Monday, September 30, 2019

Does the Labor Law Encourage or Discourage Unionization Essay

Yes they do. And the following is in support of that claim: â€Å"Often described as the ‘heart’ of the act, section 7 of the statute reflects the law’s basic purposes. It provides that ‘employees shall have the right to self-organization, to form, join, or assist labor organizations, to bargain collectively through representatives of their own choosing, and to engage in other concerted activities for the purpose of collective bargaining or other mutual aid and protection’ â€Å" (Kohler, 2004). In addition, the labor laws tend to favor employee and union relationships. Labor laws do provide protection for union employees against wage inequality by defining standard minimum wage requirements and they address other workplace safety issues as well. These labor laws are authorized at the government level and thus allow any public employee to not only join a union, but create one (by organizing) should they so desire. And given the fact that the majority of the employees at West University are public employees, already in established unions, the organization process for the Resident Assistants (RAs). To help facilitate that process, the Graduate Employee Organization (GEO) was affiliated with the United Auto Workers (UAW) union. Although the workforce at West College is a majority of union employees, the non-union employees are not required to join any union due to the fact that Arizona is a right-to-work state. But again, the labor laws to prevail and allow a group of employees to legally organization under State and Federal laws. 2 – Do you think teaching assistants should be considered employees? If they are on a payroll as a W2 individual, and work a set amount of hours then I can’t any reason why they would not be considered employees. Similar to the Resident Assistants, I would imagine that the Teaching Assistants are also students who attend the college as well. Based upon the information provided, the Teaching Assistants are also unionized employees. Education aside, the skill level of the Teaching Assistant should not be a factor when it comes to joining a union, there should be some educational requirements for the job of a Teaching Assistant however. Although a Teaching Assistant does not have teaching credentials, hence they’re not on the same pay grade, but there is a fair amount of experience that a Teaching Assistant is expected to have to perform their job effectively. This does not mean that a Teaching Assistant could not handle the job of teaching a class if they had to, they just do not have the official credentials and could present to the University should they be put into a teaching position. For further clarification, there is a difference that should be noted between an assistant and an intern. Per the following example: â€Å"Intern: a person who works as an apprentice or trainee in an occupation or profession to gain practical experience, and sometimes also to satisfy legal or other requirements for being licensed or accepted professionally.† Whereas â€Å"Assistant: serving in an immediately subordinate position; of secondary rank†¦generally not in training for another role.† (Dictionary.com) 3 – Do you think management’s reaction to employee interest in unionization differs if the employer already has a high union density among other employee groups? If a majority of the employees are already organized in some type of a union setup, then unfortunately, the only reaction that Management can have is to agree to other groups wanting to organization. That is unless Management can come up with some reasons why organization should not take place. This type of a balance has its pros and cons. If this is a type of an environment where a majority of union employees makes more sense, then this type of an arrangement can be productive if even more employees wanted to organize. And it might be best if management did agree to that because there is always the fairness issue that can come up of a group of non-union employees receives the same treatment that the union employees receives. In this case, that is the argument of the Resident Assistants. But at the same time, there are situations where it just makes no sense for a particular group of employees to organize. Now it is a great benefit for the employees to belong to a union but on the flip side of that argument, transitioning from a non-union environment to a union environment can be a lengthy and expensive process. The costs of running a unionized business can be quite. And the case of a University, those costs are not going absorbed as a lost by the school, but instead will be passed down to the consumer, in the case, the student. Thus the tuition costs will keep increasing, and the university runs the risk of losing business to the competition. It doesn’t matter if it is a university, is it still a business. 4 – What are the key factors that led some RAs to have interest in union representation? Do you think that RAs have legitimate job-related concerns, or are the RA complaints overstated? The working conditions of the Resident Assistants were starting to become a concern for the employees. The Resident Assistants have been assigned the task of disciplining their fellow students and were subjected to any pushback. Thus there is a potential conflict of interest since the Resident Assistants are overseeing the immediate area where they are also housed in. Although the Resident Assistants are paid a wage for their services, they are in fact full-time students. Per the labor laws, the University is not required to allow a group of full-time students to organize but it is not against the law Resident Assistants to organize. Now, the Resident assistants, do sign an agreement with the University detailing their job description and what is expected of them. This is certainly a valuable service that is being provided to the University, but at the same it does not warrant an organization movement in my opinion. Especially due to the natural turnover rate of the students (students graduating, etc.), a Resident Assistant is certainly not a long-term position and thus does not really justify signing a union / employee contract for any significant length of time. In summary, the Resident Assistants do have generally good talking points for organization. However, their job description does not warrant the added expense that the University will take on when that group is organized. Should the Residents Assistants job descriptions increase, then yes, organization would be a good idea at the University. But key to remember here is that the Resident Assistants are full-time students with less than part-time jobs that they want to unionize. 5 – Do the RAs opposed to unionization have legitimate concerns? How could unionization change the culture of Residence Life? Those concerns are quite legitimate, and in my opinion, more selfless and grounded than the rest of the Resident Assistants. As mentioned above, these are full-time students with a part-time that they are not being forced to do. They chose to apply for the position, and they signed an agreement of the behavior and expectations (minimum GPA, etc.) The Resident Assistant position should be used as an opportunity to gain some good experience such as what an intern would get but also with a financial incentive. By organizing, the Resident Assistants may miss out on the real experience of interaction with the culture of the campus residential environment. In other words, the resident Assistant would be focusing more on being an employee vs. being a student and a Resident Assistant. Thus, the Resident assistant could possibly be viewed as more of a security guard then someone who is on the same level as the other students. I’m sure there was a fair amount of thought that went into designing the position of the Student Assistant, and it appears that they divided in half. One half, being on the same page with the University in wanting to keep the integrity of the position; and the other half wanting to break away from University tradition and form a separate. Again, not a bad idea to organize if the students were going to be in these positions for a long time, but they’re not. It’s a very transient position. 6 – How does the law regarding union recognition for public employees in this state compare with the NLRA rules regarding union recognition for private-sector employees? There are some similarities. However, Section 7 of the law states the following: to engage in other concerted activities for the purpose of collective bargaining or other mutual aid and protection,† as well as the right to refrain from engaging in any of those activities. (Kohler, 2004) Let’s look at the three key principles of the law as noted by Kohler: â€Å"There are three key principals on which the NLRA rests: 1) the exclusivity principle; 2) the notion of free collective bargaining; and 3) the structural autonomy of the bargaining representative of the employees (in other words, the independence of the employees’ labor union from the employer).† (Kohler, 2004) Breaking this down further, Kohler goes on to explain: Exclusivity Principle. The exclusivity principle is a basic feature of American-style collective bargaining. According to the exclusivity principle, the union representative selected by a majority of employees in a workplace becomes the exclusive (sole) representative of all those employees. (Kohler, 2004) Free Collective Bargaining. Free collective bargaining is the second basic principle of the NLRA. The act leaves the decision whether to organize entirely to employees.(Kohler, 2004) Structural Autonomy. The structural autonomy of the employees’ bargaining representative is the third key principle of the collective bargaining system adopted by the NLRA. This principle anchors the system of free collective bargaining.(Kohler, 2004) In addition, Section 8 of the National Labor Relations Act (NLRA) states the following: â€Å"to dominate or interfere with the formation or administration of any labor organization or to contribute financial or other support to it.† (Kohler, 2004) 7 – Why did the LRC determine that RAs and CDAs were employees? Do you agree with the LRC decision? Why? Why not? In summary, I do not agree with the decision handed down by the Labor Relations Commission. Resident Assistants are really only student assistants that earn a small wage through the school year and depending upon the school schedule will not be working in the summertime. The decision to recognized students as employees is reckless and can have consequences down the road. This is a slippery slope. I don’t know the complete reasoning behind the decision of the Labor Relations Commission but if I had to guess I would imagine that there is a bit of a bias since the Labor Relations Commissions tend to lean pro-union. Another concern that the University should be aware of is that now that they Resident Assistants are organized, there is a possibility that these positions can be abused. Prior to organization, the Resident Assistant applicant would sign a Memo of Understanding (MOU) outlining the expectations that they were expected to meet. Being that they are organized now, the Memo of Understanding is most likely going to be tossed out the window and a new set of demands may start coming in over the years. Not to mentioned the future additional labor expenses that the University is going to incur. Works Cited Kohler, Thomas C.. â€Å"National Labor Relations Act (1935).† Major Acts of Congress. 2004. Retrieved October 18, 2012 from Encyclopedia.com: http://www.encyclopedia.com/doc/1G2-3407400221.html

Sunday, September 29, 2019

Home School vs Traditional School Essay

COMPARE AND CONTRAST HOMESCHOOL AND TRADITIONAL SCHOOL HOOK: In the future, students might have more opportunities to attend a home school and they can make a choice between home school or traditional school . Which would you prefer? BACKGROUND: Parents often debate about the best place to educate their children and nowadays, they often must consider if homeschool or traditional school is the best choice. THESIS: There are some similarities between home school and studying in a traditional school, however there are also many differences. I am going to discuss some similarities and differences between these two ways for (methods of) education. BODY 1 First of all, let’s look at the similarities between these two methods of education. Both of these ways have a similar routine and a similar structure. For example, students can study the same subjects, have the same lunch break and do the same projects. In addition, both ways give students the chance to learn if they want to learn and develop their knowledge and develop their personality. Moreover, there is a similarity between the text books so the basic information on the course will be the same. BODY 2 On the other hand, there are many differences between homeschool and traditional school. For example, when a student studies at home, they are more individual because they have their own opinions, likes and dislikes. This means they have their own personality and other people have less influence. Also, students educated at home can learn faster, whereas in traditional schools too many things happen in the classroom and learning is usually slower. For this reason, students have a better chance to learn more at home. Finally, at a traditional schools students have the chance to socialize and make new friends, while at home they have just the teacher and they haven’t the same chance to develop their social skills. CONCLUSION In conclusion, these are some of the similarities and differences between homeschool and traditional school. SUMMARY On the one hand, they both have a similar routine, a similar chance to learn and the  textbooks are also similar. On the other hand, they are different because homeschool is more individual, there are less chances to meet new friends and the learning is usually faster. OPINION Finally, if you go to homeschool or traditional school you still have to study a lot and really want to succeed, so in the end, I believe both of these ways give a student a good education. Vocabulary Nowadays To consider Must consider- have to think about Chance – opportunity To develop – to build up , increase To develop social skills Knowledge Personality Own – belongs to you only More influence on someone- can change someone’s mind easily Less influence on someone- can change someone’s mind easily Basic- Individual- To socialize – to chat to and meet new people, chatting and talking To be sociable – more chance to be sociable To succeed – to come out positively and get what you want, achieve benefits

Saturday, September 28, 2019

Best Practices In Food And Beverage Marketing Essay

Best Practices In Food And Beverage Marketing Essay The Food Beverage department at hotels has evolved significantly over the past decades. Various studies and marketing techniques were employed to the department in order to improve the operations such as developing menu items or creating unique offers (Miller). A PKF consulting analysis of 214 hotels during the time-frame of 1994 to 2004, displayed an percentage growth in F Kippenberger). Following their example, the co-branding of TGI Fridays within Holiday Inn hotels turned out to be a financial success. After the conversion of the Pennsylvania Holiday Inn restaurant to TGI Friday’s, the increase from $450,000 to $4 million within the first year only marked a rapid improvement in revenue which persisted for consecutive years (Hahm and Khan). After reviewing the benefits, the company expanded its co operations with other franchise such as Red Lobster, Pizzeria Uno, Good Eats Grill and many more (Boone). Other examples include the co-branding of Sheraton hotels with Starbucks coffee and Vie de France baked goods, Hilton with Benihana, Calrson Country Inn with Pizza Hut, The Garden Place and Nestle Toll House Cafà © among others.

Friday, September 27, 2019

Market Regulation in the EU Essay Example | Topics and Well Written Essays - 4500 words

Market Regulation in the EU - Essay Example 11 c. Specific and sectoral or vertical industrial policy in the EU †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 14 IV. Analysing the challenges associated with formulating EU industrial policy ................................................ 17 V. Conclusion and recommendations †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 19 Endnotes ............................................................................................. 21 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 24 Introduction According to Foreman-Peck and Federico (1999, pp. 2-3), industrial policy is â€Å"an elusive concept which aims to cover almost everything that affects the performance of an industry†.1 Considering the importance of European Union (EU) industrial policy in terms of promot ing business growth in the industry sector, EU industrial policy was included under the EC Treaty (Title XVI) of the Treaty on European Union (TEU).2 Given that industrial policy can be used in hastening structural changes in industry, this device is often used in influencing the structure of the industry. Prior to the development of industrial policy, the European Commission’s first report in the 1990s revealed that the European Parliament was debating how to formulate a clearly-defined industrial policy which could improve the global competitiveness of the EU members.3 To prevent cases of de-industrialization, the main purpose of creating an industrial policy in the EU was to ensure that there is a common policy framework to be used in promoting fair market competition among the industrial sector.4 In other words, EU industrial policy is not limited to preventing cases of de-industrialization but also covers cases of red tape or corruption on the part of the government offi cials who are directly involved in the allocation of the available infrastructure budget. The EU is complex in the sense that it is composed of 27 different countries across the European continent. In line with this, the Central Intelligence Agency (2011) has identified the 27 members of the European Union as follows: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, and the UK. Free market competition among the EU member states and the free movement of goods and services are among the few goals associated with the development of industrial policy in the European Union.5 Considering the large number of EU member states, the challenge behind the formulation of industrial policy in the EU includes the limitation of the available industrial policy in preventing instances of market distortion and m arket discrimination among the EU countries. Given the complexity of the political and economic structure of the EU, this paper will focus on determining and critically assessing the main challenges associated with the formulation of EU industrial policy. As well as discussing the scope and limitations of industry policy in Europe, the inter-state and inter-regional markets within the EU will be tackled as part of the discussion of the significance of the framework aspect. Likewise, this paper will also analyse and discuss issues regarding the development of specific and sectoral industrial policies and issues related to horizontal industry. The scope and limit

Thursday, September 26, 2019

Age estimation based on pubic symphysis Essay Example | Topics and Well Written Essays - 3750 words

Age estimation based on pubic symphysis - Essay Example This paper illustrates that amongst other techniques to estimate the age of the skeleton dentition is also frequently used to estimate age and at times this might be the last resort, given the complete mutilation or decomposition of the corpse This is because in such a situation   it is impossible to base any conclusions pertaining to age or identity upon other parts of the anatomy. Age estimation based on the changes within the surface of the pubic symphysis   is another method which has come to be regarded as as a reliable criterion for the estimation of age which has received much attention with in the field of forensic osteology which relates to the observation of the changes in pubic symphysis, particularly pertaining to the age related changes in adult humans between the ages of   20-50 years, which is a time when the skeleton itself goes through rapid growth related changes. Therefore morphological changes in the symphyseal surface of pubic bones have been evaluated by t he forensic anatomists through methods like Todd’s phase system for White Males McKern and Stewart’s three-component system with five active developmental stages for males Hanihara and Suzuki’s multiple regression analysis and quantification theory model be consistent in the way you list these. Suchey–Brooks phases which are more detailed for the examination of the male pubic symphysis. Based on the above this paper explores these methodologies pertaining to age estimation using morphological features of the pubic symphysis and goes onto evaluate their precision in the light of academic opinion.. Introduction As mentioned above, at the culmination of the growth process which also brings about the full eruption of the dentition growth it is possible to experience complications in the estimation of age , relying on evidence of degenerative processes. (Gilbert and Mckern 1973) .However, age estimation at death can be made from multiple methods out of one of which will be discussed below to be the symphyseal formula technique where as it has been â€Å"found that age estimates based on this single event are more dependable than similar age estimates from other bones. This technique has made age estimation from unknown skeletal remains more realistic, more accurate and more dependable.† (Parikh, C. k., 1990). There a number of techniques available with in the forensic osteology to estimate the survival, social adjustment and age of the populations based on the patterns of morbidity and mortality and these have included techniques like pubic symphysis morphology, auricular surface morphology, age-related size distribution, tooth wear, epiphyseal closure, dental eruption patterns. All these techniques are well utilized if the skeleton is still in its period of growth and development and their use may give very precise results However as soon as the growth and development process ceases. it becomes more and more difficult to give a precise assessment of the age based upon the evidence of the degenerative processes.Thus public morphology provides a good way of establishing consistent findings for the determination of age at death (mostly) of the corpse. Age is thus determined by

Business Synoptic (reflective statment) Essay Example | Topics and Well Written Essays - 1000 words

Business Synoptic (reflective statment) - Essay Example The learning outcomes are assured in business synoptic module because we get a chance of solving the problems demonstrated in the case study solely depending on our own knowledge gathered through the entire process of learning. Case study is an eminent means of reflecting various theoretical concepts learned through any module in practical situations (Monash University, 2010). The chart below provides a pictorial representation that I followed while solving the case study assignment. Firstly, I developed the methodology and then precisely, I followed those steps for arriving at a result. Most important stage of this methodology was to read the case comprehensively, again and again, so that every critical issue can be understood from the case. As a second stage, I really tried hard to identify the most crucial issues that I needed to handle for solving the case. Based on the issues identified, I formulated my strategy of researching various academic sources relevant in solving. Resear ch process along with understanding of the critical issues in the case helped me to a great extent in forming views about the main problems in the case. Based on the views formulated, reflective analysis has been made by me and concise solution has been presented. During the formulation of views about the case problem, the attendance that I made to the two workshops were of great help, the influence of which I could feel during writing solution to the case study’s questions. During solving the case, I came across a number of theories that I learned during my earlier classes. Here the integration of the knowledge became prominent for me when those were applied in the practical evidences provided in the case. The theories that I used are not many but whichever I have used were relevant to the case situation. The theories are emerging market analysis, performance analysis, corporate level strategy, mainly global strategy and multi-domestic strategy and the theory of management s tructure. Case study analysis provides the best results when sufficient strategic analytical tools are appropriately used in finding the results (Mind Tools, 2011). Figure 1 Answer to Question No: 2 It is evident that case study analysis provides us a wide scope of excelling in our areas of work, be it professional or academic. Through the module, I have developed various skills which I am sure will be beneficial in not only solving problems in my education career but also will help in gaining competitive position in the practical field (Lee & Et. Al., 2009). The following figure depicts the areas in which I have acquired skills through case study analysis. The most important skill that I gathered from the study is that of problem solving ability. The analysis demanded a lot of effort in solving the problems identified from thorough understanding of the case facts. The facts might even be wrong as I am not a perfect analyst but whatever knowledge I have in the area of strategy formu lation, I have applied in solving the problem (Raviv, 2003). The second most important skill that I acquired in the process is that of innovative thinking. Strategy demands innovation-I learnt this line during gathering education in this area and during the process of solution, I understood the real meaning of innovative thinking when I was bound to apply all my traits. This application process generated the

Wednesday, September 25, 2019

Cultural Background and Academic Performance Essay

Cultural Background and Academic Performance - Essay Example Some prove to be difficult but there is no objection as work has to be done and delivered on time. College regulations may not be strict but they are demanding. Always, in the first session, almost everything a student does in the eyes of the tutors appears to be out of context. What follows is that the student is left to wonder if he will manage to fulfill all their expectations. To overcome this, it calls for quick measures to be implemented for the student to make wise decisions regarding his goal in life and how he will achieve it. Critical thinking is another issue; it involves the students who are sharp and able to think carefully about an idea before deciding on how to tackle it. For instance, reasoning critically involves one to think beyond his mind to avoid conclusions that are so obvious. Cultural myths have their own power and they take particular forms that make people realize if the steps they take are sensible. Through them, people get to know about their beliefs, customs, and ideas to the point of sharing a common language. Cultural myths determine how human beings interact with each other, how they perceive themselves based on their behaviors, and wishes. People live according to their cultural myths, which assist them to understand where they belong and help them build their power and how they are related to the people they love whether it is in the past or the coming generation. To be a critical thinker, a person is required to ignore these cultural myths and their misconceptions. It is interesting to know that the cultural myth that people do not apply most makes us view the world on a broad basis. In some cases, when the myth’s values are misinterpreted, it is considered immoral. Cultural myths have adverse consequences; when it comes to learning, they lower the rate at which students reason and read.  

Tuesday, September 24, 2019

Affirmative Action Policy Term Paper Example | Topics and Well Written Essays - 1750 words

Affirmative Action Policy - Term Paper Example Without this ideologically divisive legislation to help ensure equal opportunity in the workplace, the balance of power in this nation would still more heavily favor the ethnic majority and occupational segregation would still continue much more blatantly than it still does today. A society’s evolution is dependent upon social acceptance on a widespread basis, a slow process that doesn’t appear to happen naturally without the introduction of affirmative action policies. From the time of its implementation, affirmative action laws have succeeded in balancing the scale of employment opportunities available to persons of all ethnicities. The main tool of affirmative action policies, the quota system, is used by governmental offices. It reflects the specific region’s ethnic demographics therefore allowing for legitimate equality that is not biased towards any specific race. Even though the majority ethnic group, white persons, may today think they are being treated u njustly because they have undeniably lost a little ground from an financial perspective, the scale of justice has been adjusted closer to the center thanks mainly to affirmative action hiring policies which demonstrates the need for this system to continue. The expression â€Å"affirmative action† first appeared in 1965 on Executive Order 11246 signed by President Lyndon Johnson. The Order mandated that federal government contractors to â€Å"take affirmative action to ensure that applicants are employed, and that employees are treated during employment, without regard to their race, creed, color, or national origin.† In 1967 Johnson expanded the Order to shield women from discrimination too. The Order reads, in part, â€Å"A contractor in violation of E.O. 11246 may have its contracts canceled, terminated, or suspended in whole or in part, and the contractor may be debarred, i.e., declared ineligible for future government contracts.† 1 From its inception, affir mative action hiring policies have helped many thousands from formerly disadvantaged segments of society who have since achieved access to civil service jobs that had been denied previously. This includes persons of color, other ethnic minorities and women who had been excluded from jobs or denied the equal opportunities for advancement within the government institution once attaining access. These employment gains have translated to very real improvements not just in individual person’s lives but in the progression of society’s concept of justice for all. Affirmative action programs cannot hope to eliminate racist attitudes but can mitigate the effects caused by institutional racism. These programs and policies vary with regard to their directives and extent of conformity according to the nature of the chosen organization when applying to the Federal Government. By utilizing this adaptable approach, contractors who maintain a business relationship with the Government may have to adhere more strictly to affirmative action precepts than those of the private sector. The concept of affirmative action has had its opponents and implementing the policy has had its problems, but to eliminate this guiding principle of equal opportunity would be to erase the hard fought successes of the Civil Rights Movement and return to blatant racism present in the country prior to the 1960’s. Arguments involving affirmative action policies are more extensive than just the legality of the issue. It is the ethical responsibility of every person and institution in

Monday, September 23, 2019

Economics assignment Example | Topics and Well Written Essays - 750 words

Economics - Assignment Example To avoid this situation particularly when it is occasioned by the fact that the involved firms receive inputs from input suppliers and are attempting to innovate to produce differentiated products and even seeking patent of those products, is by the firms involved getting integrated vertically so that they can reduce some of the dead weight losses. Sometimes it would be necessary that the firms involved within the particular supply chain get to mergers and acquisition. One of the ways in which double marginalization may be solved is by Suppressing the Double marginalization. This can be done by avoiding the firms involved in unnecessarily applying for mark-ups over the cost of their own outputs; rather, they should increase their overall profits through internal suppression of the double marginalization. This should be strategically done by ensuring that they transfer the intermediate costs of the products they have through the application of a single optimal mark-ups. The above solution coincides with the profit maximization solution of innovating and producing up to the point where marginal cost equal marginal revenue. Like any other good practice in profit maximization in business, overcoming double marginalization solves the problem of losses. in the case of application of the marginal cost equals to marginal cost revenue, a firm will attempt to produce that additional production which will assure it of additional revenue. At the point where the marginal cost rises to equal the marginal revenue, it can then be said that the firm is maximizing the profit. The rule usually demands that; in the event that the marginal cost gets greater than marginal revenue, the firm must cut down on its cost. This is why by avoiding the dead weight loss through the reduction of double marginalization; the firm automatically reduces on its cost. 2) Suppose firms A and B are going head to head developing new products

Sunday, September 22, 2019

Monopoly versus perfect markets Essay Example for Free

Monopoly versus perfect markets Essay This paper investigates the two extremes of market structures. A monopoly firm, and a firm which operates in a perfectly competitive market. We will compare features, similarities, differences, advantages and disadvantages. The monopoly firm I have chosen is Thames Water. This company is an accurate example, as it’s the sole supplier of the industry. The firm, is the industry. Thames Water supply water through peoples taps in and around London. Fyffe is my chosen firm in a perfectly competitive market. I think this is a good example. It sells bananas to supermarkets and food suppliers, who resell on to customers. The next two paragraphs explain the features of perfect competition, then a monopoly. â€Å"The theory of perfect competition illustrates an extreme form of capitalism. † (Sloman, 2007:113) There are many suppliers, who all only supply and produce a small fraction of the total output, of the whole industry. None of the firms have any power over the market. (Mankiw, 2001) Barriers to entry do not exist. Therefore firms can enter and leave the market freely. Apart from the money and time it takes to set up the business, there are no other obstacles. Both producers and consumers have perfect knowledge of the market. Therefore they both know prices which should be paid, quality which should be met, availability of the product. Market opportunities for expansion, and entry opportunities in the industry as a whole. The price Fyffe must charge for their bananas will depend upon the demand and supply of the whole market, not just Fyffe personal demand. Hence they have no power over prices. They must follow the market forces. (Sloman, 2007)Established firms in the banana industry have no advantage over firms who have newly entered the market. (Parkin, Powell, Matthews)â€Å"This means they can sell all the products they can produce at the market price, but none at a price which is higher. † (Sloman, 2007:114) If Fyffe raise their selling price above p1, their demand will drop to 0, because if Fyffe raise the price of their bananas, consumers will just buy from another firm selling at the current market price. Illustrated in diagram 2. (Beardshaw, 2001) All firms operating in the banana industry sell a homogenous product, all the firms in the industry sell an identical banana. The theory states there is not a great need for advertising or branding. (McConnell, 2008) I would agree with this statement in the context of bananas. Advertising is not needed as people will not look for a specific brand of banana. They all taste the same. However I think a firm in a market selling shampoos and conditioners would need a certain amount of branding and advertising so people choose their product and gain customer loyalty. In the shampoo industry products are not as homogenous. A pure monopoly owns 100% of the industry. Thames water have a great deal of power, and are price makers, thus they set the price to how much they want to charge. If the consumer cannot, or doesn’t want to pay the price, they have to go without the tap water. In the short run both perfect competition and monopolies can make economic profits, losses and supernormal profits. Only monopolies can manage to sustain super normal profits in the long run. â€Å"Persistant economic profits are called monopoly profits. † (Dobson, 2005:99) Monopolies can sustain supernormal profits and remain safe and unaffected by competition due to barriers to entry. Supply to the industry does not increase with new entrants. (Hunt, 1990). There are many types of barriers to entry. Thames water is known as a natural monopoly, meaning there are barriers to entry due to large economies of scale. (Sloman, 2007) Capital equipment is so expensive and large scale that only one sole supplier could manage to make a profit in the water industry. However Thames Water incurred low marginal costs once they are set up. â€Å"If average cost falls as output increases over the entire range of market demand its a natural monopoly. † (Dobson, 2006:100) â€Å"Each would have a very high average cost at a low output. † (Begg, 2005:134) Correspondingly Thames Water gain barriers to entry through lower costs. This is an artificial barrier. The firm is experienced in their field. Has good knowledge of their market, and will be able to gain the best rates of interest on finance, the best suppliers at the lowest costs, and lean methods of production. Other firms would struggle to compete. If a firm decided to set up and compete with Thames Water, and failed by going out of business there would be huge sunk costs. This occurs when high amounts are spent on capital expenditure, which cannot be used on another business venture. (Sloman, 2007) This is an example of exit costs. It would be a huge loss to the firm, and would discourage firms from entering the market. Thames water also have patents copywrite and licensing. The next two paragraphs explain the effect on demand for perfect competition, then a monopoly. For Fyffe the price charged for the bananas is equal to marginal revenue. Average revenue and demand are also equal to price. If average cost dips below average revenue the firm will earn supernormal profits. If demand is above where marginal costs and marginal revenue meet the firms will be making normal profit. See diagram 2. Normal profits cover opportunity costs of the owners money and time. If Fyffe set output below equilibrium marginal cost would exceed marginal revenue and profit would be lowered. If Fyffe raised output above equilibrium marginal costs would exceed marginal revenue and profits would also be lowered. See graph 1. (Dobson, 2005:99) The demand curve is elastic for the banana industry, but not perfectly elastic. Hence why it slopes downwards in diagram 1. If there is a rise in price for bananas, consumers will spend less on the product, and Fyffe will entail a fall in revenue. In contrast if the price of bananas drop, consumers will buy more of the product, and providing the firm is covering their costs they will receive an increase in revenue, because bananas can be relatively easily substituted by another cheaper fruit. Furthermore bananas will sell for a cheaper price when they are in season, due to a larger supply to the market in this period. Fyffe is perfectly elastic which is why their demand curve is horizontal. See graph 2. The firms prices are not affected by their output and their decisions do not affect the industry. (Ison, 2007) Firms must produce at equilibrium to maximise profits, which is where the market supply, meets the market demand, as illustrated in diagram 1. Short run â€Å"assumes the number of firms in the industry does not increase, as there is not enough time. † (Sloman 2007:114) When a firm produces quantity and price, where marginal costs, and average costs meet they are breaking even. See diagram 2. (Begg, 2005) Consumers are charged a price which is equal to what it costs the firm to produce the extra unit. See diagram 2. If the demand curve for bananas increases short term, the demand curve will shift to the right. See diagram 3. This results in a higher equilibrium and a higher selling price. As selling price has increased farmers will raise their output by increasing their variable costs such as labour and materials. This will result in a larger profit and profits are maximised. As illustrated in diagram 4. In contrast if the demand for bananas was to decrease, this would cause a shift to the left in the demand curve. See diagram 5. This results in a lower equilibrium for the industry, and a fall in the selling price. Consequently all firms in the industry including Fyffe would reduce output, by decreasing variable factors and the firm would suffer economic losses. As illustrated in diagram 6. (Dobson, 2005) If Fyffe or Thames Water are not covering their average total costs in the short run, they should carry on trading, but if they are not covering their short run average variable costs, it would be cheaper to temporarily close down. The theory is known as the short run supply decision. (Ison, 2007) In the long run any firm should close down if it is not covering its total average costs as it is loss making. Called the long run supply decision. (Begg, 2003) When demand increases and selling prices rise in the long term, existing firms are making supernormal profits. Several new firms will enter the market. The supply curve will shift to the right, and supply will increase, which will lower market price. As more new industries join firms reduce their output until they are making a normal profit again. Output of the whole industry will be larger now that more firms are in the market, and there is no incentive for firms to enter, or leave the market as breakeven profits are being made. Referred to as the entry or exit price. When there is a decrease in demand, prices will fall, and firms will reduce output to minimise losses. Eventually due to losses some firms will leave the market which lessens supply and the supply curve will shift to the left. This raises prices due to restricted output, and farmers will start to make normal profits again. So there are less firms and less output in the industry. (Dobson, 2005) In the long run there are no fixed costs in any industry, as firms can change their plant size or machinery. Resulting in a long run supply curve which is flatter than the short run. (Begg, 2003) If all firms operating in the industry restricted supply together increasing demand and prices, new firms would enter the market which would increase supply and lower prices. (Begg, 2005) Thames water are price inelastic, and have a low income elasticity of demand, because there are no close substitutes for their product, and water is a essential item. However they are not perfectly inelastic, as a rise in price will still amount to a small drop in quantity demanded. This means Thames water’s revenue will increase with a rise in price, and decrease with a fall in price. A profit maximising level of output is where marginal revenue is equal to marginal cost but rising up to the demand curve to obtain price. See diagram 9 (Sloman, 2007) The demand curve in diagram 9 represents the value of Thames water to customers, and the marginal curve shows the costs Thames water must pay. The marginal revenue curve must lie below the downward sloping demand curve as marginal revenue is less than price. The further the distance between the demand curve on the right hand side and the marginal revenue on the left the more inelastic the demand, see diagram 9. (Dobson, 2005) ) A firm cannot produce to the right of marginal revenue as this part of the diagram is inelastic. In order for the monopolist to sell a larger amount, the price must be lowered on all previous units, so to prevent this the monopolist may restrict output to keep a larger revenue. Creating scarcity and raising the equilibrium price. (Begg, 2005) â€Å"The excess of price over marginal costs shows the monopolies power† (Dobson, 2005:102) The power to raise prices by selling a smaller amount of output. Diagrams 8, 9, and 10 show long run economic profits, normal profits and losses. Thames water will then check weather the profit maximising level of output covers their total costs in the long run and variable costs in the short run. (Begg, 2003) Thames water is not a contestable market due to the fact it’s a natural monopoly, and has very high barriers to entry. This means they can charge high prices and make supernormal profits, without the threat of competition and new entrants. (Sloman, 2007) Thames water may want to behave ethically when setting prices. If they choose too high a price which people cannot afford this could lead to poverty, but if they charge too low a price this could lead to a wastage of water. Monopolies often use price discrimination when setting prices. Although Thames water do not. Perfect competition cannot use this method. Particular consumers are charged a higher price for an identical service so the monopoly can earn higher profits. (Ison, 2007) Revenue is not lost from previously sold units when price is reduced. More output can be sold ands firms can catch some of their consumer surpluses. See diagram 12. â€Å"Surpluses are the difference between actual price paid and what consumers will have been willing to pay. † â€Å"So the business is treating the demand curve as the marginal revenue curve† (Ison, 2007:138) Only works when consumers cannot buy the product for a cheaper price and sell on to others. (Begg, 2005) A firm operating in perfect competition will achieve allocative efficiency. This exists when price is equal to marginal costs. â€Å" Society is better off when resources are allocated to maximise the total surplus in the market. † (Dobson, 2005:91) Productive efficiency will also be achieved, meaning Fyffe will produce and sell their output for the lowest price they can in the long run giving consumers the best possible value for money. â€Å"Price equals minimum average total cost. † (Dobson, 2005:92) This is good for consumers and society as consumers get the best possible value for money. (Sloman, 2007) Perfectly competitive markets are critised for having a lack of variety, unable to fully satisfy consumers wants and needs. Furthermore the long term entry and exit of firms can be a waste of certain resources such as empty buildings. This is called competitive forces in action. (Dobson, 2005) Monopoly’s are in a position to give us a lower price if they decide to, due to economies of scale. The marginal cost curve is lower than the supply curve in their graph which means the firm can supply more output at a lower production cost. Supernormal profits can fund research and development which will improve the quality of the product. Therefore the monopoly can innovate and introduce new products. (Ison, 2007) However some firms may not do this as they do not need to fight to stay in the industry, with no competition around. (Mankiw, 2001) Joseph Schumpeter said in theory monopolies have more ability and incentive to innovate which can make them better for society. If you imagine a whole industry was taken over by a monopolist, they could eliminate competition and charge very high prices, by reducing output level to which raises price. Supernormal profits represent a redistribution of income from consumer to producer which can be critised on equity grounds† (Ison, 2007:137) Monopoly firms have been known to â€Å"engage in dirty tricks to protect themselves from competition. † They do not produce an output which minimises average costs. Making them productively efficient. â€Å"Perfect competition is rare due to larger companies expanding, gaining economies of scale and market power. Resulting in other firms being forced of the business. So if economies of scale did not exist any industry could have perfect competition. † (Dobson, 2006:94) Monopolies are also rare, and both are extremes of market structures. Most firms lie somewhere between the two. I think the two firms I picked are a fair comparism. They are both from a mixed economy. Thames water will have regulating agencies monitoring them. There are only 3 legal monopolies in Britain Thames Water included. In the past there was a significant amount of monopolies which were government owned. When Margaret Thatcher came into power she privitised these firms as she believed competition would lead to greater efficiency and lower prices which would benefit society as a whole. I agree with her decision and I think after researching, perfect competition appears to be the better option for consumers. Monopolys benefit society in certain situations such as retained profits ploughed back into research and development for medical reasons, and natural monopolies who could not survive in a perfectly competitive industry. Monoplies and perfect competition are becoming more rare as time goes on and who knows what will happen in the future.

Friday, September 20, 2019

Cryptographic Techniques For Network Security Cryptography Computer Science Essay

Cryptographic Techniques For Network Security Cryptography Computer Science Essay The rapid growth of electronic communication means that issues in information security are of increasing practical importance. Message exchanged over worldwide publicly accessible computer networks must be kept confidential and protected against manipulation. Cryptography provides solutions to all these problems. Cryptography, a word with Greek origins means secret writing. We use the term to refer to the science and art of transforming messages to make them secure and immune to attacks. Cryptography is the practice and study of hiding information. In modern times, cryptography is considered to be a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, and engineering. Cryptography is used in applications present in technologically advanced societies; examples include the security of ATM cards, computer passwords, electronic commerce, which all depend on cryptography. SECURITY GOALS Availability Integrity Confidentiality Security goals CONFIDENTIALITY Confidentiality is probably the most common aspect of information security. We need to protect our confidential information. An organization need to guard those malicious actions that endanger the confidentiality of its information. In the military, concealment of sensitive information is the major concern. In industry, hiding some information from competitors is crucial to the operation of the organization. In banking, customers account need to be kept secret. Confidentiality not only applies to the storage of the information, it also applies to the transmission of information. When we send a piece of information to be stored in a remote computer or when we retrieve a piece of information from a computer, we need to conceal it during transmission. INTEGRITY Information needs to be changed constantly. In a blank, when a customer deposits or with draws money, the balance of her account needs to be changed. Integrity means that changes need to be done only by authorized entities and through authorised mechanisms. Integrity violation is not necessary the result of a malicious act; an interruption in the system, such as a power surge, may also create unwanted changes in some information. AVAILABILITY The third component of information security is availability. The information created and stored by an organization needs to be available to authorized entities. Information is useless if it is not available. Information needs to be constantly changed. Which means it must be accessible to authorised entities. The unavailability of information is just as harmful for an organization as the lack of confidentiality or integrity. Imagine what would happen to a bank if the customers could not access their accounts for transactions. SECURITY SERVICES It is easy to relate one or more of these services to one or more of the security goals. It is easy to see that these services have been designed to prevent the security attacks that we have mentioned. Data confidentiality It is designed to protect data from disclosure attack. The service as defined by X.800 is very broad and encompasses confidentiality of the whole message or part of a message and also protection against traffic analysis. That is, it is designed to prevent snooping and traffic analysis attack. Data integrity It is designed to protect data from the modification, insertion, deletion, and replaying by an adversary. It may protect the whole message or part of the message. Authentication This service provides the authentication of the party at the other end of the line. In connection oriented communication, it provides authentication of the sender or receiver during the connection establishment. In connectionless communication, it authenticates the source of the data. Non repudiation Non repudiation services protects against repudiation by either the sender or the receiver of the data. In non repudiation with proof of the origin, the receiver of the data can later prove the identity of the sender if denied. In non repudiation with proof of delivery, the sender of data can later prove that data were delivered to the intended to the intended recipient. Access control It provides protection against unauthorised access to data. The term access in this definition is very broad and can involve reading, writing, modifying, executing programs, and so on. CRYPTOGRAPHIC TECHNIQUES SYMMETRIC KEY ENCRYPTION It is also called as secret key cryptography is a cryptographic technique where the two parties share a secret key. Data are encrypted and decrypted using the same key. The sender encrypts data using the key. Once transmitted, the receiver should use the same key to interpret the message. C:UsersmadhuDesktopsyymm.PNG Figure 1. Symmetric encryption algorithm Symmetric encryption is computationally fast, meaning that it can occur in real time on content that is unknown previously. All securely transmitted live traffic today is encrypted using symmetric encryption algorithms for example such as live telephone conversation, streaming video transmission, high speed data link. Asymmetric Key Encryption In asymmetric key encryption, different keys are used for encrypting and decrypting a message. The asymmetric key algorithms that are most useful are those in which neither key can be made public while the other is kept secure. There are some distinct advantages to this public-key-private-key arrangement, often referred to as public key cryptography; the necessity of distributing secret keys to a large numbers of users is eliminated. And the algorithm can be used for authentications as well as for cryptography. Asymmetric cipher algorithms are based on heavy mathematical operations, thus they are not efficient at processing large blocks of data. They are often used to safely exchange small session keys. C:UsersmadhuDesktopasymm.PNG Figure 2: Asymmetric Encryption Algorithm Cryptanalysis As cryptography is the science and art of creating secret codes, cryptanalysis is the science and art of breaking those codes. In addition to studying cryptography techniques, we also need to study cryptanalysis techniques. This is needed, not to break other peoples codes, but to learn how vulnerable our cryptosystem is. The study of cryptanalysis helps us create better secret codes. There are four common types of cryptanalysis attacks Cryptanalysis attack Chosen ciphertext Chosen plaintext Known plaintext Ciphertext only Figure 4: cryptanalysis attacks Ciphertext Only Attack In ciphertext only attack, Eve has access to only some cipher text. She tries to find out the corresponding key and the plain text. The assumption is that Eve knows the algorithm and can intercept the cipher text. The cipher text only attack is the most probable one because Eve needs only the cipher text for this attack. To thwart the decryption of a message by an adversary, a cipher must be very resisting to this type of attack. Various methods can be used in ciphertext only attack. Brute force attack In the brute force method or exhaustive key search method, Eve tries to use all possible keys. We assume that Eve knows the algorithm and knows the key domain. Using the intercepted cipher, Eve decrypts the cipher text with every possible key until the plain text makes sense. Using brute force attack was a difficult task in the past; it is easier today using a computer. To prevent this type of attack, the number of possible keys must be very large. Statistical attack The cryptanalyst can benefit from some inherent characteristics of the plain text language to launch a statistical attack. For example we know that the letter E is the most frequently used letter in English text. The cryptanalyst finds the mostly used character in the cipher text and assumes that the corresponding plain text character is E. After finding a few pairs, the analyst can find the key and use it to decrypt the message. To prevent this type of attack, the cipher should hide the characteristics of the language. Pattern attack Some ciphers may hide the characteristics of the language, but may create some patterns in the ciphertext. A cryptanalyst may use a pattern attack to break the cipher. Therefore, it is important to use the ciphers that make the ciphertext look as random as possible. Known Plaintext Attack In a known plaintext attack, Eve has access to some plain or ciphertext pairs in addition to the intercepted ciphertext that Eve wants to break. The plain or ciphertext pairs have been collected earlier. Alice has sent a secret message to bob, but Alice later made the contents of the message public. Eve has kept both the cipher and the plaintext to use them to break the next secret message from Alice to Bob, assuming that Alice has not changed her key. Eve uses the relationship between the previous pair to analyze the current ciphertext. The same methods used in the ciphertext-only attack can be applied here. This attack is easier to implement because Eve has more information to us for analysis. However, it is less likely to happen because Alice may have changed her key or may have not disclosed the contents of any previous messages. Chosen Plaintext Attack The chosen plaintext attack is similar to the known plaintext attack, but the plaintext or ciphertext pairs have been chosen by the attacker. This can happen, for example, if Eve has access to Alice computer. She can choose some plaintext and intercept the created ciphertext. Of course, she does not have the key because the key is normally embedded in the software used by the sender. This type of attack is much easier to implement, but it is much less likely to happen. Chosen Ciphertext Attack The chosen ciphertext attack is similar to the chosen plaintext attack, except that the Eve chooses some ciphertext and decrypts it to form a ciphertext or plaintext pair. This can happen if Eve has access to Bobs computer. TRADITIONAL CIPHERS We can divide traditional symmetric key ciphers into two broad categories substitution ciphers and transposition ciphers. In a substitution cipher, we replace one symbol in the cipher text with another symbol; in a transposition cipher, we reorder the position of symbols in the plaintext. Substitution ciphers A substitution cipher replaces one symbol with another. If the symbols in the plaintext are alphabetic characters, we replace one character with another. For example, we can replace letter A with letter D, and letter T with letter Z. If the symbols are digits (0 to 9), we can replace 3 with 7, and 2 with 6. Substitution ciphers can be categorized as either monoalphabetic ciphers or polyalphabetic ciphers. Monoalphabetic ciphers We first discuss a group of substitution ciphers called the monoalphabetic ciphers. In monoalphabetic substitution, a character in the plaintext is always changed to the same character in the ciphertext regardless of its position in the text. For example, if the algorithm says that letter A in the plaintext is changed to letter D. In other words, the relationship between letters in the plaintext and the ciphertext is one to one. Example: we use lowercase character to show the plaintext; we use the uppercase characters to show the ciphertext. The cipher is probably the monoalphabetic because both 1s are encrypted as 0s. Plaintext: hello ciphertext: khoor Caesar cipher Caesar cipher is a special case of substitution techniques wherein each alphabet in a message is replaced by an alphabet three places down the line. Caesar cipher is susceptible to a statistical ciphertext only attack. Julius Caesar used this additive cipher to communicate with his officers. For this reason additive ciphers are referred as Caesar cipher. Caesar cipher used a key of 3 for his communications. P a b c d e f g h i j k l m n o p q r s t u C A B C D E F G H I J K L M N O P Q R S T U V 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 v w x y z V W X Y Z 21 22 23 24 25 For example: let the message hello is encrypted with the key of 15. Then all the characters in the ciphertext will be shifted from 15. Then the answer is hello= WTAAD Mathematically C (ciphertext) = (P+K) mod 26 (K= key) P (plaintext) = (C-K) mod 26 To encrypt message hello Plaintext h= 7 encryption (7+15)mod 26 C= 22=> W Plaintext e= 4 encryption (4+15)mod 26 C= 19=> T To decrypt WTAAD Ciphertext W=22 decryption (22-15)mod 26 P= 7=>h Ciphertext T=19 decryption (19-15)mod 26 p= 4=>e Cryptanalysis Caesar ciphers are vulnerable to ciphertext only attacks using exhaustive key searches (brute force attack). The key domain of the Caesar cipher is very small; there are only 26 keys. However, one of the keys, zero, is useless (the ciphertext is same as the plaintext). This leaves only 25 possible keys. Eve can easily launch a brute force attack on the ciphertext. Caesar cipher using cryptool Working the same example using cryptool, first of all, to acquaint ourselves with the Caesar encryption algorithm we will open a document, encrypt it and then decrypt it again. We will then try to get the computer to work out the key with which a plaintext is encrypted. This plaintext document is encrypted using the Caesar encryption algorithm by selecting the menu crypt/decrypt. C:UsersmadhuDesktopcaseaer 5.PNG Then the following dialog box appears. The key we enter is the number 15. Additionally, we change the options how to interpret the alphabet characters. The first alphabet character is set to 1 (if we set the character to 0 and use A as key, then the resulting ciphertext is the same as the plaintext). C:UsersmadhuDesktopcaesar 3.PNG Clicking on the Encrypt button opens a new window that contains the encrypted text. It becomes apparent that the letters have been shifted by 15 positions. So the word hello, is now wtaad C:UsersmadhuDesktopcaeser 6.PNG The plaintext version of this encrypted document can now be obtained by selecting crypt/decrypt again. In this dialog box which appears we now enter the key with which the document was encrypted (15). This time it has to be decrypted so decrypt button must be selected. Now the next step is to find the key using cryptanalysis. The plaintext window is made active by clicking on it. Now the entropy is selected via the menu selection Analysis/General/Entropy) C:UsersmadhuDesktopentropy.PNG Now the frequency distribution of the letters is calculated. The histogram of the encrypted document letter frequencies have been shifted by 15 positions. That means the encryption algorithm is not secure. Moreover Z shifts the text by 26 positions so that the encrypted text is actually identical with the unencrypted text. Hence there are really only 25 keys. The Caesar encryption algorithm can be broken easily by a ciphertext only attack. To perform such an attack, restore the window containing the encrypted text to the window and select Analysis/ciphertext only/ Caesar. The text will automatically be analyzed. By analyzing the superposition it is possible to discover the key which was used to encrypt this document. In this case it was the letter P. When the decrypt button is clicked the plaintext appears, i.e. the text that has been decrypted with the key p that was discovered. So the cryptool successfully found the key with which the document has been encrypted. C:UsersmadhuDesktopcaesar 8.PNG Analysis of Caesar Cipher Advantages Very easy to use The encryption and decryption can be done very quickly Disadvantages The encryption and decryption algorithms are known There are only 25 keys to try The language of the plaintext is known and easily recognizable. Applications It was used biblical times can be found on the back of Mezuzah where it encrypts the name of the god. During the First World War the Russian army used this method to relay messages to troops. It is used as an application in the Android version 1.4.0 Polyalphabetic Cipher In polyalphabetic substitution, each occurrence of a character may have a different substitute. The relationship between characters in the plaintext to a character in the ciphertext is one-to-many. For example, a could be enciphered as D in the beginning of the text, but as N at the middle. Polyalphabetic ciphers have the advantage of hiding the letter frequency of the underlying language. Eve cannot use single letter frequency statistic to break the ciphertext. To create a polyalphabetic cipher, we need to make each ciphertext character dependent on both the corresponding plaintext character and the position of the plaintext character in the message. This implies that our key should be stream of subkeys, in which each subkey depends somehow on the position of the plaintext character that uses that subkey for encipherment. In other words, we need to have a key stream k= (k1,k2,k3.) in which ki is used to encipher the ith character in the plaintext to create the ith character in the ciphertext. Playfair Cipher Playfair cipher is the example of polyalphabetic cipher. The secret key in this cipher is made of 25 alphabet letters arranged in a 55 matrix (letters I and J are considered the same when encrypting). Different arrangements of the letters in the matrix can create many different secret keys. One of the possible arrangements is shown below L G D B A Q M H E C U R N I/J F X V S O K Z Y W T P Before encryption, if the two letters in a pair are the same, a bogus letter is inserted to separate them. After inserting bogus letters, if the number of characters in the plaintext is odd, one extra bogus character is added at the end to make the number of characters even. The cipher uses three rules for encryption If the two letters in a pair are located in the same row of the secret key, the corresponding encrypted character for each letter is the next letter to the right in the same row (with wrapping to the beginning of the row if the plaintext letter is the last character in the row). If the two letters in a pair are located in the same row of the secret key, the corresponding encrypted character for each letter is the letter beneath it in the same column (with wrapping to the beginning of the column if the plaintext letter is the last character in the column). If the two letters in a pair are not in the same row or column of the secret, the corresponding encrypted for each letter is a letter that is in its own row but in the same column as the other letter. The playfair cipher meets the criteria for a polyalphabetic cipher. The key is a stream of subkeys in which the subkeys are created two at a time. In playfair cipher, the key stream and the cipher stream are the same. This means that the above mentioned rules can be thought of as the rules for creating the key stream. The encryption algorithm takes a pair of characters from plaintext and creates a pair of subkeys by following the above mentioned rules. We can say that the key stream depends on the position of the character in the plaintext. Position dependency has a different interpretation here the subkey for each plaintext character depends on the next previously neighbour. If P= P1, P2, P3 C= C1, C2, C3. K= [(k1, k2), (k3, k4) ] Encryption: Ci = ki Decryption: Pi = ki Example: keyword is PLAYFAIR P L A Y F I R E X M B C D G H J K N O S T U V W Z ENCRYPT: hide the gold underground plaintext HI DE TH EG OL DU ND ER GR OU ND ciphertext BM ND ZB XD KY CV VN XE CX KW VN DECRYPT: DMYRYKEVGHWGNGPXM ciphertext DM YR YK EV GH WG NG GP XM plaintext HE LX LO AN DG OX OD BY EX Message: Hello and Goodbye. Cryptanalysis of a Playfair Cipher Brute force attack on a playfair cipher is very difficult. The size of the key domain is 25! (Factorial 25). In addition, the encipherment hides the single letter frequency of the characters. However, the frequencies of diagrams are preserved. So a cryptanalyst can use a ciphertext-only attack based on the diagram frequency test to find a key. Analysis of playfair Advantages The main advantage of the system is it robs a cryptanalyst as they are no longer looking for recurring encoding as in an letter e can be encrypted as different letter each time. Playfair was long time considerably unbreakable. There are 26 letters so it is 26*26=676 diagrams which are quiet difficult to break. Disadvantages Still leaves much of the language structure Frequency distribution of letters Few 100s of ciphertext letters are enough for cryptanalysis. Applications Playfair cipher was used by British army during World War 1. When John F. Kennedys PT-109 was sunk by a Japanese controlled plum pudding island and was able to send an emergency message in playfair from an allied coast watchers hut to arrange the rescue of the survivors from his crew. Playfair crossword by Beetlejuice is an example puzzle using playfair as a gimmick. Vigenere Cipher Vigenere cipher made an immediate success as a field cipher. This type of polyalphabetic cipher was designed by Blaise de Vigenere, a sixteenth century French mathematician. A vigenere cipher uses a different strategy to create the key stream. The key stream is a repetition of an initial secret key stream of length m, where we have 1 P= p1p2p3.. C= c1c2c3 K= [(k1,k2,k3km),(k1,k2,k3km),] Encryption: Ci= Pi+Ki Decryption: Pi= Ci-Ki One important difference between the vigenere cipher and the other polyalphabetic ciphers is that the vigenere cipher key stream does not depend on the plaintext characters; it depends only on the position of the character in the plaintext. In other words the key stream can be created without knowing what the plaintext is. Example mathematically She is listening this message should be encrypted using the keyword PASCAL. plaintext s h e i s l i s t e n i n g P values 18 7 4 8 18 11 8 18 19 4 13 8 13 6 key 15 0 18 2 0 11 15 0 18 2 0 11 15 0 C values 7 7 22 10 18 22 23 18 11 6 13 19 2 6 Ciphertext H H W K S W X S L G N T C G Another way to look at viginere ciphers is through what is called a Vigenere Tableau. The first row shows the plaintext character to be encrypted. The first column contains the characters to be used by the key. The rest of the tableau shows the ciphertext characters. To find the ciphertext for the plaintext she is listening using the word pascal as the key, we can find s in the first row, p in the first column, the cross section is the ciphertext character H. We can find h in the first row and A in the second column, the cross section is the ciphertext character H. The same method should be followed until all the ciphertext characters are found. C:UsersmadhuDesktoptable.PNG Vigenere Tableau Cryptanalysis of Vigenere Cipher Vigenere ciphers do not preserve the frequency of characters. The cryptanalysis here consists of two parts for finding out the length of the key and finding the key itself. Several methods has been devised to find the length of the key but one method called kaisiski test, the cryptanalysis searches for repeated text segments, of atleast three characters, in the ciphertext. Suppose that two of the segments are found and the distance between them is d. The cryptanalyst assumes that d/m where m is the key length. If more repeated segments with distances d1,d2,d3.dn then gcd (d1,d2,d3,..dn)/m. This assumption is logical because if two characters are the same are k*m (k= 1,2,) characters part in the ciphertext. Cryptanalyst uses segment of at least three characters to avoid the cases where the character in the key are not distinct. After the length of the key is found, the cryptanalyst uses the idea of dividing the ciphertext into m different pieces and applies the method used to crypt analyze the additive cipher, including the frequency attack. Each ciphertext piece can be decrypted and put together to create the whole plaintext. Vigenere Cipher Using Cryptool To perform vigenere cipher encryption a new document is opened and then the encryption and decryption is performed. C:UsersmadhuDesktopvin1.PNG This plaintext document is encrypted using the vigenere encryption algorithm by selecting the keys crypt/decrypt/vigenere following which another dialog box appears. C:UsersmadhuDesktopvin3.PNG By clicking on the Encrypt button opens a new window that contains the encrypted text. C:UsersmadhuDesktopvin2.PNG The plaintext of this document can now be obtained by selecting crypt/decrypt/vigenere. In the dialog box which appears then where the key with which the document was encrypted. This time the document is to be decrypted. Therefore the decrypt button must be selected. C:UsersmadhuDesktopvin3.PNG By clicking on the decrypt button the plaintext document appears immediately. C:UsersmadhuDesktopvin4.PNG To find the key with which the document was encrypted. Restore the encrypted document window and then select analysis/ciphertext only/vigenere, following with which the text will automatically be analyzed. C:UsersmadhuDesktopvin5.PNG It is possible to work out the key length from the regular peaks in the autocorrelation. It is correctly calculated at 6 characters. C:UsersmadhuDesktopvin6.PNG When the continue button is clicked, another dialog box opens to display the key that has been computed. C:UsersmadhuDesktopvin7.PNG By clicking on the decrypt button the dialog box disappears and another window opens which contains the plaintext. C:UsersmadhuDesktopvin8.PNG Hill Cipher Hill cipher is invented by Lester S. Hill. This polyalphabetic cipher divides the plaintext into equal size blocks. The encrypted one at a time in such a way that each character in the block contributes to the encryption of other characters in the block. Hill cipher belongs to the category of ciphers called block ciphers. C1= (+ + ) mod 26 C2= (+ + ) mod 26 C3= (+ + ) mod 26 The encryption algorithm takes m successive plaintext letters and substitute for them m ciphertext letter. The substitution is determined by m linear equations in which each character is assigned a numerical value (a=0, b=1,c=2, ..z=25). This can be expressed in terms of column vectors and matrices = mod 26 C = KP mod 26 where C and P are column vectors representing the plaintext and ciphertext. K is the encrypting key. Example for Hill Cipher: Plaintext: pay more money Key (K) = C = KP mod 26 = mod 26 = = LNS For plaintext pay, ciphertext is LNS. The entire ciphertext is LNSHDLEWMTRW. For the decryption of the hill cipher is done using the inverse of the matrix K. Cryptanalysis of Hill Cipher Ciphertext-only attack on hill cipher is difficult. Even brute force attack on a hill cipher is extremely difficult because the key is an m*m matrix. Each entry in the matrix can have one of the 26 values. At first glance, this means that the size of the key domain is. Secondly the hill ciphers do not preserve the statistics of the plaintext. Frequency analysis cannot be run on single letters, diagrams and trigrams. A frequency analysis of words of size m might work, but this is very rare that a plaintext has many strings of size m that are the same.

Thursday, September 19, 2019

Science Terminology :: essays research papers

1.  Ã‚  Ã‚  Ã‚  Ã‚  Active transport- The movement of a chemical substance through a gradient of concentration or electrical potential in the direction opposite to normal diffusion, requiring the expenditure of energy: active transport across a cell membrane. 2.  Ã‚  Ã‚  Ã‚  Ã‚  Cell- The smallest structural unit of an organism that is capable of independent functioning, consisting of one or more nuclei, cytoplasm, and various organelles, all surrounded by a semi permeable cell membrane. 3.  Ã‚  Ã‚  Ã‚  Ã‚  Cell membrane- The semi permeable membrane that encloses the cytoplasm of a cell. 4.  Ã‚  Ã‚  Ã‚  Ã‚  Cell theory- a theory in biology that includes one or both of the statements that the cell is the fundamental structural and functional unit of living matter and that the organism is composed of autonomous cells with its properties being the sum of those of its cells 5.  Ã‚  Ã‚  Ã‚  Ã‚  Cell wall- a theory in biology that includes one or both of the statements that the cell is the fundamental structural and functional unit of living matter and that the organism is composed of autonomous cells with its properties being the sum of those of its cells Chloroplast- A chlorophyll-containing plastid found in algal and green plant cells. 6.  Ã‚  Ã‚  Ã‚  Ã‚   Chromatin- A complex of nucleic acids and proteins, primarily histones, in the cell nucleus that stains readily with basic dyes and condenses to form chromosomes during cell division 7.  Ã‚  Ã‚  Ã‚  Ã‚  Chromosome- A threadlike linear strand of DNA and associated proteins in the nucleus of eukaryotic cells that carries the genes and functions in the transmission of hereditary information. 8.  Ã‚  Ã‚  Ã‚  Ã‚  Concentration- The amount of a specified substance in a unit amount of another substance. 9.  Ã‚  Ã‚  Ã‚  Ã‚  Cytoplasm- The protoplasm outside the nucleus of a cell Cytoskeleton- The internal framework of a cell, composed largely of actin filaments and microtubules. 10.  Ã‚  Ã‚  Ã‚  Ã‚  Diffusion- The spontaneous intermingling of the particles of two or more substances as a result of random thermal motion. DNA- A nucleic acid that carries the genetic information in the cell and is capable of self-replication and synthesis of RNA. DNA consists of two long chains of nucleotides twisted into a double helix and joined by hydrogen bonds between the complementary bases adenine and thymine or cytosine and guanine. The sequence of nucleotides determines individual hereditary characteristics. 11.  Ã‚  Ã‚  Ã‚  Ã‚  Endocytosis - A process of cellular ingestion by which the plasma membrane folds inward to bring substances into the cell. Endoplasmic reticulum- A membrane network within the cytoplasm of cells involved in the synthesis, modification, and transport of cellular materials. 12.  Ã‚  Ã‚  Ã‚  Ã‚  Eukaryote- A single-celled or multicellular organism whose cells contain a distinct membrane-bound nucleus. 13.  Ã‚  Ã‚  Ã‚  Ã‚  Exocytosis - A process of cellular secretion or excretion in which substances contained in vesicles are discharged from the cell by fusion of the vesicular membrane with the outer cell membrane.

Capital Punishment Essay -- essays research papers

More than 4,300 people have been executed in the United States since 1930. There is no way of knowing how many people have been executed in the United States because executions were once a public affair with no central agency keeping track of them. In addition to these judicialy imposed actions, there were 4,730 recorded lynchings by vigilantes in the U.S. with most being publicly displayed. Some people, such as Pope Johm Paul II believe that these punishments are cruel and outright evil. While on the other hand, many feel that these actions taken are well deserved, like Missouri’s Gov. Mel Carnahan who has allowed 22 men to be executed during his 7 years in office. I believe that Capital Punishment is a neccesity in our society being that the crime fits the punishment, such as murder and rape.   Ã‚  Ã‚  Ã‚  Ã‚  Many offenders of these malicious crimes often end up being released out into society only to be back on the same track of mischief. Eighty percent of first time violent sexual offenders, such as kidnapping rapist and child molesters, commit the same crimes again after their release from prison (where they had zero rehabilitaion). The average time served by first time kidnapping rapist and child molesters is 4 ½ years. In 4 ½ years they’re terrorizing children once again. If these repeat offenders would have been terminated, we would not have to worry about them roming our streets once again.   Ã‚  Ã‚  Ã‚  Ã‚  With the high rate of crime we have...

Wednesday, September 18, 2019

Fiber-optic Communications :: Fiber-optic essays

  Ã‚  Ã‚  Ã‚  Ã‚  In 1987, both Eli Yablonvitch and Sajeev John got together to discuss research that both had previously discovered. Eli Yablonvitch was an electrical engineer at Bell Communications Research in Red Bank, New Jersey. Yablonvitch was known for refining a laser that would become a mainstay of fiber-optic communications. Sajeev John is a Harvard graduate student who worked on a thesis inspired by Philip Anderson of Princeton.   Ã‚  Ã‚  Ã‚  Ã‚  The two agreed that the name of their idea should be called a photonic band gap. Phontonic crystals have the regular lattice structure of natural crystals. Their purpose is to try and trap light without destroying it. The trick is to not kill the photons but to tame them, by allowing light out when you want. Microchips are made of semiconductors and a semiconductor is a band gap. A band gap makes is possible to control the flow of electricity in a chip. In order to make light chips, you need the photonic equivalent of silicon: a material that can trap light. â€Å"You need a way of trapping the light so there are no escape channels,† says John.   Ã‚  Ã‚  Ã‚  Ã‚  It was until 1997, when European investigators succeed in trapping light in a random material. Diederik Wiersma and his colleagues used a powder of gallium arsenide. The laser could not penetrate a layer of powder even when the layer was less than a hundredth of an inch thick. It was indeed the very first time that anyone had trapped light, but as they knew, microchips cannot be made out of powder.   Ã‚  Ã‚  Ã‚  Ã‚  Yablonovitch was in his office on day in October 1986, â€Å"I started drawing crisscrossing lines, and everywhere the lines crossed I put a heavier mark. Before I knew it I had drawn a checkerboard. And then I said, ‘Well, I might as well do it in three dimensions.’† This later became known as Yablonovitch’s â€Å"eureka moment.† He realized that what he had drawn was a crystal structure that might trap light through interference. Interference happens when two light waves of the same wavelength meet.   Ã‚  Ã‚  Ã‚  Ã‚  The Bragg reflection is when light waves pass through one plane but is reflected back by the next plan. All waves that interfere constructively intensify the reflected light. Yablonovitch found that if you could design a crystal that Bragg-reflected light now which direction is was coming from, you would have built a trap.

Tuesday, September 17, 2019

Jerry Maguire Essay

Students must secure (purchase, rent, or borrow) and view a copy of Jerry Maguire to answer the following questions 1. Describe Jerry Maguire’s job and describe what this type of position entails. Jerry Maguire is a sports agent a person who negotiates employment and endorsement deals for an athlete. For their services, the agent receives a commission, which usually runs between 4 and 10 percent. The agent also may assist in public relations and all aspects of his client’s finances. Our text states a few of the other responsibilities of the agent are; †¢ Determines the value of the players services †¢ Convinces a club to pay the player the aforementioned value †¢ Develops the package of compensation to suit the player’s needs †¢ Protects the player’s rights under contract †¢ Counsels the player about post career security, both financial and occupational †¢ Finds a new club upon the player’s free agency †¢ Assists the player in earning extra income from endorsements, speeches, appearances, and commercials †¢ Advises athletes on the effect of their personal conduct on their career (p 26) According to Wikipedia, a sports agent helps market athletes or products associated with that athlete to promote an athlete’s career. Agents are responsible for communications with team owners, managers, coaches, and other individuals. Primarily, agents are used to broker and negotiate contracts for their clients. Also, they are responsible for making recommendations in regards to the athlete’s options. In addition to finding income sources, agents often handle public relations matters for their clients. In some large sports agencies, such as IMG, Creative Artists Agency, and Octagon, agents deal with all aspects of a client’s finances, from investment to filing taxes. Sports agents may be relied upon by their clients for guidance in all business aspects, and sometimes even more broadly. For example, hockey agents start recruiting clients as young as 15, allowing the agent to guide the athlete’s career before the NHL draft, which happens usually at 18 years of age. Due to the length and complexity of contracts, many sports agents are lawyers or have a background in contract law. Agents are expected to be knowledgeable about finance, business management, and financial and risk analysis, as well as sports. It is important for a sports agent to follow trends in sports. Other skills an agent must possess are excellent communication and negotiation skills. Agents must be highly motivated, willing to work long hours, and have the ability to multitask. It is very common for agents to be in negotiations on behalf of several clients at one time. Some agents are part of large companies, and some are on their own. The number of clients an individual agent can handle and how many clients his or her employing agency can handle in total are interdependent variables. Before the 1990s, most soccer players did not use agents. In some cases, they used their fathers as agents. Due to most parents’ naivetà © about the football business, these young footballers were often given less-than-stellar contracts by football clubs, which yielded lower salaries than they thought they deserved. In Sweden, there were only three licensed agents in 1995. As of 2002, there were 33. According to FIFA, there were 5,187 licensed association football agents world-wide, with 600 agents in Italy alone. Since 2001, agents have not been licensed by FIFA. Instead, agents are now licensed directly by each association. http://en.wikipedia.org/wiki/Sports_agent 2. Why has the bargaining power of athletes increased so much in the past 40 years? The sports industry is experiencing tremendous growth, and sports’ marketing  is playing an important role in this emerging industry. Sports marketing will continue to grow in importance as sports become more pervasive in the U.S. culture and around the globe. The growth is identified in a number of ways; the number of spectators, the growth of media coverage, increase in sport participation, rising employment opportunities, and the growth in sports internationally. (p31) Based on this it is my opinion that the bargaining power of athletes have increased because demand has increased. 3. The competitive nature of the sports agency business is real. Name five of the top agencies and show the source of your information (i.e. www†¦). †¢ Creative Artists Agency: â€Å"CAA† – acquired various pieces of the sports agency business of SFX (see below), starting with football. †¢ IMG – International Management Group – corporate agency established by entrepreneur Mark McCormack, originally with a specialization in golf and tennis. After the death of McCormack the company was acquired by private equity group Forstmann Little. †¢ International Sports Management – British sports agency run by former European Tour golfer Andrew â€Å"Chubby† Chandler.[27] †¢ Octagon Worldwide – Full-service sports agency and event marketing group, traded with advertising and marketing companies in the Interpublic Group. †¢ Priority Sports and Entertainment- Agency representing the most NBA players, run by Mark Bartelstein. †¢ Rosenhaus Sports- sports agency run by Drew Rosenhaus. †¢ Sports Management Worldwide – (SMWW) – global sports agency founded by Dr. Lynn Lashbrook. †¢ Wasserman Media Group: acquired Arn Tellem’s basketball agency from SFX, and usually represents the most players in NBA lottery draft each year. I don’t know if these are the top five but there are quite a few of these names that keep popping up. http://en.wikipedia.org/wiki/Sports_agent 4. Complete an Internet search of the Sports Agent career and describe how one could/should build a career in this industry (include source). Instructions 1. Pick an undergraduate degree program in sports management. These courses will prepare you for most jobs in the sports agent field. Most professional leagues require at least a four-year degree from an accredited university. Take as many business management and entertainment or sports law courses as you can during your education. 2. Determine what sport you want to be an agent in. Understand that the National Football League requires that sports agents hold a post-graduate degree in sports management, human relations, business management, personal finance or a related field. Check with the league or professional sports organization you aspire to work for to understand specific qualifications. 3. Find out about the various qualifications for sports agents in your preferred field. Each potential agent should have information regarding educational requirements, sports league rules, salary information, recruiting information, certification fees and membership costs. 4. Seek certification information on the league or professional organization in which you wish to work. Most leagues require some kind of certification, including the National Basketball Association (NBA), National Football League (NFL) and Major League Baseball (MLB). 5. Study for the certification test for the league or organization you wish to join. Each organization will have resources for certification courses that can help you prepare for the exam. 6. Pay the certification fee and take the respective exam of the organization you aspire to be certified in. 7. Obtain liability insurance, as this will be extremely important in your sports agent career. Some organizations require this of agents, while others do not specify it. Having it will be beneficial in searching for clients and ensure your own legal security on the job, 8. Meet as many agents, players, coaches and media figures as you can. Networking is a huge part of the sports industry and the best agents know how to sell themselves to players to gain clients. Get a good business card and give it to anyone that could be a potential client or lead you to a potential client. 9. Search for internships or entry-level positions at an agency or at the sport organization where you wish to work. Internships can be an excellent way to meet potential clients and since you will already be certified, you can immediately start to network yourself as a potential representative. 10. Start attending college and even high school sporting events in your area and scouting potential clients who may be in need of representation. Securing a client early will (if they are talented) help you build a name. Make sure you stay within the guidelines of district or National Collegiate Athletic Association (NCAA) regulations for scouting. Read more: Steps for How to Be a Sports Agent | eHow.com http://www.ehow.com/how_6755412_steps-sports-agent.html#ixzz2AWCVixFe 5. Locate and list five of the top sports agents (include source). Scott Boras – Scott Boras Corporation Arn Tellem – WMG Management Tom Condon – CAA Sports Drew Rosenhaus – Rosenhaus Sports Don Meehan – Newport Sports Management The top five that I found were from askmen.com but I do not know trustworthiness of this information. I did read on these five and they do have some big names behind them. http://www.askmen.com/top_10/sports/top-10-sports-agents_10.html Another site I visited had Arn Tellem, Bill Duffy, Tom Condon, and Tom Reich as the top agents. http://www.become-a-sports-agent.com/career.asp Shank, D. Matthew. Sports Marketing, A Strategic Perspective. 4th Ed. New Jersey: Pearson Prentice Hall, 2009. Print.

Monday, September 16, 2019

Mte 506 Observation Analysis

Classroom Observation Analysis Research Paper Della Armstrong University of Phoenix/MTE 506 November 12, 2012 Kathleen Sherbon Classroom Observation Analysis Research Paper Education theory can either be descriptive like the sciences or normative like in philosophy. Education theory postulates what education processes are supposed to consist of; it sets the standards, norms, and goals in carrying out an education process. The scientific education theory gives a set of hypotheses, which have to be experimented and verified.The two approaches have produced two broad categories of education theories, which are the functionalist’s theory of education arising from the Sociological perspective of education and the behaviorist theory of education from the psychology of education. I will conduct an observation Analysis in an Elementary classroom to observed teachers and students as they work using the education theory. Introduction Many instructional approaches exist that have been de veloped to reach more students. Teachers have to select the instructional approaches that work best for students.These approaches have been tested and researched from various theoretical perspectives. An education theory is the speculative thought or education and just like any other theory, it explains, guides, and describes the practices of education. The earliest speculation on educational processes began during the times of classical sophists Greek philosophers. Current education speculations use terms like and rogogy, curriculum, learning pedagogy, education organization, leadership, and policy. Education thought is derived from various disciplines like, philosophy, sociology, critical theory, psychology, and history among others.This paper will discuss five topics based on the best education theory to be applied in the classroom setting with focus on two education theories postulated by Gardner and Sternberg. This paper will also address information processing by students, beh aviors of teachers to promote thinking, implications of language development on learning and teaching, and on the relationship between the emotional and social development on student behavior and learning. On November 10, 2012, I went to Park Elementary/Middle School and conduct an Analysis Observation with a first grade teacher (Mrs. C. Turner). There were twenty students in this class.The ratio was consisted of 12 girls to 8 boys. All of the children were African American except two of the students. There were two white girls in this class. This school is placed on academic probation because the school did not do well on their school performance test. This school has an â€Å"F† because too many children failed the ILEAP Test. My reason for choosing this school is because I wanted to know why this school was not improving on their school performance and test scores. The observation was conducted in Mrs. Turner’s class. Mrs. Turner teaching grade first; I observed two subjects (English and Spelling) on that they.Evaluate the Application of Educational Theories in the Classroom Setting Which Educational Theories Were Employed? There seems to be a continuum of intelligence and ending with Gardner’s multiple intelligences (Bee & Boyd, 2010). The standard IQ test only measures the intellectual and academic dimensions of intelligence and Gardner’s multiple intelligences proposes eight separate domains of intelligence each with their strategies for measurement. On this continuum the teacher went so far as to employ the precepts of Sternberg’s triadic theory of intelligence, but not so far as to try and cover Gardner’s Multiple Intelligences.I observed the class on Friday, so it was test day. There was a language comprehension test and a spelling test. Both tests specifically gauge intellectual ability to the absence of any type of measure about practical or creative intelligence. However, after the tests the students were a sked to color, cut out, and paste a large pumpkin to their folders (creative), and then the teacher had a story time where the class talked about the dangers of lightning (practical). Which Educational Theories Could Have Been Used to Better Enhance Instruction and Learning?As per Gardner’s multiple intelligences, the naturalistic and intrapersonal aspects of intelligence were those that were addressed the least in the class I observed. The class is almost entirely indoors-only having outside time at the playground-so there no time to develop the ability to recognize patterns in nature. I think the teacher tries to compensate by covering activities that invoice nature themes, such as the lightning worksheet, but there is only so much of nature that can be studied in the air conditioning, under fluorescent lights.Also, there was very little development of intrapersonal intelligence. The teacher mostly relied on consequences as a means to control behavior rarely trying to devel op the personal strengths and goals of the students. I also believed that the teacher could have used constructivism; to better enhance instruction and learning. Constructivism is â€Å"that learning is meaning, it is reflecting on experienced† (Educational Theories, November 2012). Mrs. Turner could have enhanced lesson to incorporate real life connections to the students to make it meaningful for them.Also, she could have had students predict what was going to happen next in the story. The teacher could have asked the students who were the main characters in the story. What do they think the title is going to be about? How do they think the story is going to end? How practical is the Application of Educational Theories in the Classroom? I think that the application of Sternberg’s tri-archaic theory is extremely practical. Public School already attempts to cover all three domains of intelligence through the use of band, athletics, music, art, workshop, and work-study programs.I think that some of the areas of Gardner’s multiple intelligences might be outside the prevue of public education, such as naturalistic intelligence or intrapersonal intelligence. Both of these areas of intelligence require a large investment of time to develop properly and require special circumstance to be implemented adequately. For instance, a naturalistic education would in clue a lot of time in nature itself, which goes again the classroom environment of current-day education. Also, intrapersonal development requires quite a bit of alone time to think, which is not readily available in a classroom environment of current-day education.Also, Intrapersonal development requires quite a bit of alone time to think, which is readily available in a classroom setting. Also, it is very practical to apply educational theories in the classroom like constructivism, behaviorism, and the social learning theory. A teacher can use a combination of educational theories in a cla ssroom. The teacher can build upon the student’s knowledge and emphasize problem solving and the teacher can also use the Social Learning Theory with modeling. The teacher can model the behavior to the student and use positive and negative reinforcements with behaviorism.Even though, the teacher did use Gardner’s Multiple Intelligence in the classroom. Gardener’s theory â€Å"has eight domains of intelligence† (Linguistics Logical, Spatial, Bodily Kinesthetic, Musical, Interpersonal, intrapersonal, and Naturalistic) according to Bee and Boyd, (2010). The different types of intelligence can be used in daily lessons throughout the day. Describe The Application of Information Processing to Student Learning? How Does Theory of Information Processing Apply to Student Learning?There appear to be two forces at work when discussing the application of information processing: 1) innate ability; 2) acquired knowledge (Bee & Boyd, 2010). So, a large volume of acquire d knowledge can compensate for a lower IQ but only to a point. An expert with a higher IQ; will still performance better than an expert with a middle or low IQ. As this applies to student learning, children with lower IQ, and therefore less effective and efficient strategies for processing information must acquire a largely body of information on a given subject before they can perform as well on testing as students who have higher IQs.How Does the Classroom Environment Affect Information Processing and Learning for Adolescents? Information processing theory also explains that, â€Å"children are born with some basic, in born cognitive strategies [that] change during the early years of life, with more complex ones emerging and old, ones being used more flexibly† (Bee & Boyd, 2010. p. 197). The text goes on to explain that as adolescents engage more in a particular activity, say building blocks, they develop more complex and efficient ways of accomplishing their creative goals .The classroom environment should foster development of these complex cognitive strategies. There needs to be a repetitive assortment of tasks that are geared towards building the same cognitive strategies, such as when a spelling word is studied by writing it, reading it, putting it in a sentence, drawing a picture of it, defining it, and then acting it out. In this way repetition can bread cognitive development. Compare Adolescent Student Learning in a Social Environment and on Educational Environment. Which are More Conducive to attention and Memory?Willingham (2007) makes it clear that attention is a finite, cognitive resource that can only process a limited amount of information at a time. In particular, it is important to realize that refractory period exists between the firing of neurons during which no new attention stimuli can be chosen. In social situations there is usually more than one stimulus competing for the attention of and individual; whereas, in a classroom attent ion is directed to one stimulus-the teacher. This would seem to dictate the educational environments are more conducive to attention than social situations.Furthermore, Willingham posits that secondary memory is encoding, stored, and retrieved along semantic lines. As this pertains to adolescent student learning, it is important for new information to be connected new to pre-existing information. Rote memorization is not as effective as learning information through rhymes or saying or through stories, since all of these involve connecting new information to existing information. Social situations would seem to have the upper hand here, since the social environment provides a context for learning that builds upon existing peer relationships and shared experience.Whereas some of this is presented in the classroom setting it is between the teacher and the students, but only to a lesser degree. Evaluate Teacher Behaviors That Promote Student’s Thinking Abilities What Teacher Beha viors Did You Observe That Facilitated Student Comprehension and Reasoning? There was one activity in Particular that I think facilitated student reasoning: the teacher held two objects in each hand and asked the class which one weighed the more. The teacher would then put the objects on each side of a scale and find out which one was heavier.Then the class would hypothesize about why they were wrong or right. This teaches students that objective information can be determined quite separate from subjective opinions and estimations. Estimations are only useful as long as scientific instrumentation is not present to determine objective facts. On the subject of comprehension, they took a comprehension, test. It was apparently design to measure grammatical and spelling skills. It was a list of sentences with a blank and multiple choice answers. The students had to read the sentence and decide which word best fit-in- the blank.I was astonished that the exercise had several trick question s and questions that could have two possible answers. I believed the teacher designer of the sheet was trying to teach the students how to think, rather than how to find the right answer. Why Did These Teachers Behaviors Positively Affect Students’ Thinking Abilities? Both of these activities were designed to cause the students to think. When I was in school teachers were concerned with how to teach us to get the right answer. We had just started state standardized tests and we had learned a lot of multiple choice strategies.However, in the class I observed there were many times multiple right answers and the teacher didn’t just want to know the right answer she wanted to know how the students got the right answer. The weight questions were particularly positive, since it forced the children to confront their deficits in conservation with scientifically determinable facts. This lesson translates into all kinds of cognitive advancements: different height glasses can hav e the same amount of water (volume) and different sized objects can have the same weight (density). Which Teacher Behaviors Impeded Student Comprehension and Reasoning?The spelling test was, I believed, the least productive. It was based on the rote memorization model of learning, in that the student had to hear the word and write it on a piece of paper. Some students do not learn this way and do not regurgitate information this way. There are children that are audio learners and they should be allowed to recite the spelling of the word. Some of the students had a very hard time writing the spelling, words, not because they didn’t know the word, but because they have a hard time translating the audible letters of the word into the written letters of the word.Why Did The Teacher Behaviors Negatively Affect Students’ Thinking Abilities? The teacher behaviors negatively affect students’ thinking abilities because the students wanted to get a 100% on their spelling test to be able to get a prize out of the prize box. This auditory/visual deficiency also speaks to the inverted-relationship between stimulation and performance. As stimulation increases (social pressure, teacher pressure, and peer pressure to make a good grade on the test), so performance on the test increases; however, there is a cutoff beyond which simulation begins to effect performance negatively.The students were motivated to get a 100% on their spelling test, because their teacher added increase pressure by adding a reward to the performance on the test. This affected the grades on their spelling test making the students to perform negatively, since the stimulation was too much for these students. Analyze The Implications of Language Development Affect Teaching? How Does Delayed Language Development Affect Teaching? â€Å"Delayed language development seems to be the result of a defect in fast-mapping processes and a poor receptive language† (Bee& Boyd, 2010).As with m any other types of cognitive development component to language assimilation, acquisition they have. In the case of school education, this would mean that persistent reading can compensate for any biologically or environmentally caused deficits in language development can be used of phonic approach that translates specific letters into sounds and vice-versa. Since poor language learners have a problem with letter- sound combinations, this approach should overcome that obstacle. Lastly, it is paramount that the reading program for the students be flexible and responsive to the student’s linguistic needs.If pa phonic approach is not working well, then maybe a reading comprehension-learning the words as part of phrase or sentence-approach would work better. How Does Language Development Affect Learning in Children And Adolescents? The systematic and explicit phonics approach to language instruction stipulates â€Å"that the lessons should move from simple words to more complex w ords in an explicit manner that emphasizes the letter-sound correspondence† (Bee & Boyd, 2010). On the other hand, the whole langrage approach seeks to teach language through the meaning and context of the word rather than the actual structure of the word.This avenue tries does not explicitly teach letter-sound correspondence unless the student has specific questions about how the sound work. Last, the balanced approach to language learning pursues a bi-lateral means of instruction, making use of both of the systematic and the whole language approach. They argue that it is important to develop a love of reading in children through the efficient uses of phonics. Language development has a large impact on reading comprehension. After all, the meaning of a complex sentence cannot be derived without first understanding the subsidiary words and grammar of the sentence.Moreover, reading comprehension helps with writing abilities of the students as well. Conclusion Finally, the five topics based on education theory have been explained and the teacher and the students were observed; and I believed that educational theories were conducted in Mrs. Turner’s second grade class. References Bee, H. , & Body, D. (2010). The developing child (12th ed. ) Boston, MA: Allyn & Bacon. Education Theories. http://crescentok. com/staff/jaskew/isr/education/theories. htm. Retrieved November 10, 2012. Willingham, D. T. (2007). Cognition: The thinking animal. New York, NY: Pearson Prentice Hall.