Saturday, August 31, 2019

Biocon †Case Assignment Questions Essay

1. Assuming Biocon receives approval for BIOMAb, should it launch the drug immediately or conduct phase 3 trials before launch? Elaborate the various elements of your action plan. If Biocon receives approval for BIOMAb, the management team will need to carefully consider what the best course of action is moving forward. If the company elects to launch the drug immediately, they will be able to have the first mover advantage, reaching the market before their closest competitor, Erbitux. BIOMAb will also be able to put themselves on the map as they would be the first ever, proprietary drug developed and marked by an Indian firm for Indian patients. The Indian regulatory authorities may also cause a lengthy Phase 3 trial due to their lack of experience with bringing a proprietary drug to market, as evidenced during BIOMAb’s Phase 2 trials. However, even with all of the above listed considerations in mind, Biocon should conduct the phase 3 trials before launching the BIOMAb. BIOMA b is a superior product to Erbitux, as shown in the 100% response rate when combined with chemo and radiotherapy. There are also fewer side affects, a more patient friendly treatment plan, and BIOMAb will be able to offer the drug at a discounted price. Even if BIOMAb is not able to be the first drug to the market, they will be able to make up for those potential loses in the long run. BIOMAb will be entering this marketplace for the first time, and the company will want to enter the market with as strong of a message as possible. BIOMAb is entering this market for the long run, and overcoming any perceptions of shortcuts, lack of quality, or anything less than cutting edge will last well beyond the life of the BIOMAb product. There are only 300 oncologists in this market Biocon cannot afford to miss. While awaiting Phase 3 approval, Biocon can roll out its direct sales force, offering its suite of generic oncology drugs. This waiting period will give the sales force an opportunity to develop roots in the marketplace and to raise awareness of BIOMAb before it is even on the market. The Phase 3 approval process will serve as an advantageous ramp up time so that Biocon is fully prepared to enter the marketplace on better footing with BIOMAb. This time will also enable Biocon to better develop the infrastructure they will need to  optimize its direct distribution channel. Biocon is a new player in bringing a new drug to the market and they will want to ensure that the quality of their product is maintained from the manufacturing floor into the doctor’s office. Assuming that BIOMAb indeed loses its first mover advantage, its value proposition will be its results, which are dependent on properly controlled product. Biocon wants to become a permanent fixture in this market and the company needs to do everything in its power to deliver its value proposition of innovation, quality, and affordability. 1. How big is the current and future market opportunity in BIOMAb? The current market opportunity that Biocon is currently targeting with BIOMAb is composed of the Head and Neck cancer patients within India. More specifically, Biocon is focused, in the short term, on those Head and Neck cancer patients that can afford to pay, estimated at 1,900 patients. These patients will be the ones officially marketed to, but given the Indian’s markets preponderance for using drugs â€Å"off the label†, the unofficial market can be target at all cancer patients in India that currently able to afford treatment, 7,114 patients. Given India’s continued economic growth rate (9% annually) and ever expanding population base (1.4%), all of the preceding numbers are certain to grow in the relatively short term. The compounded impact of these different rates will cause these India based estimates to grow exponentially year over year. In the long run, BIOMAb in India is just the tip of the iceberg. CIMAB and Biocon’s current joint venture is to develop and market the molecule on the Indian subcontinent. If Biocon is able to thoroughly manage and develop all aspects of the supply chain (manufacturing, distribution, sales, marketing, etc), Biocon would have good reason to go back to the negotiating table with CIMAB. The success of CIMAB’s other partner, YM Bioscience, is not guaranteed and there is no reason that Biocon cannot unseat them in the long run. If Biocon is able to achieve this, along with the Phase 3 trials, the worldwide Head and Cancer would be open to the company, to say nothing for the â€Å"off label† prescriptions. Given the worldwide population growth, economic expansion, and aging populations, the long-term market for BIOMAb is practically limitless. 3. Who is the buyer for BIOMAb? What is the decision making unit in this case? What are the benefits that each member of the decision making unit seeks from BIOMAb? The buyer for BIOMAb is (are) the income provider(s) of the family, whose member (s) has (have) been affected by head and neck cancer or another indication, since off-label usage is very common in India. The structure of India’s health care system is such that it is estimated that 95% of BIOMAb’s patients (end users) are going to be self-paying. Therefore, the cost of treatment will be transferred to the earning member of the family. Adult patients have the right to make treatment decisions for themselves, so patients and their families are the decision makers for BIOMAb in this case. As the case states, the oncology doctors are the main influencers, as they diagnose and make ultimate recommendations to their patients as to how extensive the treatment should be. The benefits that each member of the decision making unit (i.e. patients and their families) seeks include BIOMAb’s effectiveness in the treatment of head and neck cancer in conjunction with radio and che motherapy, minimal side-effects (immediate side effects, as well as those that might be associated with long-term use), and drug’s affordability. Should phase-2 trials be conducted by Biocon for other indications, the patients will also want to seek same benefits from the drug for other types of cancer. Based on the information provided in the case, BIOMAb’s effectiveness and minimized side effects are a given. After all, phase-2 trials proved that the tumor was killed 100% of the time when the drug was used in combination with radio and chemotherapy. Moreover, unlike competition, BIOMAb did not produce skin rashes because due to the drug’s unique formula. An important factor will be affordability. Wealth distribution is very uneven in India, and 1/4 of the nation’s population earns less than the government-specified poverty threshold of $0.40/day (Wikipedia). The patients, as well as their doctors, will want to make sure that they can afford to complete treatment to ensure best possible outcome. BIOMAb has a tremendous advantage in this category compared to Erbitux, as it calls for a definite (i.e. six-dose) treatment cycle; total treatment cost can thus be effectively quantified. Another benefit that  patients will be seeking is the ability of BIOMAb’s sales reps to educate them and their families. Although this is not one of the drug’s literal benefits, it will be a crucial factor since patients’ face time with doctors and specialists is very limited in India. Pre-educating end users and their families on the benefits, side effects, and other specifics of the drug will ensure that oncologists’ time with each patient is maximized. 4. Develop a detailed launch plan for BIOMAb. Provide your rationale for the product portfolio, pricing, channel, and communication decisions. Biocon’s launch of BIOMAb is complicated by several factors. The first of these is the lack of phase 3 clinical trials, which would theoretically provide more evidence of the drug’s efficacy and safety on a larger patient pool. This is complicated by the fact that BIOMAb’s competitor comes in the form of a drug called Erbitux, which does have phase 3 trials completed and global acclaim. Biocon’s fear is that if they do not launch before Erbitux, they will lose the first to market advantage they feel necessary to succeed. In this case Biocon should take the time to complete phase 3 clinical trials on the basis of what patients and their families expect from a cancer drug. It was already stated that Erbitux had worldwide acceptance due to having extensive trials not limited to head and neck cancer that proved it was b oth safe and effective. In the eyes of the consumer the single most important concern here is that the drugs are going to work and that death can be avoided. Being first to market has the risk of offering only a temporary advantage until Erbitux actually becomes available. At this point if phase 3 trials are finally completed and the results are not favorable there would be severe consumer backlash and possibly action from the government. Finally, Biocon mentioned being able to appeal to doctor’s via existing relationships in order to get their product sold. Realistically, doctors care more about clinical trials as a means of deciding what drugs to offer. By moving forward with phase 3 trials Biocon would have real data to give these doctor’s the â€Å"hard sell.† The strategy is not just to maximize profit, but build a sustainable brand built on trust and results in the pharmaceutical industry. Building upon that is the question of whether or not to sell generics in addition to BIOMAb and when to sell them. The argument given was that selling generics would give the sales force good experience and at the  same time build a solid revenue base. Biocon should indeed take this route for these very reasons. This will allow them to still bring in revenue while the phase 3 trials of BIOMAb take place. Once the trials are complete, selling them alongside BIOMAb will allow them to capture more of the market when in front of doctors who want to have offerings for price conscious patients. On top of the first two concerns is the issue of price and what impact it would have on both market size due to affordability and perceived quality in comparison to Erbitux. Biocon, after confirmation of the extraordinarily high effectiveness of BIOMAb should charge $6000-7000 per dose or rather whatever would be equivalent to a few steps more than Erbitux. Biocon’s CEO desires to build a brand not based on low price but rather the value provided by the products. The hindrance to this route of course is the Indian cultural perception of what the price should be and the fact that many people cannot afford such cost. However, Biocon is alread y well aware that their effective target market is small so for those people the price is potentially less important. However, Biocon can market the fact that it is a six dose treatment path rather than indefinite dosages like Erbitux so in the long term people save money. Additionally they can get creative here and offer something like Walmart’s layaway program. Patients can agree to pay in equal installments up until their dosing day. On that final day when payment is received they are administered the dose. Payments for the next dose begin and the cycle repeats until the dosage time. Additionally, Biocon is concerned about the sales methodology with regards to going through the usual channels of CFAs, wholesalers, and pharmacies or selling it directly to doctors. By going through the typical channels they have the advantage of reaching more doctors who have existing relationships with certain sellers. In this case though, it would fit more with their overarching strategy to sell direct. The higher cost of the drug would be less apparent when not being sold side by side with competitor drugs through a pharmacy or wholesaler. This would also allow Biocon to sell the generic drugs and BIOMAb side by side as a complete market solution for price conscious people. The savings from not having a middleman can be passed on to the doctors via multi-patient discounts or similar. Finally, the quality of the product could be ensured since BIOMAb requires such delicate handling. This is important for the Biocon brand image moving forward as  there can be no slip ups when it comes to delivering a product critical to treatment of cancer. The direct sales also tie in with overall marketing communication planning since Biocon would not only control distribution of the product, but also the sales communication. Biocon should take this time during sales to educate doctors on the results of the phase 3 trials and provide materials for patients that explain the availability of Biocon reps during their treatment cycles. Biocon reps, as mentioned in the case, should educate the patient on their product and provide other helpful cancer information and family services in the form of support group references, etc. 5. How has Biocon’s strategy and positioning evolved over the years? What role does BIOMAb play in Biocon’s overall strategy? Biocon’s strategy and positioning have greatly evolved over the years. The company started as an enzyme manufacturing company that exported its products from India to the United States and European food processing industry. During this time the company developed an expertise in various fermentation processes. The company soon realized that the global enzyme market was limited to about $1 billion and decided to change its strategy and position itself to compete in the biopharmaceutical market, which was a $10 billion dollar market that was rapidly approaching $80 billion. Biocon was positioned nicely to move into the space and compete in the generic drug sector. They were particularly positioned well to manufacture statins. Statins were a great fit for them because they were small molecules that were easy to manufacture and Biocon already p ossessed the technical capability to do so drawing on its strength in the fermentation process and enzyme manufacturing. This short-term strategy to enter the market focused on developing globally competitive processes that relied on their existing expertise to manufacture drugs whose patents were expiring. After successfully entering into the pharmaceutical market through statins, the company was ready to continue on a growth path and move on to their medium/long term phase by entering into larger molecules in the form of insulin. Again, Biocon identified a large and rapidly growing market where they saw their expertise in fermentation giving them an edge and ability to compete. The results were consistent with their  first direction change and they were again very successful gaining over 10% of the Indian insulin market share. During this phase of their strategy they partnered with Clinigene to conduct clinical trials comparing it to the market leaders. The current phase of Biocom’s strategy is to shift the company’s focus to the development of proprietary drugs. Management again saw that the market they were competing in would soon shrink due to the maturing of the Indian drug market and they would experience enormous price pressure as a result. Their vision for the company was to develop drugs that no other companies had yet succeeded in bringing to market, and in doing so reaping the benefits of the huge payoff. BIOMAb is the essence of the final and long-term stages of Biocon’s overall strategy. They are using their collaborative strategy to partner with CIMAB thus giving Biocon the opportunity to develop and market the molecule. This is a huge step towards the long-term goal of moving the company to a discovery and development focused biotech firm. BIOMAb is very important to this next phase of the company’s growth. In the past they have relied on their expertise and experience carrying over from the enzyme development background. However in this next phase they are entering into uncharted territory and as a result will need to prove they have the capability to adapt their expertise and continue to be successful in areas that are outside of their experience scope. The success of the BIOMAb phase of Biocon’s overall strategy will be key to the future of the company and could indicate that the strategy they have in place will continue to provide the growth and profitability they seek as a biotech firm.

Friday, August 30, 2019

Events of apush Essay

This Unit Activity will help you meet these educational goals Inquiry SkillsYou will apply disciplinary concepts and tools analyze societal issues, trends, and events develop credible explanations of historical events and developments based on reasoned interpretation of evidence gather, evaluate, and use evidence and communicate your conclusions. 21st Century SkillsYou will employ online tools for research and analysis, use critical-thinking and problem-solving skills, communicate effectively, and assess and validate information. Introduction For any historian, it is important to find useful resources and analyze relevant information from those sources. This activity will help you practice reading and evaluating the information presented in historical documents. In this activity, you will read two primary-source historical documents, take notes on those documents, and write a short essay about the documents based on your notes. __________________________________________________________________________ Directions and Analysis Task 1 Analyzing Historical Documents In this activity, you will reference two primary-source historical documents HYPERLINK http//redirect.platoweb.com/346479Declaration of Sentiments by Elizabeth Cady Stanton and the HYPERLINK http//redirect.platoweb.com/346480Pearl Harbor speech by President Franklin Delano Roosevelt. Before you read the documents, read these instructions. Using what you learned in this unit, HYPERLINK http//redirect.platoweb.com/346171examine the sources provided to answer these questions Who authored the document What is the purpose of the document When was the document written What significant historical event or movement does the document represent You may need to do additional research to answer the above questions. If so, be sure to list any additional resources you consulted in the Resources section at the end of this document. Read each primary-source document critically while thinking about these questions Do you notice any exagger ation, stereotype, or emotional appeals that may hint at the authors bias How does the author form his or her argument What are the important themes, main ideas, and arguments presented in the document As you read, take notes on the important information in each document. Enter your notes in the tables provided below. Your notes should include summaries of each documents key points, main  ideas, and arguments. (You will need your notes to complete Task 2.) Type your response here Declaration of Sentiments Notespurpose or main ideapetition for womens rights modeled on the declaration of independenceauthorunknowndate unknownevidence of biasnoevent or movementeventother Pearl Harbor Speech Notespurpose or main ideaauthor HYPERLINK http//www.fdrlibrary.marist.edu/index.html http//www.fdrlibrary.marist.edu/index.htmldateOctober 15 ,2014evidence of biasnoevent or movementEvent other Task 2 Comparing Arguments Referring to your notes and the provided documents, HYPERLINK http//redirect.platoweb.com/346174write a half-page essay that describes how these two primary-source historical documents make their respective arguments. Compare and contrast the arguments presented in the documents. Make sure your essay addresses these questions What techniques do the authors use to form their arguments Is there any evidence of bias or stereotypes Using the HYPERLINK http//redirect.platoweb.com/346177author-date system, make sure you provide parenthetical, in-text citations for any information you use from outside sources, including the two provided documents. When you have finished, reread your essay to check for all of the points above, and then proofread it to be sure your work does not contain errors in grammar or spelling. Type your response here ________________________________________________________________________ Resources Writing Resources HYPERLINK http//redirect.platoweb.com/346170Research and writing information HYPERLINK http//redirect.platoweb.com/346172Creating a thesis statement HYPERLINK http//redirect.platoweb.com/346171Examining and evaluating sources HYPERLINK http//redirect.platoweb.com/346174Methods for writing a high-quality paper HYPERLINK http//redirect.platoweb.com/346177The author-date system Content Resources HYPERLINK http//redirect.platoweb.com/346479Declaration of Sentiments by Elizabeth Cady Stanton HYPERLINK http//redirect.platoweb.com/346480Pearl Harbor speech by President Franklin Delano Roosevelt Document any references you used for this project below. At minimum, include a title and URL for any Internet resource __________________________________________________________________________ Evaluation Your teacher will use these rubrics to evaluate the completeness  of your work as well as the clarity of thinking you exhibit. Task 1 Analyzing Historical Documents ScoreCriteria8-9 Distinguished Includes relevant, well-formed notes that provide thorough analysis of the two historical primary-source documents. Provides notes that substantially answer the questions provided in the task. Effectively evaluates the key points, main ideas, and arguments presented in the historical documents. 5-7 Proficient Includes notes that satisfactorily evaluate the two historical primary-source documents. Provides notes that clearly answer the questions provided in the task. Evaluates the key points, main ideas, and arguments presented in the historical documents.2-4 Basic Includes some notes that show evaluation of the two historical primary-source documents, but may omit key points from the texts. Provides notes that adequately answer the questions provided in the task. Pinpoints some key points, main ideas, and arguments presented in the historical documents, but restates rather than analyzes this information.0-1 InadequateIncludes a few notes that inadequately discuss or miss important information from the primary-source documents. Provides notes that partially answer the questions provided in the task. Discusses only minor points, ideas, and arguments presented in the historical documents. Non-PerformanceIs completely off topic or blank. Task 2 Comparing Arguments ScoreCriteria8-9 Distinguished The essay is concise and clearly and successfully synthesizes the research information from the students notes. The essay exhibits substantial and well-informed analysis with a logical and planned organization. The essay provides correct, organized citations. The essay is error free or contains only a few minor grammar and spelling errors. 5-7 Proficient The essay completes the task by combining the research information from the notes. The essay includes thorough analysis in a clear, well-organized format. The essay provides correct citations. The essay may contain a few minor grammar and spelling errors.2-4 Basic The essay partially or incompletely contrasts the arguments. The essay includes some analysis and satisfactory organization. The essay provides some citations, but these may be incomplete or use incorrect formatting. The essay contains multiple grammar or spelling errors.0-1 InadequateThe essay may compare some points from the historical documents but is generally incomplete or off track. The essay provides minimal analysis and has poor organization. The essay provides few if any  citations or the citation formatting is incorrect or both. The essay contains numerous grammar and spelling errors.

Thursday, August 29, 2019

Aging Matter for Journal of Adolescent Health- myassignmenthelp

â€Å"Don’t Retire, Repurpose Your Life† age makes no difference, beautiful lines expresses in the book called ‘THE CHANGE ‘expressed that there is no end of anything whatever your age could be. Keep learning what you love to do, keep doing what to love to do. Life is such a wonderful blessing. There are those who have really tough challenges to deal with and you could help them. You could read in the library to small children. You might love art, so volunteer to talk about your favourite artist. If you enjoy visiting, go sit with a Vet, a person who has to be cared for, or makes it hard for the spouse or care giver to go out an hour alone. You can read to them, just visit, or really make yourself of help to others by just being there. As I love to work and increase knowledge, so after my age of 65 I still want to learn new theories and will work.  (Paul, 2014) I try to rejuvenate myself but I know I can’t do as I was doing during my adulthood. There are many factors that influenced me to achieve my goals. These factors are:  Ã‚   Health: My body is not that energetic what I feel from inside. I need to take regular intakes in order to maintain my energy level. I digestion capacity reduced day by day, eating junk food will not help me either. Medicines: I used to take medicines only when I am not well at my young age, even I refused to do so n recover automatically but now I need to take medicines on regular interval to keep myself ready to live routine life. Mind: Now my mind is mature and practical enough to understand every little thing, so as during my young age I never back step to accept challenges but now I am little bit afraid just because of my age factor. Another key to stay healthy and keep the heart healthy is by being happy always and keeping the stress away from me.    Chronic diseases: It depends upon the heredity or the living conditions of the person, some have one chronic disease while others have many. It could be followed after a test taken by the doctor which can show us the report as how can we keep ourself healthy and fit. Digestive system: Person is suffering from many digestive disorders about 40% of the time, they are like inability to eat proper diet, problem in swallowing, bleeding, constipation etc Eyesight: There is reduction in the ability of the person to read or locate objects. After 50 most of the people is suffering from presbiopia while after 80 by the cataract. Heart: Heart becomes less efficient comparatively which results in loss of stamina and can result into serious problems in future. However, to prevent this at first it is necessary to be aware with our health. I  am trying to bring some much needed changes in my life and settling into a new life style. I sleep properly, exercise in the proper amount and I eat only healthy food. I eat healthy. I take orange for fibre, vitamin C, low fat cheddar cheese and avocado slices for lunch with a low fat yogurt parfait with blueberries, strawberries and bananas for dessert. I forgot about the nuts for snacking, nuts are nutritious and supposed to contain the good kind of fat. I forgot about the two cups of veggie crunch sticks each afternoon – maybe I need to cut those veggie crunch sticks out. I’ll eat more high fibre and other foods that are supposed to help lower LDL. I am excited about the changes I’ve made. Its good time to revisit my goals which I have already set during my adulthood. As I was very busy in work and earning money, running in race of settling myself I left few things which I love to do. So I have already planned to do all these things after my retirement. I nvolving in activities like yoga and meditation will surely help in improving my mental health. I love to do yoga. Yoga is one of the best ways to focus ones mind and remove stress. When I am unable to visit my Yoga classes I practice at my home and meditate. As long the life goes on the period of learning extends each time with it. The stage of life is a classroom and we get to learn something or other throughout our life. Education is the most important pillar of the life of an individual. It gives direction to the human life. Even if I am 65years old I want to persue my dreams.I want to sudy, as we use to say that there is no age for the study. So I want to complete my degrees and education qualifications. Books are my best friends they never give worries they always give knowledge and spend time with the human being very sincerely. They never ditch with their thoughts.Although the of the age group 60-80 enjoys their life in the most richest manner but the main drawback is body failure and their depence on others. One of the biggest problems that can hamper achievement of goal is financial crisis. Even with the increase in aging the problem sustains. So a few steps can resolve the problem and help save a person from financial crisis..This age is usually associated with the time when many medical and pension benefits are available. It will help to gain the advantage of the situations that were analysed beforehand to prevent any further crisis. Before finally retiring from the job it is needed to ensure that the savings are enough to continue with the daily activities and the problems are can be solved with the saved money. . The monetary related issue is one of the essential issue that can occur at any point of life at any where. For this purpose it is necessary to understand and be ready for the situation that may arise in future. The benfits of the money saved while in the retirement period can prove out to be an advantageous decision made early in the life. Research shows that retirement doesn’t necessarily mean that the responsibilities towards the family come to an end. Although many retirees will still be remember the time when they first stop working. Increasingly, we were seeing retirement incomes being extended in ways that would not have seemed likely a generation ago. Numerous monetary dependants and multi-generational households are additional motives why saving as much as possible as early as possible, and seeking specialised economic advice, are vital for those preparing for retirement.Providing a financial support is very important but after retirement people used to get afraid of the situation as they will beable to provide the same helping hand to their family or not.   (Paul, 2014) Transportation helps the person to move from one place to another. The person who don’t have personal vehicle can easily move from one place to another during his past but after retirement moving through public bus or any other mode is not suitable even driving two wheeler is also not safe for the person. The person should have four wheeler in order to move, the maintanence of four wheeler is costly as compares to other mentioned modes and financially already the person is in risk. So having proper means of transport impacts highly on the fulfilment of family responsibilities. After considering all my financial issues I come up with various of the concerns regarding my decisions in life related to financial decision. Some of my plannings and check lists are listed below: Capital Preservation: Capital conservancy means security and protection. CDs, Treasury retreats and reserves bonds do pay interest, however they are all backed by the full confidence and credit. Cash reserves of insurance carrier is sometimes backed with annuities which causes the fund investor to become insolvent. Investment: Investment seeks as a mode of payment in the aging period. This might confront to some of the risks but the preferred utility stocks, corporate and municipal bonds brings up higher rates of income. In addition, annuities also provide income with guarantee and some restrictions offered inside the contract (Cussen, 2017). Planning: Planning is another significant decision that needs to be taken each time there is a need of such decisions. planning is important to be done in each process as it helps to understand the consequences and the profits that might be upcoming with the situation. there is a need with the planning in the period of aging as it will help to feature the solution before hand. Tax Reduction:  Tax reduction is itself explainable. there is simply   a goal to decrease the income levy bill of any of the investment policy being used. As if for a saving as growth investor for the the purpose of retirement. in such case it can be useful to use an â€Å"individual retirement account (IRA)† or a tax referred plan. annuities are also kind of tax-deferral plans (Cussen, 2017). Bernheim, B. D. (1987). Dissaving after retirement: Testing the pure life cycle hypothesis. In Issues in pension economics . University of Chicago Press. Blinder, A. S., Gordon, R. H., & Wise, D. E. (1983). Social Security, bequests and the life cycle theory of saving: cross-sectional tests. In The determinants of national saving and wealth . Palgrave Macmillan, London. Bradley, B, Green, AC. Do Health and Education Agencies in the United States Share Responsibility for Academic Achievement and Health? A Review of 25 years of Evidence About the Relationship of Adolescents’ Academic Achievement and Health Behaviors, Journal of Adolescent Health. Centers for Disease Control and Prevention. The Association Between School-based Physical Activity, Including Physical Education, and Academic Performance. Atlanta, GA: U.S. Department of Health and Human Services; 2010. Danziger, S., Van Der Gaag, J., Smolensky, E., & Taussig, M. K. (1982). The life-cycle hypothesis and the consumption behavior of the elderly. Journal of Post Keynesian Economics. Davies, J. B. (1981). Uncertain lifetime, consumption, and dissaving in retirement. Journal of political Economy. Diamond, P. A., & Hausman, J. A. (1984). Individual retirement and savings behavior. Journal of Public Economics. Ekerdt, D. J. (1986). The busy ethic: Moral continuity between work and retirement. The Gerontologist. Hamermesh, D. S. (1982). Consumption during retirement: The missing link in the life cycle. Hubbard, R. G. (1986). Pension wealth and individual saving: Some new evidence. Journal of money, credit and banking. McKenzie, FD, Richmond, JB. Linking health and learning: An overview of coordinated school health programs. In: Marx E, Wooley SF, Northrop D, eds. Health is Academic: A Guide to Coordinated School Health Programs. New York, NY: Teachers College Press; 1998. Mirer, T. W. (1979). The wealth-age relation among the aged. The American Economic Review.

Wednesday, August 28, 2019

Predatory lending Essay Example | Topics and Well Written Essays - 500 words

Predatory lending - Essay Example ose borrowers with little knowledge on money matters especially those owning expensive assets that can be repossessed in case the borrower fails to fulfill the terms of the loan (Frank 2009). For example, a borrower may be required to read and sign a lot of documents which would bind him to the loan agreement. As a result of lack of skills and trusting the lender, he may assume that all the details in the documents are correct and thus sign them without interpreting the whole information. As such, the unscrupulous lender may take advantage of the situation to add more terms on the signed documents so as to gain more from the borrower. If this happens, the borrower may not have the ability to challenge the discrepancies. If it occurs that the borrower cannot pay the loan, his assets may be seized by the lenders whose main interest would be to sell them at a profit. The recent mortgage debt crises can be attributed to predatory lending. People with high hopes of owning homes found themselves in a situation which was caused by malpractices of brokers whose intension was to benefit from the deals (Frank 2009). To achieve their objectives, the brokers issued loans with high interest rates to unsuspecting borrowers who later became unable to pay the loans. In order to qualify for a loan, a person is supposed to have the ability to repay either in cash or in kind. These brokers managed to benefit from the mortgage lending due to the government’s failure to regulate their activities (Frank 2009). If proper regulation was done, the unfair deals made to the borrowers would have been noted thus avoiding the consequences that arose later which had a negative effect on the economy. The mortgage crises can also be attributed to the fact that mortgage lenders failed to acknowledge this policy and went ahead to give loans to people who were not qualified (Luhby 2009). This resulted to bad debts which could only be solved by reacquiring the houses leaving the borrowers without

Tuesday, August 27, 2019

Weekend in Guatemala Essay Example | Topics and Well Written Essays - 250 words

Weekend in Guatemala - Essay Example Diego express his pessimism by asking Tucuche if the land reforms are of ill intent (Asturias 201). Secondly, the author helps readers understand La Galla’s mentality through the expressions she gives when she hears the Indian drums. La Galla expresses condescending facts regarding the Indians and the drums they play because of the land reforms. La Galla’s mentality is best understood when the author describes how his father died because of a demonstration, which was carried out by the Indians. La Galla disagrees with the idea of land reforms, which has been instigated by the Great Brotherhood. Further, La Galla does not see any sense regarding the drums played by the Indians; she sees it as only noise (Asturias 200). Branding the land reformists as communists was the best cover up, which La Galla and the white settlers could use to attack the Indians. If La Galla and her group could label the Indians as communist, the Indians could be seen as extremists with ill intentions. The idea of communism was contrary to what La Galla and whites believed in, which was capitalism. The state and communal ownership of land was the point of attack against Indians (Asturias

Monday, August 26, 2019

How art embodies cultural identity (Aztec Vs.New nations of the US) Essay

How art embodies cultural identity (Aztec Vs.New nations of the US) - Essay Example nited States, which is predominantly Christianity, at times forbids artistic expression of the religion (Hollingsworth, 2004, p341) and at others is often limited to Renaissance-style depictions of Bible stories with a heavy focus on the central character, Jesus Christ. Most art in the United States is of no obvious religious character. One of the most famous examples of Aztec sculpture is known as the calendar stone, which depicts the sun god surrounded by bands that depict various days and eras. This stone shows the seamless integration between art, religion and daily life, because it is at once a piece of art, a depiction of a deity and a useful object. The carving of the central sun god is created in typical Aztec style, having a close relationship with that found in the Phonecian culture and representing the intricate relationship between man and nature (Miller, 1986, p205). There are many more examples of Aztec sculpture which feature depictions of a sun god, and countless stone carvings depicting aspects of the religion. Conversely, it is fairly difficult to find one such shining example of religious sculpture which has originated in the new nation of the US. Religious sculpture in the United States is often commisioned for use outside religious buildings. One such example is known as the King of Kings, a 62 foot tall statue of Jesus that adorns the entrance of a megachurch in Ohio. The artistic value of this sculpture has been debated (Williamson, 2004, p89) although the Aztec calendar stone was also probably of questionable artistic value to those who used it as a ceremonial basin (Morà ¡n & History, 2007, p157). However, whether the King of Kings is considered art or not, the main value this had (until it was hit by lightening in 2010) was to adorn the baptismal pool and depict the central character of Christianity. It had no additional usage, highlighting the distance between religion, art and everyday life in the new nation of the United

Human Resource Management Issues Essay Example | Topics and Well Written Essays - 750 words

Human Resource Management Issues - Essay Example When the management structure will be revamped and there will be supportive and conducive work environment for the employees, the motivation level of staff will be enhanced and they will be reluctant to leave the organization. Hence, by altering the management structure, an organization will definitely be able to address this HR issue and ensure that it has a productive and highly effective workforce. One of the major problems that are faced by an organization is high employee turnover and it has been found by Guest (2011) that the key factor that causes increase in this turnover rate is lack of proper management. When there are insufficient or improper mechanisms for talent or employee management, there is a huge possibility that the employees start leaving the organization on voluntary basis. Most of the employees are willing to switch to other jobs because they have lack of clarity about the organization’s purpose and the business tends to possess various unstable elements. The Human Resource (HR) department has to ensure that everything in the organization is organized and disciplined so that the employees have awareness about their tasks, policies that need to be followed and actions that will be taken in case of non-compliance (Berman et al., 2009). It has been found that the organizations that have high level of inefficiency or instability have high turnover rate. Although the organizations are unaware of the real problem that causes increase in turnover rate; it is important for them to keep an eye on the turnover rate as it might be an indication of some problem in the company that might need to be immediately addressed. Proper management means that the employees should be given the leverage of enhancing their skills and they should be given space to prove their expertise in the field; the goals of each employee have to be aligned with the

Sunday, August 25, 2019

MANAGING CHANGE Essay Example | Topics and Well Written Essays - 500 words

MANAGING CHANGE - Essay Example These achievements however, have been coupled with various drawbacks but with the application of economic theories with an illustration of the Contingency Theory such hurdles are to be tackled. The study provides recommendations on the various aspects that require adjusting for the economies to thrive even more. With the onset of the financial crisis within the past decade, the financial markets in the Gulf region have undergone various changes and institutions and business entities have adopted new market strategies to counter the implications of the crisis. The Cooperation Council for the Arab States of the Gulf countries (GCC) - Bahrain, Kuwait, Oman, Qatar, Saudi Arabia and United Arab Emirates (UAE) are keen to improve their economic competitiveness in the international market. From the early 1970s to the early 1980s the GCC member countries made significant developments in the financial front. The financial institutions were beneficiaries of the lucrative returns brought about by the abundant oil revenue. At the time up to the 1990s, the primary focus of the institutions was on short-term lending trade, building and construction and manufacturing. With the 1990s came global financial integration that entailed the carrying out of economic restructurings especially due to the effects of the Gulf war. Technological novelty and new market strategies centred on consumer-based services were adopted. Following the Gulf war was a variation of loan problems in banks across nations affected by it. The financial set-up of the GCC has overtime faced a number of challenges that revolve around the augmented role of the private sector in the financial market, the high demand for new financial services and the aspect of global participation. Efficiency and productivity are therefore a principal concern in this modern age. The countries in the GCC have links with banks that are expansively

Saturday, August 24, 2019

Extreme Importance of Alternative Energy Sources Research Paper

Extreme Importance of Alternative Energy Sources - Research Paper Example Forecasts show that coal, gas and oil supplies will last only for a few more centuries. Secondly, the use of fossil fuels poses a serious danger to the environment. The combustion of fossil fuels leads to the emission of chlorofluorocarbons, mainly carbon dioxide. This causes the ‘greenhouse effect’ which traps heat in the earth’s atmosphere, leading to global warming. The combustion of fossil fuels also causes atmospheric pollution and acidification of the environment. The environmental damage caused by oil spills in the wake of the BP oil spill in the Gulf of Mexico is fresh in minds. Likewise, nuclear power is associated with the risk of nuclear accidents, such as Chernobyl and Fukushima, and the problem of disposal of hazardous radioactive waste. As there is no sign of energy use declining in the conceivable future, the environmental impacts of energy consumption, and the depletion of energy sources, assumes grave implications. It is clear that the need for al ternative, renewable sources of energy is the need of the hour. Energy consumption shows tremendous global variation, and â€Å"about a quarter of the world's population consumes three-quarters of the world's primary energy† (UN Document). About 20% of global energy consumption is in the USA. Again, it is estimated that the U.S. is responsible for about one-fifth of all human-produced greenhouse-gas emissions. Renewable sources of energy account for only 9.3% of the total US energy consumption (EIA). In this scenario, it is evident that the need for alternative energy sources should be a high priority for the government of the United States. It is heartening to note that President Obama has declared that â€Å"I know the country that harnesses the power of clean, renewable energy will lead the global economy in the 21st century† (qtd. in Scientific American).

Friday, August 23, 2019

Using current and historical examples discuss the constraints and Essay

Using current and historical examples discuss the constraints and opportunities for alternative forms of work organisation in the globalized world - Essay Example w decades have given prominence to the understanding of work organization in reference to the advent of globalization; international trade being coupled with an increase in mobility of people and capital. The confusion around globalization makes it harder to concretely define the term itself. In many cases, it is the ‘prominent catchphrase for describing the process of international economic integration’ (Scholte, 2005, 16). In the context of the argument presented in this paper, globalization is viewed as an amalgamation of liberalization, universalization and westernization. Hence, it could be defined as the process of removing restrictions on movements between countries, creating a synthesis of cultures and spreading experiences to people in all corners of the world (Scholte, 2005). Work organisation is often linked with capitalism; an economic system which advocates the prominence of private ownership, wage labour and emergence of market forces as the dictating power in setting prices. Karl Marx referred to capitalist societies as an advanced form of social organization that would pave way for the working class to come to power (Whitley, 2000). The ideology revolved around the transformation of human society being a series of evolution that was controlled by the changing dynamics of the world and the requirements of the general population. Where socialist or communist systems once wielded a stronger control over the processes governing work organization, this was replaced by the capitalistic approach. In the latter approach, the barter system of goods exchange was replaced by introducing an item of use-value; initially gold and then paper money. Marx professed that the next change would be the working class coming to power, with its primary driving factor bein g the exploitation of labour or workforce, under which capitalists try to extract value for the owner or the â€Å"bourgeois† society (Whitley, 2000). Further progression of Marx’s work at the turn

Thursday, August 22, 2019

Short stories Essay Example for Free

Short stories Essay Traditional detective stories fall into three groups, whodunit murders,mysteries with a twist in the tale and locked room stories.  A whodunit mystery is a story where the detective has to find out who commited the murder by unravelling a series of clues that will eventually lead him to the murderer.There are usually a group of characters who are potential suspects because they have either a method or a motive for the crime.As the story moves on the detective slowly eliminates all the suspects in his mind until only one remains. The detective then usually calls all the suspects together and reveals the perpetrator.When the villain is taken away the detective them goes on to explain how he assembled all the clues and how they led him to the murderer. An example of how Conan Doyle exploits this is in the Cardboard Box when a cardboard package is sent to Miss Susan Cushing with a pair of preserved human ears in it and no-one knows why or who the ears belong to.Conan Doyle exploits this by removing the elimination process and turning it into a hunt for who the ears belong to and who must have killed the owners. After using his powers of observation, I percieved that her ear corresponded exactly with the female ear which I had just inspected. The matter twas entirely beyond coincidence.There was the same shortening if the pinna,the sam broad curve of the upper lobe,the same convolution of the inner cartilage.In all essentials it was the same ear. He comes to the conclusion, that one of Miss Cushings sisters, who is mentioned at the beginning of the story, and her lover were killed by her jealous husband.He was driven back to drinking by the rumours spread about him by the third of the Cushing sisters. The Mystery with a twist is a story that appears to follow the traditional lines of a murder or a crime story but then has an unexpected twist at the end.An example of how Conan Doyle exploits this is in the Silver Blaze story.In Silver Blaze a prize winning horse has been stolen and its trainer murdered.Sherlock Holmes is then called in and after following a series of clues he comes to the startling conclusion that Silver Blazes trainer,John Straker was not murdered but was kicked in the head by his horse when trying to sabotage its chances in its next race. The horse had then run away from its stables and was picked up by a rival stable owner; then kept hidden by painting it brown and passing it off as one of his own horses.A long series of clues were pieced together to lead to this conclusion.So the twist in this tale was that there was no murder when from the start all the evidence make it appear so. The locked room story type is a story where a murder has been commited in a locked room but there is no murderer,no murder weapon and no evidence of a suicide.In the Speckled Band a murder was commited two years ago but no-one knows how or why the girl died because she was in a locked room with barred windows and there was no evidence to show how she died apart from fright.Conan Doyle exploits this by having Holmes be visited by the sister of the murderd girl and say that she is afraid that the same thing will happen to her. Yet if the lady is correct in saying that the flooring and walls are sound,and that the door,window,and chimney are impassable,the her sister must have undoubtedly been alone when she met her mysterious end. Holmes is trying to find out from the beginning how a murder could take place in a locked room with no way to enter. After visiting the house, Holmes and Watson decided to stay in Ms.Stoners room and while they are there a snake drops through the ventilation shaft, which was intended to kill Ms.Stoner.The snake then retreats back through the ventilation shaft and bites Dr.Gimesby Roylott the owner of the snake.It can seem very obvious from the beginnning of the story that Dr.Roylott has something to do with the murder but there is no evidence to prove this.Holmes then using his powers of deduction and observation uncovers Dr.Roylotts plans but inadvertantly causes his death. The genre used in the Red Headed League is that of a simple mystery.At the beginning it is not obvious that a crime is being commited but it is obvious that something very strange is happening.Conan Doyle exploits this by not giving us a target to point our suspicions at because there is no murderer that needs to be found or stolen property that needs to be recovered.There is just a simple mystery that leads on to a much larger one. The mystery is that a Mr.Wilson had been admitted to this organisation called the Red Headed league who would pay him four pounds per week to copy out the Encylopaedia Britannica. He thought this a bit odd but carried on with it for a number of weeks until one day the offices of the League were closed.He then went to see Sherlock Holemes,who after investigating the mystery found out that a much larger plot was at work. Mr.Wilsons apprentice pawnbroker Vincent Spaulding is really a wanted criminal who set up the League with a friend as a way of getting Mr.Wilson to leave his shop for a few hours a day.During that time they were digging a tunnel from the basement of the shop to a nearby bank.This kind of mystery cannot be solved from the start and readers can only suspect that the apprentice has anything to do with the mystery. This kind of plot could be called a Hidden-crime mystery. In conclusion I would say that Arthur Conan Doyle exploits many different kinds of traditional detecitve stories and gives them his own unique twist.He uses logic mixed with intricate plots and a sometimes a few red herrings, as in the Red Headed League.Some devoted readers prefer his earlier stories when Sherlock Holmes performed his observational miracles,however,one can only say that which ever you prefer Conan Doyles work is still read and admired today.

Wednesday, August 21, 2019

Strengths in basketball Essay Example for Free

Strengths in basketball Essay In my Analysis Peace I am going to be analysing Alex combs at basketball. I chose Alex because he is a talented basketball player and I have seen him improve in basketball in various ways since yr7 and I feel I can help him improve even more. Alex has adapted himself into becoming a centre and thats the position I have chosen to help him improve on. I believe with a little bit of direction Alex can make it a far way in basketball. To make it at a professional level in basketball and to be able to become a centre you need to have certain qualities and aspects. You need to have self belief because basketball is a game of trail and error. A great centre is always willing to try over and over again. Above all a great centre needs to be enthusiastic and determined a successful centre generally wants the ball and will do anything to get it. Also a great centre has the ability to change the flow of the game. He also has the ability to change his team mates attitude. A centre needs to be aware of the rules especially the 3 second rule. In the game basketball the centre controls the game he is the heart of the team offensively and defensively the more rebounds he makes the more points your team will score lastly You need to be tough dont worry about contact with other players dont be afraid to use your strength and speed to keep other players from getting the ball. Including those following aspects there are other attributes that affect your performance in basketball such as: Strength: Strength is needed so you are able to compete for rebounds when shots are missed. Having that extra strength gives you the advantage against other players and enables to position yourself. This is done by boxing out (sometimes referred to as blocking out). Boxing out is where you position your self between the basket and another player and push them away by backing into them therefore you have to be close to the basket at all times. Strength is needed so that you can protect the ball after a missed shot. Its important to rebound so that the other team does not get another chance of scoring and offensively you create another opportunity for your team to score. Speed: Speed is need so that you get to the ball before anyone else after a missed shot allowing you to get the rebound. This also means your reaction and movement time needs to be quick. Speed is need so that youre able to intercept dangerous passes also you need speed endurance allowing you to run back and defend. Speed is also need when attacking your opposition mainly fast breaks. Reaction Time: Needs to be fairly quick so youre able to intercept passes you need quick reactions allowing you to get between the passer and receiver. Agility: The ability to change your direction and body position is highly important in basketball. Its useful to help you to get past defenders. Agility is also important allowing you to change direction very quickly enabling you to attack the basket at speed. Its also important to be agile whilst defending it helps you stay with you defender. Basketball is a fast pace game that requires a lot of movement effort and work. Balance: Balance is need so that youre able to stay on your feet which mean you are unlikely to get injured. Its also important because it allows you to perform a successful jump shot or a lay up. Balance is important because if youre being shoved you dont wobble or fall over easily. Stamina: Stamina is important enabling you to run back to defend your basket and to run up and down the court to get hold of rebounds. Stamina gives you the ability to finish a full intense basketball game. Skill: Being ambidextrous having the ability to perform skills with both your left and right hand this a good advantage in basketball because it gives you confidence in your play and gives you various ways of attacking confusing your opponent. Left hand lay up Right hand lay up Section 2 Alexs Strengths Watching Alex Perform In school matches and watching him in practise gave me the chance to analyse him carefully. I have recognized some of his strengths in basketball.

Tuesday, August 20, 2019

Analysis of Role-based Access Control (RBAC)

Analysis of Role-based Access Control (RBAC) ABSTRACT Access control systems within an enterprise system are used to control the actions, functions, applications, and operations of legitimate users within an organization and to protect the integrity of the information stored within the system. Role-based access control (RBAC) is a relatively new access control system that maps to organizational-specific structures in a way that reduces administrative costs and improves security. Although role-based security models have existed for 20 years, their application has until recently been limited. We try to give a comparison between RBAC and traditional access control models and try to evaluate the different industries where these models can be utilized. We try to evaluate the NIST RBAC model as a standard for implementing RBAC and show the implementation by developing an application which uses RBAC for authentication and authorization for the computer system to be accessed. This also involves a discussion for different variations of the Role Based Access Control models according to NIST. INTRODUCTION Access control is generally concerned with determining what users and groups of users can perform which operations on certain resources [10][1][11]. The fundamental problem is that each system and application for which access control is enforced has a proprietary method for creating and managing users, groups, and a system specific meaning of operations and objects. For many organizations, the number of systems can be in the hundreds or even thousands, the number of users can range from hundreds to the hundreds of thousands, and the number of resources that must be protected can easily exceed a million. Organizations large IT infrastructure is a mix of hugely complex and incompatible operating systems, applications and databases spread all over the world. The organizations these days have a huge number of employees which keep increasing or decreasing all the time according to the organizations need. It also has a working interaction with contractors, business partners, and customers, all of whom require access to various parts of the infrastructure. Most of the companies rely on manual or semi-automated administration of users, controlling their access to privileges for various resources on a particular system. This will inevitably become very complex and completely unmanageable if the organization is huge and the number of users of the system is in thousands or more. Often, different systems will have their own set of access requirements with different sets of administrators who will have overlapping skill-sets, leading to poor use of resources. This creates an enormous administrat ive overhead e.g. If there is a single administrator who needs to update even 25% of thousands of users everyday, it will almost be impossible for the system admin to do so. Furthermore, if multiple administrators are acquired for this job it could cause conflicts so the system becomes almost impossible to handle and maintain. Also, it would cost much more than if you were to have a single administrator. As the complexity of the organizations IT infrastructure increases, the demand for access control administration across the enterprise outgrows the capacity of manual administration across the distributed systems. Increased administrative complexity can also result in increased errors that, in turn, can lead to increased security risks. It is best suited to use the access control models to restrict unauthorized access and avoid any security risks. Access Control Models have long been used in enterprise systems and ERPs so that the system is made secure and reliable, restricting access to sensitive and confidential information resources from unauthorised users [10]. Different access control models are suited for different business applications and industries depending upon the scale and complexity of the system being developed. This report will try to analyze the different types of access control models as discussed above, that may be suitable for a variety of businesses and industry applications, giving their features, benefits and classification. This document will be covering many issues related to access control and various access control models. The critical analysis of each of the traditional access control model will be provided as well as the comparisons with each other identifying their advantages and drawbacks. The industry specific implementation of each of the model will also be discussed i.e. which model is suited for which kind of industry and what models should be selected depending on the scale of the system. Then the more recent access control model which is being widely utilized nowadays will be discussed in more detail and its different versions will be evaluated. Also role-based access control will be discussed in different environments i.e. in a centralized application environment and also in a distributed application environment. In the end, there will be an implementation of the appropriate access control model for a particular industry application called BOS (Back Office System) that is a travel agency. This application will support the day to day business operations of the organization. The model used for this application will be Role-Based access control as the structure and requirements of the business will be supported using this RBAC. It does not require the ACLs of DAC and it does not need the high security of MAC because the access privileges can be interchangeable between the users of the system. BACKGROUND Access Control Models have long been used in enterprise systems and ERPs so that the system is made secure and reliable, restricting access to sensitive and confidential information resources from unauthorised users. The basic need of access control is to protect the system and its contents from intentional and unintentional damage, theft and unauthorised disclosure. The access control models that have been used in the recent decades are traditional access control models which are Access Control Lists (ACLs), Discretionary Access Control (DAC) and Mandatory Access Control. Role Based Access Control (RBAC) is a more recent access control model which provides an alternative for the traditional access control models. The most appropriate way to restrict access of resources from unauthorized users of the system is to use one of the traditional access control models as a means of implementing secure and reliable access for that system. There are many access control models present in this age of time which cater to different needs and provide different type of security depending on the nature, scale and type of the application as well as the industry for which the application is being implemented for. Traditional access control models base access control on the discretion of the owner or administrator of the data. Under all traditional models, an end-users identity determines which access permissions are needed. This section gives a brief introduction to the predominant traditional access control models as well as some of the more recent models that have been utilized more recently. We discuss these models in more detail in the later sections: Access control lists (ACLs). Discretionary Access Control (DAC). Mandatory Access Control (MAC). Role-Based Access Control (RBAC). Access Control Lists ACLs is one of the most common access control model being used for securing operating systems, applications, computer resources and networks. When ACLs is selected as a model for implementing access control, each resource that needs to be secured has a list of users associated with them who are authorized to access the resource and even modify and make changes in it if they are allowed to. ACLs as a model provides ease of access for the security administrator to see which users have access to which resource within the application or system. Also, modifying access to a piece of information is relatively simple; a security administrator can simply modify a user from the ACL list that is a user can be created, edited or even deleted easily. There is a corresponding ACL present for every data or application, but it is not necessary to have a corresponding list that gives the network administrator information on all of the pieces of information to which a particular user has access. The only way for the security administrator to find out about any potential security violations on a particular data has to be checked by accessing each of the data individually. If the security administrator wants to revoke all the access privileges for a certain user, the administrator has to examine each list and then have to remove the user from each of the lists one by one. Responsibilities for a user in an organisation may change, in this kind of scenario this model becomes more complicated and hard to manage. Instead of removing the user from every ACL, the network administrator has to determine which permission needs to be removed, modified or added somewhere according to the new position of the user in the organisation. In some situations the user can be grouped together in the list making it easier to change the ACL by just modifying the group information rather than each of the users individually. In some other cases elaborate rules can be applied to ACLs to restrict access to particular resource. Discretionary Access Control Using Access Control Lists Discretionary Access Control The user who owns the data is the one who control access to that data in the discretionary access control model. ACL is a model which is derived from DAC. DAC is a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject [1]. Discretionary Access Control is used to stop the user from accessing the protected objects on the system. The user may also be restricted to a subset of the possible access types available for those protected objects. Access types are the operations which are performed on an object by a user, the operations include read, write and execute. Usually an object belongs to a user or a user is the owner of that object, this means that only the owner of the object has the authority to distribute and revoke access to that object. The owner of the object may give and retain access to the objects they control based on the rules of the DAC. The identity of users and objects is the fundamental basis for controlling access in a system within this model i.e. DAC specifies which users have access to which part of the information. Mandatory Access Control Mandatory Access Control is different from other access control models in a way that the security it provides is based on hierarchy and assigns each subject and object a specific security level (e.g., classified, secret, top secret etc.). The rules that govern the access to a particular for this model are: No read up. No write down or (own level write only). Read down access gives users the ability to access any piece of information that is at or below their own security level. If a user has a secret security level, they are able to access secret and classified material but not top secret material. Write up access states that a subjects clearance must be dominated by the security level of the data or information generated. For example, someone with a secret clearance can only write things that are secret or top secret. With these two access control principles, information can only flow across security levels or up security levels [1]. Mandatory Access Control Role Based Access Control In traditional access control models the approach for granting access to resources within a particular system or an application is to specify permission for each of the user within an organization. If the user is allowed to have access to multiple resources or information within a system, the user must be assigned permissions for each of the resource. This approach is tricky and not the most reliable way of implementing access control. When users join, leave or change responsibilities within an organization, each of the users who changes status within the organization that users access privileges information must be updated for each of the permissions. Achieving the above requires a lot of resources, time and also is prone to errors as an organization can have hundreds of thousands of employees and updating each of the users information one by one is not an efficient way. RBAC get rids of this problem because it takes advantage of the users role as the key to access rather than the u sers identification. The basis for role-based model is the user-role and permission-role relationships. Each user in a role-based environment may be assigned to multiple roles, and each role may have multiple users as well. The roles that are assigned to a user depend on their job and responsibilities, and each role is assigned permissions according to roles access privileges in the organization. Permissions determine the data and applications that may be accessed by which are also assigned to a role and that role is assigned to a user or multiple users. Users role can be in many forms e.g. jobs like (bank teller, bank manager), geographic locations (London, Newcastle) or individuals (shift supervisor, managers). The advantage of using this model is that users keep changing with in the organization whereas on the other hand roles or job responsibilities for a particular role remain the same. Therefore rather than implementing the security on the users manually, roles are created which are assigned to use rs and any addition in a job specification is changed in the role description which in turn changes the all the user with that role. RBAC is a technology that offers an alternative to traditional discretionary access control (DAC) and mandatory access control (MAC) policies. RBAC allows companies to specify and enforce security policies that map naturally to the organizations structure. That is, the natural method for assigning access to information in a company is based on the individuals need for the information, which is a function of his job, or role, within the organization. RBAC allows a security administrator to use the natural structure of the organization to implement and enforce security policy. This model decreases the cost of network administration while improving the enforcement of network security policies. RBAC is designed to centrally manage privileges by providing layers of abstractions that are mapped one-to-many to real users and real operations and real resources. Managing permissions in terms of the abstractions reduces complexity and provides visualization and a context for implementing complex access control policies. Abstractions can be centrally managed resulting in real permissions on real systems. Role-Based Access Control Discretionary Access Control (DAC) In a computer system, access controls restrict subjects (users and/or processes) to performing only those operations on objects (e.g., files) for which they are authorized. For each such operation, the access controls either allow or disallow that operation to be performed [3]. DAC model works on the basis that only the owner of a resource has the capability to authorize other users to have access to the same resource. This means that the users who do not have access to a particular resource and wants access to it, only the owner of that resource has the right to give access to them. In Discretionary Access Controls (DACs), each object has an owner who exercises primary control over the object. ACL is one of the mechanisms which can be used to implement DAC and is one of the most widely used implementation for DAC. The access of information in DAC is based on the users identity and the rules that specify the users ability to have access to a certain protected resource or information. On the other hand ACLs are lists that specify users access privileges for the protected objects. DAC consists of set of rules which specify a users ability to access restricted resource or information. When a user wants access to a particular resource or information, the server searches the rule which specifies the users ability to have access to the particular resource which it wants access to. If the rule is found and there is a match for the user to have access than the user is allowed access to the resource, if there no match then the access for the resource to the user is denied . For example, there may be a rule which states that users from a certain group is not allowed to have access to a certain piece of information. Discretionary access control (DAC model) works on the discretion of the identity of the user. In DAC access to any object (files, directories, devices, information etc.) is only allowed if the owner of that object is willing to give access. Therefore, the basis of this model is creator-controlled sharing of information and identity of the owner plays an important role in the working of this method. The owners of objects can specify at their own discretion in what ways they want to share their objects to other users i.e. which other users can have what level of access to the objects they own. This can be implemented in a fairly simple way by using access control matrix which contains the names of users on the rows and the names of objects on the columns giving information of which users has access to which corresponding object. Regardless of how the matrix is represented in memory, whether by rows or by columns, the names of the users and objects must be used in the representation [1] . ACCESS CONTROL MATRIX The access control matrix is a combination of rows and columns with cells representing the permissions. In the matrix, the rows represent user/subjects and columns represent resources / objects. Regardless of how the matrix is represented in memory, whether by rows or by columns, the names of the users and objects must be used in the representation. For example, in a row-based representation an entry might read the equivalent of KIM can access KIMSFILE and DONSFILE. In a column-based representation, one might find the equivalent of DONSFILE can be accessed by DON, JOE and KIM [1]. The entries in the matrix describe what type of access each user has to each object. This representation of rows and columns is dependent on the model or mechanism being selected for Discretionary Access Control. The table below exhibits a good example of an Access Control Matrix. ACCESS CONTROL MATRIX Users / Objects KIMSFILE DONSFILE PAYROL1 PAYROL2 DOESFILE Kim rw r rw r Joe r Don rw r Jones r Doe rw Mgr Jim cp cp c c c Jan rw rw The access control matrix such as the example above is a graphical view of a set of users and their access rights on particular set of protected objects. The access types mentioned in the table above are: r denotes read access. w denotes write access. c denotes control permission access. cp control passing ability. CHARACTERISTICS OF DAC MECHANISMS The complete implementation of DAC is based on the information which is stored in the form of an access control matrix. DACs are oldest and most widely used class of access controls, the access controls for both Windows and UNIX are DAC. The Unix DAC, for example, has the well known three primitive permissions read, write, and execute. When the initial implementation of DAC started, the five basic mechanisms that were used initially to represent information were: Capabilities Profiles Access Control Lists (ACLs) Protection Bits Passwords The first two mechanisms that are capabilities and profiles represent the access control matrix information by row, connecting the accessible objects to the user. Whereas ACLs and protection bits represent the access control information by columns, connecting a list of users to an object. In the above five mechanism we will be mostly concentrating on the ACL model which is the most widely used model out of all of the mechanism present for DAC and also in this section a brief description of the other mechanisms will be provided [1]. Capabilities In a capability-based mechanism for DAC, access to objects which have restriction on them being accessed such as files is granted if the user who wants access to it has the capability for that object. The capability is a protected identifier that both identifies the object and specifies the access rights to be allowed to the accessor who possesses the capability [1]. The basic properties of capabilities are: The capability of one user can be passed onto another user. The user who possesses capability may not alter or fabricate capabilities without the interference of TCB (Trusted Computing Base). If a capability mechanism is used to implement DAC than the implementation should possess the facility to transfer capability from one user to other users. This ability of transferring capability from one user to another cannot be controlled and therefore capabilities has to be stored, determining all the users access for particular objects almost becomes impossible. Because of this reason implementing DAC using the capability mechanism becomes very difficult including the feature of revocation. A pure capability system includes the ability for users to pass the capability to other users. Because this ability is not controlled and capabilities can be stored, determining all the users who have access for a particular object generally is not possible. This makes a complete DAC implementation, including revocation, very difficult. (Revocation may not be an issue, however, since a user who has access to an object can make a copy of the information in another object. Revoking the users access on the original object does not revoke access to the information contained in the users copy. After revocation, however, changes can be made to the original object without the knowledge of revoked users.)[1]. Profiles This is another mechanism which can be used to implement DAC and have been used in some forms for several systems. When using Profiles [1] to implement DAC, a list of protected objects is used to associate each user to the particular object. The object names are inconsistent and they dont agree on being grouped together, also their size and number are difficult to reduce. If a user has access to a large number of protected objects, the profile can also become very large and it is very complex to manage such a profile. In profile mechanism all protected object names should be unique to but in reality multiple objects can have multiple names, because of this reason full pathnames should be used to identify the objects uniquely. One major drawback of this method is that when creating, modifying or deleting access to protected objects requires multiple operations because multiple users might have access to the same object therefore those users profile must be updated. Revoking access to an object in time for a user is very difficult unless the users profile is automatically checked each time that object is accessed. Also if some object is deleted, it will require some method to check whether that object exists in each of the users profile or not, which is also an extra overhead. In general, with these two mechanisms i.e. Capabilities and Profiles it is very difficult to check whether which users have access to a particular protected object. This is a very important problem that needs to be addressed in secure system and there exists more feasible and more efficient mechanisms, the above two mentioned mechanisms are not the recommended implementations for DAC. ACCESS CONTROL LISTS (ACLs) Another approach to implement the DAC model for access control using the access matrix is by means of the access control lists (ACLs). When using ACLs, each object is related with an ACL, these ACL entries indicate the authorities a subject possesses which can be executed on that object. In the ACL mechanism the access control matrix is represented by columns. By looking at an objects ACL it is easy to determine which modes of access subjects are currently authorized for that object. In other words, ACLs provide for convenient access review with respect to an object. It is also easy to revoke all accesses to an object by replacing the existing ACL with an empty one. On the other hand determining all the accesses that a subject has is difficult in an ACL-based system. It is necessary to examine the ACL of every object in the system to do access review with respect to a subject. Similarly if all accesses of a subject need to be revoked all ACLs must be visited one by one. (In practice revocation of all accesses of a subject is often done by deleting the user account corresponding to that subject. This is acceptable if a user is leaving an organization. However, if a user is reassigned within the organization it would be more convenient to retain the account and change its privileges to reflect the changed assignment of the user.) Several popular operating systems, such as UNIX and VMS, implement an abbreviated form of ACLs in which a small number, often only one or two, group names can occur in the ACL. Individual subject names are not allowed. With t his approach the ACL has a small fixed size so it can be stored using a few bits associated with the file. At the other extreme there are a number of access control packages that allow complicated rules in ACLs to limit when an how the access can be invoked. These rules can be applied to individual users or to all users who match a pattern defined in terms of user names or other user attributes. Access control is required to achieve secrecy integrity, or availability objectives. ACLs have been a popular approach for implementing the access matrix model in computer operating systems. Some systems approximate ACLs by limiting the granularity of the ACL entries to one or two user groups. Other systems allow considerable sophistication. ACLs have disadvantages for access review and revocation on a per-subject basis, but on a per-object basis they are very good. More flexible representation such as authorization tables provide for superior management of access rights, but are usually available only in database management systems. In a distributed system a combination of capabilities for coarse-grained control of access to servers, with ACLs or authorization tables for finer-grained controls within servers, is an attractive combination [10]. ACL MECHANISM WORKING ACLs allow any particular user to be allowed or disallowed access to a particular protected object. They implement the access control matrix by representing the columns as lists of users attached to the protected objects. The lists do not have to be excessively long if groups and wild cards (see below) are used. The use of groups raises the possibility of conflicts between group and individual user. As an example, the ACL entries PAYROL rw and Jones.PAYROL r appear to conflict, but can be resolved in the design of the DAC mechanism. The Apollo system has a multiple, hierarchical group mechanism. The ACL entry has the form user-id.group.organization .node. As in Multics, if the ACL specifies access rights for the user by user-id then group access rights are ignored. This allows a particular user to be excluded or restricted in access rights [13]. In the Apollo, if a user is not on the ACL by user-id, but is a member of a group, those rights are used and organization and node membershi ps are not examined. Multiple group mechanisms add more complexity and may facilitate administrative control of a system, but do not affect the utility of a DAC mechanism. Access to ACLs should be protected just as other objects are protected. The creation of groups m

Monday, August 19, 2019

Exley Chemical Case Analysis Essay -- Business Analysis

Exley Chemical Case Analysis Introduction The purpose of this analysis is to offer insight into difficulties experienced by Exley Chemical Company. Case analysis will provide an objective view of the identified problems (both macro and micro), the causes, affected systems, alternatives and recommendations. In a collaborative effort, this report reflects multiple observations and opinions regarding the case analysis. Analysis I. Problems A. Macro • Lack of coordination within the companies operations • Decrease in sales and profits. • Operational conflicts within the major departments • This type of structure is inappropriate for this company • There is no uniformity of command B. Micro • The coordination between marketing and the new product development department was insufficient. • The Product development had problems with marketing. • The Product manager quarrels with the marketing department • Product manager was unsuccessful in coordinating the activities. • The company was having difficulties in producing a team concept within the departments. II. Causes: • Implementation of separate division to handle product development has disrupted the previous cohesive interaction between prior existing divisions. New product development division has taken on a life of its own, opting to market its new developments instead of passing the new products to the other divisions to handle their usual responsibilities. • In spite of its independence of other teams with regard to product development and marketing, the new division still need... ...the training and developments (Brown & Harvey, 2006). In this situation, every manager needs to have dialogue with the marketing department. This action, alone, will set into motion changes that would be expected to aid the sales and revenue of their respective products (Blanchard & Thacker, 2004). References Brown, D. & Harvey, D. (2006). An experiential approach to organization development. (seventh edition). Upper Saddle River, NJ: Pearson Prentice Hall. McNamara, C. (1999). Business planning. Retrieved on 26 October 2006 from www.NonProfitOffice.com Dagmar & Oliver Recklies. (2006). Themanager.org. Retrieved on 26 October 2006, from http://www.themanager.org/Strategy/Change_Phases.htm Blanchard, P.N. & Thacker, J.W. (2004). Effective training: systems strategies and practices. (2nd Edition). Upper Saddle River NJ: Pearson Prentice Hall.

Rosalind Franklin :: essays research papers

Rosalind Franklin Rosalind Franklin lived during an exciting and turbulent era both socially and scientifically. Upon passing the admission examination for Cambridge University in 1938, at fifteen, Franklin was was informed by her affluent family that she would not recieve financial support. Franklin ¡Ã‚ ¯s father disapproved of women receiving college educations, however, both Franklin ¡Ã‚ ¯s aunt and mother supported her quest for education. Eventually, her father gave in and agreed to pay her tuition. Franklin would later prove to be worth her education. As Rosalind Franklin was pursuing her degree World War II raged. She focused her research on coal, the most efficient use of energy resources. Five papers on the subject were published before Franklin ¡Ã‚ ¯s 26th birthday. Further, Franklin had given up her fellowship to become a physical chemist at the British Coal Utilization Research Association at age 22. She was indeed an efficient and driven researcher. Franklin utilized the X-ray diffraction techniques (that she has become most famous for) while working in a Paris laboratory between 1947 and 1950, with crystallographer Jacques Mering. X-ray crystallography helped determined the three dimensional structure of DNA when Franklin returned to England. She became the first person to find the molecule ¡Ã‚ ¯s sugar-phosphate backbone while working with a team of scientists at King ¡Ã‚ ¯s College in London. Unfortunately, leadership misunderstandings and personality conflicts depreciated Franklin ¡Ã‚ ¯s effectivness in the laboratory. Maurice Wilkins, the laboratory ¡Ã‚ ¯s second in command, returned from a vacation expecting Franklin to work under him. Franklin came to the laboratory with the understanding that she would be researching alone. While Franklin was direct and decisive, Wilkins tended to be alluding and passive-aggressive. As Franklin made further advances in DNA research, Wilkins secretly shared her findings with the famous duo of Watson and Crick, who were then working at Cambridge. Franklin ¡Ã‚ ¯s discoveries fueled their research machine, allowing them to advance beyond others in the field. T hey would eventually publish on DNA structure in 1953. Due to discriminatory procedures at King ¡Ã‚ ¯s College, Franklin eventually left to become the lead researcher at London ¡Ã‚ ¯s Birbeck College--upon agreeing not to work on DNA. She furthered her studies in coal and made significant advances in virology. Franklin died in 1958 of ovarian cancer. She lived 37 monumentally significant years. After researching Rosalind Franklin ¡Ã‚ ¯s scientific career, I truly believe that she was a pioneer rather than a follower. Her early coal work is still referred to today; she helped launch the fields of high-strength carbon fibers; and was an integral part of early structural virology.

Sunday, August 18, 2019

Essay on Hotspur as Tragic Hero of Henry IV -- Henry IV Henry V Essays

Hotspur as Tragic Hero of Henry IV       In Shakespeare's Henry IV Part One, the characters' many different conceptions of honor govern how they respond to situations.   Each character's conception of honor has a great impact on the character's standing after the play.   For instance, Falstaff survived because he dishonorably faked his own death, and his untrue claim that he was the one who killed Hotspur may get him a title and land.   On the other hand, Hotspur lies dead after losing a duel for honor.   Hotspur, who is in many ways the ideal man by the standards of his time, is killed by his lust for honor.   In creating Hotspur, Shakespeare has created a variation on the tragic hero of other works: the stubborn tragic hero, who, dying for his fault of honor, does not at last understand his weakness.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The fault of the classic tragic hero, hubris, is very similar to Hotspur's need for honor.   While hubris is excessive pride, the quest for honor can be viewed as the quest ( of the proud ) to get more titles and accolades, more things to be proud of.   In addition, Hubris and honor drive their victims to ultimate failure in a similar manner: Oedipus is driven to find out the truth about his origins by his own pride just as Hotspur is driven by his need for honor to fight against the odds.   Each fault is as inevitably dooming as the other: the quest for honor leads to greater and greater risks taken for greater and greater honors, and hubris leads to the acceptance of greater and greater risks as the proud hero cannot back down.   Thus Hotspur's need for honor is similar failing to hubris, giving him that characteristic of the tragic hero.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Hotspur's standing in his society is very high: he is ... ...peare from other writers of the Elizabethan period and made his writings exceptional.    Works Cited and Consulted:    Bloom, Harold. Henry IV, Part One: Bloom's Notes. New York: Chelsea House, 1996.    Cruttwell,Patrick. Hernry IV. Shakespeare For Students, Vol. II. Detroit: Gale Publishing, 1999.    Kantor, Andrea. Henry IV, Part One. London: Baron's Education Series, Inc, 1984.    Princiss, G.M. Henry IV Criticism. Shakespeare For Students, Vol.II. Detroit: Gale Publishing, 1999.    Prior, Moody E. The Drama of Power: Study in Shakespeare's History Plays. Shakespeare For Students, Vol. II. Detroit: Gale Publishing, 1999.    Shakespeare, William. Henry IV, Part One, Penguin Books, Lim, Harmondsworth, Middlesex, England. 1987.    Wells, Stanley. Shakespeare: Life in Drama. New York: Norton & Company, 1995.   

Saturday, August 17, 2019

Native American Indians Essay

Indian Nations are sovereign governments, recognized in and hundreds of treaties with the U. S. President. The history of this continent’s original inhabitants encompasses a broad range of cultures and experiences. American Indians varied greatly from region to region, as did their reactions to European settlement. This website will delve into the vast and storied background of most tribes and seek to supply the visitors with as much knowledge as possible about the proud history of Native Americans. Please join us on this journey into the past, experience the present and dream about the future of the American Indian. When Columbus landed on the island of San Salvador in 1492 he was welcomed by a brown-skinned people whose physical appearance confirmed him in his opinion that he had at last reached India, and whom, therefore, he called Indios, Indians, a name which, however mistaken in its first application continued to hold its own, and has long since won general acceptance, except in strictly scientific writing, where the more exact term American is commonly used. As exploration was extended north and south it was found that the same race was spread over the whole continent, from the Arctic shores to Cape Horn, everywhere alike in the main physical characteristics, with the exception of the Eskimo in the extreme North, whose features suggest the Mongolian. Tribes and Nations Native Americans (American Indians) make up less than one percent of the total U. S. population but represent half the languages and cultures in the nation. The term â€Å"Native American† includes over 500 different groups and reflects great diversity of geographic location, language, socioeconomic conditions, school experience, and retention of traditional spiritual and cultural practices. However, most of the commercially prepared teaching materials available present a generalized image of Native American people with little or no regard for differences that exist from tribe to tribe. Mohawk (Iroquois): The Iroquois League, or Five Nations of the Iroquois, was the most powerful Indian military alliance in the eastern part of North America and probably the most successful alliance of any kind between so many important tribes. There were three principal clans – deer, turtle and wolf – existing within the five nations, and this was probably an important unifying factor in the league. The league was formed in the late sixteenth century at which time the five nations had a combined population of 7000. Mohican (Mohegan) and/or Mahican: What a confusion of facts. After reading through several texts and visiting many sites on the web, it has become clear as mud that everyone has a differing opinion about the relationships between these three tribes. We will therefore include them all on one page and maybe through your wanderings, you will discover the truth. If you do, please let us in on it. Creek: The Creek were originally one of the dominant tribes in the mid-south and later became known as one of the Five Civilized Tribes. They were known in their own language as Muskoke or Muskoge, by the Shawnee as Humaskogi, by the Delaware as Masquachki and by the British as the Ochese Creek Indians, hence the present name. Their name has been adapted for that of their linguistic group and for Muskogee, Oklahoma, which was a major city of the Creek Nation in Indian Territory. Cherokee: The Cherokee were one of the largest tribes in the Southeast and were among the earliest to adapt to European civilization. Their name is written Tsalagi in their own language, and they were called Chalakki by the Choctaw, whose language was the language of trade in the Southeast. Southwest Navajo (Dineh, Navaho): The Navajo tribe is the largest in the United States, with some 200,000 people occupying the largest and area reserved for Native Americans – 17 million acres in Arizona, Utah, and New Mexico. The word Navajo derives from the Spanish word for ‘people with big fields. ‘ At the time of the arrival of the white man they had developed agriculture, though on a smaller scale than the nearby Hopi and Pueblo peoples. The Navajo were less sedentary than the Hopi and Pueblo tribes, but more so than the Apache of the same region. Zuni: The Zuni, like the Hopi, were linguistically distinct from the Pueblo tribes but related to them culturally. The three groups, Zuni, Hopi and Pueblo, had several important characteristics in common. First of all, they lived in pueblos (Spanish for village), which were a composite of adobe houses, frequently interconnected and occasionally multistoried, much like a modern apartment complex. While each Pueblo tribe was associated with a single pueblo, the Hopi and Zuni were each associated with several, and not all members of these tribes lived in pueblos. Hopi: The Hopi, whose name comes from hopitu meaning ‘the peaceful ones,’ are traditionally associated culturally with the Zuni and with eht Pueblo Indians. All of these people live in pueblos or cities comprised of a complex of sometimes jultistoried, rectangular houses. The name pueblo drives from the Spanish word for ‘people’. The Hopi are descendants of people who migrated into the Southwest prior to 1000 BC. By 700 AD they had developed agriculture and were raising corn, beans, squash and cotton. By 1100 AD they had abandoned their aboriginal pit housed for multi-level adobe houses, and had founded cities at Oraibi and Mesa Verde. Yavapai: From prehistoric times, the Yavapai lived as hunters and gatherers practicing occasional agriculture on over nine million acres of central and western Arizona. The three primary groups of Yavapai maintained good relationships with each other and are now located at Ft. McDowell, Camp Verde and Prescott. The Yavapai are known for weaving excellent baskets, which are displayed in many museums. Apache: The Apache (from a Zuni word meaning â€Å"enemy†) are a North American Indian people of the Southwest. Their name for themselves is Inde, or Nde (â€Å"the people†). The major nomadic tribe in the American Southwest, the Apache, was also the Last major tribe to surrender to government control in the 1880s Plains Kiowa: The Kiowa name is derived from kai-gwa, meaning ‘principal people,’ and legend has it that they originated in the Yellowstone River country of central Montana. In the eighteenth century, having obtained horses, they moved onto the plains to hunt buffalo. During this time they made alliances with both the Kiowa-Apache as well as their former enemies, the Comanche. This latter association was the basis for the Kiowa-Comanche Reservation formed in Indian Territory in 1892. The Kiowa are noted for having kept a written history. This historical record was kept in the form of a pictographic calendar painted and updated twice a year, in winter and summer, on buffalo skins. Pawnee (Pani, Pana, Panana, Panamaha, Panimaha): The Pawnee name may have derived from Caddoan pariki, meaning ‘horn,’ a reference to the peculiar manner inwhich the tribe wore the scalplock. The Paunee lived in established villages similar to those of the Mandan. They practiced agriculture but also hunted buffalo on the plains part of the year. They had a complex religion unrelated to other Plains tribes that included offering female captives as a sacrifice to ensure abundant crops. Comanche: The Comanche are an offshoot of the Shoshone and one of several numanic speaking tribes. They are linguistically related to the Shoshone, Ute and Paiute, whose language is remotely related to Aztec. Their name comes from the Spanish camino ancho, which means â€Å"wide trail. † They once lived in the Rocky Mountains near the Shoshone, but migrated to the plains to hunt buffalo. Though they became nomadic Plains Indians, they still maintained good relations with the Shoshone. Osage (Wazhazhe): Closely related to the Omaha, Kansa, Quopaw and Ponca, the Osage are thought to have once lived in the Ohio River valley, but they were first encountered by the white man in Missouri, where they were recorded as having large cornfields. They usually lived in earth lodges, but when on hunting trips to the northern plains in search of buffalo, they carried and used the plains tipi. Great Lakes Miami (Maumee, Twightwee): The Miami, whose name comes from the Chippewa omaumeg, or ‘people who live on the peninsula,’ first came into contact with white men in 1658 near Green Bay, Wisonsin, but they soon withdrew to the headwaters of the Fox River and later to the headwaters of the Wabash and Maumee rivers. The Miami had good relations with the French, with whom they were allied. They were also closely associated with the Piankashaw, who were once thought to be part of the Miami tribe. Huron (Wyandot): The name Wyandot (or Wendat) is Iroquoian for ‘people of the peninsula,’ a reference to a peninsula in sourthern Ontario eas of Lake Huron where they originally lived. Their population was estimated at 20,000 in 1615 when first encountered by the French under Samuel de Champlain, who referred to them as Huron (‘bristly-headed ruffian’). The first Wyandot groups inthe region probably arrived in the early fourteenth century. In addition to maize, the Wyandot raised beans, squash, sunflowers and tobacco. Ottawa: The name Ottawa is derived from the Algonquian adawe, meaning ‘to trade,’ an apt name for the tribe, who had an active trading relationship with the related Chippewa and Potawatomi as well as other tribes of the region. Like the Chippewa, they built birch bark canoes and harvested wild rice. Ottawa Chief Pontiac rose by 1755 as one of the most important Indian leaders of the era. Ojibwa (Chippewa): To end any confusion, the Ojibwa and Chippewa are not only the same tribe, but the same word pronounced a little differently due to accent. If an â€Å"O† is placed in front of Chippewa (O’chippewa), the relationship becomes apparent. Ojibwa is used in Canada, although Ojibwa west of Lake Winnipeg are sometime referred to as the Saulteaux. In United States, Chippewa was used in all treaties and is the official name. The Chippewas were the largest and most powerful tribe in the Great Lakes country, with a range that extended from the edge of Iroquois territory in the Northeast to the Sioux-dominated Great Plains. Both of these major tribes were traditional Chippewa rivals, but neither was powerful enough to threaten the Chippewa heartland, where the Chippewa was master. The tribe used the lakes and rivers of the region like a vast highway network, and developed the birch bark canoe into one of the continent’s major means of transportation. Northwest Nez Perce: Nez Perce is a misnomer given by the interpreter of the Lewis and Clark expedition team of 1805. The French translate it as â€Å"pierced nose. † This is untrue as the Nee-me-poo did not practice nose piercing or wearing ornaments. The â€Å"pierced nose† people lived on the lower Columbia River and throughout other parts of the Northwest. The famous indian chief and leader, Chief Joseph, was of the Nez Perce. Flathead (Salish): The Flathead, a subgroups of the Spokane tribes, were given their name from a custom common to many Salishan people of practicing head deformation by strapping their infants to hard cradleboards. This flattened the back of the head and made the top appear more round. The Flathead, conversely, did not practice head flattening, and therefore the tops of their heads were flatter than those of the other Salishan people, hence the name. Blackfoot (Siksika): The Blackfoot are one of the several numanic-speaking tribes, and were historically allied with the nomadic Atsina. Ther were the archetypal Plains Indians, for whom the buffalo provided nearly all their needs, from food to clothing to leather for their tipis. Shoshone (Shoshoni): The Shoshone were the most wide-ranging of the Great Basin tribes, with a habitat that stretched from the eastern Oregon desert to southern Colorado. They were closely related to the Bannock, Gosiute, Paiute and Ute, with whom they shared these lands and with shown there was a good deal of intermarriage. Kwakiutl: The Kwakiutl were one of the major tribes of the Northwest Coast and once encompassed other nearby tribes such as the Bella Bella, Kitimat, Makah and Nootka, with whom they are linguistically related. Their villages were typical of the Northwest Coast, with large cedar plank houses and intricately carved totem poles, representing the animals with whom a particular family might be religiously associated. Works Cited â€Å"Rebuilding Native American Communities† by Don Coyhis & Richard Simonelli, Child Welfare, Mar/Apr 2005 (15 pages). â€Å"Native American Feminism, Sovereignty, and Social Change† by Andrea Smith, Feminist Studies, Spring 2005 (17 pages). â€Å"The Paradox of Native American Indian Intellectualism and Literature† by Kathryn Winona Shanley, MELUS, Fall/Winter 2004 (20 pages). â€Å"American Indian History as Continuing Story† by Peter Iverson, Historian, Fall 2004 (8 pages). â€Å"Anti-colonial Strategies for the Recovery and Maintenance of Indigenous Knowledge† by Leanne R. Simpson, American Indian Quarterly, Summer/Fall 2004 (12 pages). â€Å"Sovereignty: The Rhetoric v. The Reality† by Paul Boyer, Tribal College Journal, Fall 2004 (4 pages). â€Å"Developing an Effective Approach to Strategic Planning for Native American Indian Reservations† by Nicholas Zaferatos, Space & Polity, April 2004 (18 pages). â€Å"Ethnogeography and the Native American Past† by James Carson Taylor, Ethnohistory, Fall 2002 (20 pages). â€Å"Indigenous Identity† by Hillary N. Weaver, American Indian Quarterly, Spring 2001 (16 pages) â€Å"What We Want to be Called? † by Michael Yellow Bird, American Indian Quarterly, Spring 1999 (21 pages) â€Å"Native American Population Pattern† by Mathew J. Shumway, Geographical Review, April 1995 (17 pages) . The North American Indian Jewelry and Adornment (Harry N. Abrams, 2003) Native American: A History in Pictures (DK Adult, 2000) Atlas of North American History (Checkmark Books, 2000) We Are Still Here: American Indians in the Twentieth Century (Harlan Davidson Inc. 1998) The Native Americans: The Indigenous People of North America (Advanced Marketing Services, 1999) Through Indian Eyes: The Untold Story of Native American Peoples (Reader’s Digest Association, 1995) Dictionary of Native American Mythology by Gill, Sam D and Sullivan, Irene F (ABC-Clio, 1992) Exiled in the land of the free: Democracy, Indian nations, and the U. S. Constitution (Clear Light Publishers, 1991) The Native American Experience (Facts on File, 1991). The great father: the United States government and the American Indians by Prucha, Francis Paul (University of Nebraska Press,1986) Voices of the Winds: Native American Legends by Edmonds, Margot and Clark, Ella Elizabeth (Facts on File, 1989) Atlas of the North American Indians by Waldman, Carl (Facts on File, 1984) Changes in the Land: Indians, Colonists, and the Ecology of New England (Hill & Wang, 1983) The Talking stone: An anthology of native American tales and legends (Greenwillow Books, New York, 1979) The Indians of the southeastern United States by Swanton, John Reed (Smithsonian Institution Press, 1979)