introduction 67 5.2 Research Conclusions and Recommendations 67 5.3 Further Research Recommendations 71 Bibliography 72 List of Figures Figure 1 Five Disciplines of Learning Organisations 16 Figure 2: Research Design 36 Figure 3: Gender Distribution 43 Figure 4: Age Distribution 44 Figure 5Level of Education 45 Figure 6 Work Experience 46 Figure 7 Current Team 47 Figure 8 Number of Trainings 48 Figure 9 Office Trainings 49 Figure 10 Training Compulsory 50 Figure 11N umber of Certificate Courses 50 Figure 12 Trainings and Jobs 52 Figure 13 Training and Practical Work 53 Figure 14 Training Programs and Companies 54 Figure 15 Training and Development Programs and Performance 55 Figure 16 Work Speed and T&D Programs 56 Figure 17 T&D and Satisfaction 57 Figure 18 T&D and Performance 58 Figure 19 T&D and Specialists 60 Figure 20 T&D and Employee Needs 60 Figure 21 T&D and Company Competitiveness 62 Figure 22 T&D and Motivation 63 Figure 23 T&D and My Performance 64 List of

Monday, November 18, 2019

Code of Professional Ethics & Conduct (4) Essay

Code of Professional Ethics & Conduct (4) - Essay Example Therefore, it institutes ethical requirements for the CPAs who are expected to comply with all parts of the code. However, a breach in one or several of the code requirements leads to disciplinary action administered by the relevant bodies (Crawford & Loyd, 2008). Rule 102: Integrity and Objectivity Paul T. Fink of the Eagan, Minnesota was suspected of a breach in Rule 102, the integrity, and objectivity code. The case entailed the suspicion of a breach in conduct with respect to performance of professional services as controller and chief financial officer of a publicly held entity. According to the code, a CPA â€Å"knowing misrepresentations in the preparations of financial statements or records, or permits or directs another to sign, a document holding significantly false and deceptive information† (AICPA, 2012). Mr. Fink was guilty of participating in backdating several shipping documents meant to correct on expiring letters of credit whose terms had been defaulted. There were other discrepancies detected in the bill of lading in the year 1996 that did not tally with the inland bill of lading signed the same year. He also signed forms 10-QSB in the second and third quarter of 1996 in full knowledge of the inability of the firm regarding the fulfillment of the contract terms of sale. After the completion of the investigations, Mr. Paul Fink was also guilty of violating Rule 102 on integrity and objectivity. Following the scrutiny of the evidence by the Joint Trial Board, Mr. Paul membership with AICPA was terminated and his practice certificates revoked. The disciplinary action taken on Mr. Paul was justified. This is because the CPAs perform a fundamental role in society. All the members of AICPA should be consistent with the requirements of the body (AICPA, 2012). Failure to do so, Mr. Paul failed to take the responsibility of representing his professional ethics as required thus breaching the stakeholders trust towards the body and the business. T he AICPA can prevent this type of breach in the code of conduct by ensuring that the CPAs frequently observe their needed commitment to the code. The penalties administered should also be strict in order to curb further breach in the code. Rule 201: Professional Competence The code of professional competence requires a CPA to safeguard a clients’ data. Rule 201 states that â€Å"a member remains responsible for ensuring the accuracy and completeness of the services provided by third-party provider† (AICPA, 2012). Therefore, a CPA should provide professional services performed with professional competence and care. David Beck of Lexington allegedly violated the code in the year 2010 where he was accused of lack of professional services in relation with the audit of a business entity. In his practice, he failed to comply with the standards by failing to plan and conduct the engagement, failing to participate in the planning meetings and organizing the audit staffing (Rit tenberg, Johnstone & Gramling, 2010). In addition, he failed to record the necessary documents and details of his audit procedures. After consideration of all the presented evidence, the Joint Trial Board found Mr. David Beck guilty of a breach in rule 201, Professional Competence. Moreover, he violated an AICPA Bylaw for failing to cooperate with Ethics Charging Authority by providing a substantive response to the investigation. As

Saturday, November 16, 2019

Steganography Using Lsb Insertion Technique Computer Science Essay

Steganography Using Lsb Insertion Technique Computer Science Essay Steganography is a method used for hiding a message by fixing in a carrier data. There are two types of data. They are internal data and external data .The external information contains visible part or audible part of data which is not useful for data owner and the internal information contains embedded data. The techniques used in Steganography makes hard to detect hidden message within an image file. By this technique we are not only sending a message but also we are hiding the message. Steganography system is designed to encode and decode a secret file embedded in image file with a random Least Significant Bit (LSB) insertion technique. By using this technique the secret data are spread out among the image data in a random manner with the help of a secret key. The key generates pseudorandom numbers and identifies where and in which order hidden message is laid out. Steganography includes cryptography which is an advantage for Steganography .In cryptography, diffusion is applied to secret message.   INTRODUCTION: The Data transmitted comes in many forms and it is used for more than one application. Communications should be done secretly. Secret communication varies from bank transfers, corporate communications and credit card purchase. Steganography is an art of embedding a secret message into a normal message. Steganography is used in watermarking for protecting data copyrights .Unsurprisingly, methods of Steganography change because innocuous spam contents are growing frequently by embedded texts Cryptography is technique used to make secret message scribbled for third party and are normally used in internet. The encrypted message is targeted by attackers in cryptography because it hides the message content. An another data hiding technique known as watermarking used for embedding and hiding, some symbol data or digital manifest in the digital valuable data like photo picture, digital movie, musical sound etc. Watermarking purpose is mainly used to protect ownership or copyrights of the data. In this technique, hardness of embedded evidence and hidden evidence are very small and is important. In this technique the important information is present in external information which is visible or audible. In the Steganography technique, confidential information is made invisible to a human eye by embedding it as a dummy data such as a speech sound and a digital image. Steganography contains another research topic called as steganalysis which is used to find a stego file from the available files. Steganalysis is used in detecting suspicious image file. The suspicious image files are embedded with the crime associated information All traditional Steganography techniques have limited information-hiding capacity. These techniques can hide 10% or less than 10% data of a carrier data. The principle of these techniques is to replace frequency components of carrier or to replace LSB bits of multivalued image with secret information. Steganography uses image as a carrier data and it embeds secret information in bit planes .We can replace all noise like regions in the bit planes without disturbing the quality of image and is termed as B.P.C.S Steganography .BPCS Steganography is known as Bit plane complexity segmentation Steganography. BACKGROUND HISTORY: Steganography is derived from a Greek word which means as a covered writing or hidden writing. In Steganography stegos means cover and grafia means writing. THEORY: Steganography is used to hide confidential information from human eyes by embedding it in a carrier data such as digital image or speech sound. A carrier data is a color image having RGB color components in a multi-bit data structure. The embedded information is extracted using special extracting program and key .The techniques of Steganography are different from file camouflage or file deception technique. File deception is a technique used for hiding secret data in computer file and it almost looks like a Steganography. But, it is an trick to disguise a secret-data file as a normal file and is possible in files which have dont care option. For example, Word file or JPEG image OR MPEG will allow for adding an extra data (extension) at the end of a regular file. Even an extra data (which can be encrypted) are added, the JPEG image, word file or MPEG looks like the original image and original sound, or document on the computer. People may think this is due to Steganography. The lengthy files are easily detected by engineers. So, file deception and Steganography are different. The Steganography softwares that are available in the market are based on file deception. In Steganography, if output file size is increased by embedding the information then the program is called as File deception. A secret data can be made unreadable by encrypting the data. The secret data should be encrypted to make it unreadable for third party. With the help of data encryption, secret data can be safe. Data encryption is based on data scrambling and it uses a secret key. Data encryption can create a doubt to the people that owner of the data is hiding something in an image. In data encryption we can find easily that he is hiding something in a image. Therefore encryption of data is not enough. Steganography is the solution for data encryption. There are two types of data in Steganography .they are secret data and carrier data. Secret data is very valuable when compared to the carrier data. Carrier data is a type of dummy data which is not so important but it is needed. The data which is embedded is called as stego data.If we want to recover the secret data , we can extract that data from stego data.We need a special program or a key for data extraction.. The carrier is image data which has color components of red green and blue colors in 24 bit pixel structure. The figure below shows an example of carrier image and stego image. The secret data is embedded in stego image. Steganography is a method of hiding the secret data by fixing it in media data .For example in the figure a secret data is embedded but we cant find in which place the secret data is embedded. The Embedded data will be very safe in the Steganography because it will hide content of the message and location of hidden image. There are many methods to embed the data .but; it is very hard to find about the method used in embedding the message.. Steganography can co-operate with cryptography to embed the encrypted data safely. In Steganography , Stego data will not have any evidence about the embedded data. The Steganography user should discard the original carrier data after embedding such that it will not allow comparison of stego and original data. Embedded capacity should be larger. BPCS method is the method available method for image Steganography. If anyone detect the Steganography image, it is very difficult for him to retrieve the hidden image. There are three basic ways to hide a message in image. They are Injection, substitution and generation. Using Injection method we can find in which place data to be inserted and using substitution we can find least significant bits for hiding the message. Using generation method we can create a new file based on the hidden information. Method of implementation: Least significant bit insertion is one of the important methods of implementation. In this method, the LSB bits of byte are altered so that it form bit string and represents an embedded file. By changing the LSB bits, it will cause some small differences in color which are not noticeable to human eye. After that an image is compressed and a text message is hidden in image .In LSB method, LSB bits of the covered image is altered such that they form embedded information. Embedding a message into cover image will result a stego image. For normal vision, stego image looks identical as cover image; this is because of only small changes of pixel values. Therefore there is no significant difference. The embedded message is sequentially embedded in covered image so that it is easy for a third party to recover the message by retrieving the pixels sequentially starting from the first pixel of the image. Steganography uses a key which as a better security. It is difficult to recover the embedde d image without valid key. LEAST SIGNIFICANT BIT INSERTION Least significant bit insertion is the common technique used in Steganography. In LSB method, an image is used. An image is more than strings and string of bytes. Each byte in an image represents different colors. The last few bits in a color byte do not hold much significance as the first few bits. Therefore only two bits differ in last few bits that represent a color which is undistinguishable to human eyes. In LSB method, least significant bits of a cover image are altered such that we can embed information. The example shows how letter A is hidden in first 8 bytes of 3 pixels in a 24 bit image. Since the 8 bit letter A requires only 8 bytes to hide it, ninth byte of the 3 pixels used to hide the next character of the hidden message. Example shows that in a 24 bit image, letter A can be hidden in first 8 bytes of 3 pixels Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) A: 01000010 Result: (00100110  11101001 11001000) (00100110  11001000 11101000) (11001001  00100110  11101001) The five underlined bits are the 5 bits which were altered. With LSB insertion technique, on an average half of the bits of an image are changed. A is a 8 bit letter and requires 8 bytes for hiding. The ninth byte of 3 pixels is used for hiding next character of secret message. The slight variations of this technique allows a message to embed into two or more least significant bits per bytes, and increases the information hidden capacity of the cover object .but cover object is degraded and easily detectable.LSB insertion is easy to implement and is also easily attacked if the modifications are done wrongly. Improper modifications in color palette and simple image calculations will destroy hidden message. Image resizing and image cropping are some examples of image manipulations. Applications of Steganography: Steganography is applicable the following areas. 1).Private communication and secret data storing. 2).Security of data. 3).Accessing the control system for distributing the digital content 4).Media data base systems. The application area of Steganography differs based on the features utilized in a system. 1).Private communication and secret data storing: The secrecy of embedded data is important in this area. Steganography provides capacity for hiding the existence of secret data and Steganography makes very hard to detect the embedded data in a image and Steganography strengthens the encrypted data. In Steganography, select a carrier data according to the size of embedded data. Carrier data should not be effective. Now embed the secret data using an embedding program with the help of a key. To recover the embedded data, an extracting program is used with a key. Before starting the communication in this case, Key negotiation is used 2).Security for a data: Steganography is used in military applications for maintaining the secret data .In military secret information should be very secure to avoid sudden attacks on them from enemies. Steganography can hide the existence of contents of data but it cannot hide the presence of data. Data should not be larger than carrier image .Steganography strengthens the secrecy of the data. Fragility of the embedded data is advantage for this application area. Embedded data can be rather fragile than robust. But embedded data is fragile in most of the Steganography programs. No one can change or tampered the data .If anyone changes or tampers the data, and then it can be easily detected by the extraction program. 3). Accessing the control system for distributing the digital content : In this application, embedded data is explained to publicize the content. Here embedded data is hidden data. Digital contents are being commonly distributed by internet. Some music companies release the music for free in some web sites and in some sites it charges for the music downloads. Digital contents are equally distributed to user who accesses the web pages. Even it is possible to send digital content to e-mail messages it takes more time. We can to upload any content on the web page; we can issue a special access key to extract the content. In Steganography a prototype of an access control system is developed for distributing the digital content through internet. This can be explained by following steps. 1).The content owner will classify his digital content in a folder and embeds the folder according to Steganography method by accessing the folder access key and uploads embedded content on web page. 2).On the web page, owner will explains the contents clearly and publicises it worldwide and gives his contact information on web page. 3).The owner will receive access request from the customer who visited that web page. Then owner creates an access key and provides it to the customer for free or charge. 4).Media database systems: In this type of application secrecy of data is not important, converting two types of data into one data is important. Photos, Pictures, movies and music will come under media data. For example the media data for a photograph will contain about the title of the photo and date and time of a photo and it also contain about the camera used to take that photograph. à £Ã¢â€š ¬Ã¢â€š ¬ Data hiding in .bmp images: There are several formats exists for an digital image. .BMP, JPG, GIF are some formats .Each format is associated with advantage and disadvantages. Because of its simplicity, windows BMP file offers more advantages. It has an advantage of widely spreader and the information contained is minimum .Bmp file is a binary file.bmp file is divided into four sections such as file header, image header, color table and pixel data. The file header is used to know about size of the image and to learn where actual image data is located within the file. The Image header gives information about the image and its data format such as width and height of the image. Image header also gives information such as how many bits are used per pixel and checks whether the image data is compressed data or uncompressed data. Depending on the image data, color table will be present. When color table is not present, a set of bit masks are used to extract the color information from the image data. When dealing with 24-bit image, color table is not present. When dealing with 8-bit image, color table consists of 256 entries. Each entry consists of four bytes of data. In these four bytes of data, first three bytes are blue, green and red colors values .The fourth byte must be equal to zero because it is not used. In 8-bit format, each pixel is represented by single byte of the data which is index in to color table. In 24-bit format, each pixel I represented by RGB component values .The pixel data holds entire hidden data and there are changes by one pixel value either positive or negative. MATLAB: The MATLAB is a language for technical computing. MATLAB integrates computation, visualization and programming in a easy way in which problems and solutions are expresses in mathematical notation. Typical uses include Math and computation Data acquisition Algorithm development Modelling, simulation and protyping Data analysis, exploration and visualization Application development MATLAB is a system whose data element is an array without dimensions. It allows in solving computing programs such as Matrix and vectors formulations. It writes program in a scalar language such as FORTRAN within a fraction of seconds. MATLAB can be abbreviated as a matrix laboratory. MATLAB was developed to access matrix software. The matrix software was developed by linpack and eispack projectsdeveloped .MATLAB engine incorporates LAPACK and BLAS libraries by embedding the state of art in software for matrix computation. Matlab has evolved over a period of years with input from many users. MATLAB has become a standard tool for advanced courses such as engineering, maths, and sciences .MATLAB is like a tool for high research productivity, analysis and development. MATLAB SYSTEM: MATLAB system consists of five main parts: 1).desktop tools and development environment 2).MATLAB Mathematical functions library 3).MATLAB language 4).graphics 5).MATLAB application program interface 1).Desktop tools and development environment: MATLAB is a set of tools and facilities that helps to use and to become more productive with MATLAB function and files. In MATLAB most of the tools are graphical user interfaces and includes MATLAB desktop, command window, editor and debugger, code analyzer and browser for viewing help, workspace and folders. 2). MATLAB Mathematical functions library MATLAB is a huge collection of computational algorithms ranging from elementary functions such as sum, sine, cosine and complex arithmetic to more sophisticated functions like matrix inverse, matrix Eigen values, Bessel functions and fast Fourier transforms 3). MATLAB language MATLAB language is an high level matrix language with control flow statements, functions, data structures, and object-oriented programming features. It allows small and large programming .In programming in large is to create complete large and complex application programs and programming in small is to create quick and dirty throw away programs. 4). GRAPHICS:- MATLAB is having extensive facilities to display vectors and matrices as graphs. It includes high level functions for two dimensional and three dimensional data visualization, image processing, and presentation graphics .MATLAB also includes low-level functions and allows in customizing appearance of graphics to build complete graphical user interfaces on MATLAB application. 5).MATLAB Application program interface (API):- It is a library which allows us to write C and FORTRAN programs to interact with MATLAB .It also includes facilities such as calling routines from MATLAB, calling MATLAB as a computational engine and for reading and writing MATA FILES. MATLAB working environment: MATLAB DESKTOP:- It is the main application window in MATLAB. This window consists of five sub windows such as current directory, command history, workspace browser, command window, and a figure which is shown while displaying a graphic. The User types commands in command window and expressions at the prompt. The output of these commands is displayed. In MATLAB, workspace is defined as a set of variables created by user in work session. These variables are shown in workspace browser. The workspace browser launches array editor by clicking on a variable. In array editor, we can edit properties of a variable and we can also get information about the variables. In MATLAB, the current directory tab is above the workspace tab. The Current directory tab shows contents of current directory and its path is shown in current directory window. In windows operating system, the path c:MATLABwork indicates work as a subdirectory and MATLAB as a main directory and is installed in c drive. In current directory window, click on an arrow button to see recently used paths. To change a current directory, click on a button on right side of a window. To find M-files and other MATLAB files, MATLAB uses a search path that is organized in system files. The files that are to be runned in MATLAB should locate in the current directory or in directories available on search path .Math work related tools and files that are supplied by MATLAB are already exist in search path. On desktop from file menu select set path to modify or to add search path or to see which directories are existing on search path. To avoid repeated changing, the current directory adds a commonly used search paths to directory. In MATLAB, the commands used by the user in current and earlier sessions are recorded in command history window. Using right click on command history window, we can select and re-execute previously entered MATLAB then it launches a menu. For execution of the commands select the options from menu. We can select various options from menu for execution of the commands which are useful in implementation of various commands. MATLAB EDITOR TO CREATE M-FILES: The MATLAB editor is used for creating M-files. The graphical window will appear in a separate window or a sub window. The M-files are represented as extension .m on desktop. MATLAB editor is having some options to debug a file and saving a file and to view the file. In differentiating various codes MATLAB editor will perform some simple checkings. In MATLAB, text editor is used to write and to edit M-functions. To edit a text in MATLAB, type as EDIT at prompt then it an M-file is opened with a filename. Therefore it is ready for editing. The files should be in a search path or in a current directory. How to get help in MATLAB: Use the MATLAB help browser for any help in the MATLAB. The help browser will be opened in a separate window when we click on symbol (?) on desktop toolbar or in command window type as help. The Browser Help is displayed separately as a HTML document .HELP browser is incorporated into MATLAB desktop .HELP pane and DISPLAY pane are the two panes that are available in HELP browser. HELP pane is used in finding the information and display pane is used for viewing the information. To perform a search, Navigator pane is used. CONCLUSIONS: This project explains techniques for embedding a data in an color image and also some features are added which include file types excluding bitmap images and Steganography methods. Data extracted from cover image depends on pixel values of an image CODING : %I=imread(sravs.bmp); %%read an image I=uigetfile(.bmp,select the iamge); I=imread(I); b=1; disp(orginal text to be embedded); %txt= textread(message.txt, %c, whitespace , ); fid = fopen(message.txt); A=fread(fid,schar); fclose(fid); A1=char(A); disp(embedding text); txt=A1; txt N = 8*numel(txt); %%%%%%% to find out the total no of elements for the text S = numel(I); %%%% total no of elements for the image if N > S warning( Text truncated to be within size of image );%%%%%%if text size is more than the image size %%%%%% process block segmentation txt = txt(1:floor(S/8));%%%%%% dividing into 8*8 blocks for the text N = 8*numel(txt); end %%%%% initializing the total no of bits for the text and the image p = 2^b; h = 2^(b-1); I1 = reshape(I,1,S);%%%%% resize the elemnts for the new image size %figure ,imshow(I1,truesize); addl = S-N;%%%%%%%take the difference of the elments for the imagfe and the text dim = size(I); I2 = round(abs(I1(1:N)));%%%%%%take the complexity of each block si = sign(I1(1:N)); for k = 1:N if si(k) == 0%%%%%%%replace ment of the bits for the complexity blocks si(k) = 1; end I2(k) = round(I2(k)); if mod((I2(k)),p) >= h I2(k) = I2(k) h; end end bt = dec2bin(txt,8);%%%%%% bint = reshape(bt,1,N); d = h*48; bi = (h*bint) d; %%%%%%remove the complexity blocks of the image and replace with the non complexity blocksof image I3 = double(I2) + bi; binadd = [bi zeros(1,addl)]; I4 = double(si).*double(I3); I5 = [I4 I1(N+1:S)]; intl = reshape(I5,dim);%%%%%%resize the image and display the stego cotents figure,imshow(intl);title(stegnograph image); %return figure,imshow(I);title(original image); I=im2bw(I); %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%decoding%%%%%%%%%%%%%%%%%%%% siz=length(txt); bsiz = 8*siz; n = numel(intl); if bsiz > n error(Size of text given exceeds the maximum that can be embedded in the image) return end dim = size(intl); addl = n-bsiz; I1 = reshape(intl,1,n); I2 = round(abs(I1(1:bsiz))); p = 2^b; h = 2^(b-1); rb = zeros(1,bsiz); for k = 1:bsiz I2(k) = round(I2(k)); r = rem(I2(k),p); if r >= h rb(k) = 1; end end rbi = (dec2bin(rb,1)); rbin = reshape(rbi,siz,8); rectxt = (bin2dec(rbin)); disp(retrived text from the steg image); rextxt=char(rectxt) return

Wednesday, November 13, 2019

The Egyptian Pyramids Essay example -- Ancient History Egypt

The Egyptian Pyramids When most people think of Ancient Egypt they think of Pyramids. To construct such great monuments required a mastery of architecture, social organization, and art that few cultures of that period could achieve. The oldest pyramid, the Step-Pyramids, grow out of the abilities of two men, King Djoser and Imhotep. Djoser, the second king of 3rd dynasty, was the first king to have hired an architect, Imhotep, to design a tomb (Time-Life Books, 74). Imhotep was known as the father of mathematics, medicine, architecture, and as the inventor of the calendar (White, 40). He had a great idea of stacking mastabas until they reached six tiers, a total of 60 meters high and its base 180 meters by 108 meters (Casson, 118). A glistening costing of limestone was added to the mastabas that made them shimmer in the sun. The main feature of the pyramid was its 92-foot underground shafts and burial room lined with pink granite. It was the first time that this feature appeared (White, 41). Imhotep surrounded Djoser’s pyramid with a number of funerary courtyards and temples. He then, surrounded these complexes with a mile long protective wall (Time-Life Books, 74). Another pyramid was Khufu’s Great Pyramid. It is the largest tomb every built. It was the height of a forty-story building, and its base was the average size of eight football fields. The pyramid contains about 2,300,000 stone blocks. The limestone was covered with a layer of polished stone to add a shine. Deep inside the pyramid are the tomb chambers, one for the king and another for the queen. Narrow shafts lined with granite lead the way to the tomb chambers (Time-Life Books, 75). Social organization was another key factor in creating... ...0). The Ancient Egyptians were one of the first people to develop such well-proportioned figure. The Egyptian painter painted murals inside of the pyramids depicting the things that the pharaoh accomplished in his life (Cannon, 50). In conclusion, to create such a great monument, like the Step-Pyramid, took the mastery of architecture, social organization, and art that was amazing for that period. Today, we still do not know how the Ancient Egyptians created such grand monuments. Also, we are still fascinated about all the artifacts inside the tomb, and the possible uses for them. It will forever be a mystery. Bibliography Casson, Lionel. Ancient Egypt. 1965. Time Inc. NY, NY. Editors of Time-Life Books. Egypt: Land of the Lost Pharaohs. 1992. Time-Life Books, VA. White, Jon Manchip. Everyday Life in Ancient Egypt. 1963. G.P. Putnam’s Sons, NY.

Monday, November 11, 2019

How to Build a Backyard Kennel

? How to Build a Backyard Kennel? By Kimberly Mathis The most important thing, about building a backyard kennel, is what size, what strength and what features are needed for your dog. What is a backyard dog kennel? A backyard dog kennel is a small, fenced – in area used to contain your dog. It is an area used to keep your dog safe and contained while outdoors. It is not recommended that your dog stay in the kennel permanently. In fact, dog psychologists recommend that you allow your dog time inside as well. What size do you need? Well, what size is your dog? If you have a small dog, you won't have to build a big yard. The larger the dog, the bigger the yard. A yard has to be big enough for your dog to eat, sleep, and use the bathroom. A dog will not soil the area where he eats. This is very important because if you have a large dog and you put him in a small kennel, he has nowhere to eat and do his business. The size of your dog, also, depends on how strong you need to make it. You also need to ask yourself â€Å"How long is my dog going to stay in this kennel? † As I mentioned before, it is not a good idea to make the kennel your dog's permanent home. It causes anxiety in your dog. It also causes behavioral differences in your dog. Okay, let's get started. First, you will need to get supplies. Now most of the supplies can be bought at a local feed store or a local hardware store. You will need the following: Wooden Support Poles. You want these poles to be 6 ft high and at least 4 inches at the base. Unless you have a big dog, then you want to go taller with the posts. We don't want the dog to jump out of his cage and cause a unpleasant mess. U-nails is also required. These will help hold your fence in place. You will also need fencing. The experts prefer you to use portable metal fencing. You will need a gate for your kennel. This gate needs to be heavy and with a latch. That way your pooch can't push it open and escape. Finally, you will need a hammer and a screwdriver. Next, you will need to measure out where you are going to put this kennel. You need to make sure that it is big enough so your dog can run around yet not so big it inhibits your whole yard. Then you go and buy your materials. Remember that your yard is outside and should be able to withstand the forces of nature. Pick your spot. Make sure that there is shade and sunlight. A grassy yard is a good thing. It helps recycle the dog's urine and feces well. You also want to make sure that when it rains, it isn't going to fill up with mud and puddles. These can cause serious problems for your pet. Make your fence. Put your posts in the ground approximately 2 feet down and 4 foot apart. After you put in your posts, you want to put the dirt in around them and pack them down well. It will help your fence stay sturdy and strong. Now you are ready to attach the fence. You will attach your fence by using the U-nails. The experts say to use 3 per post. You are almost finished now. The last thing you want to do is attach your gate. Now to attach the gate, you have to make sure that it will close†¦. that was a little humor†¦. I would be the type to put a gate on and it not close properly. The gate should have a latch on it. You want to screw the hinge onto a post. Check that the gate swings easily. I cannot express how important it is that the latch work. I actually have a backyard dog kennel that was built almost exactly like the one I am describing. There is no latch on the gate. This creates a problem. My dog manages to push the concrete bricks, that are holding the gate shut, out of the way. With a latch, I wouldn't be having this problem. I have stated previously that I have a backyard kennel made almost exactly like the one I described. I found that it doesn't work very well. I have a wolf breed type of dog and she digs out from under the fence. My suggestion would be to lay concrete down and make sure the fence is in the concrete. Also, with a large breed dog, you will want to make sure that it is high enough so your dog will not crawl out of it. We have had that problem as well. I searched for different sites to help me write the best description of a backyard kennel and found only one. It is apparent that most sites do not recommend putting your pet outside in an enclosure. I, personally, am one that doesn't find anything wrong with it. I tried to let my dog inside and she ate my house. She likes being outside. Unfortunately, she likes to be UNDER our house and that is not acceptable. So we built her a dog yard with house and a porch and a canteen area. She is living the life of dogs out there and doesn't seem to like it. She is constantly figuring ways to escape and go under our home and into our duct system. I refuse to put air conditioning in her house. We have a state-of-the-art dog house that is under a perfect shade tree. The only solution, that I could come up with is that I am going to have to install concrete around the fence line. I am hoping that it works and keeps our dog in her yard. I did my essay on this subject in hopes of finding out what we did wrong. Unfortunately the only thing I see that we did wrong was making it her permanent home. I really didn't learn a lot about this but it was a fun and informative subject. This is how to make a backyard dog kennel. http://www. ehow. com/about_4568749_backyard-dog-kennels. html

Saturday, November 9, 2019

Share Holder Wealth Maximization Vis a Vis Social Responsibility

Share Holder Wealth Maximization Vis a Vis Social Responsibility Introduction Limited information is found on how economic enterprises can incorporate business ethics and social responsibility as a means through which their primary objective of shareholder wealth maximization is achieved (Hawley 1991, p. 714).Advertising We will write a custom essay sample on Share Holder Wealth Maximization Vis a Vis Social Responsibility specifically for you for only $16.05 $11/page Learn More This lack of ethical considerations seems to be not only confined within the academic sphere but there is evidence of it taking a toll in the realm of corporate practice in the economy. Enterprises have ignored the ethical concerns in strategizing on how they will achieve their goal of wealth maximization. Through their total disregard of ethical issues, corporates are assuming that the mere pursuit of the wealth maximization goal meets the social responsibilities that could possibly be expected from any entity. However, there has been limited res earch and analysis of the ethical foundations and the perceived implications of the goal of shareholder wealth maximization. This paper seeks to analyze to what extent the corporate world incorporates business ethics and social responsibility in pursuing their primary objective of maximizing the shareholders’ wealth and how this pays back in terms of increased returns to the shareholders. It highlights the main differences between the goal of profit maximization and that of wealth maximization and the role played by market forces in the pricing of stocks within the shareholder wealth maximization paradigm. It argues that empirical and theoretical evidence on this subject will most usually lead to overlapping interpretations (Smith 2003, p. 58). Share Holder Wealth Maximization Since Milton Friedman’s largely criticized position that â€Å"the social responsibility of business is to increase its profits†, the ethical aspect in the maximization of shareholder weal th has been given a wide consideration. In order to build a logical analysis of this notion, it is of paramount that we understand the crucial link between the two distinct goals of a corporation, i.e. Wealth maximization and profit maximization. While the two may share some similarities, they are also characterized by various inconsistencies as analysed by Solomon in his work, (Solomon 1963, p. 2). For instance, profit maximization as an objective best suits a traditional macroeconomic market which is characterized by minimal uncertainties; the entrepreneur is the main decision-maker, the shareholding is fixed and determines within a given period.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More This kind of business structure is especially of great utility in analyzing the variables, i.e. Prices of raw materials and end products, production level etc., which occupies a central po sition for any corporate whole. According to Winch (1971, p. 14), profit maximization goes hand in hand with the ethical goal of the utilitarian mode of resource allocation. Contrary to the microeconomic world, proper allocation of resources is very integral to a corporate entity in regard to its financial dealings (Beurden Gossling 2008, p. 412). This difference in terms of the central focus of each establishes new fundamentals which the profit maximization paradigm declines to involve itself with. For example, this whole new structure separates the entity’s decision making from its ownership and places it in the hands of a separate and distinct management body. As this happens, uncertainties on the future earning capability of the firm sets-in when capital stock features in as a variable to be determined too. The goal of wealth maximization is developed by maximally utilizing the utility maximization strategy, i.e. management, being agents of the shareholders are required to maximize the projected utility of the shareholders’ wealth. If for instance wealth is the main argument in the utility of the shareholder, maximizing the anticipated utility of the wealth of the shareholder reduces the core objective of the entity as maximization of shareholder wealth. To this end, the ethical concept of a corporate finance adopts the same approach as that of microeconomics as use of utility maximization incorporates characteristics of the utilitarian ethic (Shaw 2009, p. 569). Conversely, the introduction of an element of the future, uncertainty, separated decision making structure creates complications in utilitarian allocation of resources. When even this basic objective cannot be achieved, it only holds strong for the argument that wealth maximization is incapable of providing a feasible ethical foundation for a corporate entity.Advertising We will write a custom essay sample on Share Holder Wealth Maximization Vis a Vis Social Responsibility s pecifically for you for only $16.05 $11/page Learn More Nevertheless, some essential features of wealth maximization are not included in the utilitarian resource allocation framework. For instance, the wealth of the shareholder is directly linked to the price of capital stock and in extension, the mode through which marketing for ownership claims contains elements of ethical concerns by the entity (Wilcke 2004, p. 198). Working on the assumption that the main objective of an entity is wealth maximization, various issues can be identified. For instance, since wealth maximization is completely dependent on market forces in order to create a strong value for the ownership of the firm, a question arises whether these market forces bring about stock prices incorporating the value of the social responsibility of the firm. To answer this question, we need to determine to what extent security prices reflects information on a firm’s ethical concern. Unfortunately, if this debate continues, it will take us to the more irresolvable question of what the world perceives as constituting proper ethical behaviour. It even gets more complex when management, as the agents of shareholders, gets into the picture and we are faced with the question of whether shareholders would count management actions as constituting acceptable ethical behaviour (Cosans 2009, p. 396). Determining Share Prices Determination of security prices is a fundamental concern of corporate finance. Through efficient market hypothesis, the price of securities is a reflection of the information available to investors when making investment decisions. Through the market hypothesis, we can attempt to analyze the ethical impacts of the wealth maximization goal. For example, if wealth maximization is to meet a specified ethical standard, the price of securities should incorporate information containing ethical elements. In order to succeed in this, we need to first set an ethical standard. Then empirical tests will be carried out based on the changes in prices of securities and determine the impact of ethical issues on the market prices.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The analysis will be made based on the assumption the main goal of the management is maximization of shareholders wealth (Husted Salazar 2006, p. 83). The hypothesis could also test on separate aspects, for example when a certain firm has been known to exhibit differing degrees of adherent to ethical issues. But this latter hypothesis will present various challenges. For example, there may be a situation whereby an organization allows management to engage in both socially acceptable behaviour as well as unethical acts which are perceived to result into positive effects. This may occur where the returns of the illegal acts are significant as compared to the costs to be suffered when such acts come to light such as litigation costs, fines and other penalties, reduced goodwill, etc. there could also be other mitigating factors such as the ability to keep the illegal activities as well hidden company secrets or by putting up strategies for timely damage control when such activities com e to light. Besides, even when using efficient market hypothesis, it is hard to tell whether if an alternative course of action was taken it would have resulted in a different price change pattern. For example, it would be difficult to determine whether the unethical behaviour was a reflection of the ethical failures of the wealth maximization goal or that management diverted from practices consistent with wealth maximization objectives. This debate is premised on the idea that the efficient market hypothesis, by its very nature is characterized by joint hypothesis, i.e. price determination models are usually implied. Such an assumed model of price determination if it dictates that we assess a particular ethical issue, then a null hypothesis of the efficient market hypothesis requires that unethical act would violate the primary goal of wealth maximization. According to Treynor (1981, p. 7), management should address financial demands of the different factions within the organizatio n if it is to emerge as a successful entity. These factions include customers, employees, suppliers and other stakeholders. The wealth maximization goal requires that in pursuing its objectives, a corporation should take into consideration the interests of all the stakeholders of the organization, not just the shareholders. Thus we can use this argument to say that wealth maximization encourages the adoption of socially responsible business behaviour. The crucial connection between wealth maximization and the efficient market hypothesis can be well illustrated using the classical corporate theory. This theory proposes that a firm would most likely invest in a project projecting positive net present value. The variables used to calculate the projected cash flows is based on the performance of the firm which has been theorized by the management where it may have or may have not incorporated ethical behaviour. Here, the price of securities will be based on the management’s asses sment of the market. Including social responsibility and ethical behaviour in calculating the projected cash flows will be in line with wealth maximization where such considerations are reflected on the prices of securities. Empirical Considerations As we have noted above, empirical evidence does not help us determine whether pursuing wealth maximization will amount to a socially responsible and ethical managerial behaviour. It requires us to define what constitutes proper ethical behaviour and since ethical issues are complex in themselves, it will create conflicting opinions on the subject. Nevertheless, we can draw from the few theoretical and empirical studies relating to the impact of socially responsible behaviour on the price of stocks. In this light, it has been argued that price fixing has the potential to increase new entrants into the market industry leading to higher competition and thus diminishing returns (Waldman 1988, p. 78). Therefore, if the wealth maximization is the main objective, price-fixing is aimed at offsetting losses in profit by offering a lower discount rate facilitated by a reduced business risk leading to a higher net profit margin. Yet, if this is not the end result, then price fixing will ultimately have the effect of reducing shareholders’ wealth. Research has shown that disclosing a legal action intended to correct corporate price fixing has resulted in significant negative returns (Skantz et al. 1990, p. 159). On this basis, while the reduced returns could be the market’s punitive costs for behaving unethically, it could also have arisen from a perceived increased business risk which has nothing to do with ethical issues. This is further evidence of the difficulties encountered in attempting to use market data to determine whether pursuing wealth maximization leads to ethical outcomes. Since the reduced returns arose because the market became aware of the unethical behaviour and not because of engaging in the a ctual price fixing, a question arises as to what information was originally included in the prices. If the original share price were impacted by information on the firm’s engagement in price fixing, then the reduced returns could mean that the entity needs to adopt a risky, highly competitive, reduced profit margin business policy. Here, the anticipated litigation costs arising from court cases will be expected to have been discounted into the stock prices. However, if price fixing was done in secrecy, then news on a legal action would lead to price adjustment to reflect the resulting costs of unethical act, which would include the lost goodwill. For this, the costs that would be involved in adopting a more competitive strategy are already reflected in the price. The probability of reaching different conclusions using the same piece of evidence has been found in other areas of our present concern. There is evidence that in making investment decisions, investors do indeed rely on the information available on social responsibility (Patten 1990, p. 581). Other sources reveal superior investment performance of previously divested portfolios, though these results could have resulted from a combination of factors as opposed to mere social concerns. This may be explained in a number of ways. For example, following the net profit value method, the corporate financial theory holds that slight changes in either the projected net cash flows or the perceived discount rate impacts on the returns of capital stocks. Therefore, the grand performance of the divested funds may have resulted from a continuing increased risk or a weakening expected corporate performance as opposed to any ethical issues concerned. This argument can also be applied to the impact of ethical behaviour on investment in the nuclear industry. It has been found that markets place a lower value on nuclear firms at 20% as compared to other industries (Fuller at al. 1990, p. 124). On careful consider ation, the results reveal that perceived risk changes could have contributed to the valuations observed. Thus this leaves us with the option that social responsibility concerns could have had a positive effect on the whole affair. As witnessed above, untangling the effect of a certain activity on the prices of stock has its own complexities. Besides, we have to give room for the possible assumption that management may not be pursuing wealth maximization. There is significant evidence that often times, management has been known to unethically chase their own selfish ends especially if they are in conflict with shareholder wealth maximization (Findlay Whitmore 1974, p. 28). This will give rise to additional agency costs which the shareholders will incur to monitor management activity and in effect, will lead to reduced returns. When agency costs are involved the equation becomes even more complicated as we need to now to assess the effect of agency costs on the security prices. Evide nce of price fixing can be used to explain how agency costs bring-out a whole new interpretation of the empirical data. For example, working on the assumption that there is no diverging information, the stock market values its own stocks from the assumption that wealth maximization is the main objective of the firm. On this basis, announcement of a legal action could produce reduced returns because of the additional costs incurred in monitoring the activities of the management and not because of the unethical behaviour. Therefore, without a way of determining what kind of information was included in the original share price, major difficulties arise in trying to assess whether a certain pricing activity was impacted on by social responsibility behaviour. This raises the requirement for exercise of caution in interpreting the results of any given Empirical Study. The effect of agency costs may also help in the analysis of study results obtained for other perceived unethical activitie s, more so in the area of mergers and acquisition whereby there are insider dealings by the management. Of particular relevance is the case of hostile takeovers. Drawing from debates on what constitutes ethical behaviour (Jones Hunt 1991, 839), we can base our argument on the assumption that hostile takeovers are unethical. As such, it would appear that, ethical behaviour is being rewarded in this scenario. This is because, ordinarily, the returns of the target group increase significantly while those of the hostile bidders become negative to zero following the announcement of the intended takeover, (Franks Harris 1989, p. 238). Further, due to the existence of agency costs, the use of ‘poison pills’ or ‘shark repellants’ by target management will most probably result in negative returns on the part of the target shareholders (Meulbroek et al. 1990, p. 1113). So do these results support the argument that ethical considerations on hostile takeovers are evi denced in stock prices? Unfortunately, this evidence raises even more questions rather than answering them. For instance, given the potentially negative returns suffered by bidding shareholders, it would not be appropriate to say that the management bidders are pursuing wealth maximization for their shareholders, thus increasing the likelihood of incurring agency costs. On the other hand, it is likely that the bidding management only pays high prices to the target group innocently since the target bid premium payable is in most cases given back through wage concessions. Besides, the ‘unethical’ bidders will most likely be the targets in the future other than the bidders who helped increase the firm value. Thus from this conflicting evidence, it is only the unethical takeover activities that are properly reflected in the ultimate prices of stock. Undoubtedly, this is as a result of the obvious reduction in firm value that is a unique feature of the anti-takeover strategi es. Conclusions This paper has argued that wealth maximization as an objective will naturally adopt the ethical expectations inherent in its particular niche of operation. The best indicator of management’s performance is the price changes of the entity’s stocks in the capital market. Though management decisions could incorporate ethical concerns, it is the security market to determine whether these decisions are in accordance with wealth maximization goal through a valuation of stocks. Thus, this raises the question of to what degree is ethical behaviours reflected in the prices of securities? This question requires a careful study on the implications of unethical behaviour to the ultimate stock prices. But this presents a problem in that there is no established procedure on how to determine what does or does not constitute ethical behaviour, among other difficulties. For instance, assuming that stock markets rewards certain business ethical behaviour through attracti ve prices of securities, it does not automatically follow that when one pursues wealth maximization it will result into a socially responsible corporate behaviour. However, enterprises would most likely choose this path by choosing to believe that as long as actions are geared towards wealth maximization, then they are ethical and, therefore, justifiable. With this, changing management policy may become a big challenge since even reduced securities prices may not be adequate market sanctions. Thus even if it was determined that managerial decisions need to incorporate ethical considerations, market forces will not be sufficient to induce this. From this we can conclude that pursuing wealth maximization for the shareholders will definitely not result to a socially responsible corporate behaviour. However, evidence shows that the pursuit of wealth maximization could deter an entity from engaging in illegal activities. For example, a negative pattern of security price changes is noted whenever it is revealed that an entity has been engaging in illegal activities. Generally, it would appear reasonable to conclude that the stock market presumes that entities try to avoid engaging in illegal activities because of the possible incidental costs that they may suffer from engaging in such activities. References Beurden, P Gossling, T 2008, ‘The Worth Of Values – A Literature Review On The Relation Between Corporate Social And Financial Performance’, Journal Of Business Ethics, vol. 82 no.1, pp 407-424. Cosans, C 2009, ‘Does Milton Friedman Support A Vigorous Business Ethics?’ Journal Of Business Ethics, vol. 87 no.1, pp 391-399. Findlay, M Whitmore, G 1974, ‘Beyond Shareholder Wealth Maximization’, Financial Management (Winter), vol. 1 no1, pp. 25-35. Frank, J Harris, R 1989, ‘Shareholder Wealth effects of Corporate Takeovers. The U.K. Experience 1955-1985’, Journal of Financial Economics, vol.1 no.2, pp. 225 -249. Fuller, R, Himman, G, Lowinger, T 1990, ‘The Impact of Nuclear Power on the systematic Risk and Market value of Electricity Utility Common Stock’, Energy Journal, vol. 2 no1, pp. 117-113. Hawley, D 1991, ‘Business Ethics and Social Responsibility in Finance Instruction: Abdication of Responsibility’, Journal of Business Ethics, vol. 3 no.2, pp. 711-721. Husted, BW Salazar, DJ 2006, ‘Taking Friedman Seriously: Maximizing Profits And Social Performance’, Journal Of Management Studies, vol. 43 no.1, pp 76-91. Jones, T Hunt, R 1991, ‘The Ethics of Leveraged Management Buyouts Revisited’, Journal of Business Ethics, vol. 3 no.4, pp. 833-840. Meulbroek, L, Mitchel, M, Mulherin, J, Netter, J Poulsen, A 1990, ‘Shark Repellents and Managerial Myopia: An Empirical Test’, Journal of Political Economy, vol, 1 no.4, pp. 1108-1117. Patten, D 1990, ‘The Market Reaction to Social Responsibility Disclosures: The Case of the Sullivan Principles Signings’, Accounting, Organizations Society, vol.1 no.5, pp. 575-587. Shaw, W 2009, ‘Marxism, Business Ethics, And Corporate Social Responsibility’, Journal Of Business Ethics, vol.86 no.1, pp 565-576. Skantz, T, Cloninger, D Strickland T 1990, ‘Price-Fixing and Shareholders Returns: An Empirical Study’, Financial Review, vol.3 no.5, pp. 153-163. Smith, CN 2003, ‘Corporate Social Responsibility: Whether Or How?’ California Management Review, vol. 45, no. 4, Summer, Pp 52-76. Solomon, E 1963, The Theory of Financial Management, Columbia U Press, New York. Treynor, J 1981, ‘The Financial Objectives in the Widely Held Corporation’, Financial Analysis Journal, vol.1 no.5, pp.5-15 Waldman, D 1988, ‘The Inefficiencies of Unsuccessful Price Fixing Agreement’, Antitrust Bulletin, vol.6 no.3, pp. 67-93. Wilcke, RW 2004, ‘An Appropriate Ethical Model for Business and a Critique of Milton Friedman’s Thesis’, The Independent Review, vol IX, no. 2, pp 187-209. Winch, D 1991, Analytical Welfare Economics, Penguin, Harmonsworth, U.K.